On Wed, Dec 29, 2010 at 12:25 AM, Bruce Dubbs <bruce.du...@gmail.com> wrote:
> You are probably right about shadow, but the main reason for the
> checksums for package downloads is to provide data integrity, not
> security.  The better way for ensuring a package has not been
> intentionally modified is to use digital signatures.
>
If you just want to use MD5 for just checking to see if a package
isn't corrupted or modified, then I'm fine with that use. For the
others, I would use SHA-2.
> Although PAM is in BLFS, I'm not aware of any changes to that package
> that would be needed to utilize a different login encryption method.
> For changing a password, I think that PAM uses whatever method currently
> is in use.   Let me add a caveat though.  I haven't used PAM in several
> years.  I think it just gets in the way.
Well, I think it uses whatever encryption option specified as an
argument to pam_unix.so. But, then again, the configuration that BLFS
uses is arleady using SHA-512 encryption.

The only thing left is to change the sed in the LFS book, and that's it.

-- 
William Immendorf
The ultimate in free computing.
Messages in plain text, please, no HTML.
GPG key ID: 1697BE98
If it's not signed, it's not from me.

--------------

"Every nonfree program has a lord, a master --
and if you use the program, he is your master."  Richard Stallman
-- 
http://linuxfromscratch.org/mailman/listinfo/lfs-dev
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page

Reply via email to