I found an interesting issue with kuser v1.0 today.  It looks like kuser
will not generate MD5 passwords, but only the old style crypt
passwords.  I found out this issue when trying kuser for the first time
and making a new user account, and the user found only the first eight
characters of his password were valid when doing a test login.  I
checked out the man page for crypt(3) and found the GNU extension to the
crypt library allows making MD5 versions of passwords if the salt that
is given is preceded by the characters $1$, so it appears that this may
be easy to fix for GNU systems?  Anyone else run into this issue
before?  I'm a little bit concerned because MD5 passwords have been
hyped up lately, and here is an easy to use administration tool, in
Linux-Mandrake,that doesn't make use of built in system security.

For anyone that wants to make sure their Linux-Mandrake system is making
MD5 passwords, take a look at the encrypted password field in
/etc/shadow (as the root user) and see if the first three characters
start with "$1$".  Also, I believe the MD5 passwords are 34 characters
long in /etc/shadow, where the old-style crypt passwords are 13
characters long in /etc/shadow.
-- 
[EMAIL PROTECTED]


Reply via email to