Closed natalie-o-perret closed 5 years ago
This is a good find. You are invoking it like this, right?
$ openconnect --prot=gp vpn.veepee.tech:myform
Which is causing openconnect to interpret :myform
as the TCP port number.
Workarounds:
openconnect --prot=gp vpn.veepee.tech/:blah_blah
--usergroup
which has the same effect on openconnect internally, but only available from the command line, not graphical front-ends:
openconnect --prot=gp vpn.veepee.tech --usergroup :blah_blah
The reason I don't think this has come up before is that you should not normally have to specify an alternate form field manually. It's really intended for use by scripts that handle the SAML/Okta authentication, like @arthepsy's pan-globalprotect-okta wrapper.
Thanks for your answer: Actually I noticed that when copying pasting the
<html>
<body>
<form id="myform" method="POST" action="https://ssoco.platform.vpgrp.net/auth/realms/vpgrp/protocol/saml">
<input type="hidden" name="SAMLRequest" value="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" />
<input type="hidden" name="RelayState" value="KykAANn0plw1YTMwNTY2ZjI5NWE0Y2E0Nzg5NjQ1ZTgyZjUwOGUwNA==" />
</form>
<script>
document.getElementById('myform').submit();
</script>
</body>
</html>
in a html file, I then get the html augmented:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" class="login-pf">
<head>
<meta charset="utf-8">
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<meta name="robots" content="noindex, nofollow">
<meta name="viewport" content="width=device-width,initial-scale=1" />
<title> Log in to vpgrp
</title>
<link rel="icon" href="/auth/resources/3.4.3.final/login/vpgrp-ssoco/img/favicon.png" />
<link href="/auth/resources/3.4.3.final/login/vpgrp-ssoco/lib/zocial/zocial.css" rel="stylesheet" />
<link href="/auth/resources/3.4.3.final/login/vpgrp-ssoco/css/typography.css" rel="stylesheet" />
<link href="/auth/resources/3.4.3.final/login/vpgrp-ssoco/css/login.css" rel="stylesheet" />
<script src="/auth/resources/3.4.3.final/login/vpgrp-ssoco/js/script.js" type="text/javascript"></script>
<SCRIPT>
if (typeof history.replaceState === 'function') {
history.replaceState({}, "some title", "https://ssoco.platform.vpgrp.net/auth/realms/vpgrp/login-actions/authenticate?execution=cfed83a7-1a4c-4ff5-9fdd-4ca9d171c8b5&client_id=https%3A%2F%2Fvpn.veepee.tech%3A443%2FSAML20%2FSP&tab_id=88hvehNt6ug");
}
</SCRIPT>
</head>
<body class="">
<div id="kc-container" class="">
<div id="kc-container-wrapper" class="">
<div class="bgrd-overlay"></div>
<div class="kc-container-centered">
<div id="kc-content" class="col-sm-12 col-md-12 col-lg-12 container">
<div id="kc-content-wrapper" class="row">
<div id="kc-form" class="col-xs-12 col-sm-8 col-md-8 col-lg-7 login">
<div id="kc-header" class="col-xs-12 col-sm-8 col-md-8 col-lg-7">
<div class="kc-header-bg-blur"></div>
<div id="kc-header-wrapper" class="">
<header role="banner">
<h1 id="logoVp" style="background-image: url(/auth/resources/3.4.3.final/login/vpgrp-ssoco/img/veepee_black.png)"></h1>
</header>
</div>
</div>
<div id="kc-form-wrapper" class="">
<form id="kc-form-login" class="form-horizontal" onsubmit="login.disabled = true; return true;" action="https://ssoco.platform.vpgrp.net/auth/realms/vpgrp/login-actions/authenticate?code=X8eiFlBIt2COfU1oRld5SzKwaLkzzkGYpI_ouZqm7No&execution=cfed83a7-1a4c-4ff5-9fdd-4ca9d171c8b5&client_id=https%3A%2F%2Fvpn.veepee.tech%3A443%2FSAML20%2FSP&tab_id=88hvehNt6ug" method="post">
<div class="separator"></div>
<div class="kc-form-login-inner">
<div class="form-group input-wrap">
<input tabindex="1" id="username" class="form-control" name="username" value="" type="text" autofocus autocomplete="off" placeholder="Username or Email" />
</div>
<div class="form-group input-wrap">
<input tabindex="2" id="password" class="form-control" name="password" type="password" autocomplete="off" placeholder="Password" />
</div>
</div>
<div class="form-group">
<div id="kc-form-buttons" class="col-xs-8 col-sm-7 col-md-4 col-lg-4 submit">
<div class=" login-button">
<input tabindex="4" class="btn-primary-vp" name="login" id="kc-login" type="submit" value="Log in" />
</div>
</div>
<div id="kc-form-options" class="col-xs-4 col-sm-5 col-md-offset-4 col-md-4 col-lg-offset-3 col-lg-5">
<div class="checkbox">
<a class="checkbox-inner"></a>
<input tabindex="3" onclick="handleCheckboxChange()" id="rememberMe" name="rememberMe" type="checkbox" tabindex="3">
<label for="rememberMe" id="rememberMe">Remember me</label>
</div>
<div class="clear form-options-wrapper">
</div>
</div>
</div>
</form>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<footer>
<section>
</section>
</footer>
</body>
</html>
Wondering if two field names can be specified instead of one?
Namely: username
and password
Wondering if two field names can be specified instead of one?
Namely:
username
andpassword
In short: no.
The form that prelogin.esp
is sending you is not a "normal" GlobalProtect login form with differently-named fields. Submitting it with the right values won't get you the normal GlobalProtect authcookie
for VPN tunnel connection purposes.
It's a whole ’nother beast/layer that's somewhat outside the scope of what OpenConnect currently handles in terms of authentication.
For now (as of OpenConnect v8.03), you need to use or write a wrapper script that will do the SAML authentication, figure out what kind of cookie the SAML authentication produces, and then pass that to openconnect (along with the field name of that output cookie, often portal-userauthcookie
or something like that).
If you need to write a script to handle this case, I'd probably suggest starting with pan-globalprotect-okta wrapper.
However, in some ways I prefer the style of my own smxlogin, which interfaces with openconnect
in a way that's closer to `openconnect --authenticate; it does the authentication process, and then outputs a set of shell variables that can be passed to openconnect to make the actual connection.
Alright thanks, that makes things a lil' more clear now. Will probably update this thread with my findings.
Again, thank you!
Alright was busy with windows for a while.
@dlenski I automated the whole saml thing in Python (it takes username, password + generated code on the smartphone app) and ended up with that last 2 responses, respectively:
<HTML>
<HEAD>
<TITLE>SAML HTTP Post Binding</TITLE>
<SCRIPT>
if (typeof history.replaceState === 'function') {
history.replaceState({}, "some title", "https://[another-corporate-url]/auth/realms/vpgrp/login-actions/authenticate?client_id=https%3A%2F%2Fvpn.[my-company-url]%3A443%2FSAML20%2FSP&tab_id=E14BCom1yVk");
}
</SCRIPT>
</HEAD>
<BODY Onload="document.forms[0].submit()">
<FORM METHOD="POST" ACTION="https://vpn.[my-company-url]:443/SAML20/SP/ACS">
<INPUT TYPE="HIDDEN" NAME="SAMLResponse" VALUE="<samlp:Response xmlns:samlp="urn:oasis:names:tc:SAML:2.0:protocol" xmlns:saml="urn:oasis:names:tc:SAML:2.0:assertion" Destination="https://vpn.veepee.tech:443/SAML20/SP/ACS" ID="ID_ea3c7192-3a21-46f4-b431-e7d115817191" InResponseTo="_ee1a2d41936b5a4c201873313b370588" IssueInstant="2019-08-22T20:30:44.856Z" Version="2.0"><saml:Issuer>https://ssoco.platform.vpgrp.net/auth/realms/vpgrp</saml:Issuer><dsig:Signature xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><dsig:SignedInfo><dsig:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><dsig:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><dsig:Reference URI="#ID_ea3c7192-3a21-46f4-b431-e7d115817191"><dsig:Transforms><dsig:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><dsig:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></dsig:Transforms><dsig:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><dsig:DigestValue>TDDsGSeHjcHAulz4yYGwTL/a/LcwR1/Qg84hItqd+D4=</dsig:DigestValue></dsig:Reference></dsig:SignedInfo><dsig:SignatureValue>CfqmgXYKMg9ILmh5Ko1flQu0PHmNGTlUg3hf7q3Kkihe9cyzDG3OGF5zjJhFi8BdWXIXEgUSJafgCvjWOUvk8GTjFjqKV4OLCK2+JHQ0DOerOHb3dr2gn6vh++EqzIX9ffzGiJM+LzccyaCPJU0g688FpEbNLDv7X+rf5rrMfMQRUWh3mN+vkBnP+Krv8b1UekRaoL/Sz9BiE0+jaWd5a6k3d9OHtNDOW+vtbi9z/L931pdAXYGzhmKeJCSkV3ky1U+q77J1NxIocj8ovVwYwIaf666UW2qGdujFgh/XdxWXXPu5xhSrlfVEmXEdVPB+cH+hwMRQSxW5JnkJCpiN+Q==</dsig:SignatureValue><dsig:KeyInfo><dsig:KeyName>CN=vpgrp</dsig:KeyName><dsig:X509Data><dsig:X509Certificate>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</dsig:X509Certificate></dsig:X509Data><dsig:KeyValue><dsig:RSAKeyValue><dsig:Modulus>pkKdHXjbgyowlRAYQPDZLGKp/QJ6lS2QoIdBKOatMorfotJfPwc+SiwTLmvb/Rw2rcmxai0fruJIyjsnwWyHjcGtj2Z4Q5bPZfg0qIx5jaENH6dK+owcaACfWumfgJwlBN8SY9VJmm1vZNt5aRxJyuI1yvYcZs4d2EWvP94494TXjhftGMDGIehRRhG7mJKHB4cpOfLcb4A04EFhkuZdMICVMTf1LjkWz+YCYqvJB51jmDPWm0DoCtY91nE+4ouMgJrBDqiHyBDwAw9qi3zhWIpLs80Thxlk9tJ8DiFujX7smDLUTjxV6PxKBZ1qnZaWC/xQhz7MH71VkcUvf8XzVQ==</dsig:Modulus><dsig:Exponent>AQAB</dsig:Exponent></dsig:RSAKeyValue></dsig:KeyValue></dsig:KeyInfo></dsig:Signature><samlp:Status><samlp:StatusCode Value="urn:oasis:names:tc:SAML:2.0:status:Success"/></samlp:Status><saml:Assertion xmlns="urn:oasis:names:tc:SAML:2.0:assertion" ID="ID_f04e69b1-f9e1-483d-bc74-246f4a1a7639" IssueInstant="2019-08-22T20:30:44.856Z" Version="2.0"><saml:Issuer>https://ssoco.platform.vpgrp.net/auth/realms/vpgrp</saml:Issuer><dsig:Signature xmlns:dsig="http://www.w3.org/2000/09/xmldsig#"><dsig:SignedInfo><dsig:CanonicalizationMethod Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/><dsig:SignatureMethod Algorithm="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256"/><dsig:Reference URI="#ID_f04e69b1-f9e1-483d-bc74-246f4a1a7639"><dsig:Transforms><dsig:Transform Algorithm="http://www.w3.org/2000/09/xmldsig#enveloped-signature"/><dsig:Transform Algorithm="http://www.w3.org/2001/10/xml-exc-c14n#"/></dsig:Transforms><dsig:DigestMethod Algorithm="http://www.w3.org/2001/04/xmlenc#sha256"/><dsig:DigestValue>TAepFfKvXDIYvBkVWL3l4cZSz8W41rvYq5b3ujuDt3I=</dsig:DigestValue></dsig:Reference></dsig:SignedInfo><dsig:SignatureValue>fCEx2l7asvXkkv3T+/D2KxFe/Se/IdJ8RC/vrGcBiRl8Xr2XvHkZb/PMmSoDuRatM2AHI/SltwSdIwWlH7rLwW94SHau7XIx5bFhqMSSOICGDSKdEa/IL3HN3mp15P+my1ea+ZixEgcmTPQa46tWOP1KHkP3h1cBSIzInfIf0/L3G3KjZMvKJGu3y+iecr6z2NNgU9V4Ve3NBvQh4bYN24udSAlqtHif9yeos4G4TqGanBQXY2zviEKoU87I+LLKiLlarjmkUtngqsCdEYIzCXocJ8hyiPv1vBJ+8Mv272vTTIhBZ04qmSlljeilHwR+wEUoOKp4BG3qp5+b9ngsyA==</dsig:SignatureValue><dsig:KeyInfo><dsig:KeyName>CN=vpgrp</dsig:KeyName><dsig:X509Data><dsig:X509Certificate>MIICmTCCAYECBgFlQf1wdTANBgkqhkiG9w0BAQsFADAQMQ4wDAYDVQQDDAV2cGdycDAeFw0xODA4MTYwOTA1NTNaFw0yODA4MTYwOTA3MzNaMBAxDjAMBgNVBAMMBXZwZ3JwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApkKdHXjbgyowlRAYQPDZLGKp/QJ6lS2QoIdBKOatMorfotJfPwc+SiwTLmvb/Rw2rcmxai0fruJIyjsnwWyHjcGtj2Z4Q5bPZfg0qIx5jaENH6dK+owcaACfWumfgJwlBN8SY9VJmm1vZNt5aRxJyuI1yvYcZs4d2EWvP94494TXjhftGMDGIehRRhG7mJKHB4cpOfLcb4A04EFhkuZdMICVMTf1LjkWz+YCYqvJB51jmDPWm0DoCtY91nE+4ouMgJrBDqiHyBDwAw9qi3zhWIpLs80Thxlk9tJ8DiFujX7smDLUTjxV6PxKBZ1qnZaWC/xQhz7MH71VkcUvf8XzVQIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQBtkoQikmkBai4NSq7sJDVU7j8jKCNBnZsiffOB2fk9f1Q6+OL6s07pf750cPe2y3T+HgcAs+2jLKVL2vdu7zzz6hEw+Ku4gnS5cGyBCKoUw68fpwyaNiJXGI8Gw8/8Vi0735OMKhkDPRUZLFhMhIDVtPulJPUUnyPAu2tB/jAR8wM56yPqV+atI5w4SY1mBsxvav8SamAqX+VWX7LIT1flgxOH88sFkTrINRIaG9pgz1sPIBNNk6rg3w3+HZRvyjXDwncbL0ygqLoPwLanrN5WIPE/acL1PbuLv/EKTpFBVZvm4Zs53zhNmL313YEDe+Ux91onjyNN8hHRqJ8kczqn</dsig:X509Certificate></dsig:X509Data><dsig:KeyValue><dsig:RSAKeyValue><dsig:Modulus>pkKdHXjbgyowlRAYQPDZLGKp/QJ6lS2QoIdBKOatMorfotJfPwc+SiwTLmvb/Rw2rcmxai0fruJIyjsnwWyHjcGtj2Z4Q5bPZfg0qIx5jaENH6dK+owcaACfWumfgJwlBN8SY9VJmm1vZNt5aRxJyuI1yvYcZs4d2EWvP94494TXjhftGMDGIehRRhG7mJKHB4cpOfLcb4A04EFhkuZdMICVMTf1LjkWz+YCYqvJB51jmDPWm0DoCtY91nE+4ouMgJrBDqiHyBDwAw9qi3zhWIpLs80Thxlk9tJ8DiFujX7smDLUTjxV6PxKBZ1qnZaWC/xQhz7MH71VkcUvf8XzVQ==</dsig:Modulus><dsig:Exponent>AQAB</dsig:Exponent></dsig:RSAKeyValue></dsig:KeyValue></dsig:KeyInfo></dsig:Signature><saml:Subject><saml:NameID Format="urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified">eperret</saml:NameID><saml:SubjectConfirmation Method="urn:oasis:names:tc:SAML:2.0:cm:bearer"><saml:SubjectConfirmationData InResponseTo="_ee1a2d41936b5a4c201873313b370588" NotOnOrAfter="2019-08-22T20:35:42.856Z" Recipient="https://vpn.veepee.tech:443/SAML20/SP/ACS"/></saml:SubjectConfirmation></saml:Subject><saml:Conditions NotBefore="2019-08-22T20:30:42.856Z" NotOnOrAfter="2019-08-22T20:31:42.856Z"><saml:AudienceRestriction><saml:Audience>https://vpn.veepee.tech:443/SAML20/SP</saml:Audience></saml:AudienceRestriction></saml:Conditions><saml:AuthnStatement AuthnInstant="2019-08-22T20:30:44.856Z" SessionIndex="f7cd2c98-55a3-41e0-bd60-40b6cbb2df76::9176ed85-0c86-4f4b-b3db-f04f64a13871"><saml:AuthnContext><saml:AuthnContextClassRef>urn:oasis:names:tc:SAML:2.0:ac:classes:unspecified</saml:AuthnContextClassRef></saml:AuthnContext></saml:AuthnStatement><saml:AttributeStatement><saml:Attribute FriendlyName="username" Name="username" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">eperret</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Office365_E3</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">uma_authorization</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Support_Compta</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Utilisateurs PAPIC PP</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Utilisateurs PAPIC</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">manage-account-links</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Gsuite_Business</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">Utilisateurs PAPIC R7</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">admin</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">team_revmgt</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">view-profile</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">wifi_access_user</saml:AttributeValue></saml:Attribute><saml:Attribute FriendlyName="groups" Name="groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:basic"><saml:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">External_Users</saml:AttributeValue></saml:Attribute></saml:AttributeStatement></saml:Assertion></samlp:Response>" />
<INPUT TYPE="HIDDEN" NAME="RelayState" VALUE="HUEAANn0plxhMDU2ZjU3OTI5OGEwNDQzN2VjZmYyZjgzNzYwMzc5Yg==" />
<NOSCRIPT>
<P>JavaScript is disabled. We strongly recommend to enable it. Click the button below to continue.</P>
<INPUT TYPE="SUBMIT" VALUE="CONTINUE" />
</NOSCRIPT>
</FORM>
</BODY>
</HTML>
b'<html><body>Login Successful!</body><!-- <saml-auth-status>1</saml-auth-status><prelogin-cookie>aQmKLyaqRGRmDsPjqj5Avk70WCoiK/I8MyxafyAXgizEwYteadDhRSAQ52dVZzTE</prelogin-cookie><saml-username>eperret</saml-username><saml-slo>no</saml-slo> --></html>'
Not too sure though, if the cookie you mentionned (portal-userauthcookie
) here is prelogin-cookie
, that kind of semantic looks odd to me.
I also have some session cookies:
<RequestsCookieJar[
<Cookie AUTH_SESSION_ID=2e91e21a-4540-458c-94dc-59397753d49b.ssoco-kck-fc5f1 for [another-corporate-url]/auth/realms/vpgrp>,
<Cookie KEYCLOAK_IDENTITY=eyJhbGciOiJIUzI1NiIsImtpZCIgOiAiYmI3NTg5ZWYtN2E0ZC00NDMxLTg1ODctYjA4MTc1MzI1MGU5In0.eyJqdGkiOiI3NzRhODk1ZS03ZDg0LTRjMmQtYTBiMi00ZjcyODg4ZjlkYTciLCJleHAiOjE1Njc4MDY3MzUsIm5iZiI6MCwiaWF0IjoxNTY2NTEwNzM1LCJpc3MiOiJodHRwczovL3Nzb2NvLnBsYXRmb3JtLnZwZ3JwLm5ldC9hdXRoL3JlYWxtcy92cGdycCIsInN1YiI6IjM2MGM4YmRmLWU5OWItNDUxYy1hYjczLTNjMTU5MzNkMjRlMSIsImF1dGhfdGltZSI6MCwic2Vzc2lvbl9zdGF0ZSI6IjJlOTFlMjFhLTQ1NDAtNDU4Yy05NGRjLTU5Mzk3NzUzZDQ5YiIsInJlc291cmNlX2FjY2VzcyI6e30sInN0YXRlX2NoZWNrZXIiOiJTSFpWd1lkUDNLNjR0V0JQaC1jWXhwTGJkTkJ5c1BCVnVDeXdtc0tka0lzIn0.G-Bt4I42MHAykNZYJwjfTJ68hUEvqn4LOPTaHf9fm1s for [another-corporate-url]/auth/realms/vpgrp>,
<Cookie KEYCLOAK_SESSION=vpgrp/360c8bdf-e99b-451c-ab73-3c15933d24e1/2e91e21a-4540-458c-94dc-59397753d49b for [another-corporate-url]/auth/realms/vpgrp>,
<Cookie PHPSESSID=b755afc7f0b82dfb2e79fb48759f1306 for vpn.[my-company-url]/>,
<Cookie PHPSESSID=b755afc7f0b82dfb2e79fb48759f1306 for vpn.[my-company-url]/global-protect>
]>
Not sure which one is the right one, could not find any portal-userauthcookie
Btw, is there any release of the window binaries available, can't really find them (not talking about the gui, but the CLI)
Read this, insightful: https://github.com/dlenski/openconnect/blob/globalprotect/PAN_GlobalProtect_protocol_doc.md
I sniffed and analysed the different calls from the official windows client with Fiddler to the extent could.
I managed to make it work with the script below, this if obviously a bit company specific (ie. SAML) but hope it can help someone when trying willing to use openconnect with a Global Protect VPN that requires a prior SAML auth before actually using openconnect.
import base64
import subprocess
import sys
import requests
from robobrowser import RoboBrowser
import xml.etree.ElementTree as ET
# Your data... here
# (need to be changed accordingly to your needs)
username = "my username"
password = "my password"
smartphone_code = "the smartphone app code"
# Get my good old friend: the web scraper
browser = RoboBrowser(parser="html.parser", history=True)
vpn_portal_url = "my vpn portal"
vpn_prelogin_url = "https://{0}/global-protect/prelogin.esp".format(vpn_portal_url)
# Required, otherwise Palo Alto is not gonna be your friend with some of the requests below
browser.session.headers["User-Agent"] = "PAN GlobalProtect"
# Submit SAML Request Form
browser.open(vpn_prelogin_url)
prelogin_response_xml = ET.fromstring(browser.response.text)
saml_request = prelogin_response_xml.find(".//saml-request")
saml_request_raw = base64.b64decode(saml_request.text)
# Dirty but saves you from playing with a few parsing operations
# => just to fetch the form and submit it
saml_request_fake_response = requests.Response()
saml_request_fake_response._content = saml_request_raw
browser._update_state(saml_request_fake_response)
saml_request_form = browser.get_form("myform")
browser.submit_form(saml_request_form)
# Submit the login form (username + password)
login_form = browser.get_form("kc-form-login")
login_form["username"].value = username
login_form["password"].value = password
browser.submit_form(login_form)
# Submit the smartphone code form
code_form = browser.get_form("kc-totp-login-form")
code_form["totp"].value = smartphone_code
submit = code_form["login"]
browser.submit_form(code_form, submit=submit)
# End the SAML process gracefully
saml_response_form = browser.get_forms()[0]
browser.submit_form(saml_response_form)
prelogin_cookie = browser.response.headers["prelogin-cookie"]
# Now we can get our cookie that will act as an openconnect password
vpn_get_config_url = "https://{0}/global-protect/getconfig.esp".format(vpn_portal_url)
vpn_get_config_data = {
"user": username,
"prelogin-cookie": prelogin_cookie,
}
browser.open(vpn_get_config_url, method="post", data=vpn_get_config_data)
config_response_xml = ET.fromstring(browser.response.text)
portal_userauthcookie = config_response_xml.find(".//portal-userauthcookie").text
# Call openconnect with the cookie / password we got above
cmd = "echo \"{}\"".format(portal_userauthcookie)
cmd += " |"
cmd += " sudo openconnect"
cmd += " --protocol=gp"
cmd += " --usergroup portal:portal-userauthcookie"
cmd += " --user={}".format(username)
cmd += " {}".format(vpn_portal_url)
process = subprocess.Popen(cmd, shell=True, stdin=sys.stdin, stdout=sys.stdout, stderr=sys.stderr)
out, err = process.communicate()
Bien joué. :ok_hand:
It looks like the SAML process for your GP VPN is somewhat simpler than for others which are based on SAML (like Okta).
I would like to make OpenConnect “just work” with any SAML-based login, but unfortunately there seem to be a huge number of variants, and it doesn't appear to me that the correct behavior with any given SAML implementation is in any way “discoverable” by the client… and definitely not without a full-blown browser implementing JavaScript. :face_with_head_bandage:
@dlenski to be frank, the implementations for Okta available on GitHub seem to be overkill, I might be wrong but at first when I was trying to figure what to do I was following that track and man the code to do the SAML was huuuuge.
I am definitely not a professional Pythonista but I can see when a code has inflated a bit too much (particularly when a different kind of scrapper can be used at some point instead of doing everything with requests
, some parsing part also overkilled).
About the SAML based login, yea depends on... the implementation to say the least, so that would be tough to make some generic =/
Agreed that some SAML may even play hard with some dirty JS =/ which does not help =/
I am trying to connect to a corporate vpn using openconnect (protocol Global Protect):
I am not too sure about this part:
I thought it would be something like that:
But as you can see, it does not work either.
Any idea?
It might be related to this piece of the source code: https://github.com/dlenski/openconnect/blob/master/auth-globalprotect.c#L91