Date: Wed, 7 Jul 1999 09:08:32 +0930 (CST) From: Kris Kennaway <kkennawa@physics.adelaide.edu.au> To: Peter Wemm <peter@netplex.com.au> Cc: security@freebsd.org Subject: Re: Improved libcrypt ready for testing Message-ID: <Pine.OSF.4.10.9907070905210.30995-100000@bragg> In-Reply-To: <19990706175814.3A9CE78@overcee.netplex.com.au>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 7 Jul 1999, Peter Wemm wrote: > Say... you wouldn't like to impliment an NT-style password hash, would you? > *NOT* the LAN-Manager (LAN-damager?) hash with the 2 chunks of 7 characters > weak method that gets decoded in what seems like seconds according to > bugtraq. The NT hash is 128 character etc. It's also unicode and not case > sensitive, but that shouldn't be a problem to implement. This is worth looking at. Do the password hashes have any distinguishing characteristics other than being 128 characters long? I'm wondering how they'd be distinguished in the password file, unless we add a $NT$ prefix. Kris ----- "Never criticize anybody until you have walked a mile in their shoes, because by that time you will be a mile away and have their shoes." -- Unknown To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.OSF.4.10.9907070905210.30995-100000>