I needed to generate an entry in the /etc/shadow file, without using the standard tools. It turned out it was not a good idea for my needs, but in the meantime I learned a lot about the format of this file and how to manually generate passwords.
Shadow file format
User passwords are stored in the file /etc/shadow. The format of this file is extensively described in the shadow man page. Each line is divided in 9 fields, separated by colons but we are interested only in the 2 first fields, namely username and password.
The password field itself is split in 3 parts, divided by $, for instance
What does that mean?
The first field (in our example $6) tells us which hash function is used. It will usually be 6 (SHA-512) under linux. The values can be found in man crypt, but they are as follow:
ID | Method ───────────────────────────────────────────────────────── 1 | MD5 2a | Blowfish (not in mainline glibc; added in some | Linux distributions) 5 | SHA-256 (since glibc 2.7) 6 | SHA-512 (since glibc 2.7)
The second field is a salt. It is used to make sure that 2 users with the same password would actually end up with 2 different hashes. It is randomly generated at password creation, but technically as we will see it later, it can be manually set. Wikipedia has more information about the cryptographic salt.
The third field is the password with the hash (second field) concatenated, hashed using the function defined in the first field.
How to generate a valid password entry?
For ID 1 (MD5) you can use openssl:
salt=pepper pwd=very_secure openssl passwd -1 -salt $salt $pwd # outputs: $1$pepper$XQ7/iG9IT0XdBll4ApeJQ0
You cannot generate a SAH-256 or SHA-512 hash that way, though. The easiest and generic way would then be to use python or perl. For a salt ‘pepper’ and a password ‘very_secure’, both lines would yeld the same result:
#Pythonista python -c 'import crypt; print crypt.crypt("very_secure", "$6$pepper")' # There is more than one way to do it perl -e 'print crypt("very_secure", "\$6\$pepper\n") . "\n"' # outputs: $6$pepper$P9Wt3.3Uqh9UZbvz5/6UPtHqa4KE/2aeyeXbKm0mpv36Z5aCBv0OQEZ1e.aKcPR6RBYvQIa/ToAfdUX6HjEOL1