|
Bugzilla – Full Text Bug Listing |
| Summary: | It's possible to enter "*****" five stars as a root's password without any warning | ||
|---|---|---|---|
| Product: | [openSUSE] SUSE Linux 10.1 | Reporter: | Lukas Ocilka <locilka> |
| Component: | YaST2 | Assignee: | Jiří Suchomel <jsuchome> |
| Status: | RESOLVED INVALID | QA Contact: | Klaus Kämpf <kkaempf> |
| Severity: | Normal | ||
| Priority: | P5 - None | ||
| Version: | Beta 7 | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| Whiteboard: | |||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Lukas Ocilka
2006-03-13 14:07:09 UTC
It isn't possible to do when cracklib is on (/etc/security/pam_pwcheck.conf). Thorsten, I thought we used to have cracklib set by default - is this correct? cracklib will only be enabled on the enterprise products, but as long as we share the RPMs with SL this is not possible yet. I think it is correct. You can enforce bigger security and for SLES the security lever is set higher by default. |