On Sun, Feb 22, 2015 at 5:01 PM, Alex Regan <mysqlstud...@gmail.com> wrote:
> Do you happen to know if there's a pre-built version of John-the-Ripper or
> another password testing program that's available and works with these new
> passwords?

I don't know that this is all that new. It's also self-describing, the
/etc/shadow entry contains the 8 or 16 character salt, so whatever's
doing the password+salt+SHA512rounds work knows from /etc/shadow what
to do. And if rounds= is used in /etc/pam.d/passwd, the next time you
use passwd, it writes out $rounds=x$ in the 2nd field in /etc/shadow,
so that too is self describing. I'd expect that jtr can directly parse
these variants in /etc/passwd, but I haven't tested it.

-- 
Chris Murphy
-- 
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org

Reply via email to