public static KrbApReq CreateApReq(KrbKdcRep tgsRep, KerberosKey authenticatorKey, ApOptions options) { var ticket = tgsRep.Ticket; KerberosConstants.Now(out DateTimeOffset time, out int usec); var authenticator = new KrbAuthenticator { CName = tgsRep.CName, CTime = time, Cusec = usec, Realm = ticket.Realm, SequenceNumber = KerberosConstants.GetNonce(), Subkey = null, AuthenticatorVersionNumber = 5 }; var apReq = new KrbApReq { Ticket = ticket, ApOptions = options, Authenticator = KrbEncryptedData.Encrypt( authenticator.EncodeApplication(), authenticatorKey, KeyUsage.ApReqAuthenticator ) }; return(apReq); }
public static KrbApReq CreateApReq( KrbKdcRep tgsRep, KerberosKey authenticatorKey, ApOptions options, out KrbAuthenticator authenticator ) { var ticket = tgsRep.Ticket; authenticator = new KrbAuthenticator { CName = tgsRep.CName, Realm = ticket.Realm, SequenceNumber = KerberosConstants.GetNonce(), Subkey = KrbEncryptionKey.Generate(authenticatorKey.EncryptionType), Checksum = KrbChecksum.EncodeDelegationChecksum(new DelegationInfo()) }; KerberosConstants.Now(out authenticator.CTime, out authenticator.CuSec); var apReq = new KrbApReq { Ticket = ticket, ApOptions = options, Authenticator = KrbEncryptedData.Encrypt( authenticator.EncodeApplication(), authenticatorKey, KeyUsage.ApReqAuthenticator ) }; return(apReq); }
private static KrbApReq CreateApReq(KrbKdcRep kdcRep, KrbEncryptionKey tgtSessionKey, KrbChecksum checksum, out KrbEncryptionKey sessionKey) { var tgt = kdcRep.Ticket; var authenticator = new KrbAuthenticator { CName = kdcRep.CName, Realm = kdcRep.CRealm, SequenceNumber = KerberosConstants.GetNonce(), Checksum = checksum }; sessionKey = KrbEncryptionKey.Generate(tgtSessionKey.EType); sessionKey.Usage = KeyUsage.EncTgsRepPartSubSessionKey; authenticator.Subkey = sessionKey; KerberosConstants.Now(out authenticator.CTime, out authenticator.CuSec); var encryptedAuthenticator = KrbEncryptedData.Encrypt( authenticator.EncodeApplication(), tgtSessionKey.AsKey(), KeyUsage.PaTgsReqAuthenticator ); var apReq = new KrbApReq { Ticket = tgt, Authenticator = encryptedAuthenticator }; return(apReq); }
private static KrbApReq CreateApReq(KrbKdcRep kdcRep, KrbEncryptionKey tgtSessionKey) { var tgt = kdcRep.Ticket; KerberosConstants.Now(out DateTimeOffset time, out int usec); var authenticator = new KrbAuthenticator { CName = kdcRep.CName, CTime = time, Cusec = usec, Realm = tgt.Realm, SequenceNumber = KerberosConstants.GetNonce(), Subkey = tgtSessionKey, AuthenticatorVersionNumber = 5 }; var encryptedAuthenticator = KrbEncryptedData.Encrypt( authenticator.EncodeApplication(), tgtSessionKey.AsKey(), KeyUsage.PaTgsReqAuthenticator ); var apReq = new KrbApReq { Ticket = tgt, Authenticator = encryptedAuthenticator }; return(apReq); }
public static KrbTgsReq CreateTgsReq( string spn, KrbEncryptionKey tgtSessionKey, KrbKdcRep kdcRep, KdcOptions options, KrbTicket user2UserTicket = null ) { var tgtApReq = CreateApReq(kdcRep, tgtSessionKey); var pacOptions = new KrbPaPacOptions { Flags = PacOptions.ResourceBasedConstrainedDelegation | PacOptions.Claims | PacOptions.BranchAware }.Encode(); var paData = new List <KrbPaData>() { new KrbPaData { Type = PaDataType.PA_TGS_REQ, Value = tgtApReq.EncodeApplication() }, new KrbPaData { Type = PaDataType.PA_PAC_OPTIONS, Value = pacOptions.AsMemory() } }; var tgt = kdcRep.Ticket; var sname = spn.Split('/', '@'); var tgs = new KrbTgsReq { PaData = paData.ToArray(), Body = new KrbKdcReqBody { EType = KerberosConstants.ETypes.ToArray(), KdcOptions = options, Nonce = KerberosConstants.GetNonce(), Realm = tgt.Realm, SName = new KrbPrincipalName() { Type = PrincipalNameType.NT_SRV_HST, Name = sname }, Till = KerberosConstants.EndOfTime }, }; if (options.HasFlag(KdcOptions.EncTktInSkey) && user2UserTicket != null) { tgs.Body.AdditionalTickets = new[] { user2UserTicket }; } return(tgs); }
public static KrbApReq CreateApReq( KrbKdcRep tgsRep, KerberosKey authenticatorKey, RequestServiceTicket rst, out KrbAuthenticator authenticator ) { if (tgsRep == null) { throw new ArgumentNullException(nameof(tgsRep)); } if (authenticatorKey == null) { throw new ArgumentNullException(nameof(authenticatorKey)); } var ticket = tgsRep.Ticket; authenticator = new KrbAuthenticator { CName = tgsRep.CName, Realm = ticket.Realm, SequenceNumber = KerberosConstants.GetNonce(), Subkey = KrbEncryptionKey.Generate(authenticatorKey.EncryptionType), Checksum = KrbChecksum.EncodeDelegationChecksum(new DelegationInfo(rst)) }; KerberosConstants.Now(out DateTimeOffset ctime, out int usec); authenticator.CTime = ctime; authenticator.CuSec = usec; var apReq = new KrbApReq { Ticket = ticket, ApOptions = rst.ApOptions, Authenticator = KrbEncryptedData.Encrypt( authenticator.EncodeApplication(), authenticatorKey, KeyUsage.ApReqAuthenticator ) }; return(apReq); }
public static KrbTgsReq CreateTgsReq( RequestServiceTicket rst, KrbEncryptionKey tgtSessionKey, KrbKdcRep kdcRep, out KrbEncryptionKey sessionKey ) { var sname = rst.ServicePrincipalName.Split('/', '@'); var tgt = kdcRep.Ticket; var additionalTickets = new List <KrbTicket>(); if (rst.KdcOptions.HasFlag(KdcOptions.EncTktInSkey) && rst.UserToUserTicket != null) { additionalTickets.Add(rst.UserToUserTicket); } if (!string.IsNullOrWhiteSpace(rst.S4uTarget)) { rst.KdcOptions |= KdcOptions.Forwardable; } if (rst.S4uTicket != null) { rst.KdcOptions |= KdcOptions.ConstrainedDelegation; additionalTickets.Add(rst.S4uTicket); } var body = new KrbKdcReqBody { EType = KerberosConstants.ETypes.ToArray(), KdcOptions = rst.KdcOptions, Nonce = KerberosConstants.GetNonce(), Realm = rst.Realm, SName = new KrbPrincipalName() { Type = PrincipalNameType.NT_SRV_INST, Name = sname }, Till = KerberosConstants.EndOfTime, CName = rst.CNameHint }; if (additionalTickets.Count > 0) { body.AdditionalTickets = additionalTickets.ToArray(); } var bodyChecksum = KrbChecksum.Create( body.Encode(), tgtSessionKey.AsKey(), KeyUsage.PaTgsReqChecksum ); var tgtApReq = CreateApReq(kdcRep, tgtSessionKey, bodyChecksum, out sessionKey); var pacOptions = new KrbPaPacOptions { Flags = PacOptions.ResourceBasedConstrainedDelegation | PacOptions.Claims | PacOptions.BranchAware }.Encode(); var paData = new List <KrbPaData>() { new KrbPaData { Type = PaDataType.PA_TGS_REQ, Value = tgtApReq.EncodeApplication() }, new KrbPaData { Type = PaDataType.PA_PAC_OPTIONS, Value = pacOptions } }; if (!string.IsNullOrWhiteSpace(rst.S4uTarget)) { paData.Add(new KrbPaData { Type = PaDataType.PA_FOR_USER, Value = EncodeS4URequest(rst.S4uTarget, tgt.Realm, tgtSessionKey) }); } var tgs = new KrbTgsReq { PaData = paData.ToArray(), Body = body }; return(tgs); }
public static KrbApReq CreateApReq( KrbKdcRep tgsRep, KerberosKey authenticatorKey, RequestServiceTicket rst, out KrbAuthenticator authenticator ) { if (tgsRep == null) { throw new ArgumentNullException(nameof(tgsRep)); } if (authenticatorKey == null) { throw new ArgumentNullException(nameof(authenticatorKey)); } authenticator = new KrbAuthenticator { CName = tgsRep.CName, Realm = tgsRep.CRealm }; if (rst.AuthenticatorChecksum != null) { authenticator.Checksum = rst.AuthenticatorChecksum; } else if (!rst.AuthenticatorChecksumSource.IsEmpty) { authenticator.Checksum = KrbChecksum.Create( rst.AuthenticatorChecksumSource, authenticatorKey, KeyUsage.AuthenticatorChecksum ); } else if (rst.GssContextFlags != GssContextEstablishmentFlag.GSS_C_NONE) { authenticator.Checksum = KrbChecksum.EncodeDelegationChecksum(new DelegationInfo(rst)); } if (rst.IncludeSequenceNumber ?? true) { authenticator.SequenceNumber = GetNonce(); } if (rst.ApOptions.HasFlag(ApOptions.MutualRequired)) { authenticator.Subkey = KrbEncryptionKey.Generate(authenticatorKey.EncryptionType); } Now(out DateTimeOffset ctime, out int usec); authenticator.CTime = ctime; authenticator.CuSec = usec; var apReq = new KrbApReq { Ticket = tgsRep.Ticket, ApOptions = rst.ApOptions, Authenticator = KrbEncryptedData.Encrypt( authenticator.EncodeApplication(), authenticatorKey, KeyUsage.ApReqAuthenticator ) }; return(apReq); }
public static KrbTgsReq CreateTgsReq( RequestServiceTicket rst, KrbEncryptionKey tgtSessionKey, KrbKdcRep kdcRep, out KrbEncryptionKey sessionKey ) { if (kdcRep == null) { throw new ArgumentNullException(nameof(kdcRep)); } if (tgtSessionKey == null) { throw new ArgumentNullException(nameof(tgtSessionKey)); } if (string.IsNullOrWhiteSpace(rst.ServicePrincipalName)) { throw new ArgumentNullException(nameof(rst.ServicePrincipalName)); } var sname = rst.ServicePrincipalName.Split('/', '@'); var tgt = kdcRep.Ticket; var additionalTickets = new List <KrbTicket>(); if (rst.KdcOptions.HasFlag(KdcOptions.EncTktInSkey) && rst.UserToUserTicket != null) { additionalTickets.Add(rst.UserToUserTicket); } if (!string.IsNullOrWhiteSpace(rst.S4uTarget) && rst.S4uTicket != null) { throw new InvalidOperationException(SR.Resource("S4uTargetTicketBothPresent")); } if (!string.IsNullOrWhiteSpace(rst.S4uTarget)) { rst.KdcOptions |= KdcOptions.Forwardable; } if (rst.S4uTicket != null) { rst.KdcOptions |= KdcOptions.ConstrainedDelegation; additionalTickets.Add(rst.S4uTicket); } var config = rst.Configuration ?? Krb5Config.Default(); var body = new KrbKdcReqBody { EType = GetPreferredETypes(config.Defaults.DefaultTgsEncTypes, config.Defaults.AllowWeakCrypto).ToArray(), KdcOptions = rst.KdcOptions, Nonce = GetNonce(), Realm = rst.Realm, SName = new KrbPrincipalName() { Type = PrincipalNameType.NT_SRV_INST, Name = sname }, Till = EndOfTime, CName = rst.CNameHint }; if (additionalTickets.Count > 0) { body.AdditionalTickets = additionalTickets.ToArray(); } var bodyChecksum = KrbChecksum.Create( body.Encode(), tgtSessionKey.AsKey(), KeyUsage.PaTgsReqChecksum ); var tgtApReq = CreateApReq(kdcRep, tgtSessionKey, bodyChecksum, out sessionKey); var pacOptions = new KrbPaPacOptions { Flags = PacOptions.ResourceBasedConstrainedDelegation | PacOptions.Claims | PacOptions.BranchAware }.Encode(); var paData = new List <KrbPaData>() { new KrbPaData { Type = PaDataType.PA_TGS_REQ, Value = tgtApReq.EncodeApplication() }, new KrbPaData { Type = PaDataType.PA_PAC_OPTIONS, Value = pacOptions } }; if (!string.IsNullOrWhiteSpace(rst.S4uTarget)) { if (tgtSessionKey.EType == EncryptionType.RC4_HMAC_NT) { paData.Add(new KrbPaData { Type = PaDataType.PA_FOR_USER, Value = EncodeS4ULegacyRequest(rst.S4uTarget, tgt.Realm, tgtSessionKey) }); } else { paData.Add(new KrbPaData { Type = PaDataType.PA_FOR_X509_USER, Value = EncodeS4URequest(rst.S4uTarget, rst.S4uTargetCertificate, body.Nonce, tgt.Realm, sessionKey) }); } } var tgs = new KrbTgsReq { PaData = paData.ToArray(), Body = body }; return(tgs); }