From owner-freebsd-questions Mon Feb 19 00:07:04 1996 Return-Path: owner-questions Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id AAA09362 for questions-outgoing; Mon, 19 Feb 1996 00:07:04 -0800 (PST) Received: from odie.physik2.uni-rostock.de (odie.physik2.uni-rostock.de [139.30.40.28]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id AAA09347 for ; Mon, 19 Feb 1996 00:06:59 -0800 (PST) Received: (from uphya001@localhost) by odie.physik2.uni-rostock.de (8.6.11/8.6.9) id JAA20080; Mon, 19 Feb 1996 09:06:02 +0100 Date: Mon, 19 Feb 1996 09:06:02 +0100 From: Lars Koeller Message-Id: <199602190806.JAA20080@odie.physik2.uni-rostock.de> X-Face: nLQGe[[K51[{{[C\,BiQm[7]u1m{N>_\%nLBo4t@)CoZ}hK[W7DwX&V=}Wf#Qb,j:Jpj[(12r=b~:dYmh]fDf\, ]_frt6eM' dated: Mon, 19 Feb 1996 12:46:09 +1030 (CST) Cc: freebsd-questions@freefall.FreeBSD.org Sender: owner-questions@FreeBSD.ORG Precedence: bulk Hi! > Andre' Carvalho stands accused of saying: > > > > I would like to know if I can use a program like "crack" to try to break = > > my users' passwords. This is very important because I do not want to = > > have security holes in this machine. > > > > I tried a lot, but it says that the crypt() function is not standard and = > > that the encrypted passwords are too long. > > You will have to modify the 'crack' program to understand the longer MD5 > encrypted passwords that FreeBSD uses. I would expect that this should be > a relatively straightforward task, but I'm not familiar with 'crack'. > > Anyone else done this already and can supply Andre' with the diffs? How do you want to crack a password you can't read? FreeBSD uses shadow passwords only root can read! Regards Lars -- ____________________________________________________________________________ Lars Köller Phone: +49 381/498-1665, Fax: -1667 Universität Rostock (Germany) E-Mail: Fachbereich Physik Lars_Koeller@odie.physik2.Uni-Rostock.DE Universitätsplatz 3 Anonymous ftp: 18051 Rostock ftp://odie.physik2.uni-rostock.de/pub