Tänane küsimuste ja vastuste seanss jõuab meile viisakalt SuperUserini - Stack Exchange'i ja kogukonnapõhiste Q & A veebisaitide rühmitusse.
Ekraanipilt viisakas marc falardeau (Flickr).
Küsimus
SuperUseri lugeja LeNoob tahab teada, kuidas Linuxi süsteem teab, et paroolid on üksteisele liiga sarnased:
I tried to change a user password on various Linux machines a few times and when the new password was much like the old one, the operating system said that they were too similar.
I have always wondered, how does the operating system know this? I thought passwords were saved as a hash. Does this mean that when the system is able to compare the new password for similarity to the old one that it is actually saved as plain text?
Kuidas Linuxi süsteem "teame", et paroolid on üksteisele liiga sarnased?
Vastus
SuperUseri kaasautor slhckil on meile vastus:
Since you need to supply both the old and new passwords when using passwd, they can be easily compared in plain text.
Your password is indeed hashed when it is finally stored, but until that happens, the tool where you are entering your password can just access it directly.
This is a feature of the PAM system which is used in the background of the passwd tool. PAM is used by modern Linux distributions. More specifically, pam_cracklib is a module for PAM that allows it to reject passwords based on similarities and weaknesses.
It is not just passwords which are too similar that can be considered insecure. The source code has various examples of what can be checked, such as whether a password is a palindrome or what the edit distance is between two words. The idea is to make passwords more resistant against dictionary attacks.
See the pam_cracklib manpage for more information.
Veenduge, et lugeda ülejäänud elus arutelu SuperUser kaudu teema lõime lingitud allpool.
Kas teil on seletamiseks midagi lisada? Helistage kommentaarides. Kas soovite lugeda rohkem vastuseid teistelt tech-savvy Stack Exchange'i kasutajatelt? Tutvu täieliku arutelu teemaga siit.