The
provides a mechanism for encoding user passwords like Unix crypt does.
Like on most Unix systems, the password may be encrypted using different
algorithms, either Unix crypt, md5, sha256 or sha512.
This scheme contains only an implementation for the user password
syntax, with a storage scheme name of "CRYPT". Like on most Unixes, the
"CRYPT" storage scheme has different algorithms, the default being Unix
crypt.
Warning: even though Unix crypt is a one-way digest, it is very weak by
today's standards. Only the first 8 characters in a password are used, and
it only uses the bottom 7 bits of each character. It only supports a 12-bit
salt (meaning that there are only 4096 possible ways to encode a given
password), so it is vulnerable to dictionary attacks.
You should therefore use this algorithm only in cases where an external
application expects to retrieve the password and verify it outside of the
directory, instead of by performing an LDAP bind.
ds-cfg-crypt-password-storage-scheme
ds-cfg-password-storage-scheme
org.opends.server.extensions.CryptPasswordStorageScheme
Specifies the algorithm to use to encrypt new passwords.
Select the crypt algorithm to use to encrypt new passwords.
The value can either be "unix", which means the password is encrypted
with the weak Unix crypt algorithm, or "md5" which means the password is
encrypted with the BSD MD5 algorithm and has a $1$ prefix,
or "sha256" which means the password is encrypted with the SHA256
algorithm and has a $5$ prefix, or "sha512" which means the password is
encrypted with the SHA512 algorithm and has a $6$ prefix.
unix
New passwords are encrypted with the Unix crypt algorithm. Passwords
are truncated at 8 characters and the top bit of each character is
ignored.
New passwords are encrypted with the BSD MD5 algorithm.
New passwords are encrypted with the Unix crypt SHA256 algorithm.
New passwords are encrypted with the Unix crypt SHA512 algorithm.
ds-cfg-crypt-password-storage-encryption-algorithm