Thanks for your advice.
but i have no chicese to use DES in this case.
i must do that even it'll be temporary.
 

in message "Antw: How to make ldap evaluate clear text password vs DES stored 
password",
"Ulrich Windl" <ulrich.wi...@rz.uni-regensburg.de> wrote:
> Hi!
> 
> I think that traditional UNIX crypt passwords are obsolete for at least 10
> years.
> I also think that there are online services that could decode your DES-encoded
> challenges in a few seconds if not even faster...
> 
> What I mean to says is: Don't spend time in getting DES passwords, upgrade
> your security instead.
> 
> Modern systems encode passwords like this (note the difference in length!):
> :$6$CM21wofswJzjH.NfEtuX3m6Hjtx4H0mLq4MID3JqK254DCIw6Sjeh1kmI27DEwcAb8ilxb8KH08PmQIcTD8XloWFAXKmC/uuR1
> 
> See man crypt(3) for glibc: I knows about:
> Traditional DES-based
> Extended BSDI-style DES-based
> FreeBSD-style MD5-based
> SHA256 based
> SHA512 based
> OpenBSD-style Blowfish-based (bcrypt)
> 
> So I guess you get the idea...
> 
> Regards,
> Ulrich
> 
> >>> <yokoy...@jacic.or.jp> schrieb am 20.09.2018 um 01:43 in Nachricht
> <201809192343.w8jnh4vt026...@mbox.securemx.jp>:
> > Hi.
> > 
> > I have user information in RDB which include user?id and password set.
> > 
> > I’ve been trying to use this RDB as backend database for openldap server.
> > 
> > Now,I can find user information in RDB through openldap.
> > 
> > However, I recognized I can’t use this user information for ldap login 
> > certification process.
> > 
> > LDAP’s userPassowrd stored in the RDB has been already DES hashed by 
> > original app. On the other hand, input password from ldapseach command line
> 
> > is CREARTEXT.
> > 
> > Now I’d like my openldap to change CREATEXT input password into DES hassed 
> > text so that they'll match for certification.
> > 
> > I've asked this topic on stackoverflow web site how to do that by server 
> > settings.But I couldn’t find proper directives to set.
> > 
> > How to make ldap evaluate clear text password vs DES stored password
> > 
> > Since then,I’ve been searching LDAP source files which is matching input 
> > password from ldapsearch command line against userPassword stored in backend
> 
> > RDB for slapd.
> > 
> > I’d like to change certification process of LDAP source file to make input 
> > password into DES hashed by using 2 characters of userPassword as its SALT.
> > 
> > I've already known that 2 characters at the beginning of userPasswordwas 
> > used as its SALT when it was hashed.
> > 
> > So the fact is ,my slapd can read userPassword from the RDB. I think I'll be
> 
> > able to find out what will be SALT to make input password into DES hashed 
> > text.
> > 
> > If I can make opeldap to act this way,I can use user's infomation in the RDB
> 
> > to ldap login inforomation wiht seamless.



Reply via email to