[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Using Debian SID on a Mac SE/30

Hi Stan,

On 15 Apr 2021, at 4:23, Finn Thain wrote:

Most of that is probably password hashing. Look in /etc/shadow and you'll
probably find long password hashes. If you're not worried about weak
hashes, you could switch to DES which is probably what A/UX uses. See 'man
login.defs' and 'man 3 crypt'.

BTW, if your password hashes are never leaked or your actual passwords are
guessable anyway then I don't see much benefit from SHA512.

FTR, I'm not advocating guessable passwords and weak hashes. But if you
want to try it, I hear that 12345 is very popular:

$ perl -e 'print crypt("12345","xx")."\n"'

When I had similar problems on a Mac LCII, I've switched the password hashing scheme from SHA512 (5000 Rounds) to MD5 with


in /etc/login.defs and

password        [success=1 default=ignore]      pam_unix.so obscure md5

in /etc/pam.d/common-password

After changing this setting, make sure to set a new password for the users that you use. The password string in /etc/shadow should now look like this


instead of this (SHA512)




Reply to: