i thing they don't want your
mac address on
windows system.
you only send your mac address on linux system.
in linux system the clines send the packed like this :
username=XXXX&p@$$word=yyyy&srcip=10.23.56.78&macaddress=00 A1 B0 09 69 45 &version=1.0&sessionid=110096618110.23.45.67
on windows system:
username=XXXXX&p@$$word=yyyy&srcip=10.23.45.67&macaddress=&version=2.51&sessionid=110096618110.23.45.67
see the difference[/b]
--fullyaddicted
I am sure they want our macaddress and it is sent also along with our internal ip address inorder for us to log in. I say this because I have tried authenticating myself to Sify directly (without using any client) using telnet. And it worked only when the information was included in the manner shown for linux, with the only correction being that the macaddress is written with a hyphen between the number pairs i.e. like for eg. 00-A1-B0-09-69-45. I think the author of the Reverse Engineering paper probably made a minor error in that but it's corrected by referring to the official client logs.
Now even though I telnetted under linux, there's no reason it wouldn't work under Windows because this is just a communication protocol we are implementing independent of the operating system. Ofcourse it could be that in Windows the macaddress is p@$$ed on before all the other information is p@$$ed, or maybe it's just not shown in the logs. Check out this portion of my log:-
November 26, 2004 14 24 37 Getting machine details
November 26, 2004 14 24 37 00-00-00-00-00
November 26, 2004 14 24 37 DUMMYIP
See the parameter DUMMYIP. Maybe the macaddress is dummy too lol, dunno.