Random Key

From Club Penguin Protocol
Revision as of 23:55, 15 December 2013 by imported>Refractor (1 revision: importing preprocessed wiki pages)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

To provide a way to create salted password hashs (i.e. to prevent someone from sniffing a password hash and reusing it), SmartFoxServer provides a mechanism to generate random keys. The server generates this key, and returns it to the client. The client uses this to, for example, hash a password, and use it for login.

The client and server both share the action "rndK", as in both send/receive use this action.

When we send a request, we don't include the <k /> parameter. When we receive it, we receive <k>KEY</k> as a child of the <body /> node, i.e. <msg t='sys'><body action='rndK' r='-1'><k>POJ|oCk[dJsEKu</k></body></msg>


Packet Information

Action rndK
XML Node <k>KEY</k>
(Sent by Server)