[3432] in bugtraq
Re: InterNIC Shenanigans (crypt-pw)
daemon@ATHENA.MIT.EDU (Yiorgos Adamopoulos)
Sat Oct 12 03:36:46 1996
Date: Sat, 12 Oct 1996 03:45:27 +0300
Reply-To: y.adamopoulos@NOC.NTUA.GR
From: Yiorgos Adamopoulos <Y.Adamopoulos@NOC.NTUA.GR>
X-To: hamors@litterbox.org
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
In-Reply-To: <Pine.LNX.3.95.961011120728.3070A-100000@socks.litter717.net>
from "Sean B. Hamor" at Oct 11, 96 12:21:50 pm
> nuke nuX9097V9o/TY
> narque naXwgSS98Q3xo
> cq cqjtFeb2JgXwg
> 222222 22Yrs645sLqh2
Well, this is how crypt(3) works. The first two characters of the
generated hash are the first two characters of the salt you use. Now
if you use the salt as the password/phrase then the behavior is the above.
[Actually the salt used is *only* the first two characters of the salt you
supply]
I believe the internic guys will change this to a random salt...
rgrds,
-- Yiorgos Adamopoulos, <Y.Adamopoulos@noc.ntua.gr>