Skip to Content

Encryption Technologies used in Ezeelogin

Encryption algorithms used in Ezeelogin 

 The User passwords and security codes stored in the ezeelogin database uses multiple rounds SHA512, SHA256, BLOWFISH or DES depending on what's supported on the system.

The UNIX System User passwords uses Crypt.

The parameter after the " : "  in /etc/shadow refers the hashing function in use. 

 
mike:$6$rounds=5400$EVtZGbiWEBDsj8gr$SOqIUr6DwFrqWopiWfSa0HLu8J7UfhKZGRvnNH2amL00MhmypPdDzrE69.LEXMaeR.6.4kMaZlwEq42nLH.xv.:18795:0:99999:7:::
 $1$ – MD5
 $2a$ – Blowfish
 $2y$ – Eksblowfish
 $5$ – SHA-256
 $6$ – SHA-512

The SSH private keys, server credentials are encrypted with  4096 bit RSA keys.

The Gateway User SSH logs are encrypted using RC4 which is recognized as the most commonly utilized stream cipher in the world of cryptography. You may read more about RC4 http://en.wikipedia.org/wiki/RC4

Run the following command to find the default Ciphers, MAC , Kex Algorithms supported in the gateway OS

[email protected] sshd -T | grep "\(ciphers\|macs\|kexalgorithms\)"
gssapikexalgorithms gss-gex-sha1-,gss-group1-sha1-,gss-group14-sha1-ciphers [email protected],aes128-ctr,aes192-ctr,aes256-ctr,[email protected],[email protected],aes128-cbc,aes192-cbc,aes256-cbc,blowfish-cbc,cast128-cbc,3des-cbc
 
 
kexalgorithms curve25519-sha256,[email protected],ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1

 

Encryptions used in Ezeelogin

Ezeelogin-encryption-technologies