Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

make sha rounds configurable and increase no of rounds #452

Merged
merged 4 commits into from Jun 30, 2021
Merged

Conversation

rndmh3ro
Copy link
Member

Fixes #365

Signed-off-by: rndmh3ro github@gumpri.ch

Fixes #365

Signed-off-by: rndmh3ro <github@gumpri.ch>
@schurzi
Copy link
Contributor

schurzi commented Jun 28, 2021

since this setting only works for group passwords, should we also add the parameter rounds= to pam_unix.so in PAM configuration? I'd like this to have the same number of rounds as defined here.

Signed-off-by: rndmh3ro <github@gumpri.ch>
roles/os_hardening/README.md Outdated Show resolved Hide resolved
roles/os_hardening/README.md Outdated Show resolved Hide resolved
roles/os_hardening/defaults/main.yml Outdated Show resolved Hide resolved
roles/os_hardening/templates/etc/login.defs.j2 Outdated Show resolved Hide resolved
Co-authored-by: schurzi <Martin.Schurz@t-systems.com>
@rndmh3ro rndmh3ro merged commit 9cefddd into master Jun 30, 2021
@rndmh3ro rndmh3ro deleted the sha_rounds branch June 30, 2021 08:42
divialth pushed a commit to divialth/ansible-collection-hardening that referenced this pull request Aug 3, 2022
* make sha rounds configurable and increase no of rounds

Fixes dev-sec#365

Signed-off-by: rndmh3ro <github@gumpri.ch>

* Prettified Code!

* make password rounds configurable in pam system-auth

Signed-off-by: rndmh3ro <github@gumpri.ch>

* change wording of sha rounds documentation

Co-authored-by: schurzi <Martin.Schurz@t-systems.com>

Co-authored-by: schurzi <Martin.Schurz@t-systems.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

SHA_CRYPT_MIN_ROUNDS should be increased in login.defs
2 participants