shawn wilson wrote: > On Nov 9, 2014 8:42 PM, "Damien Miller" <djm@xxxxxxxxxxx> wrote: >> >> On Sun, 9 Nov 2014, shawn wilson wrote: >> >>> On Sun, Nov 9, 2014 at 7:11 PM, Damien Miller <djm@xxxxxxxxxxx> wrote: >>> >>> That's always a good idea, but try not to reinvent the wheel too much >>> here: http://hashcat.net/wiki/doku.php?id=example_hashes >>> There's no m5(sha512(word)) but $foo$fpr or $foo$host$fpr should maybe >>> be used? >> >> I don't think password hashes are a good model for key fingerprints. >> Password hashes are intended for consumption in password databases, >> key fingerprints are intended for rapid and accurate comparison by >> humans. > > It is to identify a hash. Who cares what the hash is of. Password hash schemes also needs a salt specification and maybe more (rounds etc.) => not usable It seems some people define URN name spaces for such fingerprints: https://tools.ietf.org/html/draft-seantek-certspec http://www.aaronsw.com/2002/draft-swartz-pgp-urn-00.html Ciao, Michael.
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature
_______________________________________________ openssh-unix-dev mailing list openssh-unix-dev@xxxxxxxxxxx https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev