| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248 |
- //
- // Mono.Security.Protocol.Ntlm.ChallengeResponse
- // Implements Challenge Response for NTLM v1
- //
- // Author:
- // Sebastien Pouliot <[email protected]>
- // Atsushi Enomoto <[email protected]>
- //
- // (C) 2003 Motus Technologies Inc. (http://www.motus.com)
- // (C) 2004, 2007 Novell (http://www.novell.com)
- //
- // References
- // a. NTLM Authentication Scheme for HTTP, Ronald Tschalär
- // http://www.innovation.ch/java/ntlm.html
- // b. The NTLM Authentication Protocol, Copyright © 2003 Eric Glass
- // http://davenport.sourceforge.net/ntlm.html
- //
- //
- // Permission is hereby granted, free of charge, to any person obtaining
- // a copy of this software and associated documentation files (the
- // "Software"), to deal in the Software without restriction, including
- // without limitation the rights to use, copy, modify, merge, publish,
- // distribute, sublicense, and/or sell copies of the Software, and to
- // permit persons to whom the Software is furnished to do so, subject to
- // the following conditions:
- //
- // The above copyright notice and this permission notice shall be
- // included in all copies or substantial portions of the Software.
- //
- // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
- // EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
- // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
- // NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
- // LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
- // OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
- // WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
- //
- using System;
- using System.Globalization;
- using System.Security.Cryptography;
- using System.Text;
- using Mono.Security.Cryptography;
- namespace Mono.Security.Protocol.Ntlm {
- public class ChallengeResponse : IDisposable {
- static private byte[] magic = { 0x4B, 0x47, 0x53, 0x21, 0x40, 0x23, 0x24, 0x25 };
- // This is the pre-encrypted magic value with a null DES key (0xAAD3B435B51404EE)
- // Ref: http://packetstormsecurity.nl/Crackers/NT/l0phtcrack/l0phtcrack2.5-readme.html
- static private byte[] nullEncMagic = { 0xAA, 0xD3, 0xB4, 0x35, 0xB5, 0x14, 0x04, 0xEE };
- private bool _disposed;
- private byte[] _challenge;
- private byte[] _lmpwd;
- private byte[] _ntpwd;
- // constructors
- public ChallengeResponse ()
- {
- _disposed = false;
- _lmpwd = new byte [21];
- _ntpwd = new byte [21];
- }
-
- public ChallengeResponse (string password, byte[] challenge) : this ()
- {
- Password = password;
- Challenge = challenge;
- }
- ~ChallengeResponse ()
- {
- if (!_disposed)
- Dispose ();
- }
- // properties
- public string Password {
- get { return null; }
- set {
- if (_disposed)
- throw new ObjectDisposedException ("too late");
- // create Lan Manager password
- DES des = DES.Create ();
- des.Mode = CipherMode.ECB;
- ICryptoTransform ct = null;
-
- // Note: In .NET DES cannot accept a weak key
- // this can happen for a null password
- if ((value == null) || (value.Length < 1)) {
- Buffer.BlockCopy (nullEncMagic, 0, _lmpwd, 0, 8);
- }
- else {
- des.Key = PasswordToKey (value, 0);
- ct = des.CreateEncryptor ();
- ct.TransformBlock (magic, 0, 8, _lmpwd, 0);
- }
- // and if a password has less than 8 characters
- if ((value == null) || (value.Length < 8)) {
- Buffer.BlockCopy (nullEncMagic, 0, _lmpwd, 8, 8);
- }
- else {
- des.Key = PasswordToKey (value, 7);
- ct = des.CreateEncryptor ();
- ct.TransformBlock (magic, 0, 8, _lmpwd, 8);
- }
- // create NT password
- MD4 md4 = MD4.Create ();
- byte[] data = ((value == null) ? (new byte [0]) : (Encoding.Unicode.GetBytes (value)));
- byte[] hash = md4.ComputeHash (data);
- Buffer.BlockCopy (hash, 0, _ntpwd, 0, 16);
- // clean up
- Array.Clear (data, 0, data.Length);
- Array.Clear (hash, 0, hash.Length);
- des.Clear ();
- }
- }
- public byte[] Challenge {
- get { return null; }
- set {
- if (value == null)
- throw new ArgumentNullException ("Challenge");
- if (_disposed)
- throw new ObjectDisposedException ("too late");
- // we don't want the caller to modify the value afterward
- _challenge = (byte[]) value.Clone ();
- }
- }
- public byte[] LM {
- get {
- if (_disposed)
- throw new ObjectDisposedException ("too late");
- return GetResponse (_lmpwd);
- }
- }
- public byte[] NT {
- get {
- if (_disposed)
- throw new ObjectDisposedException ("too late");
- return GetResponse (_ntpwd);
- }
- }
- public byte [] LMSessionKey {
- get {
- if (_disposed)
- throw new ObjectDisposedException ("too late");
- byte[] lm = LM;
- byte[] pwd = new byte [14];
- Buffer.BlockCopy (lm, 0, pwd, 0, 8);
- for (int i = 8; i < 14; i++)
- pwd [i] = 0xBD;
- byte[] response = new byte [16];
- DES des = DES.Create ();
- des.Mode = CipherMode.ECB;
- des.Key = PrepareDESKey (pwd, 0);
- ICryptoTransform ct = des.CreateEncryptor ();
- ct.TransformBlock (lm, 0, 8, response, 0);
- des.Key = PrepareDESKey (pwd, 7);
- ct = des.CreateEncryptor ();
- ct.TransformBlock (lm, 0, 8, response, 8);
- return response;
- }
- }
- // IDisposable method
- public void Dispose ()
- {
- Dispose (true);
- GC.SuppressFinalize (this);
- }
- private void Dispose (bool disposing)
- {
- if (!_disposed) {
- // cleanup our stuff
- Array.Clear (_lmpwd, 0, _lmpwd.Length);
- Array.Clear (_ntpwd, 0, _ntpwd.Length);
- if (_challenge != null)
- Array.Clear (_challenge, 0, _challenge.Length);
- _disposed = true;
- }
- }
- // private methods
- private byte[] GetResponse (byte[] pwd)
- {
- byte[] response = new byte [24];
- DES des = DES.Create ();
- des.Mode = CipherMode.ECB;
- des.Key = PrepareDESKey (pwd, 0);
- ICryptoTransform ct = des.CreateEncryptor ();
- ct.TransformBlock (_challenge, 0, 8, response, 0);
- des.Key = PrepareDESKey (pwd, 7);
- ct = des.CreateEncryptor ();
- ct.TransformBlock (_challenge, 0, 8, response, 8);
- des.Key = PrepareDESKey (pwd, 14);
- ct = des.CreateEncryptor ();
- ct.TransformBlock (_challenge, 0, 8, response, 16);
- return response;
- }
- private byte[] PrepareDESKey (byte[] key56bits, int position)
- {
- // convert to 8 bytes
- byte[] key = new byte [8];
- key [0] = key56bits [position];
- key [1] = (byte) ((key56bits [position] << 7) | (key56bits [position + 1] >> 1));
- key [2] = (byte) ((key56bits [position + 1] << 6) | (key56bits [position + 2] >> 2));
- key [3] = (byte) ((key56bits [position + 2] << 5) | (key56bits [position + 3] >> 3));
- key [4] = (byte) ((key56bits [position + 3] << 4) | (key56bits [position + 4] >> 4));
- key [5] = (byte) ((key56bits [position + 4] << 3) | (key56bits [position + 5] >> 5));
- key [6] = (byte) ((key56bits [position + 5] << 2) | (key56bits [position + 6] >> 6));
- key [7] = (byte) (key56bits [position + 6] << 1);
- return key;
- }
- private byte[] PasswordToKey (string password, int position)
- {
- byte[] key7 = new byte [7];
- int len = System.Math.Min (password.Length - position, 7);
- Encoding.ASCII.GetBytes (password.ToUpper (CultureInfo.CurrentCulture), position, len, key7, 0);
- byte[] key8 = PrepareDESKey (key7, 0);
- // cleanup intermediate key material
- Array.Clear (key7, 0, key7.Length);
- return key8;
- }
- }
- }
|