
hello, is there any probram come with suse 6.3 to allow users have password more than 8 characters, or do i need to compile ? Is this called md5, ?

Ertan Sekmen wrote:
hello, is there any probram come with suse 6.3 to allow users have password more than 8 characters, or do i need to compile ? Is this called md5, ?
Edit your /etc/login.defs file in order to have : MD5_CRYPT_ENAB yes This is a standard feature of the Shadow Passwords suite, so I think it should work flawlessly with Suse 6.3, but I didn't check it. Nowadays MD5 encrypted passwords is a must IMHO. Best regards, -- Frank DENIS aka Jedi/Sector One aka DJ Chrysalis <j@4u.net> -> Software : http://www.jedi.claranet.fr <- -> Music : http://www.mp3.com/chrysalis <-

Edit your /etc/login.defs file in order to have :
MD5_CRYPT_ENAB yes it doesn't have this value, and when i added it returns me unknown item 'md5_crypt_enab'
This is a standard feature of the Shadow Passwords suite, so I think
#rpm -q shadow shadow-19990827-29 any thing else may i missed?

Ertan Sekmen wrote:
it doesn't have this value, and when i added it returns me unknown item 'md5_crypt_enab' #rpm -q shadow shadow-19990827-29
Mmmm... Maybe Suse does not ship the shadow passwords suite with MD5 passwords support (due to export restriction laws ?) . You may want to get the source code and compile it yourself. Compile it the following way : ./configure --enable-md5crypt make make install Best regards, -- Frank DENIS aka Jedi/Sector One aka DJ Chrysalis <j@4u.net> -> Software : http://www.jedi.claranet.fr <- -> Music : http://www.mp3.com/chrysalis <-

Hi,
Ertan Sekmen wrote:
it doesn't have this value, and when i added it returns me unknown item 'md5_crypt_enab' #rpm -q shadow shadow-19990827-29 Mmmm... Maybe Suse does not ship the shadow passwords suite with MD5 passwords support (due to export restriction laws ?) . I don't know what extra restrictions the version shiped to and re-exported from the USA, but this is a limitation in SuSE 6.3.
SuSE 6.3 introduced PAM support, but the PAM support used didn't support MD5. In SuSE 6.4, MD5 is supposed to work with PAM. (In versions before 6.3 it also worked.) SuSE 6.4 is supposed to ship today (German version) and in a few days the English version will be shipped (see webpage), later (when?) there will be the ftp version available. Tobias

On Mon, Mar 27, Tobias Burnus wrote:
Hi,
Ertan Sekmen wrote:
it doesn't have this value, and when i added it returns me unknown item 'md5_crypt_enab' #rpm -q shadow shadow-19990827-29 Mmmm... Maybe Suse does not ship the shadow passwords suite with MD5 passwords support (due to export restriction laws ?) . I don't know what extra restrictions the version shiped to and re-exported from the USA, but this is a limitation in SuSE 6.3.
SuSE 6.3 introduced PAM support, but the PAM support used didn't support
No, we introduced PAM with SuSE Linux 6.2. And PAM supports MD5 hashes, since this is implemented in glibc's crypt() version. So no special md5 support for PAM is needed. But the passwd version was not able to create md5 hashes.
MD5. In SuSE 6.4, MD5 is supposed to work with PAM. (In versions before 6.3 it also worked.)
With SuSE Linux 6.4, passwd is able to create md5 hashes. Thorsten -- Thorsten Kukuk http://www.suse.de/~kukuk/ kukuk@suse.de SuSE GmbH Schanzaeckerstr. 10 90443 Nuernberg Linux is like a Vorlon. It is incredibly powerful, gives terse, cryptic answers and has a lot of things going on in the background.

On Mon, 27 Mar 2000, Jedi/Sector One wrote:
Ertan Sekmen wrote:
it doesn't have this value, and when i added it returns me unknown item 'md5_crypt_enab' #rpm -q shadow shadow-19990827-29
Mmmm... Maybe Suse does not ship the shadow passwords suite with MD5 passwords support (due to export restriction laws ?) . You may want to get the source code and compile it yourself. Compile it the following way :
just use our pam_md5 mudule. Bye, Thomas -- Thomas Biege, SuSE GmbH, Schanzaeckerstr. 10, 90443 Nuernberg E@mail: thomas@suse.de Function: Security Support & Auditing "lynx -source http://www.suse.de/~thomas/thomas.pgp | pgp -fka" Key fingerprint = 09 48 F2 FD 81 F7 E7 98 6D C7 36 F1 96 6A 12 47

On Sun, Mar 26, Jedi/Sector One wrote:
Nowadays MD5 encrypted passwords is a must IMHO.
If it would work, yes. But there are some protocols which doesn't allows passwords longer then 8 characters (md5 cannot change this), and a lot of programs crashes with passwords longer 8 bytes. Thorsten -- Thorsten Kukuk http://www.suse.de/~kukuk/ kukuk@suse.de SuSE GmbH Schanzaeckerstr. 10 90443 Nuernberg Linux is like a Vorlon. It is incredibly powerful, gives terse, cryptic answers and has a lot of things going on in the background.

On Mon, Mar 27, 2000 at 18:53 +0200, Thorsten Kukuk wrote:
On Sun, Mar 26, Jedi/Sector One wrote:
Nowadays MD5 encrypted passwords is a must IMHO.
If it would work, yes. But there are some protocols which doesn't allows passwords longer then 8 characters (md5 cannot change this), and a lot of programs crashes with passwords longer 8 bytes.
Is there a blacklist available to ones setup test against? I wasn't even aware of this fact (and lucky up to now not to hit any of these crashes, it seems). virtually yours 82D1 9B9C 01DC 4FB4 D7B4 61BE 3F49 4F77 72DE DA76 Gerhard Sittig true | mail -s "get gpg key" Gerhard.Sittig@gmx.net -- If you don't understand or are scared by any of the above ask your parents or an adult to help you.
participants (6)
-
Ertan Sekmen
-
Gerhard Sittig
-
Jedi/Sector One
-
Thomas Biege
-
Thorsten Kukuk
-
Tobias Burnus