Displaying 4 results from an estimated 4 matches for "hash_rounds_max".
2014 Jan 08
0
Hash rounds in /etc/libuser.conf won't work - how to report a bug
...CentOS release 5.10 (Final), 2.6.18-371.3.1.el5 x86_64. The details are here:
https:// www.centos.org/forums/viewforum.php?f=24&sid=44859638070165ed5d8d9c35cdbe0378
I read all the documentation and looked for more off the CentOS site. I searched the entire CentOS site for hash_rounds_min and hash_rounds_max, the parameters changed in libuser.conf to configure the desired changes, without a single hit in any area on either. Nearly 800 people have seen my post and not a single reply; not unusual in that forum for what may be an infrequent situation. I'm guessing very few people have tried these opti...
2014 Jan 09
0
Hash rounds in /etc/libuser.conf won't work
...lease 5.10 (Final), 2.6.18-371.3.1.el5 x86_64. The details are here:
https://www.centos.org/forums/viewtopic.php?f=24&t=44245&sid=975951a5a0eb264945bbf550ea076278
I read all the documentation and looked for more off the CentOS site. I searched the entire CentOS site for hash_rounds_min and hash_rounds_max, the parameters changed in libuser.conf to configure the desired changes, without a single hit in any area on either. Over 800 people have seen my post and not a single reply; not unusual in that forum for what may be an infrequent situation. I'm guessing very few people have tried these option...
2015 Mar 31
6
How to decrypt rootpassword form kickstart file
Hi Team,
I have the kick start file where my root password is store like
# Root password
rootpw --iscrypted $1$1SItJOAg$UM9n7lRFK1/OCs./rgQtQ/
# System authorization information
auth --useshadow --passalgo=sha512
Is there any way to decry pt the password and get it as plain text.
I know single user mode works but my case it in remote site.
Thanks,
Jegadeesh
2014 Feb 04
0
Password hash rounds solved - important security implications
A member of the scientific-linux-users at fnal.gov wrote:
On 01/14/2014 04:19 PM, George Shaffer wrote:
> > If anyone has gotten password hash rounds using hash_rounds_min and
> > hash_rounds_max in libuser.conf, or the counter part in login.defs
> > (SHA_CRYPT_MIN_ROUNDS, SHA_CRYPT_MAX_ROUNDS), to work on any RHEL related
> > distribution, I would appreciate knowing how you did it, because this does
> > not seem to work as the documentation I've found says it shoul...