Password configuration options before Release 24.4.1:
Until Release 24.4.1, there were two options for configuring a password:
-
Password: uses Type 7 encryption to store the password.
-
Secret: supports Type 5, 8, 9, or 10 hashing algorithms to store the password securely.
Starting with Release 24.4.1, Type 7 password and Type 5 secret are deprecated because of security concerns. The deprecation
process began in Release 24.4.1 and will be complete in a future release. We recommend using the default option, Type 10 secret.
password
The password options available in CLI from Release 24.4.1:
RP/0/RP0/CPU0:ios(config-un)#password ?
LINE The type 7 password followed by '7 ' OR SHA512-based password (deprecated, use 'secret')
Changes:
-
All the options that were present until Release 24.4.1 are removed except LINE (to accept cleartext).
-
During upgrade: Any configuration using the Type 7 password configuration is automatically converted to Type 10 secret.
-
Post-upgrade: You can still use the Type 7 password option in new commits, but the password is stored as Type 10 secret.
-
New syslog has been added to indicate the deprecation process:
%SECURITY-PSLIB-4-DEPRECATED_PASSWORD_TYPE : The password configuration is deprecated.
Converting it to a Type 10 secret for user <user name>.
-
show running configuration command output before upgrade:
username example
password 7 106D000A0618
!
show running configuration command output post-upgrade:
username example
secret 10 $6$P53pb/FFxNIT4b/.$yVakako4fp9PZiIYYh1xS0.W6b/yPrSyC8j4gLs6xli57iClOryPXyN9y8yojRD2nhAWb9pjr/WAIhbXqq8st.
!
masked-password
The masked-password options available in CLI from Release 24.4.1:
RP/0/RP0/CPU0:ios(config-un)#masked-password ?
0 Specifies a cleartext password will follow
clear Config deprecated. Will be removed in 7.7.1. Specify '0' instead.
<cr> The cleartext user password
Changes:
-
The options 7 and encrypted, available in Release 24.4.1 and earlier, are removed.
-
During upgrade: Any configuration using the Type 7 password configuration is automatically converted to Type 10 secret.
-
Post-upgrade: Masked-password remains an alternate method for configuring the password. When you use the masked-password keyword
with a clear string in new commits, the password is stored as Type 10 secret.
-
New syslog has been added to indicate the deprecation process:
%SECURITY-PSLIB-4-DEPRECATED_PASSWORD_TYPE : The password configuration is deprecated.
Converting it to a Type 10 secret for user <user name>.
-
show running configuration command output before upgrade:
username example
password 7 106D000A0618
!
show running configuration command output post-upgrade:
username example
secret 10 $6$P53pb/FFxNIT4b/.$yVakako4fp9PZiIYYh1xS0.W6b/yPrSyC8j4gLs6xli57iClOryPXyN9y8yojRD2nhAWb9pjr/WAIhbXqq8st.
!
password-policy
The password-policy options available in CLI from Release 24.4.1:
RP/0/RP0/CPU0:ios(config-un)#password-policy ?
WORD Specify the password policy name
RP/0/RP0/CPU0:ios(config-un)#password-policy abcd password ?
0 Specifies an UNENCRYPTED password will follow
7 Specifies that an encrypted password will follow
LINE The UNENCRYPTED (cleartext) user password
clear Config deprecated. Will be removed in 7.7.1. Specify '0' instead.
encrypted Config deprecated. Will be removed in 7.7.1. Specify '7' instead.
Changes:
-
All the options that were present until 24.4.1 are removed except LINE (to accept cleartext).
-
During upgrade: Any configuration using the Type 7 password configuration is automatically converted to Type 10 secret.
-
Post-upgrade: You can still use the password-policy option with new commits, but the password is stored as Type 10 secret.
aaa password-policy
The aaa password-policy options available in CLI from Release 24.4.1:
RP/0/RP0/CPU0:ios(config)#aaa password-policy abcd
RP/0/RP0/CPU0:ios(config-pp)#?
min-char-change Number of characters change required between old and new passwords (deprecated, will be removed in 25.3.1)
restrict-password-advanced Advanced restrictions on new password (deprecated, will be removed in 25.3.1)
restrict-password-reverse Restricts the password to be same as reversed old password (deprecated, will be removed in 25.3.1)
Changes:
-
The options min-char-change, restrict-password-advanced, and restrict-password-reverse, available in Release 24.4.1 and earlier,
are now deprecated.
-
During upgrade: These deprecated configurations do not go through any change during upgrade.
-
Post-upgrade: These deprecated keywords do not take effect when configured post-upgrade.
-
New syslog messages have been added to indicate the deprecation process:
%SECURITY-LOCALD-4-DEPRECATED_PASSWORD_POLICY_OPTION : The password policy option 'min-char-change' is deprecated.
Password/Secret will not be checked against this option now.
%SECURITY-LOCALD-4-DEPRECATED_PASSWORD_POLICY_OPTION : The password policy option 'restrict-password-reverse' is deprecated.
Password/Secret will not be checked against this option now.
%SECURITY-LOCALD-4-DEPRECATED_PASSWORD_POLICY_OPTION : The password policy option 'restrict-password-advanced' is deprecated.
Password/Secret will not be checked against this option now.
-
show running configuration command output before upgrade:
aaa password-policy abcd
lower-case 3
min-char-change 1
restrict-password-reverse
restrict-password-advanced
!
show running configuration command output post-upgrade:
aaa password-policy abcd
lower-case 3
min-char-change 1
restrict-password-reverse
restrict-password-advanced
!
secret
The secret options available in CLI from Release 24.4.1:
RP/0/RP0/CPU0:ios(config-un)#secret ?
0 Specifies a cleartext password will follow
10 Specifies that SHA512-based password will follow
8 Specifies that SHA256-based password will follow
9 Specifies that Scrypt-based password will follow
LINE The cleartext user password
RP/0/RP0/CPU0:ios(config-un)#secret 0 enc-type ?
<8-10> Specifies which algorithm to use. Only 8,9,10 supported [Note: Option '5' is not available to use from 24.4]
Changes:
-
The options 5 and encrypted are removed.
-
During upgrade: Configurations using Type 5 secret will remain unchanged.
-
Post-upgrade: Although keyword 5 is deprecated, you can still use existing configurations with Type 5 secret.
-
New syslog has been added to indicate the deprecation process:
%SECURITY-LOCALD-2-DEPRECATED_SECRET_TYPE : Type 5 secret is deprecated.
Please use the 'secret' keyword with option type 10 for user.
-
show running configuration command output before upgrade:
username example
secret 5 $1$kACo$2RtpcwyiRuRB/DhWzabfU1
!
!
show running configuration command output post-upgrade:
username example
secret 5 $1$kACo$2RtpcwyiRuRB/DhWzabfU1
!
!
masked-secret
The masked-secret options available in CLI from Release 24.4.1:
RP/0/RP0/CPU0:ios(config-un)#masked-secret ?
0 Specifies a cleartext password will follow
10 Specifies that SHA512-based password will follow
8 Specifies that SHA256-based password will follow
9 Specifies that Scrypt-based password will follow
clear Config deprecated. Will be removed in 7.7.1. Specify '0' instead.
<cr> The cleartext user password
Changes:
-
The options 5 and encrypted are removed.
-
During upgrade: Configurations using masked-secret with Type 5 will remain unchanged.
-
Post-upgrade: Although keyword 5 is deprecated, you can still use existing configurations with Type 5 masked secret.
-
New syslog has been added to indicate the deprecation process:
%SECURITY-LOCALD-2-DEPRECATED_SECRET_TYPE : Type 5 secret is deprecated.
Please use the 'secret' keyword with option type 10 for user.
-
show running configuration command output before upgrade:
username example
secret 5 $1$kACo$2RtpcwyiRuRB/DhWzabfU1
!
!
show running configuration command output post-upgrade:
username example
secret 5 $1$kACo$2RtpcwyiRuRB/DhWzabfU1
!
!