Last active
May 10, 2022 21:17
-
-
Save dlenski/e4a53a17c0786f492fc04c901968681d to your computer and use it in GitHub Desktop.
Fake server for RSA SecurID token generation (see https://github.com/dlenski/rsa_ct_kip#fake-server)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/env python3 | |
# Needs: Python 3.5+, Flask, PyCryptoDome | |
# server.pem, rsapubkey.pem + rsaprivkey.pem (1024-bit) in the current directory | |
# | |
# What it does: | |
# Pretends to be the "CT-KIP" web service (https://tools.ietf.org/html/rfc3948) that | |
# RSA SecurID Token for Windows v5.0.x talks to to set up a new token, using an | |
# authentication code. | |
# | |
# This has been turned into a "real" repository. | |
# | |
# See https://github.com/dlenski/rsa_ct_kip#fake-server and use that instead of | |
# the (no-longer-maintained) contents of this gist. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
@leonardorobertolopez Yes. To be clear, it emulates the server used for provisioning SecurID tokens using the "RSA CT-KIP" protocol.
It has been turned into a "real" repository, though. See https://github.com/dlenski/rsa_ct_kip#fake-server and use that instead.