irc:
if: fork = false
channels:
- - "chat.freenode.net#httpd-dev"
+ - "irc.libera.chat#httpd-dev"
email:
if: fork = false
recipients:
.el .ne 3
.IP "\\$1" \\$2
..
-.TH "HTDBM" 1 "2020-10-09" "Apache HTTP Server" "htdbm"
+.TH "HTDBM" 1 "2021-07-09" "Apache HTTP Server" "htdbm"
.SH NAME
htdbm \- Manipulate DBM password databases
When using the \fBcrypt()\fR algorithm, note that only the first 8 characters of the password are used to form the password\&. If the supplied password is longer, the extra characters will be silently discarded\&.
.PP
-The SHA hashing format does not use salting: for a given password, there is only one hashed representation\&. The \fBcrypt()\fR and MD5 formats permute the representation by prepending a random salt string, to make dictionary attacks against the passwords more difficult\&.
+The SHA hashing option does not use salting: for a given password, there is only one hashed representation\&. The \fBcrypt()\fR and MD5 formats permute the representation by prepending a random salt string, to make dictionary attacks against the passwords more difficult\&.
.PP
The SHA and \fBcrypt()\fR formats are insecure by today's standards\&.
.el .ne 3
.IP "\\$1" \\$2
..
-.TH "HTPASSWD" 1 "2019-07-05" "Apache HTTP Server" "htpasswd"
+.TH "HTPASSWD" 1 "2021-07-09" "Apache HTTP Server" "htpasswd"
.SH NAME
htpasswd \- Manage user files for basic authentication
When using the \fBcrypt()\fR algorithm, note that only the first 8 characters of the password are used to form the password\&. If the supplied password is longer, the extra characters will be silently discarded\&.
.PP
-The SHA-1 hashing option does not use salting: for a given password, there is only one hashed representation\&. The \fBcrypt()\fR and MD5 formats permute the representation by prepending a random salt string, to make dictionary attacks against the passwords more difficult\&.
+The SHA-1 hashing format does not use salting: for a given password, there is only one hashed representation\&. The \fBcrypt()\fR and MD5 formats permute the representation by prepending a random salt string, to make dictionary attacks against the passwords more difficult\&.
.PP
The SHA-1 and \fBcrypt()\fR formats are insecure by today's standards\&.