The
provides a mechanism for encoding user passwords like Unix crypt does.
Like on most Unix systems, the password may be encrypted using different
algorithms, either Unix crypt, md5, sha256 or sha512.
This implementation contains an implementation for the user
password syntax, with a storage scheme name of "CRYPT". Like on most
Unixes, the "CRYPT" storage scheme has different algorithms, the default
being the Unix crypt.
Even though the Unix crypt is a one-way digest, it
is relatively weak by today's standards. Because it supports
only a 12-bit salt (meaning that there are only 4096 possible ways to
encode a given password), it is also vulnerable to dictionary attacks.
You should therefore use this storage scheme only in cases where an
external application expects to retrieve the password and verify it
outside of the directory, rather than by performing an LDAP bind.
ds-cfg-crypt-password-storage-scheme
ds-cfg-password-storage-scheme
org.opends.server.extensions.CryptPasswordStorageScheme
Specifies the algorithm to use to encrypt new passwords.
Select the crypt algorithm to use to encrypt new passwords.
The value can either be "unix", which means the password is encrypted
with the Unix crypt algorithm, or md5 which means the password is
encrypted with the BSD MD5 algorithm and has a $1$ prefix,
or sha256 which means the password is encrypted with the SHA256 algorithm
and has a $5$ prefix, or sha512 which means the password is encrypted with
the SHA512 algorithm and has a $6$ prefix.
unix
New passwords are encrypted with the Unix crypt algorithm.
New passwords are encrypted with the BSD MD5 algorithm.
New passwords are encrypted with the Unix crypt SHA256 algorithm.
New passwords are encrypted with the Unix crypt SHA512 algorithm.
ds-cfg-crypt-password-storage-encryption-algorithm