----- Original Message -----
> From: "Maura Dailey" <[email protected]>
> To: "Jan Lieskovsky" <[email protected]>
> Sent: Tuesday, April 1, 2014 7:35:07 PM
>
> I don't like leaving bugs in place while these decisions are being made.
I can understand this approach (that fixing obvious bugs immediately is
better than wait for overall concept change taking longer time / more massive
patch).
> I'd still like to add the missing platform line in, unless you're
> telling me that the final release of RHEL 7 won't have pam_cracklib.so
> at all or unless you're saying that pam_cracklib.so won't be a supported
> option for users that use the announced upgrade in place option. You or
> Shawn would know better than I, seeing as how both modules were
> apparently written by Redhat.
The problem with the actual state (as far as I got it from the testing)
being the following:
* system administrators are not expected to edit /etc/pam.d/system-auth directly
(from /etc/pam.d/system-auth file:
#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authconfig is run.)
but rather to use one of authconfig, authconfig-tui, authconfig-gtk utilities.
* new file /etc/security/pwquality.conf has been added to RHEL-7, that should
control / enforce expectations on password attributes like difok, minlen,
dcredit,
ucredit etc.
* the procedure to fine-tune the "additional" pwd requirements on RHEL-7 seems
to be
the following:
1) user runs authconfig / authconfig-tui / authconfig-gtk as root,
2) clicks on the Password Options tab,
3) specifies Length / Character Classes (or some other option from the offer),
4) clicks the "Apply" button,
5) the change / requirements are written into /etc/security/pwquality.conf
file
instead to be written into /etc/pam.d/system-auth directly,
6) when user's password change request is issued, pam's pam_pwquality.so
module
is checking the settings from /etc/security/pwquality.conf, and displaying
"Bad Password" message when the provided password did not meet the expected
criteria (example requesting minlen=12 and providing shorter password shows
message like:
BAD PASSWORD: The password is shorter than 12 characters)
pam_cracklib.so will be in RHEL-7. But direct editing of /etc/pam.d/system-auth
will be unsupported configuration (since users aren't expected to edit
/etc/pam.d/system-auth
directly).
>
> Alternately, I could submit a patch to move all the pam_cracklib.so
> options back to RHEL 6's check directory until this is sorted out, or,
> if a version of Fedora uses pam_cracklib, I could change all the
> platform lines to read Fedora instead of RHEL 7.)
In the light of the further information above, the most reasonable approach
(to me) seems to be the following one:
* move the pam_cracklib.so checks back to RHEL/6 directory,
* create new ones for RHEL/7 use case - these will need to be created in any
case, since they shouldn't be checking the presence of options in
/etc/pam.d/system-auth
file, but rather / instead presence of required values (minlen, difok etc.) in
/etc/security/pwquality.conf file,
* the fact that current rules work also on RHEL-7 is just coincidence
(pam_pwquality.so options being similar to pam_cracklib.so ones). But
it brings more confusion, than actually clarifies things.
>
> pam_pwquality.so is obviously geared to be an easy change for sysadmins,
> seeing as how the option names are currently the same. However, if they
> diverge going forward, a universal check might have unexpected behavior.
Yeah, agree having universal check wouldn't be good (in light of new facts
stated above).
> So I'm leaning a little more towards creating pam_pwquality specific checks.
Agree. Please make a patch moving original pam_cracklib.so ones back to RHEL/6
directory. Then we can create RHEL-7 specific ones honouring / checking settings
in /etc/security/pwquality.conf.
Thank you && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Technologies Team
>
> - Maura Dailey
>
> On 04/01/2014 12:40 PM, Jan Lieskovsky wrote:
> > Hello Maura,
> >
> > ----- Original Message -----
> >> From: "Maura Dailey" <[email protected]>
> >> Subject: [PATCH] Shared check was missing RHEL 7 platform line
> >>
> >> Other pam_cracklib shared checks had the required platform field, but the
> >> check for difok appears to have been inadvertently skipped.
> > I would say instead of storing RHEL-7 as platform into shared pam_cracklib
> > oval checks, we should create a RHEL-7 specific / own pam_pwquality
> > oriented ones.
> >
> > In RHEL-7 pam_cracklib has been replaced with pam_pwquality (man
> > pw_quality)
> > and while the checks still work, their names:
> >
> > accounts_password_pam_cracklib_difok.xml
> > accounts_password_pam_cracklib_lcredit.xml
> > etc.
> >
> > might be misleading. Under my opinion we have two options how to proceed:
> > * either rename the rules (remove the pam_cracklib string from them) and
> > make them universal (IOW able to handle both of pam_cracklib &
> > pam_pwquality cases).
> > Particular rule names in shared/ would become:
> >
> > accounts_password_pam_difok.xml
> > accounts_password_pam_lcredit.xml
> > etc.
> >
> > and in the /etc/pam.d/system-auth pattern operation pattern match
> > section
> > there would be just (pam_cracklib | pam_pwquality) options listed as to
> > be allowed
> > after the required / requisite password section,
> >
> > * or we can keep RHEL-6 pam_cracklib rules intact (as they are now), and
> > create
> > new pam_pwquality RHEL-7 specific ones.
> >
> > Leaving the wider mailing list opinion / thoughts to decide (make a
> > decision)
> > which way (yet some other from the two ones proposed above?) we want to
> > pursue.
> >
> > Thank you && Regards, Jan.
> > --
> > Jan iankko Lieskovsky / Red Hat Security Technologies Team
> >
> >> - Maura Dailey
> >>
> >> Signed-off-by: Maura Dailey <[email protected]>
> >> ---
> >> .../oval/accounts_password_pam_cracklib_difok.xml | 1 +
> >> 1 files changed, 1 insertions(+), 0 deletions(-)
> >>
> >> diff --git a/shared/oval/accounts_password_pam_cracklib_difok.xml
> >> b/shared/oval/accounts_password_pam_cracklib_difok.xml
> >> index 80fd21e..62a535a 100644
> >> --- a/shared/oval/accounts_password_pam_cracklib_difok.xml
> >> +++ b/shared/oval/accounts_password_pam_cracklib_difok.xml
> >> @@ -4,6 +4,7 @@
> >> <title>Set Password difok Requirements</title>
> >> <affected family="unix">
> >> <platform>Red Hat Enterprise Linux 6</platform>
> >> + <platform>Red Hat Enterprise Linux 7</platform>
> >> </affected>
> >> <description>The password difok should meet minimum
> >> requirements using pam_cracklib</description>
> >> --
> >> 1.7.1
> >>
> >> _______________________________________________
> >> scap-security-guide mailing list
> >> [email protected]
> >> https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
> >>
>
>
_______________________________________________
scap-security-guide mailing list
[email protected]
https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide