Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <8adc88580601071449y6dab17baoc17da27be6965499@mail.gmail.com>
Date: Sun, 8 Jan 2006 09:49:57 +1100
From: atstake atstake <atstake@...il.com>
To: john-users@...ts.openwall.com
Subject: breaking the same password stored in different format

I have some users who use the same password for samba, imap (cyrus),
pop3, proxy squid in Linux and also for local windows login. The
passwords have both upper/lower-case characters, numbers and
meta-characters and are >8 characters in length.

Now, if I run john against /etc/shadow & break a password in less than
an hour, can I make a safe assumption that the same password that is
used to authenticate users in POP3, IMAP, Samba, Proxy and Windows can
also be compromised in that exact amount of time? Given that they all
have different mechanims as to how they store passwords this should
not be possible or is it?

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.