Exercising Pam_cracklib From The Command Line
CentOS-6.6
Is there any command line program that determines and reports what pam_cracklib.so returns for a given password; subject to variation in the command line options and values provided? For example, assuming a cli driver program called cli_driver_pgm:
cli_driver_pgm pam_cracklib.so difok=8 minlen dcredit=3 ucredit=3
lcredit=3 ocredit=3 minclass=2 maxrepeat=3 maxsequence=3 reject_username gecoscheck — somepassword
-> pam_cracklib calculated minlen value for somepassword
My Google-fu appears to have deserted me.
2 thoughts on - Exercising Pam_cracklib From The Command Line
Googling for `”pam_cracklib” cli tool` got me a recommendation of
`cracklib-check` via superuser [1]. Not sure if that does what you want, but it might be a start?
[1]: http://superuser.com/q/441220
–
I came up with cracklib-check too. It too uses FascistCheck like pam_cracklib but none of the elements that are configurable for pam_cracklib are setable for cracklib-check. I have obtained the source for pam_cracklib so I will see if I can create something on my own to yield what I wish. Sometime. Maybe. If I live long enough.