

Code: Select all
auth sufficient pam_permit.soMy first guess would be that you had previously overridden basic system security policy and your recent update included a configuration file change that, once merged, reverted you to recommended defaults. My second guess would be that a recent update improved the defaults.devnull0000 wrote:I hate security... after latest emerge --sync & world update something became broken for me and my almost trivial passwords don't work
Tony,Tony0945 wrote:[...] In my case, I'm set up to sudo without a password so my user password is as important as my root password.
thanks devnull0000,devnull0000 wrote:nevermind, I found it
comment out with # the line from /etc/pam.d/system-auth
password required pam_passwdqc.so min=8,8,8,8,8 retry=3
and making next one
to be
password required pam_unix.so nullok sha512 shadow
instead of
password required pam_unix.so try_first_pass use_authtok nullok sha512 shadow
made me happy.

Thanks, it has helped me a lot, I do not know what is the desire to force me to put a strong password, it should only show a warning as when changing the configuration to none.devnull0000 wrote:I'm glad I'm helped!
- there is /etc/security/passwdqc.conf file
- you can change "enforce" option from "everyone" to "none"
.
I, too, remember the utter horror show an internet-connected Windows 98 PC was.proteusx wrote:Imagine a world where personal systems have no security whatsoever (e.g. no password login) and security is an option for those use their computer for bank transactions and those who want to prevent their wives to read their mistress' emails.
Also, no compulsory cryptography, no Spectre/Meltdown mitigations, no PIEs and no SSP canaries.
Security should be an opt-in, like systemd. A meta package perhaps.
You may say I am a dreamer, am I the only one?

You just made my day!devnull0000 wrote:I'm glad I'm helped!
Update: In fresh gentoo, assuming you didn't do anything yet and dislike the long password:
- there is /etc/security/passwdqc.conf file
- you can change "enforce" option from "everyone" to "none"
then weak passwords will work, the system merely will warn about them.
Code: Select all
min=8,8,8,8,8
max=40
passphrase=0
match=4
similar=permit
random=24
enforce=none
retry=3
Code: Select all
2020-06-23-upgrade-to-sys-libs_pam-1_4_0
Title sys-libs/pam-1.4.0 upgrade
Author Mikle Kolyada <zlogene@gentoo.org>
Posted 2020-06-23
Revision 1
Starting with the 1.4.0 release [1], we don't offer these modules anymore:
* pam_tally and pam_tally2 have been deprecated and replaced
by the pam_faillock module
* pam_cracklib has been deprecated and replaced
by the pam_passwdqc module
These changes affected our basic PAM stack configuration.Code: Select all
min=disabled,2,2,2,2
max=40
passphrase=0
match=0
similar=permit
random=0
enforce=none
retry=3