|
Message-ID: <8adc88580601071449y6dab17baoc17da27be6965499@mail.gmail.com> Date: Sun, 8 Jan 2006 09:49:57 +1100 From: atstake atstake <atstake@...il.com> To: john-users@...ts.openwall.com Subject: breaking the same password stored in different format I have some users who use the same password for samba, imap (cyrus), pop3, proxy squid in Linux and also for local windows login. The passwords have both upper/lower-case characters, numbers and meta-characters and are >8 characters in length. Now, if I run john against /etc/shadow & break a password in less than an hour, can I make a safe assumption that the same password that is used to authenticate users in POP3, IMAP, Samba, Proxy and Windows can also be compromised in that exact amount of time? Given that they all have different mechanims as to how they store passwords this should not be possible or is it?
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.