<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Algorithm for encrypting passwords in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/algorithm-for-encrypting-passwords/m-p/3534734#M745697</link>
    <description>Please could someone advise me of the algorithm used to encrypt users passwords in HP-UX 11 in both Trusted and Standard mode (if they are different) thanks,  Richard</description>
    <pubDate>Fri, 29 Apr 2005 06:05:54 GMT</pubDate>
    <dc:creator>Richard Vinnicombe</dc:creator>
    <dc:date>2005-04-29T06:05:54Z</dc:date>
    <item>
      <title>Algorithm for encrypting passwords</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/algorithm-for-encrypting-passwords/m-p/3534734#M745697</link>
      <description>Please could someone advise me of the algorithm used to encrypt users passwords in HP-UX 11 in both Trusted and Standard mode (if they are different) thanks,  Richard</description>
      <pubDate>Fri, 29 Apr 2005 06:05:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/algorithm-for-encrypting-passwords/m-p/3534734#M745697</guid>
      <dc:creator>Richard Vinnicombe</dc:creator>
      <dc:date>2005-04-29T06:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: Algorithm for encrypting passwords</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/algorithm-for-encrypting-passwords/m-p/3534735#M745698</link>
      <description>Why do u require it first of all?&lt;BR /&gt;&lt;BR /&gt;I am sure only HP Lab engineers would be aware of any such algorithm.&lt;BR /&gt;&lt;BR /&gt;Regards</description>
      <pubDate>Fri, 29 Apr 2005 06:15:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/algorithm-for-encrypting-passwords/m-p/3534735#M745698</guid>
      <dc:creator>Suraj Singh_1</dc:creator>
      <dc:date>2005-04-29T06:15:36Z</dc:date>
    </item>
    <item>
      <title>Re: Algorithm for encrypting passwords</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/algorithm-for-encrypting-passwords/m-p/3534736#M745699</link>
      <description>A request by my government accreditor to get some assurance it will meet UK minimum standards.&lt;BR /&gt;&lt;BR /&gt;I found an HP-UX security white paper written by Mike Jerbik of HP which states the various algorithms used in the product but it doesn't say which ones are used for which applications.  Some are obvious i.e. for signing and key exchange, others could all be used to support a basic password encryption function.  I just need to know which it is.&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;&lt;BR /&gt;RV</description>
      <pubDate>Fri, 29 Apr 2005 06:25:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/algorithm-for-encrypting-passwords/m-p/3534736#M745699</guid>
      <dc:creator>Richard Vinnicombe</dc:creator>
      <dc:date>2005-04-29T06:25:10Z</dc:date>
    </item>
    <item>
      <title>Re: Algorithm for encrypting passwords</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/algorithm-for-encrypting-passwords/m-p/3534737#M745700</link>
      <description>Hi Richard,&lt;BR /&gt;&lt;BR /&gt;The HP-UX PAM modules use the crypt command which simulates a one rotor 256 element rotor similar to the German Enigma system.&lt;BR /&gt;Also the crypt command uses the makekey command which takes the salt value provided to the crypt command to select one of 4096 cryptographic machines all based on the DES standard algorithm.&lt;BR /&gt;man crypt &amp;amp; makekey for further details.&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jeff</description>
      <pubDate>Fri, 29 Apr 2005 08:22:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/algorithm-for-encrypting-passwords/m-p/3534737#M745700</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2005-04-29T08:22:39Z</dc:date>
    </item>
    <item>
      <title>Re: Algorithm for encrypting passwords</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/algorithm-for-encrypting-passwords/m-p/3534738#M745701</link>
      <description>Thanks for that, should keep the authorities happy for a bit longer.  Cheers, RV</description>
      <pubDate>Fri, 29 Apr 2005 08:26:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/algorithm-for-encrypting-passwords/m-p/3534738#M745701</guid>
      <dc:creator>Richard Vinnicombe</dc:creator>
      <dc:date>2005-04-29T08:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: Algorithm for encrypting passwords</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/algorithm-for-encrypting-passwords/m-p/3534739#M745702</link>
      <description>Actually, the details are quite explicit (and haven't changed for more than 20 years) in the man pages for:&lt;BR /&gt; &lt;BR /&gt;man 4 passwd&lt;BR /&gt;man crypt&lt;BR /&gt;man makekey&lt;BR /&gt; &lt;BR /&gt;The system is based on the German Enigma machine, a mechanical encryption device used during WW2. The software system uses 256 rotors (mechanically difficult) and some other techniques to keep the password encryption at a high level. Note that this encryption method is 'lossy' in that there is no method to directly decode the password. Or more accurately, several strings can encrypt to the same value.&lt;BR /&gt; &lt;BR /&gt;The weakness in the Unix password is due to human nature. If you have an encrypted password string, you could try guessing millions of words and numbers until a match is found (the result matches the encrypted target password). By hand, this is impossible to accomplish in a reasonable time period, but by computer, this can be attempted using giant dictionaries along with common number and special character substitution. Current stats show that passwords can be guessed for about 40-60% of typical user accounts.&lt;BR /&gt; &lt;BR /&gt;That's why it is never recommended to use the standard Unix method for password storage (/etc/passwd) but to use the TCB method (called Trusted in HP-UX) or shadow password system. In this way, the encrypted password is hidden in a root-only directory. Trusted systems use the same encryption method but remove the limitation of 8 character passwords.&lt;BR /&gt; &lt;BR /&gt;Have your auditors use Google to search for:&lt;BR /&gt;Unix passwords Enigma &lt;BR /&gt;to see the history and background details.</description>
      <pubDate>Fri, 29 Apr 2005 11:10:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/algorithm-for-encrypting-passwords/m-p/3534739#M745702</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2005-04-29T11:10:40Z</dc:date>
    </item>
    <item>
      <title>Re: Algorithm for encrypting passwords</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/algorithm-for-encrypting-passwords/m-p/3534740#M745703</link>
      <description>Thanks also for this, I had a look at the Trusted mode and what it can do in terms of advanced password features and also the TCSEC C2 assurance the overall OS has.&lt;BR /&gt;&lt;BR /&gt;I'd be keen to know if the authentication modules in the trusted mode have been included in an ITSEC or Common Criteria Target of Evaluation and any resulting E/EAL value achieved.&lt;BR /&gt;&lt;BR /&gt;Many thanks,&lt;BR /&gt;&lt;BR /&gt;Richard</description>
      <pubDate>Fri, 29 Apr 2005 11:58:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/algorithm-for-encrypting-passwords/m-p/3534740#M745703</guid>
      <dc:creator>Richard Vinnicombe</dc:creator>
      <dc:date>2005-04-29T11:58:17Z</dc:date>
    </item>
  </channel>
</rss>

