Bug 428280
Summary: | No info on crypt(3) SHA-256/512 features | ||
---|---|---|---|
Product: | [Fedora] Fedora | Reporter: | Alexander Todorov <atodorov> |
Component: | man-pages | Assignee: | Ivana Varekova <varekova> |
Status: | CLOSED RAWHIDE | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | 8 | CC: | alain.portal, cward, mtk.manpages |
Target Milestone: | --- | ||
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2008-01-14 10:44:39 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Alexander Todorov
2008-01-10 13:37:15 UTC
According to: http://people.redhat.com/drepper/SHA-crypt.txt The integration into existing systems is easy if those systems already support the MD5-based solution. Ever since the introduction of the MD5-based method an extended password format is in used: $<ID>$<SALT>$<PWD> If the password is not of this form it is an old-style DES-encrypted password. If the password has this form the ID identifies the method used and this then determines how the rest of the password string is interpreted. So far the following ID values are in use: ID | Method ------------------------------- 1 | MD5 (Linux, BSD) 2a | Blowfish (OpenBSD) md5 | Sun MD5 For the new SHA-256 and SHA-512 methods the following values are selected: ID | Method ------------------------------- 5 | SHA-256 6 | SHA-512 So $5$<SALT>$<PWD> is a SHA-256 encoded password and $6$<SALT>$<PWD> is a SHA-512 encoded one. Please add this info in the manual page. Thanks, fixed in man-pages-2.75-2.fc9. Ivana, The fix that appears to have been made was to copy the above text, from a standards proposal, into the man page. However, it is not clear if Linux systems even support all of these options -- did you check this? As far as I can see: 2a Blowfish -- is not natively supported by glibc, but some distros patch in support (e.g. openSUSE; but does Fedora?) md5 Sun MD5 -- is not natively supported by glibc. 5 - SHA-256 6 - SHA-512 Are supported by since glibc 2.7. Can you confirm? Ulrich Drepper's comment is: "None of the other encryption (2a, md5) is supported. It makes no sense to support them. I only added 5 and 6. If you mention any other you should say that the others are not generally available and should be avoided. Only SHA is based on technology sanctioned by NIST." so you are right the man-page should be fixed. |