md5 and sha1 digest with openssl
Thu, 08/30/2012 - 17:00 — sandipmd5 digest:
echo -n 'md5 digest of text' | openssl dgst -md5
841fc570f41fad1a64cc237b1612sha1 digest:
echo -n 'sha1 digest of text' | openssl dgst -sha1
80efdb4abbeb92c0ea15a4146d68- sandip's blog
- Login or register to post comments
- Read more
Enabling md5 shadow password with authconfig
Sat, 10/02/2010 - 14:44 — sandipIf you notice that /etc/shadow file password is using DES encryption, MD5 encryption can be enabled via:
authconfig --enablemd5 --enableshadow --updateIf authconfig is not present edit, "/etc/pam.d/system-auth" and add "md5 shadow" to line starting with "password sufficient pam_unix.so" so it looks like below:
password    sufficient    pam_unix.so md5 shadow nullok try_first_pass use_authtok- sandip's blog
- Login or register to post comments
- Read more
Shadow password hash explained
Sat, 07/11/2009 - 00:05 — sandipYou can programmatically generate shadow password hash via:
$ openssl passwd -1 -salt G5cYam5w test.123
$1$G5cYam5w$z0NDUjMRX4xVBKw9-1 means md5
G5cYam5w is a random salt (minimum 8)
test.123 is the password
Here is the breakdown:
The first $1 means that it is an md5 hash.
The second $G5cYam5w is a random salt.
The third $z0NDUjMRX4xVBKw9Nb6YL0 is the md5 hash.
- sandip's blog
- Login or register to post comments