From phk@critter.freebsd.dk  Mon Sep 17 05:08:27 2001
Return-Path: <phk@critter.freebsd.dk>
Received: from critter.freebsd.dk (critter.freebsd.dk [212.242.86.163])
	by hub.freebsd.org (Postfix) with ESMTP id 8D7BD37B409
	for <FreeBSD-gnats-submit@freebsd.org>; Mon, 17 Sep 2001 05:08:26 -0700 (PDT)
Received: (from phk@localhost)
	by critter.freebsd.dk (8.11.4/8.11.4) id f8HC8Nf09864;
	Mon, 17 Sep 2001 14:08:23 +0200 (CEST)
	(envelope-from phk)
Message-Id: <200109171208.f8HC8Nf09864@critter.freebsd.dk>
Date: Mon, 17 Sep 2001 14:08:23 +0200 (CEST)
From: Poul-Henning Kamp <phk@critter.freebsd.dk>
Reply-To: Poul-Henning Kamp <phk@critter.freebsd.dk>
To: FreeBSD-gnats-submit@freebsd.org
Cc:
Subject: /usr/libexec/makekey doesn't grok modern passwords
X-Send-Pr-Version: 3.113
X-GNATS-Notify:

>Number:         30627
>Category:       bin
>Synopsis:       /usr/libexec/makekey doesn't grok modern passwords
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-bugs
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Mon Sep 17 05:10:00 PDT 2001
>Closed-Date:    Fri Feb 8 13:16:00 PST 2002
>Last-Modified:  Fri Feb 08 13:16:48 PST 2002
>Originator:     Poul-Henning Kamp
>Release:        FreeBSD 5.0-CURRENT i386
>Organization:
>Environment:
System: FreeBSD critter.freebsd.dk 5.0-CURRENT FreeBSD 5.0-CURRENT #1: Wed Aug 8 13:10:20 CEST 2001 root@critter.freebsd.dk:/freebsd/src/sys/i386/compile/CRITTER i386


>Description:
	the /usr/libexec/makekey program only works with 2 char salts
	and <= 8 char passwords.  This means that the program cannot
	be used with MD5 passwords.

	The fact that nobody has noticed is probably indicative of how
	much use this program sees (ie: none) and therefore the necessary
	API/ABI changes should not give rise to trouble.

	I would suggest reading the salt and password from each their own
	line, that would solve the problem once and for all since niether
	can contain newlines.

>How-To-Repeat:
	
>Fix:

	


>Release-Note:
>Audit-Trail:

From: Ruslan Ermilov <ru@FreeBSD.org>
To: Poul-Henning Kamp <phk@critter.freebsd.dk>
Cc: bug-followup@FreeBSD.org
Subject: Re: bin/30627: /usr/libexec/makekey doesn't grok modern passwords
Date: Mon, 17 Sep 2001 15:52:48 +0300

 On Mon, Sep 17, 2001 at 02:08:23PM +0200, Poul-Henning Kamp wrote:
 > 
 > the /usr/libexec/makekey program only works with 2 char salts
 > and <= 8 char passwords.  This means that the program cannot
 > be used with MD5 passwords.
 > 
 > The fact that nobody has noticed is probably indicative of how
 > much use this program sees (ie: none) and therefore the necessary
 > API/ABI changes should not give rise to trouble.
 > 
 It's used by usr.bin/enigma/enigma.c.
 
 > I would suggest reading the salt and password from each their own
 > line, that would solve the problem once and for all since niether
 > can contain newlines.
 
 
 -- 
 Ruslan Ermilov		Oracle Developer/DBA,
 ru@sunbay.com		Sunbay Software AG,
 ru@FreeBSD.org		FreeBSD committer,
 +380.652.512.251	Simferopol, Ukraine
 
 http://www.FreeBSD.org	The Power To Serve
 http://www.oracle.com	Enabling The Information Age

From: Gregory Bond <gnb@itga.com.au>
To: Poul-Henning Kamp <phk@critter.freebsd.dk>
Cc: FreeBSD-gnats-submit@FreeBSD.ORG
Subject: Re: bin/30627: /usr/libexec/makekey doesn't grok modern passwords 
Date: Tue, 18 Sep 2001 11:25:23 +1000

 See also PR bin/28885 where I raised this issue.
 
 Kris K. suggested the "openssl passwd" command as a suitable alternative.
 
 
State-Changed-From-To: open->closed 
State-Changed-By: ashp 
State-Changed-When: Fri Feb 8 13:16:00 PST 2002 
State-Changed-Why:  
The openssl password workaround seems to be the suggested solution for this, 
rather than extending makekey. 

http://www.FreeBSD.org/cgi/query-pr.cgi?pr=30627 
>Unformatted:
