From: "Fabian Grünbichler" <f.gruenbichler@proxmox.com>
To: pve-devel@lists.proxmox.com
Subject: [pve-devel] [PATCH common 1/2] encrypt_pw: allow yescrypt in addition to sha256
Date: Mon, 31 Mar 2025 12:03:33 +0200 [thread overview]
Message-ID: <20250331100334.252390-3-f.gruenbichler@proxmox.com> (raw)
In-Reply-To: <20250331100334.252390-1-f.gruenbichler@proxmox.com>
this has been the default for Debian since Bullseye[0].
besides password setting for the PAM/PVE/PMG realms, this is also used
to hash cloud-init passwords for Linux VMs, where only a subset of
prefixes is currently allowed.
'j9T' is the default cost factor for yescrypt.
0: https://www.debian.org/releases/bullseye/amd64/release-notes/ch-information.en.html#pam-default-password
Signed-off-by: Fabian Grünbichler <f.gruenbichler@proxmox.com>
---
Notes:
instead of opt-in to yescrypt, we could also default to it and opt-into sha256
in qemu-server for cloud init.. but that means breaking old qemu-server, as
opposed to the change being completely backwards compatible..
src/PVE/Tools.pm | 15 +++++++++++++--
1 file changed, 13 insertions(+), 2 deletions(-)
diff --git a/src/PVE/Tools.pm b/src/PVE/Tools.pm
index 57eb86c..95cd93c 100644
--- a/src/PVE/Tools.pm
+++ b/src/PVE/Tools.pm
@@ -1805,7 +1805,7 @@ sub fchownat($$$$$) {
my $salt_starter = time();
sub encrypt_pw {
- my ($pw) = @_;
+ my ($pw, $prefix) = @_;
$salt_starter++;
my $salt = substr(Digest::SHA::sha1_base64(time() + $salt_starter + $$), 0, 8);
@@ -1813,7 +1813,18 @@ sub encrypt_pw {
# crypt does not want '+' in salt (see 'man crypt')
$salt =~ s/\+/X/g;
- return crypt(encode("utf8", $pw), "\$5\$$salt\$");
+ $prefix = '5' if !$prefix;
+
+ my $input;
+ if ($prefix eq '5') {
+ $input = "\$5\$$salt\$";
+ } elsif ($prefix eq 'y') {
+ $input = "\$y\$j9T\$$salt\$"
+ } else {
+ die "Cannot hash password, unknown crypt prefix '$prefix'\n";
+ }
+
+ return crypt(encode("utf8", $pw), $input);
}
# intended usage: convert_size($val, "kb" => "gb")
--
2.39.5
_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel
next prev parent reply other threads:[~2025-03-31 10:04 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-03-31 10:03 [pve-devel] [RFC access-control/common 0/3] hash passwords using yescrypt Fabian Grünbichler
2025-03-31 10:03 ` [pve-devel] [PATCH access-control 1/1] PVE/PAM: switch to yescrypt by default Fabian Grünbichler
2025-03-31 10:03 ` Fabian Grünbichler [this message]
2025-03-31 10:42 ` [pve-devel] [PATCH common 1/2] encrypt_pw: allow yescrypt in addition to sha256 Shannon Sterz
2025-04-07 19:26 ` [pve-devel] applied: " Thomas Lamprecht
2025-03-31 10:03 ` [pve-devel] [PATCH common 2/2] encrypt_pw: check return value matches expected format Fabian Grünbichler
2025-04-07 19:27 ` [pve-devel] applied: " Thomas Lamprecht
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250331100334.252390-3-f.gruenbichler@proxmox.com \
--to=f.gruenbichler@proxmox.com \
--cc=pve-devel@lists.proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal