- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
postlfs/security/libpwquality.xml
r8558044 rcbb07ee4 7 7 <!ENTITY libpwquality-download-http "https://github.com/libpwquality/libpwquality/releases/download/libpwquality-&libpwquality-version;/libpwquality-&libpwquality-version;.tar.bz2"> 8 8 <!ENTITY libpwquality-download-ftp " "> 9 <!ENTITY libpwquality-md5sum " 1fe43f6641dbf1e1766e2a02cf68a9c3">10 <!ENTITY libpwquality-size "42 0KB">11 <!ENTITY libpwquality-buildsize " 4.1MB">12 <!ENTITY libpwquality-time " less than0.1 SBU">9 <!ENTITY libpwquality-md5sum "6b70e355269aef0b9ddb2b9d17936f21"> 10 <!ENTITY libpwquality-size "424 KB"> 11 <!ENTITY libpwquality-buildsize "5.4 MB"> 12 <!ENTITY libpwquality-time "0.1 SBU"> 13 13 ]> 14 14 … … 16 16 <?dbhtml filename="libpwquality.html"?> 17 17 18 <sect1info>19 <date>$Date$</date>20 </sect1info>21 18 22 19 <title>libpwquality-&libpwquality-version;</title> … … 36 33 </para> 37 34 38 &lfs11 0a_checked;35 &lfs112_checked; 39 36 40 37 <bridgehead renderas="sect3">Package Information</bridgehead> … … 133 130 <sect2 role="configuration"> 134 131 <title>Configuring libpwquality</title> 135 136 <!--137 <para>138 <application>libpwquality</application> is intended to be a139 functional replacement for the <filename>pam_cracklib.so</filename>140 module with additional options. To replace the141 <filename>pam_cracklib.so</filename> module with the142 <filename>pam_pwquality.so</filename> module, execute the following143 commands as the <systemitem class="username">root</systemitem> user:144 </para>145 -->146 132 147 133 <para> … … 163 149 lcredit=0 ocredit=0 minclass=1 \ 164 150 maxrepeat=0 maxsequence=0 \ 165 maxclassrepeat=0 ge oscheck=0 \151 maxclassrepeat=0 gecoscheck=0 \ 166 152 dictcheck=1 usercheck=1 \ 167 153 enforcing=1 badwords="" \ … … 169 155 # use sha512 hash for encryption, use shadow, and use the 170 156 # authentication token (chosen password) set by pam_pwquality 171 # above (or any previous modules) 172 password required pam_unix.so sha512 shadow use_authtok 157 # above (or any previous modules). Also set the number of crypt rounds 158 # to the value used in shadow. 159 password required pam_unix.so sha512 shadow use_authtok \ 160 rounds=500000 173 161 174 162 # End /etc/pam.d/system-password</literal>
Note:
See TracChangeset
for help on using the changeset viewer.