Skip to content

Commit

Permalink
1.14.0
Browse files Browse the repository at this point in the history
  • Loading branch information
DavidXanatos committed May 11, 2024
1 parent c1e0689 commit 5f6c6b2
Show file tree
Hide file tree
Showing 12 changed files with 260 additions and 2 deletions.
110 changes: 110 additions & 0 deletions Sandboxie/common/rc4.c
Original file line number Diff line number Diff line change
@@ -0,0 +1,110 @@
/*
* Copyright 2024 David Xanatos, xanasoft.com
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>.
*/

//---------------------------------------------------------------------------
// Simple INSECURE Encryption Functions
//---------------------------------------------------------------------------


#ifdef RC4_HEADER_ONLY


//---------------------------------------------------------------------------
// Functions
//---------------------------------------------------------------------------


#ifdef __cplusplus
extern "C" {
#endif

void rc4_crypt(const unsigned char *key_ptr, unsigned int key_len, unsigned int stream_pos, unsigned char *buffer_ptr, unsigned int buffer_len);

#ifdef __cplusplus
} // extern "C"
#endif


//---------------------------------------------------------------------------
// Body
//---------------------------------------------------------------------------


#else RC4_HEADER_ONLY

typedef struct rc4_sbox_s
{
unsigned char state[256];
unsigned int x;
unsigned int y;
} rc4_sbox_t;

void rc4_swap(unsigned char &a, unsigned char &b)
{
unsigned char c = a;
a = b;
b = c;
}

void rc4_init(rc4_sbox_t *rc4_sbox, const unsigned char *key_ptr, unsigned int key_len)
{
rc4_sbox->x = 0;
rc4_sbox->y = 0;

// Initialisation of the permutation
unsigned int i;
for (i = 0; i < 256; i++)
rc4_sbox->state[i] = (char)i;

// Mixing permutation
unsigned int j = 0;
unsigned int k;
for (i = 0; i < 256; i++)
{
k = i % key_len;

j = (key_ptr[k] + rc4_sbox->state[i] + j) & 0xff;
rc4_swap(rc4_sbox->state[i], rc4_sbox->state[j]);
}
}

void rc4_transform(rc4_sbox_t *rc4_sbox, unsigned char *buffer_ptr, unsigned int buffer_len)
{
unsigned int i;
for (i = 0; i < buffer_len; i++)
{
// The pseudo-random generation algorithm
rc4_sbox->x = (rc4_sbox->x + 1) & 0xff;
rc4_sbox->y = (rc4_sbox->y + rc4_sbox->state[rc4_sbox->x]) & 0xff;
rc4_swap(rc4_sbox->state[rc4_sbox->x], rc4_sbox->state[rc4_sbox->y]);
unsigned char keyChar = rc4_sbox->state[(rc4_sbox->state[rc4_sbox->x] + rc4_sbox->state[rc4_sbox->y]) & 0xff];

if (buffer_ptr) // NULL when seeking
buffer_ptr[i] ^= keyChar;
}
}

void rc4_crypt(const unsigned char* key_ptr, unsigned int key_len, unsigned int stream_pos, unsigned char* buffer_ptr, unsigned int buffer_len)
{
rc4_sbox_s sbox;
rc4_init(&sbox, key_ptr, key_len);
if(stream_pos) // RC4 is very insecure but the first few kb are espetially insecure
rc4_transform(&sbox, NULL, stream_pos);
rc4_transform(&sbox, buffer_ptr, buffer_len);
}

#endif RC4_HEADER_ONLY
31 changes: 30 additions & 1 deletion Sandboxie/core/dll/net.c
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,8 @@
#include "common/map.h"
#include "common/str_util.h"
#include "wsa_defs.h"
#include "core/svc/sbieiniwire.h"
#include "common/base64.c"


//---------------------------------------------------------------------------
Expand Down Expand Up @@ -1245,12 +1247,39 @@ BOOLEAN WSA_ParseNetProxy(NETPROXY_RULE* proxy, const WCHAR* found_value)

WCHAR* pass_value;
ULONG pass_len;
if (SbieDll_FindTagValuePtr(found_value, L"Password", &pass_value, &pass_len, L'=', L';')) {
BOOLEAN ok = SbieDll_FindTagValuePtr(found_value, L"Password", &pass_value, &pass_len, L'=', L';');
if (ok) {
if (pass_len > 255)
return FALSE;
wmemcpy(proxy->pass, pass_value, pass_len);
proxy->pass[pass_len] = L'\0';
}
else {
ok = SbieDll_FindTagValuePtr(found_value, L"EncryptedPW", &pass_value, &pass_len, L'=', L';');
if (ok) {

SBIE_INI_RC4_CRYPT_REQ req;
SBIE_INI_RC4_CRYPT_RPL *rpl;

req.h.length = sizeof(SBIE_INI_RC4_CRYPT_REQ) + 255;
req.h.msgid = MSGID_SBIE_INI_RC4_CRYPT;
req.value_len = b64_decoded_size(pass_value);
b64_decode(pass_value, req.value, req.value_len);

rpl = (SBIE_INI_RC4_CRYPT_RPL *)SbieDll_CallServer(&req.h);
if (rpl){

pass_len = rpl->value_len / sizeof(wchar_t);
if (pass_len > 255)
return FALSE;
wmemcpy(proxy->pass, rpl->value, pass_len);
proxy->pass[pass_len] = L'\0';

Dll_Free(rpl);
}
}
}


return TRUE;
}
Expand Down
10 changes: 10 additions & 0 deletions Sandboxie/core/svc/SboxSvc.vcxproj
Original file line number Diff line number Diff line change
Expand Up @@ -373,6 +373,16 @@
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieDebug|ARM64EC'">true</ExcludedFromBuild>
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieDebug|ARM64'">true</ExcludedFromBuild>
</ClCompile>
<ClCompile Include="..\..\common\rc4.c">
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieRelease|ARM64EC'">true</ExcludedFromBuild>
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieDebug|ARM64EC'">true</ExcludedFromBuild>
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieRelease|Win32'">true</ExcludedFromBuild>
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieDebug|Win32'">true</ExcludedFromBuild>
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieRelease|ARM64'">true</ExcludedFromBuild>
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieDebug|ARM64'">true</ExcludedFromBuild>
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieRelease|x64'">true</ExcludedFromBuild>
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieDebug|x64'">true</ExcludedFromBuild>
</ClCompile>
<ClCompile Include="..\..\common\stream.c">
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieRelease|Win32'">true</ExcludedFromBuild>
<ExcludedFromBuild Condition="'$(Configuration)|$(Platform)'=='SbieDebug|Win32'">true</ExcludedFromBuild>
Expand Down
3 changes: 3 additions & 0 deletions Sandboxie/core/svc/SboxSvc.vcxproj.filters
Original file line number Diff line number Diff line change
Expand Up @@ -84,6 +84,9 @@
<ClCompile Include="MountManagerHelpers.cpp">
<Filter>MountManager</Filter>
</ClCompile>
<ClCompile Include="..\..\common\rc4.c">
<Filter>common</Filter>
</ClCompile>
</ItemGroup>
<ItemGroup>
<ClInclude Include="misc.h" />
Expand Down
2 changes: 2 additions & 0 deletions Sandboxie/core/svc/includes.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,8 @@ extern "C" {
#define CRC_WITH_ADLER32
#include "common/crc.c"

#include "common/rc4.c"

#define PATTERN XPATTERN
#include "common/pattern.c"

Expand Down
3 changes: 3 additions & 0 deletions Sandboxie/core/svc/msgids.h
Original file line number Diff line number Diff line change
Expand Up @@ -100,6 +100,9 @@
#define MSGID_SBIE_INI_GET_VERSION 0x18AA
#define MSGID_SBIE_INI_GET_WAIT_HANDLE 0x18AB
#define MSGID_SBIE_INI_RUN_SBIE_CTRL 0x180A
#define MSGID_SBIE_INI_RC4_CRYPT 0x180F

//#define MSGID_SBIE_MGR 0x1900

#define MSGID_NETAPI 0x1A00
#define MSGID_NETAPI_USE_ADD 0x1A01
Expand Down
41 changes: 41 additions & 0 deletions Sandboxie/core/svc/sbieiniserver.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,9 @@
#include "common/my_version.h"
#define CRC_HEADER_ONLY
#include "common/crc.c"
#define RC4_HEADER_ONLY
#include "common/rc4.c"
#include "core/drv/api_defs.h"

#ifdef NEW_INI_MODE
extern "C" {
Expand Down Expand Up @@ -147,6 +150,11 @@ MSG_HEADER *SbieIniServer::Handler2(MSG_HEADER *msg)
return RunSbieCtrl(msg, idProcess, NT_SUCCESS(status));
}

if (msg->msgid == MSGID_SBIE_INI_RC4_CRYPT) {

return RC4Crypt(msg, idProcess, NT_SUCCESS(status));
}

if (NT_SUCCESS(status)) // if sandboxed
return SHORT_REPLY(STATUS_NOT_SUPPORTED);

Expand Down Expand Up @@ -2392,3 +2400,36 @@ MSG_HEADER *SbieIniServer::RunSbieCtrl(MSG_HEADER *msg, HANDLE idProcess, bool i

return SHORT_REPLY(status);
}


//---------------------------------------------------------------------------
// RC4Crypt
//---------------------------------------------------------------------------


MSG_HEADER *SbieIniServer::RC4Crypt(MSG_HEADER *msg, HANDLE idProcess, bool isSandboxed)
{
SBIE_INI_RC4_CRYPT_REQ *req = (SBIE_INI_RC4_CRYPT_REQ *)msg;
if (req->h.length < sizeof(SBIE_INI_RC4_CRYPT_REQ))
return SHORT_REPLY(STATUS_INVALID_PARAMETER);

ULONG rpl_len = sizeof(SBIE_INI_RC4_CRYPT_RPL) + req->value_len;
SBIE_INI_RC4_CRYPT_RPL *rpl = (SBIE_INI_RC4_CRYPT_RPL *)LONG_REPLY(rpl_len);
if (!rpl)
return SHORT_REPLY(STATUS_INSUFFICIENT_RESOURCES);

rpl->value_len = req->value_len;
memcpy(rpl->value, req->value, req->value_len);

ULONG64 RandID = 0;
SbieApi_Call(API_GET_SECURE_PARAM, 3, L"RandID", (ULONG_PTR)&RandID, sizeof(RandID));
if (RandID == 0) {
srand(GetTickCount());
RandID = ULONG64(rand() & 0xFFFF) | (ULONG64(rand() & 0xFFFF) << 16) | (ULONG64(rand() & 0xFFFF) << 32) | (ULONG64(rand() & 0xFFFF) << 48);
SbieApi_Call(API_SET_SECURE_PARAM, 3, L"RandID", (ULONG_PTR)&RandID, sizeof(RandID));
}

rc4_crypt((BYTE*)&RandID, sizeof(RandID), 0x1000, rpl->value, rpl->value_len);

return (MSG_HEADER*)rpl;
}
2 changes: 2 additions & 0 deletions Sandboxie/core/svc/sbieiniserver.h
Original file line number Diff line number Diff line change
Expand Up @@ -105,6 +105,8 @@ class SbieIniServer

MSG_HEADER *RunSbieCtrl(MSG_HEADER *msg, HANDLE idProcess, bool isSandboxed);

MSG_HEADER *RC4Crypt(MSG_HEADER *msg, HANDLE idProcess, bool isSandboxed);


protected:

Expand Down
23 changes: 23 additions & 0 deletions Sandboxie/core/svc/sbieiniwire.h
Original file line number Diff line number Diff line change
Expand Up @@ -174,6 +174,29 @@ struct tagSBIE_INI_PASSWORD_REQ
typedef struct tagSBIE_INI_PASSWORD_REQ SBIE_INI_PASSWORD_REQ;


//---------------------------------------------------------------------------
// rc4 Crypt
//---------------------------------------------------------------------------


struct tagSBIE_INI_RC4_CRYPT_REQ
{
MSG_HEADER h;
ULONG value_len;
UCHAR value[1];
};

struct tagSBIE_INI_RC4_CRYPT_RPL
{
MSG_HEADER h;
ULONG value_len;
UCHAR value[1];
};

typedef struct tagSBIE_INI_RC4_CRYPT_REQ SBIE_INI_RC4_CRYPT_REQ;
typedef struct tagSBIE_INI_RC4_CRYPT_RPL SBIE_INI_RC4_CRYPT_RPL;


//---------------------------------------------------------------------------


Expand Down
21 changes: 21 additions & 0 deletions SandboxiePlus/QSbieAPI/SbieAPI.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -2150,6 +2150,27 @@ void CSbieAPI::ClearPassword()
m->Password.clear();
}

SB_RESULT(QByteArray) CSbieAPI::RC4Crypt(const QByteArray& Data)
{
ULONG req_len = sizeof(SBIE_INI_RC4_CRYPT_REQ) + Data.size();
SScoped<SBIE_INI_RC4_CRYPT_REQ> req(malloc(req_len));

req->h.length = req_len;
req->h.msgid = MSGID_SBIE_INI_RC4_CRYPT;
req->value_len = Data.size();
memcpy(req->value, Data.constData(), req->value_len);

SScoped<SBIE_INI_RC4_CRYPT_RPL> rpl;
SB_STATUS Status = CallServer(&req->h, &rpl);
if (!Status)
return Status;
if (!rpl)
return SB_ERR(ERROR_SERVER_DISABLED);
if (rpl->h.status != 0)
return SB_ERR(rpl->h.status);
return CSbieResult(QByteArray((char*)rpl->value, rpl->value_len));
}

bool CSbieAPI::GetDriverInfo(quint32 InfoClass, void* pBuffer, size_t Size)
{
__declspec(align(8)) ULONG64 parms[API_NUM_ARGS];
Expand Down
2 changes: 2 additions & 0 deletions SandboxiePlus/QSbieAPI/SbieAPI.h
Original file line number Diff line number Diff line change
Expand Up @@ -108,6 +108,8 @@ class QSBIEAPI_EXPORT CSbieAPI : public QThread
virtual SB_STATUS LockConfig(const QString& NewPassword);
virtual void ClearPassword();

virtual SB_RESULT(QByteArray) RC4Crypt(const QByteArray& Data);

virtual bool GetDriverInfo(quint32 InfoClass, void* pBuffer, size_t Size);

enum EFeatureFlags
Expand Down
14 changes: 13 additions & 1 deletion SandboxiePlus/SandMan/Windows/OptionsNetwork.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -986,6 +986,12 @@ void COptionsWindow::ParseAndAddNetProxy(const QString& Value, bool disabled, co
pItem->setData(4, Qt::UserRole, Login);

QString Pass = Tags.value("password");
if(Pass.isEmpty()) {
Pass = Tags.value("encryptedpw");
auto res = theAPI->RC4Crypt(QByteArray::fromBase64(Pass.toLatin1()));
if (!res.IsError())
Pass = QString::fromWCharArray((wchar_t*)res.GetValue().data(), res.GetValue().length() / sizeof(wchar_t));
}
if (Pass.length() > 255) Pass = Pass.left(255);
pItem->setText(5, Pass);
pItem->setData(5, Qt::UserRole, Pass);
Expand Down Expand Up @@ -1024,7 +1030,13 @@ void COptionsWindow::SaveNetProxy()
Tags.append("Port=" + Port);
if (!Auth.isEmpty()) Tags.append("Auth=" + Auth);
if (!Login.isEmpty()) Tags.append("Login=" + Login);
if (!Pass.isEmpty()) Tags.append("Password=" + Pass);
if (!Pass.isEmpty()) {
auto res = theAPI->RC4Crypt(QByteArray((char*)Pass.toStdWString().c_str(), Pass.length() * sizeof(wchar_t)));
if(res.IsError())
Tags.append("Password=" + Pass);
else
Tags.append("EncryptedPW=" + res.GetValue().toBase64(QByteArray::OmitTrailingEquals));
}
QString Entry = Tags.join(";").prepend(Program + ",");

if (pItem->checkState(0) == Qt::Checked)
Expand Down

0 comments on commit 5f6c6b2

Please sign in to comment.