Part of HP SA and some of the other ‘Opsware’ products ( Client Automation, Operations Orchestration, BSAE, etc ), require that you download new content via their HP Live Network Connector. The HPLNC allows you to download new content and packages, and if you subscribe, some premium content.

While setting the HPLNC up, you’re asked for your HPLN username and password, which it then stores and encrypts. Now, if you’ve forgotten that password, there’s no real easy way to get it back. Or in my case, you’re trying to setup a lab mesh and the other co-worker who knows the password isn’t around and you need to figure it out. :)

Anyways, it’s pretty simple to get the password, which is unfortunate and ultimately means that you need to make sure you protect these files or place the HPLNC on hosts where people shouldn’t be poking around.

You can see the password by with the following command:

live-network-connector read-config | grep main | grep password

You’ll need the whole string after the {3DES} portion. That’s the encrypted password, now we just need the decrypted version.

To do this, create a shell script ( /tmp/hpln.sh will do ) and add these contents ( you can change the ‘LNCDIR’ to where ever you have HPLN installed ):

Execute the shell script, which will dump you into into an interactive python prompt like this: Then just type these commands:

Python 2.5.4 (r254:67916, Nov 11 2009, 09:23:15)
[GCC 3.2.3 20030502 (Red Hat Linux 3.2.3-59)] on linux2
Type "help", "copyright", "credits" or "license" for more information.
>>>

Then just type the following python commands in, substituting your HPLNC install directory path in the proper place for the randkey and the encrypted password that we got from the read-config in the decrypt function.

And it’ll print your HPLNC password. You can do the same with any of the passwords available in the read-config. Just make sure that you protect the .randkey2.conf file!