mac2pw.1 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265
  1. .TH mac2pw 1 "Feb 2015" "open-plc-utils-0.0.3" "Qualcomm Atheros Open Powerline Toolkit"
  2. .SH NAME
  3. mac2pw - Qualcomm Atheros Ethernet Device Password Generator
  4. .SH SYNOPSIS
  5. .BR mac2pw
  6. .RI [ options ]
  7. .IR address
  8. .RI [ address ]
  9. [...]
  10. .SH DESCRIPTION
  11. Print a range of consecutive Ethernet addresses and passwords on stdout such that each device has a unique password.
  12. Program output is suitable as input to the Qualcomm Atheros HomePlug AV Production Test System or may be used in custom production systems.
  13. A starting address and an address range are specified.
  14. Computed passwords consist of upper case letters and digits with optional group separators.
  15. Output consists of address/password pairs in text format.
  16. .PP
  17. This program is designed to generate passwords for a large number of consecutive device addresses.
  18. It complements program \fBmac2pwd\fR which generates passwords for non-consecutive device addresses occurring in unspecified order.
  19. .PP
  20. This program is part of the Qualcomm Atheros Powerline Toolkit.
  21. See the \fBAMP\fR man page for an overview and installation instructions.
  22. .SH CAVEATS
  23. Atheros provides this program as a simple means of generating unique device passwords for a large volume of Ethernet devices.
  24. Two different password algorithms are implemented but neither one is required for HomePlug AV compliance.
  25. Vendors are free to use other methods to generate their own device passwords and are encouraged to do so.
  26. .TP
  27. Random Method
  28. Generate passwords based on system entropy.
  29. A different set of passwords is generated for a given address range with each program execution.
  30. There is no correlation at between addresses and passwords.
  31. This method is the most secure but requires care when programming and labelling devices at the factory.
  32. It may be necessary to maintain a database if regular device maintenance and firmware upgrade are needed.
  33. .TP
  34. Device Method
  35. Generate passwords based on device address.
  36. The same set of passwords will be generated for a given address range with each program execution.
  37. This method may be appropriate on system where regular maintenance and firmware updates are required.
  38. This method is not secure because device addresses can be determined using a variety of network management programs.
  39. Anyone having access to this program, or the algorithm, could compute the device password and gain access to device features reserved for privileged users.
  40. This program does provide features to mitigate the risks of using this method.
  41. .SH OPTIONS
  42. .TP
  43. -\fBb\fR \fIbunch\fR
  44. The password bunching factor.
  45. Passwords consists of \fIcount\fR uppercase letters and digits optionally displayed in groups separated by hyphens.
  46. The bunching factor specifies the number of letters and digits in each group.
  47. When \fIbunch\fR is \fB0\fR or greater than \fIcount\fR, bunching is suppressed.
  48. Separating hyphens increase overall password length.
  49. The minimum is \fB0\fR and the maximum is \fB255\fR.
  50. The default is \fB0\fR which suppresses bunching.
  51. .TP
  52. .RB - e
  53. Compute passwords based on host system entropy.
  54. Passwords consist of uppercase letters [A-Z] optionally grouped using option \fB-b\fR.
  55. This method produces a non-repeatable set of unique passwords over a given address range.
  56. This method is the default and is more secure than method \fB-m\fR.
  57. .TP
  58. -\fBl \fIcount\fR
  59. The number of letters in the password string.
  60. Overall password length is the sum of \fIcount\fR plus the number of delimiters implied by \fIbunch\fR.
  61. The minimum is \fB12\fR and the maximum is \fB64\fR.
  62. The default is \fB16\fR.
  63. .TP
  64. .RB - m
  65. Compute passwords based on target device address.
  66. Passwords consist of uppercase letters [A-Z].
  67. This method produces a repeatable set of unique passwords over a given address range.
  68. This method is not secure.
  69. .TP
  70. -\fBn \fInumber\fR
  71. The number of consecutive addresses and passwords to compute and print.
  72. The minimum is \fB0\fR and the maximum is \fB1677215\fR or 0xFFFFFF.
  73. The default is \fB1\fR.
  74. In addition, \fInumber\fR cannot exceed the remaining available addresses in the \fIvendor\fR range.
  75. For example, given start address 00:B0:52:FF:FF:00, there are only 255 remaining addresses in the 00:B0:52 vendor range so it would be an error to request more than that number.
  76. .TP
  77. .RB - q
  78. Quiet mode.
  79. Exclude the device address on output.
  80. This option can be used in scripts to return the password associated with a given device address.
  81. .TP
  82. .RB - v
  83. Verbose mode.
  84. Prefix each line with a '0' column.
  85. The Atheros Production Test System (PTS) uses the first column of a password database file to indicate which addresses and passwords have already been used.
  86. .TP
  87. .RB - ? ,-- help
  88. Print program help information on stdout.
  89. This option takes precedence over other options on the command line.
  90. .TP
  91. .RB - ! ,-- version
  92. Print program version information on stdout.
  93. This option takes precedence over other options on the command line.
  94. Use this option when sending screen dumps to Atheros Technical Support so that they know exactly which version of the Linux Toolkit you are using.
  95. .SH ARGUMENTS
  96. .TP
  97. \fBaddress\fR
  98. The first Ethernet address expressed as 12 consecutive hexadecimal digits.
  99. Puncutation is not permitted.
  100. The final address of the range is computed by adding \fBnumber\fR to this address.
  101. This argument is required.
  102. There is no default \fBaddress\fR.
  103. If more than one device address is specified then an address/password series will be computed for each.
  104. .SH EXAMPLES
  105. The following example prints the given device address and a random password string on stdout.
  106. The default password length is 25 characters long but the length can be changes using option \fB-l\fR.
  107. .PP
  108. # mac2pw 00B052000001
  109. 00B052000001 5KAXCQFQNN4PPNC76XN2YUWMS
  110. .PP
  111. Repeating the command will generate a new password string.
  112. This is the default behaviour and is the same as specifying option \fB-e\fR for "\fBentropy\fR".
  113. .PP
  114. # mac2pw 00B052000001
  115. 00B052000001 CA35TM5JLG4S6XBKSM3HSU6J4
  116. .PP
  117. This example ommits the device address.
  118. Repeating the command produces a new password string.
  119. .PP
  120. # mac2pw 00B052000001 -q
  121. 2LJ6P5JPEHE6V63GZWC337Q8E
  122. # mac2pw 00B052000001 -q
  123. 5Z8J7EGGL2HJDKMZ978W8V94W
  124. .PP
  125. The next example shows how to generate passwords for three different devices with one command.
  126. The program generates a password for each device address specified on the command line.
  127. .PP
  128. # mac2pw 00B052000001 00B05200BABE 00B05200DEAD
  129. 00B052000001 NJHWXEFRPVVW87C9J4BQEHYYE
  130. 00B05200BABE 5PT9Z64Z4TVRPEJCK8LR2XFMR
  131. 00B05200DEAD 7R2LJYGJB42329AS4NM29H8V4
  132. .PP
  133. The next example prints \fB10\fR consecutive device addresses and random passwords on stdout.
  134. The starting device address is given and option \fB-n\fR specifies the number of addresses to print.
  135. Output can be piped to a file or another process.
  136. .PP
  137. # mac2pw 00B052000001 -n 10
  138. 00B052000001 LEKWS42VX92YR3LLL6KBD5RCG
  139. 00B052000002 BHYKXG3VEVXNZ7CF2UERCU4G6
  140. 00B052000003 UBP87NFZMMW5WY8KK5GJFAWS3
  141. 00B052000004 CU7Y7JKFNASS6E4GQ3XL3HWGZ
  142. 00B052000005 9RN3WTXAQUXV8THZUB898ZGB3
  143. 00B052000006 HCXNPW2CM9JVHBJN2TZVRVDU6
  144. 00B052000007 DFD5QY5HATC5NFC5SF3AWL2PD
  145. 00B052000008 837GAN4HSG9U6TTRCPRXMG84T
  146. 00B052000009 HBLZHG32FSZKQ8TANGK5U8DS9
  147. 00B05200000A KEY9D3DW66HX68AWZRCD4VPD9
  148. .PP
  149. The following example prints \fB10\fR consecutive device addresses and passwords but inserts a \fB0\fR at the start of each line to indicate that the address and password have not been used.
  150. The Qualcomm Atheros Production Test System (PTS) will set the \fB0\fR to \fB1\fR after it programs a device.
  151. This format is simlar to PTS DBBuilder Utility output.
  152. .PP
  153. # mac2pw 00B052000006 -n 10 -v
  154. 0 00B052000006 VZNKWJUHAV2687NV6EJYUVQ4D
  155. 0 00B052000007 RENKKWRNFLU4ZNZ3P6K4SZ4PG
  156. 0 00B052000008 NEL6LL2V2YZAL2Q27E2DJ25BG
  157. 0 00B052000009 MYX2T5HM68T5JCK7YYJNDWH2P
  158. 0 00B05200000A 6UY4MPYP43GXSD39VLTNZCJEZ
  159. 0 00B05200000B MD47KPFZLSNL9XRLJTN3MKJ5N
  160. 0 00B05200000C BKVTVYE47LE4DKMUNQPPXR7HL
  161. 0 00B05200000D RBJ8DA5DB48TZUTAQXZ9CPFTM
  162. 0 00B05200000E HSK6N9ZGZPGV4T5YXST4DH3W8
  163. 0 00B05200000F BLW8QQ4JMEVSQJYHRPBDGG5RS
  164. .PP
  165. The next example prints \fB10\fR consecutive device addresses and passwords, as before, but changes password length and character bunching.
  166. Option \fB-l\fR specifies \fB12\fR characters and option \fB-b\fR specifies a bunching factor of three.
  167. .PP
  168. # mac2pw 00B052000001 -n 10 -l 12 -b 3
  169. 00B052000001 S2J-V4B-NB6-37M
  170. 00B052000002 QEX-292-CYF-AVV
  171. 00B052000003 5VH-2KR-FYP-EVH
  172. 00B052000004 NYU-TPB-ZK3-6H6
  173. 00B052000005 MGX-GB7-P2P-42B
  174. 00B052000006 DDM-UD8-8NS-BZA
  175. 00B052000007 MLZ-86G-F4G-MS8
  176. 00B052000008 DTY-U8D-DT8-3G2
  177. 00B052000009 6BY-WVU-GB9-UEB
  178. 00B05200000A TX3-NUS-TKM-LVL
  179. .PP
  180. The next example prints \fB10\fR consecutive device addresses and passwords, as before, but starts from a different device address.
  181. We specified option \fB-m\fR so that passwords are generated based on the MAC address.
  182. This ensures that the same password is generated each time for a given device address.
  183. We also specified password length or \fB16\fR characters using option \fB-l\fR and bunching factor of \fB4\fR with option \fB-b\fR.
  184. .PP
  185. # mac2pw 00B052000001 -m -l 16 -b 4 -n 10
  186. 00B052000001 HBXY-FVHN-COML-MVLY
  187. 00B052000002 KYCC-KFFD-BHCN-CSUL
  188. 00B052000003 LQXF-TULV-IOQB-SKJI
  189. 00B052000004 SOBX-FRNC-EIHL-KBPW
  190. 00B052000005 XPAC-KESG-MDYY-OFPQ
  191. 00B052000006 SFTQ-DWEF-GHYC-VOWW
  192. 00B052000007 NNZQ-FCTW-VQLG-ESBV
  193. 00B052000008 SEPC-KYYS-JZEO-HHVT
  194. 00B052000009 OYPS-DSDV-QILZ-JYOV
  195. 00B05200000A HQYV-FIWJ-CJDZ-XPNZ
  196. .PP
  197. The following example prints \fB10\fR consecutive device addresses and passwords, as before, but starts from a different device address.
  198. The address range here overlaps the range shown above but identical device addresses have identical passwords.
  199. Address based passwords may be of interest on large private networks requireing frequent firmware upgrades or device configuration.
  200. .PP
  201. # mac2pw 00B052000006 -m -l 16 -b 4 -n 10
  202. 00B052000006 SFTQ-DWEF-GHYC-VOWW
  203. 00B052000007 NNZQ-FCTW-VQLG-ESBV
  204. 00B052000008 SEPC-KYYS-JZEO-HHVT
  205. 00B052000009 OYPS-DSDV-QILZ-JYOV
  206. 00B05200000A HQYV-FIWJ-CJDZ-XPNZ
  207. 00B05200000B MQIG-KUKM-YQSJ-KPRM
  208. 00B05200000C VTLW-DAVK-JCMU-JQLU
  209. 00B05200000D PIQB-OITS-RFCY-PUVE
  210. 00B05200000E IWAV-KYJM-JBEM-GPMR
  211. 00B05200000F LQJY-DSEX-WDHE-FVMB
  212. .SH DISCLAIMER
  213. Qualcomm Atheros reserves the right to modify program names, functionality, input format or output format in future toolkit releases without any obligation to notify or compensate toolkit users.
  214. .SH SEE ALSO
  215. .BR hpavkey ( 1 ),
  216. .BR hpavkeys ( 1 ),
  217. .BR keys ( 1 ),
  218. .BR mac2pwd ( 1 ),
  219. .BR rkey ( 1 )
  220. .SH CREDITS
  221. Charles Maier <cmaier@qca.qualcomm.com>
  222. Pouyan Sepehrdad <pouyans@qti.qualcomm.com>
  223. Ning Shang <nshang@qti.qualcomm.com>