The smbpassword hashes are used for encryption. The SMB password hash
is the secret shared between the client and the server - the Unix
password hash is NOT. Symmetric cryptography needs shared secrets -
whether to send them in cleartext over the network or store them on disk
is a matter of choice.
> > SMB password encryption in it's current form just doesn't seem (to me)
> > worth the trouble of keeping a separate password database, incompatible
> > with anything else.
>
> And your choice is? All you have are hashes. You can not reverse
> the hashing. If you don't have the NTLM hashes, you can not generate them
> from the one-way hashes in the shadow file or anywhere else. And without
> them you are not going to be able to authenticate against the NTLM challenge
> response system. They don't give you a password to validate.
They can be convinced to do so, by editing the registry. (But you already
knew that. Surely you must have read the documentation for Samba)
Anyway, most (if not all) of this is way off-topic, so this will be my
last posting on this matter.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/