World: r3wp
[MySQL]
older newer | first last |
Pekr 9-Jan-2006 [285x2] | but look at do-handshake parser ... it does not parse for the rest, it seems to stop at the capabilities ... |
agreed :-) | |
Volker 9-Jan-2006 [287x2] | there are 16 bytes to ignore (latin1 etc.) |
that a 16 skip | |
Pekr 9-Jan-2006 [289x2] | to ignore or not :-) |
I may as well extend the protocol, but it may come later :-) | |
Volker 9-Jan-2006 [291] | and then the other 12 for salt. copy salt2 12 skip |
Pekr 9-Jan-2006 [292] | I need language info :-) hmm, but that can be obtained later .... |
Volker 9-Jan-2006 [293] | thehn joinboth salts. with some luck that works. |
Pekr 9-Jan-2006 [294x2] | do those two salts to be joined? |
it will not work probably, no? | |
Volker 9-Jan-2006 [296x2] | should. together 20 bytes, can not be accidental (i hope..) |
also the example says "Rest of Salt" | |
Pekr 9-Jan-2006 [298x2] | do you think Doc's hash-v10 and crypt-v10 are equivalent to chekcsum/secure sha1? |
let's hope so ... going to extend the parse now ... | |
Volker 9-Jan-2006 [300] | i have no idea. i see lots of cryptic binary stuff, no idea whatit does. |
Pekr 9-Jan-2006 [301x2] | imo Doc found some C code and translated it to rebol back then, when checksum/secure was not available? dunno .... |
ehm, ehm .... :-) | |
Volker 9-Jan-2006 [303] | Maybe its something custom? They mention no name, while they refer to sha1 in the new version. |
Pekr 9-Jan-2006 [304x3] | I just put some probe [name int and value] into decode function to know capabilities, but: decode-integer: 41516 long-password 0 found-rows 0 long-flag 4 connect-with-db 8 no-schema 0 compress 32 odbc 0 locl-files 0 ignore-space 0 change-user 512 interactive 0 ssl 0 ignore-sigpipe 0 transactions 8196 |
how is that long-password, sent to me by server initial handshake sequence is 0? | |
that somehow does not make sense to me ... | |
Volker 9-Jan-2006 [307] | me too. hmm. long-flags is set. |
Pekr 9-Jan-2006 [308] | yes, curious what it means ... |
Volker 9-Jan-2006 [309x2] | do you have a long password in the db? |
that example has also only long-flag | |
Pekr 9-Jan-2006 [311] | yes .... |
Volker 9-Jan-2006 [312x2] | long_password is in the clients response. |
The client now sends a request | |
Pekr 9-Jan-2006 [314] | although - I just try to connect to /mysql table ... but passwd is user dependant, and as a root, I can see, it is long already :-) |
Volker 9-Jan-2006 [315] | we get a little score for the first round? :) |
Pekr 9-Jan-2006 [316x2] | what do you mean? :-) |
well, I think now the first task is to extend parse rule ... | |
Volker 9-Jan-2006 [318] | the demo has a lot of 0 before the real password. maybe that helps adjusting. |
Pekr 9-Jan-2006 [319] | hmm, read the handshake section in doc you posted - it gest pretty complicated :-) server sends 4.11, which means new password, client sends new password, but then server finds out, old password is stored in his user database for you, so it sends another one-byte reply for you to send password once again :-) |
Volker 9-Jan-2006 [320] | Eeks. Forbid short passwords now.. |
Pekr 9-Jan-2006 [321x3] | ok ... |
Doc has following comment for long-flag - "Get all columns flag" .... | |
still it does not make sense to me, how server indicates to me, what schema it uses ... | |
Volker 9-Jan-2006 [324] | what happens if you simply expect it is a long password? For a first working version? At least people can connect. |
Pekr 9-Jan-2006 [325] | I know, just thinking loud :-) |
Volker 9-Jan-2006 [326x2] | Me too :) |
Do you need me here or can i prepare my lunch? | |
Pekr 9-Jan-2006 [328x3] | btw - docs decodes and puts stuff into locals-class ... |
no, just go ahead, I have some good food for thought :-) | |
and thanks a lot .... | |
Volker 9-Jan-2006 [331] | Ok, cu, good luck :) |
Pekr 9-Jan-2006 [332x3] | I have got the rest of the string which is currently ignored by handshake process: {^Z^B^@^@^@^@^@^@^@^@^@^@^@^@^@^@I5oNx34IQ>~#^@} |
so, I now got to state, where I have crypt-seed2 variable, holding the rest of the salt, I tried to join it to crypt-seed and got following reply: User error: ERROR 1045 : access denied for user ['root'-:-'localhost'] (using password: yes) | |
anyway - I regard handshake fixed at least to state, where you can obtain full protocol info, according to specs. Of course the handshake may be more complicated, but we don't care now, right? ;-) | |
older newer | first last |