1
0
mirror of https://github.com/irssi/irssi.git synced 2024-06-09 06:20:45 +00:00
irssi/src/irc/core/sasl.c
2024-04-01 16:33:36 +02:00

438 lines
13 KiB
C

/*
fe-sasl.c : irssi
Copyright (C) 2015 The Lemon Man
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License along
with this program; if not, write to the Free Software Foundation, Inc.,
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*/
#include "module.h"
#include <irssi/src/core/misc.h>
#include <irssi/src/core/settings.h>
#include <irssi/src/irc/core/irc-cap.h>
#include <irssi/src/irc/core/irc-servers.h>
#include <irssi/src/irc/core/sasl.h>
/*
* Based on IRCv3 SASL Extension Specification:
* http://ircv3.net/specs/extensions/sasl-3.1.html
*/
#define AUTHENTICATE_CHUNK_SIZE 400 /* bytes */
/*
* Maximum size to allow the buffer to grow to before the next fragment comes in. Note that
* due to the way fragmentation works, the maximum message size will actually be:
* floor(AUTHENTICATE_MAX_SIZE / AUTHENTICATE_CHUNK_SIZE) + AUTHENTICATE_CHUNK_SIZE - 1
*/
#define AUTHENTICATE_MAX_SIZE 8192 /* bytes */
#define SASL_TIMEOUT (20 * 1000) /* ms */
static gboolean sasl_timeout(IRC_SERVER_REC *server)
{
/* The authentication timed out, we can't do much beside terminating it */
irc_send_cmd_now(server, "AUTHENTICATE *");
irc_cap_finish_negotiation(server);
server->sasl_timeout = 0;
server->sasl_success = FALSE;
signal_emit("server sasl failure", 2, server, "The authentication timed out");
return FALSE;
}
static void sasl_timeout_stop(IRC_SERVER_REC *server)
{
/* Stop any pending timeout, if any */
if (server->sasl_timeout != 0) {
g_source_remove(server->sasl_timeout);
server->sasl_timeout = 0;
}
}
static void sasl_start(IRC_SERVER_REC *server, const char *data, const char *from)
{
IRC_SERVER_CONNECT_REC *conn;
sasl_timeout_stop(server);
conn = server->connrec;
switch (conn->sasl_mechanism) {
case SASL_MECHANISM_PLAIN:
irc_send_cmd_now(server, "AUTHENTICATE PLAIN");
break;
case SASL_MECHANISM_EXTERNAL:
irc_send_cmd_now(server, "AUTHENTICATE EXTERNAL");
break;
case SASL_MECHANISM_SCRAM_SHA_1:
irc_send_cmd_now(server, "AUTHENTICATE SCRAM-SHA-1");
break;
case SASL_MECHANISM_SCRAM_SHA_256:
irc_send_cmd_now(server, "AUTHENTICATE SCRAM-SHA-256");
break;
case SASL_MECHANISM_SCRAM_SHA_512:
irc_send_cmd_now(server, "AUTHENTICATE SCRAM-SHA-512");
break;
}
server->sasl_timeout = g_timeout_add(SASL_TIMEOUT, (GSourceFunc) sasl_timeout, server);
}
static void sasl_fail(IRC_SERVER_REC *server, const char *data, const char *from)
{
char *params, *error;
params = event_get_params(data, 2, NULL, &error);
server->sasl_success = FALSE;
signal_emit("server sasl failure", 2, server, error);
/* Terminate the negotiation */
irc_cap_finish_negotiation(server);
g_free(params);
}
static void sasl_already(IRC_SERVER_REC *server, const char *data, const char *from)
{
sasl_timeout_stop(server);
server->sasl_success = TRUE;
signal_emit("server sasl success", 1, server);
/* We're already authenticated, do nothing */
irc_cap_finish_negotiation(server);
}
static void sasl_success(IRC_SERVER_REC *server, const char *data, const char *from)
{
sasl_timeout_stop(server);
server->sasl_success = TRUE;
signal_emit("server sasl success", 1, server);
/* The authentication succeeded, time to finish the CAP negotiation */
irc_cap_finish_negotiation(server);
}
/*
* Responsible for reassembling incoming SASL requests. SASL requests must be split
* into 400 byte requests to stay below the IRC command length limit of 512 bytes.
* The spec says that if there is 400 bytes, then there is expected to be a
* continuation in the next chunk. If a message is exactly a multiple of 400 bytes,
* there must be a blank message of "AUTHENTICATE +" to indicate the end.
*
* This function returns the fully reassembled and decoded AUTHENTICATION message if
* completed or NULL if there are more messages expected.
*/
static gboolean sasl_reassemble_incoming(IRC_SERVER_REC *server, const char *fragment, GString **decoded)
{
GString *enc_req;
gsize fragment_len;
fragment_len = strlen(fragment);
/* Check if there is an existing fragment to prepend. */
if (server->sasl_buffer != NULL) {
if (g_strcmp0("+", fragment) == 0) {
enc_req = server->sasl_buffer;
} else {
enc_req = g_string_append_len(server->sasl_buffer, fragment, fragment_len);
}
server->sasl_buffer = NULL;
} else {
enc_req = g_string_new_len(fragment, fragment_len);
}
/*
* Fail authentication with this server. They have sent too much data.
*/
if (enc_req->len > AUTHENTICATE_MAX_SIZE) {
g_string_free(enc_req, TRUE);
return FALSE;
}
/*
* If the the request is exactly the chunk size, this is a fragment
* and more data is expected.
*/
if (fragment_len == AUTHENTICATE_CHUNK_SIZE) {
server->sasl_buffer = enc_req;
return TRUE;
}
if (enc_req->len == 1 && *enc_req->str == '+') {
*decoded = g_string_new_len("", 0);
} else {
gsize dec_len;
gint state = 0;
guint save = 0;
/* Since we're not going to use the enc_req GString anymore we
* can perform the decoding in place. */
dec_len = g_base64_decode_step(enc_req->str, enc_req->len,
(guchar *)enc_req->str,
&state, &save);
/* A copy of the data is made when the GString is created. */
*decoded = g_string_new_len(enc_req->str, dec_len);
}
g_string_free(enc_req, TRUE);
return TRUE;
}
/*
* Splits the response into appropriately sized chunks for the AUTHENTICATION
* command to be sent to the IRC server. If |response| is NULL, then the empty
* response is sent to the server.
*/
void sasl_send_response(IRC_SERVER_REC *server, GString *response)
{
char *enc;
size_t offset, enc_len, chunk_len;
if (response == NULL) {
irc_send_cmdv(server, "AUTHENTICATE +");
return;
}
enc = g_base64_encode((guchar *) response->str, response->len);
enc_len = strlen(enc);
for (offset = 0; offset < enc_len; offset += AUTHENTICATE_CHUNK_SIZE) {
chunk_len = enc_len - offset;
if (chunk_len > AUTHENTICATE_CHUNK_SIZE)
chunk_len = AUTHENTICATE_CHUNK_SIZE;
irc_send_cmdv(server, "AUTHENTICATE %.*s", (int) chunk_len, enc + offset);
}
if (offset == enc_len) {
irc_send_cmdv(server, "AUTHENTICATE +");
}
g_free(enc);
}
/*
* Sends AUTHENTICATE messages to log in via SCRAM.
*/
static void scram_authenticate(IRC_SERVER_REC *server, const char *data, const char *digest)
{
char *output;
int ret;
size_t output_len;
IRC_SERVER_CONNECT_REC *conn = server->connrec;
if (conn->scram_session == NULL) {
conn->scram_session =
scram_session_create(digest, conn->sasl_username, conn->sasl_password);
if (conn->scram_session == NULL) {
g_critical("Could not create SCRAM session with digest %s", digest);
irc_send_cmd_now(server, "AUTHENTICATE *");
return;
}
}
ret = scram_process(conn->scram_session, data, &output, &output_len);
if (ret == SCRAM_IN_PROGRESS) {
// Authentication is still in progress
GString *resp = g_string_new_len(output, output_len);
sasl_send_response(server, resp);
g_string_free(resp, TRUE);
g_free(output);
} else if (ret == SCRAM_SUCCESS) {
// Authentication succeeded
sasl_send_response(server, NULL);
scram_session_free(conn->scram_session);
conn->scram_session = NULL;
} else if (ret == SCRAM_ERROR) {
// Authentication failed
irc_send_cmd_now(server, "AUTHENTICATE *");
if (conn->scram_session->error != NULL) {
g_warning("SASL SCRAM authentication failed: %s",
conn->scram_session->error);
}
scram_session_free(conn->scram_session);
conn->scram_session = NULL;
}
}
/*
* Called when the incoming SASL request is completely received.
*/
static void sasl_step_complete(IRC_SERVER_REC *server, GString *data)
{
IRC_SERVER_CONNECT_REC *conn;
GString *resp;
conn = server->connrec;
switch (conn->sasl_mechanism) {
case SASL_MECHANISM_PLAIN:
/* At this point we assume that conn->sasl_{username, password} are non-NULL.
* The PLAIN mechanism expects a NULL-separated string composed by the authorization identity, the
* authentication identity and the password.
* The authorization identity field is explicitly set to the user provided username.
*/
resp = g_string_new(NULL);
g_string_append(resp, conn->sasl_username);
g_string_append_c(resp, '\0');
g_string_append(resp, conn->sasl_username);
g_string_append_c(resp, '\0');
g_string_append(resp, conn->sasl_password);
sasl_send_response(server, resp);
g_string_free(resp, TRUE);
break;
case SASL_MECHANISM_EXTERNAL:
/* Empty response */
sasl_send_response(server, NULL);
break;
case SASL_MECHANISM_SCRAM_SHA_1:
scram_authenticate(server, data->str, "SHA1");
break;
case SASL_MECHANISM_SCRAM_SHA_256:
scram_authenticate(server, data->str, "SHA256");
break;
case SASL_MECHANISM_SCRAM_SHA_512:
scram_authenticate(server, data->str, "SHA512");
break;
}
}
static void sasl_step_fail(IRC_SERVER_REC *server)
{
irc_send_cmd_now(server, "AUTHENTICATE *");
irc_cap_finish_negotiation(server);
sasl_timeout_stop(server);
signal_emit("server sasl failure", 2, server, "The server sent an invalid payload");
}
static void sasl_step(IRC_SERVER_REC *server, const char *data, const char *from)
{
GString *req = NULL;
sasl_timeout_stop(server);
if (!sasl_reassemble_incoming(server, data, &req)) {
sasl_step_fail(server);
return;
}
if (req != NULL) {
sasl_step_complete(server, req);
g_string_free(req, TRUE);
}
/* We expect a response within a reasonable time */
server->sasl_timeout = g_timeout_add(SASL_TIMEOUT, (GSourceFunc) sasl_timeout, server);
}
static void sasl_disconnected(IRC_SERVER_REC *server)
{
g_return_if_fail(server != NULL);
if (!IS_IRC_SERVER(server)) {
return;
}
sasl_timeout_stop(server);
}
static void sig_sasl_over(IRC_SERVER_REC *server)
{
if (!IS_IRC_SERVER(server))
return;
/* The negotiation has now been terminated, if we didn't manage to
* authenticate successfully with the server just disconnect. */
if (!server->sasl_success &&
server->connrec->sasl_mechanism != SASL_MECHANISM_NONE) {
if (server->cap_supported == NULL ||
!g_hash_table_lookup_extended(server->cap_supported, "sasl", NULL, NULL)) {
signal_emit("server sasl failure", 2, server, "The server did not offer SASL");
}
if (settings_get_bool("sasl_disconnect_on_failure")) {
/* We can't use server_disconnect() here because we'd end up
* freeing the 'server' object and be guilty of a slew of UaF. */
server->connection_lost = TRUE;
/* By setting connection_lost we make sure the communication is
* halted and when the control goes back to irc_parse_incoming
* the server object is safely destroyed. */
signal_stop();
}
}
}
void sasl_init(void)
{
settings_add_bool("server", "sasl_disconnect_on_failure", TRUE);
signal_add_first("event 001", (SIGNAL_FUNC) sig_sasl_over);
/* this event can get us connected on broken ircds, see irc-servers.c */
signal_add_first("event 375", (SIGNAL_FUNC) sig_sasl_over);
signal_add_first("server cap ack sasl", (SIGNAL_FUNC) sasl_start);
signal_add_first("server cap end", (SIGNAL_FUNC) sig_sasl_over);
signal_add_first("event authenticate", (SIGNAL_FUNC) sasl_step);
signal_add_first("event 903", (SIGNAL_FUNC) sasl_success);
signal_add_first("event 902", (SIGNAL_FUNC) sasl_fail);
signal_add_first("event 904", (SIGNAL_FUNC) sasl_fail);
signal_add_first("event 905", (SIGNAL_FUNC) sasl_fail);
signal_add_first("event 906", (SIGNAL_FUNC) sasl_fail);
signal_add_first("event 907", (SIGNAL_FUNC) sasl_already);
signal_add_first("server disconnected", (SIGNAL_FUNC) sasl_disconnected);
}
void sasl_deinit(void)
{
signal_remove("event 001", (SIGNAL_FUNC) sig_sasl_over);
signal_remove("event 375", (SIGNAL_FUNC) sig_sasl_over);
signal_remove("server cap ack sasl", (SIGNAL_FUNC) sasl_start);
signal_remove("server cap end", (SIGNAL_FUNC) sig_sasl_over);
signal_remove("event authenticate", (SIGNAL_FUNC) sasl_step);
signal_remove("event 903", (SIGNAL_FUNC) sasl_success);
signal_remove("event 902", (SIGNAL_FUNC) sasl_fail);
signal_remove("event 904", (SIGNAL_FUNC) sasl_fail);
signal_remove("event 905", (SIGNAL_FUNC) sasl_fail);
signal_remove("event 906", (SIGNAL_FUNC) sasl_fail);
signal_remove("event 907", (SIGNAL_FUNC) sasl_already);
signal_remove("server disconnected", (SIGNAL_FUNC) sasl_disconnected);
}