https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16640

            Bug ID: 16640
           Summary: Incorrect parsing of NTP datagrams with SHA512 based
                    message authentication code (MAC)
           Product: Wireshark
           Version: 3.2.3
          Hardware: x86
                OS: Windows 10
            Status: UNCONFIRMED
          Severity: Normal
          Priority: Low
         Component: Dissection engine (libwireshark)
          Assignee: bugzilla-ad...@wireshark.org
          Reporter: olega...@gmail.com
  Target Milestone: ---

Created attachment 17817
  --> https://bugs.wireshark.org/bugzilla/attachment.cgi?id=17817&action=edit
pcap with sha1,sha256,sha512

Build Information:
3.2.3 (v3.2.3-0-gf39b50865a13)

Compiled (32-bit) with Qt 5.12.6, with WinPcap SDK (WpdPack) 4.1.2, with GLib
2.52.3, with zlib 1.2.11, with SMI 0.4.8, with c-ares 1.15.0, with Lua 5.2.4,
with GnuTLS 3.6.3 and PKCS #11 support, with Gcrypt 1.8.3, with MIT Kerberos,
with MaxMind DB resolver, with nghttp2 1.39.2, with brotli, with LZ4, with
Zstandard, with Snappy, with libxml2 2.9.9, with QtMultimedia, with automatic
updates using WinSparkle 0.5.7, with AirPcap, with SpeexDSP (using bundled
resampler), with SBC, with SpanDSP, with bcg729.

Running on 64-bit Windows 10 (1909), build 18363, with Intel(R) Core(TM)
i5-8350U CPU @ 1.70GHz (with SSE4.2), with 8030 MB of physical memory, with
locale English_World.1252, with light display mode, without HiDPI, without
Npcap
or WinPcap, with GnuTLS 3.6.3, with Gcrypt 1.8.3, with brotli 1.0.2, with
AirPcap 4.1.0 build 1622, binary plugins supported (19 loaded).

Built using Microsoft Visual Studio 2019 (VC++ 14.24, build 28316).

--
NTP datagrams with symmetric authentication using SHA512 are not parsed
correctly.
Attached is packet capture between ntpd and chrony NTP software, using SHA1,
SHA256, SHA512 (packets 11-13).
Below is my dissection of the packets.

+packet
11___________________________________________________________________MESSAGE________________|---KEY-ID---|====DIGEST=======
('e30006e80000000000000000494e4954000000000000000000000000000000000000000000000000e2816164f8f27d03',
'0000000c',
'8e5b9b0256dfe7fb55793626b6745c7b8633461e2a7f8ae6f26ffc14db28f0aaf08d704a8738c324bcfc8530fac89d8e1a0e70ed84afbc0a2db784d725dee75d')
SHA512 was used to create digest for key 12, SHA1 was expected
+packet
12___________________________________________________________________MESSAGE________________|---KEY-ID---|====DIGEST=======
('e30006e80000000000000040494e4954000000000000000000000000000000000000000000000000e28161a5f8f2edb2',
'0000000c',
'af41f7f747c0daf0db289a54b62ce74a0fa78ac2d28310028a021dd3a9973606cc5cf702c13fb8ba39f63fc9da8c2c628fd6bce4b8c2c97e9e2d2ca2804e7600')
SHA512 was used to create digest for key 12, SHA1 was expected
+packet
13___________________________________________________________________MESSAGE________________|---KEY-ID---|====DIGEST=======
('1c0306e700000ed5000006be4ad0eb3ce281619dd7bfd757e28161a5f8f2edb2e28161a5fa21fe18e28161a5fa265e74',
'0000000c',
'db8742bc94623411281565cdd0203df248c38e58830d403b0a29ecb6f915c8afbfea1311fec5d633af605926b91788b6dd0ffbe84479a42fafa8c087520de35f')
SHA512 was used to create digest for key 12, SHA1 was expected

-- 
You are receiving this mail because:
You are watching all bug changes.
___________________________________________________________________________
Sent via:    Wireshark-bugs mailing list <wireshark-bugs@wireshark.org>
Archives:    https://www.wireshark.org/lists/wireshark-bugs
Unsubscribe: https://www.wireshark.org/mailman/options/wireshark-bugs
             mailto:wireshark-bugs-requ...@wireshark.org?subject=unsubscribe

Reply via email to