06-23-2015 08:39 AM - edited 03-19-2019 09:44 AM
Hello,
I am looking to find a way to be able to generate a password hash that Cisco uses in their UC Answer File Generator. I ran through the answer file generator and created my set of platformConfig.xml files required to build a cluster. Going forward I would like to just run a search and replace on a couple of variables (hostname, password, ...) when deploying a new customer without having to key in all the information back into Cisco's answer file generator. This works and I am using it today however I am unable to change the password fields due to the hash and have to manually change them through the CLI afterwards.
Does anyone know how the hash is generated? Is it possible to use a third party tool to generate this hash so that I can insert it into the platformConfig.xml file?
Here is an example of the hash:
<LocalHostAdminPwCrypt>
<ParamNameText>Admin PW for this node</ParamNameText>
<ParamDefaultValue>password</ParamDefaultValue>
<ParamValue>1AFC15B0B20EC1EE831812812AB2825C831812812AB2825C831812812AB2825C</ParamValue>
</LocalHostAdminPwCrypt>
Thanks,
Marc
06-23-2015 04:12 PM
As far as I know, this may not be possible and is not recommended as well. So it would be a better option to run through the answer file again and regenerate. Also if you are generating multiple files save them in different directory.
Ref: http://www.cisco.com/web/cuc_afg/index.html
-Terry
Please rate all helpful posts
09-03-2015 06:54 AM
Did you ever find a solution to this? I have the same need to generate UC Answer Files. I located an app that will decrypt the platformconfig.xml PwCrypt hash, but have not located a method to encrypt the password string.
10-06-2015 04:57 PM
Unfortunately not. For now I generate the answer files with the same password for all and manually change the passwords after installing the UC product. Not ideal but at this time allows for automation and saves me from having to run through populating every field in the answer file generator to get the hash.
08-28-2016 08:06 AM
The AFG tool is implemented with client-side JavaScript. Poking around in the page source yields the encryption hash routine: http://www.cisco.com/web/cuc_afg/EncryptPassword.js
04-25-2018 06:05 PM - edited 04-25-2018 06:09 PM
p.s. the provided password string is (always) padded out with trailing nulls to 32-bytes in length, then encrypted with 56-bit DES ECB, with the result converted to hexadecimal - providing the final "hash". The key used is in plain sight in the js file I linked earlier.
And of course easily reversible (the OP's password based on the hash posted is 'C!sc0123', for example).
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide