aboutsummaryrefslogtreecommitdiff
path: root/contrib/pam_modules/pam_passwdqc/PLATFORMS
diff options
context:
space:
mode:
Diffstat (limited to 'contrib/pam_modules/pam_passwdqc/PLATFORMS')
-rw-r--r--contrib/pam_modules/pam_passwdqc/PLATFORMS51
1 files changed, 38 insertions, 13 deletions
diff --git a/contrib/pam_modules/pam_passwdqc/PLATFORMS b/contrib/pam_modules/pam_passwdqc/PLATFORMS
index 35176e67e749..f468f233a866 100644
--- a/contrib/pam_modules/pam_passwdqc/PLATFORMS
+++ b/contrib/pam_modules/pam_passwdqc/PLATFORMS
@@ -9,22 +9,47 @@ module which understands "use_authtok". Thus, you may choose which
module prompts for the old password, things should work either way.
- FreeBSD.
+ FreeBSD 5+, DragonFly BSD 2.2+.
-As of this writing (April 2002), FreeBSD-current is moving to OpenPAM
-which pam_passwdqc already includes support for. The next step would
-be for FreeBSD to start actually using PAM from password changing.
-Once that becomes a reality, you should be able to use pam_passwdqc
-with FreeBSD.
+FreeBSD 5 and newer, as well as DragonFly BSD 2.2 and newer, include
+pam_passwdqc in the base system. You should be able to use either the
+included or the distributed separately version of pam_passwdqc with
+these systems. There's a commented out usage example in the default
+/etc/pam.d/passwd.
+FreeBSD 4 and older used a cut down version of Linux-PAM (not OpenPAM)
+and didn't use PAM for password changing.
- Solaris.
-pam_passwdqc has to ask for the old password during the update phase.
-Use "ask_oldauthtok=update check_oldauthtok" with pam_passwdqc and
-"use_first_pass" with pam_unix.
+ OpenBSD.
+
+OpenBSD does not use PAM, however it is able to use passwdqc's pwqcheck
+program. Insert the line ":passwordcheck=/usr/bin/pwqcheck -1:\"
+(without the quotes, but with the trailing backslash) into the "default"
+section in /etc/login.conf.
+
+
+ Solaris, HP-UX 11.
+
+On Solaris 2.6, 7, and 8 (without patch 108993-18/108994-18 or later)
+and on HP-UX 11, pam_passwdqc has to ask for the old password during
+the update phase. Use "ask_oldauthtok=update check_oldauthtok" with
+pam_passwdqc and "use_first_pass" with pam_unix.
+
+On Solaris 8 (with patch 108993-18/108994-18 or later), 9, and 10,
+use pam_passwdqc instead of both pam_authtok_get and pam_authtok_check,
+and set "retry=1" with pam_passwdqc as the passwd command has its own
+handling for that.
You will likely also need to set "max=8" in order to actually enforce
-not-so-weak passwords with the obsolete "traditional" crypt(3) hashes
-that most Solaris systems use. Of course this way you only get about
-one third of the functionality of pam_passwdqc.
+not-so-weak passwords with the obsolete traditional DES-based hashes
+that most Solaris systems use and the flawed approach HP-UX uses to
+process characters past 8. Of course this way you only get about one
+third of the functionality of pam_passwdqc. As a better alternative,
+on modern Solaris systems you may edit the "CRYPT_DEFAULT=__unix__" line
+in /etc/security/policy.conf to read "CRYPT_DEFAULT=2a" to enable the
+OpenBSD-style bcrypt (Blowfish-based) password hashing.
+
+There's a wiki page with detailed instructions specific to Solaris:
+
+https://openwall.info/wiki/passwdqc/solaris