On 03/07/2014 04:22 AM, Stéphane Guedon wrote:
# ldappasswd -x -v -D "uid=test,ou=users,dc=22decembre,dc=eu" \
-w somesecret -s anothersec
ldap_initialize( <DEFAULT> )
Result: Other (e.g., implementation specific) error (80)
Additional info: password hash failed
I'm sorry, it's not clear that this is an OpenBSD problem. See, for
example,
http://www.openldap.org/lists/openldap-technical/200902/msg00186.html
There's another thing strange, maybe related to the problem :
slappasswd never gives the same result !
# slappasswd
New password:
Re-enter new password:
{SSHA}8ip4+k3gVAN6Gggf2szhJxo052sI3Fyc
# slappasswd
New password:
Re-enter new password:
{SSHA}JvduTI/JAX1G9AhtlCYEjNHl/6DbE6hs
The whole point of salting is to make the hash different each time. A
random salt is used to alter the hash and then that salt is added to the
end of the hashed string before being base64-encoded to give you the
hash you see.
--
Matthew Weigel
hacker
unique & idempot . ent