hey all... sorry about that, it's a reply to a post at hlfs-dev. funny
though, it deals with applying blowfish to shadow-4.0.13, so check it
out if you like:
http://linuxfromscratch.org/pipermail/hlfs-dev/2005-October/002484.html
~ brad.
from how the code is structured, blowfish should be default after the
compile. just run passwd(1) so your shadow file will then be
blowfish-encrypted. (pretty sure you don't want to try to
authenticate an MD5 password with Blowfish.) ;-)
enjoy yourself,
~ brad.
On 10/27/05, Kevin Day <msu-kday@xxxxxxxxxxxxxxxxxxx> wrote:
Sorry if I was supposed to go through some patch certification channel or
something official like that, but I got carried away. Have at.
I have been wondering the same thing myself..
Anyway, is there anything else that need be done after this is installed.
According to the hint, multiple formats are supported, including Md5. Do you
know of anyway to maintain who gets what and how? (I am assuming blowfish gets
applied into /etc/shadow passwords by default)
--
--
http://linuxfromscratch.org/mailman/listinfo/hlfs-dev
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page
-
Linux-crypto: cryptography in and on the Linux system
Archive: http://mail.nl.linux.org/linux-crypto/