Bug 1500975

Summary: pwquality configuration causes clevis bind luks to fail
Product: Red Hat Enterprise Linux 7 Reporter: Vinay Mishra <vmishra>
Component: clevisAssignee: Nathaniel McCallum <npmccallum>
Status: CLOSED ERRATA QA Contact: Jiri Jaburek <jjaburek>
Severity: medium Docs Contact: Mirek Jahoda <mjahoda>
Priority: unspecified    
Version: 7.4CC: dpal, jjaburek, mjahoda, rpacheco, tmraz
Target Milestone: rc   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
The "clevis luks bind" command no longer fails with the DISA STIG-compliant password policy Previously, passwords generated as part of the "clevis luks bind" command were not compliant with the Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) password policy set in the `pwquality.conf` file. Consequently, "clevis luks bind" failed on DISA STIG-compliant systems in certain cases. With this update, passwords are generated using a utility designed to generate random passwords that pass the password policy, and "clevis luks bind" now succeeds in the described scenario.
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-04-10 18:27:23 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Comment 11 errata-xmlrpc 2018-04-10 18:27:23 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2018:0985