• Please be aware: Kaspersky Anti-Virus has been deprecated
    With the upgrade to Plesk Obsidian 18.0.64, "Kaspersky Anti-Virus for Servers" will be automatically removed from the servers it is installed on. We recommend that you migrate to Sophos Anti-Virus for Servers.
  • The Horde webmail has been deprecated. Its complete removal is scheduled for April 2025. For details and recommended actions, see the Feature and Deprecation Plan.
  • We’re working on enhancing the Monitoring feature in Plesk, and we could really use your expertise! If you’re open to sharing your experiences with server and website monitoring or providing feedback, we’d love to have a one-hour online meeting with you.

Password database reuse, AES-128-CBC

Cheetah

New Pleskian
My aim is to replicate Parallels Plesk's user credentials and use them in other application. Is it possible to check the password against those encrypted ones using Python? The password strings look pretty much like this..

$AES-128-CBC$gYaHmLSudopaSnqLhlNpwg==$4ONXDulV7Kp2vS2eelcKijQv3WEhALAOdfsKECiQ5E=

This string is fake, of course.

My aim is to periodically replicate the credentials from database to another, then use them in other applications.

So, how can I check the credentials using for example Python?

-j
 
It might help Parallels staff to improve encrypted passwords feature if you explained your use case in detail.

That said, password string is self explaining on how to check against it. Much like crypt(3).
 
Just knowing libraries or tools to check passwords against those encrypted strings would be helpful. Dunno where to look at. :)
 
Back
Top