2011-08-16 00:25:40 +02:00
|
|
|
%%%----------------------------------------------------------------------
|
|
|
|
%%% File : cyrsasl_scram.erl
|
|
|
|
%%% Author : Stephen Röttger <stephen.roettger@googlemail.com>
|
|
|
|
%%% Purpose : SASL SCRAM authentication
|
|
|
|
%%% Created : 7 Aug 2011 by Stephen Röttger <stephen.roettger@googlemail.com>
|
|
|
|
%%%
|
|
|
|
%%%
|
2018-01-05 21:18:58 +01:00
|
|
|
%%% ejabberd, Copyright (C) 2002-2018 ProcessOne
|
2011-08-16 00:25:40 +02:00
|
|
|
%%%
|
|
|
|
%%% This program is free software; you can redistribute it and/or
|
|
|
|
%%% modify it under the terms of the GNU General Public License as
|
|
|
|
%%% published by the Free Software Foundation; either version 2 of the
|
|
|
|
%%% License, or (at your option) any later version.
|
|
|
|
%%%
|
|
|
|
%%% This program is distributed in the hope that it will be useful,
|
|
|
|
%%% but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
%%% MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
%%% General Public License for more details.
|
|
|
|
%%%
|
2014-02-22 11:27:40 +01:00
|
|
|
%%% You should have received a copy of the GNU General Public License along
|
|
|
|
%%% with this program; if not, write to the Free Software Foundation, Inc.,
|
|
|
|
%%% 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
2011-08-16 00:25:40 +02:00
|
|
|
%%%
|
|
|
|
%%%----------------------------------------------------------------------
|
|
|
|
|
2011-08-16 00:25:03 +02:00
|
|
|
-module(cyrsasl_scram).
|
2013-03-14 10:33:02 +01:00
|
|
|
|
2011-08-16 00:25:03 +02:00
|
|
|
-author('stephen.roettger@googlemail.com').
|
|
|
|
|
2015-05-21 17:02:36 +02:00
|
|
|
-protocol({rfc, 5802}).
|
|
|
|
|
2016-12-31 11:47:35 +01:00
|
|
|
-export([start/1, stop/0, mech_new/4, mech_step/2, format_error/1]).
|
2011-08-16 00:25:03 +02:00
|
|
|
|
2018-06-14 13:00:47 +02:00
|
|
|
-include("scram.hrl").
|
2013-04-08 11:12:54 +02:00
|
|
|
-include("logger.hrl").
|
2011-08-16 00:25:03 +02:00
|
|
|
|
|
|
|
-behaviour(cyrsasl).
|
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
-record(state,
|
|
|
|
{step = 2 :: 2 | 4,
|
|
|
|
stored_key = <<"">> :: binary(),
|
|
|
|
server_key = <<"">> :: binary(),
|
|
|
|
username = <<"">> :: binary(),
|
2016-12-31 11:47:35 +01:00
|
|
|
auth_module :: module(),
|
2017-02-18 07:36:27 +01:00
|
|
|
get_password :: fun((binary()) ->
|
|
|
|
{false | ejabberd_auth:password(), module()}),
|
2013-03-14 10:33:02 +01:00
|
|
|
auth_message = <<"">> :: binary(),
|
|
|
|
client_nonce = <<"">> :: binary(),
|
|
|
|
server_nonce = <<"">> :: binary()}).
|
2011-08-16 00:25:03 +02:00
|
|
|
|
|
|
|
-define(SALT_LENGTH, 16).
|
|
|
|
-define(NONCE_LENGTH, 16).
|
|
|
|
|
2016-12-31 11:47:35 +01:00
|
|
|
-type error_reason() :: unsupported_extension | bad_username |
|
|
|
|
not_authorized | saslprep_failed |
|
|
|
|
parser_failed | bad_attribute |
|
|
|
|
nonce_mismatch | bad_channel_binding.
|
|
|
|
|
|
|
|
-export_type([error_reason/0]).
|
|
|
|
|
2011-08-16 00:25:03 +02:00
|
|
|
start(_Opts) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
cyrsasl:register_mechanism(<<"SCRAM-SHA-1">>, ?MODULE,
|
|
|
|
scram).
|
2011-08-16 00:25:03 +02:00
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
stop() -> ok.
|
2011-08-16 00:25:03 +02:00
|
|
|
|
2016-12-31 11:47:35 +01:00
|
|
|
-spec format_error(error_reason()) -> {atom(), binary()}.
|
|
|
|
format_error(unsupported_extension) ->
|
|
|
|
{'bad-protocol', <<"Unsupported extension">>};
|
|
|
|
format_error(bad_username) ->
|
|
|
|
{'invalid-authzid', <<"Malformed username">>};
|
|
|
|
format_error(not_authorized) ->
|
|
|
|
{'not-authorized', <<"Invalid username or password">>};
|
|
|
|
format_error(saslprep_failed) ->
|
|
|
|
{'not-authorized', <<"SASLprep failed">>};
|
|
|
|
format_error(parser_failed) ->
|
|
|
|
{'bad-protocol', <<"Response decoding failed">>};
|
|
|
|
format_error(bad_attribute) ->
|
|
|
|
{'bad-protocol', <<"Malformed or unexpected attribute">>};
|
|
|
|
format_error(nonce_mismatch) ->
|
|
|
|
{'bad-protocol', <<"Nonce mismatch">>};
|
|
|
|
format_error(bad_channel_binding) ->
|
|
|
|
{'bad-protocol', <<"Invalid channel binding">>}.
|
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
mech_new(_Host, GetPassword, _CheckPassword,
|
|
|
|
_CheckPasswordDigest) ->
|
2011-08-16 00:25:03 +02:00
|
|
|
{ok, #state{step = 2, get_password = GetPassword}}.
|
|
|
|
|
|
|
|
mech_step(#state{step = 2} = State, ClientIn) ->
|
2013-04-17 12:34:53 +02:00
|
|
|
case re:split(ClientIn, <<",">>, [{return, binary}]) of
|
|
|
|
[_CBind, _AuthorizationIdentity, _UserNameAttribute, _ClientNonceAttribute, ExtensionAttribute | _]
|
2016-12-31 11:47:35 +01:00
|
|
|
when ExtensionAttribute /= <<"">> ->
|
|
|
|
{error, unsupported_extension};
|
2013-04-17 12:34:53 +02:00
|
|
|
[CBind, _AuthorizationIdentity, UserNameAttribute, ClientNonceAttribute | _]
|
2013-03-14 10:33:02 +01:00
|
|
|
when (CBind == <<"y">>) or (CBind == <<"n">>) ->
|
|
|
|
case parse_attribute(UserNameAttribute) of
|
|
|
|
{error, Reason} -> {error, Reason};
|
|
|
|
{_, EscapedUserName} ->
|
|
|
|
case unescape_username(EscapedUserName) of
|
2016-12-31 11:47:35 +01:00
|
|
|
error -> {error, bad_username};
|
2013-03-14 10:33:02 +01:00
|
|
|
UserName ->
|
|
|
|
case parse_attribute(ClientNonceAttribute) of
|
|
|
|
{$r, ClientNonce} ->
|
2017-02-18 07:36:27 +01:00
|
|
|
{Pass, AuthModule} = (State#state.get_password)(UserName),
|
|
|
|
LPass = if is_binary(Pass) -> jid:resourceprep(Pass);
|
|
|
|
true -> Pass
|
|
|
|
end,
|
|
|
|
if Pass == false ->
|
|
|
|
{error, not_authorized, UserName};
|
|
|
|
LPass == error ->
|
|
|
|
{error, saslprep_failed, UserName};
|
|
|
|
true ->
|
2013-03-14 10:33:02 +01:00
|
|
|
{StoredKey, ServerKey, Salt, IterationCount} =
|
2017-05-11 13:37:21 +02:00
|
|
|
if is_record(Pass, scram) ->
|
2017-05-23 09:43:26 +02:00
|
|
|
{base64:decode(Pass#scram.storedkey),
|
|
|
|
base64:decode(Pass#scram.serverkey),
|
|
|
|
base64:decode(Pass#scram.salt),
|
2017-05-11 13:37:21 +02:00
|
|
|
Pass#scram.iterationcount};
|
2013-03-14 10:33:02 +01:00
|
|
|
true ->
|
|
|
|
TempSalt =
|
2016-10-18 07:17:21 +02:00
|
|
|
randoms:bytes(?SALT_LENGTH),
|
2013-03-14 10:33:02 +01:00
|
|
|
SaltedPassword =
|
2017-02-18 07:36:27 +01:00
|
|
|
scram:salted_password(Pass,
|
2013-03-14 10:33:02 +01:00
|
|
|
TempSalt,
|
|
|
|
?SCRAM_DEFAULT_ITERATION_COUNT),
|
|
|
|
{scram:stored_key(scram:client_key(SaltedPassword)),
|
|
|
|
scram:server_key(SaltedPassword),
|
|
|
|
TempSalt,
|
|
|
|
?SCRAM_DEFAULT_ITERATION_COUNT}
|
|
|
|
end,
|
|
|
|
ClientFirstMessageBare =
|
|
|
|
str:substr(ClientIn,
|
|
|
|
str:str(ClientIn, <<"n=">>)),
|
|
|
|
ServerNonce =
|
2017-05-23 09:43:26 +02:00
|
|
|
base64:encode(randoms:bytes(?NONCE_LENGTH)),
|
2013-03-14 10:33:02 +01:00
|
|
|
ServerFirstMessage =
|
|
|
|
iolist_to_binary(
|
|
|
|
["r=",
|
|
|
|
ClientNonce,
|
|
|
|
ServerNonce,
|
|
|
|
",", "s=",
|
2017-05-23 09:43:26 +02:00
|
|
|
base64:encode(Salt),
|
2013-03-14 10:33:02 +01:00
|
|
|
",", "i=",
|
|
|
|
integer_to_list(IterationCount)]),
|
|
|
|
{continue, ServerFirstMessage,
|
|
|
|
State#state{step = 4, stored_key = StoredKey,
|
|
|
|
server_key = ServerKey,
|
2016-12-31 11:47:35 +01:00
|
|
|
auth_module = AuthModule,
|
2013-03-14 10:33:02 +01:00
|
|
|
auth_message =
|
|
|
|
<<ClientFirstMessageBare/binary,
|
|
|
|
",", ServerFirstMessage/binary>>,
|
|
|
|
client_nonce = ClientNonce,
|
|
|
|
server_nonce = ServerNonce,
|
|
|
|
username = UserName}}
|
|
|
|
end;
|
2016-12-31 11:47:35 +01:00
|
|
|
_ -> {error, bad_attribute}
|
2013-03-14 10:33:02 +01:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end;
|
2016-12-31 11:47:35 +01:00
|
|
|
_Else -> {error, parser_failed}
|
2013-03-14 10:33:02 +01:00
|
|
|
end;
|
2011-08-16 00:25:03 +02:00
|
|
|
mech_step(#state{step = 4} = State, ClientIn) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
case str:tokens(ClientIn, <<",">>) of
|
|
|
|
[GS2ChannelBindingAttribute, NonceAttribute,
|
|
|
|
ClientProofAttribute] ->
|
|
|
|
case parse_attribute(GS2ChannelBindingAttribute) of
|
2013-04-17 12:34:53 +02:00
|
|
|
{$c, CVal} ->
|
2017-05-23 09:43:26 +02:00
|
|
|
ChannelBindingSupport = try binary:first(base64:decode(CVal))
|
|
|
|
catch _:badarg -> 0
|
|
|
|
end,
|
2013-04-17 12:34:53 +02:00
|
|
|
if (ChannelBindingSupport == $n)
|
|
|
|
or (ChannelBindingSupport == $y) ->
|
|
|
|
Nonce = <<(State#state.client_nonce)/binary,
|
|
|
|
(State#state.server_nonce)/binary>>,
|
|
|
|
case parse_attribute(NonceAttribute) of
|
|
|
|
{$r, CompareNonce} when CompareNonce == Nonce ->
|
|
|
|
case parse_attribute(ClientProofAttribute) of
|
|
|
|
{$p, ClientProofB64} ->
|
2017-05-23 09:43:26 +02:00
|
|
|
ClientProof = try base64:decode(ClientProofB64)
|
|
|
|
catch _:badarg -> <<>>
|
|
|
|
end,
|
2013-04-17 12:34:53 +02:00
|
|
|
AuthMessage = iolist_to_binary(
|
|
|
|
[State#state.auth_message,
|
|
|
|
",",
|
|
|
|
str:substr(ClientIn, 1,
|
|
|
|
str:str(ClientIn, <<",p=">>)
|
|
|
|
- 1)]),
|
|
|
|
ClientSignature =
|
|
|
|
scram:client_signature(State#state.stored_key,
|
|
|
|
AuthMessage),
|
|
|
|
ClientKey = scram:client_key(ClientProof,
|
|
|
|
ClientSignature),
|
|
|
|
CompareStoredKey = scram:stored_key(ClientKey),
|
|
|
|
if CompareStoredKey == State#state.stored_key ->
|
|
|
|
ServerSignature =
|
|
|
|
scram:server_signature(State#state.server_key,
|
|
|
|
AuthMessage),
|
2016-03-30 16:08:04 +02:00
|
|
|
{ok, [{username, State#state.username},
|
2016-12-31 11:47:35 +01:00
|
|
|
{auth_module, State#state.auth_module},
|
2016-03-30 16:08:04 +02:00
|
|
|
{authzid, State#state.username}],
|
2013-04-17 12:34:53 +02:00
|
|
|
<<"v=",
|
2017-05-23 09:43:26 +02:00
|
|
|
(base64:encode(ServerSignature))/binary>>};
|
2016-12-31 11:47:35 +01:00
|
|
|
true -> {error, not_authorized, State#state.username}
|
2013-04-17 12:34:53 +02:00
|
|
|
end;
|
2016-12-31 11:47:35 +01:00
|
|
|
_ -> {error, bad_attribute}
|
2013-03-14 10:33:02 +01:00
|
|
|
end;
|
2016-12-31 11:47:35 +01:00
|
|
|
{$r, _} -> {error, nonce_mismatch};
|
|
|
|
_ -> {error, bad_attribute}
|
2013-04-17 12:34:53 +02:00
|
|
|
end;
|
2016-12-31 11:47:35 +01:00
|
|
|
true -> {error, bad_channel_binding}
|
2011-08-16 00:25:03 +02:00
|
|
|
end;
|
2016-12-31 11:47:35 +01:00
|
|
|
_ -> {error, bad_attribute}
|
2013-03-14 10:33:02 +01:00
|
|
|
end;
|
2016-12-31 11:47:35 +01:00
|
|
|
_ -> {error, parser_failed}
|
2013-03-14 10:33:02 +01:00
|
|
|
end.
|
2011-08-16 00:25:03 +02:00
|
|
|
|
2016-12-31 11:47:35 +01:00
|
|
|
parse_attribute(<<Name, $=, Val/binary>>) when Val /= <<>> ->
|
|
|
|
case is_alpha(Name) of
|
|
|
|
true -> {Name, Val};
|
|
|
|
false -> {error, bad_attribute}
|
|
|
|
end;
|
|
|
|
parse_attribute(_) ->
|
|
|
|
{error, bad_attribute}.
|
2011-08-16 00:25:03 +02:00
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
unescape_username(<<"">>) -> <<"">>;
|
2011-08-16 00:25:03 +02:00
|
|
|
unescape_username(EscapedUsername) ->
|
2013-03-14 10:33:02 +01:00
|
|
|
Pos = str:str(EscapedUsername, <<"=">>),
|
|
|
|
if Pos == 0 -> EscapedUsername;
|
|
|
|
true ->
|
|
|
|
Start = str:substr(EscapedUsername, 1, Pos - 1),
|
|
|
|
End = str:substr(EscapedUsername, Pos),
|
|
|
|
EndLen = byte_size(End),
|
|
|
|
if EndLen < 3 -> error;
|
|
|
|
true ->
|
|
|
|
case str:substr(End, 1, 3) of
|
|
|
|
<<"=2C">> ->
|
|
|
|
<<Start/binary, ",",
|
|
|
|
(unescape_username(str:substr(End, 4)))/binary>>;
|
|
|
|
<<"=3D">> ->
|
|
|
|
<<Start/binary, "=",
|
|
|
|
(unescape_username(str:substr(End, 4)))/binary>>;
|
|
|
|
_Else -> error
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end.
|
2011-08-16 00:25:03 +02:00
|
|
|
|
2013-03-14 10:33:02 +01:00
|
|
|
is_alpha(Char) when Char >= $a, Char =< $z -> true;
|
|
|
|
is_alpha(Char) when Char >= $A, Char =< $Z -> true;
|
|
|
|
is_alpha(_) -> false.
|