Date: Thu, 26 Jun 1997 09:29:29 +0200 (MET DST) From: Sebastian Andersson <sa@hogia.net> To: "Tom T. Thai" <tomthai@future.net> Cc: freebsd-isp@FreeBSD.ORG, linuxisp@friendly.jeffnet.org Subject: Re: system passwd to RADIUS Message-ID: <Pine.LNX.3.95.970626091712.12396A-100000@enterprise.hogia.net> In-Reply-To: <Pine.BSD.3.91.970625184623.237A-100000@dream.future.net>
next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE----- On Wed, 25 Jun 1997, Tom T. Thai wrote: > Any one know how to convert a unix password file to RADIUS? I think doing > a few thousand by had is very tedious :< Also, anyway to decrypt the > password with SU access? Some radius servers can use the encrypted password file by specifying UNIX as the password. This prevents the users from using CHAP though. You could start with this and as users change their passwords you store the new password in the radius database. Unless you use some UNIX without encryption (as my old NetBSD system on my amiga500 ;-) it is very hard to recover the password from the passwd file since it uses a one way hashing algorithm. The crack program can be used to try to find passwords but it will only find bad passwords in a reasonable time. If your users use POP, ftp or telnet to your computer you can patch those servers to store the username and password to a file or run a sniffer to capture the info. /Sebastian See http://www.hogia.net/keys/sa-pgp.asc for public pgp key. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBM7IaW8Vx5kJf+XX1AQF06wP8DFOc3jdTNQxFbgjMJVv7DfjiQ7e+4WLJ PBjf+lgz5dQS+cRy4z/gVqZuozx9sP7SuvzBbKuSFtnusxxb29xgPlITzb6TluxU /6eMzR4aUr07CjBvDYGb1dDrGqowT+fit4O140AzitaFpTyf9OT190r/RJvo/f3h HZKvLHxRgq4= =FZev -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.3.95.970626091712.12396A-100000>