forked from newsoft/dbx-keygen-linux
-
Notifications
You must be signed in to change notification settings - Fork 1
/
dbx-keygen-linux.py
175 lines (140 loc) · 5.28 KB
/
dbx-keygen-linux.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
#!/usr/bin/env python
import hashlib
import ctypes
import ctypes.util
import os
import hmac
try:
import simplejson
except ImportError:
import json as simplejson
import struct
import base64
# requires pip install pbkdf2
from pbkdf2 import PBKDF2
import binascii
BUILD_KEY = "dropbox"
CLIENT_KEY_NAME = u'Client'
# --------------------------------------------------
# Taken from common_util/keystore/keystore_posix.py
#
# NOTE: original version is based on ncrypt
# http://pypi.python.org/pypi/ncrypt/
#CIPHER_TYPE = CipherType('AES-128', 'CBC')
from Crypto.Cipher import AES
class KeyStoreFileBacked(object):
def __init__(self, appdata_path):
self._appdata_path = appdata_path
self._s = self.id2s(self.unique_id(self._appdata_path))
self._i = 'l\x078\x014$sX\x03\xffri3\x13aQ'
self._h = '\x8f\xf4\xf2\xbb\xad\xe9G\xea\x1f\xdfim\x80[5>'
self._f = os.path.join(self._appdata_path, u'hostkeys')
self._dict = None
# simplified version
def id2s(self, _id):
return hashlib.md5('ia9%sX' % _id + 'a|ui20').digest()
def obfuscate(self, data):
encryptor = AES.new(key=self._s, mode=AES.MODE_CBC, IV=self._i)
return encryptor.encrypt(data)
def _unobfuscate_low(self, data, key):
decryptor = AES.new(key, mode=AES.MODE_CBC, IV=self._i)
return decryptor.decrypt(data)
def unobfuscate(self, data):
return (self._unobfuscate_low(data, self._s), False)
def unversionify_payload(self, data, hmac_keys):
version = ord(data[0])
if version not in hmac_keys:
raise Exception('Parsing error, bad version')
hm = hmac.new(hmac_keys[version])
ds = hm.digest_size
if len(data) <= ds:
raise Exception('Bad digest size')
stored_hm = data[-ds:]
payload = data[:-ds]
hm.update(payload)
if hm.digest() != stored_hm:
raise Exception('Bad digest')
return (version, payload[1:])
def _load_dict(self):
if self._dict is not None:
return
data = open(self._f).read()
# Overly simplified version
version, raw_payload = self.unversionify_payload(data, {0: self._h})
payload, needs_migrate = self.unobfuscate(raw_payload)
# Manually remove AES-CBC padding ...
pad = -(ord(payload[-1]))
payload = payload[:pad]
self._dict = simplejson.loads(payload)
return
def get_key(self, name):
self._load_dict()
return base64.decodestring(self._dict[name])
def get_versioned_key(self, name, hmac_keys):
data = self.get_key(name)
if not data:
raise Exception('No Data')
return self.unversionify_payload(data, hmac_keys)
# --------------------------------------------------
# Taken from common_util/keystore/keystore_linux.py
class S(ctypes.Structure):
_fields_ = [('r1', ctypes.c_ulong),
('r2', ctypes.c_ulong),
('b1', ctypes.c_ulong),
('b2', ctypes.c_ulong),
('b3', ctypes.c_ulong),
('f1', ctypes.c_ulong),
('f2', ctypes.c_ulong),
('f3', ctypes.c_ulong),
('s1', ctypes.c_ulong),
('s2', ctypes.c_int * 128)]
r1 = ctypes.cdll.LoadLibrary(ctypes.util.find_library('c'))
s = r1.statvfs
s.restype = ctypes.c_int
s.argtypes = [ctypes.c_char_p, ctypes.POINTER(S)]
class KeyStore(KeyStoreFileBacked):
def unique_id(self, path):
inode = os.stat(path).st_ino
v = S()
ret = s(path, ctypes.byref(v))
if ret < 0:
raise Exception('statvfs failed with retval %s' % (ret,))
# NOTE: original version displays dropbox_hash() instead
print 'KEYSTORE: unique_id = %r %s %s ' % ( path, '%d' % inode, '%d' % v.s1)
return '%d_%d' % (inode, v.s1)
# ---------------------------------------------
# ...
class Version0(object):
USER_HMAC_KEY = '\xd1\x14\xa5R\x12e_t\xbdw.7\xe6J\xee\x9b'
APP_KEY = '\rc\x8c\t.\x8b\x82\xfcE(\x83\xf9_5[\x8e'
APP_IV = '\xd8\x9bC\x1f\xb6\x1d\xde\x1a\xfd\xa4\xb7\xf9\xf4\xb8\r\x05'
APP_ITER = 1066
USER_KEYLEN = 16
DB_KEYLEN = 16
def new_user_key_and_hmac(self, ks):
return (ks.get_random_bytes(self.USER_KEYLEN), self.USER_HMAC_KEY)
def get_database_key(self, user_key):
return PBKDF2(passphrase=user_key, salt=self.APP_KEY, iterations=self.APP_ITER).read(self.DB_KEYLEN)
# ---------------------------------------------
# ...
class DBKeyStore(object):
def __init__(self, appdata_path):
self.parsers = {0: Version0()}
self.hmac_keys = dict(((v, self.parsers[v].USER_HMAC_KEY) for v in self.parsers))
self.ks = KeyStore(appdata_path)
# simplified version
# ...
return
def get_user_key(self):
version, user_key = self.ks.get_versioned_key(CLIENT_KEY_NAME, self.hmac_keys)
# Original displays dropbox_hash() instead
print 'KEYSTORE: got user key (%d, %s)' % (version, binascii.hexlify(user_key))
return (version, user_key)
# ---------------------------------------------
appdata_path = os.path.expanduser(u'~/.%s' % BUILD_KEY.lower())
dbks = DBKeyStore(appdata_path)
user_key = dbks.get_user_key()
print "User key: ", binascii.hexlify( user_key[1] )
v0 = Version0()
db_key = v0.get_database_key(user_key[1])
print "Database key: ", binascii.hexlify( db_key )