Sponsored Content
Full Discussion: Password Authentication
Special Forums Cybersecurity Password Authentication Post 4915 by Optimus_P on Friday 3rd of August 2001 01:11:15 PM
Old 08-03-2001
as in trying to crack a password type of validate? Passwords are a one way salt. so your more or less just running random words and compairing it the shadow file's password field. once you have a match you have the password.

look into the command crypt.

/usr/bin/crypt
/usr/include/crypt.h
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

AIX password authentication very slow

AIX password authentication very slow I installed and already removed openssh and our login on the aix box very slow. It takes 30 seconds to get the password authenticated. How can i debug this problem? and what might be the reason. It was working fine until i tried to get openssh... (0 Replies)
Discussion started by: progressdll
0 Replies

2. Solaris

Enhanced Password Authentication

Hello; I am moving a customer from Solaris 2.6 to Solaris 2.8. The customer has requested the following two requirements also be implemented: 1. Lock a user account out for X number of days after 3 unsuccessful login attempts. 2. No reuse of the last 5-10 passwords. Also referred to... (1 Reply)
Discussion started by: rambo15
1 Replies

3. Solaris

bypass password authentication for sftp in unix

I am using solaris unix 8.2 version. I want to bypass password authentication for sftp. Can you please give some ideas on this. thanks.Regards. (4 Replies)
Discussion started by: vijill
4 Replies

4. Solaris

can't bypass password authentication

I can able to SFTP from my web server unix to apps server unix end. but the other way from APPS server to Web server is still asking me the password. I have done same procedure both side. still i am having same problem. Any one help on this. thanks, regards (3 Replies)
Discussion started by: vijill
3 Replies

5. Shell Programming and Scripting

Password-less RSA Authentication not working

Hello Friends, I know this issue has been raised many times and hence I tried every resolution provided in the forum before I posted this issue again. My Password-less RSA authentication was working fine for quite some time. Whenever the remote server password used to change I used to re-do... (5 Replies)
Discussion started by: mehimadri
5 Replies

6. UNIX and Linux Applications

Regarding NFS server username/password authentication

Hi; I had set up NFS server in one ubuntu box and mounted few directories using it. In order to access those directories across the network i m using j-ftp(an open source java network client) from other boxes in the same network.I am able to view my mounted directories in the server through it.... (1 Reply)
Discussion started by: ajaypadvi
1 Replies

7. Solaris

Unable to login password less authentication

Hi, I am facing strange problem in solaris 10. My requirement is that on server A using user test, any user which is created on Server B will be able to login wihtout password (ssh) from Server A All the users which are on Server B are able able to login from Server A using test user. ... (8 Replies)
Discussion started by: manoj.solaris
8 Replies

8. UNIX for Dummies Questions & Answers

SSH Keys Authentication keeps asking for password

Hi! Im trying to set access from ServerA(SunOS) to ServerB(Some custom Linux with Keyboard Interactive login) with SSH Keys. As a proof of concept I was able to do it between 2 virtual machines. Now in my real life scenario it isnt working. I created the keys in ServerA, copied them to... (7 Replies)
Discussion started by: RedSpyder
7 Replies

9. UNIX for Advanced & Expert Users

How to pass password as a variable for sshpass authentication?

Using below below command i'm able to connect or authenticate server, In below command password contains special characters sshpass -v -p 'ASJBA%hs76)#' ssh -q -o ConnectTimeout=5 hostname But If I pass password as a variable I'm not able to connect or authenticate server, can you please help... (1 Reply)
Discussion started by: sam@sam
1 Replies
CRYPT(3)						     Library Functions Manual							  CRYPT(3)

NAME
crypt - one-way password encryption function SYNOPSIS
#define _MINIX_SOURCE 1 #include <unistd.h> char *crypt(const char *key, const char *salt) DESCRIPTION
The first use of crypt() is to encrypt a password. Its second use is to authenticate a shadow password. In both cases crypt() calls pwdauth(8) to do the real work. Crypt() encrypts a password if called with a user typed key, and a salt whose first two characters are in the set [./0-9A-Za-z]. The result is a character string in the [./0-9A-Za-z] alphabet of which the first two characters are equal to the salt, and the rest is the result of encrypting the key and the salt. If crypt() is called with a salt that has the form ##user then the key is encrypted and compared to the encrypted password of user in the shadow password file. If they are equal then crypt() returns the ##user argument, if not then some other string is returned. This trick assures that the normal way to authenticate a password still works: if (strcmp(pw->pw_passwd, crypt(key, pw->pw_passwd))) ... If key is a null string, and the shadow password is a null string or the salt is a null string then the result equals salt. (This is because the caller can't tell if a password field is empty in the shadow password file.) The key and salt are limited to 1024 bytes total including the null bytes. FILES
/usr/lib/pwdauth The password authentication program SEE ALSO
getpass(3), getpwent(3), passwd(5), pwdauth(8). NOTES
The result of an encryption is returned in a static array that is overwritten by each call. The return value should not be modified. AUTHOR
Kees J. Bot (kjb@cs.vu.nl) CRYPT(3)
All times are GMT -4. The time now is 02:25 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy