I've been trying to use the new Challenge/Response protocol to log in, but everytime I use it, it returns invalid password.
From what I gather from the document, it seems simple enough, but I cannot get it to work. Has anyone else gotten that to work successfully?
The pseudo-code I'm doing is basically this:
- MD5 HEX the password, then convert to string
- Append the converted password string at the end of the challenge string from server
- MD5 HEX the resulting string and send that to the server.
I've also tried not converting the MD5 HEX password to string, but keep it in byte format, and just append that to the end of the challenge string (converted to bytes), then MD5 digest the resulting byte array, but that also fails.
Granted, debugging does make many of the challenge expire, but I know it's not an expired problem. I actually get 'invalid password' from the server.
I've even tried to force the password string and challenge string to be in "UTF-8" byte format, but it doesn't work either. So, I am now wondering if this Challenge/Response protocol is working properly on the server, or am I missing something?
I am using the flat protocol, though I don't think that is the issue? I can get the MD5 plain password to work.