From: "Björn Esser" <bes@pengutronix.de>
To: ptxdist@pengutronix.de, b.esser@pengutronix.de
Subject: Re: [ptxdist] [PATCH v3] libxcrypt: new package
Date: Wed, 18 Sep 2019 12:34:18 +0200 [thread overview]
Message-ID: <6c96f889fd74c14b7153d621e46cc1248ddfc0cb.camel@pengutronix.de> (raw)
In-Reply-To: <29408b87-d523-78ba-0b50-67c1d6357179@pengutronix.de>
Hello Ahmad,
On Mi, 2019-09-18 at 12:06 +0200, Ahmad Fatoum wrote:
> Hello Björn,
>
> On 9/18/19 11:57 AM, Björn Esser wrote:
> > From: Björn Esser <bes@pengutronix.de>
> >
> > Also implement the needed logic to (optionally) replace
> > the libcrypt from the selected libc with libxcrypt.
> >
> > libxcrypt is a modern library for one-way hashing of passwords.
> > It supports a wide variety of both modern and historical hashing
> > methods: yescrypt, gost-yescrypt, scrypt, bcrypt, sha512crypt,
> > sha256crypt, md5crypt, SunMD5, sha1crypt, NT, bsdicrypt, bigcrypt,
> > and descrypt. It provides the traditional Unix crypt and crypt_r
> > interfaces, as well as a set of extended interfaces pioneered by
> > Openwall Linux, crypt_rn, crypt_ra, crypt_gensalt,
> > crypt_gensalt_rn,
> > and crypt_gensalt_ra.
> >
> > libxcrypt is intended to be used by login(1), passwd(1), and other
> > similar programs; that is, to hash a small number of passwords
> > during an interactive authentication dialogue with a human. It is
> > not suitable for use in bulk password-cracking applications, or in
> > any other situation where speed is more important than careful
> > handling of sensitive data. However, it is intended to be fast and
> > lightweight enough for use in servers that must field thousands of
> > login attempts per minute.
> >
> > Signed-off-by: Björn Esser <bes@pengutronix.de>
> > ---
>
> It's customary to add a simple change log that highlights revision
> differences here after the ---, something like:
>
> v2 -> v3:
> - Foo'd the bar ($reviewer1_who_suggested_it)
> v1 -> v2:
> - Bar'd the foo ($reviewer2)
>
> For larger patch series, these can be placed in the cover letter.
>
> Cheers
> Ahmad
excuse me, I'm sorry. Here is the CLog:
v2 -> v3:
- Added 3 files that also needed minor adaptions and I forgot to add
to the initial patch.
v1 -> v2:
- Adapt the two remarks pointed out by Dennis Osterland
Cheers
Björn
> > rules/glibc.in | 4 ++
> > rules/libc.in | 7 ++-
> > rules/libcrypt.in | 38 +++++++++++++++
> > rules/libcrypt.make | 16 ++++++
> > rules/libxcrypt.in | 114
> > +++++++++++++++++++++++++++++++++++++++++++
> > rules/libxcrypt.make | 96 ++++++++++++++++++++++++++++++++++++
> > rules/uclibc.in | 4 ++
> > 7 files changed, 275 insertions(+), 4 deletions(-)
> > create mode 100644 rules/libcrypt.in
> > create mode 100644 rules/libcrypt.make
> > create mode 100644 rules/libxcrypt.in
> > create mode 100644 rules/libxcrypt.make
> >
> > diff --git a/rules/glibc.in b/rules/glibc.in
> > index 16e5e84d1..0883e0543 100644
> > --- a/rules/glibc.in
> > +++ b/rules/glibc.in
> > @@ -79,12 +79,16 @@ config GLIBC_DL
> > functionality you should probably use libtool instead. It is
> > much more cross
> > platform compatible than dlopen, etc. It also supports BeOS.
> > See related links.
> >
> > +if NATIVE_CRYPT
> > +
> > config GLIBC_CRYPT
> > bool
> > prompt "Install libcrypt"
> > help
> > The encryption/decryption library
> >
> > +endif
> > +
> > config GLIBC_UTIL
> > bool
> > prompt "Install libutil"
> > diff --git a/rules/libc.in b/rules/libc.in
> > index b4aa3b9f2..60ceecbe6 100644
> > --- a/rules/libc.in
> > +++ b/rules/libc.in
> > @@ -56,10 +56,9 @@ config LIBC_DL
> > select GLIBC_DL if LIBC_GLIBC
> > select UCLIBC_DL if LIBC_UCLIBC
> >
> > -config LIBC_CRYPT
> > - bool
> > - select GLIBC_CRYPT if LIBC_GLIBC
> > - select UCLIBC_CRYPT if LIBC_UCLIBC
> > +#
> > +# LIBC_CRYPT is handled by rules/libcrypt.in.
> > +#
> >
> > config LIBC_UTIL
> > bool
> > diff --git a/rules/libcrypt.in b/rules/libcrypt.in
> > new file mode 100644
> > index 000000000..be9642da0
> > --- /dev/null
> > +++ b/rules/libcrypt.in
> > @@ -0,0 +1,38 @@
> > +## SECTION=core
> > +
> > +menuconfig LIBC_CRYPT
> > + bool
> > + prompt "POSIX crypt implementation "
> > + select LIBXCRYPT if !NATIVE_CRYPT
> > + select INTERNAL_CRYPT if NATIVE_CRYPT
> > +
> > +if LIBC_CRYPT
> > +
> > +choice
> > + prompt "POSIX crypt implementation "
> > + default NATIVE_CRYPT
> > +
> > + config NATIVE_CRYPT
> > + bool
> > + prompt "libc internal"
> > + help
> > + This menu entry selects the basic libcrypt provided
> > + by the selected libc implementation of the system.
> > +
> > + config EXTENDED_CRYPT
> > + bool
> > + prompt "libxcrypt "
> > + help
> > + This menu entry selects the extended libcrypt
> > + implementation provided by the libxcrypt package.
> > +
> > + Please see "System Libraries" for the configuration
> > + options of libxcrypt.
> > +endchoice
> > +
> > +config INTERNAL_CRYPT
> > + bool
> > + select GLIBC_CRYPT if LIBC_GLIBC
> > + select UCLIBC_CRYPT if LIBC_UCLIBC
> > +
> > +endif
> > diff --git a/rules/libcrypt.make b/rules/libcrypt.make
> > new file mode 100644
> > index 000000000..0cc526de4
> > --- /dev/null
> > +++ b/rules/libcrypt.make
> > @@ -0,0 +1,16 @@
> > +# -*-makefile-*-
> > +#
> > +# Copyright (C) 2019 by Bjoern Esser <bes@pengutronix.de>
> > +#
> > +# For further information about the PTXdist project and license
> > conditions
> > +# see the README file.
> > +#
> > +
> > +#
> > +# We provide this package
> > +#
> > +PACKAGES-$(PTXCONF_LIBCRYPT) += libcrypt
> > +
> > +LIBCRYPT_LICENSE:= ignore
> > +
> > +# vim: syntax=make
> > diff --git a/rules/libxcrypt.in b/rules/libxcrypt.in
> > new file mode 100644
> > index 000000000..1db488941
> > --- /dev/null
> > +++ b/rules/libxcrypt.in
> > @@ -0,0 +1,114 @@
> > +## SECTION=system_libraries
> > +
> > +menuconfig LIBXCRYPT
> > + bool
> > + prompt "libxcrypt "
> > + depends on !NATIVE_CRYPT
> > + help
> > + Extended crypt library for descrypt, md5crypt, bcrypt, and
> > others.
> > +
> > + libxcrypt is a modern library for one-way hashing of
> > passwords.
> > + It supports a wide variety of both modern and historical
> > hashing
> > + methods: yescrypt, gost-yescrypt, scrypt, bcrypt,
> > sha512crypt,
> > + sha256crypt, md5crypt, SunMD5, sha1crypt, NT, bsdicrypt,
> > bigcrypt,
> > + and descrypt. It provides the traditional Unix crypt and
> > crypt_r
> > + interfaces, as well as a set of extended interfaces pioneered
> > by
> > + Openwall Linux, crypt_rn, crypt_ra, crypt_gensalt,
> > + crypt_gensalt_rn, and crypt_gensalt_ra.
> > +
> > + libxcrypt is intended to be used by login(1), passwd(1), and
> > other
> > + similar programs; that is, to hash a small number of
> > passwords
> > + during an interactive authentication dialogue with a
> > human. It is
> > + not suitable for use in bulk password-cracking applications,
> > or in
> > + any other situation where speed is more important than
> > careful
> > + handling of sensitive data. However, it is intended to be
> > fast and
> > + lightweight enough for use in servers that must field
> > thousands of
> > + login attempts per minute.
> > +
> > +if LIBXCRYPT
> > +
> > +config LIBXCRYPT_GLIBC_BINARY_COMPAT
> > + bool
> > + prompt "Enable full glibc binary compatibility"
> > + help
> > + When enabled, this option includes the interfaces for full
> > binary
> > + compatibility with glibc.
> > +
> > + This setting only affects existing binaries; new programs
> > cannot
> > + be linked against them.
> > +
> > +if LIBXCRYPT_GLIBC_BINARY_COMPAT
> > +
> > +config LIBXCRYPT_OBSOLETE_STUBS
> > + bool
> > + prompt "Replace obsolete functions with non-functional stubs"
> > + help
> > + If enabled, this option replaces the obsolete APIs (fcrypt,
> > + encrypt{,_r}, and setkey{,_r}) with stubs that set errno to
> > + ENOSYS and return without performing any real operations.
> > +
> > + For security reasons, the encrypt{,r} functions will also
> > + overwrite their data-block argument with random bits.
> > +
> > + The fcrypt function will also always return NULL-pointer.
> > +
> > +endif
> > +
> > +config LIBXCRYPT_BCRYPT_X
> > + bool
> > + prompt "Support for verifying weak bcrypt ($2x$) hashes"
> > + help
> > + The alternative prefix "$2x$" provides bug-compatibility with
> > + crypt_blowfish 1.0.4 and earlier, which incorrectly processed
> > + characters with the 8th bit set.
> > +
> > +config LIBXCRYPT_SHA1CRYPT
> > + bool
> > + prompt "sha1crypt ($sha1) hashing method"
> > + help
> > + A hash based on HMAC-SHA1. Originally developed for NetBSD.
> > +
> > + Enable this for compatibility with passphrases that have been
> > + hashed on NetBSD.
> > +
> > +config LIBXCRYPT_SUNMD5
> > + bool
> > + prompt "SunMD5 ($md5) hashing method"
> > + help
> > + A hash based on the MD5 algorithm, with additional cleverness
> > + to make precomputation difficult.
> > +
> > + Enable this for full compatibility with passphrases that have
> > + been hashed on Solaris.
> > +
> > +config LIBXCRYPT_NTHASH
> > + bool
> > + prompt "NTHASH ($3$) hashing method"
> > + help
> > + The hashing method used for network authentication in some
> > + versions of the SMB/CIFS protocol.
> > +
> > + Available, for cross-compatibility's sake, on FreeBSD.
> > +
> > +config LIBXCRYPT_BSDICRYPT
> > + bool
> > + prompt "bsdicrypt ($2x$) hashing method"
> > + help
> > + A weak extension of traditional DES, which eliminates the
> > + length limit, increases the salt size, and makes the time
> > + cost tunable.
> > +
> > + It originates with BSDI and is also available on at least
> > + NetBSD, OpenBSD, FreeBSD, and MacOSX.
> > +
> > +config LIBXCRYPT_BIGCRYPT
> > + bool
> > + prompt "bigcrypt hashing method"
> > + help
> > + A weak extension of traditional DES, available on some
> > + System V-derived Unixes. All it does is raise the length
> > + limit from 8 to 128 characters, and it does this in a crude
> > + way that allows attackers to guess chunks of a long
> > passphrase
> > + in parallel.
> > +
> > +endif
> > diff --git a/rules/libxcrypt.make b/rules/libxcrypt.make
> > new file mode 100644
> > index 000000000..df5d25b1d
> > --- /dev/null
> > +++ b/rules/libxcrypt.make
> > @@ -0,0 +1,96 @@
> > +# -*-makefile-*-
> > +#
> > +# Copyright (C) 2019 by Bjoern Esser <bes@pengutronix.de>
> > +#
> > +# For further information about the PTXdist project and license
> > conditions
> > +# see the README file.
> > +#
> > +
> > +#
> > +# We provide this package
> > +#
> > +PACKAGES-$(PTXCONF_LIBXCRYPT) += libxcrypt
> > +
> > +#
> > +# Paths and names
> > +#
> > +LIBXCRYPT_VERSION := 4.4.9
> > +LIBXCRYPT_MD5 := 7c2d5206dfb6a72ed464eee812a58fcf
> > +LIBXCRYPT := libxcrypt-$(LIBXCRYPT_VERSION)
> > +LIBXCRYPT_SUFFIX := tar.gz
> > +LIBXCRYPT_URL :=
> > https://github.com/besser82/libxcrypt/archive/v$(LIBXCRYPT_VERSION).$(LIBXCRYPT_SUFFIX
> > )
> > +LIBXCRYPT_SOURCE := $(SRCDIR)/$(LIBXCRYPT).$(LIBXCRYPT_SUFFIX)
> > +LIBXCRYPT_DIR := $(BUILDDIR)/$(LIBXCRYPT)
> > +LIBXCRYPT_LICENSE := LGPL-2.1-or-later AND BSD-3-Clause AND BSD-
> > 2-Clause AND 0BSD AND public_domain
> > +LIBXCRYPT_LICENSE_MD5 :=
> > file://LICENSING;md5=3bb6614cf5880cbf1b9dbd9e3d145e2c
> > +
> > +# ----------------------------------------------------------------
> > ------------
> > +# Prepare
> > +# ----------------------------------------------------------------
> > ------------
> > +
> > +#
> > +# options
> > +#
> > +
> > +# Hash methods enabled by default.
> > +HASH_METHODS := glibc,strong
> > +
> > +ifdef PTXCONF_LIBXCRYPT_BCRYPT_X
> > +HASH_METHODS := $(HASH_METHODS),bcrypt_x
> > +endif
> > +
> > +ifdef PTXCONF_LIBXCRYPT_SHA1CRYPT
> > +HASH_METHODS := $(HASH_METHODS),sha1crypt
> > +endif
> > +
> > +ifdef PTXCONF_LIBXCRYPT_SUNMD5
> > +HASH_METHODS := $(HASH_METHODS),sunmd5
> > +endif
> > +
> > +ifdef PTXCONF_LIBXCRYPT_NTHASH
> > +HASH_METHODS := $(HASH_METHODS),nt
> > +endif
> > +
> > +ifdef PTXCONF_LIBXCRYPT_BSDICRYPT
> > +HASH_METHODS := $(HASH_METHODS),bdsicrypt
> > +endif
> > +
> > +ifdef PTXCONF_LIBXCRYPT_BIGCRYPT
> > +HASH_METHODS := $(HASH_METHODS),bigcrypt
> > +endif
> > +
> > +#
> > +# autoconf
> > +#
> > +LIBXCRYPT_CONF_TOOL := autoconf
> > +LIBXCRYPT_CONF_OPT := \
> > + $(CROSS_AUTOCONF_USR) \
> > + --disable-failure-tokens \
> > + --disable-static \
> > + --disable-valgrind \
> > + --enable-obsolete-api=$(call
> > ptx/ifdef,PTXCONF_LIBXCRYPT_GLIBC_BINARY_COMPAT,glibc,no) \
> > + --enable-obsolete-api-enosys=$(call
> > ptx/ifdef,PTXCONF_LIBXCRYPT_OBSOLETE_STUBS,yes,no) \
> > + --enable-hashes=$(HASH_METHODS) \
> > + --enable-xcrypt-compat-files
> > +
> > +# ----------------------------------------------------------------
> > ------------
> > +# Target-Install
> > +# ----------------------------------------------------------------
> > ------------
> > +
> > +$(STATEDIR)/libxcrypt.targetinstall:
> > + @$(call targetinfo)
> > +
> > + @$(call install_init, libxcrypt)
> > + @$(call install_fixup, libxcrypt,PRIORITY,optional)
> > + @$(call install_fixup, libxcrypt,SECTION,base)
> > + @$(call install_fixup, libxcrypt,AUTHOR,"Bjoern Esser <
> > bes@pengutronix.de>")
> > + @$(call install_fixup, libxcrypt,DESCRIPTION,Extended crypt
> > library for descrypt$(comma) \
> > + md5crypt$(comma)
> > bcrypt$(comma) and others.)
> > +
> > + @$(call install_lib, libxcrypt, 0, 0, 0644, libcrypt)
> > +
> > + @$(call install_finish, libxcrypt)
> > +
> > + @$(call touch)
> > +
> > +# vim: syntax=make
> > diff --git a/rules/uclibc.in b/rules/uclibc.in
> > index 1fa99eba5..3e4b3d5b3 100644
> > --- a/rules/uclibc.in
> > +++ b/rules/uclibc.in
> > @@ -24,12 +24,16 @@ config UCLIBC_C
> >
> > Better not turn this option off..
> >
> > +if NATIVE_CRYPT
> > +
> > config UCLIBC_CRYPT
> > bool
> > prompt "Install libcrypt"
> > help
> > The encryption/decryption library
> >
> > +endif
> > +
> > config UCLIBC_DL
> > bool
> > prompt "Install libdl"
> >
_______________________________________________
ptxdist mailing list
ptxdist@pengutronix.de
next prev parent reply other threads:[~2019-09-18 10:34 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-09-16 12:57 [ptxdist] [PATCH] " Björn Esser
2019-09-18 5:41 ` Denis OSTERLAND
2019-09-18 8:41 ` [ptxdist] [PATCH v2] " Björn Esser
2019-09-18 9:57 ` [ptxdist] [PATCH v3] " Björn Esser
2019-09-18 10:06 ` Ahmad Fatoum
2019-09-18 10:34 ` Björn Esser [this message]
2019-09-23 10:07 ` [ptxdist] [PATCH v4] " Björn Esser
2019-09-23 10:12 ` Lucas Stach
2019-09-23 10:42 ` Björn Esser
2022-05-04 16:58 ` [ptxdist] [PATCH v5] " Andreas Helmcke
2022-05-05 7:27 ` Alexander Dahl
2022-05-05 12:46 ` [ptxdist] [PATCH v6] " Andreas Helmcke
2022-05-06 8:49 ` Michael Olbrich
2022-05-06 11:27 ` [ptxdist] [PATCH v7] " Andreas Helmcke
2022-05-06 11:41 ` Michael Olbrich
2022-05-07 20:44 ` [ptxdist] [PATCH v8] " Andreas Helmcke
2023-10-16 17:01 ` [ptxdist] [PATCH v9] " Andreas Helmcke
2023-11-10 7:25 ` [ptxdist] [APPLIED] " Michael Olbrich
2023-11-10 7:32 ` [ptxdist] [PATCH v9] " Michael Olbrich
2022-05-06 11:53 ` [ptxdist] [PATCH v7] " Alexander Dahl
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=6c96f889fd74c14b7153d621e46cc1248ddfc0cb.camel@pengutronix.de \
--to=bes@pengutronix.de \
--cc=b.esser@pengutronix.de \
--cc=ptxdist@pengutronix.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox