From 0d47952611198ef6b1163f366dc03922d20b1475 Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Wed, 17 Apr 2024 09:42:04 +0200 Subject: Adding upstream version 7.94+git20230807.3be01efb1+dfsg. Signed-off-by: Daniel Baumann --- scripts/tls-nextprotoneg.nse | 160 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 160 insertions(+) create mode 100644 scripts/tls-nextprotoneg.nse (limited to 'scripts/tls-nextprotoneg.nse') diff --git a/scripts/tls-nextprotoneg.nse b/scripts/tls-nextprotoneg.nse new file mode 100644 index 0000000..33736a7 --- /dev/null +++ b/scripts/tls-nextprotoneg.nse @@ -0,0 +1,160 @@ +local nmap = require "nmap" +local shortport = require "shortport" +local stdnse = require "stdnse" +local string = require "string" +local table = require "table" +local sslcert = require "sslcert" +local tls = require "tls" + +description = [[ +Enumerates a TLS server's supported protocols by using the next protocol +negotiation extension. + +This works by adding the next protocol negotiation extension in the client +hello packet and parsing the returned server hello's NPN extension data. + +For more information, see: +* https://tools.ietf.org/html/draft-agl-tls-nextprotoneg-03 +]] + +--- +-- @usage +-- nmap --script=tls-nextprotoneg +-- +--@output +-- 443/tcp open https +-- | tls-nextprotoneg: +-- | spdy/3 +-- | spdy/2 +-- |_ http/1.1 +-- +-- @xmloutput +-- spdy/4a4 +-- spdy/3.1 +-- spdy/3 +-- http/1.1 + + +author = "Hani Benhabiles" + +license = "Same as Nmap--See https://nmap.org/book/man-legal.html" + +categories = {"discovery", "safe", "default"} +dependencies = {"https-redirect"} + +portrule = function(host, port) + return shortport.ssl(host, port) or sslcert.getPrepareTLSWithoutReconnect(port) +end + + + +--- Function that sends a client hello packet with the TLS NPN extension to the +-- target host and returns the response +--@args host The target host table. +--@args port The target port table. +--@return status true if response, false else. +--@return response if status is true. +local client_hello = function(host, port) + local sock, status, response, err, cli_h + + cli_h = tls.client_hello({ + -- TLSv1.3 does not send this extension plaintext. + -- TODO: implement key exchange crypto to retrieve encrypted extensions + protocol = "TLSv1.2", + ["extensions"] = { + ["next_protocol_negotiation"] = "", + }, + }) + + -- Connect to the target server + local status, err + local sock + local specialized = sslcert.getPrepareTLSWithoutReconnect(port) + if specialized then + status, sock = specialized(host, port) + if not status then + stdnse.debug1("Connection to server failed: %s", sock) + return false + end + else + sock = nmap.new_socket() + status, err = sock:connect(host, port) + if not status then + stdnse.debug1("Connection to server failed: %s", err) + return false + end + end + + sock:set_timeout(5000) + + -- Send Client Hello to the target server + status, err = sock:send(cli_h) + if not status then + stdnse.debug1("Couldn't send: %s", err) + sock:close() + return false + end + + -- Read response + status, response, err = tls.record_buffer(sock) + if not status then + stdnse.debug1("Couldn't receive: %s", err) + sock:close() + return false + end + + return true, response +end + +--- Function that checks for the returned protocols to a npn extension request. +--@args response Response to parse. +--@return results List of found protocols. +local check_npn = function(response) + local i, record = tls.record_read(response, 1) + if record == nil then + stdnse.debug1("Unknown response from server") + return nil + end + + if record.type == "handshake" and record.body[1].type == "server_hello" then + if record.body[1].extensions == nil then + stdnse.debug1("Server does not support TLS NPN extension.") + return nil + end + local results = {} + local npndata = record.body[1].extensions["next_protocol_negotiation"] + if npndata == nil then + stdnse.debug1("Server does not support TLS NPN extension.") + return nil + end + -- Parse data + i = 1 + local protocol + while i <= #npndata do + protocol, i = string.unpack(">s1", npndata, i) + table.insert(results, protocol) + end + + if next(results) then + return results + else + stdnse.debug1("Server supports TLS NPN extension, but no protocols were offered.") + return "" + end + else + stdnse.debug1("Server response was not server_hello") + return nil + end +end + +action = function(host, port) + local status, response + + -- Send crafted client hello + status, response = client_hello(host, port) + if status and response then + -- Analyze response + local results = check_npn(response) + return results + end +end -- cgit v1.2.3