On 9/22/2010 11:33 AM, Nathan Kinder wrote:
If generating LDIF with pre-hashed passwords or resetting a lost nsslapd-rootpw or something like that, you can use the pwdhash utility that comes with 389 DS:On 09/22/2010 10:45 AM, Gerrard Geldenhuis wrote:Why are you pre-hashing passwords? You can set the password storage scheme to SSHA512 in 389 and provide a cleartext userPassword value to the server and it will hash it for you.HiThis is probably OT but I am not having much luck with google. How can I create SSHA512 strings? I have been using either a php script or slappasswd to create SSHA password but not sure how to do SSHA512. openssl can create the SHA512 digest but I am not sure how to add the random seed bit. My question probably illuminate my lack of understanding of the subject.
# pwdhash -s SSHA512 secret12 {SSHA512}KssX4qTpaFxJveSJp8Dw5AXTgNmM3wYrmBLspsj6F+Pf2aN6WO0l8XUQy+z2zx8qknO+ToFFjkVae8f4oYX0Xlt1elA2UHKq
Best Regards ________________________________________________________________________ In order to protect our email recipients, Betfair Group use SkyScan from MessageLabs to scan all Incoming and Outgoing mail for viruses. ________________________________________________________________________ -- 389 users mailing list 389-us...@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/389-users
smime.p7s
Description: S/MIME Cryptographic Signature
-- 389 users mailing list 389-us...@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/389-users