aboutsummaryrefslogtreecommitdiff
path: root/5.1/get_mail.rb
blob: 4df3024706b69ddde210da4a6cd1a2dcd75f515f (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
#!/usr/bin/env ruby

require 'net/http'
require 'uri'
require 'json'

def encrypt(obj, key)
  cipher = OpenSSL::Cipher::AES.new(256, :CBC).encrypt
  cipher.key = Digest::SHA2.digest(key)
  s = cipher.update(obj) + cipher.final
  s.unpack('H*')[0].upcase
end

def decrypt(obj, key)
  ticket = [obj].pack("H*").unpack("C*").pack("c*")
  cipher = OpenSSL::Cipher::AES.new(256, :CBC).decrypt
  cipher.key = Digest::SHA2.digest(key)
  cipher.update(ticket) + cipher.final
end

def gen_auth(un, ws, sk)
  ts = Time.now.to_i
  encrypt("#{un},#{ws},120,#{ts}", sk)
end

def get_ticket(un, wsa, tgt, sv, sk)
  uri = URI.parse("http://localhost:4567/ticket")
  header = {'Content-Type': 'text/json'}

  login = {
    "username": un,
    "ticket": tgt,
    "authenticator": gen_auth(un, wsa, sk),
    "service": sv
  }

  http = Net::HTTP.new(uri.host, uri.port)
  request = Net::HTTP::Post.new(uri.request_uri, header)
  request.body = login.to_json

  response = http.request(request)
  response.body
end

def ticket_valid?(ticket)
  now = Time.now.to_i
  timeStart = ticket["timestamp"]
  timeEnd = ticket["timestamp"] + ticket["lifespan"]
  now >= timeStart && now < timeEnd
end

def update_keytab!
  File.open(".keytab", "w") do |f|
    f.puts Tickets.map { |s, p| [
      s,
      p["sessionkey"],
      p["ws_address"],
      p["lifespan"],
      p["timestamp"],
      p["ticket"]
    ].join(?,) }
  end
end

print "Username: "; un = gets.strip
print "Mailserver: "; ms = gets.strip

unless File.exist?(".keytab")
  puts "No keytab, please kinit"
  exit 1
end

Tickets = File.readlines(".keytab").map { |l|
  a = l.strip.split(?,)
  [a[0], {
    "sessionkey" => a[1],
    "ws_address" => a[2],
    "lifespan" => a[3].to_i,
    "timestamp" => a[4].to_i,
    "ticket" => a[5]
  }]
}.to_h

unless Tickets.keys.include?(ms) && ticket_valid?(Tickets[ms])
  if Tickets.keys.include?("_TGS") && ticket_valid?(Tickets["_TGS"])
    eanc, svt = get_ticket(un, Tickets["_TGS"]["ws_address"],
                           Tickets["_TGS"]["ticket"],
                           ms, Tickets["_TGS"]["sessionkey"]).split(?,)
    anc = decrypt(eanc, Tickets["_TGS"]["sessionkey"]).split(?,)
    Tickets[ms] = {
      "sessionkey" => anc[0],
      "ws_address" => anc[1],
      "lifespan" => anc[2].to_i,
      "timestamp" => anc[3].to_i,
      "ticket" => svt
    }
    update_keytab!
  else
    puts "No Ticket Granting Ticket, please kinit"
    exit 1
  end
end

uri = URI.parse("http://localhost:4568/login")
header = {'Content-Type': 'text/json'}

login = {
  "username": un,
  "ticket": Tickets[ms]["ticket"],
  "authenticator": gen_auth(un, Tickets[ms]["ws_address"], Tickets[ms]["sessionkey"])
}

http = Net::HTTP.new(uri.host, uri.port)
request = Net::HTTP::Post.new(uri.request_uri, header)
request.body = login.to_json

response = http.request(request)
puts response.body