From owner-freebsd-security Tue Sep 19 22:56:25 1995 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.6.12/8.6.6) id WAA18551 for security-outgoing; Tue, 19 Sep 1995 22:56:25 -0700 Received: from grunt.grondar.za (grunt.grondar.za [196.7.18.129]) by freefall.freebsd.org (8.6.12/8.6.6) with ESMTP id WAA18524 for ; Tue, 19 Sep 1995 22:56:10 -0700 Received: from grumble.grondar.za (grumble.grondar.za [196.7.18.130]) by grunt.grondar.za (8.6.12/8.6.9) with ESMTP id HAA00948; Wed, 20 Sep 1995 07:55:41 +0200 Received: from localhost (localhost [127.0.0.1]) by grumble.grondar.za (8.6.12/8.6.9) with SMTP id HAA03406; Wed, 20 Sep 1995 07:55:38 +0200 Message-Id: <199509200555.HAA03406@grumble.grondar.za> X-Authentication-Warning: grumble.grondar.za: Host localhost didn't use HELO protocol To: Clary Harridge cc: freebsd-security@FreeBSD.org Subject: Re: crack for freebsd Date: Wed, 20 Sep 1995 07:55:38 +0200 From: Mark Murray Sender: owner-security@FreeBSD.org Precedence: bulk > Hi > can someone please tell me -- > > Is there a version of crack somewhere which knows how to handle the > current FreeBSD encryption algorithms. > > I would like to be able to check for dumb user passwords. Any version of crack will work, as long as you link against FreeBSD's -lcrypt. This libriary is a link to the current encryption scheme, so upgrading libcrypt MD5 -> DES will be transparent to all apps (including crack). M -- Mark Murray 46 Harvey Rd, Claremont, Cape Town 7700, South Africa +27 21 61-3768 GMT+0200 Finger mark@grumble.grondar.za for PGP key