Hello Chris
----- Original Message -----
From: "Chris Davies" <ch...@roaima.co.uk>
To: <debian-user@lists.debian.org>
Sent: Monday, May 27, 2013 2:54 PM
Subject: Re: /etc/shadow password hash format (migration from SuSE 9.3 to
Debian Wheezy)
man 3 crypt contains a NOTES section that identifies the ID and describes
its format. Specifically, $6$salt$encrypted is SHA-512.
Thanks for the hint. Already done:
ID | Method
---------------------------------------------------------
1 | MD5
2a | Blowfish (not in mainline glibc; added in some
| Linux distributions)
5 | SHA-256 (since glibc 2.7)
6 | SHA-512 (since glibc 2.7)
So this lights out the situation: While SuSE 9.3 used Blowfish as extended
password encryption method, Debian Wheezy uses SHA-512 for that. A short
view inside older Linux boxes: Squeeze also uses SHA-512, and Lenny uses MD5
according this table.
A "apt-cache search blowfish" shows me a lot of Blowfish related packages.
So is there one on it which extends the login authentication routine also to
process Blowfish hashes in /etc/shadow or is that a much more complicate
procedure (compiling a new kernel for example)?
Andreas
--
Teste die PC-Sicherheit mit www.sec-check.net
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/f1a5ebde1a764a27949818853efe8...@meilebiz.loc