Am Dienstag, dem 08.06.2021 um 15:08 +0100 schrieb Tom Hughes via devel: > On 08/06/2021 14:51, Stephen Gallagher wrote: > > > I was thinking about suggesting a similar PAM module to convert > > existing hashes, but I suspect that we'd be coming up against some > > issues with security policy and separation of actions. Right now, I > > expect that SELinux permits PAM processes to have read-only access > > to > > /etc/shadow, but such a change would necessitate read/write access, > > which is riskier. It's also why PAM has separate activities for > > authentication, authorization and password-change. > > Surely it has to allow write as well because any authentication can > already prompt for a password change if the password is expired? Well, extending the pam_unix module in such a way, may be the best solution: * User logs in. * PAM checks password * hash is not $y$ * silently rehash plain password with yescrypt * update shadow _______________________________________________ devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure