Hi
On Monday, 2 November, 2015 20:09, "Johnson, Neil M" <[email protected]>
said:
> Radiator 4.16 on the test box and Radiator 4.13 in production.
>
> It appears the password is in SHA-512 format ($6$ prefix), but it didn’t
> work on the test box until I ran a python script uses the following line to
> encrypt the password:
>
> encrypted_password = crypt.crypt(raw_passwd1, salt=crypt.METHOD_SHA512)
>
> And then manually copied it into the /etc/shadow file.
>
> Here is the password entry for a dummy account I created on the test box:
>
> $6$rMzuK3lt$OTG.nVZjYW6E4jWjQJ3DVQgpEPoSSy6p6b34p1nx5w3b7NKfTAWKKF0xvUGPeiM9PLSc3z83uD8JcKzzjU6951
>
> password is “fredsmed"
>
I'm unable to reproduce the problem with Radiator 4.16 on Ubuntu 14.04 box
using AuthBy UNIX or FILE
with the SHA-512 hash above.
Does the following Perl script print the same hash twice on the test box?
use strict;
use warnings;
my $pw =
'$6$rMzuK3lt$OTG.nVZjYW6E4jWjQJ3DVQgpEPoSSy6p6b34p1nx5w3b7NKfTAWKKF0xvUGPeiM9PLSc3z83uD8JcKzzjU6951';
my $submitted_pw = "fredsmed";
if ($pw =~ /^\$[56]\$.+\$/) {
print $pw . "\n";
print crypt($submitted_pw, $pw) . "\n";
}
BR
--
Tuure Vartiainen
Radiator: the most portable, flexible and configurable RADIUS server
anywhere. SQL, proxy, DBM, files, LDAP, NIS+, password, NT, Emerald,
Platypus, Freeside, TACACS+, PAM, external, Active Directory, EAP, TLS,
TTLS, PEAP, TNC, WiMAX, RSA, Vasco, Yubikey, MOTP, HOTP, TOTP,
DIAMETER etc. Full source on Unix, Windows, MacOSX, Solaris, VMS,
NetWare etc.
_______________________________________________
radiator mailing list
[email protected]
http://www.open.com.au/mailman/listinfo/radiator