The crypt algorithm involves a lot more than just re-hashing 5,000 times: Unix crypt using SHA-256 and SHA-512.
Yeah, I was expecting something like this. Thanks, I'll read through it and accept if it's what I'm looking for. – polemon Sep 24 '10 at 11:36 The document say: "2.
The password string is added to digest A. 3. The salt string is added to digest A."
Does that mean, that first I append the salt to the password string? If so, that would be the other way round for MD5, which prefixes passwords with salt. – polemon Sep 24 '10 at 11:42 Ok, I'm getting there, I also cross checked with eglibc.Org/cgi-bin/viewcvs.cgi/branches/eglibc-2_9/libc/crypt/…, interestingly, there are some documentation errors... I don't quite get the last part, where he makes the Base64, is that reversed byte order?
– polemon Sep 26 '10 at 3:15.
Create an /etc/security directory on every machine. File and into /etc/security/passwd. The above password is nonsense anyway.
Has a valid password. Insert the following two lines into your NIS master passwd. Adjunct map as well.
I cant really gove you an answer,but what I can give you is a way to a solution, that is you have to find the anglde that you relate to or peaks your interest. A good paper is one that people get drawn into because it reaches them ln some way.As for me WW11 to me, I think of the holocaust and the effect it had on the survivors, their families and those who stood by and did nothing until it was too late.