Ejemplo n.º 1
0
    def verifyMsChapV2(self, userpwd):
        ms_chap_response = self['MS-CHAP2-Response'][0]
        authenticator_challenge = self['MS-CHAP-Challenge'][0]
        if len(ms_chap_response) != 50:
            raise Exception("Invalid MSCHAPV2-Response attribute length")
        # if isinstance(userpwd, six.text_type):
        #     userpwd = userpwd.strip().encode('utf-8')

        nt_response = ms_chap_response[26:50]
        peer_challenge = ms_chap_response[2:18]
        _user_name = self.get(1)[0]
        nt_resp = mschap.generate_nt_response_mschap2(
            authenticator_challenge,
            peer_challenge,
            _user_name,
            userpwd,
        )
        if nt_resp == nt_response:
            auth_resp = mschap.generate_authenticator_response(
                userpwd, nt_response, peer_challenge, authenticator_challenge,
                _user_name)
            self.ext_attrs['MS-CHAP2-Success'] = auth_resp
            self.ext_attrs['MS-MPPE-Encryption-Policy'] = '\x00\x00\x00\x01'
            self.ext_attrs['MS-MPPE-Encryption-Type'] = '\x00\x00\x00\x06'
            nt_pwd_hash = mschap.nt_password_hash(userpwd)
            mppeSendKey, mppeRecvKey = mppe.mppe_chap2_gen_keys(
                userpwd, peer_challenge)
            self.ext_attrs['MS-MPPE-Send-Key'] = mppeSendKey
            self.ext_attrs['MS-MPPE-Recv-Key'] = mppeRecvKey
            return True
        else:
            return False
Ejemplo n.º 2
0
 def verifyMsChapV2(self,userpwd):
     ms_chap_response = self['MS-CHAP2-Response'][0]
     authenticator_challenge = self['MS-CHAP-Challenge'][0]
     if len(ms_chap_response)!=50:
         raise Exception("Invalid MSCHAPV2-Response attribute length")
     # if isinstance(userpwd, six.text_type):
     #     userpwd = userpwd.strip().encode('utf-8')
     
     nt_response = ms_chap_response[26:50]
     peer_challenge = ms_chap_response[2:18]
     _user_name = self.get(1)[0]
     nt_resp = mschap.generate_nt_response_mschap2(
         authenticator_challenge,
         peer_challenge,
         _user_name,
         userpwd,
     )
     if nt_resp == nt_response:
         auth_resp = mschap.generate_authenticator_response(
             userpwd,
             nt_response,
             peer_challenge,
             authenticator_challenge,
             _user_name
         )
         self.ext_attrs['MS-CHAP2-Success'] = auth_resp
         self.ext_attrs['MS-MPPE-Encryption-Policy'] = '\x00\x00\x00\x01'
         self.ext_attrs['MS-MPPE-Encryption-Type'] = '\x00\x00\x00\x06'
         nt_pwd_hash = mschap.nt_password_hash(userpwd)
         mppeSendKey,mppeRecvKey = mppe.mppe_chap2_gen_keys(userpwd,peer_challenge)
         self.ext_attrs['MS-MPPE-Send-Key'] = mppeSendKey
         self.ext_attrs['MS-MPPE-Recv-Key'] = mppeRecvKey
         return True
     else:
         return False
Ejemplo n.º 3
0
 def verifyMsChapV2(self,userpwd):
     ms_chap_response = self['MS-CHAP2-Response'][0]
     authenticator_challenge = self['MS-CHAP-Challenge'][0]
     if len(ms_chap_response)!=50:
         raise Exception("Invalid MSCHAPV2-Response attribute length")
     # if isinstance(userpwd, six.text_type):
     #     userpwd = userpwd.strip().encode('utf-8')
     
     nt_response = ms_chap_response[26:50]
     peer_challenge = ms_chap_response[2:18]
     _user_name = self.get(1)[0]
     nt_resp = mschap.generate_nt_response_mschap2(
         authenticator_challenge,
         peer_challenge,
         _user_name,
         userpwd,
     )
     if nt_resp == nt_response:
         auth_resp = mschap.generate_authenticator_response(
             userpwd,
             nt_response,
             peer_challenge,
             authenticator_challenge,
             _user_name
         )
         self.ext_attrs['MS-CHAP2-Success'] = auth_resp
         self.ext_attrs['MS-MPPE-Encryption-Policy'] = '\x00\x00\x00\x01'
         self.ext_attrs['MS-MPPE-Encryption-Type'] = '\x00\x00\x00\x06'
         mppeSendKey, mppeRecvKey = mppe.mppe_chap2_gen_keys(userpwd, peer_challenge)
         send_key, recv_key = mppe.gen_radius_encrypt_keys(
             mppeSendKey,
             mppeRecvKey,
             self.secret,
             self.authenticator)
         self.ext_attrs['MS-MPPE-Send-Key'] = send_key
         self.ext_attrs['MS-MPPE-Recv-Key'] = recv_key
         return True
     else:
         self.ext_attrs['Reply-Message'] = "E=691 R=1 C=%s V=3 M=<password error>" % ('\0' * 32)
         return False
Ejemplo n.º 4
0
 def verifyMsChapV2(self,userpwd):
     ms_chap_response = self['MS-CHAP2-Response'][0]
     authenticator_challenge = self['MS-CHAP-Challenge'][0]
     if len(ms_chap_response)!=50:
         raise Exception("Invalid MSCHAPV2-Response attribute length")
     # if isinstance(userpwd, six.text_type):
     #     userpwd = userpwd.strip().encode('utf-8')
     
     nt_response = ms_chap_response[26:50]
     peer_challenge = ms_chap_response[2:18]
     _user_name = self.get(1)[0]
     nt_resp = mschap.generate_nt_response_mschap2(
         authenticator_challenge,
         peer_challenge,
         _user_name,
         userpwd,
     )
     if nt_resp == nt_response:
         auth_resp = mschap.generate_authenticator_response(
             userpwd,
             nt_response,
             peer_challenge,
             authenticator_challenge,
             _user_name
         )
         self.ext_attrs['MS-CHAP2-Success'] = auth_resp
         self.ext_attrs['MS-MPPE-Encryption-Policy'] = '\x00\x00\x00\x01'
         self.ext_attrs['MS-MPPE-Encryption-Type'] = '\x00\x00\x00\x06'
         mppeSendKey, mppeRecvKey = mppe.mppe_chap2_gen_keys(userpwd, peer_challenge)
         send_key, recv_key = mppe.gen_radius_encrypt_keys(
             mppeSendKey,
             mppeRecvKey,
             self.secret,
             self.authenticator)
         self.ext_attrs['MS-MPPE-Send-Key'] = send_key
         self.ext_attrs['MS-MPPE-Recv-Key'] = recv_key
         return True
     else:
         self.ext_attrs['Reply-Message'] = "E=691 R=1 C=%s V=3 M=<password error>" % ('\0' * 32)
         return False