login.defs: warn about weak choices
According to crypt(5), MD5 and DES should not be used for new hashes. Also the default number of SHA rounds chosen by libc is orders of magnitude too low for modern hardware. Let's warn the users about weak choices. Signed-off-by: Topi Miettinen <toiwoton@gmail.com>
This commit is contained in:
parent
125a5dc309
commit
69301dfa24
@ -327,6 +327,7 @@ CHFN_RESTRICT rwh
|
|||||||
# If set to SHA512, SHA512-based algorithm will be used for encrypting password
|
# If set to SHA512, SHA512-based algorithm will be used for encrypting password
|
||||||
# If set to BCRYPT, BCRYPT-based algorithm will be used for encrypting password
|
# If set to BCRYPT, BCRYPT-based algorithm will be used for encrypting password
|
||||||
# If set to DES, DES-based algorithm will be used for encrypting password (default)
|
# If set to DES, DES-based algorithm will be used for encrypting password (default)
|
||||||
|
# MD5 and DES should not be used for new hashes, see crypt(5) for recommendations.
|
||||||
# Overrides the MD5_CRYPT_ENAB option
|
# Overrides the MD5_CRYPT_ENAB option
|
||||||
#
|
#
|
||||||
# Note: If you use PAM, it is recommended to use a value consistent with
|
# Note: If you use PAM, it is recommended to use a value consistent with
|
||||||
@ -342,7 +343,8 @@ CHFN_RESTRICT rwh
|
|||||||
# However, more CPU resources will be needed to authenticate users if
|
# However, more CPU resources will be needed to authenticate users if
|
||||||
# this value is increased.
|
# this value is increased.
|
||||||
#
|
#
|
||||||
# If not specified, the libc will choose the default number of rounds (5000).
|
# If not specified, the libc will choose the default number of rounds (5000),
|
||||||
|
# which is orders of magnitude too low for modern hardware.
|
||||||
# The values must be within the 1000-999999999 range.
|
# The values must be within the 1000-999999999 range.
|
||||||
# If only one of the MIN or MAX values is set, then this value will be used.
|
# If only one of the MIN or MAX values is set, then this value will be used.
|
||||||
# If MIN > MAX, the highest value will be used.
|
# If MIN > MAX, the highest value will be used.
|
||||||
|
@ -39,6 +39,9 @@
|
|||||||
<replaceable>MD5</replaceable><phrase condition="sha_crypt">,
|
<replaceable>MD5</replaceable><phrase condition="sha_crypt">,
|
||||||
<replaceable>SHA256</replaceable>,
|
<replaceable>SHA256</replaceable>,
|
||||||
<replaceable>SHA512</replaceable></phrase>.
|
<replaceable>SHA512</replaceable></phrase>.
|
||||||
|
MD5 and DES should not be used for new hashes, see
|
||||||
|
<refentrytitle>crypt</refentrytitle><manvolnum>5</manvolnum>
|
||||||
|
for recommendations.
|
||||||
</para>
|
</para>
|
||||||
<para>
|
<para>
|
||||||
Note: this parameter overrides the <option>MD5_CRYPT_ENAB</option>
|
Note: this parameter overrides the <option>MD5_CRYPT_ENAB</option>
|
||||||
|
@ -44,7 +44,7 @@
|
|||||||
</para>
|
</para>
|
||||||
<para>
|
<para>
|
||||||
If not specified, the libc will choose the default number of rounds
|
If not specified, the libc will choose the default number of rounds
|
||||||
(5000).
|
(5000), which is orders of magnitude too low for modern hardware.
|
||||||
</para>
|
</para>
|
||||||
<para>
|
<para>
|
||||||
The values must be inside the 1000-999,999,999 range.
|
The values must be inside the 1000-999,999,999 range.
|
||||||
|
Loading…
Reference in New Issue
Block a user