[arch-dev-public] News draft: sorting old password hashes

2021-06-06 Thread Christian Hesse via arch-dev-public
Hello everybody,

old password hashes like MD5 are no longer accepted by recent libxcrypt. On
next login user may be enforced to update password. To make sure nobody is
worried I would like to add install message and news post:

--- >8 ---
Starting with libxcrypt 4.4.21 weak password hashes are no longer accepted.
If you still have one in your shadow file do not worry if you are enforced to
update your password on next login.
--- >8 ---
-- 
main(a){char*c=/*Schoene Gruesse */"B?IJj;MEH"
"CX:;",b;for(a/*Best regards my address:*/=0;b=c[a++];)
putchar(b-1/(/*Chriscc -ox -xc - && ./x*/b/42*2-3)*42);}


pgpNLraJ7Yuvx.pgp
Description: OpenPGP digital signature


Re: [arch-dev-public] News draft: sorting old password hashes

2021-06-06 Thread Jan Alexander Steffens via arch-dev-public
On Sun, Jun 6, 2021 at 9:38 PM Christian Hesse via arch-dev-public <
arch-dev-public@lists.archlinux.org> wrote:

> Hello everybody,
>
> old password hashes like MD5 are no longer accepted by recent libxcrypt. On
> next login user may be enforced to update password. To make sure nobody is
> worried I would like to add install message and news post:
>
> --- >8 ---
> Starting with libxcrypt 4.4.21 weak password hashes are no longer accepted.
> If you still have one in your shadow file do not worry if you are enforced
> to
> update your password on next login.
> --- >8 ---
>

It confused me a bit. I think we can phrase this better:

```
Starting with libxcrypt 4.4.21, weak password hashes (such as MD5 and SHA1)
are
no longer accepted for new passwords. Users that still have their passwords
stored with a weak hash will be asked to update their password on their next
login.
```

But is this really what is happening? I thought we had a complete failure
to login,
not a "forced to update". I'm also not clear if the latter would work with
the
display managers.


Re: [arch-dev-public] retracting libxcrypt 4.4.22-1 from [testing]

2021-06-06 Thread Christian Hesse via arch-dev-public
Christian Hesse via arch-dev-public  on
Fri, 2021/05/28 17:48:
> Hello everybody,
> 
> the testing package libxcrypt 4.4.22-1 was reported to be bad... Andreas was
> forced to change his password on login, which resulted in him being locked
> out of his system. We are trying to clarify...
> 
> So I removed libxcrypt from [testing] for the time being.

I found the real issue: Our pam configurations for 'login' and 'su' were
missing the configuration for 'password', thus updating expired password
failed. This is now fixed in util-linux 2.37-2, which will move with
libxcrypt 4.4.22.
-- 
main(a){char*c=/*Schoene Gruesse */"B?IJj;MEH"
"CX:;",b;for(a/*Best regards my address:*/=0;b=c[a++];)
putchar(b-1/(/*Chriscc -ox -xc - && ./x*/b/42*2-3)*42);}


pgpzfclhprRDQ.pgp
Description: OpenPGP digital signature


Re: [arch-dev-public] News draft: sorting old password hashes

2021-06-06 Thread Christian Hesse via arch-dev-public
Jan Alexander Steffens via arch-dev-public
 on Sun, 2021/06/06 21:49:
> On Sun, Jun 6, 2021 at 9:38 PM Christian Hesse via arch-dev-public <
> arch-dev-public@lists.archlinux.org> wrote:
> 
> > Hello everybody,
> >
> > old password hashes like MD5 are no longer accepted by recent libxcrypt.
> > On next login user may be enforced to update password. To make sure
> > nobody is worried I would like to add install message and news post:
> >  
> > --- >8 ---  
> > Starting with libxcrypt 4.4.21 weak password hashes are no longer
> > accepted. If you still have one in your shadow file do not worry if you
> > are enforced to
> > update your password on next login.  
> > --- >8 ---  
> >  
> 
> It confused me a bit. I think we can phrase this better:
> 
> ```
> Starting with libxcrypt 4.4.21, weak password hashes (such as MD5 and SHA1)
> are
> no longer accepted for new passwords. Users that still have their passwords
> stored with a weak hash will be asked to update their password on their next
> login.
> ```
> 
> But is this really what is happening? I thought we had a complete failure
> to login,
> not a "forced to update".

There was a force to update, but that failed. It was an issue in pam
configuration, fixed in util-linux 2.37-2.

> I'm also not clear if the latter would work with the display managers.

I think it should... But we could add another sentence for safety:

```
Starting with `libxcrypt` 4.4.21, weak password hashes (such as MD5 and SHA1)
are no longer accepted for new passwords. Users that still have their
passwords stored with a weak hash will be asked to update their password on
their next login.
If the login just fails (for example from display manager) switch to a
virtual terminal (`Ctrl-Alt-F2`) and login there once.
```
-- 
main(a){char*c=/*Schoene Gruesse */"B?IJj;MEH"
"CX:;",b;for(a/*Best regards my address:*/=0;b=c[a++];)
putchar(b-1/(/*Chriscc -ox -xc - && ./x*/b/42*2-3)*42);}


pgpphSysNmjJu.pgp
Description: OpenPGP digital signature


Re: [arch-dev-public] Transitioning out my master key

2021-06-06 Thread Jelle van der Waa via arch-dev-public

On 01/06/2021 16:24, Giancarlo Razzolini via arch-dev-public wrote:

Em junho 1, 2021 10:54 Allan McRae via arch-dev-public escreveu:

It is time for my master key to be retired.  That can not happen any
time soon, as revoking my key means ~25% of packagers will not be able
to validly sign packages...

For now, I will no longer be signing new packager keys with my master
key.  I am unlikely to revoke signatures for people who retire from
packaging either.

Allan



I have been discussing with Dave, and I would be up for holding a MK, or
revocation key.


I support you as a new master key holder, can be a revoker if required. 
I think we should add another master key holder, as david is replacing 
barthaltion's key.


Greetings,

Jelle van der Waa



OpenPGP_signature
Description: OpenPGP digital signature


Re: [arch-dev-public] News draft: sorting old password hashes

2021-06-06 Thread Brett Cornwall via arch-dev-public

On 2021-06-06 22:08, Christian Hesse via arch-dev-public wrote:

Jan Alexander Steffens via arch-dev-public
 on Sun, 2021/06/06 21:49:

On Sun, Jun 6, 2021 at 9:38 PM Christian Hesse via arch-dev-public <
arch-dev-public@lists.archlinux.org> wrote:

> Hello everybody,
>
> old password hashes like MD5 are no longer accepted by recent libxcrypt.
> On next login user may be enforced to update password. To make sure
> nobody is worried I would like to add install message and news post:
>
> --- >8 ---
> Starting with libxcrypt 4.4.21 weak password hashes are no longer
> accepted. If you still have one in your shadow file do not worry if you
> are enforced to
> update your password on next login.
> --- >8 ---
>

It confused me a bit. I think we can phrase this better:

```
Starting with libxcrypt 4.4.21, weak password hashes (such as MD5 and SHA1)
are
no longer accepted for new passwords. Users that still have their passwords
stored with a weak hash will be asked to update their password on their next
login.
```

But is this really what is happening? I thought we had a complete failure
to login,
not a "forced to update".


There was a force to update, but that failed. It was an issue in pam
configuration, fixed in util-linux 2.37-2.


I'm also not clear if the latter would work with the display managers.


I think it should... But we could add another sentence for safety:

```
Starting with `libxcrypt` 4.4.21, weak password hashes (such as MD5 and SHA1)
are no longer accepted for new passwords. Users that still have their
passwords stored with a weak hash will be asked to update their password on
their next login.
If the login just fails (for example from display manager) switch to a
virtual terminal (`Ctrl-Alt-F2`) and login there once.


I think that's nice and clear. Though it should be "log in there once" 
instead of "login there once". :)


signature.asc
Description: PGP signature