aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--4.1/.gitignore1
-rwxr-xr-x4.1/charon.rb76
-rwxr-xr-x4.1/get_mail.rb85
-rwxr-xr-x4.1/kinit.rb36
-rwxr-xr-x4.1/mail.rb32
5 files changed, 230 insertions, 0 deletions
diff --git a/4.1/.gitignore b/4.1/.gitignore
new file mode 100644
index 0000000..bfa3c3c
--- /dev/null
+++ b/4.1/.gitignore
@@ -0,0 +1 @@
+.keytab
diff --git a/4.1/charon.rb b/4.1/charon.rb
new file mode 100755
index 0000000..ee2a514
--- /dev/null
+++ b/4.1/charon.rb
@@ -0,0 +1,76 @@
+#!/usr/bin/env ruby
+
+require 'openssl'
+require 'securerandom'
+require 'sinatra'
+
+Users = {
+ "Athena" => "Passw0rd!"
+}
+
+Services = {
+ "_TGS" => "eiqu@a5ahs8mooqu9Eng",
+ "Mail" => "{FvM<kgG}VpHxKJO;6Zo"
+}
+
+def encrypt(obj, key)
+ cipher = OpenSSL::Cipher::AES.new(256, :CBC).encrypt
+ cipher.key = Digest::SHA2.digest(key)
+ s = cipher.update(obj) + cipher.final
+ s.unpack('H*')[0].upcase
+end
+
+def decrypt(obj, key)
+ ticket = [obj].pack("H*").unpack("C*").pack("c*")
+ cipher = OpenSSL::Cipher::AES.new(256, :CBC).decrypt
+ cipher.key = Digest::SHA2.digest(key)
+ cipher.update(ticket) + cipher.final
+end
+
+def ticket(username, ws_address, service)
+ ts = Time.now.to_i
+ sk = SecureRandom.hex.upcase
+ p = [sk, username, ws_address, service, 28800, ts].join(?\0)
+ s = encrypt(p, Services[service])
+ "#{sk}:28800:#{ts}:#{s}"
+end
+
+def noleak(msg, ul, ws)
+ puts "Error: #{msg}, returning nonsense to avoid leakage."
+ ticket(SecureRandom.alphanumeric(ul), ws, SecureRandom.alphanumeric(rand(24) + 8))
+end
+
+post '/login' do
+ request.body.rewind
+ data = JSON.parse(request.body.read)
+ next "Invalid request\n" unless data.keys == %w(username)
+ un = data["username"]
+ ul = un.length
+ ws = request.ip
+ next noleak("Invalid username", ul, ws) unless Users.keys.include?(un)
+ tgt = ticket(un, ws, "_TGS")
+ encrypt(tgt, Users[un])
+end
+
+post '/ticket' do
+ request.body.rewind
+ data = JSON.parse(request.body.read)
+ next "Invalid request\n" unless data.keys.sort == %w(authenticator service ticket username)
+ sk, un, ws, sn, ls, ts = decrypt(data["ticket"], Services["_TGS"]).split(?\0)
+ ls = ls.to_i
+ ts = ts.to_i
+ next "Invalid ticket\n" unless sn == "_TGS"
+ next "Invalid ticket\n" unless un == data["username"]
+ next "Invalid ticket\n" unless ws == request.ip
+ next "Invalid ticket\n" unless Time.now.to_i >= ts
+ next "Ticket expired\n" unless Time.now.to_i < (ts + ls)
+ begin
+ aun, aws = decrypt(data["authenticator"], sk)
+ rescue OpenSSL::Cipher::CipherError
+ next "Invalid session key\n"
+ end
+ next "Invalid authenticator\n" unless aun == un
+ next "Invalid authenticator\n" unless aws == ws
+ svt = ticket(un, ws, data["service"])
+ encrypt(svt, sk)
+end
diff --git a/4.1/get_mail.rb b/4.1/get_mail.rb
new file mode 100755
index 0000000..8cbbb1f
--- /dev/null
+++ b/4.1/get_mail.rb
@@ -0,0 +1,85 @@
+#!/usr/bin/env ruby
+
+require 'net/http'
+require 'uri'
+require 'json'
+
+def get_ticket(un, tgt, sv)
+ uri = URI.parse("http://localhost:4567/ticket")
+ header = {'Content-Type': 'text/json'}
+
+ login = {
+ "username": un,
+ "ticket": tgt,
+ "service": sv
+ }
+
+ http = Net::HTTP.new(uri.host, uri.port)
+ request = Net::HTTP::Post.new(uri.request_uri, header)
+ request.body = login.to_json
+
+ response = http.request(request)
+ response.body
+end
+
+def ticket_valid?(ticket)
+ now = Time.now.to_i
+ timeStart = ticket["timestamp"]
+ timeEnd = ticket["timestamp"] + ticket["lifespan"]
+ now >= timeStart && now < timeEnd
+end
+
+def update_keytab!
+ File.open(".keytab", "w") do |f|
+ f.puts Tickets.map { |s, p| [s, *p.values].join(?:) }
+ end
+end
+
+print "Username: "; un = gets.strip
+print "Mailserver: "; ms = gets.strip
+
+unless File.exist?(".keytab")
+ puts "No keytab, please kinit"
+ exit 1
+end
+
+Tickets = File.readlines(".keytab").map { |l|
+ a = l.strip.split(?:)
+ [a[0], {
+ "lifespan" => a[1].to_i,
+ "timestamp" => a[2].to_i,
+ "ticket" => a[3]
+ }]
+}.to_h
+
+unless Tickets.keys.include?(ms) && ticket_valid?(Tickets[ms])
+ if Tickets.keys.include?("_TGS") && ticket_valid?(Tickets["_TGS"])
+ packet = get_ticket(un, Tickets["_TGS"]["ticket"], ms).split(?:)
+ Tickets[ms] = {
+ "lifespan" => packet[0].to_i,
+ "timestamp" => packet[1].to_i,
+ "ticket" => packet[2]
+ }
+ update_keytab!
+ else
+ puts "No Ticket Granting Ticket, please kinit"
+ exit 1
+ end
+end
+
+ticket = Tickets[ms]["ticket"]
+
+uri = URI.parse("http://localhost:4568/login")
+header = {'Content-Type': 'text/json'}
+
+login = {
+ "username": un,
+ "ticket": ticket
+}
+
+http = Net::HTTP.new(uri.host, uri.port)
+request = Net::HTTP::Post.new(uri.request_uri, header)
+request.body = login.to_json
+
+response = http.request(request)
+puts response.body
diff --git a/4.1/kinit.rb b/4.1/kinit.rb
new file mode 100755
index 0000000..5174839
--- /dev/null
+++ b/4.1/kinit.rb
@@ -0,0 +1,36 @@
+#!/usr/bin/env ruby
+
+require 'io/console'
+require 'json'
+require 'net/http'
+require 'openssl'
+require 'uri'
+
+uri = URI.parse("http://localhost:4567/login")
+
+header = {'Content-Type': 'text/json'}
+
+print "Username: "; un = gets.strip
+print "Password: "; pw = STDIN.noecho(&:gets).strip; puts
+
+login = {
+ "username": un
+}
+
+http = Net::HTTP.new(uri.host, uri.port)
+request = Net::HTTP::Post.new(uri.request_uri, header)
+request.body = login.to_json
+
+response = http.request(request)
+eticket = [response.body].pack("H*").unpack("C*").pack("c*")
+
+cipher = OpenSSL::Cipher::AES.new(256, :CBC).decrypt
+cipher.key = Digest::SHA2.digest(pw)
+begin
+ ticket = cipher.update(eticket) + cipher.final
+ File.open(".keytab", ?w) do |f|
+ f.puts "_TGS:#{ticket}"
+ end
+rescue OpenSSL::Cipher::CipherError
+ puts "Invalid password?"
+end
diff --git a/4.1/mail.rb b/4.1/mail.rb
new file mode 100755
index 0000000..e8f9cdd
--- /dev/null
+++ b/4.1/mail.rb
@@ -0,0 +1,32 @@
+#!/usr/bin/env ruby
+
+require 'openssl'
+require 'securerandom'
+require 'sinatra'
+
+set :port, 4568
+
+Service = "Mail"
+ServicePassword = "{FvM<kgG}VpHxKJO;6Zo"
+
+def decrypt(ticket)
+ ticket = [ticket].pack("H*").unpack("C*").pack("c*")
+ cipher = OpenSSL::Cipher::AES.new(256, :CBC).decrypt
+ cipher.key = Digest::SHA2.digest(ServicePassword)
+ cipher.update(ticket) + cipher.final
+end
+
+post '/login' do
+ request.body.rewind
+ data = JSON.parse(request.body.read)
+ next "Invalid request\n" unless data.keys.sort == %w(ticket username)
+ un, ws, sn, ls, ts = decrypt(data["ticket"]).split(?\0)
+ ls = ls.to_i
+ ts = ts.to_i
+ next "Invalid ticket\n" unless sn == Service
+ next "Invalid ticket\n" unless un == data["username"]
+ next "Invalid ticket\n" unless ws == request.ip
+ next "Invalid ticket\n" unless Time.now.to_i >= ts
+ next "Ticket expired\n" unless Time.now.to_i < (ts + ls)
+ "Login okay! You have no mail.\n"
+end