123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489 |
- /* Plain SASL plugin
- * Rob Siemborski
- * Tim Martin
- */
- /*
- * Copyright (c) 1998-2016 Carnegie Mellon University. All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- *
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in
- * the documentation and/or other materials provided with the
- * distribution.
- *
- * 3. The name "Carnegie Mellon University" must not be used to
- * endorse or promote products derived from this software without
- * prior written permission. For permission or any other legal
- * details, please contact
- * Carnegie Mellon University
- * Center for Technology Transfer and Enterprise Creation
- * 4615 Forbes Avenue
- * Suite 302
- * Pittsburgh, PA 15213
- * (412) 268-7393, fax: (412) 268-7395
- * innovation@andrew.cmu.edu
- *
- * 4. Redistributions of any form whatsoever must retain the following
- * acknowledgment:
- * "This product includes software developed by Computing Services
- * at Carnegie Mellon University (http://www.cmu.edu/computing/)."
- *
- * CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
- * THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
- * AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
- * FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
- * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
- * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
- * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
- */
- #include <config.h>
- #include <stdio.h>
- #include <string.h>
- #include <sasl.h>
- #include <saslplug.h>
- #include "plugin_common.h"
- #ifdef macintosh
- #error #include <sasl_plain_plugin_decl.h>
- #endif
- /***************************** Common Section *****************************/
- /***************************** Server Section *****************************/
- static int plain_server_mech_new(void *glob_context __attribute__((unused)),
- sasl_server_params_t *sparams,
- const char *challenge __attribute__((unused)),
- unsigned challen __attribute__((unused)),
- void **conn_context)
- {
- /* holds state are in */
- if (!conn_context) {
- PARAMERROR( sparams->utils );
- return SASL_BADPARAM;
- }
-
- *conn_context = NULL;
-
- return SASL_OK;
- }
- static int plain_server_mech_step(void *conn_context __attribute__((unused)),
- sasl_server_params_t *params,
- const char *clientin,
- unsigned clientinlen,
- const char **serverout,
- unsigned *serveroutlen,
- sasl_out_params_t *oparams)
- {
- const char *author;
- const char *authen;
- const char *password;
- unsigned password_len;
- unsigned lup = 0;
- int result;
- char *passcopy;
- unsigned canon_flags = 0;
- *serverout = NULL;
- *serveroutlen = 0;
-
- /* should have received author-id NUL authen-id NUL password */
-
- /* get author */
- author = clientin;
- while ((lup < clientinlen) && (clientin[lup] != 0)) ++lup;
-
- if (lup >= clientinlen) {
- SETERROR(params->utils, "Can only find author (no password)");
- return SASL_BADPROT;
- }
-
- /* get authen */
- ++lup;
- authen = clientin + lup;
- while ((lup < clientinlen) && (clientin[lup] != 0)) ++lup;
-
- if (lup >= clientinlen) {
- params->utils->seterror(params->utils->conn, 0,
- "Can only find author/en (no password)");
- return SASL_BADPROT;
- }
-
- /* get password */
- lup++;
- password = clientin + lup;
- while ((lup < clientinlen) && (clientin[lup] != 0)) ++lup;
-
- password_len = (unsigned) (clientin + lup - password);
-
- if (lup != clientinlen) {
- SETERROR(params->utils,
- "Got more data than we were expecting in the PLAIN plugin\n");
- return SASL_BADPROT;
- }
-
- /* this kinda sucks. we need password to be null terminated
- but we can't assume there is an allocated byte at the end
- of password so we have to copy it */
- passcopy = params->utils->malloc(password_len + 1);
- if (passcopy == NULL) {
- MEMERROR(params->utils);
- return SASL_NOMEM;
- }
-
- strncpy(passcopy, password, password_len);
- passcopy[password_len] = '\0';
-
- /* Canonicalize userid first, so that password verification is only
- * against the canonical id */
- if (!author || !*author) {
- author = authen;
- canon_flags = SASL_CU_AUTHZID;
- } else if (strcmp(author, authen) == 0) {
- /* While this isn't going to find out that <user> and <user>@<defaultdomain>
- are the same thing, this is good enough for many cases */
- canon_flags = SASL_CU_AUTHZID;
- }
- result = params->canon_user(params->utils->conn,
- authen,
- 0,
- SASL_CU_AUTHID | canon_flags | SASL_CU_EXTERNALLY_VERIFIED,
- oparams);
- if (result != SASL_OK) {
- _plug_free_string(params->utils, &passcopy);
- return result;
- }
- /* verify password (and possibly fetch both authentication and
- authorization identity related properties) - return SASL_OK
- on success */
- result = params->utils->checkpass(params->utils->conn,
- oparams->authid,
- oparams->alen,
- passcopy,
- password_len);
-
- _plug_free_string(params->utils, &passcopy);
-
- if (result != SASL_OK) {
- params->utils->seterror(params->utils->conn, 0,
- "Password verification failed");
- return result;
- }
- /* Canonicalize and store the authorization ID */
- /* We need to do this after calling verify_user just in case verify_user
- * needed to get auxprops itself */
- if (canon_flags == 0) {
- const struct propval *pr;
- int i;
- pr = params->utils->prop_get(params->propctx);
- if (!pr) {
- return SASL_FAIL;
- }
- /* params->utils->checkpass() might have fetched authorization identity related properties
- for the wrong user name. Free these values. */
- for (i = 0; pr[i].name; i++) {
- if (pr[i].name[0] == '*') {
- continue;
- }
- if (pr[i].values) {
- params->utils->prop_erase(params->propctx, pr[i].name);
- }
- }
- result = params->canon_user(params->utils->conn,
- author,
- 0,
- SASL_CU_AUTHZID,
- oparams);
- if (result != SASL_OK) {
- return result;
- }
- }
-
- /* set oparams */
- oparams->doneflag = 1;
- oparams->mech_ssf = 0;
- oparams->maxoutbuf = 0;
- oparams->encode_context = NULL;
- oparams->encode = NULL;
- oparams->decode_context = NULL;
- oparams->decode = NULL;
- oparams->param_version = 0;
-
- return SASL_OK;
- }
- static sasl_server_plug_t plain_server_plugins[] =
- {
- {
- "PLAIN", /* mech_name */
- 0, /* max_ssf */
- SASL_SEC_NOANONYMOUS
- | SASL_SEC_PASS_CREDENTIALS, /* security_flags */
- SASL_FEAT_WANT_CLIENT_FIRST
- | SASL_FEAT_ALLOWS_PROXY, /* features */
- NULL, /* glob_context */
- &plain_server_mech_new, /* mech_new */
- &plain_server_mech_step, /* mech_step */
- NULL, /* mech_dispose */
- NULL, /* mech_free */
- NULL, /* setpass */
- NULL, /* user_query */
- NULL, /* idle */
- NULL, /* mech_avail */
- NULL /* spare */
- }
- };
- int plain_server_plug_init(const sasl_utils_t *utils,
- int maxversion,
- int *out_version,
- sasl_server_plug_t **pluglist,
- int *plugcount)
- {
- if (maxversion < SASL_SERVER_PLUG_VERSION) {
- SETERROR(utils, "PLAIN version mismatch");
- return SASL_BADVERS;
- }
-
- *out_version = SASL_SERVER_PLUG_VERSION;
- *pluglist = plain_server_plugins;
- *plugcount = 1;
-
- return SASL_OK;
- }
- /***************************** Client Section *****************************/
- typedef struct client_context {
- char *out_buf;
- unsigned out_buf_len;
- } client_context_t;
- static int plain_client_mech_new(void *glob_context __attribute__((unused)),
- sasl_client_params_t *params,
- void **conn_context)
- {
- client_context_t *text;
-
- /* holds state are in */
- text = params->utils->malloc(sizeof(client_context_t));
- if (text == NULL) {
- MEMERROR( params->utils );
- return SASL_NOMEM;
- }
-
- memset(text, 0, sizeof(client_context_t));
-
- *conn_context = text;
-
- return SASL_OK;
- }
- static int plain_client_mech_step(void *conn_context,
- sasl_client_params_t *params,
- const char *serverin __attribute__((unused)),
- unsigned serverinlen __attribute__((unused)),
- sasl_interact_t **prompt_need,
- const char **clientout,
- unsigned *clientoutlen,
- sasl_out_params_t *oparams)
- {
- client_context_t *text = (client_context_t *) conn_context;
- const char *user = NULL, *authid = NULL;
- sasl_secret_t *password = NULL;
- unsigned int free_password = 0; /* set if we need to free password */
- int user_result = SASL_OK;
- int auth_result = SASL_OK;
- int pass_result = SASL_OK;
- int result;
- char *p;
-
- *clientout = NULL;
- *clientoutlen = 0;
-
- /* doesn't really matter how the server responds */
-
- /* check if sec layer strong enough */
- if (params->props.min_ssf > params->external_ssf) {
- SETERROR( params->utils, "SSF requested of PLAIN plugin");
- return SASL_TOOWEAK;
- }
-
- /* try to get the authid */
- if (oparams->authid == NULL) {
- auth_result = _plug_get_authid(params->utils, &authid, prompt_need);
-
- if ((auth_result != SASL_OK) && (auth_result != SASL_INTERACT))
- return auth_result;
- }
-
- /* try to get the userid */
- if (oparams->user == NULL) {
- user_result = _plug_get_userid(params->utils, &user, prompt_need);
-
- if ((user_result != SASL_OK) && (user_result != SASL_INTERACT))
- return user_result;
- }
-
- /* try to get the password */
- if (password == NULL) {
- pass_result = _plug_get_password(params->utils, &password,
- &free_password, prompt_need);
-
- if ((pass_result != SASL_OK) && (pass_result != SASL_INTERACT))
- return pass_result;
- }
-
- /* free prompts we got */
- if (prompt_need && *prompt_need) {
- params->utils->free(*prompt_need);
- *prompt_need = NULL;
- }
-
- /* if there are prompts not filled in */
- if ((user_result == SASL_INTERACT) || (auth_result == SASL_INTERACT) ||
- (pass_result == SASL_INTERACT)) {
- /* make the prompt list */
- result =
- _plug_make_prompts(params->utils, prompt_need,
- user_result == SASL_INTERACT ?
- "Please enter your authorization name" : NULL,
- NULL,
- auth_result == SASL_INTERACT ?
- "Please enter your authentication name" : NULL,
- NULL,
- pass_result == SASL_INTERACT ?
- "Please enter your password" : NULL, NULL,
- NULL, NULL, NULL,
- NULL, NULL, NULL);
- if (result != SASL_OK) goto cleanup;
-
- return SASL_INTERACT;
- }
-
- if (!password) {
- PARAMERROR(params->utils);
- return SASL_BADPARAM;
- }
- if (!user || !*user) {
- result = params->canon_user(params->utils->conn, authid, 0,
- SASL_CU_AUTHID | SASL_CU_AUTHZID, oparams);
- }
- else {
- result = params->canon_user(params->utils->conn, user, 0,
- SASL_CU_AUTHZID, oparams);
- if (result != SASL_OK) goto cleanup;
-
- result = params->canon_user(params->utils->conn, authid, 0,
- SASL_CU_AUTHID, oparams);
- }
- if (result != SASL_OK) goto cleanup;
-
- /* send authorized id NUL authentication id NUL password */
- *clientoutlen = ((user && *user ? oparams->ulen : 0) +
- 1 + oparams->alen +
- 1 + password->len);
-
- /* remember the extra NUL on the end for stupid clients */
- result = _plug_buf_alloc(params->utils, &(text->out_buf),
- &(text->out_buf_len), *clientoutlen + 1);
- if (result != SASL_OK) goto cleanup;
-
- memset(text->out_buf, 0, *clientoutlen + 1);
- p = text->out_buf;
- if (user && *user) {
- memcpy(p, oparams->user, oparams->ulen);
- p += oparams->ulen;
- }
- memcpy(++p, oparams->authid, oparams->alen);
- p += oparams->alen;
- memcpy(++p, password->data, password->len);
-
- *clientout = text->out_buf;
-
- /* set oparams */
- oparams->doneflag = 1;
- oparams->mech_ssf = 0;
- oparams->maxoutbuf = 0;
- oparams->encode_context = NULL;
- oparams->encode = NULL;
- oparams->decode_context = NULL;
- oparams->decode = NULL;
- oparams->param_version = 0;
-
- result = SASL_OK;
- cleanup:
- /* free sensitive info */
- if (free_password) _plug_free_secret(params->utils, &password);
-
- return result;
- }
- static void plain_client_mech_dispose(void *conn_context,
- const sasl_utils_t *utils)
- {
- client_context_t *text = (client_context_t *) conn_context;
-
- if (!text) return;
-
- if (text->out_buf) utils->free(text->out_buf);
-
- utils->free(text);
- }
- static sasl_client_plug_t plain_client_plugins[] =
- {
- {
- "PLAIN", /* mech_name */
- 0, /* max_ssf */
- SASL_SEC_NOANONYMOUS
- | SASL_SEC_PASS_CREDENTIALS, /* security_flags */
- SASL_FEAT_WANT_CLIENT_FIRST
- | SASL_FEAT_ALLOWS_PROXY, /* features */
- NULL, /* required_prompts */
- NULL, /* glob_context */
- &plain_client_mech_new, /* mech_new */
- &plain_client_mech_step, /* mech_step */
- &plain_client_mech_dispose, /* mech_dispose */
- NULL, /* mech_free */
- NULL, /* idle */
- NULL, /* spare */
- NULL /* spare */
- }
- };
- int plain_client_plug_init(sasl_utils_t *utils,
- int maxversion,
- int *out_version,
- sasl_client_plug_t **pluglist,
- int *plugcount)
- {
- if (maxversion < SASL_CLIENT_PLUG_VERSION) {
- SETERROR(utils, "PLAIN version mismatch");
- return SASL_BADVERS;
- }
-
- *out_version = SASL_CLIENT_PLUG_VERSION;
- *pluglist = plain_client_plugins;
- *plugcount = 1;
-
- return SASL_OK;
- }
|