NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: bin/10206: of what use are even 128-byte passwords if people can still choose easily guessable ones?



The following reply was made to PR bin/10206; it has been noted by GNATS.

From: Matthias Drochner <M.Drochner%fz-juelich.de@localhost>
To: <gnats-bugs%gnats.netbsd.org@localhost>
Cc: 
Subject: Re: bin/10206: of what use are even 128-byte passwords if people can 
 still choose easily guessable ones?
Date: Wed, 18 Nov 2009 18:31:10 +0100

 Just for the record: There is a PAM module in
 pkgsrc/security/pam-passwdqc which does password
 strength checking. The passwdqc code seems to be
 commonly used in Linux distributions.
 There is a bug in NetBSD's pam_unix module which
 makes that it ignores the previously checked
 password, this is fixed in
 lib/libpam/modules/pam_unix/pam_unix.c rev 1.14
 
 best regards
 Matthias
 
 
 
 ---------------------------------------------------------------------------=
 ---------------------
 ---------------------------------------------------------------------------=
 ---------------------
 Forschungszentrum Juelich GmbH
 52425 Juelich
 Sitz der Gesellschaft: Juelich
 Eingetragen im Handelsregister des Amtsgerichts Dueren Nr. HR B 3498
 Vorsitzende des Aufsichtsrats: MinDir'in Baerbel Brumme-Bothe
 Geschaeftsfuehrung: Prof. Dr. Achim Bachem (Vorsitzender),
 Dr. Ulrich Krafft (stellv. Vorsitzender), Prof. Dr.-Ing. Harald Bolt,
 Prof. Dr. Sebastian M. Schmidt
 ---------------------------------------------------------------------------=
 ---------------------
 ---------------------------------------------------------------------------=
 ---------------------
 


Home | Main Index | Thread Index | Old Index