Check LDAP password with SHA512

Will W. will at damagesinc.net
Wed Jan 27 23:15:34 CET 2016


demouser is getting deleted after this anyhow.

 demouser, Users, myhost.com
dn: uid=demouser,ou=Users,dc=myhost,dc=com
userPassword:: e0NSWVBUfSQ2JGNiZWE2ZDc5MzJkZmE3NmIkWWdPUlpINlh0RFhtRkVEcmNCblg
 zQW82SkR4QUN5LkJSTVROWjhEa0YwaWRnM2NNMkQzZ1BFSFJmQTA1ZjhkUXgxNG8vNEZpNTc1eFhK
 LjJ5RGtEQS8=


> On Jan 27, 2016, at 2:08 PM, Arran Cudbard-Bell <a.cudbardb at freeradius.org> wrote:
> 
> 
>> On Jan 27, 2016, at 4:36 PM, Will W. <will at damagesinc.net> wrote:
>> 
>> Question
>> With Start_TLS yes
>> this is enabling the Freeradius to connect to the LDAP server over a TLS tunnel correct?
> 
> Yes, the connection starts off as plaintext, then the ldap client requests to establish a TLS tunnel.
> 
> Map looks OK.  You need to run ldapsearch with this invocation to see if the userPassword is being returned:
> 
> ldapsearch -H ldap://ldap.myhost.com:389 —ZZ x -b "ou=Users,dc=myhost,dc=com" -D "uid=demouser,ou=Users,dc=myhost,dc=com" -w testing123 "(objectClass=posixGroup)" userPassword
> 
> -Arran
> -
> List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html



More information about the Freeradius-Users mailing list