diff options
| author | Eric Biggers <ebiggers@google.com> | 2020-05-13 18:53:56 -0700 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2020-05-13 18:53:56 -0700 |
| commit | e5ffbb1c0e648d83864c44f8ee25eae59eab211d (patch) | |
| tree | 58cb72b38b284a3ea938b854cc92293061ce7543 /README.md | |
| parent | 1fbde0288b2d53d4e811b8869979429a57bff58f (diff) | |
README.md: fix typo "nrounds" => "rounds" (#228)
Update https://github.com/google/fscrypt/issues/220
Diffstat (limited to 'README.md')
| -rw-r--r-- | README.md | 6 |
1 files changed, 3 insertions, 3 deletions
@@ -306,10 +306,10 @@ passphrase). To do this, find the line in `/etc/pam.d/passwd` that looks like: password required pam_unix.so sha512 shadow nullok ``` -Append `nrounds=1000000` (or another number of your choice; the goal is to make +Append `rounds=1000000` (or another number of your choice; the goal is to make the passphrase hashing take about 1 second, similar to `fscrypt`'s default): ``` -password required pam_unix.so sha512 shadow nullok nrounds=1000000 +password required pam_unix.so sha512 shadow nullok rounds=1000000 ``` Then, change your login passphrase to a new, strong passphrase: @@ -320,7 +320,7 @@ passwd If you'd like to keep the same login passphrase (not recommended, as the old passphrase hash may still be recoverable from disk), then instead run `sudo passwd $USER` and enter your existing passphrase. This re-hashes your -existing passphrase with the new `nrounds`. +existing passphrase with the new `rounds`. ### Enabling the PAM module |