<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA generates the same password hashs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-generates-the-same-password-hashs/m-p/1561632#M663779</link>
    <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found out that ASA (8.2 in particular) generates the same password hash for the same password every time.&lt;/P&gt;&lt;P&gt;So, if I enter the same password on the different ASAs the password hash will be the same. And if you decrypt one of them you will know the password for all systems. It's very strange. Moreover, Cisco Routers and Switches generate different password hashs. I understand that these devices use different ecryption algorithms.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Examples.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if I runon ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(config)# username testuser1 password 12345&lt;BR /&gt;(config)# username testuser2 password 12345&lt;BR /&gt;(config)# username testuser3 password 12345&lt;BR /&gt;(config)# username testuser4 password 12345&lt;BR /&gt;(config)# username testuser5 password 12345&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I get:&lt;/P&gt;&lt;P&gt;# sh run | in username testuser&lt;BR /&gt;username testuser3 password oFJjANE3QKoA206w encrypted&lt;BR /&gt;username testuser2 password oFJjANE3QKoA206w encrypted&lt;BR /&gt;username testuser1 password oFJjANE3QKoA206w encrypted&lt;BR /&gt;username testuser5 password oFJjANE3QKoA206w encrypted&lt;BR /&gt;username testuser4 password oFJjANE3QKoA206w encrypted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same &lt;STRONG&gt;oFJjANE3QKoA206w&lt;/STRONG&gt; hash.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Routers:&lt;/P&gt;&lt;P&gt;(config)# username testuser1 secret 12345&lt;BR /&gt;(config)# username testuser2 secret 12345&lt;BR /&gt;(config)# username testuser3 secret 12345&lt;BR /&gt;(config)# username testuser4 secret 12345&lt;BR /&gt;(config)# username testuser5 secret 12345&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Result:&lt;/P&gt;&lt;P&gt;#sh run | in testuser&lt;BR /&gt;username testuser1 secret 5 $1$ni5I$v3Sq5TBrQ7Ty3Eyygg.Sb0&lt;BR /&gt;username testuser2 secret 5 $1$Ecsn$XzGSHF7knxLxskt8Wc3ku1&lt;BR /&gt;username testuser3 secret 5 $1$.0o5$9dZD4RkJa9FF10rMXZpPm.&lt;BR /&gt;username testuser4 secret 5 $1$FJVN$NtM9dY.H238dgS6tOjUzM.&lt;BR /&gt;username testuser5 secret 5 $1$BUAY$PHKM8ksvSOxl9r/U7Ruft/&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Absolutely different hashs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's very strange that ASA (security device) does in this way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe do I need to turn some special service (command) or something like that? Why ASA does it?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 18:53:06 GMT</pubDate>
    <dc:creator>viacheslav.k</dc:creator>
    <dc:date>2019-03-11T18:53:06Z</dc:date>
    <item>
      <title>ASA generates the same password hashs</title>
      <link>https://community.cisco.com/t5/network-security/asa-generates-the-same-password-hashs/m-p/1561632#M663779</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found out that ASA (8.2 in particular) generates the same password hash for the same password every time.&lt;/P&gt;&lt;P&gt;So, if I enter the same password on the different ASAs the password hash will be the same. And if you decrypt one of them you will know the password for all systems. It's very strange. Moreover, Cisco Routers and Switches generate different password hashs. I understand that these devices use different ecryption algorithms.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Examples.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if I runon ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(config)# username testuser1 password 12345&lt;BR /&gt;(config)# username testuser2 password 12345&lt;BR /&gt;(config)# username testuser3 password 12345&lt;BR /&gt;(config)# username testuser4 password 12345&lt;BR /&gt;(config)# username testuser5 password 12345&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I get:&lt;/P&gt;&lt;P&gt;# sh run | in username testuser&lt;BR /&gt;username testuser3 password oFJjANE3QKoA206w encrypted&lt;BR /&gt;username testuser2 password oFJjANE3QKoA206w encrypted&lt;BR /&gt;username testuser1 password oFJjANE3QKoA206w encrypted&lt;BR /&gt;username testuser5 password oFJjANE3QKoA206w encrypted&lt;BR /&gt;username testuser4 password oFJjANE3QKoA206w encrypted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same &lt;STRONG&gt;oFJjANE3QKoA206w&lt;/STRONG&gt; hash.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Routers:&lt;/P&gt;&lt;P&gt;(config)# username testuser1 secret 12345&lt;BR /&gt;(config)# username testuser2 secret 12345&lt;BR /&gt;(config)# username testuser3 secret 12345&lt;BR /&gt;(config)# username testuser4 secret 12345&lt;BR /&gt;(config)# username testuser5 secret 12345&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Result:&lt;/P&gt;&lt;P&gt;#sh run | in testuser&lt;BR /&gt;username testuser1 secret 5 $1$ni5I$v3Sq5TBrQ7Ty3Eyygg.Sb0&lt;BR /&gt;username testuser2 secret 5 $1$Ecsn$XzGSHF7knxLxskt8Wc3ku1&lt;BR /&gt;username testuser3 secret 5 $1$.0o5$9dZD4RkJa9FF10rMXZpPm.&lt;BR /&gt;username testuser4 secret 5 $1$FJVN$NtM9dY.H238dgS6tOjUzM.&lt;BR /&gt;username testuser5 secret 5 $1$BUAY$PHKM8ksvSOxl9r/U7Ruft/&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Absolutely different hashs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's very strange that ASA (security device) does in this way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe do I need to turn some special service (command) or something like that? Why ASA does it?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:53:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-generates-the-same-password-hashs/m-p/1561632#M663779</guid>
      <dc:creator>viacheslav.k</dc:creator>
      <dc:date>2019-03-11T18:53:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA generates the same password hashs</title>
      <link>https://community.cisco.com/t5/network-security/asa-generates-the-same-password-hashs/m-p/1561633#M663797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are right, the ASA was not using a salt to hash the passwords as in IOS. It was practically obfuscating how they showed on the running config, and not hashing them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though, in ASA 8.3 there is a new feature (password encryption) that practically encrypts the passwords (commands &lt;SPAN class="cBold"&gt;key config-key password-encryption&lt;/SPAN&gt;, &lt;SPAN class="cBold"&gt;password encryption aes&lt;/SPAN&gt;) with a passphrase that can be changed on a per box basis, so you will not face this problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Oct 2010 14:52:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-generates-the-same-password-hashs/m-p/1561633#M663797</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-10-12T14:52:45Z</dc:date>
    </item>
    <item>
      <title>The ASA does salt the</title>
      <link>https://community.cisco.com/t5/network-security/asa-generates-the-same-password-hashs/m-p/1561634#M663884</link>
      <description>&lt;P&gt;The ASA does salt the password but it uses the first 4 characters of the username to salt the password. In the example provided, the first 4 characters of all 5 usernames are all the same. Since first 4 are the same the resulting hash is the same. Had he used usernames that had unique first 4 characters, the resulting hash for the same password would have been different.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;IOS salts using the random 24 bit value in between the $ signs. Packet life has an entry about IOS hashing in more detail.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Mar 2017 17:18:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-generates-the-same-password-hashs/m-p/1561634#M663884</guid>
      <dc:creator>Pedro Rivas</dc:creator>
      <dc:date>2017-03-14T17:18:59Z</dc:date>
    </item>
  </channel>
</rss>

