Red Hat Bugzilla – Bug 132515
pam_cracklib dcredit ucredit lcredit ocredit not working as expected
Last modified: 2015-01-07 19:08:36 EST
From Bugzilla Helper:
User-Agent: Opera/7.50 (X11; Linux i686; U) [en]
Description of problem:
I have this option in my /etc/pam.d/system-auth:
password required /lib/security/$ISA/pam_cracklib.so
dcredit=-1 ucredit=-1 ocredit=-1 lcredit=0 minlen=8 retry=3
As a regular user, I attempted to change my password and entered
"asdf1234". PAM accepted it.
Version-Release number of selected component (if applicable):
Steps to Reproduce:
1.set /etc/pam.d/system-auth to the above configuration
2. change your password using "passwd" and enter 'asdf1234'
Actual Results: PAM accepted the password
Expected Results: PAM should not accept the password
The same system-auth configuration on Fedora Core 2 ended with this
"BAD PASSWORD: is too simple"
This functionality is not supported in the version of pam_cracklib on
ES /WS/AS 3.0, although it is supported on FC2. Our auditors have
informed us that such a setting would provide proof of good passwords
for Sarbanes/Oxley audits. I have a high interest in this
functionality as well.
I need this functionality to work properly in AS 2.1 and AS 3.0 as
well to pass audit and information security requirements. With
dcredit=-1 I was able to enter a password containing all numeric values.
This is fixed in RHEL 3.0 U4 and RHEL 2.1 U6 updates.