• Icon: Bug Bug
    • Resolution: Done-Errata
    • Icon: Undefined Undefined
    • rhel-8.10
    • rhel-8.10
    • shadow-utils
    • None
    • shadow-utils-4.6-21.el8
    • None
    • None
    • rhel-sst-idm-sssd
    • ssg_idm
    • 10
    • 11
    • 0
    • False
    • Hide

      None

      Show
      None
    • No
    • None
    • None

      The fix for https://issues.redhat.com/browse/RHEL-5057 introduces a regression on all other password encryption algorithms. Setting a value to SHA_CRYPT_MAX_ROUNDS in /etc/login.defs allows to overcome this problem, while enabling the blowfish (bcrypt variant) algorithm.

            [RHEL-15024] Include SHA_CRYPT_MAX_ROUNDS in /etc/login.defs

            Since the problem described in this issue should be resolved in a recent advisory, it has been closed.

            For information on the advisory (shadow-utils bug fix and enhancement update), and where to find the updated files, follow the link below.

            If the solution does not work for you, open a new bug report.
            https://access.redhat.com/errata/RHBA-2024:3162

            Errata Tool added a comment - Since the problem described in this issue should be resolved in a recent advisory, it has been closed. For information on the advisory (shadow-utils bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2024:3162

            Anuj Borah added a comment - https://ci-jenkins-csb-idmops.apps.ocp-c1.prod.psi.redhat.com/job/User-Tools/job/trigger-test-suite-tool/4099/console

              ipedrosa@redhat.com Iker Pedrosa
              ipedrosa@redhat.com Iker Pedrosa
              Iker Pedrosa Iker Pedrosa
              Anuj Borah Anuj Borah
              Votes:
              0 Vote for this issue
              Watchers:
              4 Start watching this issue

                Created:
                Updated:
                Resolved: