# HG changeset patch # User Kim Alvefur # Date 1413895120 -7200 # Node ID 0d07fdc07d8c4cc0b3a42957c232f67ac31fbe12 # Parent f71643256d50c121266c64d172925d2b042fff6f mod_saslauth: Make it possible to disable certain mechanisms diff -r f71643256d50 -r 0d07fdc07d8c plugins/mod_saslauth.lua --- a/plugins/mod_saslauth.lua Tue Oct 21 14:37:05 2014 +0200 +++ b/plugins/mod_saslauth.lua Tue Oct 21 14:38:40 2014 +0200 @@ -19,6 +19,7 @@ local secure_auth_only = module:get_option_boolean("c2s_require_encryption", module:get_option_boolean("require_encryption", false)); local allow_unencrypted_plain_auth = module:get_option_boolean("allow_unencrypted_plain_auth", false) local insecure_mechanisms = module:get_option_set("allow_unencrypted_sasl", allow_unencrypted_plain_auth and {} or {"PLAIN", "LOGIN"}); +local disabled_mechanisms = module:get_option_set("disable_sasl_mechanisms", {}); local log = module._log; @@ -187,6 +188,9 @@ if not session.secure and (secure_auth_only or insecure_mechanisms:contains(mechanism)) then session.send(build_reply("failure", "encryption-required")); return true; + elseif disabled_mechanisms:contains(mechanism) then + session.send(build_reply("failure", "invalid-mechanism")); + return true; end local valid_mechanism = session.sasl_handler:select(mechanism); if not valid_mechanism then @@ -232,7 +236,7 @@ end local mechanisms = st.stanza("mechanisms", mechanisms_attr); for mechanism in pairs(origin.sasl_handler:mechanisms()) do - if (origin.secure or not insecure_mechanisms:contains(mechanism)) then + if (not disabled_mechanisms:contains(mechanism)) and (origin.secure or not insecure_mechanisms:contains(mechanism)) then mechanisms:tag("mechanism"):text(mechanism):up(); end end