Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 22 Nov 2000 02:15:39 -0800
From:      Kris Kennaway <kris@FreeBSD.ORG>
To:        hackers@FreeBSD.ORG
Cc:        "Sean O'Connell" <sean@stat.Duke.EDU>, green@FreeBSD.ORG
Subject:   PAM and passwords (Re: Hmm..passwords.)
Message-ID:  <20001122021539.C4078@citusc17.usc.edu>
In-Reply-To: <20001121153112.B1910@dragon.nuxi.com>; from obrien@FreeBSD.ORG on Tue, Nov 21, 2000 at 03:31:12PM -0800
References:  <20001121135541.A14220@nevermind.kiev.ua> <Pine.BSF.4.21.0011210704230.88234-100000@epsilon.lucida.ca> <20001121082750.A2922@citusc17.usc.edu> <20001121114933.D27266@stat.Duke.EDU> <20001121085551.A3534@citusc17.usc.edu> <20001121153112.B1910@dragon.nuxi.com>

next in thread | previous in thread | raw e-mail | index | archive | help

--nmemrqcdn5VTmUEE
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Tue, Nov 21, 2000 at 03:31:12PM -0800, David O'Brien wrote:

> When Kris and I discussed this functionality (before Brian went and did
> it); we talked about much higher granularity than Brian implemented:
>=20
> MD5 everywhere
> DES everywhere
> MD5 locally / DES yp
> Convert to MD5
> Convert to DES

Only these last two are candidates for PAM. PAM (specifically
pam_unix) doesn't and shouldn't care what crypt() does and what the
algorithm it chooses to use is called, it just treats the strings as
opaque data which are compared to the master.passwd records.

The latter two in your list could be implemented by a "recrypt"
function in a pam "password" module, which a) verifies the presented
password, and b) generates a new password hash with the same
plaintext, which is written out.

This would have the effect that the new password would be whichever
format is the current passwd_format for that user's login class, so
you can transparently migrate users from one algorithm to another
without having to expire passwords or mess with them by hand. You
likely wouldn't want this to happen every time a user logs in, so
there'd have to be some other condition which triggers it for a given
account.

Kris

--nmemrqcdn5VTmUEE
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (FreeBSD)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjobnMoACgkQWry0BWjoQKVQuQCdF/GfekP7jnciyb6IbfNP3jNr
QgUAniDGKk8rmNrKLNNvPTt7gzZXAI8P
=2+gg
-----END PGP SIGNATURE-----

--nmemrqcdn5VTmUEE--


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001122021539.C4078>