Has anyone else taken the time to implement all that BinkP can be?
I have a design question for MPWD, basically an interpretation
question on matching passwords.
the question is fine in here but i don't know if there are any binkd maintainers in here... they're more easily found in BINKD and apparently hang out more in BINKD.RU or some such...
there was something interesting discovered several months ago, though...
in the CRAM-MD5 implementations, apparently only 32byte checksum strings are allowed (or used?) even though the spec allows for up to 64bytes (IIRC)... i scanned three years of binkd logs and all CRAM-MD5-xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx strings are of the same
there was something interesting discovered several months ago,
though... in the CRAM-MD5 implementations, apparently only 32byte
checksum strings are allowed (or used?) even though the spec allows
for up to 64bytes (IIRC)... i scanned three years of binkd logs and
all CRAM-MD5-xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx strings are of the same
Not one to argue with a European on the hash algorithms, but, I just implemented CRAM-MD5 and CRAM-SHA1. Understanding what I coded, the
only flaw I saw was when the "secret" is > 64 characters, then it
switches to a 16bit algorithm, and with CRAM you double process the "secret", so I guess they mean if someone uses a 65 character or
longer password for handshaking using BinkP they have reduced the
accuracy down to 32bit - but, I do not know of any sysop who is
willing to type in a 65+ character handshake.
Sysop: | DaiTengu |
---|---|
Location: | Appleton, WI |
Users: | 1,010 |
Nodes: | 10 (0 / 10) |
Uptime: | 88:11:23 |
Calls: | 13,178 |
Calls today: | 1 |
Files: | 186,574 |
D/L today: |
25 files (3,197K bytes) |
Messages: | 3,319,955 |