IPv4 Address:-
IPv6 Address:-
Service Provider:-
SSL Information:-
HTTP Protocol:-
Database:-
Web:-
Blog Menu


Search articles:
 

Recent articles (showing 61-69 out of 69):

 
Switching from MD5 to Blowfish/SHA512 password hashes in FreeBSD [27/Sep/2010]   Installing Samba (for windows file sharing) in FreeBSD     Booting FreeBSD from GPT (for large disks)  

WARNING: This post has been marked as obsolete and may be incorrect. It is kept for archival purposes only. By default, FreeBSD uses MD5 hashes for its encrypted passwords for users (SHA512 for FreeBSD 9.1+).  However, blowfish is available in all recent versions of FreeBSD and it’s really easy to change the default...

Edit the file /etc/login.conf and change the following line:

:passwd_format=md5:\ Copy

To read the following:

:passwd_format=blf:\ Copy

Then rebuild the login database with the following command:

cap_mkdb /etc/login.conf Copy

Now all passwords you change or set when adding a user will be encrypted using blowfish.  You can change your current password with passwd and when changed, your password will be blowfish encrypted.

If your system uses MD5, it's preferrable to change over to Blowfish as it’s more secure... However, if your system supports SHA512 you should prefer this (passwd_format=sha512) – except for very few situations. (SHA512 is supported in FreeBSD 9.1+ only)

DirectAdmin requires the system to use md5 not blowfish or sha512, otherwise you will never be able to login to your DA web console.

  Installing Samba (for windows file sharing) in FreeBSD     Booting FreeBSD from GPT (for large disks)  
Copyright © 2024 Daniel Austin MBCS.
Proudly hosted using the FreeBSD operating system.
 
E-mail me
PGP Key
E-mail me
LOGGED IN
Login
padlock icon
LOGIN ERROR#123: random error here