Re: Salt for /etc/shadow and passwd?

2001-07-18 Thread Marcin Owsiany

On Tue, Jul 17, 2001 at 04:02:03PM -0400, Thomas Morin wrote:
> -. Jason Lim (2001-07-18) :
>  |
>  | Okay... I wasn't thinking. The salt is stored within the crypted password
>  | generated, which is why password crackers work.
> 
> Yes, with crypt(3) the salt is precisely the first two characters.

_If_ you use the old crypt() semantics. If you provide a salt
starting with '$1$' it will give you MD5-hashed password.

Marcin
-- 
Marcin Owsiany <[EMAIL PROTECTED]>
http://student.uci.agh.edu.pl/~porridge/
GnuPG: 1024D/60F41216  FE67 DA2D 0ACA FC5E 3F75  D6F6 3A0D 8AA0 60F4 1216


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Salt for /etc/shadow and passwd?

2001-07-17 Thread Jason Lim

Hi,

Thanks for the confirmation :-)

Sincerely,
Jason Lim

- Original Message -
From: "Thomas Morin" <[EMAIL PROTECTED]>
To: "Jason Lim" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Wednesday, July 18, 2001 4:02 AM
Subject: Re: Salt for /etc/shadow and passwd?


> -. Jason Lim (2001-07-18) :
>  |
>  | Okay... I wasn't thinking. The salt is stored within the crypted
password
>  | generated, which is why password crackers work.
>
> Yes, with crypt(3) the salt is precisely the first two characters.
>
> -tom
>
> --
> == Thomas.Morin @webmotion.comSysAdmin/R&D
> == Phone: +1 613 731 4046 ext113 \Fax: +1 613 260 9545
> == PGP/keyID: 8CEA233D
> == PGP/KeyFP: 503BF6CFD3AE8719377B832A02FB94E08CEA233D
> --
>
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED]
> http://www.zentek-international.com/
>


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Salt for /etc/shadow and passwd?

2001-07-17 Thread Thomas Morin

-. Jason Lim (2001-07-18) :
 |
 | Okay... I wasn't thinking. The salt is stored within the crypted password
 | generated, which is why password crackers work.

Yes, with crypt(3) the salt is precisely the first two characters.

-tom

--
== Thomas.Morin @webmotion.comSysAdmin/R&D
== Phone: +1 613 731 4046 ext113 \Fax: +1 613 260 9545
== PGP/keyID: 8CEA233D
== PGP/KeyFP: 503BF6CFD3AE8719377B832A02FB94E08CEA233D
--



--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]




Re: Salt for /etc/shadow and passwd?

2001-07-17 Thread Jason Lim

Okay... I wasn't thinking. The salt is stored within the crypted password
generated, which is why password crackers work.

Well... hopefully you can confirm this :-)

Sincerely,
Jason

- Original Message -
From: "Jason Lim" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, July 18, 2001 3:17 AM
Subject: Salt for /etc/shadow and passwd?


> Hi!
>
> I was wondering where the salt is stored on a debian linux system...?
>
> I want to cp /etc/shadow from one server to another for simplicity, and
I
> would rather not have to regenerate all the crypted passwords over
again.
>
> So... if I can make the salt for both servers the same then that SHOULD
> work, right?
>
> Well, thanks in advance!
>
> Sincerely,
> Jason
>
> http://www.zentek-international.com/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]