I can change it if that is what people want.  I personally like not 
having blatant visible usernames or passwords in plain text files.

When comparing given password to stored password how do you use the same 
salt if it is random?  Or is at random salt for that machine?

Jason Tackaberry wrote:
> On Sun, 2006-12-31 at 23:20 -0800, Ryan Roth wrote:
>   
>> Your way behind :), I already changed it to use md5
>>     
>
> No, I saw that.  I was just saying not to hash the username, and to use
> the conventional unix crypt command with a random salt (instead of the
> username as salt).  crypt(3) on any modern linux will use MD5 implicitly
> so long as your salt follows the "$1$<salt>$" format.
>
> Jason.
>
>
> -------------------------------------------------------------------------
> Take Surveys. Earn Cash. Influence the Future of IT
> Join SourceForge.net's Techsay panel and you'll get the chance to share your
> opinions on IT & business topics through brief surveys - and earn cash
> http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
> _______________________________________________
> Freevo-users mailing list
> Freevo-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/freevo-users
>
>   

-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys - and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Freevo-users mailing list
Freevo-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/freevo-users

Reply via email to