dlenski / openconnect

OpenConnect client extended to support Palo Alto Networks' GlobalProtect VPN
679 stars 130 forks source link

How to indicate a form field for authentication purposes (Global Protect / SAML)? #149

Closed natalie-o-perret closed 5 years ago

natalie-o-perret commented 5 years ago

I am trying to connect to a corporate vpn using openconnect (protocol Global Protect):

perret at perret-pc in ~
$ openconnect --protocol=gp [vpn-address]
POST [vpn-address]/ssl-vpn/prelogin.esp?tmp=tmp&clientVer=4100&clientos=Linux
Connected to 185.183.115.255:443
SSL negotiation with [vpn-address]
Connected to HTTPS on [vpn-address]
POST [vpn-address]/global-protect/prelogin.esp?tmp=tmp&clientVer=4100&clientos=Linux
SAML authentication via POST to <html>
<body>
<form id="myform" method="POST" action="[corporate-address]/auth/realms/vpgrp/protocol/saml">
<input type="hidden" name="SAMLRequest" value="PHNhbWxwOkF1dGhuUmVxdWVzdCB4bWxuczpzYW1scD0idXJuOm9hc2lzOm5hbWVzOnRjOlNBTUw6Mi4wOnByb3RvY29sIiBBc3NlcnRpb25Db25zdW1lclNlcnZpY2VVUkw9Imh0dHBzOi8vdnBuLnZlZXBlZS50ZWNoOjQ0My9TQU1MMjAvU1AvQUNTIiBEZXN0aW5hdGlvbj0iaHR0cHM6Ly9zc29jby5wbGF0Zm9ybS52cGdycC5uZXQvYXV0aC9yZWFsbXMvdnBncnAvcHJvdG9jb2wvc2FtbCIgSUQ9Il85YTkwNDYyMzQyY2YyMWU0ZmE0YzUyYmVmOTRjZDNhNSIgSXNzdWVJbnN0YW50PSIyMDE5LTA4LTAyVDIxOjUyOjE0WiIgUHJvdG9jb2xCaW5kaW5nPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6YmluZGluZ3M6SFRUUC1QT1NUIiBWZXJzaW9uPSIyLjAiPjxzYW1sOklzc3VlciB4bWxuczpzYW1sPSJ1cm46b2FzaXM6bmFtZXM6dGM6U0FNTDoyLjA6YXNzZXJ0aW9uIj5odHRwczovL3Zwbi52ZWVwZWUudGVjaDo0NDMvU0FNTDIwL1NQPC9zYW1sOklzc3Vlcj48L3NhbWxwOkF1dGhuUmVxdWVzdD4=" />
<input type="hidden" name="RelayState" value="GCkAANn0plw4NzIwNDY4YmM4ZGE2ZjcwMzU3ZWQ5M2E0NjI5ZDE2Yw==" />
</form>
<script>
  document.getElementById('myform').submit();
</script>
</body>
</html>
 is required.
Must specify destination form field by appending :field_name to login URL.
Failed to parse server response
Failed to obtain WebVPN cookie

I am not too sure about this part:

Must specify destination form field by appending :field_name to login URL.

I thought it would be something like that:

openconnect --protocol=gp [vpn-address]:myform
POST https://[vpn-address]:myform/ssl-vpn/prelogin.esp?tmp=tmp&clientVer=4100&clientos=Linux
getaddrinfo failed for host '[vpn-address]:myform': Name or service not known
Failed to open HTTPS connection to [vpn-address]:myform
Failed to obtain WebVPN cookie

But as you can see, it does not work either.

Any idea?

It might be related to this piece of the source code: https://github.com/dlenski/openconnect/blob/master/auth-globalprotect.c#L91

dlenski commented 5 years ago

This is a good find. You are invoking it like this, right?

$ openconnect --prot=gp vpn.veepee.tech:myform

Which is causing openconnect to interpret :myform as the TCP port number.

Workarounds:

  1. Use a slash after the server name to disambiguate this as appended to the URL's path, not part of the server+port:
    openconnect --prot=gp vpn.veepee.tech/:blah_blah
  2. Use --usergroup which has the same effect on openconnect internally, but only available from the command line, not graphical front-ends:
    openconnect --prot=gp vpn.veepee.tech --usergroup :blah_blah

The reason I don't think this has come up before is that you should not normally have to specify an alternate form field manually. It's really intended for use by scripts that handle the SAML/Okta authentication, like @arthepsy's pan-globalprotect-okta wrapper.

natalie-o-perret commented 5 years ago

Thanks for your answer: Actually I noticed that when copying pasting the

<html>
    <body>
        <form id="myform" method="POST" action="https://ssoco.platform.vpgrp.net/auth/realms/vpgrp/protocol/saml">
            <input type="hidden" name="SAMLRequest" value="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" />
            <input type="hidden" name="RelayState" value="KykAANn0plw1YTMwNTY2ZjI5NWE0Y2E0Nzg5NjQ1ZTgyZjUwOGUwNA==" />
        </form>
        <script>
            document.getElementById('myform').submit();
        </script>
    </body>
</html>

in a html file, I then get the html augmented:

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"  "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" class="login-pf">

<head>
    <meta charset="utf-8">
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
    <meta name="robots" content="noindex, nofollow">

    <meta name="viewport" content="width=device-width,initial-scale=1" />
    <title> Log in to vpgrp
    </title>
    <link rel="icon" href="/auth/resources/3.4.3.final/login/vpgrp-ssoco/img/favicon.png" />
    <link href="/auth/resources/3.4.3.final/login/vpgrp-ssoco/lib/zocial/zocial.css" rel="stylesheet" />
    <link href="/auth/resources/3.4.3.final/login/vpgrp-ssoco/css/typography.css" rel="stylesheet" />
    <link href="/auth/resources/3.4.3.final/login/vpgrp-ssoco/css/login.css" rel="stylesheet" />
    <script src="/auth/resources/3.4.3.final/login/vpgrp-ssoco/js/script.js" type="text/javascript"></script>
    <SCRIPT>
        if (typeof history.replaceState === 'function') {
            history.replaceState({}, "some title", "https://ssoco.platform.vpgrp.net/auth/realms/vpgrp/login-actions/authenticate?execution=cfed83a7-1a4c-4ff5-9fdd-4ca9d171c8b5&client_id=https%3A%2F%2Fvpn.veepee.tech%3A443%2FSAML20%2FSP&tab_id=88hvehNt6ug");
        }
    </SCRIPT>
</head>

<body class="">
    <div id="kc-container" class="">
        <div id="kc-container-wrapper" class="">
            <div class="bgrd-overlay"></div>
            <div class="kc-container-centered">
                <div id="kc-content" class="col-sm-12 col-md-12 col-lg-12 container">
                    <div id="kc-content-wrapper" class="row">

                        <div id="kc-form" class="col-xs-12 col-sm-8 col-md-8 col-lg-7 login">
                            <div id="kc-header" class="col-xs-12 col-sm-8 col-md-8 col-lg-7">
                                <div class="kc-header-bg-blur"></div>
                                <div id="kc-header-wrapper" class="">
                                    <header role="banner">
                                        <h1 id="logoVp" style="background-image: url(/auth/resources/3.4.3.final/login/vpgrp-ssoco/img/veepee_black.png)"></h1>
                                    </header>
                                </div>
                            </div>

                            <div id="kc-form-wrapper" class="">
                                <form id="kc-form-login" class="form-horizontal" onsubmit="login.disabled = true; return true;" action="https://ssoco.platform.vpgrp.net/auth/realms/vpgrp/login-actions/authenticate?code=X8eiFlBIt2COfU1oRld5SzKwaLkzzkGYpI_ouZqm7No&amp;execution=cfed83a7-1a4c-4ff5-9fdd-4ca9d171c8b5&amp;client_id=https%3A%2F%2Fvpn.veepee.tech%3A443%2FSAML20%2FSP&amp;tab_id=88hvehNt6ug" method="post">
                                    <div class="separator"></div>
                                    <div class="kc-form-login-inner">
                                        <div class="form-group input-wrap">
                                            <input tabindex="1" id="username" class="form-control" name="username" value="" type="text" autofocus autocomplete="off" placeholder="Username or Email" />
                                        </div>

                                        <div class="form-group input-wrap">
                                            <input tabindex="2" id="password" class="form-control" name="password" type="password" autocomplete="off" placeholder="Password" />
                                        </div>

                                    </div>

                                    <div class="form-group">
                                        <div id="kc-form-buttons" class="col-xs-8 col-sm-7 col-md-4 col-lg-4 submit">
                                            <div class=" login-button">
                                                <input tabindex="4" class="btn-primary-vp" name="login" id="kc-login" type="submit" value="Log in" />
                                            </div>
                                        </div>
                                        <div id="kc-form-options" class="col-xs-4 col-sm-5 col-md-offset-4 col-md-4 col-lg-offset-3 col-lg-5">
                                            <div class="checkbox">
                                                <a class="checkbox-inner"></a>
                                                <input tabindex="3" onclick="handleCheckboxChange()" id="rememberMe" name="rememberMe" type="checkbox" tabindex="3">
                                                <label for="rememberMe" id="rememberMe">Remember me</label>
                                            </div>
                                            <div class="clear form-options-wrapper">
                                            </div>
                                        </div>
                                    </div>
                                </form>
                            </div>
                        </div>

                    </div>
                </div>
            </div>
        </div>
    </div>
    <footer>
        <section>
        </section>
    </footer>

</body>

</html>

Wondering if two field names can be specified instead of one?

Namely: username and password

dlenski commented 5 years ago

Wondering if two field names can be specified instead of one?

Namely: username and password

In short: no.

The form that prelogin.esp is sending you is not a "normal" GlobalProtect login form with differently-named fields. Submitting it with the right values won't get you the normal GlobalProtect authcookie for VPN tunnel connection purposes.

It's a whole ’nother beast/layer that's somewhat outside the scope of what OpenConnect currently handles in terms of authentication.

For now (as of OpenConnect v8.03), you need to use or write a wrapper script that will do the SAML authentication, figure out what kind of cookie the SAML authentication produces, and then pass that to openconnect (along with the field name of that output cookie, often portal-userauthcookie or something like that).

If you need to write a script to handle this case, I'd probably suggest starting with pan-globalprotect-okta wrapper.

However, in some ways I prefer the style of my own smxlogin, which interfaces with openconnect in a way that's closer to `openconnect --authenticate; it does the authentication process, and then outputs a set of shell variables that can be passed to openconnect to make the actual connection.

natalie-o-perret commented 5 years ago

Alright thanks, that makes things a lil' more clear now. Will probably update this thread with my findings.

Again, thank you!

natalie-o-perret commented 5 years ago

Alright was busy with windows for a while.

@dlenski I automated the whole saml thing in Python (it takes username, password + generated code on the smartphone app) and ended up with that last 2 responses, respectively:

<HTML>

<HEAD>
    <TITLE>SAML HTTP Post Binding</TITLE>
    <SCRIPT>
        if (typeof history.replaceState === 'function') {
            history.replaceState({}, "some title", "https://[another-corporate-url]/auth/realms/vpgrp/login-actions/authenticate?client_id=https%3A%2F%2Fvpn.[my-company-url]%3A443%2FSAML20%2FSP&tab_id=E14BCom1yVk");
        }
    </SCRIPT>
</HEAD>

<BODY Onload="document.forms[0].submit()">
    <FORM METHOD="POST" ACTION="https://vpn.[my-company-url]:443/SAML20/SP/ACS">
        <INPUT TYPE="HIDDEN" NAME="SAMLResponse" VALUE="<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" Destination="https://vpn.veepee.tech:443/SAML20/SP/ACS" ID="ID_ea3c7192-3a21-46f4-b431-e7d115817191" InResponseTo="_ee1a2d41936b5a4c201873313b370588" IssueInstant="2019-08-22T20:30:44.856Z" Version="2.0"><saml:Issuer>https://ssoco.platform.vpgrp.net/auth/realms/vpgrp</saml:Issuer><dsig:Signature xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><dsig:SignedInfo><dsig:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><dsig:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><dsig:Reference URI="#ID_ea3c7192-3a21-46f4-b431-e7d115817191"><dsig:Transforms><dsig:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><dsig:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></dsig:Transforms><dsig:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><dsig:DigestValue>TDDsGSeHjcHAulz4yYGwTL/a/LcwR1/Qg84hItqd+D4=</dsig:DigestValue></dsig:Reference></dsig:SignedInfo><dsig:SignatureValue>CfqmgXYKMg9ILmh5Ko1flQu0PHmNGTlUg3hf7q3Kkihe9cyzDG3OGF5zjJhFi8BdWXIXEgUSJafgCvjWOUvk8GTjFjqKV4OLCK2+JHQ0DOerOHb3dr2gn6vh++EqzIX9ffzGiJM+LzccyaCPJU0g688FpEbNLDv7X+rf5rrMfMQRUWh3mN+vkBnP+Krv8b1UekRaoL/Sz9BiE0+jaWd5a6k3d9OHtNDOW+vtbi9z/L931pdAXYGzhmKeJCSkV3ky1U+q77J1NxIocj8ovVwYwIaf666UW2qGdujFgh/XdxWXXPu5xhSrlfVEmXEdVPB+cH+hwMRQSxW5JnkJCpiN+Q==</dsig:SignatureValue><dsig:KeyInfo><dsig:KeyName>CN=vpgrp</dsig:KeyName><dsig:X509Data><dsig:X509Certificate>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</dsig:X509Certificate></dsig:X509Data><dsig:KeyValue><dsig:RSAKeyValue><dsig:Modulus>pkKdHXjbgyowlRAYQPDZLGKp/QJ6lS2QoIdBKOatMorfotJfPwc+SiwTLmvb/Rw2rcmxai0fruJIyjsnwWyHjcGtj2Z4Q5bPZfg0qIx5jaENH6dK+owcaACfWumfgJwlBN8SY9VJmm1vZNt5aRxJyuI1yvYcZs4d2EWvP94494TXjhftGMDGIehRRhG7mJKHB4cpOfLcb4A04EFhkuZdMICVMTf1LjkWz+YCYqvJB51jmDPWm0DoCtY91nE+4ouMgJrBDqiHyBDwAw9qi3zhWIpLs80Thxlk9tJ8DiFujX7smDLUTjxV6PxKBZ1qnZaWC/xQhz7MH71VkcUvf8XzVQ==</dsig:Modulus><dsig:Exponent>AQAB</dsig:Exponent></dsig:RSAKeyValue></dsig:KeyValue></dsig:KeyInfo></dsig:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="ID_f04e69b1-f9e1-483d-bc74-246f4a1a7639" IssueInstant="2019-08-22T20:30:44.856Z" Version="2.0"><saml:Issuer>https://ssoco.platform.vpgrp.net/auth/realms/vpgrp</saml:Issuer><dsig:Signature xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><dsig:SignedInfo><dsig:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><dsig:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><dsig:Reference URI="#ID_f04e69b1-f9e1-483d-bc74-246f4a1a7639"><dsig:Transforms><dsig:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><dsig:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></dsig:Transforms><dsig:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><dsig:DigestValue>TAepFfKvXDIYvBkVWL3l4cZSz8W41rvYq5b3ujuDt3I=</dsig:DigestValue></dsig:Reference></dsig:SignedInfo><dsig:SignatureValue>fCEx2l7asvXkkv3T+/D2KxFe/Se/IdJ8RC/vrGcBiRl8Xr2XvHkZb/PMmSoDuRatM2AHI/SltwSdIwWlH7rLwW94SHau7XIx5bFhqMSSOICGDSKdEa/IL3HN3mp15P+my1ea+ZixEgcmTPQa46tWOP1KHkP3h1cBSIzInfIf0/L3G3KjZMvKJGu3y+iecr6z2NNgU9V4Ve3NBvQh4bYN24udSAlqtHif9yeos4G4TqGanBQXY2zviEKoU87I+LLKiLlarjmkUtngqsCdEYIzCXocJ8hyiPv1vBJ+8Mv272vTTIhBZ04qmSlljeilHwR+wEUoOKp4BG3qp5+b9ngsyA==</dsig:SignatureValue><dsig:KeyInfo><dsig:KeyName>CN=vpgrp</dsig:KeyName><dsig:X509Data><dsig:X509Certificate>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</dsig:X509Certificate></dsig:X509Data><dsig:KeyValue><dsig:RSAKeyValue><dsig:Modulus>pkKdHXjbgyowlRAYQPDZLGKp/QJ6lS2QoIdBKOatMorfotJfPwc+SiwTLmvb/Rw2rcmxai0fruJIyjsnwWyHjcGtj2Z4Q5bPZfg0qIx5jaENH6dK+owcaACfWumfgJwlBN8SY9VJmm1vZNt5aRxJyuI1yvYcZs4d2EWvP94494TXjhftGMDGIehRRhG7mJKHB4cpOfLcb4A04EFhkuZdMICVMTf1LjkWz+YCYqvJB51jmDPWm0DoCtY91nE+4ouMgJrBDqiHyBDwAw9qi3zhWIpLs80Thxlk9tJ8DiFujX7smDLUTjxV6PxKBZ1qnZaWC/xQhz7MH71VkcUvf8XzVQ==</dsig:Modulus><dsig:Exponent>AQAB</dsig:Exponent></dsig:RSAKeyValue></dsig:KeyValue></dsig:KeyInfo></dsig:Signature><saml:Subject><saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">eperret</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData InResponseTo="_ee1a2d41936b5a4c201873313b370588" NotOnOrAfter="2019-08-22T20:35:42.856Z" Recipient="https://vpn.veepee.tech:443/SAML20/SP/ACS"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2019-08-22T20:30:42.856Z" NotOnOrAfter="2019-08-22T20:31:42.856Z"><saml:AudienceRestriction><saml:Audience>https://vpn.veepee.tech:443/SAML20/SP</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2019-08-22T20:30:44.856Z" SessionIndex="f7cd2c98-55a3-41e0-bd60-40b6cbb2df76::9176ed85-0c86-4f4b-b3db-f04f64a13871"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute FriendlyName="username" Name="username" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">eperret</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Office365_E3</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">uma_authorization</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Support_Compta</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Utilisateurs PAPIC PP</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Utilisateurs PAPIC</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account-links</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Gsuite_Business</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Utilisateurs PAPIC R7</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">team_revmgt</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-profile</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">wifi_access_user</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">External_Users</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>" />
        <INPUT TYPE="HIDDEN" NAME="RelayState" VALUE="HUEAANn0plxhMDU2ZjU3OTI5OGEwNDQzN2VjZmYyZjgzNzYwMzc5Yg==" />
        <NOSCRIPT>
            <P>JavaScript is disabled. We strongly recommend to enable it. Click the button below to continue.</P>
            <INPUT TYPE="SUBMIT" VALUE="CONTINUE" />
        </NOSCRIPT>
    </FORM>
</BODY>

</HTML>
b'<html><body>Login Successful!</body><!-- <saml-auth-status>1</saml-auth-status><prelogin-cookie>aQmKLyaqRGRmDsPjqj5Avk70WCoiK/I8MyxafyAXgizEwYteadDhRSAQ52dVZzTE</prelogin-cookie><saml-username>eperret</saml-username><saml-slo>no</saml-slo> --></html>'

Not too sure though, if the cookie you mentionned (portal-userauthcookie) here is prelogin-cookie, that kind of semantic looks odd to me.

I also have some session cookies:

<RequestsCookieJar[
<Cookie AUTH_SESSION_ID=2e91e21a-4540-458c-94dc-59397753d49b.ssoco-kck-fc5f1 for [another-corporate-url]/auth/realms/vpgrp>, 
<Cookie KEYCLOAK_IDENTITY=eyJhbGciOiJIUzI1NiIsImtpZCIgOiAiYmI3NTg5ZWYtN2E0ZC00NDMxLTg1ODctYjA4MTc1MzI1MGU5In0.eyJqdGkiOiI3NzRhODk1ZS03ZDg0LTRjMmQtYTBiMi00ZjcyODg4ZjlkYTciLCJleHAiOjE1Njc4MDY3MzUsIm5iZiI6MCwiaWF0IjoxNTY2NTEwNzM1LCJpc3MiOiJodHRwczovL3Nzb2NvLnBsYXRmb3JtLnZwZ3JwLm5ldC9hdXRoL3JlYWxtcy92cGdycCIsInN1YiI6IjM2MGM4YmRmLWU5OWItNDUxYy1hYjczLTNjMTU5MzNkMjRlMSIsImF1dGhfdGltZSI6MCwic2Vzc2lvbl9zdGF0ZSI6IjJlOTFlMjFhLTQ1NDAtNDU4Yy05NGRjLTU5Mzk3NzUzZDQ5YiIsInJlc291cmNlX2FjY2VzcyI6e30sInN0YXRlX2NoZWNrZXIiOiJTSFpWd1lkUDNLNjR0V0JQaC1jWXhwTGJkTkJ5c1BCVnVDeXdtc0tka0lzIn0.G-Bt4I42MHAykNZYJwjfTJ68hUEvqn4LOPTaHf9fm1s for [another-corporate-url]/auth/realms/vpgrp>,
<Cookie KEYCLOAK_SESSION=vpgrp/360c8bdf-e99b-451c-ab73-3c15933d24e1/2e91e21a-4540-458c-94dc-59397753d49b for [another-corporate-url]/auth/realms/vpgrp>, 
<Cookie PHPSESSID=b755afc7f0b82dfb2e79fb48759f1306 for vpn.[my-company-url]/>, 
<Cookie PHPSESSID=b755afc7f0b82dfb2e79fb48759f1306 for vpn.[my-company-url]/global-protect>
]>

Not sure which one is the right one, could not find any portal-userauthcookie

Btw, is there any release of the window binaries available, can't really find them (not talking about the gui, but the CLI)

natalie-o-perret commented 5 years ago

Read this, insightful: https://github.com/dlenski/openconnect/blob/globalprotect/PAN_GlobalProtect_protocol_doc.md

I sniffed and analysed the different calls from the official windows client with Fiddler to the extent could.

I managed to make it work with the script below, this if obviously a bit company specific (ie. SAML) but hope it can help someone when trying willing to use openconnect with a Global Protect VPN that requires a prior SAML auth before actually using openconnect.

import base64
import subprocess
import sys

import requests
from robobrowser import RoboBrowser
import xml.etree.ElementTree as ET

# Your data... here 
# (need to be changed accordingly to your needs)
username = "my username"
password = "my password"
smartphone_code = "the smartphone app code"

# Get my good old friend: the web scraper
browser = RoboBrowser(parser="html.parser", history=True)
vpn_portal_url = "my vpn portal"
vpn_prelogin_url = "https://{0}/global-protect/prelogin.esp".format(vpn_portal_url)

# Required, otherwise Palo Alto is not gonna be your friend with some of the requests below
browser.session.headers["User-Agent"] = "PAN GlobalProtect"

# Submit SAML Request Form
browser.open(vpn_prelogin_url)
prelogin_response_xml = ET.fromstring(browser.response.text)
saml_request = prelogin_response_xml.find(".//saml-request")
saml_request_raw = base64.b64decode(saml_request.text)
# Dirty but saves you from playing with a few parsing operations
# => just to fetch the form and submit it
saml_request_fake_response = requests.Response()
saml_request_fake_response._content = saml_request_raw
browser._update_state(saml_request_fake_response)
saml_request_form = browser.get_form("myform")
browser.submit_form(saml_request_form)

# Submit the login form (username + password)
login_form = browser.get_form("kc-form-login")
login_form["username"].value = username
login_form["password"].value = password
browser.submit_form(login_form)

# Submit the smartphone code form
code_form = browser.get_form("kc-totp-login-form")
code_form["totp"].value = smartphone_code
submit = code_form["login"]
browser.submit_form(code_form, submit=submit)

# End the SAML process gracefully
saml_response_form = browser.get_forms()[0]
browser.submit_form(saml_response_form)
prelogin_cookie = browser.response.headers["prelogin-cookie"]

# Now we can get our cookie that will act as an openconnect password
vpn_get_config_url = "https://{0}/global-protect/getconfig.esp".format(vpn_portal_url)
vpn_get_config_data = {
    "user": username,
    "prelogin-cookie": prelogin_cookie,
}
browser.open(vpn_get_config_url, method="post", data=vpn_get_config_data)
config_response_xml = ET.fromstring(browser.response.text)
portal_userauthcookie = config_response_xml.find(".//portal-userauthcookie").text

# Call openconnect with the cookie / password we got above
cmd = "echo \"{}\"".format(portal_userauthcookie)
cmd += " |"
cmd += " sudo openconnect"
cmd += " --protocol=gp"
cmd += " --usergroup portal:portal-userauthcookie"
cmd += " --user={}".format(username)
cmd += " {}".format(vpn_portal_url)

process = subprocess.Popen(cmd, shell=True, stdin=sys.stdin, stdout=sys.stdout, stderr=sys.stderr)
out, err = process.communicate()
dlenski commented 5 years ago

Bien joué. :ok_hand:

It looks like the SAML process for your GP VPN is somewhat simpler than for others which are based on SAML (like Okta).

I would like to make OpenConnect “just work” with any SAML-based login, but unfortunately there seem to be a huge number of variants, and it doesn't appear to me that the correct behavior with any given SAML implementation is in any way “discoverable” by the client… and definitely not without a full-blown browser implementing JavaScript. :face_with_head_bandage:

natalie-o-perret commented 5 years ago

@dlenski to be frank, the implementations for Okta available on GitHub seem to be overkill, I might be wrong but at first when I was trying to figure what to do I was following that track and man the code to do the SAML was huuuuge.

I am definitely not a professional Pythonista but I can see when a code has inflated a bit too much (particularly when a different kind of scrapper can be used at some point instead of doing everything with requests, some parsing part also overkilled).

About the SAML based login, yea depends on... the implementation to say the least, so that would be tough to make some generic =/

Agreed that some SAML may even play hard with some dirty JS =/ which does not help =/