/*************************************************************************** * _ _ ____ _ * Project ___| | | | _ \| | * / __| | | | |_) | | * | (__| |_| | _ <| |___ * \___|\___/|_| \_\_____| * * Copyright (C) 1998 - 2003, Daniel Stenberg, , et al. * * This software is licensed as described in the file COPYING, which * you should have received as part of this distribution. The terms * are also available at http://curl.haxx.se/docs/copyright.html. * * You may opt to use, copy, modify, merge, publish, distribute and/or sell * copies of the Software, and permit persons to whom the Software is * furnished to do so, under the terms of the COPYING file. * * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY * KIND, either express or implied. * * $Id$ ***************************************************************************/ #include "setup.h" /* All NTLM details here: http://www.innovation.ch/java/ntlm.html */ #ifndef CURL_DISABLE_HTTP #ifdef USE_SSLEAY /* We need OpenSSL for the crypto lib to provide us with MD4 and DES */ /* -- WIN32 approved -- */ #include #include #include #include #include #include "urldata.h" #include "sendf.h" #include "strequal.h" #include "base64.h" #include "http_ntlm.h" #define _MPRINTF_REPLACE /* use our functions only */ #include #include #include #include #if OPENSSL_VERSION_NUMBER < 0x00907001L #define DES_key_schedule des_key_schedule #define DES_cblock des_cblock #define DES_set_odd_parity des_set_odd_parity #define DES_set_key des_set_key #define DES_ecb_encrypt des_ecb_encrypt /* This is how things were done in the old days */#define DESKEY(x) x #define DESKEY(x) x #define DESKEYARG(x) x #else /* Modern version */ #define DESKEYARG(x) *x #define DESKEY(x) &x #endif /* The last #include file should be: */ #ifdef MALLOCDEBUG #include "memdebug.h" #endif /* The one and only master resource for NTLM "hacking": ====> http://www.innovation.ch/java/ntlm.html <==== Brought to the world by Ronald Tschalär. */ /* Test example header: WWW-Authenticate: NTLM */ CURLntlm Curl_input_ntlm(struct connectdata *conn, char *header) /* rest of the www-authenticate: header */ { struct SessionHandle *data=conn->data; /* skip initial whitespaces */ while(*header && isspace((int)*header)) header++; if(checkprefix("NTLM", header)) { unsigned char buffer[256]; header += strlen("NTLM"); while(*header && isspace((int)*header)) header++; if(*header) { /* we got a type-2 message here */ /* My test-IE session reveived this type-2: TlRMTVNTUAACAAAAAgACADAAAAAGgoEAc51AYVDgyNcAAAAAAAAAAG4AbgA\ yAAAAQ0MCAAQAQwBDAAEAEgBFAEwASQBTAEEAQgBFAFQASAAEABgAYwBjAC4\ AaQBjAGUAZABlAHYALgBuAHUAAwAsAGUAbABpAHMAYQBiAGUAdABoAC4AYwB\ jAC4AaQBjAGUAZABlAHYALgBuAHUAAAAAAA== which translates to this: 0x00: 4e 54 4c 4d 53 53 50 00 02 00 00 00 02 00 02 00 | NTLMSSP......... 0x10: 30 00 00 00 06 82 81 00 73 9d 40 61 50 e0 c8 d7 | 0.......s.@aP... 0x20: 00 00 00 00 00 00 00 00 6e 00 6e 00 32 00 00 00 | ........n.n.2... 0x30: 43 43 02 00 04 00 43 00 43 00 01 00 12 00 45 00 | CC....C.C.....E. 0x40: 4c 00 49 00 53 00 41 00 42 00 45 00 54 00 48 00 | L.I.S.A.B.E.T.H. 0x50: 04 00 18 00 63 00 63 00 2e 00 69 00 63 00 65 00 | ....c.c...i.c.e. 0x60: 64 00 65 00 76 00 2e 00 6e 00 75 00 03 00 2c 00 | d.e.v...n.u...,. 0x70: 65 00 6c 00 69 00 73 00 61 00 62 00 65 00 74 00 | e.l.i.s.a.b.e.t. 0x80: 68 00 2e 00 63 00 63 00 2e 00 69 00 63 00 65 00 | h...c.c...i.c.e. 0x90: 64 00 65 00 76 00 2e 00 6e 00 75 00 00 00 00 00 | d.e.v...n.u..... This is not the same format as described on the web page, but doing repeated requests show that 0x18-0x1f seems to be the nonce anyway. */ int size = Curl_base64_decode(header, buffer); data->state.ntlm.state = NTLMSTATE_TYPE2; /* we got a type-2 */ if(size >= 48) /* the nonce of interest is index [24 .. 31], 8 bytes */ memcpy(data->state.ntlm.nonce, &buffer[24], 8); } else { if(data->state.ntlm.state >= NTLMSTATE_TYPE1) return CURLNTLM_BAD; data->state.ntlm.state = NTLMSTATE_TYPE1; /* we should sent away a type-1 */ } } return CURLNTLM_FINE; } /* * Turns a 56 bit key into the 64 bit, odd parity key and sets the key. The * key schedule ks is also set. */ static void setup_des_key(unsigned char *key_56, DES_key_schedule DESKEYARG(ks)) { DES_cblock key; key[0] = key_56[0]; key[1] = ((key_56[0] << 7) & 0xFF) | (key_56[1] >> 1); key[2] = ((key_56[1] << 6) & 0xFF) | (key_56[2] >> 2); key[3] = ((key_56[2] << 5) & 0xFF) | (key_56[3] >> 3); key[4] = ((key_56[3] << 4) & 0xFF) | (key_56[4] >> 4); key[5] = ((key_56[4] << 3) & 0xFF) | (key_56[5] >> 5); key[6] = ((key_56[5] << 2) & 0xFF) | (key_56[6] >> 6); key[7] = (key_56[6] << 1) & 0xFF; DES_set_odd_parity(&key); DES_set_key(&key, ks); } /* * takes a 21 byte array and treats it as 3 56-bit DES keys. The * 8 byte plaintext is encrypted with each key and the resulting 24 * bytes are stored in the results array. */ static void calc_resp(unsigned char *keys, unsigned char *plaintext, unsigned char *results) { DES_key_schedule ks; setup_des_key(keys, DESKEY(ks)); DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) results, DESKEY(ks), DES_ENCRYPT); setup_des_key(keys+7, DESKEY(ks)); DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) (results+8), DESKEY(ks), DES_ENCRYPT); setup_des_key(keys+14, DESKEY(ks)); DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) (results+16), DESKEY(ks), DES_ENCRYPT); } /* * Set up lanmanager and nt hashed passwords */ static void mkhash(char *password, unsigned char *nonce, /* 8 bytes */ unsigned char *lmresp, /* must fit 0x18 bytes */ unsigned char *ntresp) /* must fit 0x18 bytes */ { unsigned char lmbuffer[21]; unsigned char ntbuffer[21]; unsigned char pw[256]; /* for maximum 128-letter passwords! */ int len = strlen(password); unsigned char magic[] = { 0x4B, 0x47, 0x53, 0x21, 0x40, 0x23, 0x24, 0x25 }; int i; if (len > 14) len = 14; for (i=0; i> 8) /* this is for creating ntlm header output */ CURLcode Curl_output_ntlm(struct connectdata *conn) { struct SessionHandle *data=conn->data; const char *domain="HEMMA"; const char *host="LILLASYSTER"; int domlen=strlen(domain); int hostlen = strlen(host); int hostoff; /* host name offset */ int domoff; /* domain name offset */ int size; char *base64=NULL; unsigned char ntlm[256]; /* enough, unless the host/domain is very long */ if(NTLMSTATE_TYPE1 == data->state.ntlm.state) { hostoff = 32; domoff = hostoff + hostlen; /* IE used this as type-1 maessage: Authorization: NTLM \ TlRMTVNTUAABAAAABoIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMAAAAAAAAAAwAAAA\r\n This translates into: 0x00: 4e 54 4c 4d 53 53 50 00 01 00 00 00 06 82 00 00 | NTLMSSP......... 0x10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ................ 0x20: 00 00 00 00 30 00 00 00 00 00 00 00 30 00 00 00 | ....0.......0... Which isn't following the web spec. This uses 0x8206 instead of 0xb203 and sends a longer chunk of data than we do! Interestingly, there's no host or domain either. We want to send something like this: 0x00: 4e 54 4c 4d 53 53 50 00 01 00 00 00 03 b2 00 00 | NTLMSSP......... 0x10: 05 00 05 00 2b 00 00 00 0b 00 0b 00 20 00 00 00 | ....+........... 0x20: 4c 49 4c 4c 41 53 59 53 54 45 52 48 45 4d 4d 41 | LILLASYSTERHEMMA */ snprintf((char *)ntlm, sizeof(ntlm), "NTLMSSP%c" "\x01" /* type 1 */ "%c%c%c" "\x03\xb2" "%c%c" "%c%c" /* domain length */ "%c%c" /* domain length */ "%c%c" /* domain name offset */ "%c%c" /* 2 zeroes */ "%c%c" /* host length */ "%c%c" /* host length */ "%c%c" /* host name offset */ "%c%c" /* 2 zeroes */ "%s" /* host name */ "%s", /* domain string */ 0,0,0,0,0,0, SHORTPAIR(domlen), SHORTPAIR(domlen), SHORTPAIR(domoff), 0,0, SHORTPAIR(hostlen), SHORTPAIR(hostlen), SHORTPAIR(hostoff), 0,0, host, domain); /* initial packet length */ size = 32 + hostlen + domlen; #if 0 #define CHUNK "\x4e\x54\x4c\x4d\x53\x53\x50\x00\x01\x00\x00\x00\x06\x82\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x30\x00\x00\x00\x00\x00\x00\x00\x30\x00\x00\x00" memcpy(ntlm, CHUNK, sizeof(CHUNK)-1); size = sizeof(CHUNK)-1; #endif /* now keeper of the base64 encoded package size */ size = Curl_base64_encode(ntlm, size, &base64); if(size >0 ) { conn->allocptr.userpwd = aprintf("Authorization: NTLM %s\r\n", base64); free(base64); } else return CURLE_OUT_OF_MEMORY; /* FIX TODO */ } else { /* We are not in the first state, create a type-3 message */ /* My test-IE session sent this type-3: TlRMTVNTUAADAAAAGAAYAEoAAAAAAAAAYgAAAAUABQA0AAAABgAGADk\ AAAALAAsAPwAAAEhFTU1BZGFuaWVsTElMTEFTWVNURVJPVPJELoebUg\ 4SvW0ed2QmKu0SjX4qNrI= Which translates to: 0x00: 4e 54 4c 4d 53 53 50 00 03 00 00 00 18 00 18 00 | NTLMSSP......... 0x10: 4a 00 00 00 00 00 00 00 62 00 00 00 05 00 05 00 | J.......b....... 0x20: 34 00 00 00 06 00 06 00 39 00 00 00 0b 00 0b 00 | 4.......9....... 0x30: 3f 00 00 00 48 45 4d 4d 41 64 61 6e 69 65 6c 4c | ?...HEMMAdanielL 0x40: 49 4c 4c 41 53 59 53 54 45 52 4f 54 f2 44 2e 87 | ILLASYSTEROT.D.. 0x50: 9b 52 0e 12 bd 6d 1e 77 64 26 2a ed 12 8d 7e 2a | .R...m.wd&*...~* 0x60: 36 b2 | 6. Note how the domain + username + hostname ARE NOT unicoded in any way. Domain and hostname are uppercase, while username are case sensitive. We send something like this: 0x00: 4e 54 4c 4d 53 53 50 00 03 00 00 00 18 00 18 00 | NTLMSSP......... 0x10: 6c 00 00 00 18 00 18 00 84 00 00 00 0a 00 0a 00 | l............... 0x20: 40 00 00 00 0c 00 0c 00 4a 00 00 00 16 00 16 00 | @.......J....... 0x30: 56 00 00 00 00 00 00 00 9c 00 00 00 01 82 00 00 | V............... 0x40: 48 00 45 00 4d 00 4d 00 41 00 64 00 61 00 6e 00 | H.E.M.M.A.d.a.n. 0x50: 69 00 65 00 6c 00 4c 00 49 00 4c 00 4c 00 41 00 | i.e.l.L.I.L.L.A. 0x60: 53 00 59 00 53 00 54 00 45 00 52 00 bc ed 28 c9 | S.Y.S.T.E.R...(. 0x70: 16 c4 1b 16 d7 c9 b4 0e ef ef 02 6d 26 8d c0 ba | ...........m&... 0x80: ac b6 5a c1 26 8d c0 ba ac b6 5a c1 26 8d c0 ba | ..Z.&.....Z.&... 0x90: ac b6 5a c1 26 8d c0 ba ac b6 5a c1 | ..Z.&.....Z. */ int lmrespoff; int ntrespoff; int useroff; unsigned char lmresp[0x18+1]; unsigned char ntresp[0x18+1]; int userlen = strlen(data->state.user); mkhash(data->state.passwd, &data->state.ntlm.nonce[0], lmresp, ntresp); /* these are going unicode */ domlen *= 2; userlen *= 2; hostlen *= 2; domoff = 64; /* always */ useroff = domoff + domlen; hostoff = useroff + userlen; lmrespoff = hostoff + hostlen; ntrespoff = lmrespoff + 0x18; /* Create the big type-3 message binary blob */ size = snprintf((char *)ntlm, sizeof(ntlm), "NTLMSSP%c" "\x03" /* type 3 */ "%c%c%c" /* 3 zeroes */ "%c%c%c%c" /* LanManager length twice */ "%c%c" /* LanManager offset */ "%c%c" /* 2 zeroes */ "%c%c%c%c" /* NT-response length twice */ "%c%c" /* NT-response offset */ "%c%c" /* 2 zeroes */ "%c%c" /* domain length */ "%c%c" /* domain length */ "%c%c" /* domain name offset */ "%c%c" /* 2 zeroes */ "%c%c" /* user length */ "%c%c" /* user length */ "%c%c" /* user offset */ "%c%c" /* 2 zeroes */ "%c%c" /* host length */ "%c%c" /* host length */ "%c%c" /* host offset */ "%c%c%c%c%c%c" /* 6 zeroes */ "\xff\xff" /* message length */ "%c%c" /* 2 zeroes */ "\x01\x82" /* flags */ "%c%c" /* 2 zeroes */ /* domain string */ /* user string */ /* host string */ /* LanManager response */ /* NT response */ , 0, 0,0,0, SHORTPAIR(0x18), /* LanManager response length, twice */ SHORTPAIR(0x18), SHORTPAIR(lmrespoff), 0x0, 0x0, SHORTPAIR(0x18), /* NT-response length, twice */ SHORTPAIR(0x18), SHORTPAIR(ntrespoff), 0x0, 0x0, SHORTPAIR(domlen), SHORTPAIR(domlen), SHORTPAIR(domoff), 0x0, 0x0, SHORTPAIR(userlen), SHORTPAIR(userlen), SHORTPAIR(useroff), 0x0, 0x0, SHORTPAIR(hostlen), SHORTPAIR(hostlen), SHORTPAIR(hostoff), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0); /* size is now 64 */ size=64; ntlm[62]=ntlm[63]=0; #if 1 ascii_to_unicode(&ntlm[size], (unsigned char *)domain, TRUE); size += domlen; ascii_to_unicode(&ntlm[size], (unsigned char *)data->state.user, FALSE); size += userlen; ascii_to_unicode(&ntlm[size], (unsigned char *)host, TRUE); size += hostlen; #else strcpy(&ntlm[size], (unsigned char *)domain); size += domlen; strcpy(&ntlm[size], (unsigned char *)data->state.user); size += userlen; strcpy(&ntlm[size], (unsigned char *)host); size += hostlen; #endif /* we append the binary hashes to the end of the blob */ if(size < ((int)sizeof(ntlm) - 0x18)) { memcpy(&ntlm[size], lmresp, 0x18); size += 0x18; } if(size < ((int)sizeof(ntlm) - 0x18)) { memcpy(&ntlm[size], ntresp, 0x18); size += 0x18; } ntlm[56] = size & 0xff; ntlm[57] = size >> 8; #if 0 #undef CHUNK #define CHUNK "\x4e\x54\x4c\x4d\x53\x53\x50\x00\x03\x00\x00\x00\x18\x00\x18\x00\x4a\x00\x00\x00\x00\x00\x00\x00\x62\x00\x00\x00\x05\x00\x05\x00\x34\x00\x00\x00\x06\x00\x06\x00\x39\x00\x00\x00\x0b\x00\x0b\x00\x3f\x00\x00\x00\x48\x45\x4d\x4d\x41\x64\x61\x6e\x69\x65\x6c\x4c\x49\x4c\x4c\x41\x53\x59\x53\x54\x45\x52\x4f\x54\xf2\x44\x2e\x87\x9b\x52\x0e\x12\xbd\x6d\x1e\x77\x64\x26\x2a\xed\x12\x8d\x7e\x2a\x36\xb2" memcpy(ntlm, CHUNK, sizeof(CHUNK)-1); size = sizeof(CHUNK)-1; #endif /* convert the binary blob into base64 */ size = Curl_base64_encode(ntlm, size, &base64); if(size >0 ) { conn->allocptr.userpwd = aprintf("Authorization: NTLM %s\r\n", base64); free(base64); } else return CURLE_OUT_OF_MEMORY; /* FIX TODO */ } return CURLE_OK; } #endif /* USE_SSLEAY */ #endif /* !CURL_DISABLE_HTTP */