Re: [SLUG] Unix password hashes

From: Dylan William Hardison (dylan@hardison.net)
Date: Thu Aug 20 2009 - 14:51:49 EDT


I wasn't aware that crypt(3) was as smart as it is. I'll be using
crypt($pw, '$5$' . rand())
and having pam_unix default to sha256 as well. :-D

On Thu, Aug 20, 2009 at 1:00 PM, <blee2@tampabay.rr.com> wrote:
> Thus Dylan William Hardison hast written on Thu, Aug 20, 2009 at 12:36:13PM -0400, and, according to prophecy, it shall come to pass that:
>> Anyone know where the password field of /etc/shadow is documented? I'm
>> using libnss-extrausers and I need to be able to generate correct
>> hashes for my supplemental shadow file.
>
> man shadow:
> <snip>
>        The password field must be filled. The encrypted password consists
>        of 13 to 24 characters from the 64 character alphabet a thru z,
>        A thru Z, 0 thru 9, \. and /. Optionally it can start with a
>        "$" character.  This means the encrypted password was generated
>        using another (not DES) algorithm. For example if it starts with
>        "$1$" it means the MD5-based algorithm was used.
>
>        Refer to crypt(3) for details on how this string is interpreted.
> </snip>
>
> man 3 crypt:
>
>        No manual entry for crypt in section 3
>
> <grumble>
>
> Google results:
>        http://linux.die.net/man/3/crypt
> -----------------------------------------------------------------------
> This list is provided as an unmoderated internet service by Networked
> Knowledge Systems (NKS).  Views and opinions expressed in messages
> posted are those of the author and do not necessarily reflect the
> official policy or position of NKS or any of its employees.
>

-----------------------------------------------------------------------
This list is provided as an unmoderated internet service by Networked
Knowledge Systems (NKS). Views and opinions expressed in messages
posted are those of the author and do not necessarily reflect the
official policy or position of NKS or any of its employees.



This archive was generated by hypermail 2.1.3 : Fri Aug 01 2014 - 13:23:38 EDT