[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Using Debian SID on a Mac SE/30



On 4/15/21 12:30 AM, Carsten Strotmann wrote:
> Hi Stan,
> 
> On 15 Apr 2021, at 4:23, Finn Thain wrote:
> 
>> Most of that is probably password hashing. Look in /etc/shadow and you'll
>> probably find long password hashes. If you're not worried about weak
>> hashes, you could switch to DES which is probably what A/UX uses. See
>> 'man
>> login.defs' and 'man 3 crypt'.
>>
>> BTW, if your password hashes are never leaked or your actual passwords
>> are
>> guessable anyway then I don't see much benefit from SHA512.
>>
>> FTR, I'm not advocating guessable passwords and weak hashes. But if you
>> want to try it, I hear that 12345 is very popular:
>>
>> $ perl -e 'print crypt("12345","xx")."\n"'
>> xxwddmriJc5TI
> 
> When I had similar problems on a Mac LCII, I've switched the password
> hashing scheme from SHA512 (5000 Rounds) to MD5 with
> 
> ENCRYPT_METHOD MD5
> 
> in /etc/login.defs and
> 
> password        [success=1 default=ignore]      pam_unix.so obscure md5
> 
> in /etc/pam.d/common-password
> 
> After changing this setting, make sure to set a new password for the
> users that you use. The password string in /etc/shadow should  now look
> like this
> 
> user:$1$LJE/eegi$OnIQXGTyEwh2q8rhyJssw/:18732:0:99999:7:::
> 
> instead of this (SHA512)
> 
> user:$6$ThsKWiJWXD8NRyVk$4jC4Rmn9.SoHFou7w84VOYgTshzyvbz2zIBgDbozbzC5CfYw8Dipihsrd8HC5oNob2OjTun.2dDl0KU4c5lO51:18732:0:99999:7:::
> 
> 
> Greetings
> 
> Carsten
> 

Thanks, that fixes the immediate problem (basic access).

Default login times:
  telnet (84 seconds after password is entered)
  ftp (times out)

Using MD5 hashes:
  telnet (6 seconds after password is entered)
  ftp (10 seconds after password is entered)

-s


Reply to: