Re: enforce strong passwords

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Howard Chu wrote:

>>
>> Message: 5 Date: Thu, 19 Jan 2006 14:25:16 -0700 From: Richard 
>> Megginson <rmeggins at redhat.com> Jo De Troy wrote: > Hello,
>>
>>> >
>>> > I was wondering if anyone was looking into enforcement of strong > 
>>> passwords.
>>> > I'm not a hardcore C programmer but I'm willing to help. But first 
>>> > I'll have to try in getting the current version compiled.
>>> > I'm certainly willing to do some testing.
>>>     
>>
>>
>> Funny you should mention that.  We're looking at that issue right 
>> now.  What sort of things would you want to check for?
>> min number of lower case
>> min number of upper case
>> min number of digits
>> min number of alphanumerics
>> min number of special chars
>> no user data in password
>> dictionary checking?  If so, how?  /usr/share/dict/words?
>>
>>   
>
> For OpenLDAP's password policy module we define an attribute in the 
> policy object that gives the pathname of a dynamically loaded module 
> that can perform further quality checks. We pass in the password that 
> is being set, an error string pointer, and the user's current entry 
> and get a yes/no result code back. I suggest a similar approach here; 
> it's too limiting to just hardcode one set of rules into the server. 
> (Heck, if we used SLAPI, we could write these modules interchangeably 
> between OpenLDAP and FDS.) Symas currently has a module that checks 
> against cracklib. You could bundle one or two standard modules and go 
> from there. Probably we should have extended our API to include a 
> pointer to the current policy object as well. The point is to make the 
> API simple enough and expressive enough that end-users can plug in 
> whatever constraints they want.

Yes.  That's the intention - make password policy pluggable.  It's going 
to be a bit more work to add the entry points to the code.  We should 
support the attribute that you described.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 3178 bytes
Desc: S/MIME Cryptographic Signature
Url : http://lists.fedoraproject.org/pipermail/389-users/attachments/20060119/24ea732b/attachment.bin 


[Index of Archives]     [Fedora User Discussion]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora News]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora QA]     [Fedora Triage]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Yosemite Photos]     [Linux Apps]     [Maemo Users]     [Gnome Users]     [KDE Users]     [Fedora Tools]     [Fedora Art]     [Fedora Docs]     [Maemo Users]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Fedora ARM]

  Powered by Linux