Bug 2151141

Summary: change the default password encryption algorithm back to sha512
Product: Red Hat Enterprise Linux 9 Reporter: Jianwei Weng <jweng>
Component: authselectAssignee: Pavel Březina <pbrezina>
Status: CLOSED DUPLICATE QA Contact: sssd-qe
Severity: high Docs Contact:
Priority: unspecified    
Version: 9.1Keywords: Triaged
Target Milestone: rcFlags: pm-rhel: mirror+
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-12-06 12:28:27 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Jianwei Weng 2022-12-06 08:41:31 UTC
This was triggered by https://issues.redhat.com/browse/CERTPX-10505 

The default password encryption algorithm now is yescrypt, this change was not intentional and should be changed back to sha512

```
yescrypt is not actually supported on 8.7  nor on rhel9 and it produces error message in journal "pam_unix(passwd:chauthtok): unrecognized option [yescrypt]". It does not affect the customers or the security in any way as new password is created with sha512 in my tests, it just produces the log message.

 

However, since yescrypt is not supported in pam_unix/shadow-utils in rhel8 nor in rhel9 we should revert the patch and make it "sha512" again in z-stream.
```

Thanks
Jianwei

Comment 1 Pavel Březina 2022-12-06 12:28:27 UTC

*** This bug has been marked as a duplicate of bug 2151230 ***