Differences in password hash calculations

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
0
down vote

favorite












I would like to make sure I understand the /etc/shadow file, especially the salt/hash part.

Each line is in the format:



username:passwd:last:may:must:warn:expire:disable:reserved


The passwd field is in the format : $x$salt$hash



Now, I take the hash (from the root user for example) and translate it in base64 (standard) with the command:



tr ./0-9A-Za-z A-Za-z0-9+/ hash


Why does an online hash calculator of "salt+password" give a different result?



I use a SHA-512 hash function according to the $6$ before the salt value.

I compare the two hash strings in the base64 standard encoding.

I can create the same hash string with the mkpasswd command using the salt but I can't figure out why I can't do that with an online hash calculator.



Thank you for your help.










share|improve this question









New contributor




Maxence Faldor is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.























    up vote
    0
    down vote

    favorite












    I would like to make sure I understand the /etc/shadow file, especially the salt/hash part.

    Each line is in the format:



    username:passwd:last:may:must:warn:expire:disable:reserved


    The passwd field is in the format : $x$salt$hash



    Now, I take the hash (from the root user for example) and translate it in base64 (standard) with the command:



    tr ./0-9A-Za-z A-Za-z0-9+/ hash


    Why does an online hash calculator of "salt+password" give a different result?



    I use a SHA-512 hash function according to the $6$ before the salt value.

    I compare the two hash strings in the base64 standard encoding.

    I can create the same hash string with the mkpasswd command using the salt but I can't figure out why I can't do that with an online hash calculator.



    Thank you for your help.










    share|improve this question









    New contributor




    Maxence Faldor is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.





















      up vote
      0
      down vote

      favorite









      up vote
      0
      down vote

      favorite











      I would like to make sure I understand the /etc/shadow file, especially the salt/hash part.

      Each line is in the format:



      username:passwd:last:may:must:warn:expire:disable:reserved


      The passwd field is in the format : $x$salt$hash



      Now, I take the hash (from the root user for example) and translate it in base64 (standard) with the command:



      tr ./0-9A-Za-z A-Za-z0-9+/ hash


      Why does an online hash calculator of "salt+password" give a different result?



      I use a SHA-512 hash function according to the $6$ before the salt value.

      I compare the two hash strings in the base64 standard encoding.

      I can create the same hash string with the mkpasswd command using the salt but I can't figure out why I can't do that with an online hash calculator.



      Thank you for your help.










      share|improve this question









      New contributor




      Maxence Faldor is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      I would like to make sure I understand the /etc/shadow file, especially the salt/hash part.

      Each line is in the format:



      username:passwd:last:may:must:warn:expire:disable:reserved


      The passwd field is in the format : $x$salt$hash



      Now, I take the hash (from the root user for example) and translate it in base64 (standard) with the command:



      tr ./0-9A-Za-z A-Za-z0-9+/ hash


      Why does an online hash calculator of "salt+password" give a different result?



      I use a SHA-512 hash function according to the $6$ before the salt value.

      I compare the two hash strings in the base64 standard encoding.

      I can create the same hash string with the mkpasswd command using the salt but I can't figure out why I can't do that with an online hash calculator.



      Thank you for your help.







      passwd shadow base64






      share|improve this question









      New contributor




      Maxence Faldor is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      share|improve this question









      New contributor




      Maxence Faldor is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      share|improve this question




      share|improve this question








      edited 5 mins ago









      Kusalananda

      110k14213337




      110k14213337






      New contributor




      Maxence Faldor is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      asked 11 mins ago









      Maxence Faldor

      1




      1




      New contributor




      Maxence Faldor is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.





      New contributor





      Maxence Faldor is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      Maxence Faldor is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.

























          active

          oldest

          votes











          Your Answer







          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "106"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          convertImagesToLinks: false,
          noModals: false,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );






          Maxence Faldor is a new contributor. Be nice, and check out our Code of Conduct.









           

          draft saved


          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f475693%2fdifferences-in-password-hash-calculations%23new-answer', 'question_page');

          );

          Post as a guest



































          active

          oldest

          votes













          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes








          Maxence Faldor is a new contributor. Be nice, and check out our Code of Conduct.









           

          draft saved


          draft discarded


















          Maxence Faldor is a new contributor. Be nice, and check out our Code of Conduct.












          Maxence Faldor is a new contributor. Be nice, and check out our Code of Conduct.











          Maxence Faldor is a new contributor. Be nice, and check out our Code of Conduct.













           


          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f475693%2fdifferences-in-password-hash-calculations%23new-answer', 'question_page');

          );

          Post as a guest













































































          Popular posts from this blog

          How to check contact read email or not when send email to Individual?

          Bahrain

          Postfix configuration issue with fips on centos 7; mailgun relay