There are a number of scripts I've found where people are executing password updates on Cisco IOS nodes. But none of them appear to use MD5 passwords, or account for them within their scripting process.
While I realize that the actual hashing of the plain text may be outside of the realm of the simple scripting interface provided by NCM, is it possible to call an external program (i.e. OpenSSL or a BAT file) to get the hash? I have a nice little BAT file that uses OpenSSL (installed locally on my Orion host) to generate a Cisco MD5 password hash.
@echo off setlocal @REM ensure that we have the path to the OpenSSL utility in the PATH variable set PATH=%PATH%;C:\Program Files\openssl\bin @REM Create the SALT value needed for the MD5 password hash for /f "usebackq tokens=*" %%a in (`openssl.exe rand -base64 3`) do set SALT=%%a @REM Create the MD5 password for /f "usebackq tokens=*" %%a in (`openssl.exe passwd -salt %%SALT%% -1 %%~1`) do set HASH=%%a @REM Output the created password echo %HASH%
Now if only I can get the output into an NCM script.
Has anyone seen or done this before?