From owner-freebsd-questions Tue Feb 20 15:54:48 1996 Return-Path: owner-questions Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id PAA16197 for questions-outgoing; Tue, 20 Feb 1996 15:54:48 -0800 (PST) Received: from baygull.rtd.com (baygull.rtd.com [198.102.68.5]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id PAA16180 for ; Tue, 20 Feb 1996 15:54:43 -0800 (PST) Received: (from news@localhost) by baygull.rtd.com (8.6.9/8.6.9.1) id QAA02352; Tue, 20 Feb 1996 16:54:28 -0700 To: questions@freebsd.org Path: freefall.freebsd.org!owner-freebsd-questions From: rich@goliath.spirit.net.au (Rich Siggs) Newsgroups: rtd.freebsd.questions Subject: Re: Q: exportable DES library ... Date: Wed, 21 Feb 1996 09:43:29 +1100 (EST) Lines: 27 Message-ID: <199602202243.JAA04935@goliath.spirit.net.au> NNTP-Posting-Host: seagull.rtd.com Sender: owner-questions@freebsd.org Precedence: bulk 'morning Jordan, > The default password "encryption" with 1.x > was a simple scrambler and about as difficult to break as a Captain > Midnight decoder ring, fresh from a box of cereal. Cute - yet more motivation to solve this.. :/ > That might actually work to your advantage, however. Nate - what was > the algorithm you used? I don't have any 1.x sources around to check. From the 1.1 srcdist I've got, it appears that 1.1 libcrypt sources call MD5 routines, yet there are references to the need for DES routines in the libc crypt.. Confusion reigns, could someone help me identify the actual default/original passwd encryption routines used by 1.1.5.1-RELEASE, with what src distrib they're in, etc? > It may well be that you can write a perl script to descramble the > puppies and then re-DES or MD5 encrypt them. Now _that_ would be fantastic! If such a script already exists, then I'm sure there's more than myself who could use it. But if not, then the info above will help me track down the actual routines & I'll see what reverse engineering can be done to unscramble these puppies ;) Thanks, Rich.