Initial commit
This commit is contained in:
commit
384fb4805f
|
@ -0,0 +1,13 @@
|
||||||
|
|
||||||
|
# Where should i send the readings?
|
||||||
|
SERVER = 'http://127.0.0.1:8188/nfc/read'
|
||||||
|
|
||||||
|
# Should i verify the nfc tags (authenticating password)?
|
||||||
|
SECURE = False
|
||||||
|
|
||||||
|
# Is this a boopbox?
|
||||||
|
BOOPBOX_ID = None
|
||||||
|
|
||||||
|
# This is used to verify the tags
|
||||||
|
SALT = b"This is used to generate the password that will be used to encrypt/verify each tag"
|
||||||
|
ITERATIONS = 10000
|
|
@ -0,0 +1,91 @@
|
||||||
|
import nfc
|
||||||
|
from nfc.clf import RemoteTarget
|
||||||
|
import httpx
|
||||||
|
import logging
|
||||||
|
import binascii
|
||||||
|
from base64 import b16encode
|
||||||
|
from os.path import join
|
||||||
|
from config import *
|
||||||
|
from time import sleep
|
||||||
|
from hashlib import sha3_512
|
||||||
|
|
||||||
|
import coloredlogs
|
||||||
|
coloredlogs.install()
|
||||||
|
|
||||||
|
def password(tag):
|
||||||
|
x = tag.identifier
|
||||||
|
for i in range(ITERATIONS):
|
||||||
|
x = sha3_512(x + SALT).digest()
|
||||||
|
return x[:6]
|
||||||
|
|
||||||
|
CONFIG_PAGES = {
|
||||||
|
"NXP NTAG213": (0x29, 0x2A, 0x2B, 0x2C),
|
||||||
|
"NXP NTAG215": (0x83, 0x84, 0x85, 0x86),
|
||||||
|
"NXP NTAG216": (0xE3, 0xE4, 0xE5, 0xE6),
|
||||||
|
}
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
log = logging.getLogger('nfc')
|
||||||
|
clf = nfc.ContactlessFrontend()
|
||||||
|
|
||||||
|
try:
|
||||||
|
assert clf.open('tty:USB0:pn532')
|
||||||
|
except TimeoutError:
|
||||||
|
log.error('Got TimeoutError on reader connection attempt.')
|
||||||
|
except AssertionError:
|
||||||
|
log.error('There is no reader connected.')
|
||||||
|
exit()
|
||||||
|
|
||||||
|
# Set baud rate to 115200 to prevent reader from dying
|
||||||
|
clf.device.chipset.set_serial_baudrate(115200)
|
||||||
|
clf.device.chipset.transport.baudrate = 115200
|
||||||
|
|
||||||
|
try:
|
||||||
|
while 1:
|
||||||
|
target = clf.sense(RemoteTarget('106A'), iterations=10, delay=0.1)
|
||||||
|
if not target: continue
|
||||||
|
|
||||||
|
count = None
|
||||||
|
tag_id = target.sdd_res
|
||||||
|
is_secure = False
|
||||||
|
|
||||||
|
if not BOOPBOX_ID:
|
||||||
|
try:
|
||||||
|
tag = nfc.tag.activate(clf, target)
|
||||||
|
except:
|
||||||
|
log.error(f"TAG {tag_id} is gone.")
|
||||||
|
continue
|
||||||
|
|
||||||
|
try:
|
||||||
|
if SECURE and tag.product == "NXP NTAG215":
|
||||||
|
has_password = tag.read(CONFIG_PAGES[tag.product][0])[3] < 0xFF
|
||||||
|
|
||||||
|
if has_password:
|
||||||
|
psw = password(tag)
|
||||||
|
if tag.authenticate(psw):
|
||||||
|
is_secure = True
|
||||||
|
except:
|
||||||
|
log.error("Couldn't verify tag.")
|
||||||
|
|
||||||
|
# Try to get the read count as well.
|
||||||
|
try:
|
||||||
|
if tag.product == "NXP NTAG215":
|
||||||
|
count = tag.transceive(binascii.unhexlify('3902'), timeout=0.05) # READ_CNT command
|
||||||
|
count = int.from_bytes(count, byteorder='little')
|
||||||
|
except nfc.tag.tt2.Type2TagCommandError:
|
||||||
|
log.error("Tag count is enabled, couldn't get a response")
|
||||||
|
except AttributeError:
|
||||||
|
log.error("Lost connection to tag...")
|
||||||
|
|
||||||
|
try:
|
||||||
|
res = httpx.post(SERVER, json={'id': b16encode(tag_id).decode(), 'is_secure': is_secure, 'count': count, 'boopbox_id': BOOPBOX_ID})
|
||||||
|
except Exception as e:
|
||||||
|
log.error(e)
|
||||||
|
else:
|
||||||
|
log.info(f"Booped {b16encode(tag_id).decode()} (secure = {is_secure}) (count = {count})")
|
||||||
|
|
||||||
|
while clf.sense(RemoteTarget('106A')): sleep(0.1)
|
||||||
|
|
||||||
|
except KeyboardInterrupt:
|
||||||
|
clf.close()
|
||||||
|
|
|
@ -0,0 +1,16 @@
|
||||||
|
# Boopbox/POS NFC Client
|
||||||
|
|
||||||
|
This is a simple script that implements an "HTTP Client" that will send every read NFC tag to an http server.
|
||||||
|
Additionally, it is possible to set the reader as "secure" and this will - other than verify the id of the tag - also try to authenticate the originality of it.
|
||||||
|
|
||||||
|
## What reader?
|
||||||
|
|
||||||
|
The used reader is a raw PN532 connected through a CH430 to usb. The baud rate is immediately set to 115200 to prevent the reader from entering a "locked" state in case of connection loss with the nfcpy library. Setting the baud rate to 115200 makes sure the chip is always available to init again.
|
||||||
|
|
||||||
|
## How do you generate the password?
|
||||||
|
|
||||||
|
The password is generated by hashing the NFC identifier with a SALT numerous times, and then truncating the resulting hash. The nfc cards we used (NDEF213, 215) only supported 6 byte passwords.
|
||||||
|
|
||||||
|
## What is the read count?
|
||||||
|
|
||||||
|
During provisioning we enabled the read count of the NFC tags. This is a non-tearing read-only register which gets increased by 1 every time there is a successful ACTIVATE command (aka the chip is read correctly). This was used for statistical and anti-tampering purposes.
|
Loading…
Reference in New Issue