-
Bug
-
Resolution: Done-Errata
-
Undefined
-
rhel-8.10
-
None
-
shadow-utils-4.6-21.el8
-
None
-
None
-
rhel-sst-idm-sssd
-
ssg_idm
-
10
-
11
-
0
-
False
-
-
No
-
None
-
Pass
-
RegressionOnly
-
None
The fix for https://issues.redhat.com/browse/RHEL-5057 introduces a regression on all other password encryption algorithms. Setting a value to SHA_CRYPT_MAX_ROUNDS in /etc/login.defs allows to overcome this problem, while enabling the blowfish (bcrypt variant) algorithm.
- blocks
-
RHEL-5057 Add support for bcrypt password hashes for local users
- Closed
- links to
-
RHBA-2023:123381 shadow-utils bug fix and enhancement update