Dotan Shavit wrote:
Please note that passwords are not transferred automatically from /etc/passwd
to the new /etc/samba/smbpasswd file. After running mksmbpasswd all accounts
are disabled so the system administrator must run smbpasswd for each account
that needs to be enable.
I'll expand on that. The passwords on both Linux/Unix and on Windows are
stored "encrypted". The reason I am using the quotes is that the
technical term is not really encryption (a reversible operation given
the right key), but rather cryptographic hashing, or one way function.
Given a password, it is easy to calculate its hash (and thus, find out
whether it is the same password as was given the last time), but given
just the hash it is not possible to figure out the actual password.
Now here's the catch - /etc/shadow and smb use a different hash function
for storing passwords. In other words, the same password entered as both
a Unix password and a Samba password will end up generating different
hashed values.
What Josh was asking for is, therefor, impossible. Writing such a tool
would entail reversing the Unix password hash, which is something we
would like to think is not possible.
Shachar
=================================================================
To unsubscribe, send mail to linux-il-requ...@cs.huji.ac.il with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail linux-il-requ...@cs.huji.ac.il