[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Hash Algorithm

Posted on 2010-01-07
3
Medium Priority
?
328 Views
Last Modified: 2013-12-06
How can you identify the hash algorithm used to encrypt the passwords in /etc/shadow on a red hat linux enterprise system? I read about /etc/security/crypt.conf  for Solaris, what about RHLE release 4/5?
0
Comment
Question by:pma111
  • 2
3 Comments
 
LVL 26

Accepted Solution

by:
gtworek earned 500 total points
ID: 26198256
You can manage you algorithm using "authconfig --passalgo" command. Look at https://www.redhat.com/docs/manuals/enterprise/RHEL-4-Manual/release-notes/U7/x86/ar01s03.html
0
 
LVL 3

Author Comment

by:pma111
ID: 26198364
Thanks for the link, I cant see the default hash function though for Red Hat, just a way to use SHA-256 or SHA-512 if so desired. my password hashes are 34 characters long, but I want to verify what hashing algorithm is in use, not what can be used to hash them
0
 
LVL 3

Author Comment

by:pma111
ID: 26198577
0

Featured Post

 [eBook] Windows Nano Server

Download this FREE eBook and learn all you need to get started with Windows Nano Server, including deployment options, remote management
and troubleshooting tips and tricks

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In order for businesses to be compliant with certain information security laws in some countries, you need to be able to prove that a user (which user it was becomes important to the business to take action against the user after an event has occurr…
The purpose of this article is to demonstrate how we can upgrade Python from version 2.7.6 to Python 2.7.10 on the Linux Mint operating system. I am using an Oracle Virtual Box where I have installed Linux Mint operating system version 17.2. Once yo…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question