/etc/sasldb export

Benjamin Schmidt schmidi2 at directbox.com
Fri Jul 6 03:16:45 EDT 2007


Hello Andreas

Your recommended command gives me following output:

$ db4.5_dump -p sasldb
VERSION=3
format=print
type=hash
h_nelem=269
db_pagesize=4096
HEADER=END
 hideuser\00hidedomain.com\00PLAIN
 \a5\82\1d\00\14}K,\bbx\91\0bb\a1\ec#\00\8e\18)\8f\96\\\07b0f+{y&\a3\0f
 hideuser\00hidedomain.com\00DIGEST-MD5
 \15\00\bc\a59P!\fe\c8\c8\c1\07\c4D\1c\94
 hideuser\00hidedomain.com\00CRAM-MD5
 $2\d6\b4\ca\85\09r\9c\0c\85U\cf\18\a4\9e\ca\99W\89\d7(\e9\f9\f2
\ef\0f\98\16\8ar
...
DATA=END


I do not understand this output (the abstract lines). Never worked with
a berkeley db.



Andreas Winkelmann wrote:
> On Thursday 28 June 2007 15:11, Benjamin Schmidt wrote:
>> Thanks for your answers.
>>
>> The tools of db4-utils didn't work for me. eg:
>>
>> $ db4.5_dump -d a sasldb
>> [042] 3006 len:  21 data: blabla00uranus00CRAM-MD...
>>         [043] 2973 len:  32 data:
>> k~0xc10xfb0x150x1b0xde0xe5o/l0x96K0x880xd20x110xb11P0xa8...
> 
> # db_dump -p /etc/sasldb
> 
>> The strings-command didn't work either.
>>
>> $ strings /etc/sasldb
>>
>>
>> Extracting the usernames, realm and mech is possible. Password not.
>>
>> It seems that the passwords are encrypted/hashed in some way.
>>
>> Copied some source-code from "cyrus-sasl-1.5.27" file "checkpw.c"
> 
> 


More information about the Cyrus-sasl mailing list