Bug 132515 - pam_cracklib dcredit ucredit lcredit ocredit not working as expected
Summary: pam_cracklib dcredit ucredit lcredit ocredit not working as expected
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: pam
Version: 3.0
Hardware: i686
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Tomas Mraz
QA Contact: Jay Turner
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2004-09-14 10:07 UTC by Demosthenes T. Mateo Jr.
Modified: 2015-01-08 00:08 UTC (History)
3 users (show)

Fixed In Version: pam-0.75-62
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2004-12-27 16:03:32 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)

Description Demosthenes T. Mateo Jr. 2004-09-14 10:07:48 UTC
From Bugzilla Helper:
User-Agent: Opera/7.50 (X11; Linux i686; U)  [en]

Description of problem:
I have this option in my /etc/pam.d/system-auth:

password    required     /lib/security/$ISA/pam_cracklib.so 
dcredit=-1 ucredit=-1 ocredit=-1 lcredit=0 minlen=8 retry=3

As a regular user, I attempted to change my password and entered
"asdf1234". PAM accepted it.

Version-Release number of selected component (if applicable):
pam-0.75-58

How reproducible:
Always

Steps to Reproduce:
1.set /etc/pam.d/system-auth to the above configuration
2. change your password using "passwd" and enter 'asdf1234'
    

Actual Results:  PAM accepted the password

Expected Results:  PAM should not accept the password

Additional info:

The same system-auth configuration on Fedora Core 2 ended with this 
error message:

"BAD PASSWORD: is too simple"

Comment 1 Michael Cook 2004-09-21 18:31:55 UTC
This functionality is not supported in the version of pam_cracklib on
ES /WS/AS 3.0, although it is supported on FC2.  Our auditors have
informed us that such a setting would provide proof of good passwords
for Sarbanes/Oxley audits.  I have a high interest in this
functionality as well.

Comment 2 Gary Bilek 2004-12-13 16:44:50 UTC
I need this functionality to work properly in AS 2.1 and AS 3.0 as
well to pass audit and information security requirements. With
dcredit=-1 I was able to enter a password containing all numeric values.

Comment 3 Tomas Mraz 2004-12-27 16:03:32 UTC
This is fixed in RHEL 3.0 U4 and RHEL 2.1 U6 updates.



Note You need to log in before you can comment on or make changes to this bug.