[nos-bbs] MD5 Authentication Response

Michael Fox - N6MEF n6mef at mefox.org
Mon Apr 16 15:32:04 EDT 2018


Yes, but the question is, what goes into the hash?  And, looking at the C
code, it looks like the length might be truncated, but how long?

 

Michael N6MEF

 

From: Boudewijn (Bob) Tenty <bobtenty at gmail.com> 
Sent: Monday, April 16, 2018 12:26 PM
To: Michael Fox - N6MEF <n6mef at mefox.org>
Subject: Re: [nos-bbs] MD5 Authentication Response

 

A MD5 hash is easy to generate with MD5SUM in linux. A etelnet capable jnos
transmits a hex number in the password prompt according to the manual.
I should monitor and log the etelnet session with wireshark to see exactly
what is going on.

Bob VE3TOK

On 2018-04-15 03:30 PM, Michael Fox - N6MEF wrote:

All,

 

I'm trying to figure out how a generic (non-JNOS) client would respond to
the "Password [.] :" prompt issued by JNOS when MD5AUTHENTICATION is
#define'd.

 

The response from a JNOS client appears to be created in lines 358-361 of
telnet.c.  But I'm not knowledgeable enough about C to understand what it's
doing.

 

For example, suppose I was on a Linux or Windows machine (not running JNOS)
and I telnetted to a JNOS machine that has MD5 AUTHENTICATION defined.  I
enter my login at the login prompt.  Then I get the "Password [.] " prompt.
Given the challenge in the password prompt and given that I know my
password, how would I calculate (i.e. what commands would I run to generate)
the appropriate MD5 response to the prompt?

 

Thanks,

Michael - N6MEF






_______________________________________________
nos-bbs mailing list
nos-bbs at tapr.org <mailto:nos-bbs at tapr.org> 
http://www.tapr.org/mailman/listinfo/nos-bbs

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.tapr.org/pipermail/nos-bbs_lists.tapr.org/attachments/20180416/5c12b1ab/attachment.html>


More information about the nos-bbs mailing list