Berkeley CSUA MOTD:Entry 12881
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/04/04 [General] UID:1000 Activity:popular
4/4     

2004/3/26 [Computer/SW/Security] UID:12881 Activity:nil
3/26    Is there a transformation to convert encrypted shadow passwords to
        MD5 hashes? I'm guessing the answer is no...
        \_ you need to decrypt the passwords then hash them.
           \_ I thought those shadowed passwords are one-way hashing, cant
              be decrypted.
              \_ first shadowed hashed, then encrypted it seems
                 first decrypt, but hashed passwords mean nothing
                  because hashing is one-way, you could only match
                  strings at the end of two hashed passwords to see
                  if they are equal.
        \_ If you want to switch to MD5 passwords, you can "enable" MD5
           passwords, and then tell users to change their passwords.
           Both the new MD5 passwords and the old non-MD5 passwords
           will both work during the transition. In Debian
           add  md5  to the line in /etc/pam.d/passwd. I don't know if
           that's what you are trying to do.
2025/04/04 [General] UID:1000 Activity:popular
4/4     

You may also be interested in these entries...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/7/13-8/19 [Computer/SW/Security, Computer/Companies/Yahoo] UID:54436 Activity:nil
7/13    Why would Yahoo store passwords unencrypted?  I recall that even 20+
        years ago the passwords stored in /etc/passwd on instructional
        machines here at Cal were one-way encrypted.  (I think those were
        Ultrix machines.)
        \_ Doesn't this say anything already?
           http://finance.yahoo.com/echarts?s=YHOO+Interactive#symbol=yhoo;range=5y
	...
2009/7/12-24 [Computer/SW/Security] UID:53132 Activity:nil
7/9     Ok I'm learning how to do this fancy ssh-keygen thing so that I
        don't have to keep typing passwords inbetween logging into machines.
        What's an ideal size for the number of bits in dsa? 1024 is default,
        but would 2048 enhance it even more? What do you guys use?
        \_ I'm paranoid.  I use 4096.  Go for at least 2048, I'd say...
        \_ If you want to be secure make sure your keys have passphrases, and make
	...
2008/12/2-6 [Computer/SW/Apps, Academia/Berkeley/CSUA/Motd] UID:52140 Activity:kinda low
12/1    Just curious -- what do you guys generally use soda for? Why do you
        log on? Personally, I use it to keep a presence on IRC and AIM/gTalk
        at all times, and mess around with some Python programming (been
        setting up Twisted and such so I can play with making an irc bot).
        --toulouse
        \_ I use it to post SHIT, er, I mean, spill my guts about the company
	...
2008/11/11-26 [Computer/SW/Mail] UID:51911 Activity:nil
11/11   My RAID box has an email alert setting that requires an SMTP
        server. Are there non-encrypted smtp servers I can use?
        \_ yes
	...
2008/10/13-16 [Computer/SW/Unix] UID:51497 Activity:nil
10/13   Can anyone recommend a decent open source software package to track
        passwords in a global network (Windows+UNIX systems) ... I'm sick and
        tired of waiting days for IT to track down the one person with root
        on some server somewhere.
        \_ its not open source, but we've been using Cyberark
           (http://www.cyber-ark.com it's done the job well enough.   Considering
	...
2008/7/20-23 [Computer/HW/Laptop, Computer/SW/Security] UID:50640 Activity:nil
7/20    Does my encrypted disk LVM everything partition scheme make my
        laptop consume a lot more power than if I weren't using encrypted
        LVM?
	...
2008/4/21-5/2 [Computer/SW/Security] UID:49787 Activity:nil
4/21    Yahoo Instant Messenger is not encrypted. Are there chat programs
        that are a bit more secure than YIM?
        \_ what OS are you using?
        \_ What are your goals? Corporate security, or preventing your wife
           from eavesdropping on you? If you're using IM for internal company
           communication, you shouldn't be using anything where you don't
	...
2008/4/26-30 [Computer/Companies/Google, Computer/SW/Security] UID:49838 Activity:low
4/26    is Google Chat through the web browser encrypted?  My sweetie
        spends all day chatting with me via Google Chat in gmail
        "oh baby i want to **** your **** and then *** *** **** **
        ** *** ***" and "* **** **** *** **** in ** *** *****".
        Could some nosy sysadmin packet sniff her?
        \_ Like this really happened with a live woman.
	...