05-25-2009
Not quite. In Unices, passwords are protected by hashing them, which means that they are sent through a cryptographic function which is (allegedly) impossible to revert. The salt has 2 functions in this:
- increase the time needed to brute-force the passwords (for each password there are 4096 different hashes (traditional crypt)
- avoid collisions if 2 users use the same password
Since the introduction of shadowed passwords and the MD5 scheme, the salt is 8 bytes large, with variable sized passwords, which makes it very infeasible to brute-force them. Newer implementations using the SHA1 family or Blowfish are even harder.
And any password is crackable given enough computing power and time... or social engineering.
10 More Discussions You Might Find Interesting
1. Programming
Hi!!,
could someone tell me how to increase the stack size in HP-UX?
Thanx (7 Replies)
Discussion started by: jyotipg
7 Replies
2. UNIX for Dummies Questions & Answers
My /tmp is full, and the oracle installation is crashing. How can I increase the size of /tmp, even though I have allocated all the available disk space to other partitions? (2 Replies)
Discussion started by: pkappaz
2 Replies
3. HP-UX
Hi All,
one of the mount point in Hp ux server has reached 95%
its a data base file and can not be deleted.
so i want to know how to increase the size of mount point
i am new to unix ,please help me (1 Reply)
Discussion started by: jyoti
1 Replies
4. Solaris
Hi all,
I have a 130gb HDD of which 95b is taken up by various partitions of windows xp...
I partitioned my HDD and gave solaris 10gb of space, but now owing to some development stuff i need to increase the space!!!
How do i do it!!
Please note that i do have ~20gb of space left still...... (2 Replies)
Discussion started by: wrapster
2 Replies
5. UNIX for Dummies Questions & Answers
Hi..
I want to increase the file system size of any filesystem online, without using the Volume manager like LVMs, is it possible? & if yes then how? (3 Replies)
Discussion started by: Amol21
3 Replies
6. UNIX for Dummies Questions & Answers
Hi All,
Could anybody tell me how to increase/decrease a process size in UNIX HP machine ? Whether the process size limitation will cause core dump ?
Thanks,
Rohit.. (1 Reply)
Discussion started by: ronix007
1 Replies
7. Solaris
Dear all,
I am very new to solaris,
I have installed solaris 10,
i tried installing few softwares into file system, unfortunately system failed to install stating "No space left on device "
i searched few threads and it says, we have to increase root size. where my root size is... (2 Replies)
Discussion started by: radhnki
2 Replies
8. Solaris
Hi,
I am having two metadevices d50 and d100 which are used to created soft partitions as and when required.
d50 and d100 are metadevices formed on different disks.
d50 -- disks 0 & 1
d100 -- disks 2 & 3
I have a soft partition d70 os 50 GB on d50. Now there is no free space on d50.
... (1 Reply)
Discussion started by: sag71155
1 Replies
9. UNIX for Dummies Questions & Answers
hi guys
I am working on my vmware workstation.
I have a /dev/sdb which is 5GB. I am using LVM.
Now I increase /dev/sdb 2 more GB.
fdisk -l shows 7 GB but pvscan still shows 5GB.
how do I make my system recognize the new 7GB added and be able to add those to my physical volumen and... (1 Reply)
Discussion started by: kopper
1 Replies
10. What is on Your Mind?
Any suggestions on how to increase the number of posters and contributors? Please vote and write in your suggestions.
Thank you! (72 Replies)
Discussion started by: Neo
72 Replies
LEARN ABOUT SUSE
crypt_sunmd5
crypt_sunmd5(5) Standards, Environments, and Macros crypt_sunmd5(5)
NAME
crypt_sunmd5 - password hashing module using MD5 message hash algorithm
SYNOPSIS
/usr/lib/security/$ISA/crypt_sunmd5.so
DESCRIPTION
The crypt_sunmd5 module is a one-way password hashing module for use with crypt(3C) that uses the MD5 message hash algorithm. The algorithm
identifier for crypt.conf(4) and policy.conf(4) is md5.
This module is designed to make it difficult to crack passwords that use brute force attacks based on high speed MD5 implementations that
use code inlining, unrolled loops, and table lookup.
The maximum password length for crypt_sunmd5 is 255 characters.
The following options can be passed to the module by means of crypt.conf(4):
rounds=<positive_number>
Specifies the number of additional rounds of MD5 to use in generation of the salt; the default number of rounds is 4096. Negative val-
ues have no effect and are ignored, that is, the number of rounds cannot be lowered below 4096.
The number of additional rounds is stored in the salt string returned by crypt_gensalt(3C). For example:
$md5,rounds=1000$nlxmTTpz$
When crypt_gensalt(3C) is being used to generate a new salt, if the number of additional rounds configured in crypt.conf(4) is greater
than that in the old salt, the value from crypt.conf(4) is used instead. This allows for migration to stronger (but more time-consum-
ing) salts on password change.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|MT-Level |Safe |
+-----------------------------+-----------------------------+
SEE ALSO
passwd(1), crypt(3C), crypt_genhash_impl(3C), crypt_gensalt(3C), crypt_gensalt_impl(3C), getpassphrase(3C), crypt.conf(4), passwd(4), pol-
icy.conf(4), attributes(5)
SunOS 5.10 23 Dec 2003 crypt_sunmd5(5)