Questions tagged [hash]
114 questions
5
votes
2 answers
Do multiple Nginx servers load balance the same IP address to the same backend with the ip_hash directive?
I have two separate Nginx machines. The domain uses round-robin DNS and has two A records, one for each of the two frontend Nginx server.
Both Nginx servers use the ip_hash directive and proxy requests to the same backend servers.
Will an IP…

Justin Meltzer
- 711
- 1
- 9
- 19
5
votes
1 answer
How to distribute files and folders to handle large number of files
I want to manage a huge number of files on my server (say millions). It is needed to save files in two or three levels of folders to keep the number of files in each folder low. On the other hand, it is not good to have many folders to spend…

Googlebot
- 1,047
- 2
- 15
- 30
4
votes
3 answers
How does "your new password must differ at least n characters from the previous" work when only hash codes are stored?
I am wondering how the password policy "your new password must differ at least n characters from your old password" works.
My understanding is that the OS never actually stores the old passwords themselves, but their hash codes instead. And there is…

Honza Zidek
- 210
- 2
- 14
4
votes
1 answer
How to organize millions of static files to serve efficiently over the web?
I'd like to create a service to serve several hundred thousand smaller files (from 5kb to 500kb, mostly around 10-100kb). Think of it as a kind of gravatar.com which serves those little avatar pics on URLs like…

user168080
- 41
- 2
4
votes
3 answers
Any way to see an Active Directory password?
Before you jump to conclusions, let me explain. We have a password reset tool that is not working. For some reason when you use it, it resets your password to some unknown value (Not what you changed it to, or what it was before). I have setup a…

balentaw
- 143
- 1
- 1
- 4
4
votes
1 answer
John the Ripper Custom Rule
I am using John the Ripper to crack passwords in a copy of the passwd file at my work. I want to alert users that have weak passwords. I happen to know that many accounts have the default password which is different for every user but matches a…

jamesbtate
- 567
- 2
- 6
- 14
4
votes
2 answers
Can "tar" backup incrementally?
I have my home folder with a few GB.
Is it possible to run tar on it, create a home.tar.gz, and then for changed files, it creates home1.tar.gz only with modified files from previous tar (thus being an incremental backup)?
I would like to check the…

Somebody still uses you MS-DOS
- 285
- 1
- 4
- 13
3
votes
1 answer
How to use SHA-256 hashed (and salted) passwords from OpenLDAP in pam_ldap?
I have hashed and salted passwords in OpenLDAP for login via PAM in Linux. The setup works when the hashes are of type SHA-1 (salted or unsalted) or plain text. In these cases everything works fine and a user can login with these credentials.
If I…

mailq
- 17,023
- 2
- 37
- 69
3
votes
1 answer
Should Chrome's SHA-1 match OpenSSL's?
If I compare the SHA-1 shown for the certificate for https://0000.jp in Chrome:
79 72 28 12 74 83 85 DE 3C B0 DE E7 A4 C3 14 BE B4 93 79 6E
with that presented by OpenSSL:
$ echo -n | openssl s_client -connect 0000.jp:443 2>/dev/null | openssl x509…

rich
- 158
- 6
3
votes
1 answer
SHA-2 signed SSL certificate crashes apache on startup on CentOS 5.X
In preparation of the warnings that are going to start showing up in browsers when visiting SSL sites with SHA1 signed certificates, I wanted to get all of the certs that I have upgraded.
Some of my infrastructure is running on "legacy" CentOS 5.X…

Steakfest
- 51
- 1
- 5
3
votes
1 answer
ssh key with image fingerprint
SSH key fingerprint is shown by running this command:
ssh-keygen -lf /etc/ssh/ssh_host_rsa_key.pub
and the fingerprint is some strange code. Is there a way to turn this code into an image hash or something like Gravatar?

RamyenHead
- 311
- 3
- 6
- 11
3
votes
1 answer
Deprecation of RSA-SHA-1 in DKIM keys?
I recently noticed that opendkim on my mail server is objecting to DKIM signatures from a client, saying their key is insecure. It may be that that's due to lack of secure DNS (confirmation?) but I also noticed that the signing algorithm is shown…

mc0e
- 5,866
- 18
- 31
3
votes
2 answers
Couchdb attachment hashes don't match attachment content
While doing some auditing of a database, I found that some attachment content did not match the hashes given in the document's _attachments map.
I tested this by downloading the document and calculating its hash. Comparing that to couchdb showed…

vezult
- 420
- 2
- 6
- 15
3
votes
2 answers
changing shadow hash algorithm to bcrypt: how to rehash
I want to change my SHA512 shadow file to use bcrypt as shown in this question/answer: Enable blowfish-based hash support for crypt
The problem is that i run into a chicken and egg problem, because the existing shadow-file is SHA512 encrypted, which…

Fabian Zeindl
- 239
- 1
- 3
- 10
3
votes
1 answer
Php: How to enable blowfish hashing on a debian server
I'm trying to make blowfish hashing available to php on a debian server.
Taken from the php manual on the crypt() function ( http://php.net/manual/en/function.crypt.php ), the following code checks for cryptographic functions...

Kzqai
- 1,278
- 4
- 18
- 32