From owner-freebsd-security Tue Sep 19 19:40:09 1995 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.6.12/8.6.6) id TAA12730 for security-outgoing; Tue, 19 Sep 1995 19:40:09 -0700 Received: from palmer.demon.co.uk (palmer.demon.co.uk [158.152.50.150]) by freefall.freebsd.org (8.6.12/8.6.6) with ESMTP id TAA12707 for ; Tue, 19 Sep 1995 19:39:55 -0700 Received: from localhost (localhost [127.0.0.1]) by palmer.demon.co.uk (8.6.11/8.6.11) with SMTP id DAA01450 ; Wed, 20 Sep 1995 03:38:25 +0100 To: Clary Harridge cc: freebsd-security@freebsd.org Subject: Re: crack for freebsd In-reply-to: Your message of "Wed, 20 Sep 1995 12:04:47 +1000." <199509200204.MAA09083@s4.elec.uq.edu.au> Date: Wed, 20 Sep 1995 03:38:20 +0100 Message-ID: <1448.811564700@palmer.demon.co.uk> From: Gary Palmer Sender: owner-security@freebsd.org Precedence: bulk In message <199509200204.MAA09083@s4.elec.uq.edu.au>, Clary Harridge writes: >Is there a version of crack somewhere which knows how to handle the >current FreeBSD encryption algorithms. You mean the MD5 system that comes in the base installation? Not that I know of. Best way to check for weak user passwords is to use something like `npasswd', which runs the password through a dictionary scan before it allows them to set it... Gary