[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Using Debian SID on a Mac SE/30



Hi Stan,

On 15 Apr 2021, at 4:23, Finn Thain wrote:

Most of that is probably password hashing. Look in /etc/shadow and you'll
probably find long password hashes. If you're not worried about weak
hashes, you could switch to DES which is probably what A/UX uses. See 'man
login.defs' and 'man 3 crypt'.

BTW, if your password hashes are never leaked or your actual passwords are
guessable anyway then I don't see much benefit from SHA512.

FTR, I'm not advocating guessable passwords and weak hashes. But if you
want to try it, I hear that 12345 is very popular:

$ perl -e 'print crypt("12345","xx")."\n"'
xxwddmriJc5TI

When I had similar problems on a Mac LCII, I've switched the password hashing scheme from SHA512 (5000 Rounds) to MD5 with

ENCRYPT_METHOD MD5

in /etc/login.defs and

password        [success=1 default=ignore]      pam_unix.so obscure md5

in /etc/pam.d/common-password

After changing this setting, make sure to set a new password for the users that you use. The password string in /etc/shadow should now look like this

user:$1$LJE/eegi$OnIQXGTyEwh2q8rhyJssw/:18732:0:99999:7:::

instead of this (SHA512)

user:$6$ThsKWiJWXD8NRyVk$4jC4Rmn9.SoHFou7w84VOYgTshzyvbz2zIBgDbozbzC5CfYw8Dipihsrd8HC5oNob2OjTun.2dDl0KU4c5lO51:18732:0:99999:7:::

Greetings

Carsten


Reply to: