Bug 1086 - shadow should be set up to use MD5 passwords
: shadow should be set up to use MD5 passwords
Status: CLOSED FIXED
Product: Codex
Classification: Unclassified
Component: utils
: test grimoire
: Other other
: P1 blocker
Assigned To: Grimoire Bug List
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2002-09-27 17:07 UTC by Steven Pinkham
Modified: 2008-06-16 12:35 UTC (History)
3 users (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Steven Pinkham 2002-09-27 17:07:09 UTC
This is a simple change that only requires changing a line in the /etc/login.defs.
a line that is now:
#MD5_CRYPT_ENAB  no
MD5_CRYPT_ENAB  yes

This simple change makes it significantly (about 50x) harder to bruteforce crack
your passwords, and allows for passwords longer then 8 characters.
Comment 1 Steven Pinkham 2002-09-27 17:07:33 UTC
*** Bug 1085 has been marked as a duplicate of this bug. ***
Comment 2 Steven Pinkham 2002-09-27 17:10:52 UTC
Oh, btw changing this setting does not generate new MD5 passwords, so the
passwords remain in des format until they are reset with passwd.  
Comment 3 Eric Schabell 2002-10-18 09:00:51 UTC
 Bumping all severities/priorities to max... we need action on all these bugs... find, fix, or forget 
them but get them closed in the next 6 days.... rc1 is due 24th of October! 
 
Eric 
Comment 4 Seth Woolley 2003-02-09 17:03:14 UTC
any action on this?
Comment 5 Eric Sandall 2003-02-09 18:29:11 UTC
The Security Team can take action on this if they want, otherwise we can wait on
Jeff.
Comment 6 Steven Pinkham 2003-02-26 23:13:48 UTC
Any news on this yet?  Making this (very simple)change by your next release is
probably a good idea...
Simple fix looks like this:
cp /etc/login.defs /etc/login.defs.backup
cat /etc/login.defs.backup | sed "s/#MD5_CRYPT_ENAB.*no/MD5_CRYPT_ENAB  yes/" \
>login.defs


You can probably do it in a cleaner then I can, but that will work..
Without this you only have 8 significant character passwords, which john the
ripper can check at 89923 characters a second on my computer.  With MD5
passwords,  you have no practical limit on the significant characters, and john
the ripper checks them out at a rate of 1918 cps.
Comment 7 Seth Woolley 2003-02-26 23:27:17 UTC
I'm going to do the taking action part if this isn't done within a couple days.
 It looks like a small, harmless change.  Then, I'll move it up to test so that
the test to stable migration catches it.  At that point, iso-gurus should be
building from stable for the 0.5 release, and it should fix the /etc/logins.def
in the default install, I presume.  On my smgl installs, it is set to yes
already, so I'm wondering if this is a problem with older install CDs.
Comment 8 Steven Pinkham 2003-02-26 23:47:23 UTC
If it's already updated on the new installs, that's great...
I did raise the issue 5 months ago after all ;-)
BTW, FYI(and other THA's), I've been playing with trying to get bcrypt passwords
working, they give another order of magnitiude improvement(or more, it's
designed to be future-proof)
See http://www.openwall.com/crypt/ for more info...
Comment 9 Seth Woolley 2003-02-27 00:02:00 UTC
bcrypt passwords would be nice to have.  I remember reading that paper a while
ago and was impressed by the future-proofness.  The website had a shadow patch
for slackware.  I wonder if shadow itself will include it eventually.
Comment 10 Eric Sandall 2003-06-13 23:30:42 UTC
Reassigning...
Comment 11 Seth Woolley 2003-06-14 03:15:53 UTC
to close this bug we just need to make sure the logins.def file is set for md5
encryption on the new iso.  It was when I installed before... are the new isos
setup correctly then?  Or did you renew this since we wanted bcrypt sypport, as
that's why I left it open?  I'm thinking assign this bug to sm-security and see
if we have any volunteers to make a bcrypt spell?
Comment 12 Eric Sandall 2003-06-14 03:40:17 UTC
bcrypt sounds good, if we can find the hackers for it.  :)

On the beta3 ISO, "MD5_CRYPT_ENAB  yes" is in /etc/login.defs
Comment 13 Eric Sandall 2003-06-27 19:57:51 UTC
Opening up so others with more time can work on them.
Comment 14 Eric Sandall 2003-07-21 17:45:22 UTC
Well, I'm going to close this, and if we ever get someone with time to work on
bcrypt, they can open a new one for that.
Comment 15 games 2003-10-19 23:13:53 UTC
if any of these still have issues outstanding then they can be reopened, but
most  have just been overlooked/forgotten
("these" refers to the 611 fixed but not closed bugs I just found in our database)
Comment 16 Jeremy Blosser 2007-04-01 00:59:39 UTC
reassign to sm-grimoire-bugs
Comment 17 Arwed v. Merkatz 2008-06-16 12:35:39 UTC
Changing version to test grimoire.