diff options
author | Tomas Mraz <tm@t8m.info> | 2008-09-19 13:38:32 +0000 |
---|---|---|
committer | Tomas Mraz <tm@t8m.info> | 2008-09-19 13:38:32 +0000 |
commit | e15dee8abc38058cae9259a3aa3b625ea8febbfd (patch) | |
tree | 8377c78395629744b73b455364618444f0f1b88c /modules/pam_cracklib/pam_cracklib.8.xml | |
parent | 742a6386465fb4290c3a5f86505f9a3e5e48fad3 (diff) | |
download | pam-e15dee8abc38058cae9259a3aa3b625ea8febbfd.tar.gz pam-e15dee8abc38058cae9259a3aa3b625ea8febbfd.tar.bz2 pam-e15dee8abc38058cae9259a3aa3b625ea8febbfd.zip |
Relevant BUGIDs:
Purpose of commit: new feature
Commit summary:
---------------
2008-09-19 Tomas Mraz <t8m@centrum.cz>
* modules/pam_cracklib/pam_cracklib.8.xml: Fix description
of the palindrome test. Document new options maxrepeat and
reject_username.
* modules/pam_cracklib/pam_cracklib.c(_pam_parse): Parse
the maxrepeat and reject_username options.
(password_check): Call the new tests usercheck() and
consecutive().
(_pam_unix_approve_pass): Pass user name to the password_check().
Diffstat (limited to 'modules/pam_cracklib/pam_cracklib.8.xml')
-rw-r--r-- | modules/pam_cracklib/pam_cracklib.8.xml | 45 |
1 files changed, 44 insertions, 1 deletions
diff --git a/modules/pam_cracklib/pam_cracklib.8.xml b/modules/pam_cracklib/pam_cracklib.8.xml index 19b74d27..3d061c43 100644 --- a/modules/pam_cracklib/pam_cracklib.8.xml +++ b/modules/pam_cracklib/pam_cracklib.8.xml @@ -59,7 +59,7 @@ <term>Palindrome</term> <listitem> <para> - Is the new password a palindrome of the old one? + Is the new password a palindrome? </para> </listitem> </varlistentry> @@ -120,6 +120,23 @@ </para> </listitem> </varlistentry> + <varlistentry> + <term>Same consecutive characters</term> + <listitem> + <para> + Optional check for same consecutive characters. + </para> + </listitem> + </varlistentry> + <varlistentry> + <term>Contains user name</term> + <listitem> + <para> + Optional check whether the password contains the user's name + in some form. + </para> + </listitem> + </varlistentry> </variablelist> <para> This module with no arguments will work well for standard unix @@ -349,6 +366,32 @@ <varlistentry> <term> + <option>maxrepeat=<replaceable>N</replaceable></option> + </term> + <listitem> + <para> + Reject passwords which contain more than N same consecutive + characters. The default is 0 which means that this check + is disabled. + </para> + </listitem> + </varlistentry> + + <varlistentry> + <term> + <option>reject_username</option> + </term> + <listitem> + <para> + Check whether the name of the user in straight or reversed + form is contained in the new password. If it is found the + new password is rejected. + </para> + </listitem> + </varlistentry> + + <varlistentry> + <term> <option>use_authtok</option> </term> <listitem> |