Re: Salt for /etc/shadow and passwd?

2001-07-18 Thread Jason Lim

Hi,

Thanks for the confirmation :-)

Sincerely,
Jason Lim

- Original Message -
From: Thomas Morin [EMAIL PROTECTED]
To: Jason Lim [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Wednesday, July 18, 2001 4:02 AM
Subject: Re: Salt for /etc/shadow and passwd?


 -. Jason Lim (2001-07-18) :
  |
  | Okay... I wasn't thinking. The salt is stored within the crypted
password
  | generated, which is why password crackers work.

 Yes, with crypt(3) the salt is precisely the first two characters.

 -tom

 --
 == Thomas.Morin @webmotion.comSysAdmin/RD
 == Phone: +1 613 731 4046 ext113 \Fax: +1 613 260 9545
 == PGP/keyID: 8CEA233D
 == PGP/KeyFP: 503BF6CFD3AE8719377B832A02FB94E08CEA233D
 --



 --
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact
[EMAIL PROTECTED]
 http://www.zentek-international.com/



--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Salt for /etc/shadow and passwd?

2001-07-18 Thread Marcin Owsiany

On Tue, Jul 17, 2001 at 04:02:03PM -0400, Thomas Morin wrote:
 -. Jason Lim (2001-07-18) :
  |
  | Okay... I wasn't thinking. The salt is stored within the crypted password
  | generated, which is why password crackers work.
 
 Yes, with crypt(3) the salt is precisely the first two characters.

_If_ you use the old crypt() semantics. If you provide a salt
starting with '$1$' it will give you MD5-hashed password.

Marcin
-- 
Marcin Owsiany [EMAIL PROTECTED]
http://student.uci.agh.edu.pl/~porridge/
GnuPG: 1024D/60F41216  FE67 DA2D 0ACA FC5E 3F75  D6F6 3A0D 8AA0 60F4 1216


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Salt for /etc/shadow and passwd?

2001-07-17 Thread Jason Lim

Okay... I wasn't thinking. The salt is stored within the crypted password
generated, which is why password crackers work.

Well... hopefully you can confirm this :-)

Sincerely,
Jason

- Original Message -
From: Jason Lim [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, July 18, 2001 3:17 AM
Subject: Salt for /etc/shadow and passwd?


 Hi!

 I was wondering where the salt is stored on a debian linux system...?

 I want to cp /etc/shadow from one server to another for simplicity, and
I
 would rather not have to regenerate all the crypted passwords over
again.

 So... if I can make the salt for both servers the same then that SHOULD
 work, right?

 Well, thanks in advance!

 Sincerely,
 Jason

 http://www.zentek-international.com/


--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: Salt for /etc/shadow and passwd?

2001-07-17 Thread Thomas Morin

-. Jason Lim (2001-07-18) :
 |
 | Okay... I wasn't thinking. The salt is stored within the crypted password
 | generated, which is why password crackers work.

Yes, with crypt(3) the salt is precisely the first two characters.

-tom

--
== Thomas.Morin @webmotion.comSysAdmin/RD
== Phone: +1 613 731 4046 ext113 \Fax: +1 613 260 9545
== PGP/keyID: 8CEA233D
== PGP/KeyFP: 503BF6CFD3AE8719377B832A02FB94E08CEA233D
--



--  
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]