From owner-freebsd-security Sat Feb 15 15:05:43 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id PAA21567 for security-outgoing; Sat, 15 Feb 1997 15:05:43 -0800 (PST) Received: from narcissus.ml.org (root@brosenga.Pitzer.edu [134.173.120.201]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id PAA21540 for ; Sat, 15 Feb 1997 15:05:36 -0800 (PST) Received: (from ben@localhost) by narcissus.ml.org (8.7.5/8.7.3) id PAA11778; Sat, 15 Feb 1997 15:05:28 -0800 (PST) Date: Sat, 15 Feb 1997 15:05:28 -0800 (PST) From: Snob Art Genre To: Poul-Henning Kamp cc: security@FreeBSD.ORG Subject: Re: changing password... In-Reply-To: <14512.856047887@critter.dk.tfs.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Sun, 16 Feb 1997, Poul-Henning Kamp wrote: > In message , Snob Art Genre writes: > >On Sat, 15 Feb 1997, Poul-Henning Kamp wrote: > > > >> > >> Why don't we have an option for /usr/bin/passwd to input a precoded > >> password ? > >> > >> $ passwd -c phk > >> Please enter encrypted password: $1$8cEEj84y$GCYmM39miP8Fc9K8iAHTI/ > >> Please reenter: $1$8cEEj84y$GCYmM39miP8Fc9K8iAHTI/ > >> $ > >> > >> I know that this is a good way to hose yourself, but it would also > >> have some useful features I think. > >> > >> Comments ? > > > >Well, root can already do it with vipw, and why would anyone else need to? > > Across an unsecure network it beats typing your password in cleartext... Ah, that's very clever. How do you hash it in a way that the password file would like? Is it just a matter of running the password through md5 and prepending "$1$"? > -- > Poul-Henning Kamp | phk@FreeBSD.ORG FreeBSD Core-team. > http://www.freebsd.org/~phk | phk@login.dknet.dk Private mailbox. > whois: [PHK] | phk@tfs.com TRW Financial Systems, Inc. > Power and ignorance is a disgusting cocktail. > Ben "You have your mind on computers, it seems."