Date: Tue, 2 Oct 2001 13:10:24 +0100 From: Ceri <ceri@techsupport.co.uk> To: questions@FreeBSD.org Subject: Re: shadow passwords Message-ID: <20011002131024.C5144@cartman.private.techsupport.co.uk> In-Reply-To: <20011002010738.J304@blossom.cjclark.org>; from cristjc@earthlink.net on Tue, Oct 02, 2001 at 01:07:38AM -0700 References: <20011001232941.5db52eb7.nmace85@yahoo.com> <20011002153410.A92785@jonc.itouch> <20011002000339.3417c5d7.nmace85@yahoo.com> <20011002010738.J304@blossom.cjclark.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, Oct 02, 2001 at 01:07:38AM -0700, Crist J. Clark said: > > The limitation of DES is the eight-character limit. If you are using > eight characters or less, there is really no difference whether you > use DES or MD5. The methodology to crack either would be identical and > the differences in computation time would not really be important. Note that Blowfish is also available (although I have no idea when it became so). > > also i read in the handbook how you can tell...the MD5 entries have a > > $1$ in them...my root passwd has it but my user account doesn't...whats > > up with that? > > I recall that there once was a bug that caused this (was it never > fixed?), but it can also result from pilot error. Change your user password with passwd, and it'll get updated. Ceri -- "Ummm, excuse me. I think the network's down...?" "A communications disruption can only mean one thing... Invasion." --Lee Maguire, SDM To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011002131024.C5144>