Re: Using Debian SID on a Mac SE/30
On 4/15/21 12:30 AM, Carsten Strotmann wrote:
> Hi Stan,
> On 15 Apr 2021, at 4:23, Finn Thain wrote:
>> Most of that is probably password hashing. Look in /etc/shadow and you'll
>> probably find long password hashes. If you're not worried about weak
>> hashes, you could switch to DES which is probably what A/UX uses. See
>> login.defs' and 'man 3 crypt'.
>> BTW, if your password hashes are never leaked or your actual passwords
>> guessable anyway then I don't see much benefit from SHA512.
>> FTR, I'm not advocating guessable passwords and weak hashes. But if you
>> want to try it, I hear that 12345 is very popular:
>> $ perl -e 'print crypt("12345","xx")."\n"'
> When I had similar problems on a Mac LCII, I've switched the password
> hashing scheme from SHA512 (5000 Rounds) to MD5 with
> ENCRYPT_METHOD MD5
> in /etc/login.defs and
> password [success=1 default=ignore] pam_unix.so obscure md5
> in /etc/pam.d/common-password
> After changing this setting, make sure to set a new password for the
> users that you use. The password string in /etc/shadow should now look
> like this
> instead of this (SHA512)
Thanks, that fixes the immediate problem (basic access).
Default login times:
telnet (84 seconds after password is entered)
ftp (times out)
Using MD5 hashes:
telnet (6 seconds after password is entered)
ftp (10 seconds after password is entered)