Exercising Pam_cracklib From The Command Line

Home » CentOS » Exercising Pam_cracklib From The Command Line
CentOS 2 Comments

CentOS-6.6

Is there any command line program that determines and reports what pam_cracklib.so returns for a given password; subject to variation in the command line options and values provided? For example, assuming a cli driver program called cli_driver_pgm:

cli_driver_pgm pam_cracklib.so difok=8 minlen dcredit=3 ucredit=3
lcredit=3 ocredit=3 minclass=2 maxrepeat=3 maxsequence=3 reject_username gecoscheck — somepassword

-> pam_cracklib calculated minlen value for somepassword

My Google-fu appears to have deserted me.

2 thoughts on - Exercising Pam_cracklib From The Command Line

  • I came up with cracklib-check too. It too uses FascistCheck like pam_cracklib but none of the elements that are configurable for pam_cracklib are setable for cracklib-check. I have obtained the source for pam_cracklib so I will see if I can create something on my own to yield what I wish. Sometime. Maybe. If I live long enough.