Saturday, July 13, 2013

Dark Age of Camelot : Connection

Today I wanted to understand the protocol for sending credentials to Dark Age of Camelot server.
Here is the schema :

When a client connect on a DAOC server, he will receive the following packet :
 [  0000]  1B 1B 00 08 00 65 00 00  00 11 00 00  
Format
 [  0000]  1B 1B : Version 
 [  0002]  00 08 : Size  
 [  0004]  00 65 : Message Type   
 [  0006]  00 00 : Unknow  
 [  0008]  00 11 : Version Client ?(0x11)   
 [  000A]  00 00 : Unknow_02  
All the further communications will be encrypted using a rc4 key generated by the client :
  v0 = 0;  
  do  
   key[v0++] = rand();  
  while ( v0 < 59 );  
This key is then RSA encrypted and exchanged with the server.
DAOC client (client.dll), use a old version of libtomcrypt, here is an implementation of the code used for generating the buffer used to send the rc4 key to the server.
 unsigned char daoc_pub[] =   
 {  
      0x91, 0x00, 0x00, 0x00, 0x01, 0xC1, 0x00, 0x00, 0x00, 0x02, 0x15, 0xB3,  
      0x4E, 0xAF, 0x3A, 0x93, 0xA3, 0xC7, 0x4A, 0x6A, 0xFD, 0x69, 0x55, 0x45,  
      0x1D, 0x38, 0x6A, 0x8D, 0xA1, 0xDF, 0x70, 0x1F, 0x84, 0x93, 0x23, 0xE7,  
      0x95, 0x7F, 0xFD, 0xC5, 0x78, 0xCD, 0x42, 0x58, 0x71, 0x6B, 0xA4, 0xB5,  
      0x4D, 0xDD, 0xF1, 0xC6, 0xB9, 0xAE, 0xF2, 0x41, 0x65, 0xF7, 0xD9, 0x4D,  
      0x9C, 0xC5, 0xD6, 0xEE, 0x0D, 0x98, 0xFC, 0x23, 0x7E, 0x94, 0x84, 0xE2,  
      0xD1, 0x27, 0x8C, 0x67, 0xFC, 0xB6, 0x2C, 0x5D, 0xD6, 0x60, 0xA6, 0xA9,  
      0xC3, 0xA5, 0x04, 0x11, 0xFF, 0xFE, 0x9B, 0x90, 0x27, 0x69, 0x6A, 0x60,  
      0x1D, 0x89, 0x6F, 0xFD, 0x55, 0x96, 0x4A, 0xEA, 0x97, 0x34, 0x8F, 0x69,  
      0x79, 0xBF, 0x93, 0x26, 0x18, 0xB4, 0x7C, 0x7C, 0xD5, 0xAD, 0x0B, 0xC9,  
      0xC5, 0xB7, 0x8F, 0x06, 0xB4, 0x37, 0x67, 0x94, 0xE0, 0x2A, 0x7E, 0x38,  
      0x2F, 0x28, 0x60, 0x8A, 0xDC, 0x89, 0x7D, 0x08, 0xDD, 0xBE, 0x38, 0x34,  
      0xF5, 0x78, 0xD8, 0x81, 0x58, 0x9C, 0x2B, 0x03, 0x1A, 0xE0, 0xE3, 0xF3,  
      0x19, 0xE3, 0x63, 0x81, 0xE3, 0x7C, 0xE0, 0x5D, 0xBC, 0x8E, 0x9C, 0xDC,  
      0x93, 0x74, 0x24, 0xE0, 0xF4, 0x96, 0x65, 0xFA, 0x90, 0x21, 0x06, 0x03,  
      0xD2, 0x5A, 0xC3, 0x51, 0xBF, 0x5D, 0x03, 0xB2, 0xCD, 0xD3, 0xF1, 0x6E,  
      0xCB, 0xB0, 0x25, 0x71, 0x4B, 0xC6, 0x00, 0x44, 0x7A, 0xE7, 0x03, 0x00,  
      0x00, 0x00, 0x01, 0x00, 0x01  
 };  
 void daoc_rsa_encrypt_key(unsigned char *buf, int inlen, 
                  unsigned char *output, unsigned long *outlen)  
 {  
      rsa_key key;  
      int prng_idx;  
      prng_state statesprng;  
      int res;  
      unsigned char rsa_in[196];  
      unsigned long y, rsa_size;

      if (rsa_import(daoc_pub, sizeof (daoc_pub), &key) != CRYPT_OK)  
      {  
           fprintf(stderr, "[-] rsa_import() failed\n");  
           exit(EXIT_FAILURE);  
      }  
      prng_idx = find_prng("sprng");  
      if (prng_idx == -1)   
      {  
           fprintf(stderr, "[-] find_prng() failed\n");  
           exit(EXIT_FAILURE);  
      }  
      y = 193;  
      res = rsa_pad(buf, inlen, rsa_in, &y, prng_idx, &statesprng);  
      if (res != CRYPT_OK)  
      {  
           fprintf(stderr, "[-] rsa_pad() failed : %d\n", res);  
           exit(EXIT_FAILURE);  
      }  
      rsa_size = *outlen - 2;  
      res = rsa_exptmod(rsa_in, y, output + 2, &rsa_size, PK_PUBLIC, &key);  
      if (res != CRYPT_OK)  
      {  
           fprintf(stderr, "[-] rsa_exptmod() failed : %d\n", res);  
           exit(EXIT_FAILURE);  
      }  
      *output = 0;  
      *(output + 1) = rsa_size;  
      *outlen = rsa_size + 2;  
 }  
The client will send the rc4 key block encrypted with rsa, with the following type of packet :
 [ 0000] 1B 1B : Version   
 [ 0002] 00 C7 : Size   
 [ 0004] 01 54 : Message Type (ROL8(340))  
 [ 0006] 00    : Checksum (NULL because sym key is not yet set)   
 [ 0007] 00    : Sequence number of the paquet
 [ 0008] 00 C1 : Size encrypted RSA key  
 [ 000A] XX XX : RSA encrypted key  
 ...  
Then the client can communicate the credentials of the user using the following paquet :
 [ 0000] 1B 1B : Version   
 [ 0002] 00 1D : Size   
 [ 0004] 01 2C : Message Type (ROL8(300))  
 [ 0006] 21    : Checksum  
 [ 0007] 01    : Sequence number of the paquet  
 [ 0008] 00 06 : Name Size  
 [ 000A] XX XX : Str_Name[Name Size]  
 [ 00XX] 00 02 : Password Size  
 [ 00XX] XX XX : Str_Password[Password Size]  
 [ 00XX] 00 09 : Unknow  
 [ 00XX] 00    : Unknow_02  
This paquet will be encrypted using rc4 algorithm and the key generated, but not on all paquet ! It will start at position 0x0006.

No comments:

Post a Comment