Closed howey closed 6 years ago
However, I encountered this same behavior on my official Windows machine, and the way I was able to resolve that was by updating my virus protection. I believe that this issue is caused by the server caring about HIP information.
It sounds like you are probably right :frowning_face:.
I haven't put much effort into handling the HIP data collection because I haven't needed it personally, and doing it successfully is going to require collecting (or mimicking) a whole bunch of information about the client, which may additionally vary from VPN to VPN in ways that I don't understand.
Patches or a standalone script to do to the HIP tap-dance would be welcome… unfortunately, I'm not sure when I'll have time to work on it myself.
I have a script to report the HIP to the Gateway. It's simple and very straight forward. I'll fix it so that it takes the authentication cookie automatically.
Basically the works is like this: You connect to the portal and download the gateways, then you connect to any gateway you choose, you'll receive an authentication cookie which you must use to report your HIP. Then the HIP report is just an xml reporting the things you have in your pc. It just doesn't work, because you can report any HIP you want.
I'll post the script in a moment to the repo.
I'll post the script in a moment to the repo.
This is freakin' amazing! Can't wait to try it out.
I've added a pull request with a spoofer. PaloAlto says it's a feature so....
@howey, does @videlanicolas's HIP-spoofer script work for you?
It's working for me and I'm going to start integrating it so that it'll be called automatically by openconnect
.
See hipreport
branch.
I actually don't have access to this VPN anymore, so I'm not able to reproduce my original issue and I'm not in a position to verify a fix.
On Nov 1, 2017 1:27 AM, "Dan Lenski" notifications@github.com wrote:
@howey https://github.com/howey, does @videlanicolas https://github.com/videlanicolas's HIP-spoofer script work for you?
It's working for me and I'm going to start integrating it so that it'll be called automatically by openconnect.
See hipreport branch https://github.com/dlenski/openconnect/tree/hipreport.
— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub https://github.com/dlenski/openconnect/issues/36#issuecomment-341001643, or mute the thread https://github.com/notifications/unsubscribe-auth/AEjmKym3hPzEpZ_lCj69NJUbTKpCRiZ7ks5syA9fgaJpZM4NzZ-g .
@dlenski thanks for that update on the script! Do you have a sample XML to try it out? I am working on a script to build a hip report of your own. I'll post it this week.
@videlanicolas, that's great. I've been meaning to do the same. I've captured working HIP files from the Windows client logs as well as via mitmproxy.
Here's the basic sketch of the XML that my HIP-requiring GP VPN accepts. I can't figure out what the md5sum is the md5sum of, but the good news is that it doesn't seem to matter; the GP server doesn't validate it independently, but only uses it to check whether has changed from one request to the next of hipreportcheck.py
for a given IP.
My VPN's HIP checker seems to be particularly stupid, in that it requires the host-ID to match a specific value, but doesn't validate much of anything else. The generate-time can be set to several years ago, and I can tell it a different md5sum every time, and it still works. Others may be pickier.
<hip-report name="hip-report">
<md5-sum>$MD5SUM</md5-sum>
<user-name>$USER</user-name> <!-- this is the user from the GP login.esp response -->
<domain>$DOMAIN</domain><!-- this is the domain from the GP login.esp response -->
<host-name>$LOCALHOSTNAME</host-name><!-- this is the hostname of the login request -->
<!-- Host ID looks like an md5sum, with - inserted after the 8th, 12th, 16th, 24th characters.
It is used by at least some VPNs to deny access to non-matching hosts-->
<host-id>$HOSTID</host-id>
<!-- These are the IP addresses of the PanGP tunnel network interface, returned in the getconfig.esp response -->
<ip-address>$CLIENTIPV4ADDRESS</ip-address>
<ipv6-address>$CLIENTIPV4ADDRESS</ipv6-address>
<!-- Generate time has the strftime format of "%m/%d/%Y %H:%M:%S" -->
<generate-time>$GENTIME</generate-time>
<categories>
<entry name="host-info">
<client-version>4.0.2-19</client-version>
<os>Microsoft Windows 10 Pro , 64-bit</os>
<os-vendor>Microsoft</os-vendor>
<domain>${DOMAIN}.internal</domain>
<host-name>$LOCALHOSTNAME</host-name>
<host-id>$HOSTID</host-id>
<network-interface>
<entry name="...">
<description>PANGP Virtual Ethernet Adapter</description>
<mac-address>aa-bb-cc-dd-ee-ff</mac-address>
<ip-address>
<entry name="$CLIENTIPV4ADDRESS"/>
</ip-address>
<ipv6-address>
<entry name="$CLIENTIPV6ADDRESS"/>
</ipv6-address>
</entry>
...
</network-interface>
</entry>
<entry name="antivirus">
<list>
<entry>
<ProductInfo>
<Prod name="McAfee VirusScan Enterprise" version="8.8.0.1804" defver="8682.0" prodType="1" engver="5900.7806" osType="1" vendor="McAfee, Inc." dateday="12" dateyear="2017" datemon="10">
</Prod>
<real-time-protection>yes</real-time-protection>
<!-- Same format as generate time -->
<last-full-scan-time>$TIMESTAMP</last-full-scan-time>
</ProductInfo>
</entry>
<entry>
<ProductInfo>
<Prod name="Windows Defender" version="4.11.15063.332" defver="1.245.683.0" prodType="1" engver="1.1.13804.0" osType="1" vendor="Microsoft Corp." dateday="8" dateyear="2017" datemon="6">
</Prod>
<real-time-protection>no</real-time-protection>
<last-full-scan-time>n/a</last-full-scan-time>
</ProductInfo>
</entry>
</list>
</entry>
<entry name="anti-spyware">
<list>
<entry>
<ProductInfo>
<Prod name="McAfee VirusScan Enterprise" version="8.8.0.1804" defver="8682.0" prodType="2" engver="5900.7806" osType="1" vendor="McAfee, Inc." dateday="12" dateyear="2017" datemon="10">
</Prod>
<real-time-protection>yes</real-time-protection>
<last-full-scan-time>$TIMESTAMP/last-full-scan-time>
</ProductInfo>
</entry>
<entry>
<ProductInfo>
<Prod name="Windows Defender" version="4.11.15063.332" defver="1.245.683.0" prodType="2" engver="1.1.13804.0" osType="1" vendor="Microsoft Corp." dateday="8" dateyear="2017" datemon="6">
</Prod>
<real-time-protection>no</real-time-protection>
<last-full-scan-time>n/a</last-full-scan-time>
</ProductInfo>
</entry>
</list>
</entry>
<entry name="disk-backup">
<list>
<entry>
<ProductInfo>
<Prod name="Windows Backup and Restore" version="10.0.15063.0" vendor="Microsoft Corp.">
</Prod>
<last-backup-time>n/a</last-backup-time>
</ProductInfo>
</entry>
</list>
</entry>
<entry name="disk-encryption">
<list>
<entry>
<ProductInfo>
<Prod name="Windows Drive Encryption" version="10.0.15063.0" vendor="Microsoft Corp.">
</Prod>
<drives>
<entry>
<drive-name>C:</drive-name>
<enc-state>full</enc-state>
</entry>
</drives>
</ProductInfo>
</entry>
</list>
</entry>
<entry name="firewall">
<list>
<entry>
<ProductInfo>
<Prod name="Microsoft Windows Firewall" version="10.0" vendor="Microsoft Corp.">
</Prod>
<is-enabled>yes</is-enabled>
</ProductInfo>
</entry>
</list>
</entry>
<entry name="patch-management">
<list>
<entry>
<ProductInfo>
<Prod name="McAfee ePolicy Orchestrator Agent" version="5.0.5.658" vendor="McAfee, Inc.">
</Prod>
<is-enabled>yes</is-enabled>
</ProductInfo>
</entry>
<entry>
<ProductInfo>
<Prod name="Microsoft Windows Update Agent" version="10.0.15063.0" vendor="Microsoft Corp.">
</Prod>
<is-enabled>yes</is-enabled>
</ProductInfo>
</entry>
</list>
<missing-patches>
<entry>
<title>AMD - Other hardware - PCI bus</title>
<description>AMD Other hardware software update released in February, 2015</description>
<product>Windows 10 and later drivers</product>
<vendor>Microsoft Corporation</vendor>
<info-url>http://sysdev.microsoft.com/support/default.aspx</info-url>
<kb-article-id/>
<security-bulletin-id/>
<severity>0</severity>
<category>4</category>
<is-installed>no</is-installed>
</entry>
...
</missing-patches>
</entry>
<entry name="data-loss-prevention">
<list/>
</entry>
</categories>
</hip-report>
Hi! I'm having the same issue, how did you fix it? Thanks
@luciavmf, please read the documentation on HIP report submission using OpenConnect v8.*, and +submit a new issue+ with detailed logs if you are then still having a problem with OpenConnect 8.0+.
Problem description
openconnect --protocol=gp
The authentication is successful, but I cannot connect to any hosts or resolve any hostnames.
The symptoms are the same as in #15, but the solution to #15 does not solve my issue.
However, I encountered this same behavior on my official Windows machine, and the way I was able to resolve that was by updating my virus protection. I believe that this issue is caused by the server caring about HIP information.
Operating system and openconnect-gp version
openconnect-gp version:
operating system
GlobalProtect VPN information