Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 7 Jul 1999 09:08:32 +0930 (CST)
From:      Kris Kennaway <kkennawa@physics.adelaide.edu.au>
To:        Peter Wemm <peter@netplex.com.au>
Cc:        security@freebsd.org
Subject:   Re: Improved libcrypt ready for testing 
Message-ID:  <Pine.OSF.4.10.9907070905210.30995-100000@bragg>
In-Reply-To: <19990706175814.3A9CE78@overcee.netplex.com.au>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 7 Jul 1999, Peter Wemm wrote:

> Say... you wouldn't like to impliment an NT-style password hash, would you?
> *NOT* the LAN-Manager (LAN-damager?) hash with the 2 chunks of 7 characters
> weak method that gets decoded in what seems like seconds according to
> bugtraq.  The NT hash is 128 character etc.  It's also unicode and not case
> sensitive, but that shouldn't be a problem to implement.

This is worth looking at. Do the password hashes have any distinguishing
characteristics other than being 128 characters long? I'm wondering how they'd
be distinguished in the password file, unless we add a $NT$ prefix.

Kris

-----
"Never criticize anybody until you have walked a mile in their shoes,
because by that time you will be a mile away and have their shoes."
    -- Unknown



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.OSF.4.10.9907070905210.30995-100000>