コード例 #1
0
ファイル: utils.py プロジェクト: dxlsunshine/ToughRADIUS
    def verifyMsChapV2(self,userpwd):
        ms_chap_response = self['MS-CHAP2-Response'][0]
        authenticator_challenge = self['MS-CHAP-Challenge'][0]
        if len(ms_chap_response)!=50:
            raise Exception("Invalid MSCHAPV2-Response attribute length")
        # if isinstance(userpwd, six.text_type):
        #     userpwd = userpwd.strip().encode('utf-8')
        
        nt_response = ms_chap_response[26:50]
        peer_challenge = ms_chap_response[2:18]
        _user_name = self.get(1)[0]
        nt_resp = mschap.generate_nt_response_mschap2(
            authenticator_challenge,
            peer_challenge,
            _user_name,
            userpwd,
        )

        print 'username',_user_name
        print 'passwd',userpwd
        print 'authenticator_challenge',mschap.convert_to_hex_string(authenticator_challenge),len(
            authenticator_challenge)
        print 'peer_challenge',mschap.convert_to_hex_string(peer_challenge),len(peer_challenge)
        print 'nt_response', mschap.convert_to_hex_string(nt_response),len(nt_response)
        print 'my_nt_resp', mschap.convert_to_hex_string(nt_resp), len(nt_resp)

        if nt_resp == nt_response:
            auth_resp = mschap.generate_authenticator_response(
                userpwd,
                nt_response,
                peer_challenge,
                authenticator_challenge,
                _user_name
            )
            self.ext_attrs['MS-CHAP2-Success'] = auth_resp
            self.ext_attrs['MS-MPPE-Encryption-Policy'] = '\x00\x00\x00\x01'
            self.ext_attrs['MS-MPPE-Encryption-Type'] = '\x00\x00\x00\x06'
            mppeSendKey,mppeRecvKey = mppe.mppe_chap2_gen_keys(userpwd,peer_challenge)
            send_salt, recv_salt = mppe.create_salts()
            send_key = mppe.radius_encrypt_keys(
                mppe.create_plain_text(mppeSendKey),
                self.secret,
                self.authenticator,
                send_salt
            )
            recv_key = mppe.radius_encrypt_keys(
                mppe.create_plain_text(mppeRecvKey),
                self.secret,
                self.authenticator,
                recv_salt
            )
            print 'send_key',mschap.convert_to_hex_string(send_key),len(send_key)
            print 'recv_key',mschap.convert_to_hex_string(recv_key),len(recv_key)
            self.ext_attrs['MS-MPPE-Send-Key'] = send_key
            self.ext_attrs['MS-MPPE-Recv-Key'] = recv_key
            return True
        else:
            self.ext_attrs['Reply-Message'] = "E=691 R=1 C=%s V=3 M=<password error>" % ('\0' * 32)
            return False
コード例 #2
0
ファイル: utils.py プロジェクト: haitao-wang/ToughRADIUS
 def verifyMsChapV1(self,userpwd):
     ms_chap_response = self['MS-CHAP-Response'][0]
     authenticator_challenge = self['MS-CHAP-Challenge'][0]
     if len(ms_chap_response)!=50:
         raise Exception("Invalid MSCHAPV1-Response attribute length")
     
     flag = ms_chap_response[1]
     lm_password = None
     nt_password = None
     if flag == 0:
         lm_password = ms_chap_response[2:26]
     else:
         nt_password = ms_chap_response[26:50]
     
     resp = None
     auth_ok = False
     if nt_password:
         resp = mschap.generate_nt_response_mschap(authenticator_challenge,userpwd)
         auth_ok = (resp == nt_password)
     elif lm_password:
         resp = mschap.generate_lm_response_mschap(authenticator_challenge,userpwd)
         auth_ok = (resp == lm_password)
     if not auth_ok:return False
     
     nt_hash = mschap.nt_password_hash(userpwd)
     lm_hash = mschap.lm_password_hash(userpwd)
     _key = (nt_hash + lm_hash).ljust(32,'0')
     mppekey = mppe.radius_encrypt_keys(_key,self.secret,self.authenticator,mppe.create_salt())
     self.ext_attrs['MS-CHAP-MPPE-Keys'] = mppekey    
     return True
コード例 #3
0
ファイル: utils.py プロジェクト: simudream/ToughRADIUS
    def verifyMsChapV1(self, userpwd):
        ms_chap_response = self['MS-CHAP-Response'][0]
        authenticator_challenge = self['MS-CHAP-Challenge'][0]
        if len(ms_chap_response) != 50:
            raise Exception("Invalid MSCHAPV1-Response attribute length")

        flag = ms_chap_response[1]
        lm_password = None
        nt_password = None
        if flag == 0:
            lm_password = ms_chap_response[2:26]
        else:
            nt_password = ms_chap_response[26:50]

        resp = None
        auth_ok = False
        if nt_password:
            resp = mschap.generate_nt_response_mschap(authenticator_challenge,
                                                      userpwd)
            auth_ok = (resp == nt_password)
        elif lm_password:
            resp = mschap.generate_lm_response_mschap(authenticator_challenge,
                                                      userpwd)
            auth_ok = (resp == lm_password)
        if not auth_ok: return False

        nt_hash = mschap.nt_password_hash(userpwd)
        lm_hash = mschap.lm_password_hash(userpwd)
        _key = (nt_hash + lm_hash).ljust(32, '0')
        mppekey = mppe.radius_encrypt_keys(_key, self.secret,
                                           self.authenticator,
                                           mppe.create_salt())
        self.ext_attrs['MS-CHAP-MPPE-Keys'] = mppekey
        return True