As for MD5, to the best of my knowledge, brute force is the only way to 'crack' it... however there have been rumors that some implementations are weaker then others.
~F
At 06:03 AM 11/28/2002 +0800, you wrote:
I paid a high monthly fee for my PPPOE connection. The damned ISP offered only the client for M$ Windows. According to the packet dump, they use CHAP for authorization and the CHAP challenge said it used MD5. But when rp-pppoe MD5s the string of Identifier+Secret+Challenge Value, the concentrator said the response is wrong.
Apparently the ISP-offered client is not going with the RFC 1994 standard for CHAP and obviously I cannot get their source code by social engineering.
/Is there a way to break the MD5? Or anyway around ? /I need to know my ISP's digest scheme to get my Linux box online. I lived in a higly-sensored country and who knows what the offered client will do behind my back? Thanks in advance for my safety (not privay).
__________________________________________________
Do You Yahoo!?
Everything you'll ever need on one web page
from News and Sport to Email and Music Charts
http://uk.my.yahoo.com
____________________ __ _
~FluRDoInG [EMAIL PROTECTED]
http://www.flurnet.org
KEY ID 0x8C2C37C4 (pgp.mit.edu) RSA-CAST 2048/2048
1876 B762 F909 91EB 0C02 C06B 83FF E6C5 8C2C 37C4