123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391 |
- /*
- * This file is part of the Sofia-SIP package
- *
- * Copyright (C) 2005 Nokia Corporation.
- *
- * Contact: Pekka Pessi <pekka.pessi@nokia.com>
- *
- * This library is free software; you can redistribute it and/or
- * modify it under the terms of the GNU Lesser General Public License
- * as published by the Free Software Foundation; either version 2.1 of
- * the License, or (at your option) any later version.
- *
- * This library is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * Lesser General Public License for more details.
- *
- * You should have received a copy of the GNU Lesser General Public
- * License along with this library; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
- * 02110-1301 USA
- *
- */
- /**@CFILE auth_plugin_ntlm.c
- *
- * @brief Plugin for delayed authentication.
- *
- * This authentication plugin provides authentication operation that is
- * intentionally delayed. It serves as an example of server-side
- * authentication plugins.
- *
- * @author Pekka Pessi <Pekka.Pessi@nokia.com>.
- *
- * @date Created: Wed Apr 11 15:14:03 2001 ppessi
- */
- #include "config.h"
- #include <stddef.h>
- #include <stdlib.h>
- #include <string.h>
- #include <stdio.h>
- #include <assert.h>
- #include <sofia-sip/su_debug.h>
- #include <sofia-sip/su_wait.h>
- #include <sofia-sip/su_alloc.h>
- #include <sofia-sip/su_tagarg.h>
- #include "sofia-sip/auth_module.h"
- #include "sofia-sip/auth_plugin.h"
- #include "sofia-sip/auth_ntlm.h"
- #if HAVE_FUNC
- #elif HAVE_FUNCTION
- #define __func__ __FUNCTION__
- #else
- static char const __func__[] = "auth_plugin_ntml";
- #endif
- /* ====================================================================== */
- /* NTLM authentication scheme */
- static int auth_init_ntlm(auth_mod_t *am,
- auth_scheme_t *base,
- su_root_t *root,
- tag_type_t tag, tag_value_t value, ...);
- static void auth_method_ntlm_x(auth_mod_t *am,
- auth_status_t *as,
- msg_auth_t *au,
- auth_challenger_t const *ach);
- auth_scheme_t auth_scheme_ntlm[1] =
- {{
- "NTLM", /* asch_method */
- sizeof (auth_mod_t), /* asch_size */
- auth_init_default, /* asch_init */
- auth_method_ntlm_x, /* asch_check */
- auth_challenge_ntlm, /* asch_challenge */
- auth_cancel_default, /* asch_cancel */
- auth_destroy_default /* asch_destroy */
- }};
- #define AUTH_NTLM_NONCE_LEN (BASE64_SIZE(sizeof (struct nonce)) + 1)
- static int auth_init_ntlm(auth_mod_t *am,
- auth_scheme_t *base,
- su_root_t *root,
- tag_type_t tag, tag_value_t value, ...)
- {
- auth_plugin_t *ap = AUTH_PLUGIN(am);
- int retval = -1;
- ta_list ta;
- ta_start(ta, tag, value);
- if (auth_init_default(am, NULL, root, ta_tags(ta)) != -1) {
- retval = 0;
- }
- ta_end(ta);
- return retval;
- }
- /** Authenticate a request with @b NTLM authentication scheme.
- *
- * This function reads user database before authentication, if needed.
- */
- static
- void auth_method_ntlm_x(auth_mod_t *am,
- auth_status_t *as,
- msg_auth_t *au,
- auth_challenger_t const *ach)
- {
- if (am) {
- auth_readdb_if_needed(am);
- auth_method_ntlm(am, as, au, ach);
- }
- }
- /** Authenticate a request with @b Ntlm authentication scheme.
- */
- void auth_method_ntlm(auth_mod_t *am,
- auth_status_t *as,
- msg_auth_t *au,
- auth_challenger_t const *ach)
- {
- as->as_allow = as->as_allow || auth_allow_check(am, as) == 0;
- if (as->as_realm)
- au = auth_ntlm_credentials(au, as->as_realm, am->am_opaque,
- am->am_gssapi_data, am->am_targetname);
- else
- au = NULL;
- if (as->as_allow) {
- SU_DEBUG_5(("%s: allow unauthenticated %s\n", __func__, as->as_method));
- as->as_status = 0, as->as_phrase = NULL;
- as->as_match = (msg_header_t *)au;
- return;
- }
- if (au) {
- auth_response_t ar[1] = {{ sizeof(ar) }};
- auth_ntlm_response_get(as->as_home, ar, au->au_params);
- as->as_match = (msg_header_t *)au;
- auth_check_ntlm(am, as, ar, ach);
- }
- else {
- /* There was no matching credentials, send challenge */
- SU_DEBUG_5(("%s: no credentials matched\n", __func__));
- auth_challenge_ntlm(am, as, ach);
- }
- }
- /** Find a NTLM credential header with matching realm and opaque. */
- msg_auth_t *auth_ntlm_credentials(msg_auth_t *auth,
- char const *realm,
- char const *opaque,
- char const *gssapidata,
- char const *targetname)
- {
- char const *agssapidata, *atargetname;
- for (;auth; auth = auth_mod_credentials(auth->au_next)) {
- if (!su_casematch(auth->au_scheme, "NTLM"))
- continue;
- if (gssapidata) {
- agssapidata = msg_header_find_param(auth->au_common, "gssapi-data=");
- if (!agssapidata || auth_strcmp(agssapidata, gssapidata))
- continue;
- }
- if (targetname) {
- atargetname = msg_header_find_param(auth->au_common, "targetname=");
- if (!atargetname || auth_strcmp(atargetname, targetname))
- continue;
- }
- return auth;
- }
- return NULL;
- }
- /** Check ntlm authentication */
- void auth_check_ntlm(auth_mod_t *am,
- auth_status_t *as,
- auth_response_t *ar,
- auth_challenger_t const *ach)
- {
- char const *a1;
- auth_hexmd5_t a1buf, response;
- auth_passwd_t *apw;
- char const *phrase;
- msg_time_t now = msg_now();
- if (am == NULL || as == NULL || ar == NULL || ach == NULL) {
- if (as) {
- as->as_status = 500, as->as_phrase = "Internal Server Error";
- as->as_response = NULL;
- }
- return;
- }
- phrase = "Bad authorization";
- #define PA "Authorization missing "
- if ((!ar->ar_username && (phrase = PA "username")) ||
- (!ar->ar_nonce && (phrase = PA "nonce")) ||
- (!ar->ar_uri && (phrase = PA "URI")) ||
- (!ar->ar_response && (phrase = PA "response")) ||
- /* (!ar->ar_opaque && (phrase = PA "opaque")) || */
- /* Check for qop */
- (ar->ar_qop &&
- ((ar->ar_auth &&
- !su_casematch(ar->ar_qop, "auth") &&
- !su_casematch(ar->ar_qop, "\"auth\"")) ||
- (ar->ar_auth_int &&
- !su_casematch(ar->ar_qop, "auth-int") &&
- !su_casematch(ar->ar_qop, "\"auth-int\"")))
- && (phrase = PA "has invalid qop"))) {
- assert(phrase);
- SU_DEBUG_5(("auth_method_ntlm: 400 %s\n", phrase));
- as->as_status = 400, as->as_phrase = phrase;
- as->as_response = NULL;
- return;
- }
- /* XXX - replace */
- #if 0
- if (as->as_nonce_issued == 0 /* Already validated nonce */ &&
- auth_validate_ntlm_nonce(am, as, ar, now) < 0) {
- #else
- if (as->as_nonce_issued == 0 /* Already validated nonce */ &&
- auth_validate_digest_nonce(am, as, ar, now) < 0) {
- #endif
- as->as_blacklist = am->am_blacklist;
- auth_challenge_ntlm(am, as, ach);
- return;
- }
- if (as->as_stale) {
- auth_challenge_ntlm(am, as, ach);
- return;
- }
- apw = auth_mod_getpass(am, ar->ar_username, ar->ar_realm);
- #if 0
- if (apw && apw->apw_hash)
- a1 = apw->apw_hash;
- else if (apw && apw->apw_pass)
- auth_ntlm_a1(ar, a1buf, apw->apw_pass), a1 = a1buf;
- else
- auth_ntlm_a1(ar, a1buf, "xyzzy"), a1 = a1buf, apw = NULL;
- if (ar->ar_md5sess)
- auth_ntlm_a1sess(ar, a1buf, a1), a1 = a1buf;
- #else
- if (apw && apw->apw_hash)
- a1 = apw->apw_hash;
- else if (apw && apw->apw_pass)
- auth_digest_a1(ar, a1buf, apw->apw_pass), a1 = a1buf;
- else
- auth_digest_a1(ar, a1buf, "xyzzy"), a1 = a1buf, apw = NULL;
- if (ar->ar_md5sess)
- auth_digest_a1sess(ar, a1buf, a1), a1 = a1buf;
- #endif
- /* XXX - replace with auth_ntlm_response */
- #if 0
- auth_ntlm_response(ar, response, a1,
- as->as_method, as->as_body, as->as_bodylen);
- #else
- auth_digest_response(ar, response, a1,
- as->as_method, as->as_body, as->as_bodylen);
- #endif
- if (!apw || strcmp(response, ar->ar_response)) {
- if (am->am_forbidden) {
- as->as_status = 403, as->as_phrase = "Forbidden";
- as->as_blacklist = am->am_blacklist;
- as->as_response = NULL;
- }
- else {
- auth_challenge_ntlm(am, as, ach);
- as->as_blacklist = am->am_blacklist;
- }
- SU_DEBUG_5(("auth_method_ntlm: response did not match\n"));
- return;
- }
- assert(apw);
- as->as_user = apw->apw_user;
- as->as_anonymous = apw == am->am_anon_user;
- if (am->am_nextnonce || am->am_mutual)
- auth_info_ntlm(am, as, ach);
- if (am->am_challenge)
- auth_challenge_ntlm(am, as, ach);
- SU_DEBUG_7(("auth_method_ntlm: successful authentication\n"));
- as->as_status = 0; /* Successful authentication! */
- as->as_phrase = "";
- }
- /** Construct a challenge header for @b Ntlm authentication scheme. */
- void auth_challenge_ntlm(auth_mod_t *am,
- auth_status_t *as,
- auth_challenger_t const *ach)
- {
- char const *u, *d;
- char nonce[AUTH_NTLM_NONCE_LEN];
- #if 0
- auth_generate_ntlm_nonce(am, nonce, sizeof nonce, 0, msg_now());
- #else
- auth_generate_digest_nonce(am, nonce, sizeof nonce, 0, msg_now());
- #endif
- u = as->as_uri;
- d = as->as_pdomain;
- as->as_response =
- msg_header_format(as->as_home, ach->ach_header,
- "Ntlm"
- " realm=\"%s\","
- "%s%s%s"
- "%s%s%s"
- " nonce=\"%s\","
- "%s%s%s"
- "%s" /* stale */
- " algorithm=%s"
- "%s%s%s",
- as->as_realm,
- u ? " uri=\"" : "", u ? u : "", u ? "\"," : "",
- d ? " domain=\"" : "", d ? d : "", d ? "\"," : "",
- nonce,
- am->am_opaque ? " opaque=\"" : "",
- am->am_opaque ? am->am_opaque : "",
- am->am_opaque ? "\"," : "",
- as->as_stale ? " stale=true," : "",
- am->am_algorithm,
- am->am_qop ? ", qop=\"" : "",
- am->am_qop ? am->am_qop : "",
- am->am_qop ? "\"" : "");
- if (!as->as_response)
- as->as_status = 500, as->as_phrase = auth_internal_server_error;
- else
- as->as_status = ach->ach_status, as->as_phrase = ach->ach_phrase;
- }
- /** Construct a info header for @b Ntlm authentication scheme. */
- void auth_info_ntlm(auth_mod_t *am,
- auth_status_t *as,
- auth_challenger_t const *ach)
- {
- if (!ach->ach_info)
- return;
- if (am->am_nextnonce) {
- char nonce[AUTH_NTLM_NONCE_LEN];
- /* XXX - replace */
- #if 0
- auth_generate_ntlm_nonce(am, nonce, sizeof nonce, 1, msg_now());
- #else
- auth_generate_digest_nonce(am, nonce, sizeof nonce, 1, msg_now());
- #endif
- as->as_info =
- msg_header_format(as->as_home, ach->ach_info, "nextnonce=\"%s\"", nonce);
- }
- }
|