Files
ocserv/src/worker-auth.c
Nikos Mavrogiannopoulos 6608f7ad7f Fixed UDP side.
2013-01-31 20:18:29 +01:00

478 lines
11 KiB
C

/*
* Copyright (C) 2012, 2013 David Woodhouse
* Copyright (C) 2013 Nikos Mavrogiannopoulos
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#include <config.h>
#include <gnutls/gnutls.h>
#include <gnutls/crypto.h>
#include <gnutls/x509.h>
#include <errno.h>
#include <stdlib.h>
#include <stdarg.h>
#include <stdio.h>
#include <string.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
#include <unistd.h>
#include <limits.h>
#include <vpn.h>
#include <worker-auth.h>
#include <cookies.h>
#include <tlslib.h>
#include <http-parser/http_parser.h>
#define SUCCESS_MSG "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\r\n" \
"<auth id=\"success\">\r\n" \
"<banner>Success</banner>\r\n" \
"</auth>\r\n"
const char login_msg[] = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\r\n"
"<auth id=\"main\">\r\n"
"<message>Please enter your username and password.</message>\r\n"
"<form method=\"post\" action=\"/auth\">\r\n"
"<input type=\"text\" name=\"username\" label=\"Username:\" />\r\n"
"<input type=\"password\" name=\"password\" label=\"Password:\" />\r\n"
"</form></auth>\r\n";
int get_auth_handler(worker_st *ws)
{
tls_puts(ws->session, "HTTP/1.1 200 OK\r\n");
tls_puts(ws->session, "Connection: close\r\n");
tls_puts(ws->session, "Content-Type: text/xml\r\n");
tls_printf(ws->session, "Content-Length: %u\r\n", (unsigned int)sizeof(login_msg)-1);
tls_puts(ws->session, "X-Transcend-Version: 1\r\n");
tls_puts(ws->session, "\r\n");
tls_send(ws->session, login_msg, sizeof(login_msg)-1);
return 0;
}
static
int get_cert_username(worker_st *ws, const gnutls_datum_t* raw,
char* username, size_t username_size)
{
gnutls_x509_crt_t crt;
int ret;
ret = gnutls_x509_crt_init(&crt);
if (ret < 0) {
oclog(ws, LOG_ERR, "certificate error: %s", gnutls_strerror(ret));
goto fail;
}
ret = gnutls_x509_crt_import(crt, raw, GNUTLS_X509_FMT_DER);
if (ret < 0) {
oclog(ws, LOG_ERR, "certificate error: %s", gnutls_strerror(ret));
goto fail;
}
ret = gnutls_x509_crt_get_dn_by_oid (crt, ws->config->cert_user_oid,
0, 0, username, &username_size);
if (ret < 0) {
oclog(ws, LOG_ERR, "certificate error: %s", gnutls_strerror(ret));
goto fail;
}
ret = 0;
fail:
gnutls_x509_crt_deinit(crt);
return ret;
}
static int send_auth_req(int fd, const struct cmd_auth_req_st* r)
{
struct iovec iov[2];
uint8_t cmd;
struct msghdr hdr;
memset(&hdr, 0, sizeof(hdr));
cmd = AUTH_REQ;
iov[0].iov_base = &cmd;
iov[0].iov_len = 1;
iov[1].iov_base = (void*)r;
iov[1].iov_len = sizeof(*r);
hdr.msg_iov = iov;
hdr.msg_iovlen = 2;
return(sendmsg(fd, &hdr, 0));
}
static int send_auth_cookie_req(int fd, const struct cmd_auth_cookie_req_st* r)
{
struct iovec iov[2];
uint8_t cmd;
struct msghdr hdr;
memset(&hdr, 0, sizeof(hdr));
cmd = AUTH_COOKIE_REQ;
iov[0].iov_base = &cmd;
iov[0].iov_len = 1;
iov[1].iov_base = (void*)r;
iov[1].iov_len = sizeof(*r);
hdr.msg_iov = iov;
hdr.msg_iovlen = 2;
return(sendmsg(fd, &hdr, 0));
}
static int recv_auth_reply(worker_st *ws)
{
struct iovec iov[2];
uint8_t cmd = 0;
struct cmd_auth_reply_st resp;
struct msghdr hdr;
int ret;
union {
struct cmsghdr cm;
char control[CMSG_SPACE(sizeof(int))];
} control_un;
struct cmsghdr *cmptr;
iov[0].iov_base = &cmd;
iov[0].iov_len = 1;
iov[1].iov_base = &resp;
iov[1].iov_len = sizeof(resp);
memset(&hdr, 0, sizeof(hdr));
hdr.msg_iov = iov;
hdr.msg_iovlen = 2;
hdr.msg_control = control_un.control;
hdr.msg_controllen = sizeof(control_un.control);
ret = recvmsg( ws->cmd_fd, &hdr, 0);
if (ret < sizeof(resp)+1) {
oclog(ws, LOG_ERR, "Received incorrect data (%d, expected %d) from main", ret, (int)sizeof(resp)+1);
return -1;
}
if (cmd != AUTH_REP)
return -1;
switch(resp.reply) {
case REP_AUTH_OK:
if ( (cmptr = CMSG_FIRSTHDR(&hdr)) != NULL && cmptr->cmsg_len == CMSG_LEN(sizeof(int))) {
if (cmptr->cmsg_level != SOL_SOCKET)
return -1;
if (cmptr->cmsg_type != SCM_RIGHTS)
return -1;
memcpy(&ws->tun_fd, CMSG_DATA(cmptr), sizeof(int));
memcpy(ws->tun_name, resp.vname, sizeof(ws->tun_name));
memcpy(ws->username, resp.user, sizeof(ws->username));
memcpy(ws->cookie, resp.cookie, sizeof(ws->cookie));
memcpy(ws->master_secret, resp.master_secret, sizeof(ws->master_secret));
memcpy(ws->session_id, resp.session_id, sizeof(ws->session_id));
ws->auth_ok = 1;
} else
return -1;
break;
default:
return -1;
}
return 0;
}
/* grabs the username from the session certificate */
static
int get_cert_info(worker_st *ws, char* user, unsigned user_size)
{
const gnutls_datum_t * cert;
unsigned int ncerts;
int ret;
/* this is superflous. Verification has already been performed
* during handshake. */
cert = gnutls_certificate_get_peers (ws->session, &ncerts);
if (cert == NULL) {
return -1;
}
if (ws->config->cert_user_oid) { /* otherwise certificate username is ignored */
ret = get_cert_username(ws, cert, user, user_size);
if (ret < 0) {
oclog(ws, LOG_ERR, "Cannot get username (%s) from certificate", ws->config->cert_user_oid);
return -1;
}
}
return 0;
}
/* sends an authentication request to main thread and waits for
* a reply.
* Returns 0 on success.
*/
static int auth_user(worker_st *ws, struct cmd_auth_req_st* areq)
{
int ret;
if (ws->config->auth_types & AUTH_TYPE_CERTIFICATE) {
ret = get_cert_info(ws, areq->cert_user, sizeof(areq->cert_user));
if (ret < 0)
return -1;
areq->tls_auth_ok = 1;
}
oclog(ws, LOG_DEBUG, "Sending authentication request");
ret = send_auth_req(ws->cmd_fd, areq);
if (ret < 0)
return ret;
return recv_auth_reply(ws);
}
/* sends a cookie authentication request to main thread and waits for
* a reply.
* Returns 0 on success.
*/
int auth_cookie(worker_st *ws, void* cookie, size_t cookie_size)
{
int ret;
struct cmd_auth_cookie_req_st areq;
if (cookie_size != sizeof(areq.cookie))
return -1;
if (ws->config->auth_types & AUTH_TYPE_CERTIFICATE) {
ret = get_cert_info(ws, areq.cert_user, sizeof(areq.cert_user));
if (ret < 0)
return -1;
areq.tls_auth_ok = 1;
}
memcpy(areq.cookie, cookie, sizeof(areq.cookie));
oclog(ws, LOG_DEBUG, "Sending cookie authentication request");
ret = send_auth_cookie_req(ws->cmd_fd, &areq);
if (ret < 0)
return ret;
return recv_auth_reply(ws);
}
int post_old_auth_handler(worker_st *ws)
{
int ret;
struct req_data_st *req = ws->parser->data;
const char* reason = "Authentication failed";
char str_cookie[2*COOKIE_SIZE+1];
char * username = NULL;
char * password = NULL;
char *p;
unsigned int i;
struct cmd_auth_req_st areq;
memset(&areq, 0, sizeof(areq));
if (ws->config->auth_types & AUTH_TYPE_USERNAME_PASS) {
/* body should be "username=test&password=test" */
username = strstr(req->body, "username=");
if (username == NULL) {
reason = "No username";
goto auth_fail;
}
username += sizeof("username=")-1;
password = strstr(req->body, "password=");
if (password == NULL) {
reason = "No password";
goto auth_fail;
}
password += sizeof("password=")-1;
/* modify body */
p = username;
while(*p != 0) {
if (*p == '&') {
*p = 0;
break;
}
p++;
}
p = password;
while(*p != 0) {
if (*p == '&') {
*p = 0;
break;
}
p++;
}
areq.user_pass_present = 1;
snprintf(areq.user, sizeof(areq.user), "%s", username);
snprintf(areq.pass, sizeof(areq.pass), "%s", password);
}
ret = auth_user(ws, &areq);
if (ret < 0) {
if (username)
oclog(ws, LOG_INFO, "Failed authentication attempt for '%s'", username);
else
oclog(ws, LOG_INFO, "Failed authentication attempt");
goto auth_fail;
}
oclog(ws, LOG_INFO, "User '%s' logged in\n", ws->username);
p = str_cookie;
for (i=0;i<sizeof(ws->cookie);i++) {
sprintf(p, "%.2x", (unsigned int)ws->cookie[i]);
p+=2;
}
/* reply */
tls_puts(ws->session, "HTTP/1.1 200 OK\r\n");
tls_puts(ws->session, "Content-Type: text/xml\r\n");
tls_printf(ws->session, "Content-Length: %u\r\n", (unsigned)(sizeof(SUCCESS_MSG)-1));
tls_puts(ws->session, "X-Transcend-Version: 1\r\n");
tls_printf(ws->session, "Set-Cookie: webvpn=%s\r\n", str_cookie);
tls_puts(ws->session, "\r\n"SUCCESS_MSG);
return 0;
auth_fail:
tls_puts(ws->session, "HTTP/1.1 503 Service Unavailable\r\n");
tls_printf(ws->session,
"X-Reason: %s\r\n\r\n", reason);
tls_fatal_close(ws->session, GNUTLS_A_ACCESS_DENIED);
exit(1);
}
#define XMLUSER "<username>"
#define XMLPASS "<password>"
#define XMLUSER_END "</username>"
#define XMLPASS_END "</password>"
int post_new_auth_handler(worker_st *ws)
{
int ret;
struct req_data_st *req = ws->parser->data;
const char* reason = "Authentication failed";
char str_cookie[2*COOKIE_SIZE+1];
char * username = NULL;
char * password = NULL;
char *p;
unsigned int i;
struct cmd_auth_req_st areq;
memset(&areq, 0, sizeof(areq));
if (ws->config->auth_types & AUTH_TYPE_USERNAME_PASS) {
/* body should contain <username>test</username><password>test</password> */
username = strstr(req->body, XMLUSER);
if (username == NULL) {
reason = "No username";
goto ask_auth;
}
username += sizeof(XMLUSER)-1;
password = strstr(req->body, XMLPASS);
if (password == NULL) {
reason = "No password";
goto auth_fail;
}
password += sizeof(XMLPASS)-1;
/* modify body */
p = username;
while(*p != 0) {
if (*p == '<' && (strncmp(p, XMLUSER_END, sizeof(XMLUSER_END)-1) == 0)) {
*p = 0;
break;
}
p++;
}
p = password;
while(*p != 0) {
if (*p == '<' && (strncmp(p, XMLPASS_END, sizeof(XMLPASS_END)-1) == 0)) {
*p = 0;
break;
}
p++;
}
areq.user_pass_present = 1;
snprintf(areq.user, sizeof(areq.user), "%s", username);
snprintf(areq.pass, sizeof(areq.pass), "%s", password);
}
ret = auth_user(ws, &areq);
if (ret < 0) {
if (username)
oclog(ws, LOG_INFO, "Failed authentication attempt for '%s'", username);
else
oclog(ws, LOG_INFO, "Failed authentication attempt");
goto auth_fail;
}
oclog(ws, LOG_INFO, "User '%s' logged in\n", ws->username);
p = str_cookie;
for (i=0;i<sizeof(ws->cookie);i++) {
sprintf(p, "%.2x", (unsigned int)ws->cookie[i]);
p+=2;
}
/* reply */
tls_puts(ws->session, "HTTP/1.1 200 OK\r\n");
tls_puts(ws->session, "Content-Type: text/xml\r\n");
tls_printf(ws->session, "Content-Length: %u\r\n", (unsigned)(sizeof(SUCCESS_MSG)-1));
tls_puts(ws->session, "X-Transcend-Version: 1\r\n");
tls_printf(ws->session, "Set-Cookie: webvpn=%s\r\n", str_cookie);
tls_puts(ws->session, "\r\n"SUCCESS_MSG);
return 0;
ask_auth:
return get_auth_handler(ws);
auth_fail:
tls_puts(ws->session, "HTTP/1.1 503 Service Unavailable\r\n");
tls_printf(ws->session,
"X-Reason: %s\r\n\r\n", reason);
tls_fatal_close(ws->session, GNUTLS_A_ACCESS_DENIED);
exit(1);
}