On Tue, Dec 3, 2013, at 10:46, Chip Marshall wrote:
> On 2013-12-03, Chris Morrow <morr...@ops-netman.net> sent:
> > > I get things like "$sha1$19418$aoTClyGU$cix8MhZsXwG6OrwUgeHAoOA8f.AX"
> > > where it appears to have the format, some number, what I think is
> > > the salt, and then the hash.
> > > 
> > > Anyone know how these things are calculated?
> > 
> > we do this calculation.... I believe your intended format is:
> >   $1$salt$hash
> > 
> > or that seems to be what our code does.
> 
> That's for MD5 passwords. I have a requirement to use SHA-1.
> 

JunOS is based on FreeBSD, and FreeBSD doesn't support SHA-1 password
hashes. Your choices are:

DES: (no identifier)
MD5: $1$ 
Blowfish: $2$
NTHASH: $3$
SHA256: $5$
SHA512: $6$ (likely not supported as it's recent to FreeBSD)

And how to generate a hash (just change the identifier; it will create
the right hash):

python -c "import crypt, getpass, pwd; print crypt.crypt('password',
'\$1\$SALTsalt\$')"

Just make sure you use a different salt for each password.
_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to