On Oct 12, 2020, at 9:44 PM, Robert Armstrong
<bob at jfcl.com> wrote:
Peter Lothberg <roll at stupi.com> wrote:
So if you can read sysuaf.dat.......
? VMS has "one way" password encryption (like Un*x) so you can't get
an account's password by reading the SYSUAF file (well, OK you can
guess it, but only by very brute force).? So you could figure out
which accounts were privileged, but it wouldn't automatically give
you access to those accounts.
RSTS used to have plain text passwords (in RAD50, so case insensitive
and limited to 6 alphanumerics.? That changed in V8 with its new file
structure, which also added "account attributes".? One of them is a
hashed password, 14 ASCII characters run through a one way hash
function constructed from a slightly modified DES.? The "slightly
modified" was so you couldn't use a DES chip as a search engine.