aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--NEWS23
-rw-r--r--changelog7
-rw-r--r--local/common-password19
-rw-r--r--local/common-password.md5sums1
4 files changed, 43 insertions, 7 deletions
diff --git a/NEWS b/NEWS
new file mode 100644
index 00000000..1976a81e
--- /dev/null
+++ b/NEWS
@@ -0,0 +1,23 @@
+pam (0.99.7.1-5) unstable; urgency=low
+
+ * Default Unix minimum password length has changed
+
+ Previous versions of pam_unix on Debian had a built-in minimum password
+ length of 1 character, and a minimum password length configured in
+ /etc/pam.d/common-password of 4 characters. This differed from the
+ upstream default of 6 characters. This has been changed, so the
+ default /etc/pam.d/common-password no longer overrides the compile-time
+ default and the compile-time default has been raised to 6 characters.
+ If you are using pam_unix but are not using the default
+ /etc/pam.d/common-password file, it is recommended that you drop any
+ min= options to pam_unix from your config unless you have stronger
+ local password requirements that the upstream default.
+
+ The password length 'max' option has also been deprecated in this
+ version because it was never written to work as suggested in the
+ documentation. If you are using pam_unix but are not using the default
+ /etc/pam.d/common-password file, you should remove any old max= options
+ to pam_unix from your config as this option will be considered an error
+ in future versions of pam.
+
+ -- Steve Langasek <vorlon@debian.org> Sat, 01 Sep 2007 21:27:11 -0700
diff --git a/changelog b/changelog
index 32f1f258..81aebd59 100644
--- a/changelog
+++ b/changelog
@@ -9,8 +9,13 @@ pam (0.99.7.1-5) UNRELEASED; urgency=low
* Further cleanups of 007_modules_pam_unix -- don't use a global variable
for pass_min_len, don't gratuitously move the length checking into the
"obscure" checks, and internationalize the error strings.
+ * Stop overriding the built-in default minimum password length in
+ /etc/pam.d/common-password, and also drop the "max" option which has now
+ been obsoleted.
+ * Fix up the comments in /etc/pam.d/common-password to make it clear that
+ the options are specific to pam_unix. Closes: #414559.
- -- Steve Langasek <vorlon@debian.org> Sat, 01 Sep 2007 10:59:34 -0700
+ -- Steve Langasek <vorlon@debian.org> Sat, 01 Sep 2007 11:42:08 -0700
pam (0.99.7.1-4) unstable; urgency=low
diff --git a/local/common-password b/local/common-password
index 9025f6b0..45959eb5 100644
--- a/local/common-password
+++ b/local/common-password
@@ -2,19 +2,26 @@
# /etc/pam.d/common-password - password-related modules common to all services
#
# This file is included from other service-specific PAM config files,
-# and should contain a list of modules that define the services to be
-#used to change user passwords. The default is pam_unix
+# and should contain a list of modules that define the services to be
+# used to change user passwords. The default is pam_unix.
+# Explanation of pam_unix options:
+#
# The "nullok" option allows users to change an empty password, else
# empty passwords are treated as locked accounts.
#
-# (Add `md5' after the module name to enable MD5 passwords)
+# The "md5" option enables MD5 passwords. Without this option, the
+# default is Unix crypt.
#
# The "obscure" option replaces the old `OBSCURE_CHECKS_ENAB' option in
-# login.defs. Also the "min" and "max" options enforce the length of the
-# new password.
+# login.defs.
+#
+# You can also use the "min" option to enforce the length of the new
+# password.
+#
+# See the pam_unix manpage for other options.
-password required pam_unix.so nullok obscure min=4 max=8 md5
+password required pam_unix.so nullok obscure md5
# Alternate strength checking for password. Note that this
# requires the libpam-cracklib package to be installed.
diff --git a/local/common-password.md5sums b/local/common-password.md5sums
index b5bde1d4..569ca682 100644
--- a/local/common-password.md5sums
+++ b/local/common-password.md5sums
@@ -1 +1,2 @@
601ecfbc99fd359877552cb5298087ad /etc/pam.d/common-password
+e5ae8ba8d00083c922d9d82a0432ef78 /etc/pam.d/common-password