*BSD News Article 51293


Return to BSD News archive

Path: euryale.cc.adfa.oz.au!newshost.anu.edu.au!harbinger.cc.monash.edu.au!simtel!news.kei.com!news.mathworks.com!tank.news.pipex.net!pipex!howland.reston.ans.net!ee.und.ac.za!iafrica.com!ticsa.com!cstatd.cstat.co.za!ucthpx!wabe.csir.co.za!africa.cis.co.za!africa.cis.co.za!johan
From: johan@trepidation.ee.up.ac.za (Johan Eksteen)
Newsgroups: comp.unix.bsd.freebsd.misc
Subject: [Q] Descrambling of FreeBSD 1.1 (non-DES) passwords
Followup-To: comp.unix.bsd.freebsd.misc
Date: 12 Sep 1995 13:28:52 GMT
Organization: Department of Electronic and Electrical Engineering
Lines: 78
Distribution: inet
Message-ID: <JOHAN.95Sep12162852@trepidation.ee.up.ac.za>
NNTP-Posting-Host: trepidation.mikom.csir.co.za

Hi,


Introduction:
=============

Yes, I know this sounds highly suspicious, (putting on asbestos suit
:->), but I need to descramble a password file used on a FreeBSD
1.1.(5?) RELEASE machine. DES is not installed on the machine and the
passwords are therefore scrambled. We need to move the users (900+ of
them) over to a machine that uses DES for authentication. 

Now for the the question:
=========================
Are there any utilities or programs to be used to descramble passwords
scrambled by the crypt function of FreeDSD 1.1.x or anyone I can
contact that can point me in the right direction ? (and No, crack just
wont do it, because we ensured the use of good passwds by rewriting
/usr/bin/passwd etc. to enforce it.)

We would really appreciate any solution, because the users are not all
on our site, but distributed all over the country. We would rather use
the more transparent route than to contact each user and tellling them
that their passwords will chnage whenever.

I know that I might sound like a guy that wants to lay my hands on
someone elses password, but this is not true. I have root access to
the machines in question. If there are any queries, I can get referals
from the owners of the machines etc. to confirm that this is a above
board, legitimate request.

Thanx in advance.

(OH, PLEASE REPLY BY E_MAIL. I DO NOT HAVE THE TIME TO FILTER THROUGH
ALL THE ARTICLES BEFORE UOR NEWS SERVER EXPIRES THEM. (Pitty, but
improving :-/)

(and by the way, for those lurkers who saw it as an opening to grab
the passwd file and unscramble it for their own devious purposes, the
machine is not dent, and is situated behind a firewall..... )

Here are my details:
----------------------------------------------------------------------------
Johan J. Eksteen               E-Mail: Johan.Eksteen@dent.mikom.csir.co.za
                                       Johan.Eksteen@ee.up.ac.za
                                       johan@dent.mikom.csir.co.za
                                       jeksteen@mikom.csir.co.za

Snail Mail (work): Johan Eksteen
                   MIKOMTEK
                   CSIR
                   PO Box 395                   
                   Pretoria
                   0001
                   South Africa

Snail Mail (home): Johan Eksteen
                   1300 Boundary Ln
                   Hatfield
                   Pretoria
                   0083
                   South Africa

Phone (work) (012) 841-2328
Phone (home) (012) 437-646


-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3a

mQCNAi+yJtgAAAEEAP3Mmsnzvscrdec9RGnrXCQYOvgxgRaaCuNmJcz54e+mXP2G
o/veqzpiRf4Af33r2m5oOOstEE16oLkNDPTmthn7YUCWgjHnq2ah8PFDJoWfLshg
FFDOKuoRtxkoMtPCNQsWTMzQaacBDd8nlPZ/D4lZb41quW8WXkYt7+RSPRQ9AAUR
tC5Kb2hhbiBKLiBFa3N0ZWVuIDxqb2hhbkBkZW50Lm1pa29tLmNzaXIuY28uemE+
tAVqb2hhbg==
=ok2b
-----END PGP PUBLIC KEY BLOCK-----