ntop uses the standard crypt() function provided by the OS.
crypt() is required part of the single Unix specification, but the details
are implementation dependent. See:
http://www.opengroup.org/onlinepubs/007908799/xsh/crypt.html.
Never-the-less, whatever the limitations of crypt() are, that what ntop's
limits are. Unfortunately, there's no way to tell programmatically what
these limits are, you have to refer to the man page, e.g. (Fedora Core 3
Linux) - here you need to read the 4th paragraph of the DESCRIPTION clause:
CRYPT(3) Library functions
CRYPT(3)
NAME
crypt - password and data encryption
SYNOPSIS
#define _XOPEN_SOURCE
#include <unistd.h>
char *crypt(const char *key, const char *salt);
DESCRIPTION
crypt is the password encryption function. It is based on the Data
Encryption Standard algorithm with variations
intended (among other things) to discourage use of hardware
implementations of a key search.
key is a user's typed password.
salt is a two-character string chosen from the set [a-zA-Z0-9./].
This string is used to perturb the algorithm in
one of 4096 different ways.
By taking the lowest 7 bits of each of the first eight
characters of the key, a 56-bit key is obtained. This
56-bit key is used to encrypt repeatedly a constant string (usually
a string consisting of all zeros). The
returned value points to the encrypted password, a series of 13
printable ASCII characters (the first two charac-
ters represent the salt itself). The return value points to static
data whose content is overwritten by each call.
Warning: The key space consists of 2**56 equal 7.2e16 possible
values. Exhaustive searches of this key space are
possible using massively parallel computers. Software, such as
crack(1), is available which will search the por-
tion of this key space that is generally used by humans for
passwords. Hence, password selection should, at mini-
mum, avoid common words and names. The use of a passwd(1) program
that checks for crackable passwords during the
selection process is recommended.
The DES algorithm itself has a few quirks which make the use of the
crypt(3) interface a very poor choice for any-
thing other than password authentication. If you are planning on
using the crypt(3) interface for a cryptography
project, don't do it: get a good book on encryption and one of the
widely available DES libraries.
RETURN VALUE
A pointer to the encrypted password is returned. On error, NULL is
returned.
ERRORS
ENOSYS The crypt function was not implemented, probably because of
U.S.A. export restrictions.
GNU EXTENSION
The glibc2 version of this function has the following additional
features. If salt is a character string starting
with the three characters "$1$" followed by at most eight
characters, and optionally terminated by "$", then
instead of using the DES machine, the glibc crypt function uses an
MD5-based algorithm, and outputs up to 34 bytes,
namely "$1$<string>$", where "<string>" stands for the up to 8
characters following "$1$" in the salt, followed by
22 bytes chosen from the set [a-zA-Z0-9./]. The entire key is
significant here (instead of only the first 8
bytes).
Programs using this function must be linked with -lcrypt.
CONFORMING TO
SVID, X/OPEN, BSD 4.3, POSIX 1003.1-2001
SEE ALSO
login(1), passwd(1), encrypt(3), getpass(3), passwd(5)
The "GNU EXTENSION" piece implies that changing the salt ntop uses would
allow longer passwords. That's set via CONST_CRYPT_SALT in
globals-defines.h, but AFAIK this hasn't been tested.
Sounds like a good addition to the FAQ...
-----Burton
-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf
Of Alexander
Sent: Thursday, September 22, 2005 4:16 AM
To: [email protected]
Subject: [Ntop-dev] ntop checks only first eight symbols in password,the
rest is ignored
Hi!
Here is the description of the problem I'm expecting.
I'm starting ntop:
# ntop --sticky-hosts --max-table-rows=0 --create-suspicious-packets
--refresh-time=60 --http-server=0 --https-server=443 --no-fc
--no-invalid-lun --w3c
Trying to connect to https://my.ip.add.ress I'm being prompted for user and
password.
I'm entering the username, password... But everything after the eight symbol
in password is ignored!
I.E., we entering this:
user: admin
pass: password
Ntop accepts this and we are logged on.
Then we're reopening browser, trying to connect to https://my.ip.add.ress
again, and entering:
user: admin
pass: password_blablabla
And... We're logged in again!
So there only first eight symbols in password are checked. The rest is
ignored!
Tested on ntop-3.1 and ntop-3.2rc1 (cvs, 05.09.21), compiled from sources,
configured with '--prefix=/opt/ntop --enable-sslv3 --disable-ipv6' under
Mandrake Linux 10.0 (128M RAM, OpenSSL 0.9.7c 30 Sep 2003) and Slackware 9.0
(256M RAM, OpenSSL 0.9.8 05 Jul 2005).
Is this a bug? ...or a feature?
_______________________________________________
Ntop-dev mailing list
[email protected]
http://listgateway.unipi.it/mailman/listinfo/ntop-dev
_______________________________________________
Ntop-dev mailing list
[email protected]
http://listgateway.unipi.it/mailman/listinfo/ntop-dev