openldap-technical
[Arriba] [Todas las Listas]

Re: Cómo yo reset rootdn contraseña?

To: Howard Chu <hyc@xxxxxxxxx>
Subject: Re: Cómo yo reset rootdn contraseña?
From: Michael Ströder <michael@xxxxxxxxxxxx>
Date: Sun, 05 Feb 2012 16:28:54 +0100
Cc: openldap-technical@xxxxxxxxxxxx
Delivery-date: Sun, 05 Feb 2012 10:41:22 -0500
Dkim-signature: v=1; a=rsa-sha1; c=relaxed/relaxed; t=1328455751; l=346; s=domk; d=stroeder.de; h=Content-Transfer-Encoding:Content-Type:In-Reply-To:References: Subject:CC:To:MIME-Version:From:Date:X-RZG-CLASS-ID:X-RZG-AUTH; bh=lEfX1L/+iVZCE5RYTGwaObWtumA=; b=IMEN3fP/uB1yqjAsp5PxGB7l6175tb98BGtO9piZkYXry2bJFlxArH8Lj4ySG9rnpir 8yLlS42bXI3kBxsW27es+Q5ILe71bbQT/nvf3ulxADQWiGb5A2UZeBFY4GsykbKv2nmNY bfrWYfjDIeCC2vk/9Jhc1DkrNKTViucZqK0=
Envelope-to: traductor@xxxxxxxxxxx
In-reply-to: <4F2DE535.7090204@symas.com>
List-archive: <http://www.openldap.org/lists/openldap-technical>
List-help: <mailto:openldap-technical-request@openldap.org?subject=help>
List-id: OpenLDAP Technical Discussion list <openldap-technical.openldap.org>
List-post: <mailto:openldap-technical@openldap.org>
List-subscribe: <http://www.openldap.org/lists/mm/listinfo/openldap-technical>, <mailto:openldap-technical-request@openldap.org?subject=subscribe>
List-unsubscribe: <http://www.openldap.org/lists/mm/options/openldap-technical>, <mailto:openldap-technical-request@openldap.org?subject=unsubscribe>
References: <1328336778.729.2.camel@feynman.cids.ca> <CAETJ_S9ki4ibLnRvmievbWUSUOJbASg5pu9BD_tpuiBtTrxi3g@mail.gmail.com> <4F2DE535.7090204@symas.com>
Sender: openldap-technical-bounces@xxxxxxxxxxxx
User-agent: Mozilla/5.0 (X11; Linux x86_64; rv:10.0) Gecko/20120129 Firefox/10.0 SeaMonkey/2.7
Howard *Chu escribió:
La primera cosa habría hecho sería *slapcat -*n0 para ver lo que todo del
existiendo *rootpw era. Ellos  todo ser base64 *encoded; *decode les para ver
si ninguno de ellos es *plaintext. Si tan, entonces el problema es ya solucionado - tienes la contraseña.

Y qué para hacer si la contraseña es *hashed?

*Ciao, Michael.


Howard Chu wrote:
The first thing I would have done would be slapcat -n0 to see what all of the
existing rootpw's were. They would all be base64 encoded; decode them to see
if any of them are plaintext. If so, then the problem is already solved - you
have the password.

And what to do if the password is hashed?

Ciao, Michael.


<Anterior por Tema] Tema Actual [Siguiente por Tema>