summaryrefslogtreecommitdiff
path: root/docs/lib/passlib.hash.cisco_type7.rst
blob: e1efc80adad93eacaf2329f3d5bcf138371b50dc (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
.. index:: cisco; type 7 hash

==================================================================
:class:`passlib.hash.cisco_type7` - Cisco "Type 7" hash
==================================================================

.. versionadded:: 1.6

.. warning::

    This is not a hash, this is a reversible plaintext encoding.
    **This format can be trivially decoded**.

.. currentmodule:: passlib.hash

This class implements the "Type 7" password encoding used Cisco IOS.
This is not actually a true hash, but a reversible XOR Cipher encoding the plaintext
password. Type 7 strings are (and were designed to be) plaintext equivalent;
the goal was to protect from "over the shoulder" eavesdropping, and
little else. They can be trivially decoded.
This class can be used directly as follows::

    >>> from passlib.hash import cisco_type7

    >>> # encode password
    >>> h = cisco_type7.encrypt("password")
    >>> h
    '044B0A151C36435C0D'

    >>> # verify password
    >>> cisco_type7.verify("password", h)
    True
    >>> pm.verify("letmein", h)
    False

    >>> # to demonstrate this is an encoding, not a real hash,
    >>> # this class supports decoding the resulting string:
    >>> cisco_type7.decode(h)
    "password"

.. seealso:: the generic :ref:`PasswordHash usage examples <password-hash-examples>`

.. note::

    This implementation should work correctly for most cases, but may not
    fully implement some edge cases (see `Deviations`_ below).
    Please report any issues encountered.

Interface
=========
.. autoclass:: cisco_type7()

.. rst-class:: html-toggle

Format & Algorithm
==================
The Cisco Type 7 encoding consists of two decimal digits
(encoding the salt), followed a series of hexdecimal characters,
two for every byte in the encoded password.
An example encoding (of ``"password"``) is ``044B0A151C36435C0D``.
This has a salt/offset of 4 (``04`` in the example),
and encodes password via ``4B0A151C36435C0D``.

.. note::
    The following description may not be entirely correct with
    respect to the official algorithm, see the `Deviations`_ section for details.

The algorithm is a straightforward XOR Cipher:

1. The algorithm relies on the following ``ascii``-encoded 53-byte
   constant::

    "dsfd;kfoA,.iyewrkldJKDHSUBsgvca69834ncxv9873254k;fg87"

2. A integer salt should be generated from the range
   0 .. 15. The first two characters of the encoded string are the
   zero-padded decimal encoding of the salt.

3. The remaining characters of the encoded string are generated as follows:
   For each byte in the password (starting with the 0th byte),
   the :samp:`{i}`'th byte of the password is encoded as follows:

    a. let ``j=(i + salt) % 53``
    b. XOR the :samp:`{i}`'th byte of the password with the :samp:`{j}`'th byte
       of the magic constant.
    c. encode the resulting byte as uppercase hexidecimal,
       and append to the encoded string.

Deviations
==========
This implementation differs from the official one in a few ways.
It may be updated as more information becomes available.

* Unicode Policy:

  Type 7 encoding is primarily used with ``ASCII`` passwords,
  how it handles other characters is not known.

  In order to provide support for unicode strings, Passlib will encode unicode
  passwords using ``UTF-8`` before running them through this algorithm. If a
  different encoding is desired by an application, the password should be
  encoded before handing it to Passlib.

* Magic Constant:

  Other implementations contain a truncated 26-byte constant instead of the
  53-byte constant listed above. However, it is likely those implementations
  were merely incomplete, as they exhibit other issues as well after
  the 26th byte is reached (throwing an error, truncating the password,
  outputing garbage), and only worked for shorter passwords.

* Salt Range:

  All known test vectors contain salt values in ``range(0,16)``.
  However, the algorithm itself should be able to handle any salt value
  in ``range(0,53)`` (the size of the key). For maximum compatibility with
  other implementations, Passlib will accept ``range(0,53)``, but only
  generate salts in ``range(0,16)``.

* While this implementation handles all known test vectors,
  and tries to make sense of the disparate implementations,
  the actual algorithm has not been published by Cisco,
  so there may be other unknown deviations.

.. rubric:: Footnotes

.. [#] Description of Type 7 algorithm -
       `<http://pen-testing.sans.org/resources/papers/gcih/cisco-ios-type-7-password-vulnerability-100566>`_,
       `<http://wiki.nil.com/Deobfuscating_Cisco_IOS_Passwords>`_