Skip to content


Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
RUB Login Script for the Ruhr-Uni Bochum HIRN Ports
branch: master

Fetching latest commit…

Cannot retrieve the latest commit at this time

Failed to load latest commit information.

hirnlogin - Login-Script for lock-and-key workstations

How to Install


The script needs curl to be installed.

You also need to download the CA certificate (Deutsche Telekom Root CA 2).

Download CA certificate manually

You can download the certificate in PEM format (here)[]

After download, you may want to check if the SHA-256 on the website matches your downloaded file:

sha256sum deutsche-telekom-root-ca-2.pem

You need to move the PEM file to /etc/ssl/certs/Deutsche_Telekom_Root_CA_2.pem:

mv deutsche-telekom-root-ca-2.pem /etc/ssl/certs/Deutsche_Telekom_Root_CA_2.pem

Use CA certificate from distribution package

Most distribution provide a ca-certificates package, which can be installed through the distributions package manager and will most likely contain the needed certificate.

Just install the package, e.g. in OpenWRT you type:

opkg update && opkg install ca-certificates

Please note that you might need to change the $_CACERT-variable in to match the certificate's path. In OpenWRT for example, the certificate is in the right directory, but in CRT format. Thus, you need to change the $_CACERT-variable:

sed  -i -r "s/(\/etc\/ssl\/certs\/[a-zA-Z0-9_-]+)\.pem/\1\.crt/g" /path/to/

Installation and Configuration

Simply download the script or clone the git repository:

git clone

You can then open the file with your favourite text editor (e.g. nano):

cd hirnlogin

Now , you need to look for these lines:

_USER='' # Username (Login-ID) / Benutzer (Login-ID)
_PASS='' # Password / Passwort

Enter your login credentials, save and close the file.

_USER='loginid' # Username (Login-ID) / Benutzer (Login-ID)
_PASS='password' # Password / Passwort

At last, the file has to be made executable:

chmod +x

Frequently asked questions (FAQ)

Why should I use this?

You may ask yourself: "Why should i use this, when i can simply use this wget command I found somewhere on the net?"

wget --no-proxy --auth-no-challenge --referer= --secure-protocol=auto --no-check-certificate --post-data="loginid=LOGIN-ID&password=PASSWORT&action=Login" --delete-after

The answer is simple: As you can see, this command comes with the --no-check-certificate option, which obviously disables certificate checks. Thus, wget doesn't check the server certificate against the corresponding certificate authority and also skips checking if the hostname matches the common name presented by the certificate.

The manual of GNU Wget states:

Only use this option if you are otherwise convinced of the site’s authenticity, or if you really don’t care about the validity of its certificate. It is almost always a bad idea not to check the certificates when transmitting confidential or important data.

Disables certificate checks makes you susceptible to man-in-the-middle (MITM) attacks, where an attacker presents you a faked certificate, so that he can eavesdrop on your (otherwise encrypted) network communication. In this case, he could read your Login-ID and your password in plain text.

On the other hand, this script does check if the server certificate was issues by the certificate authority and therefore prevents MITM attacks. If an attacker tries to eavesdrop on your connection, SSL certificate verification will fail and he will not be able to read your login credentials.

TLDR; Never use the wget command with the --no-check-certificate option unless you really know what you're doing. It makes you susceptible to attacks. Use this script instead.

Are you crazy? Putting your password in a plain text file sucks.

Unfortunately, it's not possible to login with a password hash instead of the plain text password (at least to my knowledge).

But you're right, this sucks.

How can I stay logged in?

You could put this script in your crontab-file.

Edit your crontab-file with

crontab -e

and enter this:

*/5  *    *   *   *   /path/to/ >/dev/null

(The snippet above will tell the cron daemon to automatically execute this script every five minutes.)

Then restart the cron daemon.

Is this free software (free as in freedom, not free beer)?

Yes. It's licensed under the 3-clause BSD license (also known as modified BSD license).

Something went wrong with that request. Please try again.