-
Notifications
You must be signed in to change notification settings - Fork 254
Remove password aging #1432
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Remove password aging #1432
Conversation
ffbc9db to
9e20651
Compare
3b95665 to
36b8271
Compare
9eb7972 to
a97598c
Compare
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
It makes no sense to limit the frequency of password change. If one changes its password, and 5 minutes later the password is leaked, one should be able to change the password immediately. Signed-off-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Whenever we were reading it, let's assume it contains a -1 (the integer representation of an empty field). Whenever we were writing it, let's write a -1. Signed-off-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Signed-off-by: Alejandro Colomar <alx@kernel.org>
Which are mapped to 0 and -1. Signed-off-by: Alejandro Colomar <alx@kernel.org>
…rom us. Signed-off-by: Alejandro Colomar <alx@kernel.org>
41358bf to
a991ac0
Compare
|
PCI DSS 4.0.1:
The second alternative is so vague that there is no way to implement it except for buying a black box that claims to do it. But in any case, PCI-DSS-compliant organizations cannot rely on shadow passwords, as shadow-utils do not maintain a history of 4 old passwords (to prohibit their reuse) required by 8.3.7. |
Thanks!
Agree. :D
Sounds right. Regardless, it would be good to contact them and let them know about NIST prohibiting periodic password rotation; I'll do that if nobody does it first. For those needing to work on a PCI-DSS-compliant environment, here's a useful tip (not from me): Change your password quickly 4 times, and then change it a 5th time to the good one you remember. ;) |
That's not entirely true. Since shadow supports PAM, a module can be used there to enforce the policy. See https://github.com/linux-pam/linux-pam/blob/master/modules/pam_pwhistory/pam_pwhistory.8.xml |
|
Okay, I'm drafting a plan. I think expiry(1) can go away already; its functionality is superfluous, and I don't think it would be required by the regulations we've seen. I'll open a PR for this. Another thing I think can go away is the minimum password age (shadow(5)'s 4th field). Having a minimum password age is something I haven't seen in any regulations either, and can actually be dangerous if a password has been leaked before the minimum age (so that the attacker would be allowed to connect, because the password can't be changed). I'll open a PR for this. |
|
I would also like to see if |
Password expiration is deprecated, and will be eventually removed. The functionality of expiry(1) is the most superfluous of password expiry and can be removed early. This shouldn't conflict with any existing regulations about password expiry. Link: <shadow-maint#1432> Signed-off-by: Alejandro Colomar <alx@kernel.org>
Password expiration is deprecated, and will be eventually removed. The functionality of expiry(1) is the most superfluous of password expiry and can be removed early. This shouldn't conflict with any existing regulations about password expiry. Link: <shadow-maint#1432> Signed-off-by: Alejandro Colomar <alx@kernel.org>
I intend to remove it in 4.21, and deprecate in 4.19.
Passwords should never expire. It has been proved to decrease password safety.
The following features and/or programs will be deprecated in 4.19:
-I,--inactive(also the interactive version)-m,--mindays(also the interactive version) // To be removed in 4.20-M,--maxdays(also the interactive version)-W,--warndays(also the interactive version)-k,--keep-tokens-n,--mindays// To be removed in 4.20-x,--maxdays-i,--inactive-w,--warndays-f,--inactive-f,--inactivePASS_MIN_DAYS// To be removed in 4.20PASS_MAX_DAYS// Remove it from the default file in 4.20PASS_WARN_AGE// Remove it from the default file in 4.20INACTIVEsp_lstchg: Restrict to just the values0and empty.sp_min// To be ignored in 4.20sp_maxsp_warnsp_inactDistros should make sure to remove those 3 values from login.defs(5) ASAP. That will make sure that the transition from 4.20 to 4.21 will be smooth. These programs will fail if such a configuration is specified in 4.21.
Cc: @stoeckmann , @thesamesam , @floppym , @jubalh , @ikerexxe , @zeha , @hallyn
Here are some statistics of the PR:
Here's what NIST and Microsoft say about this:
See also:
Revisions:
v2
sp_lstchg == 0.-e.