I got this "feature" on Yocto project of Xilinx (
https://xilinx-wiki.atlassian.net/wiki/spaces/A/pages/18841883/Yocto )
rel-v2022.1 (honister). It seems to me my Linux kernel uses SHA-512 in default
because after my first password change i could se the ident number of this
encryption in /etc/s
Hi Livius,
On 7/18/22 23:48, Livius wrote:
In Yocto Honister if i use sha256crypt for my password hash my finished Linux
image can not like it, and at first boot it forces to me to change it. If i use
sha512crypt for my hash everything is ok at Linux first boot.
Just tested on top of honist
In Yocto Honister if i use sha256crypt for my password hash my finished Linux
image can not like it, and at first boot it forces to me to change it. If i use
sha512crypt for my hash everything is ok at Linux first boot.
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
Hi Livius,
On 6/3/22 23:45, Livius wrote:
Finaly, i found the problem and i could solve it. SHA-256 is too weak to make a
password hash, this is why on first login we need to change password always.
Please fix it in Yocto manual (
https://urldefense.proofpoint.com/v2/url?u=https-3A__docs.yoct
Finaly, i found the problem and i could solve it. SHA-256 is too weak to make a
password hash, this is why on first login we need to change password always.
Please fix it in Yocto manual (
https://docs.yoctoproject.org/singleindex.html#term-EXTRA_USERS_PARAMS ). When
i set it to generate sha512
Hi!
In extrausers.bbclass (
https://github.com/openembedded/openembedded-core/blob/honister/meta/classes/extrausers.bbclass
) there is a quite new passwd-expire (
https://www.mail-archive.com/yocto@lists.yoctoproject.org/msg05373.html ) to
force password change on first login. I am using honis