[3432] in bugtraq

home help back first fref pref prev next nref lref last post

Re: InterNIC Shenanigans (crypt-pw)

daemon@ATHENA.MIT.EDU (Yiorgos Adamopoulos)
Sat Oct 12 03:36:46 1996

Date: 	Sat, 12 Oct 1996 03:45:27 +0300
Reply-To: y.adamopoulos@NOC.NTUA.GR
From: Yiorgos Adamopoulos <Y.Adamopoulos@NOC.NTUA.GR>
X-To:         hamors@litterbox.org
To: Multiple recipients of list BUGTRAQ <BUGTRAQ@NETSPACE.ORG>
In-Reply-To:  <Pine.LNX.3.95.961011120728.3070A-100000@socks.litter717.net>
              from "Sean B. Hamor" at Oct 11, 96 12:21:50 pm

> nuke           nuX9097V9o/TY
> narque         naXwgSS98Q3xo
> cq             cqjtFeb2JgXwg
> 222222         22Yrs645sLqh2

Well, this is how crypt(3) works.  The first two characters of the
generated hash are the first two characters of the salt you use.  Now
if you use the salt as the password/phrase then the behavior is the above.
[Actually the salt used is *only* the first two characters of the salt you
supply]

I believe the internic guys will change this to a random salt...

rgrds,

-- Yiorgos Adamopoulos, <Y.Adamopoulos@noc.ntua.gr>

home help back first fref pref prev next nref lref last post