You also need to change /etc/pam.d/passwd to include the md5 stuff as well: [root@inflammation texts]# cat /etc/pam.d/passwd #%PAM-1.0 auth required /lib/security/pam_pwdb.so shadow nullok account required /lib/security/pam_pwdb.so password required /lib/security/pam_cracklib.so retry=3 password required /lib/security/pam_pwdb.so use_authtok nullok md5 shadow You could alternatively read the documentation at /usr/doc/packages/pam/readme.md5. -miah On Mon, Nov 27, 2000 at 03:31:07PM +0100, Ralf Koch wrote:
Hi semat,
This is how I did it I hope I did not unintentionally open myself up but at least it works. Edit /etc/pam.d/login and edit the line that says password required /lib/security/pam_pwcheck.so nullok md5
the md5 wa added by me I did this because in /etc/login.defs there was a comment saying # number of significant characters in the password for crypt() # ....etc ignored if th "md5" option is given to the pam_pwcheck option obviously I wanted to use md5 thus I added my option and now I can use longer passwords.
I just tried your solution and changed my /etc/pam.d/login to password required /ib/security/pam_pwcheck.so nullok md5 use_cracklib
without any success. The passwords get cut to 8 characters. I am using SuSE 7.0 and of course i'm interested in using longer passwords.
Any ideas?
* * Ihr Formel4-Team * mailto:info@formel4.de *
--------------------------------------------------------------------- To unsubscribe, e-mail: suse-security-unsubscribe@suse.com For additional commands, e-mail: suse-security-help@suse.com