Timeline for How to find the hashing algorithm used to hash passwords?
Current License: CC BY-SA 4.0
10 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Feb 22 at 17:44 | comment | added | ilkkachu |
Might be worth noting that none of those $x$ hashes use just a single run of the listed algorithm, but use iterated algorithms to make brute-force searches slower. The man page does mention setting the number of rounds for SHA-256 and SHA-512, but the table doesn't make it too clear.
|
|
| Jan 7, 2022 at 19:22 | comment | added | Maëlan |
If anyone else is wondering why their local man 3 crypt looks nothing like this, it’s likely because libxcrypt replaces that man page with its own, which doesn’t have this valuable contents (but a less concise equivalent is to be found in man 5 crypt). libxcrypt is de facto installed on many(?) systems (as it’s required by SystemD, OpenSSH, CUPS, Python…).
|
|
| Dec 15, 2019 at 19:43 | history | edited | user313992 | CC BY-SA 4.0 |
and the DES support was just for compat, it hasn't been used by the system since ages
|
| Oct 14, 2019 at 9:59 | history | edited | Stephen Kitt | CC BY-SA 4.0 |
Merge PassLib information.
|
| Oct 14, 2019 at 9:51 | history | edited | Stephen Kitt | CC BY-SA 4.0 |
Add libxcrypt and its catalog.
|
| Mar 15, 2018 at 0:11 | comment | added | kasperd |
DES based passwords are BTW always 13 characters long and consist of alphanumerical characters as well as . and /. The first 2 characters is the salt and the other 11 is a hash value (sort of). And it is the only one of the algorithms supported by crypt which is so weak that you cannot compensate for it by choosing a stronger password.
|
|
| Mar 14, 2018 at 11:27 | vote | accept | Dorin Botan | ||
| Mar 14, 2018 at 11:12 | history | edited | Stephen Kitt | CC BY-SA 3.0 |
passwd(5) too; add OpenBSD.
|
| Mar 14, 2018 at 11:05 | history | edited | Stephen Kitt | CC BY-SA 3.0 |
passwd(5) too
|
| Mar 14, 2018 at 10:57 | history | answered | Stephen Kitt | CC BY-SA 3.0 |