Re: Salt for /etc/shadow and passwd?
On Tue, Jul 17, 2001 at 04:02:03PM -0400, Thomas Morin wrote: > -. Jason Lim (2001-07-18) : > | > | Okay... I wasn't thinking. The salt is stored within the crypted password > | generated, which is why password crackers work. > > Yes, with crypt(3) the salt is precisely the first two characters. _If_ you use the old crypt() semantics. If you provide a salt starting with '$1$' it will give you MD5-hashed password. Marcin -- Marcin Owsiany <[EMAIL PROTECTED]> http://student.uci.agh.edu.pl/~porridge/ GnuPG: 1024D/60F41216 FE67 DA2D 0ACA FC5E 3F75 D6F6 3A0D 8AA0 60F4 1216 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Salt for /etc/shadow and passwd?
Hi, Thanks for the confirmation :-) Sincerely, Jason Lim - Original Message - From: "Thomas Morin" <[EMAIL PROTECTED]> To: "Jason Lim" <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Sent: Wednesday, July 18, 2001 4:02 AM Subject: Re: Salt for /etc/shadow and passwd? > -. Jason Lim (2001-07-18) : > | > | Okay... I wasn't thinking. The salt is stored within the crypted password > | generated, which is why password crackers work. > > Yes, with crypt(3) the salt is precisely the first two characters. > > -tom > > -- > == Thomas.Morin @webmotion.comSysAdmin/R&D > == Phone: +1 613 731 4046 ext113 \Fax: +1 613 260 9545 > == PGP/keyID: 8CEA233D > == PGP/KeyFP: 503BF6CFD3AE8719377B832A02FB94E08CEA233D > -- > > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] > http://www.zentek-international.com/ > -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Salt for /etc/shadow and passwd?
-. Jason Lim (2001-07-18) : | | Okay... I wasn't thinking. The salt is stored within the crypted password | generated, which is why password crackers work. Yes, with crypt(3) the salt is precisely the first two characters. -tom -- == Thomas.Morin @webmotion.comSysAdmin/R&D == Phone: +1 613 731 4046 ext113 \Fax: +1 613 260 9545 == PGP/keyID: 8CEA233D == PGP/KeyFP: 503BF6CFD3AE8719377B832A02FB94E08CEA233D -- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Re: Salt for /etc/shadow and passwd?
Okay... I wasn't thinking. The salt is stored within the crypted password generated, which is why password crackers work. Well... hopefully you can confirm this :-) Sincerely, Jason - Original Message - From: "Jason Lim" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Wednesday, July 18, 2001 3:17 AM Subject: Salt for /etc/shadow and passwd? > Hi! > > I was wondering where the salt is stored on a debian linux system...? > > I want to cp /etc/shadow from one server to another for simplicity, and I > would rather not have to regenerate all the crypted passwords over again. > > So... if I can make the salt for both servers the same then that SHOULD > work, right? > > Well, thanks in advance! > > Sincerely, > Jason > > http://www.zentek-international.com/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]