2003-03-12 20:48:05 +01:00
|
|
|
%%%----------------------------------------------------------------------
|
|
|
|
%%% File : cyrsasl_digest.erl
|
|
|
|
%%% Author : Alexey Shchepin <alexey@sevcom.net>
|
|
|
|
%%% Purpose : DIGEST-MD5 SASL mechanism
|
|
|
|
%%% Created : 11 Mar 2003 by Alexey Shchepin <alexey@sevcom.net>
|
2009-06-09 12:56:14 +02:00
|
|
|
%%%
|
|
|
|
%%%
|
|
|
|
%%% ejabberd, Copyright (C) 2002-2009 ProcessOne
|
|
|
|
%%%
|
|
|
|
%%% This program is free software; you can redistribute it and/or
|
|
|
|
%%% modify it under the terms of the GNU General Public License as
|
|
|
|
%%% published by the Free Software Foundation; either version 2 of the
|
|
|
|
%%% License, or (at your option) any later version.
|
|
|
|
%%%
|
|
|
|
%%% This program is distributed in the hope that it will be useful,
|
|
|
|
%%% but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
%%% MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
%%% General Public License for more details.
|
|
|
|
%%%
|
|
|
|
%%% You should have received a copy of the GNU General Public License
|
|
|
|
%%% along with this program; if not, write to the Free Software
|
|
|
|
%%% Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
|
|
|
|
%%% 02111-1307 USA
|
|
|
|
%%%
|
2003-03-12 20:48:05 +01:00
|
|
|
%%%----------------------------------------------------------------------
|
|
|
|
|
|
|
|
-module(cyrsasl_digest).
|
|
|
|
-author('alexey@sevcom.net').
|
|
|
|
|
|
|
|
-export([start/1,
|
|
|
|
stop/0,
|
2009-04-22 13:44:03 +02:00
|
|
|
mech_new/4,
|
2003-03-12 20:48:05 +01:00
|
|
|
mech_step/2]).
|
|
|
|
|
2008-03-21 15:44:16 +01:00
|
|
|
-include("ejabberd.hrl").
|
|
|
|
|
2003-03-12 20:48:05 +01:00
|
|
|
-behaviour(cyrsasl).
|
|
|
|
|
2009-04-22 13:44:03 +02:00
|
|
|
-record(state, {step, nonce, username, authzid, get_password, check_password, auth_module,
|
2008-12-23 02:02:44 +01:00
|
|
|
host}).
|
2003-03-12 20:48:05 +01:00
|
|
|
|
2005-04-17 20:08:34 +02:00
|
|
|
start(_Opts) ->
|
2005-07-13 05:24:13 +02:00
|
|
|
cyrsasl:register_mechanism("DIGEST-MD5", ?MODULE, true).
|
2003-03-12 20:48:05 +01:00
|
|
|
|
|
|
|
stop() ->
|
|
|
|
ok.
|
|
|
|
|
2009-04-22 13:44:03 +02:00
|
|
|
mech_new(Host, GetPassword, _CheckPassword, CheckPasswordDigest) ->
|
2003-03-12 20:48:05 +01:00
|
|
|
{ok, #state{step = 1,
|
2005-04-17 20:08:34 +02:00
|
|
|
nonce = randoms:get_string(),
|
2008-12-23 02:02:44 +01:00
|
|
|
host = Host,
|
2009-04-22 13:44:03 +02:00
|
|
|
get_password = GetPassword,
|
|
|
|
check_password = CheckPasswordDigest}}.
|
2003-03-12 20:48:05 +01:00
|
|
|
|
2003-11-23 21:11:21 +01:00
|
|
|
mech_step(#state{step = 1, nonce = Nonce} = State, _) ->
|
2003-03-12 20:48:05 +01:00
|
|
|
{continue,
|
2003-10-16 20:17:44 +02:00
|
|
|
"nonce=\"" ++ Nonce ++
|
2003-10-07 22:31:44 +02:00
|
|
|
"\",qop=\"auth\",charset=utf-8,algorithm=md5-sess",
|
2003-03-12 20:48:05 +01:00
|
|
|
State#state{step = 3}};
|
|
|
|
mech_step(#state{step = 3, nonce = Nonce} = State, ClientIn) ->
|
|
|
|
case parse(ClientIn) of
|
|
|
|
bad ->
|
2003-06-07 19:30:25 +02:00
|
|
|
{error, "bad-protocol"};
|
2003-03-12 20:48:05 +01:00
|
|
|
KeyVals ->
|
2008-12-23 02:02:44 +01:00
|
|
|
DigestURI = xml:get_attr_s("digest-uri", KeyVals),
|
2003-03-12 20:48:05 +01:00
|
|
|
UserName = xml:get_attr_s("username", KeyVals),
|
2008-12-23 02:02:44 +01:00
|
|
|
case is_digesturi_valid(DigestURI, State#state.host) of
|
|
|
|
false ->
|
|
|
|
?DEBUG("User login not authorized because digest-uri "
|
|
|
|
"seems invalid: ~p", [DigestURI]),
|
2007-02-20 00:35:42 +01:00
|
|
|
{error, "not-authorized", UserName};
|
2008-12-23 02:02:44 +01:00
|
|
|
true ->
|
|
|
|
AuthzId = xml:get_attr_s("authzid", KeyVals),
|
|
|
|
case (State#state.get_password)(UserName) of
|
|
|
|
{false, _} ->
|
|
|
|
{error, "not-authorized", UserName};
|
|
|
|
{Passwd, AuthModule} ->
|
2009-04-27 22:24:21 +02:00
|
|
|
case (State#state.check_password)(UserName, "",
|
2009-04-22 13:44:03 +02:00
|
|
|
xml:get_attr_s("response", KeyVals),
|
|
|
|
fun(PW) -> response(KeyVals, UserName, PW, Nonce, AuthzId,
|
|
|
|
"AUTHENTICATE") end) of
|
|
|
|
{true, _} ->
|
2008-12-23 02:02:44 +01:00
|
|
|
RspAuth = response(KeyVals,
|
|
|
|
UserName, Passwd,
|
|
|
|
Nonce, AuthzId, ""),
|
|
|
|
{continue,
|
|
|
|
"rspauth=" ++ RspAuth,
|
|
|
|
State#state{step = 5,
|
|
|
|
auth_module = AuthModule,
|
|
|
|
username = UserName,
|
|
|
|
authzid = AuthzId}};
|
2009-04-27 22:24:21 +02:00
|
|
|
false ->
|
|
|
|
{error, "not-authorized", UserName};
|
2009-04-22 13:44:03 +02:00
|
|
|
{false, _} ->
|
2008-12-23 02:02:44 +01:00
|
|
|
{error, "not-authorized", UserName}
|
|
|
|
end
|
2003-03-12 20:48:05 +01:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end;
|
2003-06-07 19:30:25 +02:00
|
|
|
mech_step(#state{step = 5,
|
2008-04-22 19:41:30 +02:00
|
|
|
auth_module = AuthModule,
|
2003-06-07 19:30:25 +02:00
|
|
|
username = UserName,
|
2005-04-17 20:08:34 +02:00
|
|
|
authzid = AuthzId}, "") ->
|
2008-04-22 19:41:30 +02:00
|
|
|
{ok, [{username, UserName}, {authzid, AuthzId},
|
|
|
|
{auth_module, AuthModule}]};
|
2003-03-12 20:48:05 +01:00
|
|
|
mech_step(A, B) ->
|
2008-03-21 15:44:16 +01:00
|
|
|
?DEBUG("SASL DIGEST: A ~p B ~p", [A,B]),
|
2003-06-07 19:30:25 +02:00
|
|
|
{error, "bad-protocol"}.
|
2003-03-12 20:48:05 +01:00
|
|
|
|
|
|
|
parse(S) ->
|
|
|
|
parse1(S, "", []).
|
|
|
|
|
|
|
|
parse1([$= | Cs], S, Ts) ->
|
|
|
|
parse2(Cs, lists:reverse(S), "", Ts);
|
2005-08-11 01:29:16 +02:00
|
|
|
parse1([$, | Cs], [], Ts) ->
|
|
|
|
parse1(Cs, [], Ts);
|
|
|
|
parse1([$\s | Cs], [], Ts) ->
|
|
|
|
parse1(Cs, [], Ts);
|
2003-03-12 20:48:05 +01:00
|
|
|
parse1([C | Cs], S, Ts) ->
|
|
|
|
parse1(Cs, [C | S], Ts);
|
|
|
|
parse1([], [], T) ->
|
|
|
|
lists:reverse(T);
|
2005-04-17 20:08:34 +02:00
|
|
|
parse1([], _S, _T) ->
|
2003-03-12 20:48:05 +01:00
|
|
|
bad.
|
|
|
|
|
2008-02-14 06:23:16 +01:00
|
|
|
parse2([$\" | Cs], Key, Val, Ts) ->
|
2003-03-12 20:48:05 +01:00
|
|
|
parse3(Cs, Key, Val, Ts);
|
|
|
|
parse2([C | Cs], Key, Val, Ts) ->
|
|
|
|
parse4(Cs, Key, [C | Val], Ts);
|
|
|
|
parse2([], _, _, _) ->
|
|
|
|
bad.
|
|
|
|
|
2008-02-14 06:23:16 +01:00
|
|
|
parse3([$\" | Cs], Key, Val, Ts) ->
|
2003-03-12 20:48:05 +01:00
|
|
|
parse4(Cs, Key, Val, Ts);
|
2008-02-14 06:23:16 +01:00
|
|
|
parse3([$\\, C | Cs], Key, Val, Ts) ->
|
|
|
|
parse3(Cs, Key, [C | Val], Ts);
|
2003-03-12 20:48:05 +01:00
|
|
|
parse3([C | Cs], Key, Val, Ts) ->
|
|
|
|
parse3(Cs, Key, [C | Val], Ts);
|
|
|
|
parse3([], _, _, _) ->
|
|
|
|
bad.
|
|
|
|
|
|
|
|
parse4([$, | Cs], Key, Val, Ts) ->
|
|
|
|
parse1(Cs, "", [{Key, lists:reverse(Val)} | Ts]);
|
2005-08-11 01:29:16 +02:00
|
|
|
parse4([$\s | Cs], Key, Val, Ts) ->
|
|
|
|
parse4(Cs, Key, Val, Ts);
|
2003-03-12 20:48:05 +01:00
|
|
|
parse4([C | Cs], Key, Val, Ts) ->
|
|
|
|
parse4(Cs, Key, [C | Val], Ts);
|
|
|
|
parse4([], Key, Val, Ts) ->
|
|
|
|
parse1([], "", [{Key, lists:reverse(Val)} | Ts]).
|
|
|
|
|
|
|
|
|
2008-12-23 02:02:44 +01:00
|
|
|
%% @doc Check if the digest-uri is valid.
|
|
|
|
%% RFC-2831 allows to provide the IP address in Host,
|
|
|
|
%% however ejabberd doesn't allow that.
|
|
|
|
%% If the service (for example jabber.example.org)
|
|
|
|
%% is provided by several hosts (being one of them server3.example.org),
|
|
|
|
%% then digest-uri can be like xmpp/server3.example.org/jabber.example.org
|
|
|
|
%% In that case, ejabberd only checks the service name, not the host.
|
|
|
|
is_digesturi_valid(DigestURICase, JabberHost) ->
|
|
|
|
DigestURI = stringprep:tolower(DigestURICase),
|
|
|
|
case catch string:tokens(DigestURI, "/") of
|
|
|
|
["xmpp", Host] when Host == JabberHost ->
|
|
|
|
true;
|
|
|
|
["xmpp", _Host, ServName] when ServName == JabberHost ->
|
|
|
|
true;
|
|
|
|
_ ->
|
|
|
|
false
|
|
|
|
end.
|
2003-03-12 20:48:05 +01:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
digit_to_xchar(D) when (D >= 0) and (D < 10) ->
|
|
|
|
D + 48;
|
|
|
|
digit_to_xchar(D) ->
|
|
|
|
D + 87.
|
|
|
|
|
|
|
|
hex(S) ->
|
|
|
|
hex(S, []).
|
|
|
|
|
|
|
|
hex([], Res) ->
|
|
|
|
lists:reverse(Res);
|
|
|
|
hex([N | Ns], Res) ->
|
|
|
|
hex(Ns, [digit_to_xchar(N rem 16),
|
|
|
|
digit_to_xchar(N div 16) | Res]).
|
|
|
|
|
|
|
|
|
2003-10-16 20:17:44 +02:00
|
|
|
response(KeyVals, User, Passwd, Nonce, AuthzId, A2Prefix) ->
|
2003-03-12 20:48:05 +01:00
|
|
|
Realm = xml:get_attr_s("realm", KeyVals),
|
|
|
|
CNonce = xml:get_attr_s("cnonce", KeyVals),
|
|
|
|
DigestURI = xml:get_attr_s("digest-uri", KeyVals),
|
|
|
|
NC = xml:get_attr_s("nc", KeyVals),
|
|
|
|
QOP = xml:get_attr_s("qop", KeyVals),
|
2003-06-07 19:30:25 +02:00
|
|
|
A1 = case AuthzId of
|
|
|
|
"" ->
|
|
|
|
binary_to_list(
|
|
|
|
crypto:md5(User ++ ":" ++ Realm ++ ":" ++ Passwd)) ++
|
|
|
|
":" ++ Nonce ++ ":" ++ CNonce;
|
|
|
|
_ ->
|
|
|
|
binary_to_list(
|
|
|
|
crypto:md5(User ++ ":" ++ Realm ++ ":" ++ Passwd)) ++
|
|
|
|
":" ++ Nonce ++ ":" ++ CNonce ++ ":" ++ AuthzId
|
|
|
|
end,
|
2005-04-17 20:08:34 +02:00
|
|
|
A2 = case QOP of
|
|
|
|
"auth" ->
|
|
|
|
A2Prefix ++ ":" ++ DigestURI;
|
|
|
|
_ ->
|
|
|
|
A2Prefix ++ ":" ++ DigestURI ++
|
|
|
|
":00000000000000000000000000000000"
|
|
|
|
end,
|
2003-03-12 20:48:05 +01:00
|
|
|
T = hex(binary_to_list(crypto:md5(A1))) ++ ":" ++ Nonce ++ ":" ++
|
|
|
|
NC ++ ":" ++ CNonce ++ ":" ++ QOP ++ ":" ++
|
|
|
|
hex(binary_to_list(crypto:md5(A2))),
|
|
|
|
hex(binary_to_list(crypto:md5(T))).
|
|
|
|
|
|
|
|
|
|
|
|
|