On Wed, Apr 06, 2011 at 10:40:58PM -0500, Boyd Stephen Smith Jr. wrote:
> In <4d9d1b22.2010...@cox.net>, Ron Johnson wrote:
> >On 04/06/2011 08:19 PM, Aaron Toponce wrote:
> >> First, if you don't have the salt, but you do have the hash, then a
> >> rainbow table attack is completely pointless.
> >
> >The OS must store the salt somewhere, in order to correctly authenticate
> >the user when he logs in.  But I've never heard of /etc/hashsalt so what
> >am I misunderstanding?
> 
> The value stored in /etc/shadow is both the salt + the encrypted 
> salt+password.  This allows a process with read access to /etc/shadow to 
> easily read the shadow, encrypt the salt + provided password, and compare the 
> result to the encrypted salt+password.  The salt is randomly generated each 
> time the password is set, and it (usually) different for each entry in 
> /etc/shadow.

So is the salt a fixed number of characters? 

Otherwise, how would a process know which portion of the
string is the salt?

Regards,

-- 
Joel Roth


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110407043738.GA23159@sprite

Reply via email to