On Fri, Feb 21, 2014 at 10:45:29AM -0600, Matthew Weigel wrote:
> On 2014-02-21 9:24, Matthew Weigel wrote:
> >On 2014-02-21 5:09, Joel Carnat wrote:
> >
> >Here is a short
> >script that should run fine on a stock OpenBSD machine to generate a
> >bcrypt hash suitable for the userPassword attribute
> > I guess you can use 'openssl passwd' for that,
> > or 'openssl passwd -1' for MD5 password
> > however that is tagged if allowed in LDAP...
>
> It doesn't look like openssl passwd knows about bcrypt at all (either
> internally, or via crypt()). While I think ldapd would be fine with
> eithe
On 2014-02-21 10:07, Raimo Niskanen wrote:
I guess you can use 'openssl passwd' for that,
or 'openssl passwd -1' for MD5 password
however that is tagged if allowed in LDAP...
It doesn't look like openssl passwd knows about bcrypt at all (either
internally, or via crypt()). While I think ldap
On Fri, Feb 21, 2014 at 09:24:10AM -0600, Matthew Weigel wrote:
> On 2014-02-21 5:09, Joel Carnat wrote:
>
> >What is the (native) way to generate the "SSHA" hashed format for
> >rootpw ?
>
> Is there a particular reason you want to use SSHA? Here is a short
> script that should run fine on a
On 2014-02-21 9:24, Matthew Weigel wrote:
On 2014-02-21 5:09, Joel Carnat wrote:
Here is a short
script that should run fine on a stock OpenBSD machine to generate a
bcrypt hash suitable for the userPassword attribute of ldapd.
Nope nope nope. That script is incorrect in a couple of ways. Mo
On 2014-02-21 5:09, Joel Carnat wrote:
What is the (native) way to generate the "SSHA" hashed format for
rootpw ?
Is there a particular reason you want to use SSHA? Here is a short
script that should run fine on a stock OpenBSD machine to generate a
bcrypt hash suitable for the userPassword
On Fri, Feb 21, 2014 at 01:31:13PM +0100, Joel Carnat wrote:
> Hum, I tried it but it doesn't work.
>
> I have a slappasswd else where to test. And here's what I get :
> # print passphrase | openssl dgst -sha1 -binary | openssl enc -base64 | awk
> '{print "{SHA}"$0}'
> {SHA}ZLvhLmLU88dUQwzfUgsq6I
On Fri, Feb 21, 2014 at 01:31:13PM +0100, Joel Carnat wrote:
> Hum, I tried it but it doesn't work.
>
> I have a slappasswd else where to test. And here's what I get :
> # print passphrase | openssl dgst -sha1 -binary | openssl enc -base64 | awk
> '{print "{SHA}"$0}'
> {SHA}ZLvhLmLU88dUQwzfUgsq6I
Yep, that works!
Thanks :)
Le 21 févr. 2014 à 13:41, Abel Abraham Camarillo Ojeda a
écrit :
> try not including newline:
>
> $ echo -n passphrase | openssl dgst -sha1 -binary | openssl enc
> -base64 | awk '{print "{SHA}"$0}'
> {SHA}YhAnRDQFLyD8uD4dD0kiBPyxGIQ=
> $
>
>
> On Fri, Feb 21, 2014
try not including newline:
$ echo -n passphrase | openssl dgst -sha1 -binary | openssl enc
-base64 | awk '{print "{SHA}"$0}'
{SHA}YhAnRDQFLyD8uD4dD0kiBPyxGIQ=
$
On Fri, Feb 21, 2014 at 6:31 AM, Joel Carnat wrote:
> Hum, I tried it but it doesn't work.
>
> I have a slappasswd else where to test.
Hum, I tried it but it doesn't work.
I have a slappasswd else where to test. And here's what I get :
# print passphrase | openssl dgst -sha1 -binary | openssl enc -base64 | awk
'{print "{SHA}"$0}'
{SHA}ZLvhLmLU88dUQwzfUgsq6IV8ZRE=
# echo passphrase | openssl dgst -sha1 -binary | openssl enc -base
j...@carnat.net (Joel Carnat), 2014.02.21 (Fri) 12:09 (CET):
> I want to generate a hashed rootpw for native ldapd (on OBSD 5.4).
> I've tried various things like `echo secret | sha256` but I can't
> authenticate.
>
> If possible, I'd like not to install openldap-server just to get slappasswd.
>
Hi,
I want to generate a hashed rootpw for native ldapd (on OBSD 5.4).
I've tried various things like `echo secret | sha256` but I can't authenticate.
If possible, I'd like not to install openldap-server just to get slappasswd.
What is the (native) way to generate the "SSHA" hashed format for ro
13 matches
Mail list logo