mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2024-11-24 06:16:30 +03:00
263 lines
12 KiB
C++
263 lines
12 KiB
C++
// Copyright 2017 The Chromium Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
// Based on [MS-NLMP]: NT LAN Manager (NTLM) Authentication Protocol
|
|
// Specification version 28.0 [1]. Additional NTLM reference [2].
|
|
//
|
|
// [1] https://msdn.microsoft.com/en-us/library/cc236621.aspx
|
|
// [2] http://davenport.sourceforge.net/ntlm.html
|
|
|
|
#ifndef NET_BASE_NTLM_H_
|
|
#define NET_BASE_NTLM_H_
|
|
|
|
#include <stddef.h>
|
|
#include <stdint.h>
|
|
|
|
#include <memory>
|
|
#include <vector>
|
|
|
|
#include "base/strings/string16.h"
|
|
#include "base/strings/string_piece.h"
|
|
#include "net/base/net_export.h"
|
|
#include "net/ntlm/ntlm_constants.h"
|
|
|
|
namespace net {
|
|
namespace ntlm {
|
|
|
|
// Maps the bits in the NTLM Hash into 3 DES keys. The DES keys each have 56
|
|
// bits stored in the 7 most significant bits of 8 bytes. The least
|
|
// significant bit is undefined and will subsequently be set with odd parity
|
|
// prior to use.
|
|
// |ntlm_hash| must contain 16 bytes.
|
|
// |keys| must contain 24 bytes.
|
|
NET_EXPORT_PRIVATE void Create3DesKeysFromNtlmHash(const uint8_t* ntlm_hash,
|
|
uint8_t* keys);
|
|
|
|
// Generates the NTLMv1 Hash and writes the |kNtlmHashLen| byte result to
|
|
// |hash|. Defined by NTOWFv1() in [MS-NLMP] Section 3.3.1.
|
|
NET_EXPORT_PRIVATE void GenerateNtlmHashV1(const base::string16& password,
|
|
uint8_t* hash);
|
|
|
|
// Generates the |kResponseLenV1| byte NTLMv1 response field according to the
|
|
// DESL(K, V) function in [MS-NLMP] Section 6.
|
|
//
|
|
// |hash| must contain |kNtlmHashLen| bytes.
|
|
// |challenge| must contain |kChallengeLen| bytes.
|
|
// |response| must contain |kResponseLenV1| bytes.
|
|
NET_EXPORT_PRIVATE void GenerateResponseDesl(const uint8_t* hash,
|
|
const uint8_t* challenge,
|
|
uint8_t* response);
|
|
|
|
// Generates the NTLM Response field for NTLMv1 without extended session
|
|
// security. Defined by ComputeResponse() in [MS-NLMP] Section 3.3.1 for the
|
|
// case where NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY is not set.
|
|
//
|
|
// |server_challenge| must contain |kChallengeLen| bytes.
|
|
// |ntlm_response| must contain |kResponseLenV1| bytes.
|
|
NET_EXPORT_PRIVATE void GenerateNtlmResponseV1(const base::string16& password,
|
|
const uint8_t* server_challenge,
|
|
uint8_t* ntlm_response);
|
|
|
|
// Generates both the LM Response and NTLM Response fields for NTLMv1 based
|
|
// on the users password and the servers challenge. Both the LM and NTLM
|
|
// Response are the result of |GenerateNtlmResponseV1|.
|
|
//
|
|
// NOTE: This should not be used. The default flags always include session
|
|
// security. Session security can however be disabled in NTLMv1 by omitting
|
|
// NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY from the flag set used to
|
|
// initialize |NtlmClient|.
|
|
//
|
|
// The default flags include this flag and the client will not be
|
|
// downgraded by the server.
|
|
//
|
|
// |server_challenge| must contain |kChallengeLen| bytes.
|
|
// |lm_response| must contain |kResponseLenV1| bytes.
|
|
// |ntlm_response| must contain |kResponseLenV1| bytes.
|
|
NET_EXPORT_PRIVATE void GenerateResponsesV1(const base::string16& password,
|
|
const uint8_t* server_challenge,
|
|
uint8_t* lm_response,
|
|
uint8_t* ntlm_response);
|
|
|
|
// The LM Response in V1 with extended session security is 8 bytes of the
|
|
// |client_challenge| then 16 bytes of zero. This is the value
|
|
// LmChallengeResponse in ComputeResponse() when
|
|
// NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY is set. See [MS-NLMP] Section
|
|
// 3.3.1.
|
|
//
|
|
// |lm_response| must contain |kResponseLenV1| bytes.
|
|
NET_EXPORT_PRIVATE void GenerateLMResponseV1WithSessionSecurity(
|
|
const uint8_t* client_challenge,
|
|
uint8_t* lm_response);
|
|
|
|
// The |session_hash| is MD5(CONCAT(server_challenge, client_challenge)).
|
|
// It is used instead of just |server_challenge| in NTLMv1 when
|
|
// NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY is set. See [MS-NLMP] Section
|
|
// 3.3.1.
|
|
//
|
|
// |server_challenge| must contain |kChallengeLen| bytes.
|
|
// |client_challenge| must contain |kChallengeLen| bytes.
|
|
// |session_hash| must contain |kNtlmHashLen|.
|
|
NET_EXPORT_PRIVATE void GenerateSessionHashV1WithSessionSecurity(
|
|
const uint8_t* server_challenge,
|
|
const uint8_t* client_challenge,
|
|
uint8_t* session_hash);
|
|
|
|
// Generates the NTLM Response for NTLMv1 with session security.
|
|
// Defined by ComputeResponse() in [MS-NLMP] Section 3.3.1 for the
|
|
// case where NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY is set.
|
|
//
|
|
// |server_challenge| must contain |kChallengeLen| bytes.
|
|
// |client_challenge| must contain |kChallengeLen| bytes.
|
|
// |ntlm_response| must contain |kResponseLenV1| bytes.
|
|
NET_EXPORT_PRIVATE void GenerateNtlmResponseV1WithSessionSecurity(
|
|
const base::string16& password,
|
|
const uint8_t* server_challenge,
|
|
const uint8_t* client_challenge,
|
|
uint8_t* ntlm_response);
|
|
|
|
// Generates the responses for V1 with extended session security.
|
|
// This is also known as NTLM2 (which is not the same as NTLMv2).
|
|
// |lm_response| is the result of |GenerateLMResponseV1WithSessionSecurity| and
|
|
// |ntlm_response| is the result of |GenerateNtlmResponseV1WithSessionSecurity|.
|
|
// See [MS-NLMP] Section 3.3.1.
|
|
//
|
|
// |server_challenge| must contain |kChallengeLen| bytes.
|
|
// |client_challenge| must contain |kChallengeLen| bytes.
|
|
// |ntlm_response| must contain |kResponseLenV1| bytes.
|
|
NET_EXPORT_PRIVATE void GenerateResponsesV1WithSessionSecurity(
|
|
const base::string16& password,
|
|
const uint8_t* server_challenge,
|
|
const uint8_t* client_challenge,
|
|
uint8_t* lm_response,
|
|
uint8_t* ntlm_response);
|
|
|
|
// Generates the NTLMv2 Hash and writes the |kNtlmHashLen| byte result to
|
|
// |v2_hash|.
|
|
// |v2_hash| must contain |kNtlmHashLen| bytes.
|
|
NET_EXPORT_PRIVATE void GenerateNtlmHashV2(const base::string16& domain,
|
|
const base::string16& username,
|
|
const base::string16& password,
|
|
uint8_t* v2_hash);
|
|
|
|
// In this implementation the Proof Input is the first 28 bytes of what
|
|
// [MS-NLMP] section 3.3.2 calls "temp". "temp" is part of the input to
|
|
// generate the NTLMv2 proof. "temp" is composed of a fixed 28 byte prefix
|
|
// (the Proof Input), then the variable length updated target info that is
|
|
// sent in the authenticate message, then followed by 4 zero bytes. See
|
|
// [MS-NLMP] Section 2.2.2.7.
|
|
//
|
|
// |timestamp| contains a 64 bit Windows timestamp defined as the number of
|
|
// 100 nanosecond ticks since midnight Jan 01, 1601 (UTC).
|
|
//
|
|
// The format of the returned |proof_input| is;
|
|
//
|
|
// [0-1] - 0x0101 (Version)
|
|
// [2-7] - 0x000000000000 (Reserved - all zero)
|
|
// [8-15] - |timestamp| (Timestamp)
|
|
// [16-23] - |client_challenge| (Client challenge)
|
|
// [24-27] - 0x00000000 (Reserved - all zero)
|
|
//
|
|
// |client_challenge| must contain |kChallengeLen| bytes.
|
|
NET_EXPORT_PRIVATE Buffer GenerateProofInputV2(uint64_t timestamp,
|
|
const uint8_t* client_challenge);
|
|
|
|
// The NTLMv2 Proof is part of the NTLMv2 Response. See NTProofStr in [MS-NLMP]
|
|
// Section 3.3.2.
|
|
//
|
|
// The NTLMv2 Proof is defined as;
|
|
// v2_proof = HMAC_MD5(
|
|
// v2_hash,
|
|
// CONCAT(server_challenge, v2_input, target_info, 0x00000000))
|
|
//
|
|
// |v2_hash| must contain |kNtlmHashLen| bytes.
|
|
// |server_challenge| must contain |kChallengeLen| bytes.
|
|
// |v2_input| must contain |kProofInputLenV2| bytes.
|
|
// |target_info| contains the target info field that will be sent in the
|
|
// authenticate message.
|
|
// |v2_proof| must contain |kNtlmProofLenV2| bytes.
|
|
NET_EXPORT_PRIVATE void GenerateNtlmProofV2(const uint8_t* v2_hash,
|
|
const uint8_t* server_challenge,
|
|
const Buffer& v2_input,
|
|
const Buffer& target_info,
|
|
uint8_t* v2_proof);
|
|
|
|
// The session base key is used to generate the Message Integrity Check (MIC).
|
|
// See [MS-NLMP] Section 3.3.2.
|
|
//
|
|
// It is defined as;
|
|
// session_key = HMAC_MD5(v2_hash, v2_proof)
|
|
//
|
|
// |v2_hash| must contain |kNtlmHashLen| bytes.
|
|
// |v2_proof| must contain |kNtlmProofLenV2| bytes.
|
|
// |session_key| must contain |kSessionKeyLenV2| bytes.
|
|
NET_EXPORT_PRIVATE void GenerateSessionBaseKeyV2(const uint8_t* v2_hash,
|
|
const uint8_t* v2_proof,
|
|
uint8_t* session_key);
|
|
|
|
// The channel bindings hash is an MD5 hash of a data structure containing
|
|
// a hash of the server's certificate.
|
|
//
|
|
// The |channel_bindings| string is supplied out of band (usually from a web
|
|
// browser) and is a (21+sizeof(hash)) byte ASCII string, where 'hash' is
|
|
// usually a SHA-256 of the servers certificate, but may be another hash
|
|
// algorithm. The format as defined by RFC 5929 Section 4 is shown below;
|
|
//
|
|
// [0-20] - "tls-server-end-point:" (Literal string)
|
|
// [21-(20+sizeof(hash)] - HASH(server_certificate) (Certificate hash)
|
|
//
|
|
// The |channel_bindings| string is then combined into a data structure called
|
|
// gss_channel_bindings_struct (on Windows SEC_CHANNEL_BINDINGS) and MD5 hashed
|
|
// according to the rules in RFC 4121 Section 4.1.1.2. When simplified this
|
|
// results in the input to the hash (aka "ClientChannelBindingsUnhashed")
|
|
// being defined as follows;
|
|
//
|
|
// [0-15] - 16 zero bytes (Collapsed fields)
|
|
// [16-19] - |strlen(channel_bindings)| (Length=0x00000035)
|
|
// [20-72] - |channel_bindings| (Channel bindings)
|
|
//
|
|
// See also RFC 5056 and [MS-NLMP] Section 3.1.5.1.2.
|
|
//
|
|
// The channel bindings hash is then defined as;
|
|
// channel_bindings_hash = MD5(ClientChannelBindingsUnhashed)
|
|
NET_EXPORT_PRIVATE void GenerateChannelBindingHashV2(
|
|
const std::string& channel_bindings,
|
|
uint8_t* channel_bindings_hash);
|
|
|
|
// The Message Integrity Check (MIC) is a hash calculated over all three
|
|
// messages in the NTLM protocol. The MIC field in the authenticate message
|
|
// is set to all zeros when calculating the hash. See [MS-NLMP] Section
|
|
// 3.1.5.1.2.
|
|
//
|
|
// In this implementation NTLMSSP_NEGOTIATE_KEY_EXCH never negotiated and
|
|
// the MIC for this case is defined as below. If NTLMSSP_NEGOTIATE_KEY_EXCH
|
|
// was negotiated, an alternate key is used. See [MS-NLMP] SEction 3.1.5.1.2
|
|
// for additional details.
|
|
//
|
|
// mic = HMAC_MD5(
|
|
// session_base_key,
|
|
// CONCAT(negotiate_msg, challenge_msg, authenticate_msg))
|
|
//
|
|
// |session_key| must contain |kSessionKeyLenV2| bytes.
|
|
// |mic| must contain |kMicLenV2| bytes.
|
|
NET_EXPORT_PRIVATE void GenerateMicV2(const uint8_t* session_key,
|
|
const Buffer& negotiate_msg,
|
|
const Buffer& challenge_msg,
|
|
const Buffer& authenticate_msg,
|
|
uint8_t* mic);
|
|
|
|
// Updates the target info sent by the server, and generates the clients
|
|
// response target info.
|
|
NET_EXPORT_PRIVATE Buffer
|
|
GenerateUpdatedTargetInfo(bool is_mic_enabled,
|
|
bool is_epa_enabled,
|
|
const std::string& channel_bindings,
|
|
const std::string& spn,
|
|
const std::vector<AvPair>& av_pairs,
|
|
uint64_t* server_timestamp);
|
|
|
|
} // namespace ntlm
|
|
} // namespace net
|
|
|
|
#endif // NET_BASE_NTLM_H_
|