|
|
Message-ID: <50A8C850.2020107@gmail.com>
Date: Sun, 18 Nov 2012 12:36:48 +0100
From: buawig <buawig@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: cracking passwords with a kerberos traffic dump
/ aes256-cts-hmac-sha1-96 (18) [MS]
>> Does the RFC specify how to encode the password? Is the known plaintext string included in the RFC?
>
> RFC doesn't mention UTF anywhere it seems . Test vectors are included
> in https://tools.ietf.org/rfc/rfc3962.txt
https://tools.ietf.org/html/rfc3961 (that defines how to define a
Kerberos Encryption Algorithm Profile) has something about pass phrase
encoding:
string-to-key (UTF-8 string, UTF-8 string, opaque)->(protocol-key)
This function generates a key from two UTF-8 strings and an opaque
octet string. One of the strings is usually the principal's pass
phrase, but generally it is merely a secret string. The other
string is a "salt" string intended to produce different keys from
the same password for different users or realms. Although the
strings provided will use UTF-8 encoding, no specific version of
Unicode should be assumed; all valid UTF-8 strings should be
allowed. Strings provided in other encodings MUST first be
converted to UTF-8 before applying this function.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.