aboutsummaryrefslogtreecommitdiff
path: root/4.2/charon.rb
diff options
context:
space:
mode:
Diffstat (limited to '4.2/charon.rb')
-rwxr-xr-x4.2/charon.rb80
1 files changed, 80 insertions, 0 deletions
diff --git a/4.2/charon.rb b/4.2/charon.rb
new file mode 100755
index 0000000..f1940f6
--- /dev/null
+++ b/4.2/charon.rb
@@ -0,0 +1,80 @@
+#!/usr/bin/env ruby
+
+require 'openssl'
+require 'securerandom'
+require 'sinatra'
+
+Users = {
+ "Athena" => "Passw0rd!"
+}
+
+Services = {
+ "_TGS" => "eiqu@a5ahs8mooqu9Eng",
+ "Mail" => "{FvM<kgG}VpHxKJO;6Zo"
+}
+
+def encrypt(obj, key)
+ cipher = OpenSSL::Cipher::AES.new(256, :CBC).encrypt
+ cipher.key = Digest::SHA2.digest(key)
+ s = cipher.update(obj) + cipher.final
+ s.unpack('H*')[0].upcase
+end
+
+def decrypt(obj, key)
+ ticket = [obj].pack("H*").unpack("C*").pack("c*")
+ cipher = OpenSSL::Cipher::AES.new(256, :CBC).decrypt
+ cipher.key = Digest::SHA2.digest(key)
+ cipher.update(ticket) + cipher.final
+end
+
+def ticket(username, ws_address, service)
+ ts = Time.now.to_i
+ sk = SecureRandom.hex.upcase
+ p = [sk, username, ws_address, service, 28800, ts].join(?\0)
+ s = encrypt(p, Services[service])
+ "#{sk},#{ws_address},28800,#{ts},#{s}"
+end
+
+def noleak(msg, ul, ws)
+ puts "Error: #{msg}, returning nonsense to avoid leakage."
+ ticket(SecureRandom.alphanumeric(ul), ws, SecureRandom.alphanumeric(rand(24) + 8))
+end
+
+post '/login' do
+ request.body.rewind
+ data = JSON.parse(request.body.read)
+ next "Invalid request\n" unless data.keys == %w(username)
+ un = data["username"]
+ ul = un.length
+ ws = request.ip
+ next noleak("Invalid username", ul, ws) unless Users.keys.include?(un)
+ tgt = ticket(un, ws, "_TGS")
+ encrypt(tgt, Users[un])
+end
+
+post '/ticket' do
+ request.body.rewind
+ data = JSON.parse(request.body.read)
+ next "Invalid request\n" unless data.keys.sort == %w(authenticator service ticket username)
+ sk, un, ws, sn, ls, ts = decrypt(data["ticket"], Services["_TGS"]).split(?\0)
+ ls = ls.to_i
+ ts = ts.to_i
+ next "Invalid ticket\n" unless sn == "_TGS"
+ next "Invalid ticket\n" unless un == data["username"]
+ next "Invalid ticket\n" unless ws == request.ip
+ next "Invalid ticket\n" unless Time.now.to_i >= ts
+ next "Ticket expired\n" unless Time.now.to_i < (ts + ls)
+ begin
+ aun, aws, als, ats = decrypt(data["authenticator"], sk).split(?,)
+ als = als.to_i
+ ats = ats.to_i
+ rescue OpenSSL::Cipher::CipherError
+ next "Invalid session key\n"
+ end
+ next "Invalid authenticator\n" unless aun == un
+ next "Invalid authenticator\n" unless aws == ws
+ next "Invalid authenticator\n" unless Time.now.to_i >= ats
+ next "Authenticator expired\n" unless Time.now.to_i < (ats + als)
+ svt = ticket(un, ws, data["service"])
+ encrypt(svt, sk)
+end