Am Dienstag, dem 08.06.2021 um 15:08 +0100 schrieb Tom Hughes via devel:
> On 08/06/2021 14:51, Stephen Gallagher wrote:
> 
> > I was thinking about suggesting a similar PAM module to convert
> > existing hashes, but I suspect that we'd be coming up against some
> > issues with security policy and separation of actions. Right now, I
> > expect that SELinux permits PAM processes to have read-only access
> > to
> > /etc/shadow, but such a change would necessitate read/write access,
> > which is riskier. It's also why PAM has separate activities for
> > authentication, authorization and password-change.
> 
> Surely it has to allow write as well because any authentication can
> already prompt for a password change if the password is expired?


Well, extending the pam_unix module in such a way, may be the best
solution:

  * User logs in.
  * PAM checks password
  * hash is not $y$
  * silently rehash plain password with yescrypt
  * update shadow
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to