2015-02-24 10:54:00 +01:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
"""
|
|
|
|
Created on Tue Sep 2 19:26:15 2014
|
|
|
|
|
2015-03-13 11:39:31 +01:00
|
|
|
@author: Anton Grigoryev
|
2015-03-12 22:42:24 +01:00
|
|
|
@author: Sammy Pfeiffer
|
2015-02-24 10:54:00 +01:00
|
|
|
"""
|
2015-03-12 22:42:24 +01:00
|
|
|
from binascii import crc32 as originalcrc32
|
2015-03-16 15:59:59 +01:00
|
|
|
import numbers
|
2015-02-25 16:30:03 +01:00
|
|
|
from datetime import datetime
|
2015-03-12 22:42:24 +01:00
|
|
|
from time import time
|
2015-02-26 12:03:41 +01:00
|
|
|
import io
|
2015-03-13 11:39:31 +01:00
|
|
|
import os.path
|
2015-03-11 17:55:55 +01:00
|
|
|
import json
|
|
|
|
import socket
|
|
|
|
import struct
|
2015-02-24 10:54:00 +01:00
|
|
|
|
2015-03-17 00:02:01 +01:00
|
|
|
# pycrypto module
|
|
|
|
from Crypto.Hash import SHA
|
|
|
|
from Crypto.PublicKey import RSA
|
|
|
|
from Crypto.Util.strxor import strxor
|
|
|
|
|
|
|
|
# local modules
|
|
|
|
import crypt
|
|
|
|
import prime
|
|
|
|
import TL
|
|
|
|
|
|
|
|
def crc32(data):
|
|
|
|
return originalcrc32(data) & 0xffffffff
|
|
|
|
|
2015-02-25 16:30:03 +01:00
|
|
|
def vis(bs):
|
2015-03-11 17:55:55 +01:00
|
|
|
"""
|
|
|
|
Function to visualize byte streams. Split into bytes, print to console.
|
|
|
|
:param bs: BYTE STRING
|
|
|
|
"""
|
2015-03-12 22:42:24 +01:00
|
|
|
bs = bytearray(bs)
|
2015-03-11 17:55:55 +01:00
|
|
|
symbols_in_one_line = 8
|
|
|
|
n = len(bs) // symbols_in_one_line
|
2015-02-25 16:30:03 +01:00
|
|
|
for i in range(n):
|
2015-03-12 17:29:56 +01:00
|
|
|
print(str(i*symbols_in_one_line)+" | "+" ".join(["%02X" % b for b in bs[i*symbols_in_one_line:(i+1)*symbols_in_one_line]])) # for every 8 symbols line
|
2015-03-13 11:39:31 +01:00
|
|
|
if not len(bs) % symbols_in_one_line == 0:
|
|
|
|
print(str((i+1)*symbols_in_one_line)+" | "+" ".join(["%02X" % b for b in bs[(i+1)*symbols_in_one_line:]])+"\n") # for last line
|
2015-02-25 16:30:03 +01:00
|
|
|
|
|
|
|
|
2015-03-12 01:17:43 +01:00
|
|
|
|
2015-02-26 12:03:41 +01:00
|
|
|
|
2015-03-16 15:59:59 +01:00
|
|
|
|
2015-02-25 16:30:03 +01:00
|
|
|
class Session:
|
2015-03-12 01:17:43 +01:00
|
|
|
""" Manages TCP Transport. encryption and message frames """
|
2015-03-17 00:02:01 +01:00
|
|
|
def __init__(self, ip, port, auth_key=None):
|
2015-03-11 17:55:55 +01:00
|
|
|
# creating socket
|
2015-02-25 16:30:03 +01:00
|
|
|
self.sock = socket.socket()
|
2015-03-11 17:55:55 +01:00
|
|
|
self.sock.connect((ip, port))
|
2015-02-25 16:30:03 +01:00
|
|
|
self.number = 0
|
|
|
|
|
2015-03-17 00:02:01 +01:00
|
|
|
if auth_key is None:
|
|
|
|
self.create_auth_key()
|
|
|
|
else:
|
|
|
|
self.auth_key = auth_key
|
|
|
|
|
2015-03-11 17:55:55 +01:00
|
|
|
def __del__(self):
|
|
|
|
# closing socket when session object is deleted
|
|
|
|
self.sock.close()
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def header_unencrypted(message):
|
|
|
|
"""
|
|
|
|
Creating header for the unencrypted message:
|
|
|
|
:param message: byte string to send
|
|
|
|
"""
|
|
|
|
# Basic instructions: https://core.telegram.org/mtproto/description#unencrypted-message
|
|
|
|
|
|
|
|
# Message id: https://core.telegram.org/mtproto/description#message-identifier-msg-id
|
2015-03-12 22:42:24 +01:00
|
|
|
# http://stackoverflow.com/questions/8777753/converting-datetime-date-to-utc-timestamp-in-python
|
|
|
|
# to make it work in py2 and py3 (py3 has the timestamp() method but py2 doesnt)
|
|
|
|
curr_timestamp = (datetime.utcfromtimestamp(time()) - datetime(1970, 1, 1)).total_seconds()
|
|
|
|
msg_id = int(curr_timestamp*2**30)*4
|
|
|
|
#msg_id = int(datetime.utcnow().timestamp()*2**30)*4
|
2015-03-11 17:55:55 +01:00
|
|
|
|
|
|
|
return (b'\x00\x00\x00\x00\x00\x00\x00\x00' +
|
|
|
|
struct.pack('<Q', msg_id) +
|
2015-03-17 00:02:01 +01:00
|
|
|
struct.pack('<I', len(message)))
|
2015-02-25 16:30:03 +01:00
|
|
|
|
2015-03-11 17:55:55 +01:00
|
|
|
# TCP Transport
|
|
|
|
|
|
|
|
# Instructions may be found here: https://core.telegram.org/mtproto#tcp-transport
|
|
|
|
# If a payload (packet) needs to be transmitted from server to client or from client to server,
|
|
|
|
# it is encapsulated as follows: 4 length bytes are added at the front (to include the length,
|
|
|
|
# the sequence number, and CRC32; always divisible by 4) and 4 bytes with the packet sequence number
|
|
|
|
# within this TCP connection (the first packet sent is numbered 0, the next one 1, etc.),
|
|
|
|
# and 4 CRC32 bytes at the end (length, sequence number, and payload together).
|
|
|
|
|
2015-02-25 16:30:03 +01:00
|
|
|
def send_message(self, message):
|
2015-03-11 17:55:55 +01:00
|
|
|
"""
|
|
|
|
Forming the message frame and sending message to server
|
|
|
|
:param message: byte string to send
|
|
|
|
"""
|
|
|
|
data = self.header_unencrypted(message) + message
|
2015-03-17 00:02:01 +01:00
|
|
|
step1 = struct.pack('<II', len(data)+12, self.number) + data
|
|
|
|
step2 = step1 + struct.pack('<I', crc32(step1))
|
2015-02-25 16:30:03 +01:00
|
|
|
self.sock.send(step2)
|
2015-03-11 17:55:55 +01:00
|
|
|
self.number += 1
|
2015-03-13 14:58:27 +01:00
|
|
|
# Sending message visualisation to console
|
2015-03-17 00:02:01 +01:00
|
|
|
# print('>>')
|
|
|
|
# vis(step2)
|
2015-02-25 16:30:03 +01:00
|
|
|
|
|
|
|
def recv_message(self):
|
2015-03-11 17:55:55 +01:00
|
|
|
"""
|
2015-03-13 14:58:27 +01:00
|
|
|
Reading socket and receiving message from server. Check the CRC32.
|
2015-03-11 17:55:55 +01:00
|
|
|
"""
|
2015-03-13 14:58:27 +01:00
|
|
|
packet_length_data = self.sock.recv(4) # reads how many bytes to read
|
2015-03-11 18:06:53 +01:00
|
|
|
|
2015-02-25 16:30:03 +01:00
|
|
|
if len(packet_length_data) > 0: # if we have smth. in the socket
|
2015-03-17 00:02:01 +01:00
|
|
|
packet_length = struct.unpack("<I", packet_length_data)[0]
|
2015-03-11 18:06:53 +01:00
|
|
|
packet = self.sock.recv(packet_length - 4) # read the rest of bytes from socket
|
2015-03-17 00:02:01 +01:00
|
|
|
(x, auth_key_id, message_id, message_length)= struct.unpack("<I8s8sI", packet[0:24])
|
2015-02-26 12:03:41 +01:00
|
|
|
data = packet[24:24+message_length]
|
2015-02-25 16:30:03 +01:00
|
|
|
crc = packet[-4:]
|
2015-03-11 17:55:55 +01:00
|
|
|
# Checking the CRC32 correctness of received data
|
2015-03-17 00:02:01 +01:00
|
|
|
if crc32(packet_length_data + packet[0:-4]) == struct.unpack('<I', crc)[0]:
|
2015-02-25 16:30:03 +01:00
|
|
|
return data
|
2015-03-12 22:42:24 +01:00
|
|
|
else:
|
2015-03-13 14:58:27 +01:00
|
|
|
raise Exception("CRC32 was not correct!")
|
2015-03-12 22:42:24 +01:00
|
|
|
else:
|
2015-03-13 14:58:27 +01:00
|
|
|
raise Exception("Nothing in the socket!")
|
2015-03-12 01:17:43 +01:00
|
|
|
|
|
|
|
def method_call(self, method, **kwargs):
|
2015-03-12 17:29:56 +01:00
|
|
|
z=io.BytesIO()
|
2015-03-17 00:02:01 +01:00
|
|
|
TL.serialize_method(z, method, **kwargs)
|
2015-03-12 22:42:24 +01:00
|
|
|
# z.getvalue() on py2.7 returns str, which means bytes
|
|
|
|
# on py3.4 returns bytes
|
|
|
|
# bytearray is closer to the same data type to be shared
|
|
|
|
z_val = bytearray(z.getvalue())
|
|
|
|
# print("z_val: " + z_val.__repr__())
|
|
|
|
# print("z_val type: " + str(type(z_val)))
|
|
|
|
# print("len of z_val: " + str(len(z_val)))
|
|
|
|
self.send_message(z_val)
|
2015-03-12 01:17:43 +01:00
|
|
|
server_answer = self.recv_message()
|
2015-03-17 00:02:01 +01:00
|
|
|
return TL.deserialize(io.BytesIO(server_answer))
|
|
|
|
|
|
|
|
def create_auth_key(self):
|
|
|
|
|
|
|
|
nonce = os.urandom(16)
|
|
|
|
print("Requesting PQ")
|
|
|
|
|
|
|
|
ResPQ = self.method_call('req_pq', nonce=nonce)
|
|
|
|
server_nonce = ResPQ['server_nonce']
|
|
|
|
|
|
|
|
# TODO: selecting RSA public key based on this fingerprint
|
|
|
|
public_key_fingerprint = ResPQ['server_public_key_fingerprints'][0]
|
|
|
|
|
|
|
|
PQ_bytes = ResPQ['pq']
|
|
|
|
|
|
|
|
# TODO: from_bytes here
|
|
|
|
PQ = struct.unpack('>q', PQ_bytes)[0]
|
|
|
|
[p, q] = prime.primefactors(PQ)
|
|
|
|
if p > q: (p, q) = (q, p)
|
|
|
|
assert p*q == PQ and p < q
|
|
|
|
|
|
|
|
print("Factorization %d = %d * %d" % (PQ, p, q))
|
|
|
|
|
|
|
|
# TODO: to_bytes here
|
|
|
|
P_bytes = struct.pack('>i', p)
|
|
|
|
Q_bytes = struct.pack('>i', q)
|
|
|
|
|
|
|
|
f = open(os.path.join(os.path.dirname(__file__), "rsa.pub"))
|
|
|
|
|
|
|
|
key = RSA.importKey(f.read())
|
|
|
|
|
|
|
|
z = io.BytesIO()
|
|
|
|
|
|
|
|
new_nonce = os.urandom(32)
|
|
|
|
|
|
|
|
TL.serialize_obj(z, 'p_q_inner_data',
|
|
|
|
pq=PQ_bytes,
|
|
|
|
p=P_bytes,
|
|
|
|
q=Q_bytes,
|
|
|
|
nonce=nonce,
|
|
|
|
server_nonce=server_nonce,
|
|
|
|
new_nonce=new_nonce)
|
|
|
|
data = z.getvalue()
|
|
|
|
|
|
|
|
sha_digest = SHA.new(data).digest()
|
|
|
|
random_bytes = os.urandom(255-len(data)-len(sha_digest))
|
|
|
|
to_encrypt = sha_digest + data + random_bytes
|
|
|
|
encrypted_data = key.encrypt(to_encrypt, 0)[0]
|
|
|
|
|
|
|
|
print("Starting Diffie Hellman key exchange")
|
|
|
|
server_DH_params = self.method_call('req_DH_params',
|
|
|
|
nonce=nonce, # 16 bytes
|
|
|
|
server_nonce=server_nonce,
|
|
|
|
p=P_bytes,
|
|
|
|
q=Q_bytes,
|
|
|
|
public_key_fingerprint=public_key_fingerprint,
|
|
|
|
encrypted_data=encrypted_data)
|
|
|
|
assert nonce == server_DH_params['nonce']
|
|
|
|
assert server_nonce == server_DH_params['server_nonce']
|
|
|
|
|
|
|
|
encrypted_answer = server_DH_params['encrypted_answer']
|
|
|
|
|
|
|
|
tmp_aes_key = SHA.new(new_nonce + server_nonce).digest() + SHA.new(server_nonce + new_nonce).digest()[0:12]
|
|
|
|
tmp_aes_iv = SHA.new(server_nonce + new_nonce).digest()[12:20] + SHA.new(new_nonce + new_nonce).digest() + new_nonce[0:4]
|
|
|
|
|
|
|
|
crypter = crypt.IGE(tmp_aes_key, tmp_aes_iv)
|
|
|
|
|
|
|
|
answer_with_hash = crypter.decrypt(encrypted_answer)
|
|
|
|
|
|
|
|
answer_hash = answer_with_hash[:20]
|
|
|
|
answer = answer_with_hash[20:]
|
|
|
|
# TODO: SHA hash assertion here
|
|
|
|
|
|
|
|
server_DH_inner_data = TL.deserialize(io.BytesIO(answer))
|
|
|
|
assert nonce == server_DH_inner_data['nonce']
|
|
|
|
assert server_nonce == server_DH_inner_data['server_nonce']
|
|
|
|
dh_prime_str = server_DH_inner_data['dh_prime']
|
|
|
|
g = server_DH_inner_data['g']
|
|
|
|
g_a_str = server_DH_inner_data['g_a']
|
|
|
|
server_time = server_DH_inner_data['server_time']
|
|
|
|
self.timedelta = server_time - time()
|
|
|
|
print("Server-client time delta = %.1f s" % self.timedelta)
|
|
|
|
|
|
|
|
dh_prime = int.from_bytes(dh_prime_str,'big')
|
|
|
|
g_a = int.from_bytes(g_a_str,'big')
|
|
|
|
assert prime.isprime(dh_prime)
|
|
|
|
retry_id = 0
|
|
|
|
while retry_id<25:
|
|
|
|
try:
|
|
|
|
b_str = os.urandom(256)
|
|
|
|
b = int.from_bytes(b_str,'big')
|
|
|
|
g_b = pow(g,b,dh_prime)
|
|
|
|
|
|
|
|
g_b_str = int.to_bytes(g_b, g_b.bit_length() // 8 + 1, 'big')
|
|
|
|
|
|
|
|
z = io.BytesIO()
|
|
|
|
TL.serialize_obj(z, 'client_DH_inner_data',
|
|
|
|
nonce=nonce,
|
|
|
|
server_nonce=server_nonce,
|
|
|
|
retry_id=retry_id,
|
|
|
|
g_b=g_b_str)
|
|
|
|
data = z.getvalue()
|
|
|
|
data_with_sha = SHA.new(data).digest()+data
|
|
|
|
data_with_sha_padded = data_with_sha + os.urandom(-len(data_with_sha) % 16)
|
|
|
|
encrypted_data = crypter.encrypt(data_with_sha_padded)
|
|
|
|
|
|
|
|
Set_client_DH_params_answer = self.method_call('set_client_DH_params',
|
|
|
|
nonce=nonce,
|
|
|
|
server_nonce=server_nonce,
|
|
|
|
encrypted_data=encrypted_data)
|
|
|
|
|
|
|
|
auth_key = pow(g_a, b, dh_prime)
|
|
|
|
auth_key_str = int.to_bytes(auth_key, auth_key.bit_length() // 8 + 1, 'big')
|
|
|
|
auth_key_sha = SHA.new(auth_key_str).digest()
|
|
|
|
auth_key_hash = auth_key_sha[-8:]
|
|
|
|
auth_key_aux_hash = auth_key_sha[:8]
|
|
|
|
|
|
|
|
new_nonce_hash1 = SHA.new(new_nonce+b'\x01'+auth_key_aux_hash).digest()[-16:]
|
|
|
|
new_nonce_hash2 = SHA.new(new_nonce+b'\x02'+auth_key_aux_hash).digest()[-16:]
|
|
|
|
new_nonce_hash3 = SHA.new(new_nonce+b'\x03'+auth_key_aux_hash).digest()[-16:]
|
|
|
|
|
|
|
|
assert Set_client_DH_params_answer['nonce'] == nonce
|
|
|
|
assert Set_client_DH_params_answer['server_nonce'] == server_nonce
|
|
|
|
assert Set_client_DH_params_answer['new_nonce_hash1'] == new_nonce_hash1
|
|
|
|
print("Diffie Hellman key exchange processed successfully")
|
|
|
|
|
|
|
|
self.server_salt = strxor(new_nonce[0:8], server_nonce[0:8])
|
|
|
|
self.auth_key = auth_key_str
|
|
|
|
print("Auth key generated")
|
|
|
|
break
|
|
|
|
except:
|
|
|
|
print("Retry DH key exchange")
|
|
|
|
retry_id += 1
|
|
|
|
|