2 * ntlm proxy support for OpenVPN
4 * Copyright (C) 2004 William Preston
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program (see the file COPYING included with this
18 * distribution); if not, write to the Free Software Foundation, Inc.,
19 * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
23 #include "config-win32.h"
45 create_des_keys(const unsigned char *hash
, unsigned char *key
)
48 key
[1] = ((hash
[0]&1)<<7)|(hash
[1]>>1);
49 key
[2] = ((hash
[1]&3)<<6)|(hash
[2]>>2);
50 key
[3] = ((hash
[2]&7)<<5)|(hash
[3]>>3);
51 key
[4] = ((hash
[3]&15)<<4)|(hash
[4]>>4);
52 key
[5] = ((hash
[4]&31)<<3)|(hash
[5]>>5);
53 key
[6] = ((hash
[5]&63)<<2)|(hash
[6]>>6);
54 key
[7] = ((hash
[6]&127)<<1);
55 des_set_odd_parity((des_cblock
*)key
);
59 gen_md4_hash (const char* data
, int data_len
, char *result
)
61 /* result is 16 byte md4 hash */
67 MD4_Update (&c
, data
, data_len
);
68 MD4_Final ((unsigned char *)md
, &c
);
70 memcpy (result
, md
, 16);
74 unicodize (char *dst
, const char *src
)
76 /* not really unicode... */
89 ntlm_phase_1 (const struct http_proxy_info
*p
, struct gc_arena
*gc
)
91 struct buffer out
= alloc_buf_gc (96, gc
);
92 /* try a minimal NTLM handshake
94 * http://davenport.sourceforge.net/ntlm.html
96 * This message contains only the NTLMSSP signature,
97 * the NTLM message type,
98 * and the minimal set of flags (Negotiate NTLM and Negotiate OEM).
101 buf_printf (&out
, "%s", "TlRMTVNTUAABAAAAAgIAAA==");
102 return (BSTR (&out
));
106 ntlm_phase_3 (const struct http_proxy_info
*p
, const char *phase_2
, struct gc_arena
*gc
)
108 char pwbuf
[sizeof (p
->up
.password
) * 2]; /* for unicode password */
109 char buf2
[128]; /* decoded reply from proxy */
113 char challenge
[8], response
[24];
114 int i
, ret_val
, buflen
;
115 des_cblock key1
, key2
, key3
;
116 des_key_schedule sched1
, sched2
, sched3
;
118 /* try a minimal NTLM handshake
120 * http://davenport.sourceforge.net/ntlm.html
123 ASSERT (strlen (p
->up
.username
) > 0);
124 ASSERT (strlen (p
->up
.password
) > 0);
126 /* fill 1st 16 bytes with md4 hash, disregard terminating null */
127 gen_md4_hash (pwbuf
, unicodize (pwbuf
, p
->up
.password
) - 2, md4_hash
);
129 /* pad to 21 bytes */
130 memset (md4_hash
+ 16, 0, 5);
132 ret_val
= base64_decode( phase_2
, (void *)buf2
);
133 /* we can be sure that phase_2 is less than 128
134 * therefore buf2 needs to be (3/4 * 128) */
136 /* extract the challenge from bytes 24-31 */
139 challenge
[i
] = buf2
[i
+24];
142 create_des_keys ((unsigned char *)md4_hash
, key1
);
143 des_set_key_unchecked ((des_cblock
*)key1
, sched1
);
144 des_ecb_encrypt ((des_cblock
*)challenge
, (des_cblock
*)response
, sched1
, DES_ENCRYPT
);
146 create_des_keys ((unsigned char *)&(md4_hash
[7]), key2
);
147 des_set_key_unchecked ((des_cblock
*)key2
, sched2
);
148 des_ecb_encrypt ((des_cblock
*)challenge
, (des_cblock
*)&(response
[8]), sched2
, DES_ENCRYPT
);
150 create_des_keys ((unsigned char *)&(md4_hash
[14]), key3
);
151 des_set_key_unchecked ((des_cblock
*)key3
, sched3
);
152 des_ecb_encrypt ((des_cblock
*)challenge
, (des_cblock
*)&(response
[16]), sched3
, DES_ENCRYPT
);
155 memset (phase3
, 0, sizeof (phase3
));
157 strcpy (phase3
, "NTLMSSP\0");
158 phase3
[8] = 3; /* type 3 */
160 buflen
= 0x58 + strlen (p
->up
.username
);
161 if (buflen
> (int) sizeof (phase3
))
162 buflen
= sizeof (phase3
);
164 phase3
[0x10] = buflen
; /* lm not used */
165 phase3
[0x20] = buflen
; /* default domain (i.e. proxy's domain) */
166 phase3
[0x30] = buflen
; /* no workstation name supplied */
167 phase3
[0x38] = buflen
; /* no session key */
169 phase3
[0x14] = 24; /* ntlm response is 24 bytes long */
170 phase3
[0x16] = phase3
[0x14];
171 phase3
[0x18] = 0x40; /* ntlm offset */
172 memcpy (&(phase3
[0x40]), response
, 24);
175 phase3
[0x24] = strlen (p
->up
.username
); /* username in ascii */
176 phase3
[0x26] = phase3
[0x24];
178 strncpy (&(phase3
[0x58]), p
->up
.username
, sizeof (phase3
) - 0x58);
180 phase3
[0x3c] = 0x02; /* negotiate oem */
181 phase3
[0x3d] = 0x02; /* negotiate ntlm */
183 return ((const char *)make_base64_string2 ((unsigned char *)phase3
, buflen
, gc
));
187 static void dummy(void) {}