Feature request: configurable policy for hash functions and cost parameters #4
Labels
enhancement
Requests a new feature or improvement. Without "need more information", we agree it's desirable.
On Linux, glibc's libcrypt forbids the use of MD5 and DES password hashes if
/proc/sys/crypto/fips_enabled
exists and contains a positive integer. As I understand it, this was a kludge for a specific security certification that is no longer considered valuable, but it suggests a more general and useful feature: a configuration file (perhaps/etc/security/pwhash.conf
) allowing the system administrator to forbid the use of some hash functions, and also to configure the options for hashes that have them.A possible file format:
crypt
andcrypt_gensalt
would both fail withEPERM
when offered a setting for a "no" hash;crypt_gensalt
but notcrypt
would fail withEPERM
when offered a setting for an "old" hash. (Actually auto-updating the password database is not our job, but perhaps we could coordinate with the PAM people to make it happen.)The text was updated successfully, but these errors were encountered: