From owner-freebsd-hackers Sun Jan 31 18:20:53 1999 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id SAA03506 for freebsd-hackers-outgoing; Sun, 31 Jan 1999 18:20:53 -0800 (PST) (envelope-from owner-freebsd-hackers@FreeBSD.ORG) Received: from rs5s2.datacenter.cha.cantv.net (rs5s2.datacenter.cha.cantv.net [200.44.32.55]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id SAA03494 for ; Sun, 31 Jan 1999 18:20:49 -0800 (PST) (envelope-from lem@cantv.net) Received: from cantv.net (tc1r9-308.ras.cha.cantv.net [200.44.7.52]) by rs5s2.datacenter.cha.cantv.net (8.9.1a/8.9.1/1.0) with ESMTP id WAA02058; Sun, 31 Jan 1999 22:20:27 -0400 (VET) Message-ID: <36B50F0E.9A921B32@cantv.net> Date: Sun, 31 Jan 1999 22:18:54 -0400 From: "Luis Muņoz" Reply-To: lem@cantv.net Organization: CANTV Servicios X-Mailer: Mozilla 4.07 [en] (X11; I; FreeBSD 3.0-RELEASE i386) MIME-Version: 1.0 To: Marc Slemko CC: hackers@FreeBSD.ORG Subject: Re: "$1$" crypt() algorithm References: Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Marc Slemko wrote: > > Does anyone know if there are any other OS'es that use a "$1$" identifier > for crypt()ed passwords but do not use the same md5 algorithm that FreeBSD > does? I wrote a perl module to handle this kind of encryption model on various machines. I know of people working on linux, alpha, sun and others with it sharing password files from other systems (probably linux and FreeBSD). In all of them it works, which means it is the same algorithm. I'll be very interested to know if you find any positives. Regards, -lem To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message