My SLES 11 boxes already have this option built in. I can see some
references online stating that SLES 10 SP2 may also have had this
option, but I do not have a box that old to check (SLES 10 is pretty old
at this point). If it’s an option I"d guess you need to be on a current
Support Pack at least which should be doable by downloading it from the
download site. Similarly RHEL 5.0 does not look like it supported
sha512 so I’m guessing your RHEL box is newer than the originally
shipping 5.0 version.
Good luck.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/
Can you let me know where you saw references to SHA512 support for SLES 10 SP2. I can’t find this anywhere.
Our NIS server is a RHEL6 server, but we did find docs on how to add SHA512 support for the older RHEL5 and RHEL4 clients, so I have to believe it is also possible to do for SLES 10 SP2 (or not …).
Looking again I think it’s talking about sha-512 for other (non-password
hashing) purposes, so nevermind. Can you add this functionality?
Sure… it’s not like Linux changed that much between kernels to make
some common math impossible in 10 where it works in 11, but will it be
supported? That’s probably a different story. Can you enable it with a
weird hack of Yast, or can you only get it to work from the command
line? More good questions. Are you willing to take those risks?
Again, more good questions.
This all started with something about NIS on RHEL. I assume you would
be authenticating to SLES 10 (or any system, 10, 11, or another distro)
just using the NIS setup as a credential store. If that’s the case,
what does SLES support of sha-512 have to do with this? Is it SLES’s
job to sha-512 hash the password, maybe with some salt even, and then
send it across to the server for verification? If there’s a salt, how
does it know what that is? I’m more familiar with LDAP-stye
authentication and most of the systems I’ve seen there send the real
password (securely) to the backend datastore for verification, so they
don’t need to support anything other than SSL to work properly.
Good luck.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/