From owner-freebsd-security Wed Jul 7 12:53:23 1999 Delivered-To: freebsd-security@freebsd.org Received: from gratis.grondar.za (gratis.grondar.za [196.7.18.65]) by hub.freebsd.org (Postfix) with ESMTP id DF5C714C17 for ; Wed, 7 Jul 1999 12:53:10 -0700 (PDT) (envelope-from mark@grondar.za) Received: from grondar.za (localhost [127.0.0.1]) by gratis.grondar.za (8.9.3/8.9.3) with ESMTP id VAA21393; Wed, 7 Jul 1999 21:47:24 +0200 (SAST) (envelope-from mark@grondar.za) Message-Id: <199907071947.VAA21393@gratis.grondar.za> To: Kris Kennaway Cc: Peter Wemm , security@FreeBSD.ORG Subject: Re: Improved libcrypt ready for testing Date: Wed, 07 Jul 1999 21:47:22 +0200 From: Mark Murray Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org > This is worth looking at. Do the password hashes have any distinguishing > characteristics other than being 128 characters long? I'm wondering how they'd > be distinguished in the password file, unless we add a $NT$ prefix. So far, these long(er) hashes crash perl :-(. M -- Mark Murray Join the anti-SPAM movement: http://www.cauce.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message