Sam, Do you mean system users passwords in /etc/shadow ?
Nick 2009/9/21 Sam <[email protected]>: > > We were using Red hat and then migrated to the cloud servers on > Ubuntu. > > The current Red Hat implementation of the password encryption uses > the > crypt() method with a generated salt. On the Red Hat server the method > uses the md5 algorithm to generate > passwords and the constant values are: > CRYPT_SALT_LENGTH - 12 > CRYPT_STD_DES - 1 > CRYPT_EXT_DES - 0 > CRYPT_MD5 - 1 > CRYPT_BLOWFISH - 0 > > For example, the generated password of the string 'admin' was > $1$BOqLtPNm$CnzfaoymJGNvotH7ZPoqB/ - all hash values begin $1$, then > 8 > characters, then a $ sign. > > On the Ubuntu setup, it seems that the Standard DES algorithm is > always used. > > Any ideas how to force the use of md5? In theory this is based on > the > length of the supplied salt, but it doesn't seem to work. > > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "scalr-discuss" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/scalr-discuss?hl=en -~----------~----~----~----~------~----~------~--~---
