Hello David,

Thank you for your reply. However, like any good answer, it raises more questions :)

I'm a little bit at loss here - still newbie in these areas. I'm not sure what's the 
difference between <digest> and <hash>/zero-k auth. If you could give me a pointer to 
some docs on the subject, I would appreciate it. What's the method for computing the 
digest? Isn't it like the "openssl sha1" command?

Still, for curiosity, do you have any idea how can I compute the 
<hash>aa9d89856d398bf06de9863af744d1289c4eaadd</hash> from the example I gave: 
<stream:stream id='3D809521'>, <password>123</password>? I would like to understand 
how things work.

Thank you!

Sebastian


David Waite  (9/12/2002  7:01 PM):
>Sebastian Paul Avarvarei wrote:
>
>Sebastian,
>Try putting the password into a <digest> element rather than a <hash> 
>element - hash is used for zero-k authentication. Also, make sure you 
>are not digesting a trailing newline with openssl (I always do this 
>accidently when using openssl from the shell)
>
>-David Waite
>
>>Hello,
>>
>>I'm writing a PHP site which which will integrate with Jabber (jabberd). PHP doesn't 
>have bult-in SHA-1 support (only MD5), and installing mhash is (unfortunately) not an 
>option for my current project. And I would really like to avoid sending clear-text 
>passwords.
>>
>>One of the options I looked into is to generate the digest with "openssl sha1", but 
>I can't seem to get the correct hash. Session example (from Winjab debug):
>>
>>RECV: <?xml version='1.0'?><stream:stream 
>xmlns:stream='http://etherx.jabber.org/streams' id='3D809521' xmlns='jabber:client' 
>from='my.srv.com'>
>>SENT: <iq type="get" id="JCOM_79"><query 
>xmlns="jabber:iq:auth"><username>admin</username></query></iq>
>>RECV: <iq type='result' id='JCOM_79'><query 
>xmlns='jabber:iq:auth'><username>admin</username><password/><sequence>463</sequence><token>3D7DEE68</token><resource/></query></iq>
>>SENT: <iq type="set" id="JCOM_80"><query 
>xmlns="jabber:iq:auth"><username>admin</username><hash>aa9d89856d398bf06de9863af744d1289c4eaadd</hash><resource>Winjab</resource></query></iq>
>>
>>Given the above session, which string is used for generating the digest? Is it 
>"3D809521123", meaning the id attribute of the session (3D809521) plus my password 
>(123)? I tried this and other combinations and I can't get the same hash as Winjab's. 
>For my tests, OpenSSL is reading the string from a text file, no \n after the string.
>>
>>If anyone can tell me what I'm doing wrong here or suggest a different solution for 
>PHP (such as an SHA-1 algorithm written in PHP), it would be greatly appreciated.
_______________________________________________
jdev mailing list
[EMAIL PROTECTED]
http://mailman.jabber.org/listinfo/jdev

Reply via email to