From: [EMAIL PROTECTED] 
> A client is setting up a password policy, and would like to 
> prevent users from 
> reusing a password for a period of time (four changes ninety 
> days apart). Is 
> there a way to do this, either within the OS or via a program 
> in ports? I've 
> been looking for quite a while and haven't found anything.

I haven't either, although I haven't looked really hard. I mention
http://www.mindrot.org/passwdqc.html not because I know it can do what
you're looking for but because it can offer a few steps up in password
quality which may also be in your policy.

I notice Linux's pam_cracklib
(http://www.deer-run.com/~hal/sysadmin/pam_cracklib.html) approaches this by
storing password hashes in a history file - meaning you have to basically
have the equivalent of your shadow file (with historically valuable
information) hanging around somewhere else. 

Seems to me a better solution would be to take a one-way hash of the new
password hash out to some kind of a database where a comparison could be
made against the last N password hash hashes that were used. Putting the
actual password hash out to storage for comparison seems more risky than
just a one-way hash of the hash (at least a little bit). A trigger on a
password change could easily tell if the new password hashes out to one on
record and records a hash of the hash if not.

DS

Reply via email to