335 lines
12 KiB
Python
335 lines
12 KiB
Python
"""passlib.handlers.nthash - Microsoft Windows -related hashes"""
|
|
#=============================================================================
|
|
# imports
|
|
#=============================================================================
|
|
# core
|
|
from binascii import hexlify
|
|
import logging; log = logging.getLogger(__name__)
|
|
from warnings import warn
|
|
# site
|
|
# pkg
|
|
from passlib.utils import to_unicode, right_pad_string
|
|
from passlib.utils.compat import unicode
|
|
from passlib.crypto.digest import lookup_hash
|
|
md4 = lookup_hash("md4").const
|
|
import passlib.utils.handlers as uh
|
|
# local
|
|
__all__ = [
|
|
"lmhash",
|
|
"nthash",
|
|
"bsd_nthash",
|
|
"msdcc",
|
|
"msdcc2",
|
|
]
|
|
|
|
#=============================================================================
|
|
# lanman hash
|
|
#=============================================================================
|
|
class lmhash(uh.TruncateMixin, uh.HasEncodingContext, uh.StaticHandler):
|
|
"""This class implements the Lan Manager Password hash, and follows the :ref:`password-hash-api`.
|
|
|
|
It has no salt and a single fixed round.
|
|
|
|
The :meth:`~passlib.ifc.PasswordHash.using` method accepts a single
|
|
optional keyword:
|
|
|
|
:param bool truncate_error:
|
|
By default, this will silently truncate passwords larger than 14 bytes.
|
|
Setting ``truncate_error=True`` will cause :meth:`~passlib.ifc.PasswordHash.hash`
|
|
to raise a :exc:`~passlib.exc.PasswordTruncateError` instead.
|
|
|
|
.. versionadded:: 1.7
|
|
|
|
The :meth:`~passlib.ifc.PasswordHash.hash` and :meth:`~passlib.ifc.PasswordHash.verify` methods accept a single
|
|
optional keyword:
|
|
|
|
:type encoding: str
|
|
:param encoding:
|
|
|
|
This specifies what character encoding LMHASH should use when
|
|
calculating digest. It defaults to ``cp437``, the most
|
|
common encoding encountered.
|
|
|
|
Note that while this class outputs digests in lower-case hexadecimal,
|
|
it will accept upper-case as well.
|
|
"""
|
|
#===================================================================
|
|
# class attrs
|
|
#===================================================================
|
|
|
|
#--------------------
|
|
# PasswordHash
|
|
#--------------------
|
|
name = "lmhash"
|
|
setting_kwds = ("truncate_error",)
|
|
|
|
#--------------------
|
|
# GenericHandler
|
|
#--------------------
|
|
checksum_chars = uh.HEX_CHARS
|
|
checksum_size = 32
|
|
|
|
#--------------------
|
|
# TruncateMixin
|
|
#--------------------
|
|
truncate_size = 14
|
|
|
|
#--------------------
|
|
# custom
|
|
#--------------------
|
|
default_encoding = "cp437"
|
|
|
|
#===================================================================
|
|
# methods
|
|
#===================================================================
|
|
@classmethod
|
|
def _norm_hash(cls, hash):
|
|
return hash.lower()
|
|
|
|
def _calc_checksum(self, secret):
|
|
# check for truncation (during .hash() calls only)
|
|
if self.use_defaults:
|
|
self._check_truncate_policy(secret)
|
|
|
|
return hexlify(self.raw(secret, self.encoding)).decode("ascii")
|
|
|
|
# magic constant used by LMHASH
|
|
_magic = b"KGS!@#$%"
|
|
|
|
@classmethod
|
|
def raw(cls, secret, encoding=None):
|
|
"""encode password using LANMAN hash algorithm.
|
|
|
|
:type secret: unicode or utf-8 encoded bytes
|
|
:arg secret: secret to hash
|
|
:type encoding: str
|
|
:arg encoding:
|
|
optional encoding to use for unicode inputs.
|
|
this defaults to ``cp437``, which is the
|
|
common case for most situations.
|
|
|
|
:returns: returns string of raw bytes
|
|
"""
|
|
if not encoding:
|
|
encoding = cls.default_encoding
|
|
# some nice empircal data re: different encodings is at...
|
|
# http://www.openwall.com/lists/john-dev/2011/08/01/2
|
|
# http://www.freerainbowtables.com/phpBB3/viewtopic.php?t=387&p=12163
|
|
from passlib.crypto.des import des_encrypt_block
|
|
MAGIC = cls._magic
|
|
if isinstance(secret, unicode):
|
|
# perform uppercasing while we're still unicode,
|
|
# to give a better shot at getting non-ascii chars right.
|
|
# (though some codepages do NOT upper-case the same as unicode).
|
|
secret = secret.upper().encode(encoding)
|
|
elif isinstance(secret, bytes):
|
|
# FIXME: just trusting ascii upper will work?
|
|
# and if not, how to do codepage specific case conversion?
|
|
# we could decode first using <encoding>,
|
|
# but *that* might not always be right.
|
|
secret = secret.upper()
|
|
else:
|
|
raise TypeError("secret must be unicode or bytes")
|
|
secret = right_pad_string(secret, 14)
|
|
return des_encrypt_block(secret[0:7], MAGIC) + \
|
|
des_encrypt_block(secret[7:14], MAGIC)
|
|
|
|
#===================================================================
|
|
# eoc
|
|
#===================================================================
|
|
|
|
#=============================================================================
|
|
# ntlm hash
|
|
#=============================================================================
|
|
class nthash(uh.StaticHandler):
|
|
"""This class implements the NT Password hash, and follows the :ref:`password-hash-api`.
|
|
|
|
It has no salt and a single fixed round.
|
|
|
|
The :meth:`~passlib.ifc.PasswordHash.hash` and :meth:`~passlib.ifc.PasswordHash.genconfig` methods accept no optional keywords.
|
|
|
|
Note that while this class outputs lower-case hexadecimal digests,
|
|
it will accept upper-case digests as well.
|
|
"""
|
|
#===================================================================
|
|
# class attrs
|
|
#===================================================================
|
|
name = "nthash"
|
|
checksum_chars = uh.HEX_CHARS
|
|
checksum_size = 32
|
|
|
|
#===================================================================
|
|
# methods
|
|
#===================================================================
|
|
@classmethod
|
|
def _norm_hash(cls, hash):
|
|
return hash.lower()
|
|
|
|
def _calc_checksum(self, secret):
|
|
return hexlify(self.raw(secret)).decode("ascii")
|
|
|
|
@classmethod
|
|
def raw(cls, secret):
|
|
"""encode password using MD4-based NTHASH algorithm
|
|
|
|
:arg secret: secret as unicode or utf-8 encoded bytes
|
|
|
|
:returns: returns string of raw bytes
|
|
"""
|
|
secret = to_unicode(secret, "utf-8", param="secret")
|
|
# XXX: found refs that say only first 128 chars are used.
|
|
return md4(secret.encode("utf-16-le")).digest()
|
|
|
|
@classmethod
|
|
def raw_nthash(cls, secret, hex=False):
|
|
warn("nthash.raw_nthash() is deprecated, and will be removed "
|
|
"in Passlib 1.8, please use nthash.raw() instead",
|
|
DeprecationWarning)
|
|
ret = nthash.raw(secret)
|
|
return hexlify(ret).decode("ascii") if hex else ret
|
|
|
|
#===================================================================
|
|
# eoc
|
|
#===================================================================
|
|
|
|
bsd_nthash = uh.PrefixWrapper("bsd_nthash", nthash, prefix="$3$$", ident="$3$$",
|
|
doc="""The class support FreeBSD's representation of NTHASH
|
|
(which is compatible with the :ref:`modular-crypt-format`),
|
|
and follows the :ref:`password-hash-api`.
|
|
|
|
It has no salt and a single fixed round.
|
|
|
|
The :meth:`~passlib.ifc.PasswordHash.hash` and :meth:`~passlib.ifc.PasswordHash.genconfig` methods accept no optional keywords.
|
|
""")
|
|
|
|
##class ntlm_pair(object):
|
|
## "combined lmhash & nthash"
|
|
## name = "ntlm_pair"
|
|
## setting_kwds = ()
|
|
## _hash_regex = re.compile(u"^(?P<lm>[0-9a-f]{32}):(?P<nt>[0-9][a-f]{32})$",
|
|
## re.I)
|
|
##
|
|
## @classmethod
|
|
## def identify(cls, hash):
|
|
## hash = to_unicode(hash, "latin-1", "hash")
|
|
## return len(hash) == 65 and cls._hash_regex.match(hash) is not None
|
|
##
|
|
## @classmethod
|
|
## def hash(cls, secret, config=None):
|
|
## if config is not None and not cls.identify(config):
|
|
## raise uh.exc.InvalidHashError(cls)
|
|
## return lmhash.hash(secret) + ":" + nthash.hash(secret)
|
|
##
|
|
## @classmethod
|
|
## def verify(cls, secret, hash):
|
|
## hash = to_unicode(hash, "ascii", "hash")
|
|
## m = cls._hash_regex.match(hash)
|
|
## if not m:
|
|
## raise uh.exc.InvalidHashError(cls)
|
|
## lm, nt = m.group("lm", "nt")
|
|
## # NOTE: verify against both in case encoding issue
|
|
## # causes one not to match.
|
|
## return lmhash.verify(secret, lm) or nthash.verify(secret, nt)
|
|
|
|
#=============================================================================
|
|
# msdcc v1
|
|
#=============================================================================
|
|
class msdcc(uh.HasUserContext, uh.StaticHandler):
|
|
"""This class implements Microsoft's Domain Cached Credentials password hash,
|
|
and follows the :ref:`password-hash-api`.
|
|
|
|
It has a fixed number of rounds, and uses the associated
|
|
username as the salt.
|
|
|
|
The :meth:`~passlib.ifc.PasswordHash.hash`, :meth:`~passlib.ifc.PasswordHash.genhash`, and :meth:`~passlib.ifc.PasswordHash.verify` methods
|
|
have the following optional keywords:
|
|
|
|
:type user: str
|
|
:param user:
|
|
String containing name of user account this password is associated with.
|
|
This is required to properly calculate the hash.
|
|
|
|
This keyword is case-insensitive, and should contain just the username
|
|
(e.g. ``Administrator``, not ``SOMEDOMAIN\\Administrator``).
|
|
|
|
Note that while this class outputs lower-case hexadecimal digests,
|
|
it will accept upper-case digests as well.
|
|
"""
|
|
name = "msdcc"
|
|
checksum_chars = uh.HEX_CHARS
|
|
checksum_size = 32
|
|
|
|
@classmethod
|
|
def _norm_hash(cls, hash):
|
|
return hash.lower()
|
|
|
|
def _calc_checksum(self, secret):
|
|
return hexlify(self.raw(secret, self.user)).decode("ascii")
|
|
|
|
@classmethod
|
|
def raw(cls, secret, user):
|
|
"""encode password using mscash v1 algorithm
|
|
|
|
:arg secret: secret as unicode or utf-8 encoded bytes
|
|
:arg user: username to use as salt
|
|
|
|
:returns: returns string of raw bytes
|
|
"""
|
|
secret = to_unicode(secret, "utf-8", param="secret").encode("utf-16-le")
|
|
user = to_unicode(user, "utf-8", param="user").lower().encode("utf-16-le")
|
|
return md4(md4(secret).digest() + user).digest()
|
|
|
|
#=============================================================================
|
|
# msdcc2 aka mscash2
|
|
#=============================================================================
|
|
class msdcc2(uh.HasUserContext, uh.StaticHandler):
|
|
"""This class implements version 2 of Microsoft's Domain Cached Credentials
|
|
password hash, and follows the :ref:`password-hash-api`.
|
|
|
|
It has a fixed number of rounds, and uses the associated
|
|
username as the salt.
|
|
|
|
The :meth:`~passlib.ifc.PasswordHash.hash`, :meth:`~passlib.ifc.PasswordHash.genhash`, and :meth:`~passlib.ifc.PasswordHash.verify` methods
|
|
have the following extra keyword:
|
|
|
|
:type user: str
|
|
:param user:
|
|
String containing name of user account this password is associated with.
|
|
This is required to properly calculate the hash.
|
|
|
|
This keyword is case-insensitive, and should contain just the username
|
|
(e.g. ``Administrator``, not ``SOMEDOMAIN\\Administrator``).
|
|
"""
|
|
name = "msdcc2"
|
|
checksum_chars = uh.HEX_CHARS
|
|
checksum_size = 32
|
|
|
|
@classmethod
|
|
def _norm_hash(cls, hash):
|
|
return hash.lower()
|
|
|
|
def _calc_checksum(self, secret):
|
|
return hexlify(self.raw(secret, self.user)).decode("ascii")
|
|
|
|
@classmethod
|
|
def raw(cls, secret, user):
|
|
"""encode password using msdcc v2 algorithm
|
|
|
|
:type secret: unicode or utf-8 bytes
|
|
:arg secret: secret
|
|
|
|
:type user: str
|
|
:arg user: username to use as salt
|
|
|
|
:returns: returns string of raw bytes
|
|
"""
|
|
from passlib.crypto.digest import pbkdf2_hmac
|
|
secret = to_unicode(secret, "utf-8", param="secret").encode("utf-16-le")
|
|
user = to_unicode(user, "utf-8", param="user").lower().encode("utf-16-le")
|
|
tmp = md4(md4(secret).digest() + user).digest()
|
|
return pbkdf2_hmac("sha1", tmp, user, 10240, 16)
|
|
|
|
#=============================================================================
|
|
# eof
|
|
#=============================================================================
|