Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Jun 1997 09:29:29 +0200 (MET DST)
From:      Sebastian Andersson <sa@hogia.net>
To:        "Tom T. Thai" <tomthai@future.net>
Cc:        freebsd-isp@FreeBSD.ORG, linuxisp@friendly.jeffnet.org
Subject:   Re: system passwd to RADIUS
Message-ID:  <Pine.LNX.3.95.970626091712.12396A-100000@enterprise.hogia.net>
In-Reply-To: <Pine.BSD.3.91.970625184623.237A-100000@dream.future.net>

next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE-----

On Wed, 25 Jun 1997, Tom T. Thai wrote:

> Any one know how to convert a unix password file to RADIUS? I think doing 
> a few thousand by had is very tedious :< Also, anyway to decrypt the 
> password with SU access?

Some radius servers can use the encrypted password file by specifying
UNIX as the password. This prevents the users from using CHAP though.
You could start with this and as users change their passwords you store
the new password in the radius database.
Unless you use some UNIX without encryption (as my old NetBSD system on my
amiga500 ;-) it is very hard to recover the password from the passwd file
since it uses a one way hashing algorithm. The crack program can be used
to try to find passwords but it will only find bad passwords in a
reasonable time.
If your users use POP, ftp or telnet to your computer you can patch those
servers to store the username and password to a file or run a sniffer to
capture the info.

/Sebastian

See http://www.hogia.net/keys/sa-pgp.asc for public pgp key.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQCVAwUBM7IaW8Vx5kJf+XX1AQF06wP8DFOc3jdTNQxFbgjMJVv7DfjiQ7e+4WLJ
PBjf+lgz5dQS+cRy4z/gVqZuozx9sP7SuvzBbKuSFtnusxxb29xgPlITzb6TluxU
/6eMzR4aUr07CjBvDYGb1dDrGqowT+fit4O140AzitaFpTyf9OT190r/RJvo/f3h
HZKvLHxRgq4=
=FZev
-----END PGP SIGNATURE-----




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.3.95.970626091712.12396A-100000>