mac2pwd.1 8.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234
  1. .TH mac2pwd 1 "Feb 2015" "open-plc-utils-0.0.3" "Qualcomm Atheros Open Powerline Toolkit"
  2. .SH NAME
  3. mac2pwd - Qualcomm Atheros Ethernet Device Password Generator
  4. .SH SYNOPSIS
  5. .BR mac2pwd
  6. .RI [ options ]
  7. .IR file
  8. .RI [ file ]
  9. [ ... ]
  10. .SH DESCRIPTION
  11. Read Ethernet MAC addresses from one or more files and print a unique password for each address.
  12. Program output is suitable as input to the Qualcomm Atheros HomePlug AV Production Test System or may be used in custom production systems.
  13. Input addresses can appear in any order and need not be consecutive.
  14. Computed passwords consist of upper case letters and digits with optional group separators.
  15. Output consists of address/password pairs in text format.
  16. .PP
  17. This program may be used to generate passwords for large numbers of non-consecutive MAC addresses that occur in unspecified order.
  18. It complements program \fBmac2pw\fR which generates passwords for consecutive MAC addresses over a given range.
  19. Options exist to modify the password algorithm, password length and character bunching.
  20. .PP
  21. This program is part of the Qualcomm Atheros Powerline Toolkit.
  22. See the \fBAMP\fR man page for an overview and installation instructions.
  23. .SH CAVEATS
  24. Atheros provides this program as a simple means of generating unique and apparently random device passwords for a large volume of Ethernet devices.
  25. Two different password algorithms are implemented but neither one is required for HomePlug AV compliance.
  26. Vendors are free to use other methods to generate their own device passwords and are encouraged to do so.
  27. .TP
  28. Random Method
  29. Generate random passwords based on system entropy.
  30. A different set of passwords is generated for a given address range with each program execution.
  31. There is no correlation at between addresses and passwords.
  32. This method is the most secure but requires care when programming and labelling devices at the factory.
  33. It may be necessary to maintain a database if regular device maintenance and firmware upgrade are needed.
  34. .TP
  35. Device Method
  36. Generate apparently random passwords based on device address.
  37. The same set of passwords will be generated for a given address range with each program execution.
  38. This method may be appropriate on system where regular maintenance and firmware updates are required.
  39. This method is less secure because device addresses can be determined using a variety of network management programs.
  40. Anyone having access to this program, or the algorithm, could compute the device password and gain access to device features reserved for privileged users.
  41. This program does provide features to mitigate the risks of using this method.
  42. .SH OPTIONS
  43. .TP
  44. -\fBb\fR \fIbunch\fR
  45. The password bunching factor.
  46. Passwords consists of \fIcount\fR uppercase letters and digits optionally displayed in groups separated by hyphens.
  47. The bunching factor specifies the number of letters and digits in each group.
  48. When \fIbunch\fR is \fB0\fR or greater than \fIcount\fR, bunching is suppressed.
  49. Separating hyphens increase overall password length.
  50. The minimum is \fB0\fR and the maximum is \fB255\fR.
  51. The default is \fB0\fR which suppresses bunching.
  52. .TP
  53. .RB - e
  54. Compute passwords based on host system entropy.
  55. Passwords consist of uppercase letters [A-Z] optionally grouped using option \fB-b\fR.
  56. This method produces a non-repeatable set of unique passwords over a given address range.
  57. This method is the default and is more secure than method \fB-m\fR.
  58. .TP
  59. -\fBl \fIcount\fR
  60. The number of letters in the password string.
  61. The default \fBcount\fR is \fB16\fR.
  62. Overall password length is the sum of \fBcount\fR plus the number of delimiters implied by \fBbunch\fR.
  63. .TP
  64. .RB - m
  65. Compute passwords based on target device address.
  66. Passwords consist of uppercase letters [A-Z].
  67. This method produces a repeatable set of unique passwords over a given address range.
  68. This method is less secure than the default method \fB-e\fR.
  69. .TP
  70. .RB - q
  71. Quiet mode.
  72. Exclude the MAC address on output.
  73. This option can be used in scripts to return the password associated with a given MAC address.
  74. .TP
  75. .RB - v
  76. Verbose mode.
  77. Prefix each line with a '0' column.
  78. The Atheros Production Test System (PTS) uses the first column of a password database file to indicate which addresses and passwords have already been used.
  79. .TP
  80. .RB - ? ,-- help
  81. Print program help information on stdout.
  82. This option takes precedence over other options on the command line.
  83. .TP
  84. .RB - ! ,-- version
  85. Print program version information on stdout.
  86. This option takes precedence over other options on the command line.
  87. Use this option when sending screen dumps to Atheros Technical Support so that they know exactly which version of the Linux Toolkit you are using.
  88. .SH ARGUMENTS
  89. .TP
  90. .IR file
  91. The name of a file that contains Ethernet address strings.
  92. Individual address strings consist of 12 consecutive hexadecimal digits.
  93. Addresses are seperated by whites space.
  94. This allows multiple addresses on a line.
  95. There is no line length limit.
  96. Punctuation is not permitted; however, a hash ('#') or semicolon (';') in any column starts comment text that continues to the end of that line.
  97. An error in any input file terminates the program with an error message.
  98. .SH EXAMPLES
  99. An example input file, \fBmac.txt\fR, is shown below.
  100. Comment lines document the file.
  101. Blank lines are permitted and multiple addresses appear on one line.
  102. This file contains 5 MAC addresses.
  103. Punctuation is not permitted within a MAC address.
  104. .PP
  105. # =================================
  106. # unused MAC addresses;
  107. # ---------------------------------
  108. 00b052000004
  109. 00b052BABE33
  110. 00b052BABE34 00b052CAFE05
  111. 00b052CAFE01
  112. .PP
  113. Another example input file, \fBmac2.txt\fR, appears below.
  114. A hash ('#') and a semi-colon (';') are used to hide selected addresses.
  115. Hidden addresses are ignored because they are comments.
  116. This file contains 7 addresses but only 5 will be recognized.
  117. .PP
  118. 002b88ffff00
  119. 002b887fff00
  120. # 002b88660066
  121. 002b88660067
  122. 002b88660063 ; 002b8800FFFF
  123. 002b88660066
  124. .PP
  125. The next example reads the two files shown above and prints \fB10\fR addresses, \fB5\fR from each file, with associated passwords.
  126. Output appears on the console but may be piped to a file or another process.
  127. .PP
  128. # mac2pwd mac.txt more.mac
  129. 00B052000004 8C69GFCXATB8RA9SF52LK79UD
  130. 00B052BABE33 MMKGF5SP5DP23KHY27BSLRV2A
  131. 00B052BABE34 CVBG6QHJFQVVCYSACPAPBZT79
  132. 00B052CAFE05 MCXUABFPC33CPMXWFWYX5N2KC
  133. 00B052CAFE01 5GHUWD9YDEL8TCAGEZJ8ESRCC
  134. 002B88FFFF00 CJCW4VB2HZ37DAK2XE9CGCWZZ
  135. 002B887FFF00 W2W9AQU5TE8K4ZLH7R3K5C6X4
  136. 002B88660067 2LWQ5LGBUCDFDYSZYQ2XZSPJ2
  137. 002B88660063 62NKW6RM87UBZG34KH87AXXEY
  138. 002B88660066 KNQAGGFH9G9XQGR96GR4HK4SS
  139. .PP
  140. The next example does the the two files, as before but shortens password length and groups password character.
  141. Overall password length includes password characters plus delimiters.
  142. Option \fB-l\fR sets password length to \fB16\fR characters.
  143. Option \fB-b\fR sets bunching to \fB4\fR characters.
  144. .PP
  145. # mac2pwd mac.txt more.mac -l 16 -b 4
  146. 00B052000004 R5YH-E6XG-TECA-24R8
  147. 00B052BABE33 WBQJ-77PC-VQTX-63Q5
  148. 00B052BABE34 4M2X-GVUY-6PYH-H5V7
  149. 00B052CAFE05 Z8JA-A2MV-49JF-WJZZ
  150. 00B052CAFE01 5L7Z-ZXZP-NUFS-RBKE
  151. 002B88FFFF00 3RAD-HQPN-92G2-HJKA
  152. 002B887FFF00 7YD7-9NJJ-39S7-8ZGF
  153. 002B88660067 HZ6K-SBG5-ZL8S-K2DK
  154. 002B88660063 MX5K-W7PF-T823-38MJ
  155. 002B88660066 PDXL-84QH-GKUN-KVEE
  156. .PP
  157. The next example is the same but prints output suitable for input to the Qualcomm Atheros PTS because option \fB-v\fR is specified.
  158. The output format is similar to that produced by the Qualcomm Atheros DB Builder Utility for Windows.
  159. .PP
  160. # mac2pwd -v mac.txt more.mac
  161. 0 00B052000004 ZZYBQP7EAZKBNWWCKKC4HX3AW
  162. 0 00B052BABE33 LG7XD97UPSBUHA6F7CU28P3WW
  163. 0 00B052BABE34 8BF288CZN4NTBUFSJAQLUYYNF
  164. 0 00B052CAFE05 RTK4XHMWKWWD654QRBQGW5UNH
  165. 0 00B052CAFE01 EE5YLRXD2EGKS6TSGZZK7ES74
  166. 0 002B88FFFF00 BRYJDWYGP79GFWZN8ZU8ZQ3GN
  167. 0 002B887FFF00 KEULLGC6PYFAM3FE89TYTSMP6
  168. 0 002B88660067 H4STMXB67QR22J39MAZQRHHA5
  169. 0 002B88660063 HKF32QX2GCZKGR3XYTMQCWTRB
  170. 0 002B88660066 STKF28Q2JXYEMAQZVQSFVTKFB
  171. .PP
  172. The next example omits the MAC address.
  173. This may used to generate random passwords for other purposes.
  174. .PP
  175. # mac2pwd -q mac.txt more.mac
  176. W6QXL6KDY4SZLL538CAMWSH8N
  177. PMYLFYMNA5TKYU2S6LBJS6QCR
  178. B2P58XQ2L4JSNR6SXEZ6BSVSN
  179. GYG6MS8NFEVH8EFBPD483WWCJ
  180. 44TQ6FYCVSGP9GLS6YSYRTWFQ
  181. GUGPUJ6284X22ZU4RKXAX5T65
  182. LGSV6L9Y9398DFY3Z2TUFBCAJ
  183. H95A2FYV3LNT7BBFSLCLHXEH8
  184. JXSY7TMKK6CP3LDWNE3M74G87
  185. V4TEAG2ZX3J3NJHPAJMMQTQNT
  186. .SH DISCLAIMER
  187. Qualcomm Atheros reserves the right to modify program names, functionality, input format or output format in future toolkit releases without any obligation to notify or compensate toolkit users.
  188. .SH SEE ALSO
  189. .BR hpavkey ( 1 ),
  190. .BR hpavkeys ( 1 ),
  191. .BR keys ( 1 ),
  192. .BR mac2pw ( 1 ),
  193. .BR rkey ( 1 )
  194. .SH CREDITS
  195. Charles Maier <cmaier@qca.qualcomm.com>
  196. Pouyan Sepehrdad <pouyans@qti.qualcomm.com>
  197. Ning Shang <nshang@qti.qualcomm.com>