/etc/sasldb export
Benjamin Schmidt
schmidi2 at directbox.com
Fri Jul 6 03:16:45 EDT 2007
Hello Andreas
Your recommended command gives me following output:
$ db4.5_dump -p sasldb
VERSION=3
format=print
type=hash
h_nelem=269
db_pagesize=4096
HEADER=END
hideuser\00hidedomain.com\00PLAIN
\a5\82\1d\00\14}K,\bbx\91\0bb\a1\ec#\00\8e\18)\8f\96\\\07b0f+{y&\a3\0f
hideuser\00hidedomain.com\00DIGEST-MD5
\15\00\bc\a59P!\fe\c8\c8\c1\07\c4D\1c\94
hideuser\00hidedomain.com\00CRAM-MD5
$2\d6\b4\ca\85\09r\9c\0c\85U\cf\18\a4\9e\ca\99W\89\d7(\e9\f9\f2
\ef\0f\98\16\8ar
...
DATA=END
I do not understand this output (the abstract lines). Never worked with
a berkeley db.
Andreas Winkelmann wrote:
> On Thursday 28 June 2007 15:11, Benjamin Schmidt wrote:
>> Thanks for your answers.
>>
>> The tools of db4-utils didn't work for me. eg:
>>
>> $ db4.5_dump -d a sasldb
>> [042] 3006 len: 21 data: blabla00uranus00CRAM-MD...
>> [043] 2973 len: 32 data:
>> k~0xc10xfb0x150x1b0xde0xe5o/l0x96K0x880xd20x110xb11P0xa8...
>
> # db_dump -p /etc/sasldb
>
>> The strings-command didn't work either.
>>
>> $ strings /etc/sasldb
>>
>>
>> Extracting the usernames, realm and mech is possible. Password not.
>>
>> It seems that the passwords are encrypted/hashed in some way.
>>
>> Copied some source-code from "cyrus-sasl-1.5.27" file "checkpw.c"
>
>
More information about the Cyrus-sasl
mailing list