Hi, Following is in /etc/security/pam_pwcheck.conf password: blowfish nullok Manual says it will truncate at 97 or so chars. So why does passwd truncate at 8????? Verified on 2 systems, and seen by others. BB, Arjen
What does your pam_unix2.conf says in the password line? I have md5 instead of blowfish on both files and they don't get truncated... Arjen Runsink wrote:
Hi,
Following is in /etc/security/pam_pwcheck.conf
password: blowfish nullok
Manual says it will truncate at 97 or so chars.
So why does passwd truncate at 8?????
Verified on 2 systems, and seen by others.
BB, Arjen
-- +------------------------------------------ | José J. Cintrón - <jcintron@mitre.org> +------------------------------------------
Hi On Friday 14 May 2004 22:50, Jose J. Cintron wrote:
What does your pam_unix2.conf says in the password line? I have md5 instead of blowfish on both files and they don't get truncated... Arjen Runsink wrote:
Following is in /etc/security/pam_pwcheck.conf password: blowfish nullok Manual says it will truncate at 97 or so chars. 72 I just reread So why does passwd truncate at 8?????
And in pam_unix2.conf there is: password: blowfish nullok So this could be a blowfish only thing? Are you running 9.0 or 9.1???? BB, Arjen
i'm running 8.2. try using md5 too see if it's a bug in the blowfish implementation... Arjen Runsink wrote:
Hi
On Friday 14 May 2004 22:50, Jose J. Cintron wrote:
What does your pam_unix2.conf says in the password line? I have md5 instead of blowfish on both files and they don't get truncated... Arjen Runsink wrote:
Following is in /etc/security/pam_pwcheck.conf password: blowfish nullok Manual says it will truncate at 97 or so chars.
72 I just reread
So why does passwd truncate at 8?????
And in pam_unix2.conf there is: password: blowfish nullok
So this could be a blowfish only thing?
Are you running 9.0 or 9.1????
BB, Arjen
-- +------------------------------------------ | José J. Cintrón - <jcintron@mitre.org> +------------------------------------------
On Fri, 2004-05-14 at 21:56, Jose J. Cintron wrote:
i'm running 8.2. try using md5 too see if it's a bug in the blowfish implementation...
Arjen Runsink wrote:
Hi
On Friday 14 May 2004 22:50, Jose J. Cintron wrote:
What does your pam_unix2.conf says in the password line? I have md5 instead of blowfish on both files and they don't get truncated... Arjen Runsink wrote:
Following is in /etc/security/pam_pwcheck.conf password: blowfish nullok Manual says it will truncate at 97 or so chars.
72 I just reread
So why does passwd truncate at 8?????
And in pam_unix2.conf there is: password: blowfish nullok
So this could be a blowfish only thing?
Are you running 9.0 or 9.1????
BB, Arjen
Same pbm on 9.1. Password gets truncated if I use passwd from the command line even though I chose MD5. Only way is to use the user management tool in YAST2 wallaby:/media # cat /etc/security/pam_pwcheck.conf password: md5 nullok wallaby:/media # cat /etc/security/pam_unix2.conf auth: nullok account: password: md5 nullok session: none /Fred
my /etc/security/pam_pwcheck.conf reads... password: md5 use_cracklib nullok give that one a shot and see what happens... Frederic Soulier wrote:
On Fri, 2004-05-14 at 21:56, Jose J. Cintron wrote:
i'm running 8.2. try using md5 too see if it's a bug in the blowfish implementation...
Arjen Runsink wrote:
Hi
On Friday 14 May 2004 22:50, Jose J. Cintron wrote:
What does your pam_unix2.conf says in the password line? I have md5 instead of blowfish on both files and they don't get truncated... Arjen Runsink wrote:
Following is in /etc/security/pam_pwcheck.conf password: blowfish nullok Manual says it will truncate at 97 or so chars.
72 I just reread
So why does passwd truncate at 8?????
And in pam_unix2.conf there is: password: blowfish nullok
So this could be a blowfish only thing?
Are you running 9.0 or 9.1????
BB, Arjen
Same pbm on 9.1. Password gets truncated if I use passwd from the command line even though I chose MD5. Only way is to use the user management tool in YAST2
wallaby:/media # cat /etc/security/pam_pwcheck.conf password: md5 nullok
wallaby:/media # cat /etc/security/pam_unix2.conf auth: nullok account: password: md5 nullok session: none
/Fred
-- +------------------------------------------ | José J. Cintrón - <jcintron@mitre.org> | | MITRE Corporation | 7515 Colshire Drive | Mail Stop W424 | McLean, VA 22102-7508 | | Phone: 703.883.3040 | Fax: 703.883.1397 +------------------------------------------
Hi all, This must be a bug in passwd. On Friday 14 May 2004 22:56, Jose J. Cintron wrote:
i'm running 8.2. try using md5 too see if it's a bug in the blowfish
password: blowfish nullok Manual says it will truncate at 97 or so chars. 72 I just reread
It truncates with DES, MD5 and blowfish When using yast to modify a user password +8 long pws work. Explicitely setting an allowable password length seems to work however. # cat pam_pwcheck.conf | grep maxlen password: minlen=6 maxlen=16 cracklib md5 nullok
another thing that may help even thought the file comments say that is ignored if using md5 or blowfish is pc> cat /etc/login.defs | grep PASS_MAX_LEN PASS_MAX_LEN 255 The comments for this setting say # # Number of significant characters in the password for crypt(). # Default is 8, don't change unless your crypt() is better. # Ignored if the "md5" or "blowfish" option is given to the # pam_pwcheck module. # but it may be worth a try if everything else fails. Arjen Runsink wrote:
Hi all,
This must be a bug in passwd.
On Friday 14 May 2004 22:56, Jose J. Cintron wrote:
i'm running 8.2. try using md5 too see if it's a bug in the blowfish
password: blowfish nullok Manual says it will truncate at 97 or so chars.
72 I just reread
It truncates with DES, MD5 and blowfish When using yast to modify a user password +8 long pws work.
Explicitely setting an allowable password length seems to work however.
# cat pam_pwcheck.conf | grep maxlen password: minlen=6 maxlen=16 cracklib md5 nullok
-- +------------------------------------------ | José J. Cintrón - <jcintron@mitre.org> | | MITRE Corporation | 7515 Colshire Drive | Mail Stop W424 | McLean, VA 22102-7508 | | Phone: 703.883.3040 | Fax: 703.883.1397 +------------------------------------------
participants (3)
-
Arjen Runsink
-
Frederic Soulier
-
Jose J. Cintron