Ethereal-dev: [Ethereal-dev] Re: Radius tunnel password decryption patch

Note: This archive is from the project's previous web site, ethereal.com. This list is no longer active.

From: "Emil Larsson" <emil@xxxxxxxx>
Date: Tue, 05 Apr 2005 13:47:46 +0200
Here is a resubmission with the requested changes,

regards
Emil, Tele2

On Mon, 4 Apr 2005 01:05:08 -0400
 ronnie sahlberg <ronniesahlberg@xxxxxxxxx> wrote:
Hej,

The line if(codestrval=="Access Request"
should really be
if(!strcmp(codestrval,"Access Request")
since not all compilers are smart to know when different string
literals can be collapsed and when they can not.


Can you do that change and
*add a preference setting to control whether to do this decryption or not, * add a sanity check that length is sane before calling rddecrypttunnelpass

and resubmit it?


mvh ronnie s

On Fri, 01 Apr 2005 16:38:56 +0200, Emil Larsson <emil@xxxxxxxx> wrote:
Hello ethereal dev people,

as of version 0.9.9 ethereal decrypts the radius user-password field. The tunnel-password extension field (code 69, see RFC 2868) is encrypted with a similar but still slightly different method. Since I needed very much to decrypt this password I hacked up ethereal to decrypt it, and even though the code is very much a hack I figured I would send it to you.

Also note that the current patch requires you to manually identify which request is being answered by a given accept, something that could be automated by looking at the id field or similar.

Do with the attached patch what you will - I hope it proves useful.

/Emil Larsson
Tele2 Network Operations, Sweden



Attachment: ethereal-radius-decrypt2.patch
Description: Binary data