On Wed, Jan 07, 2026 at 11:18:49AM +0100, Chris Hofstaedtler wrote:
> Hi,
> 
> thanks. I've opened a report upstream.
> https://github.com/shadow-maint/shadow/issues/1483
> 
> On Wed, Jan 07, 2026 at 09:24:35AM +0100, Marc Haber wrote:
> > On Wed, Jan 07, 2026 at 08:58:15AM +0100, Marc Haber wrote:
> > > This is even worse now, chpasswd won't accept a perfectly valid yescrypt
> > > hash:
> > > 
> > > $ echo 9hKGOX79oaP4FEhQ2xQ6wLvPXsTTUtPiYu4QCXsc | mkpasswd 
> > > --hash=yescrypt --stdin
> > > $y$j9T$VPuG6eC6CTZG7fxHR1YwP0$kZeswr5rIJKCXbeLvE/R412AO4vB1HLwuBrqg1nnPU4
> > > # echo 
> > > "aust:$y$j9T$VPuG6eC6CTZG7fxHR1YwP0$kZeswr5rIJKCXbeLvE/R412AO4vB1HLwuBrqg1nnPU4"
> > >  | chpasswd --encrypted
> > > chpasswd: (line 1, user aust) invalid password hash
> > > chpasswd: error detected, changes ignored
> > > 
> > > I think that would now warrant Severity: serious.
> > 
> > # echo "aust:*" | chpasswd --encrypted
> > chpasswd: (line 1, user aust) invalid password hash
> > chpasswd: error detected, changes ignored
> 
> I'm kinda onboard with rejecting things that are not actual hashes, 
> because that would seem consistent to me with what chpasswd is 
> supposed to do.
> 
> However breaking yescrypt hashes is quite something.

Yeah, this must be an unintended bug in 

commit c44f1e096a19a7d356da5969295393247e61874f
Author: vinz <[email protected]>
Date:   Fri Jul 11 16:08:22 2025 +0000

    chpasswd: Check hash before write when using -e

Definitely not intentional.  vinz, do you have time to take a look?
(If not, then I'll find time tonight).

> I'll disable the entire check in 4.19.0-3, and we'll see what 
> upstream says.
> 
> Best,
> Chris
> 
> _______________________________________________
> Pkg-shadow-devel mailing list
> [email protected]
> https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-shadow-devel

Reply via email to