On Thu, 28 Jun 2007 16:06:05 +0200, R.S. <[EMAIL PROTECTED]> wrote:

>I think you shouldn't expect 'cracks & codes' page for z/software. Not to
much private mainframe owners interested in illegal operations, and much
less of them interested in contributing those 'cracks' to everyone.
>Much simpler (and usually *legal*) would be to share some service passwords
for hardware - I googled for some of them - found no reference.

Many are documented in the mainstream hardware publications.

>Last but not least: how many TRIED to break any key on mainframe ? 

Well I sort of tried once, just out of curiosity. There seem to be two basic
forms of keys I've seen in mainframe products (and on other platforms too):

One is a longish key that in itself contains the licence information, i.e.
enables some mix of product features, and possibly contains an encrypted CPU
id, etc. This key is entirely opaque, and is presumably decrypted by the
software to find out the operating parameters.

The other is a plain text licence of some sort, plus a signature or hash so
that the recipient can't just change the plaintext portion. Often the
plaintext is long, and the signature is pretty short. Or sometimes the
signature is public-key based, and is typically quite a bit longer.
Regardless, if you make a one-bit change to the plaintext portion (say, have
the vendor correct a one character spelling error in the company address),
typically the signature changes a lot. Some of our own products use an XML
file that can get quite wordy, with a 128 byte signature. But no one is
asked to cut & paste this; you just install the shipped licence file and go.

What I idly looked into "breaking" (i.e. by eyeballing) was a licence key
that contains some plain text (CPU serial, features, date) plus a
not-too-long magic hex string. I just happened to have a few of these keys
in a file from several years worth of updates, and noticed that the hex
string changes very little with small predictable changes in e.g. the date.
So it clearly is not strongly encrypted, because one would expect the string
to change radically with even a tiny change in the input. Yet the string
isn't long enough to contain the CPU serial or much else, so I suspect
extremely weak hashing. It looks like a puzzle worthy of a weekend
newspaper, but the few minutes I spent wasn't enough. And no, I am not going
to send out the list for others to play with.

Now I'll expect some bogus extraterritorial DMCA notice from each of a bunch
of companies who think theirs is the key in question. :-) 

Tony H.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to