Sam,

Do you mean system users passwords in /etc/shadow ?

Nick

2009/9/21 Sam <[email protected]>:
>
> We were using Red hat and then migrated to the cloud servers on
> Ubuntu.
>
> The current Red Hat implementation of the password encryption uses
> the
> crypt() method with a generated salt. On the Red Hat server the method
> uses the md5 algorithm to generate
> passwords and the constant values are:
> CRYPT_SALT_LENGTH - 12
> CRYPT_STD_DES - 1
> CRYPT_EXT_DES - 0
> CRYPT_MD5 - 1
> CRYPT_BLOWFISH - 0
>
> For example, the generated password of the string 'admin' was
> $1$BOqLtPNm$CnzfaoymJGNvotH7ZPoqB/ - all hash values begin $1$, then
> 8
> characters, then a $ sign.
>
> On the Ubuntu setup, it seems that the Standard DES algorithm is
> always used.
>
> Any ideas how to force the use of md5? In theory this is based on
> the
> length of the supplied salt, but it doesn't seem to work.
>
> >
>

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"scalr-discuss" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to 
[email protected]
For more options, visit this group at 
http://groups.google.com/group/scalr-discuss?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to