|
Message-ID: <Y0hSqVkOjFRBIypL@c720-r368166> Date: Thu, 13 Oct 2022 20:02:17 +0200 From: Matthias Apitz <guru@...xarea.de> To: john-users@...ts.openwall.com Subject: Re: using john to decrypt DES hashes El día jueves, octubre 13, 2022 a las 06:07:02p. m. +0200, Solar Designer escribió: > On Thu, Oct 13, 2022 at 03:55:32PM +0200, Matthias Apitz wrote: > > Do I understand you correct: I yescrypt all DES strings in the database > > and when the user presents the PIN 4711 I first crypt the with DES and > > the old salt 'xX' and the result with yescrypt and the stored "$y$...." > > salt and when this match the user is authenticated, correct? > > That's correct. > > In your example, though, a 4-digit PIN is too weak even when you use > yescrypt. You'll probably want to also introduce a password policy, > such as by using our passwdqc. Thanks. I didn't wanted to stress with all details. The PIN can be upto 40 bytes long (minimum is 11), is broken into pieces of 8 and DES encrypted each part, resulting hashes are then concatenated with the salt only once in front of the concatenation. This is some kind of standard procedure, I don't remember it's name now. matthias -- Matthias Apitz, ✉ guru@...xarea.de, http://www.unixarea.de/ +49-176-38902045 Public GnuPG key: http://www.unixarea.de/key.pub
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.