|
| 1 | +package authenticator |
| 2 | + |
| 3 | +import ( |
| 4 | + "encoding/json" |
| 5 | + "errors" |
| 6 | + "github.com/google/gopacket" |
| 7 | + "github.com/google/gopacket/layers" |
| 8 | + "github.com/willscott/sp3" |
| 9 | + "golang.org/x/net/proxy" |
| 10 | + |
| 11 | + "log" |
| 12 | + "math/rand" |
| 13 | + "net" |
| 14 | + "net/http" |
| 15 | + |
| 16 | + "strings" |
| 17 | +) |
| 18 | + |
| 19 | +type PathReflectionAuth struct { |
| 20 | + Dialer proxy.Dialer |
| 21 | + servers map[string]string |
| 22 | + clientIP net.IP |
| 23 | + conn net.Conn |
| 24 | + done chan<- string |
| 25 | +} |
| 26 | + |
| 27 | +//This should be kept in-sync with server/lib/pathreflection |
| 28 | +type pathReflectionState struct { |
| 29 | + ServerIP net.IP |
| 30 | + ServerPort uint16 |
| 31 | + ClientIP net.IP |
| 32 | + ClientPort uint16 |
| 33 | + SequenceNumber uint32 |
| 34 | + AcknowledgementNumber uint32 |
| 35 | +} |
| 36 | + |
| 37 | +// The default local port range for debian jessie |
| 38 | +const IP_LOCAL_PORT_LOW = 32768 |
| 39 | +const IP_LOCAL_PORT_HIGH = 60999 |
| 40 | + |
| 41 | +func CreatePathReflectionAuthFromURL(sp3Url string, clientIP net.IP) (*PathReflectionAuth, error) { |
| 42 | + resp, err := http.Get(sp3Url) |
| 43 | + if err != nil { |
| 44 | + return nil, err |
| 45 | + } |
| 46 | + defer resp.Body.Close() |
| 47 | + |
| 48 | + servers := map[string]interface{}{} |
| 49 | + err = json.NewDecoder(resp.Body).Decode(&servers) |
| 50 | + if err != nil { |
| 51 | + return nil, err |
| 52 | + } |
| 53 | + typedServers := make(map[string]string) |
| 54 | + for k := range servers { |
| 55 | + typedServers[k] = k |
| 56 | + } |
| 57 | + return CreatePathReflectionAuth(typedServers, clientIP), nil |
| 58 | +} |
| 59 | + |
| 60 | +func CreatePathReflectionAuth(servers map[string]string, clientIP net.IP) *PathReflectionAuth { |
| 61 | + pra := new(PathReflectionAuth) |
| 62 | + pra.clientIP = clientIP |
| 63 | + pra.servers = servers |
| 64 | + return pra |
| 65 | +} |
| 66 | + |
| 67 | +func (p *PathReflectionAuth) Authenticate(done chan<- string) (sp3.AuthenticationMethod, []byte, error) { |
| 68 | + p.done = done |
| 69 | + |
| 70 | + // Choose an allowed host/ip |
| 71 | + var addr string |
| 72 | + var err error |
| 73 | + if len(p.servers) == 0 { |
| 74 | + return sp3.PATHREFLECTION, nil, errors.New("No servers configured for reflection.") |
| 75 | + } else { |
| 76 | + pos := rand.Int() % len(p.servers) |
| 77 | + for k := range p.servers { |
| 78 | + if pos == 0 { |
| 79 | + addr = k |
| 80 | + break |
| 81 | + } |
| 82 | + pos -= 1 |
| 83 | + } |
| 84 | + } |
| 85 | + log.Printf("Connection will be to %s", addr) |
| 86 | + // Connect |
| 87 | + if p.Dialer == nil { |
| 88 | + p.Dialer = &net.Dialer{} |
| 89 | + } |
| 90 | + p.conn, err = p.Dialer.Dial("ip4:tcp", addr) |
| 91 | + if err != nil { |
| 92 | + return sp3.PATHREFLECTION, nil, err |
| 93 | + } |
| 94 | + |
| 95 | + // TCP Handshake |
| 96 | + state := pathReflectionState{ |
| 97 | + p.clientIP, |
| 98 | + uint16(IP_LOCAL_PORT_LOW + rand.Int()%(IP_LOCAL_PORT_HIGH-IP_LOCAL_PORT_LOW)), |
| 99 | + net.ParseIP(addr), |
| 100 | + uint16(80), |
| 101 | + uint32(rand.Int()), |
| 102 | + 0, |
| 103 | + } |
| 104 | + |
| 105 | + iplayer := &layers.IPv4{ |
| 106 | + Version: 4, |
| 107 | + IHL: 5, |
| 108 | + TTL: 64, |
| 109 | + Protocol: 6, |
| 110 | + SrcIP: state.ClientIP, |
| 111 | + DstIP: state.ServerIP, |
| 112 | + } |
| 113 | + |
| 114 | + tcplayer := &layers.TCP{ |
| 115 | + SrcPort: layers.TCPPort(state.ClientPort), |
| 116 | + DstPort: layers.TCPPort(state.ServerPort), |
| 117 | + Window: 4380, |
| 118 | + Seq: state.SequenceNumber, |
| 119 | + SYN: true, |
| 120 | + } |
| 121 | + |
| 122 | + buf := gopacket.NewSerializeBuffer() |
| 123 | + tcplayer.SetNetworkLayerForChecksum(iplayer) |
| 124 | + err = gopacket.SerializeLayers(buf, gopacket.SerializeOptions{ |
| 125 | + ComputeChecksums: true, |
| 126 | + FixLengths: true, |
| 127 | + }, tcplayer) |
| 128 | + if err != nil { |
| 129 | + return sp3.PATHREFLECTION, nil, err |
| 130 | + } |
| 131 | + log.Printf("About to write SYN") |
| 132 | + if _, err = p.conn.Write(buf.Bytes()); err != nil { |
| 133 | + return sp3.PATHREFLECTION, nil, err |
| 134 | + } |
| 135 | + |
| 136 | + // Wait for a syn-ack to learn server's squence number. |
| 137 | + log.Printf("Waiting for SYN-ACK") |
| 138 | + synackbytes := make([]byte, 2048) |
| 139 | + respn, err := p.conn.Read(synackbytes) |
| 140 | + if err != nil { |
| 141 | + return sp3.PATHREFLECTION, nil, err |
| 142 | + } |
| 143 | + rpkt := gopacket.NewPacket(synackbytes[0:respn], layers.LayerTypeTCP, gopacket.Lazy) |
| 144 | + if tcpLayer := rpkt.Layer(layers.LayerTypeTCP); tcpLayer != nil { |
| 145 | + tcp, _ := tcpLayer.(*layers.TCP) |
| 146 | + state.AcknowledgementNumber = tcp.Seq + 1 |
| 147 | + } else { |
| 148 | + return sp3.PATHREFLECTION, nil, errors.New("SYNACK not understood.") |
| 149 | + } |
| 150 | + |
| 151 | + // Set up the listener for server response to injected query. |
| 152 | + go p.listen() |
| 153 | + |
| 154 | + // Leak State |
| 155 | + data, err := json.Marshal(state) |
| 156 | + if err != nil { |
| 157 | + return sp3.PATHREFLECTION, nil, err |
| 158 | + } |
| 159 | + return sp3.PATHREFLECTION, data, nil |
| 160 | +} |
| 161 | + |
| 162 | +func (p *PathReflectionAuth) listen() { |
| 163 | + bufbytes := make([]byte, 2048) |
| 164 | + respn, err := p.conn.Read(bufbytes) |
| 165 | + log.Printf("Path Reflection got an incoming packet.") |
| 166 | + if err != nil { |
| 167 | + log.Printf("Couldn't read path reflection packet: %v", err) |
| 168 | + p.done <- "" |
| 169 | + return |
| 170 | + } |
| 171 | + rpkt := gopacket.NewPacket(bufbytes[0:respn], layers.LayerTypeTCP, gopacket.Default) |
| 172 | + if payload := rpkt.ApplicationLayer(); payload != nil { |
| 173 | + strpayload := string(payload.Payload()) |
| 174 | + idx := strings.Index(strpayload, "sp3.") |
| 175 | + if idx == -1 { |
| 176 | + p.done <- "" |
| 177 | + return |
| 178 | + } |
| 179 | + idx += 4 |
| 180 | + end := strings.IndexFunc(strpayload[idx:], isbase64) |
| 181 | + if end == -1 { |
| 182 | + p.done <- "" |
| 183 | + return |
| 184 | + } |
| 185 | + p.done <- strpayload[idx:idx + end] |
| 186 | + } else { |
| 187 | + err := rpkt.ErrorLayer() |
| 188 | + log.Printf("Couldn't parse packet!", err) |
| 189 | + p.done <- "" |
| 190 | + } |
| 191 | +} |
| 192 | + |
| 193 | +func isbase64(c rune) bool { |
| 194 | + val := (c >= '0' && c <= '9') || (c >= 'A' && c <= 'Z') || (c >= 'a' && c <= 'z') |
| 195 | + return !val |
| 196 | +} |
0 commit comments