[Alpine-info] Examining contents of alpine's passfile?
Mark Dixon via Alpine-info
alpine-info at u.washington.edu
Thu Sep 12 02:47:33 PDT 2024
Hi Jason,
Thanks, that's a big help!
Best,
Mark
On Wed, 11 Sep 2024, jason-alpine-info at shalott.net wrote:
> [You don't often get email from jason-alpine-info at shalott.net. Learn why this
> is important at https://aka.ms/LearnAboutSenderIdentification ]
>
> [EXTERNAL EMAIL]
>
>> I'd like to take a look at the credentials from my alpine's passfile.
>> Some likely-looking openssl foo returned jibberish:
>>
>> openssl smime -decrypt -inform pem -in <filename> -inkey
>> .alpine-smime/.pwd/MasterPassword.key
>>
>> Is there a simple way to examine the contents please, or do I need to
>> start looking at the source code?
>
> The passfile is obfuscated (a throw-back to the days before strong crypto
> was available), and there is no standalone utility to de-obfuscate it.
>
> The source is in alpine/imap.c, in xlate_in() and xlate_out().
>
> Once, when I had a similar need, I took those routines and dropped them
> more-or-less verbatim into perl, and it worked as expected. YMMV...
>
> https://pastebin.com/JVVRf2gy
>
>
> -Jason
>
>
>
More information about the Alpine-info
mailing list