Software /
code /
prosody-modules
Changeset
1062:f853a1a3aa15
mod_auth_ccert: Initial commit of authentication module for using CA-issued client certificates
author | Kim Alvefur <zash@zash.se> |
---|---|
date | Thu, 13 Jun 2013 21:25:12 +0200 |
parents | 1061:f4031e7ccec1 |
children | 1063:b2a4679e7d20 |
files | mod_auth_ccert/mod_auth_ccert.lua |
diffstat | 1 files changed, 64 insertions(+), 0 deletions(-) [+] |
line wrap: on
line diff
--- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/mod_auth_ccert/mod_auth_ccert.lua Thu Jun 13 21:25:12 2013 +0200 @@ -0,0 +1,64 @@ +-- Copyright (C) 2013 Kim Alvefur +-- +-- This file is MIT/X11 licensed. + +local jid_compare = require "util.jid".compare; +local jid_split = require "util.jid".prepped_split; +local new_sasl = require "util.sasl".new; +local log = module._log; +local subject_alternative_name = "2.5.29.17"; +local id_on_xmppAddr = "1.3.6.1.5.5.7.8.5"; +local now = os.time; + +function get_sasl_handler(session) + return new_sasl(module.host, { + external = session.secure and function(authz) + if session.secure then + -- getpeercertificate() on a TCP connection would be bad, abort! + (session.log or log)("error", "How did you manage to select EXTERNAL without TLS?"); + return nil, false; + end + local sock = session.conn:socket(); + local cert = sock:getpeercertificate(); + if not cert then + (session.log or log)("warn", "No certificate provided"); + return nil, false; + end + + if not cert:validat(now()) then + (session.log or log)("warn", "Client certificate expired") + return nil, "expired"; + end + + local chain_valid, chain_errors = sock:getpeerverification(); + if not chain_valid then + (session.log or log)("warn", "Invalid client certificate chain"); + for i, error in ipairs(chain_errors) do + (session.log or log)("warn", "%d: %s", i, table.concat(chain_errors, ", ")); + end + return nil, false; + end + + local extensions = cert:extensions(); + local SANs = extensions[subject_alternative_name]; + local xmppAddrs = SANs and SANs[id_on_xmppAddr]; + + if not xmppAddrs then + (session.log or log)("warn", "Client certificate contains no xmppAddrs"); + return nil, false; + end + + for i=1,#xmppAddrs do + if authz == "" or jid_compare(authz, xmppAddrs[i]) then + (session.log or log)("debug", "xmppAddrs[%d] %q matches authz %q", i, xmppAddrs[i], authz) + local username, host = jid_split(xmppAddrs[i]); + if host == module.host then + return username, true + end + end + end + end + }); +end + +module:provides "auth";