Logo Search packages:      
Sourcecode: sofia-sip version File versions

auth_plugin_ntlm.c

/*
 * This file is part of the Sofia-SIP package
 *
 * Copyright (C) 2005 Nokia Corporation.
 *
 * Contact: Pekka Pessi <pekka.pessi@nokia.com>
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public License
 * as published by the Free Software Foundation; either version 2.1 of
 * the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
 * 02110-1301 USA
 *
 */

/**@CFILE auth_plugin_ntlm.c
 *
 * @brief Plugin for delayed authentication. 
 *
 * This authentication plugin provides authentication operation that is
 * intentionally delayed. It serves as an example of server-side
 * authentication plugins.
 *
 * @author Pekka Pessi <Pekka.Pessi@nokia.com>.
 *
 * @date Created: Wed Apr 11 15:14:03 2001 ppessi
 */

#include "config.h"

#include <stddef.h>
#include <stdlib.h>
#include <string.h>
#include <stdio.h>
#include <assert.h>

#include <sofia-sip/su_debug.h>
#include <sofia-sip/su_wait.h>

#include <sofia-sip/su_alloc.h>
#include <sofia-sip/su_tagarg.h>

#include "sofia-sip/auth_module.h"
#include "sofia-sip/auth_plugin.h"
#include "sofia-sip/auth_ntlm.h"

#if HAVE_FUNC
#elif HAVE_FUNCTION
#define __func__ __FUNCTION__
#else
static char const __func__[] = "auth_plugin_ntml";
#endif

/* ====================================================================== */
/* NTLM authentication scheme */

static int auth_init_ntlm(auth_mod_t *am,
                    auth_scheme_t *base,
                    su_root_t *root,
                    tag_type_t tag, tag_value_t value, ...);

static void auth_method_ntlm_x(auth_mod_t *am,
                         auth_status_t *as,
                         msg_auth_t *au,
                         auth_challenger_t const *ach);

auth_scheme_t auth_scheme_ntlm[1] =
  {{
      "NTLM",                 /* asch_method */
      sizeof (auth_mod_t),    /* asch_size */
      auth_init_default,      /* asch_init */
      auth_method_ntlm_x,     /* asch_check */
      auth_challenge_ntlm,    /* asch_challenge */
      auth_cancel_default,    /* asch_cancel */
      auth_destroy_default    /* asch_destroy */
  }};

#define AUTH_NTLM_NONCE_LEN (BASE64_SIZE(sizeof (struct nonce)) + 1)

static int auth_init_ntlm(auth_mod_t *am,
                       auth_scheme_t *base,
                       su_root_t *root,
                       tag_type_t tag, tag_value_t value, ...)
{
  auth_plugin_t *ap = AUTH_PLUGIN(am);
  int retval = -1;
  ta_list ta;

  ta_start(ta, tag, value);

  if (auth_init_default(am, NULL, root, ta_tags(ta)) != -1) {
    retval = 0;
  }
    
  ta_end(ta);

  return retval;
}


/** Authenticate a request with @b NTLM authentication scheme. 
 *
 * This function reads user database before authentication, if needed.
 */
static
void auth_method_ntlm_x(auth_mod_t *am,
                  auth_status_t *as,
                  msg_auth_t *au,
                  auth_challenger_t const *ach)
{
  if (am) {
    auth_readdb_if_needed(am);
    auth_method_ntlm(am, as, au, ach);
  }
}

/** Authenticate a request with @b Ntlm authentication scheme. 
 */
00128 void auth_method_ntlm(auth_mod_t *am,
                  auth_status_t *as,
                  msg_auth_t *au,
                  auth_challenger_t const *ach)
{
  as->as_allow = as->as_allow || auth_allow_check(am, as) == 0;

  if (as->as_realm)
    au = auth_ntlm_credentials(au, as->as_realm, am->am_opaque,
                         am->am_gssapi_data, am->am_targetname);

  else
    au = NULL;

  if (as->as_allow) {
    SU_DEBUG_5(("%s: allow unauthenticated %s\n", __func__, as->as_method));
    as->as_status = 0, as->as_phrase = NULL;
    as->as_match = (msg_header_t *)au;
    return;
  } 

  if (au) {
    auth_response_t ar[1] = {{ sizeof(ar) }};
    auth_ntlm_response_get(as->as_home, ar, au->au_params);
    as->as_match = (msg_header_t *)au;
    auth_check_ntlm(am, as, ar, ach);
  }
  else {
    /* There was no matching credentials, send challenge */
    SU_DEBUG_5(("%s: no credentials matched\n", __func__));
    auth_challenge_ntlm(am, as, ach);
  }
}


/** Find a NTLM credential header with matching realm and opaque. */
00164 msg_auth_t *auth_ntlm_credentials(msg_auth_t *auth, 
                          char const *realm,
                          char const *opaque,
                          char const *gssapidata,
                          char const *targetname)
{
  char const *agssapidata, *atargetname;

  for (;auth; auth = auth_mod_credentials(auth->au_next)) {
    if (strcasecmp(auth->au_scheme, "NTLM"))
      continue;

    if (gssapidata) {
      agssapidata = msg_header_find_param(auth->au_common, "gssapi-data=");
      if (!agssapidata || auth_strcmp(agssapidata, gssapidata))
      continue;
    }

    if (targetname) {
      atargetname = msg_header_find_param(auth->au_common, "targetname=");
      if (!atargetname || auth_strcmp(atargetname, targetname))
      continue;
    }

    return auth;
  }

  return NULL;
}


/** Check ntlm authentication */
00196 void auth_check_ntlm(auth_mod_t *am,
                   auth_status_t *as,
                   auth_response_t *ar,
                   auth_challenger_t const *ach)
{
  char const *a1;
  auth_hexmd5_t a1buf, response;
  auth_passwd_t *apw;
  char const *phrase;
  msg_time_t now = msg_now();

  if (am == NULL || as == NULL || ar == NULL || ach == NULL) {
    if (as) {
      as->as_status = 500, as->as_phrase = "Internal Server Error";
      as->as_response = NULL;
    }
    return;
  }

  phrase = "Bad authorization";

#define PA "Authorization missing "

  if ((!ar->ar_username && (phrase = PA "username")) || 
      (!ar->ar_nonce && (phrase = PA "nonce")) || 
      (!ar->ar_uri && (phrase = PA "URI")) || 
      (!ar->ar_response && (phrase = PA "response")) || 
      /* (!ar->ar_opaque && (phrase = PA "opaque")) || */
      /* Check for qop */
      (ar->ar_qop && 
       ((ar->ar_auth && 
       strcasecmp(ar->ar_qop, "auth") &&
       strcasecmp(ar->ar_qop, "\"auth\"")) ||
      (ar->ar_auth_int && 
       strcasecmp(ar->ar_qop, "auth-int") &&
       strcasecmp(ar->ar_qop, "\"auth-int\""))) 
       && (phrase = PA "has invalid qop"))) {
    assert(phrase);
    SU_DEBUG_5(("auth_method_ntlm: 400 %s\n", phrase));
    as->as_status = 400, as->as_phrase = phrase;
    as->as_response = NULL;
    return;
  }

  /* XXX - replace */
#if 0
  if (as->as_nonce_issued == 0 /* Already validated nonce */ && 
      auth_validate_ntlm_nonce(am, as, ar, now) < 0) {
#else
  if (as->as_nonce_issued == 0 /* Already validated nonce */ && 
      auth_validate_digest_nonce(am, as, ar, now) < 0) {
#endif
    as->as_blacklist = am->am_blacklist;
    auth_challenge_ntlm(am, as, ach);
    return;
  }

  if (as->as_stale) {
    auth_challenge_ntlm(am, as, ach);
    return;
  }

  apw = auth_mod_getpass(am, ar->ar_username, ar->ar_realm);

#if 0
  if (apw && apw->apw_hash)
    a1 = apw->apw_hash;
  else if (apw && apw->apw_pass)
    auth_ntlm_a1(ar, a1buf, apw->apw_pass), a1 = a1buf;
  else 
    auth_ntlm_a1(ar, a1buf, "xyzzy"), a1 = a1buf, apw = NULL;
  
  if (ar->ar_md5sess)
    auth_ntlm_a1sess(ar, a1buf, a1), a1 = a1buf;
#else
  if (apw && apw->apw_hash)
    a1 = apw->apw_hash;
  else if (apw && apw->apw_pass)
    auth_digest_a1(ar, a1buf, apw->apw_pass), a1 = a1buf;
  else 
    auth_digest_a1(ar, a1buf, "xyzzy"), a1 = a1buf, apw = NULL;
  
  if (ar->ar_md5sess)
    auth_digest_a1sess(ar, a1buf, a1), a1 = a1buf;
#endif

  /* XXX - replace with auth_ntlm_response */      
#if 0
  auth_ntlm_response(ar, response, a1, 
                 as->as_method, as->as_body, as->as_bodylen);
#else
  auth_digest_response(ar, response, a1, 
                   as->as_method, as->as_body, as->as_bodylen);
#endif

  if (!apw || strcmp(response, ar->ar_response)) {
    if (am->am_forbidden) {
      as->as_status = 403, as->as_phrase = "Forbidden";
      as->as_blacklist = am->am_blacklist;
      as->as_response = NULL;
    }
    else {
      auth_challenge_ntlm(am, as, ach);
      as->as_blacklist = am->am_blacklist;
    }
    SU_DEBUG_5(("auth_method_ntlm: response did not match\n"));

    return;
  }

  assert(apw);

  as->as_user = apw->apw_user;
  as->as_anonymous = apw == am->am_anon_user;

  if (am->am_nextnonce || am->am_mutual)
    auth_info_ntlm(am, as, ach);

  if (am->am_challenge)
    auth_challenge_ntlm(am, as, ach);

  SU_DEBUG_7(("auth_method_ntlm: successful authentication\n"));

  as->as_status = 0;    /* Successful authentication! */
  as->as_phrase = "";
}

/** Construct a challenge header for @b Ntlm authentication scheme. */
00324 void auth_challenge_ntlm(auth_mod_t *am, 
                     auth_status_t *as,
                     auth_challenger_t const *ach)
{
  char const *u, *d;
  char nonce[AUTH_NTLM_NONCE_LEN];

#if 0
  auth_generate_ntlm_nonce(am, nonce, sizeof nonce, 0, msg_now());
#else
  auth_generate_digest_nonce(am, nonce, sizeof nonce, 0, msg_now());
#endif

  u = as->as_uri;
  d = as->as_pdomain;

  as->as_response = 
    msg_header_format(as->as_home, ach->ach_header, 
                  "Ntlm"
                  " realm=\"%s\","
                  "%s%s%s"
                  "%s%s%s"
                  " nonce=\"%s\","
                  "%s%s%s"
                  "%s"  /* stale */
                  " algorithm=%s" 
                  "%s%s%s",
                  as->as_realm, 
                  u ? " uri=\"" : "", u ? u : "", u ? "\"," : "", 
                  d ? " domain=\"" : "", d ? d : "", d ? "\"," : "", 
                  nonce, 
                  am->am_opaque ? " opaque=\"" : "",
                  am->am_opaque ? am->am_opaque : "",
                  am->am_opaque ? "\"," : "",
                  as->as_stale ? " stale=true," : "",
                  am->am_algorithm,
                  am->am_qop ? ", qop=\"" : "",
                  am->am_qop ? am->am_qop : "",
                  am->am_qop ? "\"" : "");

  if (!as->as_response)
    as->as_status = 500, as->as_phrase = auth_internal_server_error;
  else
    as->as_status = ach->ach_status, as->as_phrase = ach->ach_phrase;
}

/** Construct a info header for @b Ntlm authentication scheme. */
00371 void auth_info_ntlm(auth_mod_t *am, 
                  auth_status_t *as,
                  auth_challenger_t const *ach)
{
  if (!ach->ach_info)
    return;

  if (am->am_nextnonce) {
    char nonce[AUTH_NTLM_NONCE_LEN];

    /* XXX - replace */
#if 0
    auth_generate_ntlm_nonce(am, nonce, sizeof nonce, 1, msg_now());
#else
    auth_generate_digest_nonce(am, nonce, sizeof nonce, 1, msg_now());
#endif

    as->as_info = 
      msg_header_format(as->as_home, ach->ach_info, "nextnonce=\"%s\"", nonce);
  }
}

Generated by  Doxygen 1.6.0   Back to index