From: Martin Kraemer Date: Mon, 31 Oct 2005 09:19:17 +0000 (+0000) Subject: Add random notes about possible weaknesses X-Git-Tag: 2.3.0~2810 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=abc0d7d0569a20ab1f6a17d6e601681b841b041c;p=thirdparty%2Fapache%2Fhttpd.git Add random notes about possible weaknesses git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@329779 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/programs/htpasswd.xml b/docs/manual/programs/htpasswd.xml index 294a1a02df6..97c631b1759 100644 --- a/docs/manual/programs/htpasswd.xml +++ b/docs/manual/programs/htpasswd.xml @@ -190,6 +190,15 @@ distribution.

The use of the -b option is discouraged, since when it is used the unencrypted password appears on the command line.

+ +

When using the crypt() algorithm, note that only the first + 8 characters of the password are used to form the password. If the supplied + password is longer, the extra characters will be silently discarded.

+ +

The SHA encryption format does not use salting: for a given password, + there is only one encrypted representation. The crypt() and + MD5 formats permute the representation by prepending a random salt string, + to make dictionary attacks against the passwords more difficult.

Restrictions