--- embedaddon/mpd/doc/mpd66.html 2016/11/01 09:56:12 1.1.1.3 +++ embedaddon/mpd/doc/mpd66.html 2021/03/17 00:39:23 1.1.1.4 @@ -6,7 +6,7 @@ -Mpd 5.8 User Manual +Mpd 5.9 User Manual : Internals : Authentication
Previous: ToDo
@@ -31,22 +31,22 @@ server. The password hash is computed like this: md5(i + challenge), where the id is incremented after each authentication attempt. The challenge is generated by the server and then sent to the client (peer). The peer sends the hash to the server and the server -genrates himself the hash using the plaintext password. If both +generates itself the hash using the plaintext password. If both hash are the same, the authentication succeeds.

-

MS-CHAP doesen't need plaintext passwords on the server, but does +

MS-CHAP does not need plaintext passwords on the server, but does need the hashed password either as NT-Hash or as LAN-Manager-Hash -(the LAN-Manager-Hash is weak and shouldn't be used). -MS-CHAPv1 uses DES as hashing algorithm and is weak, therefore don't +(the LAN-Manager-Hash is weak and should not be used). +MS-CHAPv1 uses DES as hashing algorithm and is weak, therefore do not use it! MS-CHAPv2 uses a peer challenge and a server -challenge and uses SHA1 as hashing algorithm, so it's much more -secure then MS-CHAPv1. MS-CHAPv2 requires the NT-Hash be available.

+challenge and uses SHA1 as hashing algorithm, so it is much more +secure than MS-CHAPv1. MS-CHAPv2 requires the NT-Hash be available.

Usually UNIX systems have a different non-revertable hashing algorithm for passwords, therefore it is not possible to use the traditional UNIX password database if you want to use any CHAP algorithm, with the exception that FreeBSD versions 5.1 and later support the NT-Hash format in the password database (configurable via login.conf: passwd_format=nth). -However MPD doesen't currently support authentication against +However MPD does not currently support authentication against the UNIX password database.

EAP is an Extensible Authentication Protocol. Mpd supports natively only the EAP-Type MD5; other EAP-Types may be used @@ -58,16 +58,16 @@ from authentication.

Authentication protocol negotiation

Starting with MPD 3.14, MPD behaves more intelligently when negotiating authentication protocols. MPD searches an internal list of protocols, -from most to least secure, until a mutually agreeable protocol is found. -If the link is a PPTP link, then MS-CHAP is most preferrable, otherwise -MD5-CHAP is most preferrable.

+from most to least secure until a mutually agreeable protocol is found. +If the link is a PPTP link, then MS-CHAP is most preferable, otherwise +MD5-CHAP is most preferable.


-Mpd 5.8 User Manual +Mpd 5.9 User Manual : Internals : Authentication
Previous: ToDo