[Alpine-info] Examining contents of alpine's passfile?

Mark Dixon via Alpine-info alpine-info at u.washington.edu
Thu Sep 12 02:47:33 PDT 2024


Hi Jason,

Thanks, that's a big help!

Best,

Mark

On Wed, 11 Sep 2024, jason-alpine-info at shalott.net wrote:


> [You don't often get email from jason-alpine-info at shalott.net. Learn why this

> is important at https://aka.ms/LearnAboutSenderIdentification ]

>

> [EXTERNAL EMAIL]

>

>> I'd like to take a look at the credentials from my alpine's passfile.

>> Some likely-looking openssl foo returned jibberish:

>>

>> openssl smime -decrypt -inform pem -in <filename> -inkey

>> .alpine-smime/.pwd/MasterPassword.key

>>

>> Is there a simple way to examine the contents please, or do I need to

>> start looking at the source code?

>

> The passfile is obfuscated (a throw-back to the days before strong crypto

> was available), and there is no standalone utility to de-obfuscate it.

>

> The source is in alpine/imap.c, in xlate_in() and xlate_out().

>

> Once, when I had a similar need, I took those routines and dropped them

> more-or-less verbatim into perl, and it worked as expected. YMMV...

>

> https://pastebin.com/JVVRf2gy

>

>

> -Jason

>

>

>



More information about the Alpine-info mailing list