ecryptfs-devel team mailing list archive
-
ecryptfs-devel team
-
Mailing list archive
-
Message #00069
Re: unable to mount old filesystem
On Mon, Oct 5, 2009 at 12:16 PM, Dave Hansen <dave@xxxxxxxx> wrote:
> How big was that salt? I'm just thinking of the UNIX password salts
> that were only 12 bits or so. They were intended to be brute-forced
> through at each login. If it is small, perhaps it is worth just
> scripting it to try and recover.
See ecryptfs-utils/src/include/ecryptfs.h:
#define ECRYPTFS_SALT_SIZE 8
#define ECRYPTFS_SALT_SIZE_HEX (ECRYPTFS_SALT_SIZE*2)
#define ECRYPTFS_DEFAULT_SALT_HEX "0011223344556677"
#define ECRYPTFS_DEFAULT_SALT_FNEK_HEX "9988776655443322"
So that 16 hex digits, 16^16, which is pretty big.
By my calculations, if you try 1000 salts per second, it would take
you 585 million years in the worst case to crack it.
:-Dustin
References