Hi! I think that traditional UNIX crypt passwords are obsolete for at least 10 years. I also think that there are online services that could decode your DES-encoded challenges in a few seconds if not even faster...
What I mean to says is: Don't spend time in getting DES passwords, upgrade your security instead. Modern systems encode passwords like this (note the difference in length!): :$6$CM21wofswJzjH.NfEtuX3m6Hjtx4H0mLq4MID3JqK254DCIw6Sjeh1kmI27DEwcAb8ilxb8KH08PmQIcTD8XloWFAXKmC/uuR1 See man crypt(3) for glibc: I knows about: Traditional DES-based Extended BSDI-style DES-based FreeBSD-style MD5-based SHA256 based SHA512 based OpenBSD-style Blowfish-based (bcrypt) So I guess you get the idea... Regards, Ulrich >>> <yokoy...@jacic.or.jp> schrieb am 20.09.2018 um 01:43 in Nachricht <201809192343.w8jnh4vt026...@mbox.securemx.jp>: > Hi. > > I have user information in RDB which include user‑id and password set. > > I’ve been trying to use this RDB as backend database for openldap server. > > Now,I can find user information in RDB through openldap. > > However, I recognized I can’t use this user information for ldap login > certification process. > > LDAP’s userPassowrd stored in the RDB has been already DES hashed by > original app. On the other hand, input password from ldapseach command line > is CREARTEXT. > > Now I’d like my openldap to change CREATEXT input password into DES hassed > text so that they'll match for certification. > > I've asked this topic on stackoverflow web site how to do that by server > settings.But I couldn’t find proper directives to set. > > How to make ldap evaluate clear text password vs DES stored password > > Since then,I’ve been searching LDAP source files which is matching input > password from ldapsearch command line against userPassword stored in backend > RDB for slapd. > > I’d like to change certification process of LDAP source file to make input > password into DES hashed by using 2 characters of userPassword as its SALT. > > I've already known that 2 characters at the beginning of userPasswordwas > used as its SALT when it was hashed. > > So the fact is ,my slapd can read userPassword from the RDB. I think I'll be > able to find out what will be SALT to make input password into DES hashed > text. > > If I can make opeldap to act this way,I can use user's infomation in the RDB > to ldap login inforomation wiht seamless.