AUTHPASSWD(1) Double Precision, Inc. AUTHPASSWD(1)NAME
authpasswd - Generate login passwords
SYNOPSIS
authpasswd [method]
DESCRIPTION
authpasswd is a helper utility that generates encrypted passwords for the Courier authentication library. The Courier authentication
library is capable of using several different encryption methods for storing passwords. authpasswd issues a password prompt. Enter the
same password twice (for verification purposes). authpasswd computes and prints the encrypted password. The encrypted password can be
inserted verbatim into the appropriate account record that's processed by the authentication library's authmysql, authpgsql, or authldap
module.
method may be set to one of the following literals:
crypt
Use the traditional DES-based encrypted password.
md5
Compute a base64-encoded MD5 password hash.
md5raw
Compute a hexadecimal-encoded MD5 password hash.
sha1
Compute a SHA1 password hash.
ssha
Compute a salted SHA1 password hash.
sha256
Compute a SHA256 password hash.
If not specified, method defaults to the modified-MD5 password encryption algorithm that's used in Linux (note that this is different from
the "md5" password hash method).
Double Precision, Inc. 12/06/2008 AUTHPASSWD(1)
Check Out this Related Man Page
RADCRYPT(8) System Manager's Manual RADCRYPT(8)NAME
radcrypt - generate password hash for use with radius, or validates a password hash
SYNOPSIS
radcrypt [-d|--des] [-m|--md5] [-c|--check] plaintext_password [hashed_password]
DESCRIPTION
radcrypt generates a hashed digest of a plaintext password, or can validate if a password hash matches a plaintext password. DES and MD5
hashes are currently supported. When generating a password hash a random salt is generated and applied.
A hashed password can be validated by specifying -c or --check and passing hashed_password after plaintext_password on the command line.
In this case hashed_password will be checked to see if it matches plaintext_password. If so "Password OK" will be printed and the exit sta-
tus will be 1, otherwise "Password BAD" will be printed and exit status will be 0 (Note this is the opposite of a normal successful shell
status).
OPTIONS -d --des
Use a DES (Data Encryption Standard) hash (default). Ignored if performing a password check.
-m --md5
Use a MD5 (Message Digest 5) hash. Ignored if performing a password check.
-c --check
Perform a validation check on a password hash to verify if it matches the plantext password.
EXAMPLES
$ radcrypt foobar
HaX0xn7Qy650Q
$ radcrypt -c foobar HaX0xn7Qy650Q
Password OK
SEE ALSO radiusd(8), crypt(3)AUTHORS
Miquel van Smoorenburg <miquels@cistron-office.nl>
RADCRYPT(8)
Hi,
I am trying to ssh between two differnt versions on solaris boxes.
The src box has the SSH Secure Shell 3.1.0 on sparc-sun-solaris2.6 and destination has SSH Version Sun_SSH_1.0, protocol versions 1.5/2.0.
I am not trying for passwordless connection. I just want to get it working with a... (3 Replies)
Hi Can anyone help resolving the issue here?
I am trying to connect from one unix server(ssh2) to another unix server using (Openssh).
I converted the public key from ssh2 to openssh format and uploaded it. Yet it is asking for a password to connect.
Here is the debug info:
... (0 Replies)
Hello,
We have an issue attempting to login from a Unix Solaris to an NT server using key authentication. I will attempt to provide you with as much of the relevant information regarding the way the system is set up, although I'm workingin solely on the Unix side, so don't have full access to... (3 Replies)