Protocols/OSCAR/SNAC/BUCP CHALLENGE RESPONSE: Difference between revisions

From Toxi's Wiki
Jump to navigationJump to search
No edit summary
No edit summary
Line 1: Line 1:
{{Template:Protocols/OSCAR}}
{{Template:Protocols/OSCAR}}


This is the SNAC sent by the server in reply to [[Protocols/OSCAR/SNAC/BUCP__CHALLENGE_REQUEST|BUCP__CHALLENGE_REQUEST]]. After this is sent, the client should send a [[Protocols/OSCAR/SNAC/BUCP__LOGIN_REQUEST|BUCP__LOGIN_REQUEST]] packet, where the challenge it recieves here is used when hashing the password.
This is the SNAC sent by the server in reply to [[Protocols/OSCAR/SNAC/BUCP__CHALLENGE_REQUEST|BUCP__CHALLENGE_REQUEST]]. After this is sent, the client should send a [[Protocols/OSCAR/SNAC/BUCP__LOGIN_REQUEST|BUCP__LOGIN_REQUEST]] SNAC, where the challenge it recieves here is used when hashing the password.


=== SNAC Header ===
=== SNAC Header ===

Revision as of 05:49, 21 July 2024

OSCAR Protocol
IntroductionTermsClients
Basic
TODO
Tutorials
Sign On
Foodgroups
OSERVICE (0x0001)
BUCP (0x0017)

This is the SNAC sent by the server in reply to BUCP__CHALLENGE_REQUEST. After this is sent, the client should send a BUCP__LOGIN_REQUEST SNAC, where the challenge it recieves here is used when hashing the password.

SNAC Header

 00 17   word   SNAC foodgroup
 00 07   word   SNAC subgroup
 00 00   word   SNAC flags
 00 00 00 00   dword   SNAC request ID

SNAC Data

The SNAC data is as follows, in this order:

  • Challenge length (uint16/word)
  • Challenge (bytes)

SNAC Dump

Example dump (from NINA's servers - with a FLAP header):

0000   2a 02 00 01 00 16 00 17 00 07 00 00 00 00 00 00   *...............
0010   00 0a 36 30 30 35 38 35 35 39 34 36               ..6005855946

Note for server developers: I'm not quite sure if there is anything fancy going on in the challenge generation in NINA, but judging by the packet dumps above, I simply just made a string with 10 random numbers, as seen in my server