Return to BSD News archive
Path: euryale.cc.adfa.oz.au!newshost.anu.edu.au!harbinger.cc.monash.edu.au!simtel!news.kei.com!news.mathworks.com!tank.news.pipex.net!pipex!howland.reston.ans.net!ee.und.ac.za!iafrica.com!ticsa.com!cstatd.cstat.co.za!ucthpx!wabe.csir.co.za!africa.cis.co.za!africa.cis.co.za!johan From: johan@trepidation.ee.up.ac.za (Johan Eksteen) Newsgroups: comp.unix.bsd.freebsd.misc Subject: [Q] Descrambling of FreeBSD 1.1 (non-DES) passwords Followup-To: comp.unix.bsd.freebsd.misc Date: 12 Sep 1995 13:28:52 GMT Organization: Department of Electronic and Electrical Engineering Lines: 78 Distribution: inet Message-ID: <JOHAN.95Sep12162852@trepidation.ee.up.ac.za> NNTP-Posting-Host: trepidation.mikom.csir.co.za Hi, Introduction: ============= Yes, I know this sounds highly suspicious, (putting on asbestos suit :->), but I need to descramble a password file used on a FreeBSD 1.1.(5?) RELEASE machine. DES is not installed on the machine and the passwords are therefore scrambled. We need to move the users (900+ of them) over to a machine that uses DES for authentication. Now for the the question: ========================= Are there any utilities or programs to be used to descramble passwords scrambled by the crypt function of FreeDSD 1.1.x or anyone I can contact that can point me in the right direction ? (and No, crack just wont do it, because we ensured the use of good passwds by rewriting /usr/bin/passwd etc. to enforce it.) We would really appreciate any solution, because the users are not all on our site, but distributed all over the country. We would rather use the more transparent route than to contact each user and tellling them that their passwords will chnage whenever. I know that I might sound like a guy that wants to lay my hands on someone elses password, but this is not true. I have root access to the machines in question. If there are any queries, I can get referals from the owners of the machines etc. to confirm that this is a above board, legitimate request. Thanx in advance. (OH, PLEASE REPLY BY E_MAIL. I DO NOT HAVE THE TIME TO FILTER THROUGH ALL THE ARTICLES BEFORE UOR NEWS SERVER EXPIRES THEM. (Pitty, but improving :-/) (and by the way, for those lurkers who saw it as an opening to grab the passwd file and unscramble it for their own devious purposes, the machine is not dent, and is situated behind a firewall..... ) Here are my details: ---------------------------------------------------------------------------- Johan J. Eksteen E-Mail: Johan.Eksteen@dent.mikom.csir.co.za Johan.Eksteen@ee.up.ac.za johan@dent.mikom.csir.co.za jeksteen@mikom.csir.co.za Snail Mail (work): Johan Eksteen MIKOMTEK CSIR PO Box 395 Pretoria 0001 South Africa Snail Mail (home): Johan Eksteen 1300 Boundary Ln Hatfield Pretoria 0083 South Africa Phone (work) (012) 841-2328 Phone (home) (012) 437-646 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3a mQCNAi+yJtgAAAEEAP3Mmsnzvscrdec9RGnrXCQYOvgxgRaaCuNmJcz54e+mXP2G o/veqzpiRf4Af33r2m5oOOstEE16oLkNDPTmthn7YUCWgjHnq2ah8PFDJoWfLshg FFDOKuoRtxkoMtPCNQsWTMzQaacBDd8nlPZ/D4lZb41quW8WXkYt7+RSPRQ9AAUR tC5Kb2hhbiBKLiBFa3N0ZWVuIDxqb2hhbkBkZW50Lm1pa29tLmNzaXIuY28uemE+ tAVqb2hhbg== =ok2b -----END PGP PUBLIC KEY BLOCK-----