I just uploaded calamares-settings-ubuntu 1:25.04.12. This has the effect of creating user password requirements consistent with NIST recommendations in the Calamares installer. There is a checkbox the user can use to ignore these requirements. At that point, it will simply provide warnings.
Just FYI, but my download script also grabs the manifest file and shows package details from that (in a diff with my prior download… if I look at the output on a terminal)
Nothing wrong with where you got it from, what I pasted was from the current directory; but if you compare the data in the manifest file in the directory you examined; you’ll find the same data.
By examining Index of /lubuntu/daily-live you’ll note currently both places have the same (Last modified metadata showing in the directory is something you can look at*)
There’s no mention of NIST on the screen. Here’s an example of what you should see (this was posted on the Lubuntu Development room on Matrix so if you’re there, you’ve probably already seen it):
I’m intentionally going to avoid explaining it because I want to see how easy it is to figure out.
As far as getting the package is concerned, first there’s the long wait for it to show up in the archives. It hit the release pocket when I sent that last message in but it took something like 4 hours for it to finally appear in the archives. That was weird. I don’t know what was up with that. I made that upload days ago but it took this long to even migrate to the release pocket because there was some sort of malfunction with the Launchpad armhf builders.
So right now, no matter what image you have, to get the update, you can run update and upgrade calamares-settings-lubuntu and run the installer and you’ll see it.
As far as what I mean by “next daily,” it’s important to consider the cdimage crontab. This will tell you when to expect an image, or at least when it will start building. You can see the relevant line for Lubuntu and Plucky is:
As I write this, it’s 8:19 UTC. Since that last post was 8h ago, then it was roughly at 00:19. Too early for a daily. It still is. Another 8 hours, at least. My memory is that it takes about 90 minutes for an image to build. So maybe by 18:00 you should have a new daily to test.
But like I said before, there’s no need to wait. Just update on the image you have.
Tested the daily from 06.02.2025 - ran update and then install and yes the “require strong passwords” box was present and prechecked … no problems encountered.
Thanks as always for the testing, Leo. What are your thoughts on it from a user experience? All made sense? Imagine you were the kind of person that loved to make all your passwords “password.” How would you feel about it?
Thanks for asking…I think the only thing missing is some explanation as to what a “strong password” is and consists of. Regarding the user who just wants to use “password” he can easily remove the checkmark from the box so should be no problem.
Yeah I kind of agree with that. I mean, the explanation for a weak password is provided in the message to the right of the password entry fields. The problem is your password could have many reasons for being weak and so you have to you have to figure it out as you go. When I make passwords, I try to understand what the password requirements are before randomly generating one. Of course, I’m not really the target user here. I see this more to encourage less security-minded users to be a bit more secure.
The other way to look at this is considering the amount of effort it would take to explicitly spell out all of the requirements on the screen. Extensibly, I think this would require an entire redesign of the UI. The password field would almost need its own screen. Look at all the options to libpwquality and you’ll see what I mean.
Agree about the complexity – the explantion of a weak password is good but would be better if it were more obvious to the less exerienced user.
i.e. if further to the text"require strong password" add “at least 8 characters with mixture of letters,numbers and punctuation”.
That’s the other problem: it’s more complicated than that. Use the following from upstream (which I based our settings on with one very minor change— no limit on length) with the above link the libpwquality and you’ll see what I mean:
# These are requirements the try to follow the suggestions from
# https://pages.nist.gov/800-63-3/sp800-63b.html , "Digital Identity Guidelines".
# Note that requiring long and complex passwords has its own cost,
# because the user has to come up with one at install time.
# Setting 'allowWeakPasswords' to false and 'doAutologin' to false
# will require a strong password and prevent (graphical) login
# without the password. It is likely to be annoying for casual users.
#
# passwordRequirements:
# minLength: 8
# maxLength: 64
# libpwquality:
# - minlen=8
# - maxrepeat=3
# - maxsequence=3
# - usersubstr=4
# - badwords=linux
I’ve still not looked at it (I do see the package on the new daily; if I have time today I’ll peek, but today my priority is UWN/News), but if helpful, we can provide a paragraph in the release notes, it could even contain a link to this thread anyway (given a copy will exist on this site in fact instead of our old discourse it’ll likely be more noticeable too).
As far as testing this is concerned, it’s more than sufficient! FWIW, though, you could use it on your main rig. Just, obviously, don’t start the installation.