Hello Andreas Your recommended command gives me following output: $ db4.5_dump -p sasldb VERSION=3 format=print type=hash h_nelem=269 db_pagesize=4096 HEADER=END hideuser\00hidedomain.com\00PLAIN \a5\82\1d\00\14}K,\bbx\91\0bb\a1\ec#\00\8e\18)\8f\96\\\07b0f+{y&\a3\0f hideuser\00hidedomain.com\00DIGEST-MD5 \15\00\bc\a59P!\fe\c8\c8\c1\07\c4D\1c\94 hideuser\00hidedomain.com\00CRAM-MD5 $2\d6\b4\ca\85\09r\9c\0c\85U\cf\18\a4\9e\ca\99W\89\d7(\e9\f9\f2 \ef\0f\98\16\8ar ... DATA=END I do not understand this output (the abstract lines). Never worked with a berkeley db. Andreas Winkelmann wrote: > On Thursday 28 June 2007 15:11, Benjamin Schmidt wrote: >> Thanks for your answers. >> >> The tools of db4-utils didn't work for me. eg: >> >> $ db4.5_dump -d a sasldb >> [042] 3006 len: 21 data: blabla00uranus00CRAM-MD... >> [043] 2973 len: 32 data: >> k~0xc10xfb0x150x1b0xde0xe5o/l0x96K0x880xd20x110xb11P0xa8... > > # db_dump -p /etc/sasldb > >> The strings-command didn't work either. >> >> $ strings /etc/sasldb >> >> >> Extracting the usernames, realm and mech is possible. Password not. >> >> It seems that the passwords are encrypted/hashed in some way. >> >> Copied some source-code from "cyrus-sasl-1.5.27" file "checkpw.c" > >