Author Topic: i have problem with users panel login page it show to me failed cwp alma linux9  (Read 86188 times)

0 Members and 1 Guest are viewing this topic.

Offline
*
hello , i have a centos web panel in alma linux 9 server, and i face this problem when i create a user panel, when i try to login to the panel it show to me failed, how can i solve this issue ?

this is the image of the issue failed when i login
https://ibb.co/h8cF9Yk

Offline
*****
We are working on resolving this issue, a quick fix is ​​to go to this file
Code: [Select]
nano /etc/login.defs


and comment out the following line

Code: [Select]
SHA_CRYPT_MAX_ROUNDS 5000


to

Code: [Select]
#SHA_CRYPT_MAX_ROUNDS 5000

After this you can change the user's password from the cwp administration panel and you will be able to login.

Offline
*
thank you , it worked

Offline
*
tnx. its working.

Offline
*
We are working on resolving this issue, a quick fix is ​​to go to this file
Code: [Select]
nano /etc/login.defs


and comment out the following line

Code: [Select]
SHA_CRYPT_MAX_ROUNDS 5000


to

Code: [Select]
#SHA_CRYPT_MAX_ROUNDS 5000

After this you can change the user's password from the cwp administration panel and you will be able to login.

it worked for me as well  :D
thank you for your kind support ❤️

Offline
***
We are working on resolving this issue, a quick fix is ​​to go to this file
Code: [Select]
nano /etc/login.defs


and comment out the following line

Code: [Select]
SHA_CRYPT_MAX_ROUNDS 5000


to

Code: [Select]
#SHA_CRYPT_MAX_ROUNDS 5000

After this you can change the user's password from the cwp administration panel and you will be able to login.

it worked for me as well  :D
thank you for your kind support ❤️

Hi,

For me this line:

SHA_CRYPT_MAX_ROUNDS 5000

is

SHA_CRYPT_MAX_ROUNDS 10000

does it matter?

BR
Venty

Offline
*
Yes, the value for SHA_CRYPT_MAX_ROUNDS can matter depending on the context in which you're using it.

SHA_CRYPT_MAX_ROUNDS specifies the number of rounds to be used by the SHA-crypt algorithm when hashing passwords. This value affects the computational cost required to produce the hash. Here's a brief comparison:

5000 Rounds: Lower computational cost, faster hash generation.

10000 Rounds: Higher computational cost, slower hash generation.

A higher number of rounds generally means increased security because it takes more time and effort to compute the hash, making it more resistant to brute-force attacks. However, it also means that legitimate operations involving hashing (like user authentication) will take slightly longer.

In summary, increasing the rounds improves security at the cost of performance. If your system can handle the additional computational load without significant impact on user experience, 10000 rounds would provide better security.




The best setup for SHA_CRYPT_MAX_ROUNDS largely depends on your priorities between security and performance. Here’s a bit of a framework to help you decide:

If Security is Your Main Concern:

Set SHA_CRYPT_MAX_ROUNDS to a higher value, like 10000. This increases the complexity and time it takes for an attacker to crack the password hashes, enhancing security.

Be aware that this will also slightly increase the time taken to authenticate users.

If Performance is Your Main Concern:

Set SHA_CRYPT_MAX_ROUNDS to a lower value, such as 5000. This reduces the computational load and speeds up the authentication process, but it might be less secure compared to higher rounds.

Balanced Approach:

You might opt for a middle ground, like 7500, to balance both security and performance.

Additional Considerations:

Server Capabilities: Ensure your server can handle the chosen number of rounds without significantly impacting overall performance.

User Experience: Consider the impact on user login times and ensure it’s within acceptable limits.

Ultimately, there's no one-size-fits-all answer—it depends on your specific needs and the environment in which you're operating. If security is paramount and your infrastructure can handle it, go for the higher number of rounds. If performance is critical, you might need to compromise a bit on the number of rounds.


To assess your server's performance with different SHA_CRYPT_MAX_ROUNDS settings, you can follow these steps:

Benchmark Current Performance: Before making any changes, benchmark your server's current performance. You can use tools like sysbench or openssl to measure the time it takes to hash passwords with the current settings.

Test Different Settings: Change the SHA_CRYPT_MAX_ROUNDS value to the desired number (e.g., 5000, 7500, 10000) and run the same benchmark tests again. This will give you a comparative view of how each setting impacts performance.

Monitor System Metrics: While running the benchmarks, monitor system metrics such as CPU usage, memory usage, and I/O operations. Tools like top, htop, vmstat, and iostat can be useful for this purpose.

Analyze Results: Compare the benchmark results and system metrics for each setting. Look for any significant increases in resource usage or decreases in performance.

Evaluate User Experience: If possible, perform real-world tests by having users log in during off-peak hours to see if there is a noticeable impact on login times.

Make an Informed Decision: Based on the benchmark results and user experience evaluation, choose the setting that provides an acceptable balance between security and performance.



There are several benchmarking tools you can use to assess your server's performance. Here are some of the most recommended ones:

Sysbench: A versatile benchmarking tool for evaluating CPU, memory, I/O, and database performance.

openssl: Useful for cryptographic performance testing, including password hashing.

wrk: A modern, high-performance HTTP benchmarking tool that leverages multi-threading to generate high workloads.

Jmeter: An open-source application for load testing and performance measurement, supporting various protocols like HTTP, SOAP, and FTP.

K6: A popular open-source load testing tool written in Go, supporting HTTP, gRPC, and WebSocket.

Autocannon: A high-performance HTTP benchmarking tool that can test the load capacity of web applications.

Tsung: An open-source tool for stress testing and benchmarking web servers, capable of simulating thousands of users.

iostat: Useful for monitoring system input/output device loading by observing the device and partition I/O statistics.

top: A command-line tool that provides a dynamic real-time view of a running system.

htop: An interactive process viewer for Unix systems, providing a more user-friendly interface than top.



1. Sysbench
To benchmark CPU performance:

bash
sysbench --test=cpu --cpu-max-prime=20000 run
To benchmark memory performance:

bash
sysbench --test=memory run
2. OpenSSL
To benchmark SHA-256 hashing performance:

bash
openssl speed sha256
3. Wrk
To benchmark HTTP performance:

bash
wrk -t12 -c400 -d30s http://yourserver.com/index.html
-t12: 12 threads

-c400: 400 connections

-d30s: 30 seconds duration

4. Jmeter
To perform an HTTP load test:

Open Jmeter.

Create a Thread Group and set the number of users (threads) and loop count.

Add an HTTP Request sampler with your target URL.

Run the test and analyze the results in the Summary Report listener.

5. K6
To run a simple load test:

js
import http from 'k6/http';
import { sleep } from 'k6';

export let options = {
  vus: 10, // virtual users
  duration: '30s',
};

export default function () {
  http.get('http://yourserver.com/index.html');
  sleep(1);
}
Run the test with:

bash
k6 run script.js
6. Autocannon
To benchmark HTTP performance:

bash
autocannon -c 100 -d 30 -p 10 http://yourserver.com
-c 100: 100 connections

-d 30: 30 seconds duration

-p 10: 10 pipelining factor

7. Tsung
To perform a stress test:

Create a Tsung XML configuration file with the desired settings.

Start the test with:

bash
tsung start -f tsung.xml
8. Iostat
To monitor I/O statistics:

bash
iostat -x 5
-x: extended statistics

5: update interval in seconds

9. Top
To monitor system processes in real-time:

bash
top
10. Htop
To monitor system processes with a more user-friendly interface:

bash
htop
« Last Edit: February 14, 2025, 09:39:11 PM by james88 »