On Sun, 4 May 2003, Jeff Lunde wrote: >Would getting the encrypted password from the /etc/shadow be the same as >copying the encryption text from a manually created Kickstart Configuration >file (meaning a KS.cfg file from a machine I created manually, including >adding the user & password manually during the install). Yes, they would be similar (but not identical). shadow file entries beginning with $1$ indicate md5-crypted passwords (which you want), and the random salt will cause the actual stored value to change. As I've recommended before, the best way I've seen to generate cryptpw's is: $ openssl passwd -1 Password: secret! $1$ZhEKgpbS$KtmSr63TRqGQ1NcGXCaR01 Openssl only asks once, so you might want to verify the output: (notice the salt is between the second and third $ signs) $ openssl passwd -1 -salt ZhEKgpbS Password: secret! $1$ZhEKgpbS$KtmSr63TRqGQ1NcGXCaR01 Hope this helps, Phil