Re: Salt for /etc/shadow and passwd?
Hi, Thanks for the confirmation :-) Sincerely, Jason Lim - Original Message - From: Thomas Morin [EMAIL PROTECTED] To: Jason Lim [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Sent: Wednesday, July 18, 2001 4:02 AM Subject: Re: Salt for /etc/shadow and passwd? -. Jason Lim (2001-07-18) : | | Okay... I wasn't thinking. The salt is stored within the crypted password | generated, which is why password crackers work. Yes, with crypt(3) the salt is precisely the first two characters. -tom -- == Thomas.Morin @webmotion.comSysAdmin/RD == Phone: +1 613 731 4046 ext113 \Fax: +1 613 260 9545 == PGP/keyID: 8CEA233D == PGP/KeyFP: 503BF6CFD3AE8719377B832A02FB94E08CEA233D -- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED] http://www.zentek-international.com/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Salt for /etc/shadow and passwd?
On Tue, Jul 17, 2001 at 04:02:03PM -0400, Thomas Morin wrote: -. Jason Lim (2001-07-18) : | | Okay... I wasn't thinking. The salt is stored within the crypted password | generated, which is why password crackers work. Yes, with crypt(3) the salt is precisely the first two characters. _If_ you use the old crypt() semantics. If you provide a salt starting with '$1$' it will give you MD5-hashed password. Marcin -- Marcin Owsiany [EMAIL PROTECTED] http://student.uci.agh.edu.pl/~porridge/ GnuPG: 1024D/60F41216 FE67 DA2D 0ACA FC5E 3F75 D6F6 3A0D 8AA0 60F4 1216 -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Salt for /etc/shadow and passwd?
Okay... I wasn't thinking. The salt is stored within the crypted password generated, which is why password crackers work. Well... hopefully you can confirm this :-) Sincerely, Jason - Original Message - From: Jason Lim [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, July 18, 2001 3:17 AM Subject: Salt for /etc/shadow and passwd? Hi! I was wondering where the salt is stored on a debian linux system...? I want to cp /etc/shadow from one server to another for simplicity, and I would rather not have to regenerate all the crypted passwords over again. So... if I can make the salt for both servers the same then that SHOULD work, right? Well, thanks in advance! Sincerely, Jason http://www.zentek-international.com/ -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]
Re: Salt for /etc/shadow and passwd?
-. Jason Lim (2001-07-18) : | | Okay... I wasn't thinking. The salt is stored within the crypted password | generated, which is why password crackers work. Yes, with crypt(3) the salt is precisely the first two characters. -tom -- == Thomas.Morin @webmotion.comSysAdmin/RD == Phone: +1 613 731 4046 ext113 \Fax: +1 613 260 9545 == PGP/keyID: 8CEA233D == PGP/KeyFP: 503BF6CFD3AE8719377B832A02FB94E08CEA233D -- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]