Re: Two Questions I Need Answered Please.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Scott@Charter wrote:

> In the /etc/shadow file how is the password
> "$1$shGNybY9$L)J1gwitzN6LoeS0pMpNc/" encrypted?

Passwords aren't encrypted, but hashed. The distinction is that there
isn't any way to decrypt the data in the shadow file to obtain the
actual password. The password which is entered by the user is
concatenated with the salt and the result is then hashed. The hash is
compared against the one from the shadow (or passwd) file.

In the above, "$1$" indicates that the entry is hashed using MD5 (as
opposed to the traditional DES hash), "shGNybY9" is the salt, and
"L)J1gwitzN6LoeS0pMpNc/" is the base64-encoded hash (an MD5 hash is a
128-bit value).

Although, the glibc documentation (which concurs with my /etc/shadow
file) says that the base64 encoding uses A-Z, a-z, 0-9 plus "/"
(slash) and "." (period); no mention of ")".

> In the /etc/shadow file how is the password "!za1aId0hfZ2IA" encrypted and
> what significance does this password hold?

That is a DES hashed password, where "za" is the salt and
"1aId0hfZ2IA" is the base64-encoded DES hash (DES hashes are 64 bits,
although only 56 bits are significant). The leading "!" indicates that
the account is locked (it also ensures that any attempt to validate a
password will fail, regardless of the actual password which is
entered).

-- 
Glynn Clements <glynn.clements@xxxxxxxxxx>
-
: send the line "unsubscribe linux-admin" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Newbie]     [Audio]     [Hams]     [Kernel Newbies]     [Util Linux NG]     [Security]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Device Drivers]     [Samba]     [Video 4 Linux]     [Git]     [Fedora Users]

  Powered by Linux