Salted SHA512
Alan DeKok
aland at deployingradius.com
Tue Sep 6 16:22:37 CEST 2016
On Sep 5, 2016, at 7:54 PM, Laurens Vets <laurens at daemon.be> wrote:
> ///
> (1) sql: EXPAND SELECT id, username, attribute, value, op FROM radcheck WHERE username = '%{SQL-User-Name}' ORDER BY id
> (1) sql: --> SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'laurens7' ORDER BY id
> (1) sql: Executing select query: SELECT id, username, attribute, value, op FROM radcheck WHERE username = 'laurens7' ORDER BY id
> (1) sql: User found in radcheck table
> (1) sql: Conditional check items matched, merging assignment check items
> (1) sql: SSHA2-512-Password := 0x61363138336661396262643730366336373331616366343165393231386339616239343836376234623333376533643666616432393032376135363661353765393134666334633832613763356665376662376231393435663539633863333731353164656230663765663563643361616235
Which is hex-encoded ASCII text. That decodes do:
a6183fa9bbd706c6731acf41e9218c9ab94867b4b337e3d6fad29027a566a57e914fc4c82a7c5fe7fb7b1945f59c8c37151deb0f7ef5cd3aab5...
Which is the real value of the SSHA2-512 hash you need.
i.e. you put the HEX data into SQL, but did not prefix it with "0x", which tells the server that it's hex data.
Put the data into SQL as:
0xa6183fa9bbd706c6731acf41e9218c9ab94867b4b337e3d6fad29027a566a57e914fc4c82a7c5fe7fb7b1945f59c8c37151deb0f7ef5cd3aab5...
and it should work.
Alan DeKok.
More information about the Freeradius-Users
mailing list