Oops, forgot to add that I can do a command line query and get
attributes as the uid "qmail" with its password "qmailsecret":

Radish# ldapsearch -D "cn=qmail,ou=Headquarters,o=National Aeronautics and Space 
Administration,c=US" -w 'qmailsecret' -x -b "ou=Headquarters,o=National Aeronautics 
and Space Administration,c=US" '(&(objectclass=qmailuser)(uid=cshenton))'
version: 2

#
# filter: (&(objectclass=qmailuser)(uid=cshenton))
# requesting: ALL
#

# cshenton, accounts, Headquarters, National Aeronautics and Space Administra
 tion, US
dn: uid=cshenton,ou=accounts,ou=Headquarters,o=National Aeronautics and Space 
 Administration,c=US
cn: Chris Shenton
cn: Chris S Shenton
sn: Shenton
objectClass: top
objectClass: person
objectClass: inetOrgPerson
objectClass: qmailUser
mail: [EMAIL PROTECTED]
mailHost: Radish.saic.hq.nasa.gov
mailMessageStore: cshenton
uid: cshenton
accountStatus: enabled
mailAlternateAddress: [EMAIL PROTECTED]
mailAlternateAddress: [EMAIL PROTECTED]
userPassword:: e1NTSEF9bWp1ZmgwUU1uSlBSeWkzN1ZSTjE1VUhPcFdjMkpma0g=

# search result
search: 2
result: 0 Success

# numResponses: 2
# numEntries: 1


If I run that BASE64-encoded userPassword through a decoder I get:

{SSHA}mjufh0QMnJPRyi37VRN15UHOpWc2JfkH


And I'm not sure if I can go anywhere from here. 

Thanks.

Reply via email to