Hello Recoverym4n

Thanks for your hint.

----- Original Message ----- From: <recovery...@gmail.com>
To: <debian-user@lists.debian.org>
Sent: Monday, May 27, 2013 7:40 PM
Subject: Re: /etc/shadow password hash format (migration from SuSE 9.3 to Debian Wheezy)


Install 'libpam-unix2' package. Configure PAM as outlined
in /usr/share/doc/libpam-unix2/README.Debian. It is that simple.

I tried that out on a lab system where I replaced pam_unix.so into pam_unix2.so inside both common-auth and common-password config files.

Result: The system nows recognizes all $2a$ (Blowfish) password hashes but does not longer accepts $6$ (SHA-512) password now.

In the meantime, I migrated several user accounts to $6$ (SHA-512) hashes using "passwd" to setting new passwords so there's a $6$/$2a$ mixture in /etc/shadow now.

So what I actually need is a way that $6$ hashes are ok for any created new user account as well as invoked "passwd" command (=setting passwords always as $6$) but the authentication must accept both $2a$ and $6$, i.e. must be able to deal with a mixed /etc/shadow database. So existing user still can login with their $2a$ Blowfish hash while all my new users use a $6$ SHA-512 hash. So I think a configuration rule to use pam_unix.so and pam_unix2.so simultaneously will help.

                        Andreas
--
Teste die PC-Sicherheit mit www.sec-check.net


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/edb958b5aba84ba1aa76af5a278e9...@meilebiz.loc

Reply via email to