Hello Greg,

Thank you so much for your quick reply.
What I found with some tests is that while length and character classes rules 
are being correctly applying using cpw, other rules like minlife are not 
respected.
For example, I set a policy with the following rules:

Policy: TEST
Maximum password life: 2629800
Minimum password life: 864000
Minimum password length: 10
Minimum number of password character classes: 3
Number of old keys kept: 4
Maximum password failures before lockout: 4
Password failure count reset interval: 0 days 03:00:00
Password lockout duration: 0 days 03:00:00

I can change all the time the password of the principal with that policy 
applied despite the minimum password life described.
Also I'm able to apply old passwords and the history is not being respected, 
but I'm afraid that's the expected behavior because of the LDAP database module.

Using kpasswd, then the reject message is correctly prompted:

Password change rejected: Password cannot be changed because it was changed too 
recently. Please wait until Sun Aug 23 07:42:10 2020 before you change it.
If you need to change your password before then, contact your system security 
administrator.

I understand that cpw is more like the administration password changing tool 
and in order to be able to change the password whenever it requires by the 
system administrator, the minimum password life is not being applied.
But then, Any ideas about how could we proceed?

Our kerberos version: 1.12.5-40.34.1
OS: Suse 12 SP3

We are not able to install more recent software due to some customer 
requirements, although  would be apprecited to know if further versions have a 
different behavior.


Dario Garcia
Díaz-Miguel
GGCS-SES Unit
GGCS SKMF Infrastructure Division
GMV
C\ de Isaac Newton, 11
28760, Tres Cantos, Madrid
España
+34 918 07 21 00
+34 918 07 21 99
www.gmv.com










-----Mensaje original-----
De: Greg Hudson [mailto:ghud...@mit.edu]
Enviado el: miércoles, 12 de agosto de 2020 17:52
Para: Dario García Díaz-Miguel <dgd...@gmv.com>; kerberos@mit.edu
Asunto: Re: cpw ignoring password policies

On 8/12/20 5:39 AM, Dario García Díaz-Miguel wrote:
> kadmin -k -t $KEYTABLOCATION -p $SERVICEPRINCIPAL -q "cpw $PRINCIPAL -pw 
> $PASSWORD"
>
> What we found is that this command ignores the password policy assigned to 
> the principal, including all the complexity rules and history options. No 
> matter if the command is launched in a kadmin console interactive mode, 
> policies are totally ignored.
>
> If we use:
>
> kpasswd $PRINCIPAL

That's unexpected, and it's not the behavior I see in a test environment:

$ kadmin.local addpol -minlength 6 testpol $ kadmin.local modprinc -policy 
testpol user $ kadmin -k -p user/admin cpw -pw pw user
change_password: Password is too short while changing password for 
"u...@krbtest.com".
$ kadmin.local cpw -pw pw user
change_password: Password is too short while changing password for 
"u...@krbtest.com".

What software and version is running on the kadmin server?

P Please consider the environment before printing this e-mail.

________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

Reply via email to