Problem using saslauthd against ldap server ...
Quanah Gibson-Mount
quanah at symas.com
Tue Jun 5 20:33:59 EDT 2018
--On Tuesday, June 05, 2018 11:45 PM +0000 Robert Werner
<rwerner2 at ucmerced.edu> wrote:
> We are using the "userPassword" attribute, and the password is
> encrypted. I"m not sure what the algo is. But the the thing is that
> with Auth Plain and Auth Login the password is being send in clear.
The userPassword attribute, by RFC, is base64 encoded (not encrypted). The
reason you see "userPassword:: <value>" from an ldapsearch result (vs
"userPassword: <value>") indicates that encoding is in place. You can
trivially decode the value. In addition, OpenLDAP by default stores a hash
of the password, not the password itself.
If you decode the value, you should get something like:
{SSHA}m80vEZ5rVevDAMoamCO1qKwIV/AEow8D
which indicates that the password hash is using SSHA.
The real issue, based on what you're describing, is that the password being
sent to the ldap server to validate against the hash has been truncated for
some reason.
You can confirm that basic authentication against your ldap server is
working via the "ldapwhoami" binary to rule out any issue on the LDAP
server side.
--Quanah
--
Quanah Gibson-Mount
Product Architect
Symas Corporation
Packaged, certified, and supported LDAP solutions powered by OpenLDAP:
<http://www.symas.com>
More information about the Cyrus-sasl
mailing list