03-10-2009
Quote:
Originally Posted by
avklinux
[...]How can i identify the hashing algo used by shadow file in aix box >???[...]
Help -
Quote:
The standard AIX® authentication mechanism uses a one-way hash function called crypt to authenticate users. The crypt function is a modified DES algorithm. It performs a one-way encryption of a fixed data array with the supplied password and a Salt.[...]
From AIX 6.1 on a loadable password algorithm is supported. It allows for different algorithms to be used.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I have been asked to look at an AIX box that the owner (not a technical person) installed a new SCSI disk into, but cannot figure out how to build volumes or file systems on. It has been years since I messed with AIX, and I remember enough to know that it isn't like Solaris.
To make things... (1 Reply)
Discussion started by: 98_1LE
1 Replies
2. IP Networking
Hi,
I was wondering if any body out there can tell me how can I find out what is the name of the mail host on the AIX box that I am working on?
Is there any command to bring up the configuration for the mail server or mail host?
Thanks in advance. (4 Replies)
Discussion started by: Shaz
4 Replies
3. AIX
i want to move my AIX os ver 4.2.1 to a new version IBM system. how can i acheive this. (1 Reply)
Discussion started by: gmonix
1 Replies
4. Shell Programming and Scripting
I am trying to find the total CPU usage on an IBM AIX machine that could have several processors. I am using
ps uax | awk {'print $3'} to find the CPU usage columns for the processes and then adding them up to find the total CPU usage. It was doing fine. However to my surprise, I find that the... (2 Replies)
Discussion started by: asutoshch
2 Replies
5. UNIX for Dummies Questions & Answers
Hi,
I need a clarification.
Is there any difference between AIX box and Sun Solaris box?
The bzip command with -c option works in AIX box and the same does not work in Sun Solaris box.
Can anyone please explain if there is an implementation difference in both these boxes for the shell... (1 Reply)
Discussion started by: nisha4680
1 Replies
6. Linux
Hi,
How to find remote Linux box login account without login in to that box?
I don't have login account at my remote Linux box. But I need who are all having login account. How do I findout?
Thanks,
--Muthu. (3 Replies)
Discussion started by: Muthuselvan
3 Replies
7. AIX
Quick backgound. We just moved the Datacenter. I attempted to boot one of our older AIX machines backup and it stops at a 518 Error code. Which is fine I need to run fsck on the volumes. The issue is I can't find the original media with the appropriate Date that was originally installed(previous... (1 Reply)
Discussion started by: jcompguru
1 Replies
8. AIX
Hi
When I run cfgmgr -v in my aix box I get the below error :
cfgmgr: 0514-621 WARNING: The following device packages are required for
device support but are not currently installed.
devices.loopback
My oslevel is 6100-06-02-1044
Please assist.
Please use and tags when... (3 Replies)
Discussion started by: samsungsamsung
3 Replies
9. Cybersecurity
Guys, i want to securing AIX after install by scrath. Is anybody can inform about the standard port which used by AIX? (0 Replies)
Discussion started by: michlix
0 Replies
10. AIX
Hi guys...
I have got a old Aix box i.e. 7043 - 150 for home experimenting purposes. I am having some issues to setup the tcpip on it correctly, so that i can access it within the network and also from outside i.e. work.
My setup looks like this:
Modem ----> Apple airport wireless router... (2 Replies)
Discussion started by: uzair_rock
2 Replies
crypt(3C) crypt(3C)
NAME
crypt - generate hashing encryption
SYNOPSIS
Obsolescent Interfaces
DESCRIPTION
crypt():
is the password encryption function. It is based on a one way hashing encryption algorithm with variations intended (among other things)
to frustrate use of hardware implementations of a key search.
key is a user's typed password. salt is a two-character string chosen from the set this string is used to perturb the hashing algorithm in
one of 4096 different ways, after which the password is used as the key to encrypt repeatedly a constant string. The returned value points
to the encrypted password. The first two characters are the salt itself.
Obsolescent Interfaces
generate hashing encryption.
WARNINGS
The return value for points to data whose content is overwritten by each call.
and are obsolescent interfaces supported only for compatibility with existing DCE applications. New multithreaded applications should use
SEE ALSO
crypt(1), login(1), passwd(1), getpass(3C), passwd(4), thread_safety(5).
STANDARDS CONFORMANCE
crypt(3C)