+++ Shanker Balan [linux-india] <22/02/02 18:24 +0530>:
> Apparently, the Linux glibc crypt() function is not exactly the same as
> the OpenSSL crypt() function, depending on the order in which you link
> -lcrypto and -lcrypt, you might end up with strange results.

Exactly the point I was making.  The bsd and linux crypt()s are different in
nature.

> - Linux/FreeBSD style password hashes use $1$ and an 8 char salt.
>   Depending on the salt, the Perl/PHP crypt functions hashed output will
>   change.

Yup - so when you use software which generates bsd style passwords, and try
them out on linux?

> > on linux with (say) exim on linux ... and try to verify courier
> > passwords by throwing them at crypt().
> I don't think that will work. You will have to throw in the salt part to
> the crypt function as well.

that's right ... but throw them at the LINUX crypt() I mean.

> John against Debian shadow file:
> su-2.05a# john /mnt/deb-root/etc/shadow
> Loaded 3 passwords with 2 different salts (FreeBSD MD5 [32/32])
> john against FreeBSD 4.5:
> su-2.05a# john /etc/master.passwd 
> Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/32])
> John sez that both are "FreeBSD MD5 [32/32]". Settled? :-D

Hmmm...

        -srs
-- 
Suresh Ramasubramanian  <---->  mallet <at> efn dot org
EMail Sturmbannfuhrer, Lower Middle Class Unix Sysadmin
[Linux One Stanza Tip]  From : <[EMAIL PROTECTED]>
LOST #196        -**< Sub : Command execution timing >**-
To see how long it takes a command to run, type the word 
"time" before the command name. Try: #time updatedb

_______________________________________________
linux-india-help mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/linux-india-help

Reply via email to