On Tue, 28 May 2013, Andreas Meile wrote:
> I tried that out on a lab system where I replaced pam_unix.so into
> pam_unix2.so inside both common-auth and common-password config
> files.
>
> Result: The system nows recognizes all $2a$ (Blowfish) password
> hashes but does not longer accepts $6$ (SH
Hello Recoverym4n
Thanks for your hint.
- Original Message -
From:
To:
Sent: Monday, May 27, 2013 7:40 PM
Subject: Re: /etc/shadow password hash format (migration from SuSE 9.3 to
Debian Wheezy)
Install 'libpam-unix2' package. Configure PAM as outlined
in /usr/share/
On Mon, 27 May 2013 16:23:20 +0200
"Andreas Meile" wrote:
> A "apt-cache search blowfish" shows me a lot of Blowfish related packages.
> So is there one on it which extends the login authentication routine also to
> process Blowfish hashes in /etc/shadow or is that a much more complicate
> pro
On 05/27/2013 04:23 PM, Andreas Meile wrote:
> Hello Chris
>
> - Original Message - From: "Chris Davies"
> To:
> Sent: Monday, May 27, 2013 2:54 PM
> Subject: Re: /etc/shadow password hash format (migration from SuSE 9.3
> to Debian Wheezy)
>
>
&g
Hello Chris
- Original Message -
From: "Chris Davies"
To:
Sent: Monday, May 27, 2013 2:54 PM
Subject: Re: /etc/shadow password hash format (migration from SuSE 9.3 to
Debian Wheezy)
man 3 crypt contains a NOTES section that identifies the ID and describes
Andreas Meile asked about /etc/shadow:
> Is there a good overview WWW link about all these
> $$[$] formats?
man shadow says of the encrypted password field, "Refer to crypt(3)
for details on how this string is interpreted."
man 3 crypt contains a NOTES section that identifies the ID and describe
Hello Debian users
I recently migrated an old SuSE Linux 9.3 box to Debian 7 Wheezy. There I
backuped the /etc/shadow file to import the existing passwords from my users
to the new Debian environment using a "vipw -s" command as part of the
migration.
Result: Classic UNIX hashes (format [0-9A-Za
7 matches
Mail list logo