Software /
code /
prosody
Comparison
util/sasl.lua @ 2218:b94bb1334029
Merge with trunk.
author | Waqas Hussain <waqas20@gmail.com> |
---|---|
date | Thu, 26 Nov 2009 00:05:18 +0500 |
parent | 2212:7cb6460b18d8 |
child | 2241:ac3bd7c42c8b |
comparison
equal
deleted
inserted
replaced
2217:838f6d546177 | 2218:b94bb1334029 |
---|---|
12 -- THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 12 -- THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
13 | 13 |
14 | 14 |
15 local md5 = require "util.hashes".md5; | 15 local md5 = require "util.hashes".md5; |
16 local log = require "util.logger".init("sasl"); | 16 local log = require "util.logger".init("sasl"); |
17 local st = require "util.stanza"; | |
18 local set = require "util.set"; | |
19 local array = require "util.array"; | |
20 local to_unicode = require "util.encodings".idna.to_unicode; | |
21 | |
17 local tostring = tostring; | 22 local tostring = tostring; |
18 local st = require "util.stanza"; | 23 local pairs, ipairs = pairs, ipairs; |
19 local generate_uuid = require "util.uuid".generate; | |
20 local t_insert, t_concat = table.insert, table.concat; | 24 local t_insert, t_concat = table.insert, table.concat; |
21 local to_byte, to_char = string.byte, string.char; | |
22 local to_unicode = require "util.encodings".idna.to_unicode; | |
23 local s_match = string.match; | 25 local s_match = string.match; |
24 local gmatch = string.gmatch | |
25 local string = string | |
26 local math = require "math" | |
27 local type = type | 26 local type = type |
28 local error = error | 27 local error = error |
29 local print = print | 28 local setmetatable = setmetatable; |
29 local assert = assert; | |
30 local require = require; | |
30 | 31 |
32 require "util.iterators" | |
33 local keys = keys | |
34 | |
35 local array = require "util.array" | |
31 module "sasl" | 36 module "sasl" |
32 | 37 |
33 -- Credentials handler: | 38 --[[ |
34 -- Arguments: ("PLAIN", user, host, password) | 39 Authentication Backend Prototypes: |
35 -- Returns: true (success) | false (fail) | nil (user unknown) | |
36 local function new_plain(realm, credentials_handler) | |
37 local object = { mechanism = "PLAIN", realm = realm, credentials_handler = credentials_handler} | |
38 function object.feed(self, message) | |
39 if message == "" or message == nil then return "failure", "malformed-request" end | |
40 local response = message | |
41 local authorization = s_match(response, "([^%z]+)") | |
42 local authentication = s_match(response, "%z([^%z]+)%z") | |
43 local password = s_match(response, "%z[^%z]+%z([^%z]+)") | |
44 | 40 |
45 if authentication == nil or password == nil then return "failure", "malformed-request" end | 41 state = false : disabled |
46 self.username = authentication | 42 state = true : enabled |
47 local auth_success = self.credentials_handler("PLAIN", self.username, self.realm, password) | 43 state = nil : non-existant |
48 | 44 |
49 if auth_success then | 45 plain: |
50 return "success" | 46 function(username, realm) |
51 elseif auth_success == nil then | 47 return password, state; |
52 return "failure", "account-disabled" | 48 end |
53 else | 49 |
54 return "failure", "not-authorized" | 50 plain-test: |
55 end | 51 function(username, realm, password) |
56 end | 52 return true or false, state; |
57 return object | 53 end |
54 | |
55 digest-md5: | |
56 function(username, domain, realm, encoding) -- domain and realm are usually the same; for some broken | |
57 -- implementations it's not | |
58 return digesthash, state; | |
59 end | |
60 | |
61 digest-md5-test: | |
62 function(username, domain, realm, encoding, digesthash) | |
63 return true or false, state; | |
64 end | |
65 ]] | |
66 | |
67 local method = {}; | |
68 method.__index = method; | |
69 local mechanisms = {}; | |
70 local backend_mechanism = {}; | |
71 | |
72 -- register a new SASL mechanims | |
73 local function registerMechanism(name, backends, f) | |
74 assert(type(name) == "string", "Parameter name MUST be a string."); | |
75 assert(type(backends) == "string" or type(backends) == "table", "Parameter backends MUST be either a string or a table."); | |
76 assert(type(f) == "function", "Parameter f MUST be a function."); | |
77 mechanisms[name] = f | |
78 for _, backend_name in ipairs(backends) do | |
79 if backend_mechanism[backend_name] == nil then backend_mechanism[backend_name] = {}; end | |
80 t_insert(backend_mechanism[backend_name], name); | |
81 end | |
58 end | 82 end |
59 | 83 |
60 -- credentials_handler: | 84 -- create a new SASL object which can be used to authenticate clients |
61 -- Arguments: (mechanism, node, domain, realm, decoder) | 85 function new(realm, profile, forbidden) |
62 -- Returns: Password encoding, (plaintext) password | 86 sasl_i = {profile = profile}; |
63 -- implementing RFC 2831 | 87 sasl_i.realm = realm; |
64 local function new_digest_md5(realm, credentials_handler) | 88 s = setmetatable(sasl_i, method); |
65 --TODO complete support for authzid | 89 s:forbidden(sasl_i, forbidden) |
90 return s; | |
91 end | |
66 | 92 |
67 local function serialize(message) | 93 -- set the forbidden mechanisms |
68 local data = "" | 94 function method:forbidden( restrict ) |
95 if restrict then | |
96 -- set forbidden | |
97 self.restrict = set.new(restrict); | |
98 else | |
99 -- get forbidden | |
100 return array.collect(self.restrict:items()); | |
101 end | |
102 end | |
69 | 103 |
70 if type(message) ~= "table" then error("serialize needs an argument of type table.") end | 104 -- get a list of possible SASL mechanims to use |
71 | 105 function method:mechanisms() |
72 -- testing all possible values | 106 local mechanisms = {} |
73 if message["realm"] then data = data..[[realm="]]..message.realm..[[",]] end | 107 for backend, f in pairs(self.profile) do |
74 if message["nonce"] then data = data..[[nonce="]]..message.nonce..[[",]] end | 108 if backend_mechanism[backend] then |
75 if message["qop"] then data = data..[[qop="]]..message.qop..[[",]] end | 109 for _, mechanism in ipairs(backend_mechanism[backend]) do |
76 if message["charset"] then data = data..[[charset=]]..message.charset.."," end | 110 if not sasl_i.restrict:contains(mechanism) then |
77 if message["algorithm"] then data = data..[[algorithm=]]..message.algorithm.."," end | 111 mechanisms[mechanism] = true; |
78 if message["rspauth"] then data = data..[[rspauth=]]..message.rspauth.."," end | |
79 data = data:gsub(",$", "") | |
80 return data | |
81 end | |
82 | |
83 local function utf8tolatin1ifpossible(passwd) | |
84 local i = 1; | |
85 while i <= #passwd do | |
86 local passwd_i = to_byte(passwd:sub(i, i)); | |
87 if passwd_i > 0x7F then | |
88 if passwd_i < 0xC0 or passwd_i > 0xC3 then | |
89 return passwd; | |
90 end | |
91 i = i + 1; | |
92 passwd_i = to_byte(passwd:sub(i, i)); | |
93 if passwd_i < 0x80 or passwd_i > 0xBF then | |
94 return passwd; | |
95 end | 112 end |
96 end | 113 end |
97 i = i + 1; | |
98 end | |
99 | |
100 local p = {}; | |
101 local j = 0; | |
102 i = 1; | |
103 while (i <= #passwd) do | |
104 local passwd_i = to_byte(passwd:sub(i, i)); | |
105 if passwd_i > 0x7F then | |
106 i = i + 1; | |
107 local passwd_i_1 = to_byte(passwd:sub(i, i)); | |
108 t_insert(p, to_char(passwd_i%4*64 + passwd_i_1%64)); -- I'm so clever | |
109 else | |
110 t_insert(p, to_char(passwd_i)); | |
111 end | |
112 i = i + 1; | |
113 end | |
114 return t_concat(p); | |
115 end | |
116 local function latin1toutf8(str) | |
117 local p = {}; | |
118 for ch in gmatch(str, ".") do | |
119 ch = to_byte(ch); | |
120 if (ch < 0x80) then | |
121 t_insert(p, to_char(ch)); | |
122 elseif (ch < 0xC0) then | |
123 t_insert(p, to_char(0xC2, ch)); | |
124 else | |
125 t_insert(p, to_char(0xC3, ch - 64)); | |
126 end | |
127 end | |
128 return t_concat(p); | |
129 end | |
130 local function parse(data) | |
131 local message = {} | |
132 -- COMPAT: %z in the pattern to work around jwchat bug (sends "charset=utf-8\0") | |
133 for k, v in gmatch(data, [[([%w%-]+)="?([^",%z]*)"?,?]]) do -- FIXME The hacky regex makes me shudder | |
134 message[k] = v; | |
135 end | |
136 return message; | |
137 end | |
138 | |
139 local object = { mechanism = "DIGEST-MD5", realm = realm, credentials_handler = credentials_handler}; | |
140 | |
141 object.nonce = generate_uuid(); | |
142 object.step = 0; | |
143 object.nonce_count = {}; | |
144 | |
145 function object.feed(self, message) | |
146 self.step = self.step + 1; | |
147 if (self.step == 1) then | |
148 local challenge = serialize({ nonce = object.nonce, | |
149 qop = "auth", | |
150 charset = "utf-8", | |
151 algorithm = "md5-sess", | |
152 realm = self.realm}); | |
153 return "challenge", challenge; | |
154 elseif (self.step == 2) then | |
155 local response = parse(message); | |
156 -- check for replay attack | |
157 if response["nc"] then | |
158 if self.nonce_count[response["nc"]] then return "failure", "not-authorized" end | |
159 end | |
160 | |
161 -- check for username, it's REQUIRED by RFC 2831 | |
162 if not response["username"] then | |
163 return "failure", "malformed-request"; | |
164 end | |
165 self["username"] = response["username"]; | |
166 | |
167 -- check for nonce, ... | |
168 if not response["nonce"] then | |
169 return "failure", "malformed-request"; | |
170 else | |
171 -- check if it's the right nonce | |
172 if response["nonce"] ~= tostring(self.nonce) then return "failure", "malformed-request" end | |
173 end | |
174 | |
175 if not response["cnonce"] then return "failure", "malformed-request", "Missing entry for cnonce in SASL message." end | |
176 if not response["qop"] then response["qop"] = "auth" end | |
177 | |
178 if response["realm"] == nil or response["realm"] == "" then | |
179 response["realm"] = ""; | |
180 elseif response["realm"] ~= self.realm then | |
181 return "failure", "not-authorized", "Incorrect realm value"; | |
182 end | |
183 | |
184 local decoder; | |
185 if response["charset"] == nil then | |
186 decoder = utf8tolatin1ifpossible; | |
187 elseif response["charset"] ~= "utf-8" then | |
188 return "failure", "incorrect-encoding", "The client's response uses "..response["charset"].." for encoding with isn't supported by sasl.lua. Supported encodings are latin or utf-8."; | |
189 end | |
190 | |
191 local domain = ""; | |
192 local protocol = ""; | |
193 if response["digest-uri"] then | |
194 protocol, domain = response["digest-uri"]:match("(%w+)/(.*)$"); | |
195 if protocol == nil or domain == nil then return "failure", "malformed-request" end | |
196 else | |
197 return "failure", "malformed-request", "Missing entry for digest-uri in SASL message." | |
198 end | |
199 | |
200 --TODO maybe realm support | |
201 self.username = response["username"]; | |
202 local password_encoding, Y = self.credentials_handler("DIGEST-MD5", response["username"], self.realm, response["realm"], decoder); | |
203 if Y == nil then return "failure", "not-authorized" | |
204 elseif Y == false then return "failure", "account-disabled" end | |
205 local A1 = ""; | |
206 if response.authzid then | |
207 if response.authzid == self.username or response.authzid == self.username.."@"..self.realm then | |
208 -- COMPAT | |
209 log("warn", "Client is violating RFC 3920 (section 6.1, point 7)."); | |
210 A1 = Y..":"..response["nonce"]..":"..response["cnonce"]..":"..response.authzid; | |
211 else | |
212 return "failure", "invalid-authzid"; | |
213 end | |
214 else | |
215 A1 = Y..":"..response["nonce"]..":"..response["cnonce"]; | |
216 end | |
217 local A2 = "AUTHENTICATE:"..protocol.."/"..domain; | |
218 | |
219 local HA1 = md5(A1, true); | |
220 local HA2 = md5(A2, true); | |
221 | |
222 local KD = HA1..":"..response["nonce"]..":"..response["nc"]..":"..response["cnonce"]..":"..response["qop"]..":"..HA2; | |
223 local response_value = md5(KD, true); | |
224 | |
225 if response_value == response["response"] then | |
226 -- calculate rspauth | |
227 A2 = ":"..protocol.."/"..domain; | |
228 | |
229 HA1 = md5(A1, true); | |
230 HA2 = md5(A2, true); | |
231 | |
232 KD = HA1..":"..response["nonce"]..":"..response["nc"]..":"..response["cnonce"]..":"..response["qop"]..":"..HA2 | |
233 local rspauth = md5(KD, true); | |
234 self.authenticated = true; | |
235 return "challenge", serialize({rspauth = rspauth}); | |
236 else | |
237 return "failure", "not-authorized", "The response provided by the client doesn't match the one we calculated." | |
238 end | |
239 elseif self.step == 3 then | |
240 if self.authenticated ~= nil then return "success" | |
241 else return "failure", "malformed-request" end | |
242 end | 114 end |
243 end | 115 end |
244 return object; | 116 self["possible_mechanisms"] = mechanisms; |
117 return array.collect(keys(mechanisms)); | |
245 end | 118 end |
246 | 119 |
247 -- Credentials handler: Can be nil. If specified, should take the mechanism as | 120 -- select a mechanism to use |
248 -- the only argument, and return true for OK, or false for not-OK (TODO) | 121 function method:select(mechanism) |
249 local function new_anonymous(realm, credentials_handler) | 122 if self.mech_i then |
250 local object = { mechanism = "ANONYMOUS", realm = realm, credentials_handler = credentials_handler} | 123 return false; |
251 function object.feed(self, message) | 124 end |
252 return "success" | 125 |
253 end | 126 self.mech_i = mechanisms[mechanism] |
254 object["username"] = generate_uuid() | 127 if self.mech_i == nil then |
255 return object | 128 return false; |
129 end | |
130 return true; | |
256 end | 131 end |
257 | 132 |
133 -- feed new messages to process into the library | |
134 function method:process(message) | |
135 --if message == "" or message == nil then return "failure", "malformed-request" end | |
136 return self.mech_i(self, message); | |
137 end | |
258 | 138 |
259 function new(mechanism, realm, credentials_handler) | 139 -- load the mechanisms |
260 local object | 140 load_mechs = {"plain", "digest-md5", "anonymous", "scram"} |
261 if mechanism == "PLAIN" then object = new_plain(realm, credentials_handler) | 141 for _, mech in ipairs(load_mechs) do |
262 elseif mechanism == "DIGEST-MD5" then object = new_digest_md5(realm, credentials_handler) | 142 local name = "util.sasl."..mech; |
263 elseif mechanism == "ANONYMOUS" then object = new_anonymous(realm, credentials_handler) | 143 local m = require(name); |
264 else | 144 m.init(registerMechanism) |
265 log("debug", "Unsupported SASL mechanism: "..tostring(mechanism)); | |
266 return nil | |
267 end | |
268 return object | |
269 end | 145 end |
270 | 146 |
271 return _M; | 147 return _M; |