#!/bin/env python import requests import md5 def auth(v): ha1 = md5.new(username + ':' + realm + ':' + password).hexdigest() ha2 = md5.new("GET:" + url).hexdigest() #response = md5.new(ha1 + ':' + v['nonce'][1:-1] + ':' + v['nc'] + ':' + v['cnonce'][1:-1] # + ':' + v['qop'][1:-1] + ':' + ha2).hexdigest() nonce = v['nonce'][1:-1] nc=v.get('nc') or '' cnonce = v.get('cnonce') or '' opaque = v.get('opaque') or '' qop = v['qop'][1:-1] algorithm = v['algorithm'] response = md5.new(ha1 + ':' + nonce + ':' + nc + ':' + cnonce + ':' + qop + ':' + ha2).hexdigest() p = requests.Request('GET', host + url).prepare() #p.headers['Authentication-Info'] = response p.headers['Authorization'] = """ Digest username="%s", algorithm="%s", realm="%s", uri="%s", nonce="%s", cnonce="", nc="", qop=%s, response="%s" """ % ( username, algorithm, realm, url, nonce, qop, response ) # opaque="%s", print p.method, p.url, p.headers s = requests.Session() return s.send(p) def preauth(): r = requests.get(host + url) print r r.headers['www-authenticate'].split(', ') return dict([ a.split('=',1) for a in r.headers['www-authenticate'].split(', ') ]) url='/digest/' host = 'http://localhost:801' v = preauth() username="username" password = "password" print v realm = 'so far away' r = auth(v) realm = v['Digest realm'][1:-1] # [Sun Jul 28 21:27:56.549667 2013] [auth_digest:error] [pid 24835:tid 139895297222400] [client 127.0.0.1:57052] AH01788: realm mismatch - got `so far away' but expected `digest private area' algorithm = v['algorithm'] v['algorithm'] = 'super funky chicken' r = auth(v) # [Sun Jul 28 21:41:20 2013] [error] [client 127.0.0.1] Digest: unknown algorithm `super funky chicken' received: /digest/ print r.status_code,r.headers, r.text v['algorithm'] = algorithm r = auth(v) print r.status_code,r.headers, r.text nonce = v['nonce'] v['nonce']=v['nonce'][5:-5] r = auth(v) print r.status_code,r.headers, r.text # [Sun Jul 28 21:05:31.178340 2013] [auth_digest:error] [pid 24224:tid 139895539455744] [client 127.0.0.1:56906] AH01793: invalid qop `auth' received: /digest/qop_none/ v['nonce']=nonce[0:11] + 'ZZZ' + nonce[14:] r = auth(v) print r.status_code,r.headers, r.text #[Sun Jul 28 21:18:11.769228 2013] [auth_digest:error] [pid 24752:tid 139895505884928] [client 127.0.0.1:56964] AH01776: invalid nonce b9YAiJDiBAZZZ1b1abe02d20063ea3b16b544ea1b0d981c1bafe received - hash is not d42d824dee7aaf50c3ba0a7c6290bd453e3dd35b url='/digest_time/' v=preauth() import time time.sleep(1) r = auth(v) print r.status_code,r.headers, r.text # Obtained by putting the following code in modules/aaa/mod_auth_digest.c # in the function initialize_secret # { # const char *hex = "0123456789abcdef"; # char secbuff[SECRET_LEN * 4]; # char *hash = secbuff; # int idx; # for (idx=0; idx> 4]; # *hash++ = hex[secret[idx] & 0xF]; # } # *hash = '\0'; # /* remove comment makings in below for apache-2.4+ */ # ap_log_error(APLOG_MARK, APLOG_NOTICE, 0, s, /* APLOGNO(11759) */ "secret: %s", secbuff); # } import sha import binascii import base64 import struct apachesecret = binascii.unhexlify('497d8894adafa5ec7c8c981ddf9c8457da7a90ac') s = sha.sha(apachesecret) v=preauth() print v['nonce'] realm = v['Digest realm'][1:-1] (t,) = struct.unpack('l',base64.b64decode(v['nonce'][1:13])) # whee, time travel t = t + 5540 timepac = base64.b64encode(struct.pack('l',t)) s.update(realm) s.update(timepac) v['nonce'] = v['nonce'][0] + timepac + s.hexdigest() + v['nonce'][-1] print v r = auth(v) #[Mon Jul 29 02:12:55.539813 2013] [auth_digest:error] [pid 9647:tid 139895522670336] [client 127.0.0.1:58474] AH01777: invalid nonce 59QJppTiBAA=b08983fd166ade9840407df1b0f75b9e6e07d88d received - user attempted time travel print r.status_code,r.headers, r.text url='/digest_onetime/' v=preauth() # Need opaque header handling in auth r = auth(v) print r.status_code,r.headers, r.text r = auth(v) print r.status_code,r.headers, r.text