15
votes
understanding sha512 hash in /etc/shadow
The first visible difference is that the /etc/shadow file represents the hash result in Base64 while the website returns it in hexadecimal (base-16). The same bytes can be written in several different ...
9
votes
understanding sha512 hash in /etc/shadow
The standard library routine in C would be crypt(3). The second argument is the whole $6$NbmOz0kL4eKjJbwi string because that identifies the algorithm and the seed.
eg
// Compile with -lcrypt
#...
7
votes
understanding sha512 hash in /etc/shadow
You could use openssl's passwd subcommand:
$ printf %s ron | openssl passwd -6 -salt NbmOz0kL4eKjJbwi -stdin
$6$NbmOz0kL4eKjJbwi$JE1.19BxJWh7cbZjmPPDrviuBV7l7h/...
2
votes
checking for strong passwords in Linux as an admin
is there some acceptable means [via software?] to validate all set passwords are in fact up to some standard of character length and complexity, without actually finding out the set password of an ...
2
votes
checking for strong passwords in Linux as an admin
I can think of several ways to ensure all passwords meet standards:
Intercept the password when the user is logging in and verify it, maybe pretend it is expired if it isn't good enough. (I'm not ...
2
votes
Accepted
How do I enable root account = set root password in Synology DSM 7.2?
So, I just went through most of the search results, most claiming it is no longer possible, however it is still possible in 7.2 and maybe in later versions of DSM.
Try this, just change the the ...
Only top scored, non community-wiki answers of a minimum length are eligible
Related Tags
password × 1260security × 181
linux × 171
ssh × 169
sudo × 102
login × 87
root × 87
users × 83
pam × 72
bash × 63
debian × 62
authentication × 61
ubuntu × 60
shell-script × 56
passwd × 48
command-line × 45
shadow × 44
encryption × 43
centos × 37
scripting × 31
su × 29
rhel × 28
password-store × 26
linux-mint × 25
key-authentication × 24