Sponsored Content
Full Discussion: Openldap 2.4.31 replication
Operating Systems Linux Red Hat Openldap 2.4.31 replication Post 302876458 by jim mcnamara on Sunday 24th of November 2013 06:59:22 PM
Old 11-24-2013
A good hash is a one way form of encryption. The only way to duplicate is accidentally finding a collision - entering a word that creates the identical hash value. With decent hashing and a salt value this becomes a very difficult task.
 

6 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

dns replication

my primary dns server is not replicating to secondary. i dont know why. i am running solaris 2.6 on both servers. what should i do?:confused: (2 Replies)
Discussion started by: lealyz
2 Replies

2. UNIX for Dummies Questions & Answers

BIND DNS replication

I have a RedHat 7.1 box that we use for DNS in our System Engineering lab. We have a Windows 2000 box that handles DNS in our main office. The Microsoft Admin and I have been given the task of making both of our domains accessible to each other. I had originally made his domain my forwarder, so... (5 Replies)
Discussion started by: Jody
5 Replies

3. HP-UX

HP Unix replication solution

Hi, I looking to setup HP Unix to HP Unix replication as plan of business continuity. The setup can be active passive or active active. Anyone can give me some idea what solution able to perform that? Thanks (3 Replies)
Discussion started by: ufo_999
3 Replies

4. UNIX and Linux Applications

Need Oracle Replication steps.

Hi All, Can anybody tell that Where is to find simple and easy steps of ORACLE replication process? Any help on this highly appreciated. http://www.unix.com/images/misc/progress.gif Thanks. (1 Reply)
Discussion started by: amit_27
1 Replies

5. SCO

Replication using NFS.

Hi all, I am going to implement a script which will use NFS to replicate data between two SCO unix servers. It will take files with mtime -1 and copy the data periodically .In this regard my questions are : Is this approach good and reliable enough with respect... (2 Replies)
Discussion started by: dextergenious
2 Replies

6. Linux

Mysql replication

Need to recover a replication broken error on the mysql slave server. I want to force it to resend the binlog file from the begining. What is the correct value for the: MASTER_LOG_POS ? 0, 1 or 107 ? (2 Replies)
Discussion started by: andriesh
2 Replies
md5crypt(3tcl)						   MD5-based password encryption					    md5crypt(3tcl)

__________________________________________________________________________________________________________________________________________________

NAME
md5crypt - MD5-based password encryption SYNOPSIS
package require Tcl 8.2 package require md5 2.0 package require md5crypt ?1.1.0? ::md5crypt::md5crypt password salt ::md5crypt::aprcrypt password salt ::md5crypt::salt ?length? _________________________________________________________________ DESCRIPTION
This package provides an implementation of the MD5-crypt password encryption algorithm as pioneered by FreeBSD and currently in use as a replacement for the unix crypt(3) function in many modern systems. An implementation of the closely related Apache MD5-crypt is also avail- able. The output of these commands are compatible with the BSD and OpenSSL implementation of md5crypt and the Apache 2 htpasswd program. COMMANDS
::md5crypt::md5crypt password salt Generate a BSD compatible md5-encoded password hash from the plaintext password and a random salt (see SALT). ::md5crypt::aprcrypt password salt Generate an Apache compatible md5-encoded password hash from the plaintext password and a random salt (see SALT). ::md5crypt::salt ?length? Generate a random salt string suitable for use with the md5crypt and aprcrypt commands. SALT
The salt passed to either of the encryption schemes implemented here is checked to see if it begins with the encryption scheme magic string (either "$1$" for MD5-crypt or "$apr1$" for Apache crypt). If so, this is removed. The remaining characters up to the next $ and up to a maximum of 8 characters are then used as the salt. The salt text should probably be restricted the set of ASCII alphanumeric characters plus "./" (dot and forward-slash) - this is to preserve maximum compatability with the unix password file format. If a password is being generated rather than checked from a password file then the salt command may be used to generate a random salt. EXAMPLES
% md5crypt::md5crypt password 01234567 $1$01234567$b5lh2mHyD2PdJjFfALlEz1 % md5crypt::aprcrypt password 01234567 $apr1$01234567$IXBaQywhAhc0d75ZbaSDp/ % md5crypt::md5crypt password [md5crypt::salt] $1$dFmvyRmO$T.V3OmzqeEf3hqJp2WFcb. BUGS, IDEAS, FEEDBACK This document, and the package it describes, will undoubtedly contain bugs and other problems. Please report such in the category md5crypt of the Tcllib SF Trackers [http://sourceforge.net/tracker/?group_id=12883]. Please also report any ideas for enhancements you may have for either package and/or documentation. SEE ALSO
md5 KEYWORDS
hashing, md5, md5crypt, message-digest, security CATEGORY
Hashes, checksums, and encryption COPYRIGHT
Copyright (c) 2003, Pat Thoyts <patthoyts@users.sourceforge.net> md5crypt 1.1.0 md5crypt(3tcl)
All times are GMT -4. The time now is 04:36 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy