06-22-2011
Very minor addition:
Solaris 10:
etc/security/crypt.conf can have:
1 crypt_bsdmd5.so.1 crypt_bsdmd5 compatible with md5crypt on BSD and Linux systems.
2a crypt_bsdbf.so.1 blowfish
md5 crypt_sunmd5.so.1 MD5 variant
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
how can one find that which encryption algorithm the system is using for keeping the user password in the /etc/passwd or /etc/shadow file.
Is it
1: Hashing ( which considers only first 5 letters of password)
2: MD5 (Which allows arbitry length passwords)
Thanks,
~amit (0 Replies)
Discussion started by: amit4g
0 Replies
2. Shell Programming and Scripting
So I have two files that I want to put together via hashes and am having a terrible time with syntax. For example:
File1
A apple
B banana
C citrusFile2
A red
B yellow
C orangeWhat I want to enter on the command line is:
program.pl File1 File2And have the result... (11 Replies)
Discussion started by: silkiechicken
11 Replies
3. AIX
hello Friends ,
How can i identify the hashing algo used by shadow file in aix box >???
Thanks
AVKlinux (1 Reply)
Discussion started by: avklinux
1 Replies
4. UNIX for Dummies Questions & Answers
What command should I use to analyze file hashing of fixed flat files.
How much work does it take for multiple flat files. (3 Replies)
Discussion started by: jbjoat
3 Replies
5. UNIX for Dummies Questions & Answers
I am looking for a utility that does file hashing in unix. ...Please let me know of any good easy to use utility (3 Replies)
Discussion started by: jbjoat
3 Replies
6. Programming
Hi,
I'm looking for linear hashing implementation in C language. Please help.
PS: I have implement this on Ubuntu 10.04 Linux on 64 bit machine. (1 Reply)
Discussion started by: sajjar
1 Replies
7. Solaris
Hello,
I'm having an issue with my password hashing. In /etc/shadow all the passwords hashes start with $1$. The security people want me to change it so the password hash starts with $5$ or $6$. So this is what I did to fix this.
I changed CRYPT_DEFAULT for 1 to 6
CRYPT_DEFAULT=6When I create a... (0 Replies)
Discussion started by: bitlord
0 Replies
8. Shell Programming and Scripting
So, I am writing a script that will read output from Bulk Extractor (which gathers data based on regular expressions). My script then reads the column that has the URL found, hashes it with MD5, then outputs the URL and hash to a file.
Where I am stuck on is that I want to read the bulk... (7 Replies)
Discussion started by: twjolson
7 Replies
9. Solaris
Hi,
Our security audit person generated a report for Solaris-10 servers and mentioned this suggestion - "All passwords should be hashed using bcrypt. Solaris 10 supports this blowfish-based hash algorithm with the identifier 2a. To verify this, ensure the password hashes start with $2a$.... (2 Replies)
Discussion started by: solaris_1977
2 Replies
LEARN ABOUT OPENSOLARIS
crypt.conf
crypt.conf(4) File Formats crypt.conf(4)
NAME
crypt.conf - configuration file for pluggable crypt modules
SYNOPSIS
/etc/security/crypt.conf
DESCRIPTION
crypt.conf is the configuration file for the pluggable crypt architecture. Each crypt module must provide a function to generate a pass-
word hash, crypt_genhash_impl(3C), and a function to generate the salt, crypt_gensalt_impl(3C).
There must be at least one entry in crypt.conf with the same name as is stored in the crypt_algorithm_magic symbol of the module. The docu-
mentation provided with the module should list this name.
The module_path field specifies the path name to a shared library object that implements crypt_genhash_impl(), crypt_gensalt_impl(), and
crypt_algorithm_magic. If the path name is not absolute, it is assumed to be relative to /usr/lib/security/$ISA. If the path name con-
tains the $ISA token, the token is replaced by an implementation-defined directory name that defines the path relative to the calling pro-
gram's instruction set architecture.
The params field is used to pass module-specific options to the shared objects. See crypt_genhash_impl(3C) and crypt_gensalt_impl(3C). It
is the responsibility of the module to parse and interpret the options. The params field can be used by the modules to turn on debugging
or to pass any module-specific parameters that control the output of the hashing algorithm.
EXAMPLES
Example 1 Provide compatibility for md5crypt-generated passwords.
The default configuration preserves previous Solaris behavior while adding compatibility for md5crypt-generated passwords as provided on
some BSD and Linux systems.
#
# crypt.conf
#
1 /usr/lib/security/$ISA/crypt_bsdmd5.so
Example 2 Use md5crypt to demonstrate compatibility with BSD- and Linux-based systems.
The following example lists 4 algorithms and demonstrates how compatibility with BSD- and Linux-based systems using md5crypt is made avail-
able, using the algorithm names 1 and 2.
#
# crypt.conf
#
md5 /usr/lib/security/$ISA/crypt_md5.so
rot13 /usr/lib/security/$ISA/crypt_rot13.so
# For *BSD/Linux compatibilty
# 1 is md5, 2 is Blowfish
1 /usr/lib/security/$ISA/crypt_bsdmd5.so
2 /usr/lib/security/$ISA/crypt_bsdbf.so
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Interface Stability |Evolving |
+-----------------------------+-----------------------------+
SEE ALSO
passwd(1), crypt(3C), crypt_genhash_impl(3C), crypt_gensalt(3C), crypt_gensalt_impl(3C), getpassphrase(3C), passwd(4), attributes(5),
crypt_unix(5)
SunOS 5.11 10 Jun 2002 crypt.conf(4)