08-03-2001
as in trying to crack a password type of validate? Passwords are a one way salt. so your more or less just running random words and compairing it the shadow file's password field. once you have a match you have the password.
look into the command crypt.
/usr/bin/crypt
/usr/include/crypt.h
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
AIX password authentication very slow
I installed and already removed openssh and our login on the aix box very slow.
It takes 30 seconds to get the password authenticated.
How can i debug this problem? and what might be the reason. It was working
fine until i tried to get openssh... (0 Replies)
Discussion started by: progressdll
0 Replies
2. Solaris
Hello;
I am moving a customer from Solaris 2.6 to Solaris 2.8. The customer has requested the following two requirements also be implemented:
1. Lock a user account out for X number of days after 3 unsuccessful login attempts.
2. No reuse of the last 5-10 passwords. Also referred to... (1 Reply)
Discussion started by: rambo15
1 Replies
3. Solaris
I am using solaris unix 8.2 version. I want to bypass password authentication for sftp. Can you please give some ideas on this. thanks.Regards. (4 Replies)
Discussion started by: vijill
4 Replies
4. Solaris
I can able to SFTP from my web server unix to apps server unix end. but the other way from APPS server to Web server is still asking me the password. I have done same procedure both side. still i am having same problem. Any one help on this. thanks, regards (3 Replies)
Discussion started by: vijill
3 Replies
5. Shell Programming and Scripting
Hello Friends,
I know this issue has been raised many times and hence I tried every resolution provided in the forum before I posted this issue again.
My Password-less RSA authentication was working fine for quite some time. Whenever the remote server password used to change I used to re-do... (5 Replies)
Discussion started by: mehimadri
5 Replies
6. UNIX and Linux Applications
Hi;
I had set up NFS server in one ubuntu box and mounted few directories using it.
In order to access those directories across the network i m using j-ftp(an open source java network client) from other boxes in the same network.I am able to view my mounted directories in the server through it.... (1 Reply)
Discussion started by: ajaypadvi
1 Replies
7. Solaris
Hi,
I am facing strange problem in solaris 10.
My requirement is that on server A using user test, any user which is created on Server B will be able to login wihtout password (ssh) from Server A
All the users which are on Server B are able able to login from Server A using test user.
... (8 Replies)
Discussion started by: manoj.solaris
8 Replies
8. UNIX for Dummies Questions & Answers
Hi!
Im trying to set access from ServerA(SunOS) to ServerB(Some custom Linux with Keyboard Interactive login) with SSH Keys. As a proof of concept I was able to do it between 2 virtual machines. Now in my real life scenario it isnt working.
I created the keys in ServerA, copied them to... (7 Replies)
Discussion started by: RedSpyder
7 Replies
9. UNIX for Advanced & Expert Users
Using below below command i'm able to connect or authenticate server, In below command password contains special characters
sshpass -v -p 'ASJBA%hs76)#' ssh -q -o ConnectTimeout=5 hostname
But If I pass password as a variable I'm not able to connect or authenticate server, can you please help... (1 Reply)
Discussion started by: sam@sam
1 Replies
LEARN ABOUT OPENSOLARIS
crypt_sunmd5
crypt_sunmd5(5) Standards, Environments, and Macros crypt_sunmd5(5)
NAME
crypt_sunmd5 - password hashing module using MD5 message hash algorithm
SYNOPSIS
/usr/lib/security/$ISA/crypt_sunmd5.so
DESCRIPTION
The crypt_sunmd5 module is a one-way password hashing module for use with crypt(3C) that uses the MD5 message hash algorithm. The algorithm
identifier for crypt.conf(4) and policy.conf(4) is md5.
This module is designed to make it difficult to crack passwords that use brute force attacks based on high speed MD5 implementations that
use code inlining, unrolled loops, and table lookup.
The maximum password length for crypt_sunmd5 is 255 characters.
The following options can be passed to the module by means of crypt.conf(4):
rounds=<positive_number> Specifies the number of additional rounds of MD5 to use in generation of the salt; the default number of rounds
is 4096. Negative values have no effect and are ignored, that is, the number of rounds cannot be lowered below
4096.
The number of additional rounds is stored in the salt string returned by crypt_gensalt(3C). For example:
$md5,rounds=1000$nlxmTTpz$
When crypt_gensalt(3C) is being used to generate a new salt, if the number of additional rounds configured in
crypt.conf(4) is greater than that in the old salt, the value from crypt.conf(4) is used instead. This allows
for migration to stronger (but more time-consuming) salts on password change.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|MT-Level |Safe |
+-----------------------------+-----------------------------+
SEE ALSO
passwd(1), crypt(3C), crypt_genhash_impl(3C), crypt_gensalt(3C), crypt_gensalt_impl(3C), getpassphrase(3C), crypt.conf(4), passwd(4), pol-
icy.conf(4), attributes(5)
SunOS 5.11 23 Dec 2003 crypt_sunmd5(5)