> > Are the shadow files MD5? If they are they can be cracked, assuming > you can get the shadow file. (http://www.milw0rm.com/cracker/) (well, > its a brute force technique, but it can be done, with rainbow tables > for md5, but you need i think around 80 gig's of tables[and the shadow > hash]) > No. I don't use MD5. I use normal UNIX passwords ( ala Bob Morris' creation ). BUT, if the shadow file is compromised, you have more to worry about than someone cracking your passwords, becuase they more than likely already have root ( assuming the admin didn't do something stupid ) -- NOT GOOD! -- -- Derrik "I use multi-billion dollar military satellites to find Tupperware hidden in the woods, what do you do?" --- Pirate and Crafty -- http://www.piclist.com PIC/SX FAQ & list archive View/change your membership options at http://mailman.mit.edu/mailman/listinfo/piclist