Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1479012 - [10.2] New CRYPT password storage schemes
[10.2] New CRYPT password storage schemes
Status: CLOSED CURRENTRELEASE
Product: Red Hat Directory Server
Classification: Red Hat
Component: Doc-config-command-file-reference (Show other bugs)
10.1
Unspecified Unspecified
unspecified Severity unspecified
: DS10.2
: rhds-10.2
Assigned To: Marc Muehlfeld
Viktor Ashirov
Marc Muehlfeld
: EasyFix
Depends On:
Blocks: 1470091
  Show dependency treegraph
 
Reported: 2017-08-07 13:27 EDT by mreynolds
Modified: 2018-04-10 03:49 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Enhancement
Doc Text:
Directory Server supports additional password storage schemes For compatibility reasons, this update adds support for the following weak password storage schemes to Directory Server: * CRYPT-MD5 * CRYPT-SHA256 * CRYPT-SHA512 For security reasons, use these weak storage schemes only temporary for existing installations and consider migrating to a strong password storage schema.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2018-04-10 03:49:00 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description mreynolds 2017-08-07 13:27:10 EDT
Document URL: 

https://access.redhat.com/documentation/en-us/red_hat_directory_server/10/html/configuration_command_and_file_reference/plug_in_implemented_server_functionality_reference#password-storage-schemes

Section Number and Name: 

4.1.42

Describe the issue: 

Previously we only supported CRYPT password storage scheme, but there are other CRYPT types we now support (these are still considered weak):

CRYPT-MD5
CRYPT-SHA256
CRYPT-SHA512
Comment 6 mreynolds 2017-11-20 10:37:03 EST
Looks good

Note You need to log in before you can comment on or make changes to this bug.