| Summary: | /usr/libexec/makekey doesn't grok modern passwords | ||
|---|---|---|---|
| Product: | Base System | Reporter: | Poul-Henning Kamp <phk> |
| Component: | bin | Assignee: | freebsd-bugs (Nobody) <bugs> |
| Status: | Closed FIXED | ||
| Severity: | Affects Only Me | ||
| Priority: | Normal | ||
| Version: | 5.0-CURRENT | ||
| Hardware: | Any | ||
| OS: | Any | ||
|
Description
Poul-Henning Kamp
2001-09-17 13:10:00 UTC
On Mon, Sep 17, 2001 at 02:08:23PM +0200, Poul-Henning Kamp wrote: > > the /usr/libexec/makekey program only works with 2 char salts > and <= 8 char passwords. This means that the program cannot > be used with MD5 passwords. > > The fact that nobody has noticed is probably indicative of how > much use this program sees (ie: none) and therefore the necessary > API/ABI changes should not give rise to trouble. > It's used by usr.bin/enigma/enigma.c. > I would suggest reading the salt and password from each their own > line, that would solve the problem once and for all since niether > can contain newlines. -- Ruslan Ermilov Oracle Developer/DBA, ru@sunbay.com Sunbay Software AG, ru@FreeBSD.org FreeBSD committer, +380.652.512.251 Simferopol, Ukraine http://www.FreeBSD.org The Power To Serve http://www.oracle.com Enabling The Information Age See also PR bin/28885 where I raised this issue. Kris K. suggested the "openssl passwd" command as a suitable alternative. State Changed From-To: open->closed The openssl password workaround seems to be the suggested solution for this, rather than extending makekey. |