-
Notifications
You must be signed in to change notification settings - Fork 26
/
Copy pathtask.py
126 lines (117 loc) · 4.22 KB
/
task.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
import random,sys,string
from hashlib import sha256
import SocketServer
from Crypto.Util import Counter
from Crypto.Cipher import AES
import binascii
import os
import numpy as np
import hmac,hashlib
import argon2
from flag import FLAG
secret='******' # REDACTED HERE
assert len(secret)==6
menu = 'Welcome to Sixstars Secret Storage Service\nCommands:\n\tset [key]\tstore a secret with given key\n\tget [key]\tget a secret with given key\n'
class Task(SocketServer.BaseRequestHandler):
def proof_of_work(self):
proof = ''.join([random.choice(string.ascii_letters+string.digits) for _ in xrange(20)])
digest = sha256(proof).hexdigest()
self.request.send("sha256(XXXX+%s) == %s\n" % (proof[4:],digest))
self.request.send('Give me XXXX:')
x = self.request.recv(4)
if len(x) != 4 or sha256(x+proof[4:]).hexdigest() != digest:
return False
return True
def dosend(self, msg):
if self.k!='':
self.r += 1
ctr_e=Counter.new(128, initial_value=self.r)
a=AES.new(key=self.k,mode=AES.MODE_CTR,counter=ctr_e)
pad = 16 - len(msg)%16
plain = msg + chr(pad)*pad
msg = ''
for i in range(len(plain)/16):
msg += a.encrypt(plain[i*16:(i+1)*16])
self.request.sendall(msg)
def dorecv(self):
msg = self.request.recv(1024)
assert len(msg)>0
if self.k!='':
self.r += 1
ctr_e=Counter.new(128, initial_value=self.r)
a=AES.new(key=self.k,mode=AES.MODE_CTR,counter=ctr_e)
cmsg = msg
msg = ''
assert len(cmsg)%16==0
for i in range(len(cmsg)/16):
msg += a.decrypt(cmsg[i*16:(i+1)*16])
msg = msg[:-ord(msg[-1])]
return msg
def handle(self):
if not self.proof_of_work():
return
self.n1 = ''
self.n2 = ''
self.buf = ''
self.mk = ''
self.k = ''
self.r = 0
self.dat = {}
self.dat['flag'] = os.urandom(140) + FLAG
while True:
p=self.dorecv()
if p[0]=='\x00':
if len(p)<17:
self.dosend('\xff'+'\x01')
break
self.n1 = p[1:17]
self.n2 = hashlib.sha512(self.n1).digest()[:16]
self.buf = argon2.argon2_hash(password=secret, salt=self.n1+self.n2, t=100, m=1000, p=10, buflen=128, argon_type=argon2.Argon2Type.Argon2_i)
self.mk = self.buf[:16]
msg = self.n2
mac = hmac.new(self.mk,msg,hashlib.sha512).digest()[:8]
self.dosend('\x00'+msg+mac)
elif p[0]=='\x01':
if len(p)<25:
self.dosend('\xff'+'\x01')
break
self.r = int(binascii.hexlify(p[1:17]),16)
mac = hmac.new(self.mk,p[1:17],hashlib.sha512).digest()[:8]
if mac != p[17:25]:
self.dosend('\xff'+'\x02')
break
msg = '\x01' + p[1:17]
self.dosend(msg)
self.k = self.buf[16:32]
msg = '\x02' + menu
self.dosend(msg)
elif p[0]=='\x02':
if self.k == '':
self.dosend('\xff'+'\x03')
break
k=p[5:]
if p[1:5] == 'set ':
self.dosend('\x02'+'value?')
v = self.dorecv()
assert v[0] == '\x02'
v = v[1:]
self.dat[k] = v
self.dosend('\x02'+'OK')
elif p[1:5] == 'get ':
v = self.dat[k]
self.dosend('\x02'+v)
else:
self.dosend('\x02'+'invalid')
else:
self.dosend('\xff'+'\x05')
break
self.request.close()
class ThreadedServer(SocketServer.ThreadingMixIn, SocketServer.TCPServer):
pass
if __name__ == "__main__":
HOST, PORT = '0.0.0.0', 10002
print HOST
print PORT
server = ThreadedServer((HOST, PORT), Task)
server.allow_reuse_address = True
server.serve_forever()