Bug 11761 - Password similarity checking
Password similarity checking
Status: CLOSED NOTABUG
Product: Red Hat Linux
Classification: Retired
Component: cracklib (Show other bugs)
6.2
i386 Linux
medium Severity medium
: ---
: ---
Assigned To: Cristian Gafton
: FutureFeature
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2000-05-30 11:14 EDT by selleck
Modified: 2008-05-01 11:37 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Enhancement
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2000-05-30 11:14:18 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description selleck 2000-05-30 11:14:18 EDT
When used by PAM to check passwords, a 6 character password being changed
to a 20 character password gives a "too similar" error because of the
number of similar letters.  THere should be an option to have the
similarity 'score' reduced based on the length of the new password.

eg:
password -> swordfish
... new password is "too similar" ... but not very long either.
password -> aswordfishatemyboat
... still too similar?
Comment 1 Nalin Dahyabhai 2000-07-10 15:43:35 EDT
When md5 passwords are not being used, the effective password
length is 8.  The words "swordfis" and "aswordfi" are indeed similar.

Note You need to log in before you can comment on or make changes to this bug.