Class: PSRP::HTTP::Negotiate
- Inherits:
-
Object
- Object
- PSRP::HTTP::Negotiate
- Defined in:
- lib/transport.rb
Overview
straight copy from WinRM NTLM/Negotiate, secure, HTTP transport
Constant Summary collapse
- DEFAULT_RECEIVE_TIMEOUT =
3600
Instance Method Summary collapse
-
#initialize(endpoint, user, pass, opts) ⇒ Negotiate
constructor
A new instance of Negotiate.
-
#no_ssl_peer_verification! ⇒ Object
Disable SSL Peer Verification.
- #receive_timeout ⇒ Object
-
#receive_timeout=(sec) ⇒ Object
HTTP Client receive timeout.
- #send_request(message, auth_header = nil) ⇒ Object
-
#ssl_peer_fingerprint_verification! ⇒ Object
SSL Peer Fingerprint Verification prior to connecting.
-
#verify_ssl_fingerprint(cert) ⇒ Object
compare @ssl_peer_fingerprint to current ssl context.
-
#with_untrusted_ssl_connection ⇒ Object
Connect without verification to retrieve untrusted ssl context.
Constructor Details
#initialize(endpoint, user, pass, opts) ⇒ Negotiate
Returns a new instance of Negotiate.
32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 |
# File 'lib/transport.rb', line 32 def initialize(endpoint, user, pass, opts) @endpoint = endpoint.is_a?(String) ? URI.parse(endpoint) : endpoint @httpcli = HTTPClient.new(agent_name: 'Ruby PSRP Client') @httpcli.receive_timeout = DEFAULT_RECEIVE_TIMEOUT @logger = Logging.logger[self] require 'rubyntlm' #p "USING HTTP NEGOTIATE" # Deleting SSPI authentication auths = @httpcli.www_auth.instance_variable_get('@authenticator') auths.delete_if { |i| i.is_a? HTTPClient::SSPINegotiateAuth } user_parts = user.split('\\') if(user_parts.length > 1) opts[:domain] = user_parts[0] user = user_parts[1] end @ntlmcli = Net::NTLM::Client.new(user, pass, opts) @retryable = true no_ssl_peer_verification! if opts[:no_ssl_peer_verification] @ssl_peer_fingerprint = opts[:ssl_peer_fingerprint] @httpcli.ssl_config.set_trust_ca(opts[:ca_trust_path]) if opts[:ca_trust_path] end |
Instance Method Details
#no_ssl_peer_verification! ⇒ Object
Disable SSL Peer Verification
59 60 61 |
# File 'lib/transport.rb', line 59 def no_ssl_peer_verification! @httpcli.ssl_config.verify_mode = OpenSSL::SSL::VERIFY_NONE end |
#receive_timeout ⇒ Object
104 105 106 |
# File 'lib/transport.rb', line 104 def receive_timeout @httpcli.receive_timeout end |
#receive_timeout=(sec) ⇒ Object
HTTP Client receive timeout. How long should a remote call wait for a for a response from WinRM?
100 101 102 |
# File 'lib/transport.rb', line 100 def receive_timeout=(sec) @httpcli.receive_timeout = sec end |
#send_request(message, auth_header = nil) ⇒ Object
109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 |
# File 'lib/transport.rb', line 109 def send_request(, auth_header = nil) ssl_peer_fingerprint_verification! auth_header = init_auth if @ntlmcli.session.nil? original_length = .length = @ntlmcli.session. signature = @ntlmcli.session. seal = "\x10\x00\x00\x00#{signature}#{}" hdr = { "Content-Type" => "multipart/encrypted;protocol=\"application/HTTP-SPNEGO-session-encrypted\";boundary=\"Encrypted Boundary\"" } hdr.merge!(auth_header) if auth_header # p hdr body = [ "--Encrypted Boundary", "Content-Type: application/HTTP-SPNEGO-session-encrypted", "OriginalContent: type=application/soap+xml;charset=UTF-8;Length=#{original_length}", "--Encrypted Boundary", "Content-Type: application/octet-stream", "#{seal}--Encrypted Boundary--", "" ].join("\r\n") @logger.debug("\nOut-Message\n\n") doc = REXML::Document.new out = "" doc.write(out, 2) @logger.debug(out) @logger.debug("\n\n") resp = @httpcli.post(@endpoint, body, hdr) verify_ssl_fingerprint(resp.peer_cert) if resp.status == 401 && @retryable @retryable = false send_request(, init_auth) else @retryable = true decrypted_body = resp.body.empty? ? '' : decrypt(resp.body) handler = PSRP::ResponseHandler.new(decrypted_body, resp.status) data = handler.parse_to_xml() @logger.debug("Response data\n\n") doc = REXML::Document.new decrypted_body out = "" doc.write(out, 2) @logger.debug(out) data end end |
#ssl_peer_fingerprint_verification! ⇒ Object
SSL Peer Fingerprint Verification prior to connecting
64 65 66 67 68 69 70 71 72 73 74 |
# File 'lib/transport.rb', line 64 def ssl_peer_fingerprint_verification! return unless @ssl_peer_fingerprint && ! @ssl_peer_fingerprint_verified with_untrusted_ssl_connection do |connection| connection_cert = connection.peer_cert_chain.last verify_ssl_fingerprint(connection_cert) end @logger.info("initial ssl fingerprint #{@ssl_peer_fingerprint} verified\n") @ssl_peer_fingerprint_verified = true no_ssl_peer_verification! end |
#verify_ssl_fingerprint(cert) ⇒ Object
compare @ssl_peer_fingerprint to current ssl context
91 92 93 94 95 96 |
# File 'lib/transport.rb', line 91 def verify_ssl_fingerprint(cert) return unless @ssl_peer_fingerprint conn_fingerprint = OpenSSL::Digest::SHA1.new(cert.to_der).to_s return unless @ssl_peer_fingerprint.casecmp(conn_fingerprint) != 0 fail "ssl fingerprint mismatch!!!!\n" end |
#with_untrusted_ssl_connection ⇒ Object
Connect without verification to retrieve untrusted ssl context
77 78 79 80 81 82 83 84 85 86 87 88 |
# File 'lib/transport.rb', line 77 def with_untrusted_ssl_connection noverify_peer_context = OpenSSL::SSL::SSLContext.new noverify_peer_context.verify_mode = OpenSSL::SSL::VERIFY_NONE tcp_connection = TCPSocket.new(@endpoint.host, @endpoint.port) begin ssl_connection = OpenSSL::SSL::SSLSocket.new(tcp_connection, noverify_peer_context) ssl_connection.connect yield ssl_connection ensure tcp_connection.close end end |