Front | Info | Lists | Newsfeeds | Study Guide | What is BSD? |
|
This is the BSDA Study Guide Book written via a wiki collaboration. This is a work in progress. You may contribute to or discuss this specific page at http://bsdwiki.reedmedia.net/wiki/Change_the_encryption_algorithm_used_to_encrypt_the_password_database.html. Change the encryption algorithm used to encrypt the password databaseConceptGiven a screenshot of a password database, an admin should be able to recognize the encryption algorithm in use and how to select another algorithm. Have a basic understanding of when to use DES, MD5 and Blowfish. IntroductionTODO: test and document on other BSD systems -- as appropriate make this content not BSD specific On NetBSD, the The following are examples of different results based on the same password.
As you can see, the new algorithms use a format that can be recognized by routines (like TODO) so they know what to compare with. TODO: show this format (Note while high rounds may improve security, it can be expensive -- very slow to generate hash.) TODO: reword this or better explain ExamplesPractice ExercisesMore informationlogin.conf(5); auth.conf(5); passwd.conf(5); adduser.conf(5) and adduser(8)
|