Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
05-15-2006, 09:25 PM
|
#1
|
Member
Registered: Aug 2004
Location: Maine
Distribution: Gentoo Linux
Posts: 239
Rep:
|
help me understand salted hashes
If unix crypt hashes contain a salt, for example an MD5 crypt, can anyone explain to me basicly how John The Ripper or other password auditing programs find out what the salt is before encrypting a cleartext word using the same algorithm and matching it against the encrypted hash to see if it cracked the password.
(For a non-real example) if the salt was 'foobar' and the password was 'password' how would it know what the salt was to crack foobarpasswordfoobar? Apparently adding the salt makes cracking this type of hash take more work compared to Windows LM type hashes which can be cracked fairly quickly.
Last edited by GUIPenguin; 05-15-2006 at 09:27 PM.
|
|
|
05-15-2006, 09:35 PM
|
#2
|
LQ Guru
Registered: Oct 2003
Location: Waiheke NZ
Distribution: Ubuntu
Posts: 9,211
Rep: 
|
|
|
|
05-15-2006, 09:40 PM
|
#3
|
Member
Registered: Aug 2004
Location: Maine
Distribution: Gentoo Linux
Posts: 239
Original Poster
Rep:
|
"Because Unix, Linux, and Mac OS X all use a 12-bit random variable called "salt" in their password schemes. It takes longer to crack a hash value with salt added, because that 12-bit variable generates 4,096 more variations to guess. Windows passwords, however, don't have such a random variable. Why Microsoft didn't include one in the password scheme for the latest versions of Windows is a mystery."
That makes sense..Thanks a lot.
|
|
|
05-15-2006, 09:41 PM
|
#4
|
Member
Registered: Apr 2006
Location: Pittsburgh
Distribution: Debian Sid AMD64
Posts: 296
Rep:
|
The salt is stored as the first few characters in the hash output. It sounds stupid, but it's actually still useful - sure, anybody can read the salt and start cracking, but the point is, that they can't start working before they steal your password file. Without the salt, anybody could take the hash of every common password, store it in a database, and crack any number of passwords with it.
|
|
|
05-15-2006, 09:48 PM
|
#5
|
Member
Registered: Aug 2004
Location: Maine
Distribution: Gentoo Linux
Posts: 239
Original Poster
Rep:
|
Quote:
Originally Posted by ataraxia
The salt is stored as the first few characters in the hash output. It sounds stupid, but it's actually still useful - sure, anybody can read the salt and start cracking, but the point is, that they can't start working before they steal your password file. Without the salt, anybody could take the hash of every common password, store it in a database, and crack any number of passwords with it.
|
Makes sense..preventing a person from running a rainbow table set of pre-generated hashes, (time-memory-trade off) of every avalible password for your encryption. Thanks a ton.
Last edited by GUIPenguin; 05-15-2006 at 09:55 PM.
|
|
|
All times are GMT -5. The time now is 10:43 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|