-
Bug
-
Resolution: Done-Errata
-
Undefined
-
rhel-8.10
-
None
-
shadow-utils-4.6-21.el8
-
None
-
None
-
rhel-sst-idm-sssd
-
ssg_idm
-
10
-
11
-
0
-
False
-
-
No
-
None
-
Pass
-
RegressionOnly
-
None
The fix for https://issues.redhat.com/browse/RHEL-5057 introduces a regression on all other password encryption algorithms. Setting a value to SHA_CRYPT_MAX_ROUNDS in /etc/login.defs allows to overcome this problem, while enabling the blowfish (bcrypt variant) algorithm.
- blocks
-
RHEL-5057 Add support for bcrypt password hashes for local users
-
- Closed
-
- links to
-
RHBA-2023:123381 shadow-utils bug fix and enhancement update
Since the problem described in this issue should be resolved in a recent advisory, it has been closed.
For information on the advisory (shadow-utils bug fix and enhancement update), and where to find the updated files, follow the link below.
If the solution does not work for you, open a new bug report.
https://access.redhat.com/errata/RHBA-2024:3162