directory-users mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Emmanuel Lécharny <elecha...@gmail.com>
Subject Re: [ApacheDS] Error 56
Date Fri, 01 Feb 2013 14:51:52 GMT
There is somethong *extremelly* weird...

The userPassword value you are trying to modify is :

e1NTSEF9NGx1QXphMkw...tM2F3SHFZN0E9PQ==

which once decoded gives :

{SSHA}4luAza2L+0Xyut...VVm3awHqY7A==

and now, the password value is a base64 value, which makes no sense...

Something in OpenAM should encode the real SSHA salted password in
base64, then add {SSHA) into the value, and try to remove this value
from the server.

I would expect the real value to be :

{SSHA}â[€Í­‹ûE...VmÚÀz˜ì

instead...

Is it possible that you capture the PDU being exchanged between OpenAM
and ApacheDS using wireshark ?


-- 
Regards,
Cordialement,
Emmanuel Lécharny
www.iktek.com 


Mime
View raw message