CHG: the mifare Auth command can make use of a random nonce aswell.

CHG: since sim commands are timing critical, I'm testing a smaller prand prng function from Intel
This commit is contained in:
iceman1001 2017-01-29 10:41:48 +01:00
commit e99acd00cc
5 changed files with 81 additions and 64 deletions

View file

@ -850,6 +850,8 @@ bool prepare_allocated_tag_modulation(tag_response_info_t* response_info) {
void SimulateIso14443aTag(int tagType, int flags, byte_t* data) { void SimulateIso14443aTag(int tagType, int flags, byte_t* data) {
#define ATTACK_KEY_COUNT 8 // keep same as define in cmdhfmf.c -> readerAttack() #define ATTACK_KEY_COUNT 8 // keep same as define in cmdhfmf.c -> readerAttack()
// init pseudorand
fast_prand();
uint8_t sak = 0; uint8_t sak = 0;
uint32_t cuid = 0; uint32_t cuid = 0;
@ -869,7 +871,7 @@ void SimulateIso14443aTag(int tagType, int flags, byte_t* data) {
uint8_t cardAUTHKEY = 0xff; // no authentication uint8_t cardAUTHKEY = 0xff; // no authentication
// allow collecting up to 8 sets of nonces to allow recovery of up to 8 keys // allow collecting up to 8 sets of nonces to allow recovery of up to 8 keys
nonces_t ar_nr_resp[ATTACK_KEY_COUNT*2]; // for 2 separate attack types (nml, moebius) nonces_t ar_nr_resp[ATTACK_KEY_COUNT*2]; // for 2 separate attack types (std, moebius)
memset(ar_nr_resp, 0x00, sizeof(ar_nr_resp)); memset(ar_nr_resp, 0x00, sizeof(ar_nr_resp));
uint8_t ar_nr_collected[ATTACK_KEY_COUNT*2]; // for 2nd attack type (moebius) uint8_t ar_nr_collected[ATTACK_KEY_COUNT*2]; // for 2nd attack type (moebius)
@ -976,8 +978,6 @@ void SimulateIso14443aTag(int tagType, int flags, byte_t* data) {
// Tag NONCE. // Tag NONCE.
uint8_t response5[4]; uint8_t response5[4];
nonce = prand();
num_to_bytes(nonce, 4, response5);
uint8_t response6[] = { 0x04, 0x58, 0x80, 0x02, 0x00, 0x00 }; // dummy ATS (pseudo-ATR), answer to RATS: uint8_t response6[] = { 0x04, 0x58, 0x80, 0x02, 0x00, 0x00 }; // dummy ATS (pseudo-ATR), answer to RATS:
// Format byte = 0x58: FSCI=0x08 (FSC=256), TA(1) and TC(1) present, // Format byte = 0x58: FSCI=0x08 (FSC=256), TA(1) and TC(1) present,
@ -1187,57 +1187,53 @@ void SimulateIso14443aTag(int tagType, int flags, byte_t* data) {
) { ) {
// if first auth for sector, or matches sector and keytype of previous auth // if first auth for sector, or matches sector and keytype of previous auth
if (ar_nr_collected[i+mM] < 2) { if (ar_nr_collected[i+mM] > 1) continue;
// if we haven't already collected 2 nonces for this sector
if (ar_nr_resp[ar_nr_collected[i+mM]].ar != ar) { // if we haven't already collected 2 nonces for this sector
// Avoid duplicates... probably not necessary, ar should vary. if (ar_nr_resp[ar_nr_collected[i+mM]].ar != ar) {
if (ar_nr_collected[i+mM]==0) { // Avoid duplicates... probably not necessary, ar should vary.
// first nonce collect if (ar_nr_collected[i+mM]==0) {
ar_nr_resp[i+mM].cuid = cuid; // first nonce collect
ar_nr_resp[i+mM].sector = cardAUTHSC; nonce1_count++;
ar_nr_resp[i+mM].keytype = cardAUTHKEY; // add this nonce to first moebius nonce
ar_nr_resp[i+mM].nonce = nonce; ar_nr_resp[i+ATTACK_KEY_COUNT].cuid = cuid;
ar_nr_resp[i+mM].nr = nr; ar_nr_resp[i+ATTACK_KEY_COUNT].sector = cardAUTHSC;
ar_nr_resp[i+mM].ar = ar; ar_nr_resp[i+ATTACK_KEY_COUNT].keytype = cardAUTHKEY;
nonce1_count++; ar_nr_resp[i+ATTACK_KEY_COUNT].nonce = nonce;
// add this nonce to first moebius nonce ar_nr_resp[i+ATTACK_KEY_COUNT].nr = nr;
ar_nr_resp[i+ATTACK_KEY_COUNT].cuid = cuid; ar_nr_resp[i+ATTACK_KEY_COUNT].ar = ar;
ar_nr_resp[i+ATTACK_KEY_COUNT].sector = cardAUTHSC; ar_nr_collected[i+ATTACK_KEY_COUNT]++;
ar_nr_resp[i+ATTACK_KEY_COUNT].keytype = cardAUTHKEY; } else {
ar_nr_resp[i+ATTACK_KEY_COUNT].nonce = nonce; // second nonce collect (std and moebius)
ar_nr_resp[i+ATTACK_KEY_COUNT].nr = nr; ar_nr_resp[i+mM].nonce2 = nonce;
ar_nr_resp[i+ATTACK_KEY_COUNT].ar = ar; ar_nr_resp[i+mM].nr2 = nr;
ar_nr_collected[i+ATTACK_KEY_COUNT]++; ar_nr_resp[i+mM].ar2 = ar;
} else { // second nonce collect (std and moebius)
ar_nr_resp[i+mM].nonce2 = nonce; if (!gettingMoebius) {
ar_nr_resp[i+mM].nr2 = nr; nonce2_count++;
ar_nr_resp[i+mM].ar2 = ar; // check if this was the last second nonce we need for std attack
if (!gettingMoebius) { if ( nonce2_count == nonce1_count ) {
nonce2_count++; // done collecting std test switch to moebius
// check if this was the last second nonce we need for std attack // first finish incrementing last sample
if ( nonce2_count == nonce1_count ) { ar_nr_collected[i+mM]++;
// done collecting std test switch to moebius // switch to moebius collection
// first finish incrementing last sample gettingMoebius = true;
ar_nr_collected[i+mM]++; mM = ATTACK_KEY_COUNT;
// switch to moebius collection break;
gettingMoebius = true; }
mM = ATTACK_KEY_COUNT; } else {
break; moebius_n_count++;
} // if we've collected all the nonces we need - finish.
} else { if (nonce1_count == moebius_n_count) {
moebius_n_count++; cmd_send(CMD_ACK,CMD_SIMULATE_MIFARE_CARD,0,0,&ar_nr_resp,sizeof(ar_nr_resp));
// if we've collected all the nonces we need - finish. nonce1_count = 0;
if (nonce1_count == moebius_n_count) { nonce2_count = 0;
cmd_send(CMD_ACK,CMD_SIMULATE_MIFARE_CARD,0,0,&ar_nr_resp,sizeof(ar_nr_resp)); moebius_n_count = 0;
nonce1_count = 0; gettingMoebius = false;
nonce2_count = 0;
moebius_n_count = 0;
gettingMoebius = false;
}
} }
} }
ar_nr_collected[i+mM]++;
} }
ar_nr_collected[i+mM]++;
} }
// we found right spot for this nonce stop looking // we found right spot for this nonce stop looking
break; break;
@ -1372,6 +1368,7 @@ void SimulateIso14443aTag(int tagType, int flags, byte_t* data) {
LED_A_OFF(); LED_A_OFF();
if(flags & FLAG_NR_AR_ATTACK && MF_DBGLEVEL >= 1) { if(flags & FLAG_NR_AR_ATTACK && MF_DBGLEVEL >= 1) {
/*
for ( uint8_t i = 0; i < ATTACK_KEY_COUNT; i++) { for ( uint8_t i = 0; i < ATTACK_KEY_COUNT; i++) {
if (ar_nr_collected[i] == 2) { if (ar_nr_collected[i] == 2) {
Dbprintf("Collected two pairs of AR/NR which can be used to extract %s from reader for sector %d:", (i<ATTACK_KEY_COUNT/2) ? "keyA" : "keyB", ar_nr_resp[i].sector); Dbprintf("Collected two pairs of AR/NR which can be used to extract %s from reader for sector %d:", (i<ATTACK_KEY_COUNT/2) ? "keyA" : "keyB", ar_nr_resp[i].sector);
@ -1385,6 +1382,7 @@ void SimulateIso14443aTag(int tagType, int flags, byte_t* data) {
); );
} }
} }
*/
for ( uint8_t i = ATTACK_KEY_COUNT; i < ATTACK_KEY_COUNT*2; i++) { for ( uint8_t i = ATTACK_KEY_COUNT; i < ATTACK_KEY_COUNT*2; i++) {
if (ar_nr_collected[i] == 2) { if (ar_nr_collected[i] == 2) {
Dbprintf("Collected two pairs of AR/NR which can be used to extract %s from reader for sector %d:", (i<ATTACK_KEY_COUNT/2) ? "keyA" : "keyB", ar_nr_resp[i].sector); Dbprintf("Collected two pairs of AR/NR which can be used to extract %s from reader for sector %d:", (i<ATTACK_KEY_COUNT/2) ? "keyA" : "keyB", ar_nr_resp[i].sector);
@ -1406,6 +1404,8 @@ void SimulateIso14443aTag(int tagType, int flags, byte_t* data) {
Dbprintf("-[ Messages after halt [%d]", happened2); Dbprintf("-[ Messages after halt [%d]", happened2);
Dbprintf("-[ Num of received cmd [%d]", cmdsRecvd); Dbprintf("-[ Num of received cmd [%d]", cmdsRecvd);
} }
cmd_send(CMD_ACK,1,0,0,0,0);
} }
// prepare a delayed transfer. This simply shifts ToSend[] by a number // prepare a delayed transfer. This simply shifts ToSend[] by a number
@ -2450,6 +2450,10 @@ void ReaderMifare(bool first_try, uint8_t block, uint8_t keytype ) {
*@param exitAfterNReads, exit simulation after n blocks have been read, 0 is inifite *@param exitAfterNReads, exit simulation after n blocks have been read, 0 is inifite
*/ */
void Mifare1ksim(uint8_t flags, uint8_t exitAfterNReads, uint8_t arg2, uint8_t *datain) { void Mifare1ksim(uint8_t flags, uint8_t exitAfterNReads, uint8_t arg2, uint8_t *datain) {
// init pseudorand
fast_prand( GetTickCount() );
int cardSTATE = MFEMUL_NOFIELD; int cardSTATE = MFEMUL_NOFIELD;
int _UID_LEN = 0; // 4, 7, 10 int _UID_LEN = 0; // 4, 7, 10
int vHf = 0; // in mV int vHf = 0; // in mV
@ -2747,7 +2751,7 @@ void Mifare1ksim(uint8_t flags, uint8_t exitAfterNReads, uint8_t arg2, uint8_t *
if (doBufResetNext) { if (doBufResetNext) {
// Reset, lets try again! // Reset, lets try again!
Dbprintf("Re-read after previous NR_AR_ATTACK, resetting buffer"); if (MF_DBGLEVEL >= 4) Dbprintf("Re-read after previous NR_AR_ATTACK, resetting buffer");
memset(ar_nr_resp, 0x00, sizeof(ar_nr_resp)); memset(ar_nr_resp, 0x00, sizeof(ar_nr_resp));
memset(ar_nr_collected, 0x00, sizeof(ar_nr_collected)); memset(ar_nr_collected, 0x00, sizeof(ar_nr_collected));
mM = 0; mM = 0;
@ -3116,7 +3120,7 @@ void Mifare1ksim(uint8_t flags, uint8_t exitAfterNReads, uint8_t arg2, uint8_t *
if (MF_DBGLEVEL >= 1) if (MF_DBGLEVEL >= 1)
Dbprintf("Emulator stopped. Tracing: %d trace length: %d ", tracing, BigBuf_get_traceLen()); Dbprintf("Emulator stopped. Tracing: %d trace length: %d ", tracing, BigBuf_get_traceLen());
FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF); cmd_send(CMD_ACK,1,0,0,0,0); FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
LEDsoff(); LEDsoff();
set_tracing(FALSE); set_tracing(FALSE);
} }

View file

@ -121,7 +121,10 @@ int mifare_classic_authex(struct Crypto1State *pcs, uint32_t uid, uint8_t blockN
// "random" reader nonce: // "random" reader nonce:
//byte_t nr[4] = {0x55, 0x41, 0x49, 0x92}; //byte_t nr[4] = {0x55, 0x41, 0x49, 0x92};
byte_t nr[4] = {0x01, 0x01, 0x01, 0x01}; fast_prand();
byte_t nr[4];
num_to_bytes(prand(), 4, nr);
//byte_t nr[4] = {0x01, 0x01, 0x01, 0x01};
uint32_t nt, ntpp; // Supplied tag nonce uint32_t nt, ntpp; // Supplied tag nonce

View file

@ -21,6 +21,7 @@
#include "iso14443a.h" #include "iso14443a.h"
#include "crapto1.h" #include "crapto1.h"
#include "des.h" #include "des.h"
#include "random.h" // fast_prand, prand
// mifare authentication // mifare authentication
#define CRYPT_NONE 0 #define CRYPT_NONE 0

View file

@ -1,6 +1,6 @@
#include "random.h" #include "random.h"
uint64_t next_random = 1; static uint32_t g_nextrandom;
/* Generates a (non-cryptographically secure) 32-bit random number. /* Generates a (non-cryptographically secure) 32-bit random number.
* *
@ -8,14 +8,23 @@
* method of seeding with the time it took to call "autoseed" from first run. * method of seeding with the time it took to call "autoseed" from first run.
* *
* https://github.com/Proxmark/proxmark3/pull/209/commits/f9c1dcd9f6e68a8c07cffed697a9c4c8caed6015 * https://github.com/Proxmark/proxmark3/pull/209/commits/f9c1dcd9f6e68a8c07cffed697a9c4c8caed6015
*
* Iceman, rand needs to be fast.
* https://software.intel.com/en-us/articles/fast-random-number-generator-on-the-intel-pentiumr-4-processor/
*/ */
inline void fast_prand(){
fast_prandEx(GetTickCount());
}
inline void fast_prandEx(uint32_t seed) {
g_nextrandom = seed;
}
uint32_t prand() { uint32_t prand() {
if (next_random == 1) // g_nextrandom *= 6364136223846793005;
next_random = GetTickCount(); // g_nextrandom += 1;
//return (uint32_t)(g_nextrandom >> 32) % 0xffffffff;
next_random *= 6364136223846793005; g_nextrandom = (214013 * g_nextrandom + 2531011);
next_random += 1; return (g_nextrandom>>16) & 0xFFFF;
return (uint32_t)(next_random >> 32) % 0xffffffff;
} }

View file

@ -15,7 +15,7 @@
#include "common.h" #include "common.h"
#include "ticks.h" #include "ticks.h"
void fast_prand();
void fast_prandEx(uint32_t seed);
uint32_t prand(); uint32_t prand();
#endif #endif