On 03/07/2014 04:22 AM, Stéphane Guedon wrote:

# ldappasswd  -x -v -D "uid=test,ou=users,dc=22decembre,dc=eu" \
-w somesecret -s anothersec
ldap_initialize( <DEFAULT> )
Result: Other (e.g., implementation specific) error (80)
Additional info: password hash failed

I'm sorry, it's not clear that this is an OpenBSD problem. See, for example, http://www.openldap.org/lists/openldap-technical/200902/msg00186.html

There's another thing strange, maybe related to the problem :
slappasswd never gives the same result !

# slappasswd
New password:
Re-enter new password:
{SSHA}8ip4+k3gVAN6Gggf2szhJxo052sI3Fyc
# slappasswd
New password:
Re-enter new password:
{SSHA}JvduTI/JAX1G9AhtlCYEjNHl/6DbE6hs

The whole point of salting is to make the hash different each time. A random salt is used to alter the hash and then that salt is added to the end of the hashed string before being base64-encoded to give you the hash you see.
--
 Matthew Weigel
 hacker
 unique & idempot . ent

Reply via email to