[nos-bbs] MD5 Authentication Response
Michael Fox - N6MEF
n6mef at mefox.org
Mon Apr 16 15:32:04 EDT 2018
Yes, but the question is, what goes into the hash? And, looking at the C
code, it looks like the length might be truncated, but how long?
Michael N6MEF
From: Boudewijn (Bob) Tenty <bobtenty at gmail.com>
Sent: Monday, April 16, 2018 12:26 PM
To: Michael Fox - N6MEF <n6mef at mefox.org>
Subject: Re: [nos-bbs] MD5 Authentication Response
A MD5 hash is easy to generate with MD5SUM in linux. A etelnet capable jnos
transmits a hex number in the password prompt according to the manual.
I should monitor and log the etelnet session with wireshark to see exactly
what is going on.
Bob VE3TOK
On 2018-04-15 03:30 PM, Michael Fox - N6MEF wrote:
All,
I'm trying to figure out how a generic (non-JNOS) client would respond to
the "Password [.] :" prompt issued by JNOS when MD5AUTHENTICATION is
#define'd.
The response from a JNOS client appears to be created in lines 358-361 of
telnet.c. But I'm not knowledgeable enough about C to understand what it's
doing.
For example, suppose I was on a Linux or Windows machine (not running JNOS)
and I telnetted to a JNOS machine that has MD5 AUTHENTICATION defined. I
enter my login at the login prompt. Then I get the "Password [.] " prompt.
Given the challenge in the password prompt and given that I know my
password, how would I calculate (i.e. what commands would I run to generate)
the appropriate MD5 response to the prompt?
Thanks,
Michael - N6MEF
_______________________________________________
nos-bbs mailing list
nos-bbs at tapr.org <mailto:nos-bbs at tapr.org>
http://www.tapr.org/mailman/listinfo/nos-bbs
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.tapr.org/pipermail/nos-bbs_lists.tapr.org/attachments/20180416/5c12b1ab/attachment.html>
More information about the nos-bbs
mailing list