Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 19 Feb 1996 01:56:27 -0700 (MST)
From:      Dave Andersen <angio@aros.net>
To:        Lars_Koeller@odie.physik2.uni-rostock.de (Lars Koeller)
Cc:        msmith@atrad.adelaide.edu.au, freebsd-questions@freefall.freebsd.org
Subject:   Re: Crack freeBSD password file
Message-ID:  <199602190856.BAA06180@terra.aros.net>
In-Reply-To: <199602190806.JAA20080@odie.physik2.uni-rostock.de> from "Lars Koeller" at Feb 19, 96 09:06:02 am

next in thread | previous in thread | raw e-mail | index | archive | help
Lo and behold, Lars Koeller once said:

> > You will have to modify the 'crack' program to understand the longer MD5
> > encrypted passwords that FreeBSD uses.  I would expect that this should be
> > a relatively straightforward task, but I'm not familiar with 'crack'.
> > 
> > Anyone else done this already and can supply Andre' with the diffs?
> 
>       How do  you want  to crack a   password you can't read? FreeBSD  uses
>    shadow passwords only root can read!

   Because you never know when someone's going to find a security hole 
that lets someone read files on your system with root permission? :-)

   <insert something here about sendmail, wu-ftpd, etc.>

     -Dave Andersen

-- 
angio@aros.net                Complete virtual hosting and business-oriented
system administration         Internet services.  (WWW, FTP, email)
http://www.aros.net/          http://www.aros.net/about/virtual/
  "There are only two industries that refer to thier customers as 'users'."




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199602190856.BAA06180>