--On Thursday, October 16, 2014 12:08 AM +0100 Chris Ridd <chrisr...@mac.com> wrote:

Anyway, this is mostly not related to Net::LDAP - you need to talk to the
OpenLDAP folks to see if they will help you.

OpenLDAP defaults to using SSHA as the password hashing mechanism. If your system is hashing it in cleartext, then you are:
(a) updating the userPassword value via the rootdn,

or

(b) updating userPassword without correctly using the LDAP Password Modify Extended Operation

or

(c) modified your slapd configuration to not use SSHA as the default

From the cn=config man page:

     olcPasswordHash: <hash> [<hash>...]
This option configures one or more hashes to be used in generation of user passwords stored in the userPassword attribute during processing of LDAP Password Modify Extended Operations (RFC 3062). The <hash> must be one of {SSHA}, {SHA}, {SMD5}, {MD5}, {CRYPT}, and {CLEARTEXT}. The default is {SSHA}.

{SHA} and {SSHA} use the SHA-1 algorithm (FIPS 160-1), the
             latter with a seed.

{MD5} and {SMD5} use the MD5 algorithm (RFC 1321), the latter
             with a seed.

             {CRYPT} uses the crypt(3).

{CLEARTEXT} indicates that the new password should be added to
             userPassword as clear text.

Note that this option does not alter the normal user applications handling of userPassword during LDAP Add, Modify, or other LDAP operations. This setting is only allowed in the
             frontend entry.

--Quanah

--

Quanah Gibson-Mount
Server Architect
Zimbra, Inc.
--------------------
Zimbra ::  the leader in open source messaging and collaboration

Reply via email to