Forum Discussion
Private key password location?
- Mar 01, 2016
It's stored in LTM config.
Check the BigIP conf backup file
. Search for the relevant private key or ssl profile object. The password/passphrase itself should be visible as MD5-salt hash./config/bigip.conf
If you initially encrypted your private keys on BigIP appliance, it's recommended to eliminate bash history since the commands you executed (incl. the password itself) will be in plain-text. You can delete bash history by issuing command
.rm ~/.bash_history
It's stored in LTM config.
Check the BigIP conf backup file
/config/bigip.conf
. Search for the relevant private key or ssl profile object. The password/passphrase itself should be visible as MD5-salt hash.
If you initially encrypted your private keys on BigIP appliance, it's recommended to eliminate bash history since the commands you executed (incl. the password itself) will be in plain-text. You can delete bash history by issuing command
rm ~/.bash_history
.- NiHo_202842Mar 02, 2016CirrostratusThank you for your answer @Hannes Rapp. Is the salt derived from the master key, generated on the device at boot?
- Hannes_Rapp_162Mar 02, 2016NacreousI think it's a static hash and only generated once, just as you save the related config object. I could be wrong here, but my test hash stayed the same after reboot. This format does not seem to be vulnerable to public MD5 crackers as simple dictionary words like "hi" and "hello" returned no result.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com