7 Network Working Group S. Cobb
\r
8 Informational Memo Microsoft
\r
9 Revision 1.3 March 1997
\r
12 Microsoft PPP CHAP Extensions
\r
17 This document has no official Internet Engineering Task Force
\r
18 status. It is submitted as an example of one vendor's working
\r
19 solution to several authentication issues not yet standardized by
\r
20 the Point-to-Point Working Group.
\r
22 The protocol described is implemented in Microsoft Windows NT 3.5
\r
23 and 3.51 and in Microsoft Windows95. Differences between the
\r
24 platforms are noted in the text. This information, plus that in
\r
25 the references, is believed sufficient to implement an
\r
26 interoperating peer.
\r
28 Distribution of this memo is unlimited.
\r
33 The Point-to-Point Protocol (PPP) [1] provides a standard method
\r
34 for transporting multi-protocol datagrams over point-to-point
\r
35 links. PPP defines an extensible Link Control Protocol and a
\r
36 family of Network Control Protocols (NCPs) for establishing and
\r
37 configuring different network-layer protocols.
\r
39 This document describes Microsoft's PPP CHAP dialect (MS-CHAP),
\r
40 which extends the user authentication functionality provided on
\r
41 Windows networks to remote workstations. MS-CHAP is closely
\r
42 derived from the PPP Challenge/Handshake Authentication Protocol
\r
43 described in RFC 1334 [2], which the reader should have at hand.
\r
48 Rev 1.21: (Sect 6) Fix error in implicit challenge description
\r
49 Rev 1.22: (Sect 7) Fix error in sub-field table ordering
\r
50 Rev 1.3: (Sect 10) Added hash example section
\r
61 Memo Microsoft PPP CHAP Extensions March 1997
\r
66 1. Introduction................................................3
\r
67 2. LCP Configuration...........................................4
\r
68 3. Challenge Packet............................................4
\r
69 4. Response Packet.............................................4
\r
70 5. Success Packet..............................................8
\r
71 6. Failure Packet..............................................8
\r
72 7. Change Password Packet (version 1)..........................9
\r
73 8. Change Password Packet (version 2).........................12
\r
74 9. Negotiation Examples.......................................16
\r
75 10. Hash Example...............................................16
\r
77 REFERENCES.....................................................18
\r
78 CHAIR'S ADDRESS................................................19
\r
79 AUTHOR'S ADDRESS...............................................19
\r
121 Memo Microsoft PPP CHAP Extensions March 1997
\r
126 Microsoft created MS-CHAP to authenticate remote Windows
\r
127 workstations, providing the functionality to which LAN-based users
\r
130 The closest fit available in standard PPP is CHAP which is
\r
131 primarily used for mutual secure authentication between WAN-aware
\r
132 routers. Unfortunately, CHAP is not widely used in support of
\r
133 remote workstations where providers commonly require an insecure
\r
134 text login session in place of PPP authentication protocols. To
\r
135 date, several remote workstation issues have not been adequately
\r
136 addressed in CHAP. MS-CHAP addresses these issues and also
\r
137 integrates the encryption and hashing algorithms used on Windows
\r
140 Where possible, MS-CHAP is consistent with standard CHAP, and the
\r
141 differences are easily modularized. Microsoft implements MS-CHAP
\r
142 as extensions to it's standard CHAP code base. Briefly,
\r
143 differences between MS-CHAP and standard CHAP are:
\r
145 * MS-CHAP is enabled by negotiating CHAP Algorithm 0x80 in LCP
\r
146 option 3, Authentication Protocol.
\r
148 * The MS-CHAP Response packet is in a format designed for
\r
149 compatibility with Microsoft Windows NT 3.5 and 3.51,
\r
150 Microsoft Windows95, and Microsoft LAN Manager 2.x networking
\r
151 products. The MS-CHAP format does not require the
\r
152 authenticator to store a clear or reversibly encrypted
\r
155 * MS-CHAP provides an authenticator controlled authentication
\r
158 * MS-CHAP provides an authenticator controlled change password
\r
161 * MS-CHAP defines a set of reason-for-failure codes returned in
\r
162 the Failure packet Message field.
\r
181 Memo Microsoft PPP CHAP Extensions March 1997
\r
184 2. LCP Configuration
\r
186 The LCP configuration for MS-CHAP is identical to that for
\r
187 standard CHAP, except that the Algorithm field has value 0x80,
\r
188 rather than the MD5 value 0x05. Non-MS-CHAP-aware implementations
\r
189 that correctly implement LCP Config-Rej have no problem dealing
\r
190 with this non-standard option.
\r
192 Microsoft currently negotiates authentication only on the
\r
193 server->workstation configuration. Mutual authentication may be
\r
194 supported in the future.
\r
197 3. Challenge Packet
\r
199 The MS-CHAP Challenge packet is identical in format to the
\r
200 standard CHAP Challenge packet.
\r
202 MS-CHAP authenticators send an 8-octet challenge Value field. It
\r
203 is not necessary for peers to duplicate Microsoft's algorithm for
\r
204 selecting the 8-octet value, but the CHAP guidelines on randomness
\r
205 should be observed.
\r
207 Microsoft authenticators do not currently provide information in
\r
208 the Name field. This may change in the future.
\r
213 The MS-CHAP Response packet is identical in format to the standard
\r
214 CHAP Response packet. However, the Value field is sub-formatted
\r
215 differently as follows:
\r
217 24 octets: LAN Manager compatible challenge response
\r
218 24 octets: Windows NT compatible challenge response
\r
219 1 octet : "Use Windows NT compatible challenge response" flag
\r
221 The LAN Manager compatible challenge response is an encoded
\r
222 function of the password and the received challenge as output by
\r
223 the pseudo-code routine LmChallengeResponse below. LAN Manager
\r
224 passwords are limited to 14 case-insensitive OEM characters.
\r
241 Memo Microsoft PPP CHAP Extensions March 1997
\r
244 LmChallengeResponse(
\r
245 IN 8-octet Challenge,
\r
246 IN 0-to-14-oem-char Password,
\r
247 OUT 24-octet Response )
\r
251 giving PasswordHash )
\r
260 IN 0-to-14-oem-char Password,
\r
261 OUT 16-octet PasswordHash )
\r
263 Set UcasePassword to the uppercased Password
\r
264 Zero pad UcasePassword to 14 characters
\r
267 1st 7-octets of UcasePassword,
\r
268 giving 1st 8-octets of PasswordHash )
\r
271 2nd 7-octets of UcasePassword,
\r
272 giving 2nd 8-octets of PasswordHash )
\r
277 OUT 8-octet Cypher )
\r
279 Make Cypher an irreversibly encrypted form of Clear by
\r
280 encrypting known text [6] using Clear as the secret key,
\r
301 Memo Microsoft PPP CHAP Extensions March 1997
\r
307 OUT 8-octet Cypher )
\r
309 Use the DES encryption algorithm [3] to encrypt Clear into
\r
310 Cypher such that Cypher can only be decrypted back to
\r
311 Clear by providing Key. Note that the DES algorithm takes
\r
312 as input a 64-bit stream where the 8th, 16th, 24th, etc
\r
313 bits are parity bits ignored by the encrypting algorithm.
\r
314 Unless you write your own DES to accept 56-bit input
\r
315 without parity, you will need to insert the parity bits
\r
320 IN 8-octet Challenge,
\r
321 IN 16-octet PasswordHash,
\r
322 OUT 24-octet Response )
\r
324 Set ZPasswordHash to PasswordHash zero padded to 21 octets
\r
328 1st 7-octets of ZPasswordHash,
\r
329 giving 1st 8-octets of Response )
\r
333 2nd 7-octets of ZPasswordHash,
\r
334 giving 2nd 8-octets of Response )
\r
338 3rd 7-octets of ZPasswordHash,
\r
339 giving 3rd 8-octets of Response )
\r
343 The Windows NT compatible challenge response is an encoded
\r
344 function of the password and the received challenge as output by
\r
345 the NtChallengeResponse routine below. The Windows NT password is
\r
346 a string of 0 to (theoretically) 256 case-sensitive Unicode
\r
347 characters. Current versions of Windows NT limit passwords to 14
\r
348 characters, mainly for compatibility reasons, though this may
\r
349 change in the future.
\r
361 Memo Microsoft PPP CHAP Extensions March 1997
\r
364 NtChallengeResponse(
\r
365 IN 8-octet Challenge,
\r
366 IN 0-to-256-unicode-char Password,
\r
367 OUT 24-octet Response )
\r
371 giving PasswordHash )
\r
380 IN 0-to-256-unicode-char Password,
\r
381 OUT 16-octet PasswordHash )
\r
383 Use the MD4 algorithm [4] to irreversibly hash Password
\r
384 into PasswordHash. Only the password is hashed without
\r
385 including any terminating 0.
\r
388 The "use Windows NT compatible challenge response" flag, if 1,
\r
389 indicates that the Windows NT response is provided and should be
\r
390 used in preference to the LAN Manager response. The LAN Manager
\r
391 response will still be used if the account does not have a Windows
\r
392 NT password hash, e.g. if the password has not been changed since
\r
393 the account was uploaded from a LAN Manager 2.x account database.
\r
394 The LAN Manager response need not be provided (set to 0's) if the
\r
395 implementation expects all user accounts to be stored only in
\r
396 fresh Windows NT account databases or ones where all uploaded
\r
397 passwords have been changed. However, doing so may sacrifice
\r
398 downward compatibility with non-Windows-NT servers.
\r
400 If the flag is 0, the Windows NT response is ignored and the LAN
\r
401 Manager response is used. If the password is LAN Manager
\r
402 compatible, interoperability may be achieved without providing the
\r
403 Windows NT challenge response (set to 0's), and providing only the
\r
404 LAN Manager response. This is what Microsoft Windows95 does,
\r
405 though this may change in the future. Doing so may sacrifice
\r
406 interoperability with OEM-specific versions of Windows NT designed
\r
407 for maximum security in Windows-NT-only networks.
\r
409 Implementors seeking the broadest possible interoperability are
\r
410 advised to supply both responses when the password is LAN Manager
\r
411 compatible. This is what Microsoft Windows NT does.
\r
421 Memo Microsoft PPP CHAP Extensions March 1997
\r
424 The Name field identifies the authenticatee's user account name.
\r
425 The Windows NT domain name may prefix the user's account name in
\r
426 the typical Windows NT format, e.g. "redmond\stevec" where
\r
427 "redmond" is a Windows NT domain containing the user account
\r
428 "stevec". If a domain is not provided, the backslash should also
\r
429 be omitted, e.g. "stevec".
\r
434 The Success packet is identical in format to the standard CHAP
\r
440 The Failure packet is identical in format to the standard CHAP
\r
441 Failure packet. There is, however, formatted text stored in the
\r
442 Message field which, contrary to the standard CHAP rules, does
\r
443 affect the protocol. The Message field format is:
\r
445 "E=eeeeeeeeee R=r C=cccccccccccccccc V=vvvvvvvvvv"
\r
449 The "eeeeeeeeee" is the decimal error code (need not be 10
\r
450 digits) corresponding to one of those listed below, though
\r
451 implementations should deal with codes not on this list
\r
454 646 ERROR_RESTRICTED_LOGON_HOURS
\r
455 647 ERROR_ACCT_DISABLED
\r
456 648 ERROR_PASSWD_EXPIRED
\r
457 649 ERROR_NO_DIALIN_PERMISSION
\r
458 691 ERROR_AUTHENTICATION_FAILURE
\r
459 709 ERROR_CHANGING_PASSWORD
\r
461 The "r" is a flag set to "1" if a retry is allowed, and "0" if
\r
462 not. When authenticator sets this flag to "1" it disables
\r
463 short timeouts, expecting the authenticatee to prompt the user
\r
464 for new credentials and resubmit the response.
\r
466 The "cccccccccccccccc" is 16 hex digits representing an ASCII
\r
467 representation of a new challenge value. This field is
\r
468 optional. If it is not sent, authenticator expects the
\r
469 resubmitted response to be calculated based on the previous
\r
470 challenge value plus decimal 23 in the first octet, i.e. the
\r
471 one immediately following the Value Size field. Windows95
\r
472 authenticators may send this field. Windows NT authenticators
\r
473 do not, but may in the future. Both systems implement
\r
474 authenticatee support of this field.
\r
481 Memo Microsoft PPP CHAP Extensions March 1997
\r
484 The "vvvvvvvvvv" is the decimal version code (need not be 10
\r
485 digits) indicating the MS-CHAP protocol version supported on
\r
486 the server. Currently, this is interesting only in selecting
\r
487 a Change Password packet type. If the field is not present
\r
488 the version should be assumed 1.
\r
490 Implementations should accept but ignore additional text they do
\r
494 7. Change Password Packet (version 1)
\r
496 The version 1 Change Password packet does not appear in standard
\r
497 CHAP. It allows the authenticatee to change the password on the
\r
498 account specified in the previous Response packet. The version 1
\r
499 Change Password packet should be sent only if the authenticator
\r
500 reports ERROR_PASSWD_EXPIRED (E=648) in the Message field of the
\r
503 This packet type is supported by Windows NT 3.5 and 3.51. It is
\r
504 not supported by Windows95, though this may change in the future.
\r
505 See also Change Password Packet (version 2).
\r
507 The format of this packet is as follows:
\r
509 1 octet : Code (=5)
\r
510 1 octet : Identifier
\r
511 2 octets: Length (=72)
\r
512 16 octets: Encrypted LAN Manager Old password Hash
\r
513 16 octets: Encrypted LAN Manager New Password Hash
\r
514 16 octets: Encrypted Windows NT Old Password Hash
\r
515 16 octets: Encrypted Windows NT New Password Hash
\r
516 2 octets: Password Length
\r
527 The Identifier field is one octet and aids in matching
\r
528 requests and replies. The value is the Identifier of the
\r
529 received Failure packet to which this packet responds plus 1.
\r
541 Memo Microsoft PPP CHAP Extensions March 1997
\r
544 Encrypted LAN Manager New Password Hash
\r
545 Encrypted LAN Manager Old Password Hash
\r
547 These fields contain the LAN Manager password hash of the new
\r
548 and old passwords encrypted with an 8-octet key value [6], as
\r
549 output by the pseudo-code routine LmEncryptedPasswordHash
\r
552 LmEncryptedPasswordHash(
\r
553 IN 0-to-14-oem-char Password,
\r
554 IN 8-octet KeyValue,
\r
555 OUT 16-octet Cypher )
\r
559 giving PasswordHash )
\r
561 PasswordHashEncryptedWithBlock(
\r
567 PasswordHashEncryptedWithBlock(
\r
568 IN 16-octet PasswordHash,
\r
570 OUT 16-octet Cypher )
\r
573 1st 8-octets PasswordHash,
\r
574 1st 7-octets Block,
\r
575 giving 1st 8-octets Cypher )
\r
578 2nd 8-octets PasswordHash,
\r
579 1st 7-octets Block,
\r
580 giving 2nd 8-octets Cypher )
\r
584 Encrypted Windows NT New Password Hash
\r
585 Encrypted Windows NT Old Password Hash
\r
587 These fields contain the Windows NT password hash of the new
\r
588 and old passwords encrypted with an 8-octet key value [6], as
\r
589 output by the pseudo-code routine NtEncryptedPasswordHash
\r
601 Memo Microsoft PPP CHAP Extensions March 1997
\r
604 NtEncryptedPasswordHash(
\r
605 IN 0-to-14-oem-char Password
\r
606 IN 8-octet Challenge
\r
607 OUT 16-octet Cypher )
\r
611 giving PasswordHash )
\r
613 PasswordHashEncryptedWithBlock(
\r
622 The length in octets of the LAN Manager compatible form of the
\r
623 new password. If this value is less than or equal to 14 it is
\r
624 assumed that the encrypted LAN Manager password hash fields
\r
625 are valid. Otherwise, it is assumed these fields are not
\r
626 valid, in which case the Windows NT compatible passwords must
\r
632 Bit field of option flags where 0 is the least significant bit
\r
633 of the 16-bit quantity:
\r
635 0 : Set 1 indicates that the encrypted Windows NT
\r
636 hashed passwords are valid and should be used. If
\r
637 0, the Windows NT fields are not used and the LAN
\r
638 Manager fields must be provided.
\r
640 For the broadest possible interoperability,
\r
641 implementations are encouraged to provide both the
\r
642 Windows NT and LAN Manager fields when the password
\r
643 is LAN Manager compatible. This is what Windows NT
\r
646 1-15 : Reserved, always set 0.
\r
661 Memo Microsoft PPP CHAP Extensions March 1997
\r
664 8. Change Password Packet (version 2)
\r
666 The version 2 Change Password packet does not appear in standard
\r
667 CHAP. It allows the authenticatee to change the password on the
\r
668 account specified in the previous Response packet. The version 2
\r
669 Change Password packet should be sent only if the authenticator
\r
670 reports ERROR_PASSWD_EXPIRED (E=648) and a version of 2 or more in
\r
671 the Message field of the Failure packet.
\r
673 This packet type is supported by Windows NT 3.51. It is not
\r
674 supported by Windows NT 3.5 or Windows95, though the latter may
\r
675 change in the future. The version 2 change password packet type
\r
676 is preferable to the version 1 type and should be offered and
\r
677 accepted where possible.
\r
679 The format of this packet is as follows:
\r
681 1 octet : Code (=6)
\r
682 1 octet : Identifier
\r
683 2 octet : Length (=1070)
\r
684 516 octets : Password Encrypted with Old NT Hash
\r
685 16 octets : Old NT Hash Encrypted with New NT Hash
\r
686 516 octets : Password Encrypted with Old LM Hash
\r
687 16 octets : Old LM Hash Encrypted With New NT Hash
\r
688 24 octets : LAN Manager compatible challenge response
\r
689 24 octets : Windows NT compatible challenge response
\r
700 The Identifier field is one octet and aids in matching
\r
701 requests and replies. The value is the Identifier of the
\r
702 received Failure packet to which this packet responds plus 1.
\r
710 Password Encrypted with Old NT Hash
\r
712 This field contains the PWBLOCK form of the new Windows NT
\r
713 password encrypted with the old Windows NT password hash, as
\r
714 output by the NewPasswordEncryptedWithOldNtPasswordHash
\r
721 Memo Microsoft PPP CHAP Extensions March 1997
\r
726 256-unicode-char Password
\r
727 4-octets PasswordLength
\r
730 NewPasswordEncryptedWithOldNtPasswordHash(
\r
731 IN 0-to-256-unicode-char NewPassword,
\r
732 IN 0-to-256-unicode-char OldPassword,
\r
733 OUT datatype-PWBLOCK EncryptedPwBlock )
\r
737 giving PasswordHash )
\r
739 EncryptPwBlockWithPasswordHash(
\r
742 giving EncryptedPwBlock )
\r
745 EncryptPwBlockWithPasswordHash(
\r
746 IN 0-to-256-unicode-char Password,
\r
747 IN 16-octet PasswordHash,
\r
748 OUT datatype-PWBLOCK PwBlock )
\r
750 Fill ClearPwBlock with random octet values
\r
751 lstrcpyW( to ClearPwBlock.Password, from Password )
\r
752 ClearPwBlock.PasswordLength = lstrlenW( Password )
\r
756 sizeof( ClearPwBlock ),
\r
758 sizeof( PasswordHash ),
\r
764 IN integer ClearLength,
\r
766 IN integer KeyLength,
\r
767 OUT x-octet Cypher )
\r
769 Use the RC4 encryption algorithm [5] to encrypt Clear of
\r
770 length ClearLength octets into a Cypher of the same length
\r
771 such that the Cypher can only be decrypted back to Clear
\r
772 by providing a Key of length KeyLength octets.
\r
781 Memo Microsoft PPP CHAP Extensions March 1997
\r
784 Old NT Hash Encrypted with New NT Hash
\r
786 This field contains the old Windows NT password hash encrypted
\r
787 with the new Windows NT password hash, as output by the
\r
788 OldNtPasswordHashEncryptedWithNewNtPasswordHash routine below:
\r
790 OldNtPasswordHashEncryptedWithNewNtPasswordHash(
\r
791 IN 0-to-256-unicode-char NewPassword,
\r
792 IN 0-to-256-unicode-char OldPassword,
\r
793 OUT 16-octet EncryptedPasswordHash )
\r
797 giving OldPasswordHash )
\r
801 giving NewPasswordHash )
\r
803 PasswordHashEncryptedWithBlock(
\r
806 giving EncrytptedPasswordHash )
\r
810 Password Encrypted with Old LM Hash
\r
812 This field contains the PWBLOCK form of the new Windows NT
\r
813 password encrypted with the old LAN Manager password hash, as
\r
814 output by the NewPasswordEncryptedWithOldLmPasswordHash
\r
817 NewPasswordEncryptedWithOldLmPasswordHash(
\r
818 IN 0-to-256-unicode-char NewPassword,
\r
819 IN 0-to-256-unicode-char OldPassword,
\r
820 OUT datatype-PWBLOCK EncryptedPwBlock )
\r
824 giving PasswordHash )
\r
826 EncryptPwBlockWithPasswordHash(
\r
829 giving EncryptedPwBlock )
\r
841 Memo Microsoft PPP CHAP Extensions March 1997
\r
844 Old LM Hash Encrypted with New NT Hash
\r
846 This field contains the old LAN Manager password hash encrypted
\r
847 with the new Windows NT password hash, as output by the
\r
848 OldLmPasswordHashEncryptedWithNewNtPasswordHash routine below:
\r
850 OldLmPasswordHashEncryptedWithNewNtPasswordHash(
\r
851 IN 0-to-256-unicode-char NewPassword,
\r
852 IN 0-to-256-unicode-char OldPassword,
\r
853 OUT 16-octet EncryptedPasswordHash )
\r
857 giving OldPasswordHash )
\r
861 giving NewPasswordHash )
\r
863 PasswordHashEncryptedWithBlock(
\r
866 giving EncrytptedPasswordHash )
\r
870 LAN Manager compatible challenge response
\r
871 Windows NT compatible challenge response
\r
873 The challenge response fields as described in the Response
\r
874 packet description, but calculated on the new password and the
\r
875 same challenge used in the last response.
\r
880 Bit field of option flags:
\r
882 0 : The "use Windows NT compatible challenge response"
\r
883 flag as described in the Response packet.
\r
885 1 : Set 1 indicates that the "Password Encrypted with
\r
886 Old LM Hash" and "Old LM Hash Encrypted With New NT
\r
887 Hash" fields are valid and should be used. Set 0
\r
888 indicates these fields are not valid.
\r
890 For the broadest possible interoperability,
\r
891 implementations are encouraged to provide both the
\r
892 Windows NT and LAN Manager fields when the password
\r
893 is LAN Manager compatible. This is what Windows NT
\r
896 2-15 : Reserved, always set 0.
\r
901 Memo Microsoft PPP CHAP Extensions March 1997
\r
904 9. Negotiation Examples
\r
906 Here are some examples of typical negotiations. The authenticatee
\r
907 is on the left and the authenticator is on the right.
\r
909 The packet sequence ID is incremented on each authentication retry
\r
910 Response and on the change password response. All cases where the
\r
911 packet sequence ID is updated are noted below.
\r
913 Response retry is never allowed after either Change Password.
\r
914 Change Password may occur after Response retry. The implied
\r
915 challenge form is shown in the examples, though all cases of
\r
916 "first challenge+23" should be replaced by the
\r
917 "C=cccccccccccccccc" challenge if authenticator supplies it in the
\r
921 Successful authentication
\r
928 Failed authentication with no retry allowed
\r
932 <- Failure (E=691 R=0)
\r
935 Successful authentication after retry
\r
939 <- Failure (E=691 R=1), disable short timeout
\r
940 Response (++ID) to first challenge+23 ->
\r
944 Failed hack attack with 3 attempts allowed
\r
948 <- Failure (E=691 R=1), disable short timeout
\r
949 Response (++ID) to first challenge+23 ->
\r
950 <- Failure (E=691 R=1), disable short timeout
\r
951 Response (++ID) to first challenge+23+23 ->
\r
952 <- Failure (E=691 R=0)
\r
961 Memo Microsoft PPP CHAP Extensions March 1997
\r
964 Successful authentication with password change
\r
968 <- Failure (E=648 R=0), disable short timeout
\r
969 ChangePassword (++ID) to first challenge ->
\r
972 Successful authentication with retry and password change
\r
976 <- Failure (E=691 R=1), disable short timeout
\r
977 Response (++ID) to first challenge+23 ->
\r
978 <- Failure (E=648 R=0), disable short timeout
\r
979 ChangePassword (++ID) to first challenge+23 ->
\r
985 Intermediate values for password "MyPw".
\r
988 10 2D B5 DF 08 5D 30 41
\r
990 0-to-14-oem-char LmPassword:
\r
993 16-octet LmPasswordHash:
\r
994 75 BA 30 19 8E 6D 19 75 AA D3 B4 35 B5 14 04 EE
\r
996 24-octet LmChallengeResponse:
\r
997 91 88 1D 01 52 AB 0C 33 C5 24 13 5E C2 4A 95 EE
\r
998 64 E2 3C DC 2D 33 34 7D
\r
1000 0-to-256-unicode-char NtPassword:
\r
1001 4D 00 79 00 50 00 77 00
\r
1003 16-octet NtPasswordHash:
\r
1004 FC 15 6A F7 ED CD 6C 0E DD E3 33 7D 42 7F 4E AC
\r
1006 24-octet NtChallengeResponse:
\r
1007 4E 9D 3C 8F 9C FD 38 5D 5B F4 D3 24 67 91 95 6C
\r
1008 A4 C3 51 AB 40 9A 3D 61
\r
1021 Memo Microsoft PPP CHAP Extensions March 1997
\r
1026 [1] Simpson, W., "The Point-to-Point Protocol (PPP)", RFC 1331,
\r
1027 Daydreamer, May 1992
\r
1029 [2] LLoyd, B and Simpson, W., "PPP Authentication Protocols",
\r
1030 RFC 1334, L&A and Daydreamer respectively, Octobet 1992
\r
1032 [3] "Data Encryption Standard (DES)" is Federal Information
\r
1033 Processing Standard publication 46, National Institute of
\r
1034 Standard and Techology.
\r
1036 [4] Rivest, R., "MD4 Message Digest Algorithm", RFC 1320, MIT
\r
1037 Laboratory for Computer Science and RSA Data Security, Inc.,
\r
1040 [5] RC4 is an encryption standard available from RSA Data Security
\r
1043 [6] The 8-octet StdText string used in the LAN Manager compatible
\r
1044 password hashing and the 8-octet KeyValue used in the Change
\r
1045 Password (version 1) packet are not available for public
\r
1046 distribution at this time. Contact the Microsoft Developer
\r
1047 Relations group (at time of writing dbeaver@microsoft.com) for
\r
1048 details on obtaining these values. On this particular point
\r
1049 the author can't help you.
\r
1081 Memo Microsoft PPP CHAP Extensions March 1997
\r
1086 The working group can be contacted via the current chair:
\r
1089 Email: fred@cisco.com
\r
1095 The author is a developer in Microsoft's Windows NT
\r
1096 Internetworking group, which monitors the ietf-ppp@merit.edu
\r
1097 discussions. Questions can also be directed as below, where email
\r
1101 Microsoft Corporation
\r
1103 Redmond, WA 98052-6399
\r
1105 Email: stevec@microsoft.com
\r
1107 The author maintains an informal mailing list of persons
\r
1108 interested in MS-CHAP and other news regarding Windows NT support
\r
1109 for PPP authentication protocols. Send email if interested.
\r