#include #include #include #include #include #include #include #include #include #include #include #include #include "endian.h" #include "onion_base32.h" #include "key_update.h" #include "colour.h" #define VERSION "0.5" #define EXPONENT_SIZE_BYTES 4 #define EXPONENT_MIN 0x1FFFFFFF #define EXPONENT_MAX 0xFFFFFFFF #define RSA_KEY_BITS 1024 static char *search; static char search_pad[16]; static unsigned char search_raw[10]; static size_t search_len; static int raw_len; static char bitmask; static volatile char working; /* "Bare" eprintf that does not change colour, apply prefix, etc. * Only directs information to the appropriate stream */ #define eprintf_bare(format, ...) \ fprintf(stderr, \ format, \ ##__VA_ARGS__) /* "Real" eprintf, error printf. Outputs a message to stderr, prefixed and * coloured all fancy */ #define eprintf(format, ...) \ iprintf_bare(COLOUR_BOLD_OFF COLOUR_RED "ERROR: " \ COLOUR_BWHITE format, ##__VA_ARGS__); /* "Bare" iprintf that does not change colour, apply prefix, etc. * Only directs information to the appropriate stream */ #define iprintf_bare(format, ...) \ fprintf(stderr, \ format, \ ##__VA_ARGS__) /* "Real" iprintf, information printf. Outputs a message to stderr, prefixed * and coloured all fancy */ #define iprintf(format, ...) \ iprintf_bare(COLOUR_BOLD_OFF COLOUR_CYAN "INFO: " \ COLOUR_BWHITE format, ##__VA_ARGS__); void* work(void *arg) { char onion[17]; unsigned char sha[20]; unsigned long e = EXPONENT_MIN; unsigned int e_big_endian = 0; unsigned char *der_data = NULL; unsigned char *tmp_data = NULL; ssize_t der_length = 0; unsigned long volatile *kilo_hashes = arg; unsigned long hashes = 0; BIGNUM *bignum_e = NULL; RSA *rsa_key = NULL; SHA_CTX sha_c; SHA_CTX working_sha_c; rsa_key = RSA_new(); if (!rsa_key) { eprintf("Failed to allocate RSA key\n"); goto STOP; } bignum_e = BN_new(); if (!bignum_e) { eprintf("Failed to allocate bignum for exponent\n"); goto STOP; } while(working) { e = EXPONENT_MIN; BN_set_word(bignum_e, e); if (!RSA_generate_key_ex(rsa_key, RSA_KEY_BITS, bignum_e, NULL)) { eprintf("Failed to generate RSA key\n"); goto STOP; } der_length = i2d_RSAPublicKey(rsa_key, NULL); if (der_length <= 0) { eprintf("i2d failed\n"); goto STOP; } der_data = malloc(der_length); if (!der_data) { eprintf("DER data malloc failed\n"); goto STOP; } tmp_data = der_data; if (i2d_RSAPublicKey(rsa_key, &tmp_data) != der_length) { eprintf("DER formatting failed\n"); goto STOP; } /* core loop adapted from eschalot */ SHA1_Init(&sha_c); SHA1_Update(&sha_c, der_data, der_length - EXPONENT_SIZE_BYTES); free(der_data); while (e < EXPONENT_MAX) { memcpy(&working_sha_c, &sha_c, sizeof(SHA_CTX)); e_big_endian = sl_htobe32(e); SHA1_Update(&working_sha_c, &e_big_endian, EXPONENT_SIZE_BYTES); SHA1_Final((unsigned char*)&sha, &working_sha_c); if (hashes++ >= 1000) { hashes = 0; (*kilo_hashes)++; /* check if we should still be working too */ if (!working) goto STOP; } if (memcmp(sha, search_raw, raw_len) == 0) { /* check the remaining partial byte */ switch (search_len) { case 8: case 16: /* nothing to do; already a raw byte boundary */ break; default: if ((search_raw[raw_len] & bitmask) != (sha[raw_len] & bitmask)) { e += 2; continue; } break; } /* sanity check */ onion_base32(onion, sha); onion[16] = '\0'; if (strncmp(onion, search, search_len)) { eprintf( "BUG: Discrepancy between raw and base32 onion addresses\n" "Looking for %s, but the sum is %s\n" "Please report this to the developer\n", search, onion); continue; } iprintf_bare("\n"); iprintf("Found %s.onion\n", onion); #if OPENSSL_VERSION_NUMBER >= 0x10100000L if (BN_set_word(bignum_e, e) != 1) { eprintf("BN_set_word failed\n"); goto STOP; } RSA_set0_key(rsa_key, NULL, bignum_e, NULL); /* allocate what was freed by above function call */ bignum_e = BN_new(); #else /* much tidier to be honest */ BN_set_word(rsa_key->e, e); #endif if (key_update_d(rsa_key)) { eprintf("Error updating d component of RSA key, stop.\n"); goto STOP; } if (RSA_check_key(rsa_key) == 1) { iprintf("Key valid\n"); EVP_PKEY *evp_key = EVP_PKEY_new(); if (!EVP_PKEY_assign_RSA(evp_key, rsa_key)) { eprintf("EVP_PKEY assignment failed\n"); goto STOP; } PEM_write_PrivateKey(stdout, evp_key, NULL, NULL, 0, NULL, NULL); EVP_PKEY_free(evp_key); goto STOP; } else { eprintf("Key invalid:"); ERR_print_errors_fp(stderr); } } /* select next odd exponent */ e += 2; } } STOP: BN_free(bignum_e); working = 0; return NULL; } int set_raw_params(void) { /* bitmasks to be used to compare remainder bits */ static unsigned char bitmasks[] = { [1] = 0xF8, /* 5 MSB */ [2] = 0xC0, /* 2 MSB */ [3] = 0xFE, /* 7 MSB */ [4] = 0xF0, /* 4 MSB */ [5] = 0x80, /* 1 MSB */ [6] = 0xFC, /* 6 MSB */ [7] = 0xE0 /* 3 MSB */ }; /* number of whole bytes of raw hash to compare: * 10 is the size of the data a full onion address covers * 16 is the size of the base32-encoded onion address */ raw_len = (search_len*10)/16; bitmask = bitmasks[search_len % 8]; return 0; } void die_usage(const char *argv0) { fprintf(stderr, "usage: %s [-t threads] -s search\n" "searches for keys for onion addresses beginning with `search`\n", argv0 ); exit(1); } void monitor_progress(unsigned long volatile *khashes, int thread_count) { int loops = 0; int i = 0; unsigned long total_khashes = 0; unsigned long last_total_khashes = 0; loops = 0; /* loop while no thread as announced work end; we don't want to * trample its output on stderr */ while (working) { last_total_khashes = total_khashes; total_khashes = 0; /* approximate hashes per second */ for (i = 0; i < thread_count; i++) { total_khashes += khashes[i]; } iprintf("Last second: %lu kH/s (%.2f kH/s/thread) | Average: %.2f kH/s (%.2f kH/s/thread)\r", total_khashes - last_total_khashes, (double)(total_khashes - last_total_khashes) / thread_count, (double)total_khashes / (loops ? loops : 1), ((double)total_khashes / (loops ? loops : 1)) / thread_count); sleep(1); loops++; } } void show_version(void) { printf("sand-leek "VERSION"\n"); } int main(int argc, char **argv) { int opt = '\0'; int thread_count = 1; int i = 0; ssize_t offset = 0; pthread_t *workers = NULL; volatile unsigned long *khashes = NULL; while ((opt = getopt(argc, argv, "t:s:V")) != -1) { switch (opt) { case 'V': show_version(); return 0; case 't': thread_count = atoi(optarg); break; case 's': search = optarg; break; } } if (thread_count <= 0) { die_usage(argv[0]); } if (search == NULL || strlen(search) <= 0) { die_usage(argv[0]); } iprintf("Starting sand-leek " VERSION "\n"); search_len = strlen(search); if ((offset = check_base32(search)) >= 0) { eprintf( "search contains non-base-32 character(s): %c\n" "I cannot search for something that will never occur\n", search[offset] ); return 1; } if (set_raw_params()) { eprintf("Search string of poor length\n"); return 1; } memset(search_pad, 0, sizeof(search_pad)); strncpy(search_pad, search, sizeof(search_pad)); /* decode desired base32 */ onion_base32_dec(search_raw, search_pad); iprintf("Searching for \"%s\"\n", search); workers = calloc(thread_count, sizeof(workers[0])); if (!workers) { eprintf(""); perror("worker thread calloc"); return 1; } khashes = calloc(thread_count, sizeof(khashes[0])); if (!khashes) { eprintf(""); perror("hash count array calloc"); free(workers); return 1; } working = 1; for (i = 0; i < thread_count; i++) { iprintf("Spawning worker thread %d/%d ... ", i + 1, thread_count); if (pthread_create(&workers[i], NULL, work, (void*)&khashes[i])) { /* FIXME not ! */ eprintf(""); perror("pthread_create"); free((unsigned long*)khashes); free(workers); return 1; } iprintf_bare("Done\r"); } iprintf_bare("\n"); monitor_progress(khashes, thread_count); for (i = 0; i < thread_count; i++) { iprintf("Waiting for worker threads (%d/%d) reaped\r", i+1, thread_count); pthread_join(workers[i], NULL); } iprintf_bare("\n"); free((unsigned long*)khashes); free(workers); return 0; }