3 * netsec.c -- Network security routines for handling protocols that
4 * require SASL and/or TLS.
6 * This code is Copyright (c) 2016, by the authors of nmh. See the
7 * COPYRIGHT file in the root directory of the nmh distribution for
8 * complete copyright information.
16 #include <sys/select.h>
19 #include <sasl/sasl.h>
20 #include <sasl/saslutil.h>
21 # if SASL_VERSION_FULL < 0x020125
22 /* Cyrus SASL 2.1.25 introduced the sasl_callback_ft prototype,
23 which has an explicit void parameter list, according to best
24 practice. So we need to cast to avoid compile warnings.
25 Provide this prototype for earlier versions. */
26 typedef int (*sasl_callback_ft
)();
27 # endif /* SASL_VERSION_FULL < 0x020125 */
29 static int netsec_get_user(void *context
, int id
, const char **result
,
31 static int netsec_get_password(sasl_conn_t
*conn
, void *context
, int id
,
32 sasl_secret_t
**psecret
);
34 static int sasl_initialized
= 0;
36 #define SASL_MAXRECVBUF 65536
37 #endif /* CYRUS_SASL */
40 #include <openssl/ssl.h>
41 #include <openssl/err.h>
43 static int tls_initialized
= 0;
44 static SSL_CTX
*sslctx
= NULL
; /* SSL Context */
46 #endif /* TLS_SUPPORT */
48 /* I'm going to hardcode this for now; maybe make it adjustable later? */
49 #define NETSEC_BUFSIZE 65536
52 * Our context structure, which holds all of the relevant information
56 struct _netsec_context
{
57 int ns_readfd
; /* Read descriptor for network connection */
58 int ns_writefd
; /* Write descriptor for network connection */
59 int ns_snoop
; /* If true, display network data */
60 int ns_snoop_noend
; /* If true, didn't get a CR/LF on last line */
61 netsec_snoop_callback
*ns_snoop_cb
; /* Snoop output callback */
62 void *ns_snoop_context
; /* Context data for snoop function */
63 int ns_timeout
; /* Network read timeout, in seconds */
64 char *ns_userid
; /* Userid for authentication */
65 unsigned char *ns_inbuffer
; /* Our read input buffer */
66 unsigned char *ns_inptr
; /* Our read buffer input pointer */
67 unsigned int ns_inbuflen
; /* Length of data in input buffer */
68 unsigned int ns_inbufsize
; /* Size of input buffer */
69 unsigned char *ns_outbuffer
;/* Output buffer */
70 unsigned char *ns_outptr
; /* Output buffer pointer */
71 unsigned int ns_outbuflen
; /* Output buffer data length */
72 unsigned int ns_outbufsize
; /* Output buffer size */
73 char *sasl_mech
; /* User-requested mechanism */
74 char *sasl_chosen_mech
; /* Mechanism chosen by SASL */
75 netsec_sasl_callback sasl_proto_cb
; /* SASL callback we use */
77 char *oauth_service
; /* OAuth2 service name */
78 #endif /* OAUTH_SUPPORT */
80 char *sasl_hostname
; /* Hostname we've connected to */
81 sasl_conn_t
*sasl_conn
; /* SASL connection context */
82 sasl_ssf_t sasl_ssf
; /* SASL Security Strength Factor */
83 sasl_callback_t
*sasl_cbs
; /* Callbacks used by SASL */
84 nmh_creds_t sasl_creds
; /* Credentials (username/password) */
85 sasl_secret_t
*sasl_secret
; /* SASL password structure */
86 int sasl_seclayer
; /* If true, SASL security layer is enabled */
87 char *sasl_tmpbuf
; /* Temporary read buffer for decodes */
88 size_t sasl_maxbufsize
; /* Maximum negotiated SASL buffer size */
89 #endif /* CYRUS_SASL */
91 BIO
*ssl_io
; /* BIO used for connection I/O */
92 int tls_active
; /* If true, TLS is running */
93 #endif /* TLS_SUPPORT */
97 * Function to read data from the actual network socket
100 static int netsec_fillread(netsec_context
*ns_context
, char **errstr
);
103 * Code to check the ASCII content of a byte array.
106 static int checkascii(const unsigned char *byte
, size_t len
);
109 * How this code works, in general.
111 * _If_ we are using no encryption or SASL encryption, then we buffer the
112 * network data through ns_inbuffer and ns_outbuffer. That should be
113 * relatively self-explanatory.
115 * If we are using SSL for encryption, then use a buffering BIO for output
116 * (that just easier). Still do buffering for reads; when we need more
117 * data we call the BIO_read() function to fill our local buffer.
119 * For SASL, we make use of (for now) the Cyrus-SASL library. For some
120 * mechanisms, we implement those mechanisms directly since the Cyrus SASL
121 * library doesn't support them (like OAuth).
125 * Allocate and initialize our security context
131 netsec_context
*nsc
= mh_xmalloc(sizeof(*nsc
));
134 nsc
->ns_writefd
= -1;
136 nsc
->ns_snoop_noend
= 0;
137 nsc
->ns_snoop_cb
= NULL
;
138 nsc
->ns_snoop_context
= NULL
;
139 nsc
->ns_userid
= NULL
;
140 nsc
->ns_timeout
= 60; /* Our default */
141 nsc
->ns_inbufsize
= NETSEC_BUFSIZE
;
142 nsc
->ns_inbuffer
= mh_xmalloc(nsc
->ns_inbufsize
);
143 nsc
->ns_inptr
= nsc
->ns_inbuffer
;
144 nsc
->ns_inbuflen
= 0;
145 nsc
->ns_outbufsize
= NETSEC_BUFSIZE
;
146 nsc
->ns_outbuffer
= mh_xmalloc(nsc
->ns_outbufsize
);
147 nsc
->ns_outptr
= nsc
->ns_outbuffer
;
148 nsc
->ns_outbuflen
= 0;
149 nsc
->sasl_mech
= NULL
;
150 nsc
->sasl_chosen_mech
= NULL
;
151 nsc
->sasl_proto_cb
= NULL
;
153 nsc
->oauth_service
= NULL
;
154 #endif /* OAUTH_SUPPORT */
156 nsc
->sasl_conn
= NULL
;
157 nsc
->sasl_hostname
= NULL
;
158 nsc
->sasl_cbs
= NULL
;
159 nsc
->sasl_creds
= NULL
;
160 nsc
->sasl_secret
= NULL
;
162 nsc
->sasl_seclayer
= 0;
163 nsc
->sasl_tmpbuf
= NULL
;
164 nsc
->sasl_maxbufsize
= 0;
165 #endif /* CYRUS_SASL */
169 #endif /* TLS_SUPPORT */
174 * Shutdown the connection completely and free all resources.
175 * The connection is only closed if the flag is given.
179 netsec_shutdown(netsec_context
*nsc
, int closeflag
)
182 free(nsc
->ns_userid
);
183 if (nsc
->ns_inbuffer
)
184 free(nsc
->ns_inbuffer
);
185 if (nsc
->ns_outbuffer
)
186 free(nsc
->ns_outbuffer
);
188 free(nsc
->sasl_mech
);
189 if (nsc
->sasl_chosen_mech
)
190 free(nsc
->sasl_chosen_mech
);
192 if (nsc
->oauth_service
)
193 free(nsc
->oauth_service
);
194 #endif /* OAUTH_SERVICE */
197 sasl_dispose(&nsc
->sasl_conn
);
198 if (nsc
->sasl_hostname
)
199 free(nsc
->sasl_hostname
);
202 if (nsc
->sasl_creds
) {
203 if (nsc
->sasl_creds
->password
)
204 memset(nsc
->sasl_creds
->password
, 0,
205 strlen(nsc
->sasl_creds
->password
));
206 free(nsc
->sasl_creds
);
208 if (nsc
->sasl_secret
) {
209 if (nsc
->sasl_secret
->len
> 0) {
210 memset(nsc
->sasl_secret
->data
, 0, nsc
->sasl_secret
->len
);
212 free(nsc
->sasl_secret
);
214 if (nsc
->sasl_tmpbuf
)
215 free(nsc
->sasl_tmpbuf
);
216 #endif /* CYRUS_SASL */
220 * I checked; BIO_free_all() will cause SSL_shutdown to be called
221 * on the SSL object in the chain.
223 BIO_free_all(nsc
->ssl_io
);
224 #endif /* TLS_SUPPORT */
227 if (nsc
->ns_readfd
!= -1)
228 close(nsc
->ns_readfd
);
229 if (nsc
->ns_writefd
!= -1 && nsc
->ns_writefd
!= nsc
->ns_readfd
)
230 close(nsc
->ns_writefd
);
237 * Set the file descriptor for our context
241 netsec_set_fd(netsec_context
*nsc
, int readfd
, int writefd
)
243 nsc
->ns_readfd
= readfd
;
244 nsc
->ns_writefd
= writefd
;
248 * Set the userid used for authentication for this context
252 netsec_set_userid(netsec_context
*nsc
, const char *userid
)
254 nsc
->ns_userid
= getcpy(userid
);
258 * Get the snoop flag for this connection
262 netsec_get_snoop(netsec_context
*nsc
)
264 return nsc
->ns_snoop
;
268 * Set the snoop flag for this connection
272 netsec_set_snoop(netsec_context
*nsc
, int snoop
)
274 nsc
->ns_snoop
= snoop
;
278 * Set the snoop callback for this connection.
281 void netsec_set_snoop_callback(netsec_context
*nsc
,
282 netsec_snoop_callback callback
, void *context
)
284 nsc
->ns_snoop_cb
= callback
;
285 nsc
->ns_snoop_context
= context
;
289 * A base64-decoding snoop callback
293 netsec_b64_snoop_decoder(netsec_context
*nsc
, const char *string
, size_t len
,
296 unsigned char *decoded
;
301 offset
= context
? *((int *) context
) : 0;
305 * Output non-base64 data first.
307 fprintf(stderr
, "%.*s", offset
, string
);
312 if (decodeBase64(string
, &decoded
, &decodedlen
, 1, NULL
) == OK
) {
314 * Some mechanisms preoduce large binary tokens, which aren't really
315 * readable. So let's do a simple heuristic. If the token is greater
316 * than 100 characters _and_ the first 100 bytes are more than 50%
317 * non-ASCII, then don't print the decoded buffer, just the
320 if (decodedlen
> 100 && !checkascii(decoded
, 100)) {
321 fprintf(stderr
, "%.*s\n", (int) len
, string
);
324 hexify(decoded
, decodedlen
, &hexified
);
325 fprintf(stderr
, "b64<%s>\n", hexified
);
330 fprintf(stderr
, "%.*s\n", (int) len
, string
);
335 * If the ASCII content is > 50%, return 1
339 checkascii(const unsigned char *bytes
, size_t len
)
341 size_t count
= 0, half
= len
/ 2;
344 if (isascii(*bytes
) && isprint(*bytes
) && ++count
> half
)
347 /* No chance by this point */
348 if (count
+ len
< half
)
356 * Set the read timeout for this connection
360 netsec_set_timeout(netsec_context
*nsc
, int timeout
)
362 nsc
->ns_timeout
= timeout
;
366 * Read data from the network. Basically, return anything in our buffer,
367 * otherwise fill from the network.
371 netsec_read(netsec_context
*nsc
, void *buffer
, size_t size
, char **errstr
)
376 * If our buffer is empty, then we should fill it now
379 if (nsc
->ns_inbuflen
== 0) {
380 if (netsec_fillread(nsc
, errstr
) != OK
)
385 * netsec_fillread only returns if the buffer is full, so we can
386 * assume here that this has something in it.
389 retlen
= size
> nsc
->ns_inbuflen
? nsc
->ns_inbuflen
: size
;
391 memcpy(buffer
, nsc
->ns_inptr
, retlen
);
393 if (retlen
== (int) nsc
->ns_inbuflen
) {
395 * We've emptied our buffer, so reset everything.
397 nsc
->ns_inptr
= nsc
->ns_inbuffer
;
398 nsc
->ns_inbuflen
= 0;
400 nsc
->ns_inptr
+= size
;
401 nsc
->ns_inbuflen
-= size
;
408 * Get a "line" (CR/LF) terminated from the network.
410 * Okay, we play some games here, so pay attention:
412 * - Unlike every other function, we return a pointer to the
413 * existing buffer. This pointer is valid until you call another
414 * read function again.
415 * - We NUL-terminate the buffer right at the end, before the CR-LF terminator.
416 * - Technically we look for a LF; if we find a CR right before it, then
418 * - If your data may contain embedded NULs, this won't work. You should
419 * be using netsec_read() in that case.
423 netsec_readline(netsec_context
*nsc
, size_t *len
, char **errstr
)
425 unsigned char *ptr
= nsc
->ns_inptr
;
426 size_t count
= 0, offset
;
430 * Search through our existing buffer for a LF
433 while (count
< nsc
->ns_inbuflen
) {
435 if (*ptr
++ == '\n') {
436 char *sptr
= (char *) nsc
->ns_inptr
;
437 if (count
> 1 && *(ptr
- 2) == '\r')
441 *len
= ptr
- nsc
->ns_inptr
;
442 nsc
->ns_inptr
+= count
;
443 nsc
->ns_inbuflen
-= count
;
446 if (nsc
->sasl_seclayer
)
447 fprintf(stderr
, "(sasl-decrypted) ");
448 #endif /* CYRUS_SASL */
451 fprintf(stderr
, "(tls-decrypted) ");
452 #endif /* TLS_SUPPORT */
453 fprintf(stderr
, "<= ");
454 if (nsc
->ns_snoop_cb
)
455 nsc
->ns_snoop_cb(nsc
, sptr
, strlen(sptr
),
456 nsc
->ns_snoop_context
);
458 fprintf(stderr
, "%s\n", sptr
);
465 * Hm, we didn't find a \n. If we've already searched half of the input
466 * buffer, return an error.
469 if (count
>= nsc
->ns_inbufsize
/ 2) {
470 netsec_err(errstr
, "Unable to find a line terminator after %d bytes",
476 * Okay, get some more network data. This may move inptr, so regenerate
480 offset
= ptr
- nsc
->ns_inptr
;
482 if (netsec_fillread(nsc
, errstr
) != OK
)
485 ptr
= nsc
->ns_inptr
+ offset
;
489 return NULL
; /* Should never reach this */
493 * Fill our read buffer with some data from the network.
497 netsec_fillread(netsec_context
*nsc
, char **errstr
)
501 size_t readbufsize
, remaining
, startoffset
;
505 * If inbuflen is zero, that means the buffer has been emptied
506 * completely. In that case move inptr back to the start.
509 if (nsc
->ns_inbuflen
== 0) {
510 nsc
->ns_inptr
= nsc
->ns_inbuffer
;
515 #endif /* CYRUS_SASL */
517 * If we are using TLS and there's anything pending, then skip the
521 if (!nsc
->tls_active
|| BIO_pending(nsc
->ssl_io
) == 0)
522 #endif /* TLS_SUPPORT */
528 FD_SET(nsc
->ns_readfd
, &rfds
);
530 tv
.tv_sec
= nsc
->ns_timeout
;
533 rc
= select(nsc
->ns_readfd
+ 1, &rfds
, NULL
, NULL
, &tv
);
536 netsec_err(errstr
, "select() while reading failed: %s",
542 netsec_err(errstr
, "read() timed out after %d seconds",
548 * At this point, we know that rc is 1, so there's not even any
549 * point to check to see if our descriptor is set in rfds.
553 startoffset
= nsc
->ns_inptr
- nsc
->ns_inbuffer
;
554 remaining
= nsc
->ns_inbufsize
- (startoffset
+ nsc
->ns_inbuflen
);
555 end
= nsc
->ns_inptr
+ nsc
->ns_inbuflen
;
558 * If we are using TLS, then just read via the BIO. But we still
559 * use our local buffer.
562 if (nsc
->tls_active
) {
563 rc
= BIO_read(nsc
->ssl_io
, end
, remaining
);
566 * Either EOF, or possibly an error. Either way, it was probably
567 * unexpected, so treat as error.
569 netsec_err(errstr
, "TLS peer aborted connection");
572 /* Definitely an error */
573 netsec_err(errstr
, "Read on TLS connection failed: %s",
574 ERR_error_string(ERR_get_error(), NULL
));
578 nsc
->ns_inbuflen
+= rc
;
582 #endif /* TLS_SUPPORT */
585 * Okay, time to read some data. Either we're just doing it straight
586 * or we're passing it through sasl_decode() first.
590 if (nsc
->sasl_seclayer
) {
591 readbuf
= nsc
->sasl_tmpbuf
;
592 readbufsize
= nsc
->sasl_maxbufsize
;
594 #endif /* CYRUS_SASL */
596 readbuf
= (char *) end
;
597 readbufsize
= remaining
;
601 * At this point, we should have active data on the connection (see
602 * select() above) so this read SHOULDN'T block. Hopefully.
605 rc
= read(nsc
->ns_readfd
, readbuf
, readbufsize
);
608 netsec_err(errstr
, "Received EOF on network read");
613 netsec_err(errstr
, "Network read failed: %s", strerror(errno
));
618 * Okay, so we've had a successful read. If we are doing SASL security
619 * layers, pass this through sasl_decode(). sasl_decode() can return
620 * 0 bytes decoded; if that happens, jump back to the beginning. Otherwise
621 * we can just update our length pointer.
625 if (nsc
->sasl_seclayer
) {
627 unsigned int tmpoutlen
;
629 rc
= sasl_decode(nsc
->sasl_conn
, nsc
->sasl_tmpbuf
, rc
,
630 &tmpout
, &tmpoutlen
);
633 netsec_err(errstr
, "Unable to decode SASL network data: %s",
634 sasl_errdetail(nsc
->sasl_conn
));
645 if (tmpoutlen
> remaining
) {
646 netsec_err(errstr
, "Internal error: SASL decode buffer overflow!");
650 memcpy(end
, tmpout
, tmpoutlen
);
652 nsc
->ns_inbuflen
+= tmpoutlen
;
654 #endif /* CYRUS_SASL */
655 nsc
->ns_inbuflen
+= rc
;
658 * If we're past the halfway point in our read buffers, shuffle everything
659 * back to the beginning.
662 if (startoffset
> nsc
->ns_inbufsize
/ 2) {
663 memmove(nsc
->ns_inbuffer
, nsc
->ns_inptr
, nsc
->ns_inbuflen
);
664 nsc
->ns_inptr
= nsc
->ns_inbuffer
;
671 * Write data to our network connection. Really, fill up the buffer as
672 * much as we can, and flush it out if necessary. netsec_flush() does
677 netsec_write(netsec_context
*nsc
, const void *buffer
, size_t size
,
680 const unsigned char *bufptr
= buffer
;
689 * Run a loop copying in data to our local buffer; when we're done with
690 * any buffer overflows then just copy any remaining data in.
693 while ((int) size
>= (remaining
= nsc
->ns_outbufsize
- nsc
->ns_outbuflen
)) {
694 memcpy(nsc
->ns_outptr
, bufptr
, remaining
);
697 * In theory I should increment outptr, but netsec_flush just resets
700 nsc
->ns_outbuflen
= nsc
->ns_outbufsize
;
702 rc
= netsec_flush(nsc
, errstr
);
712 * Copy any leftover data into the buffer.
716 memcpy(nsc
->ns_outptr
, bufptr
, size
);
717 nsc
->ns_outptr
+= size
;
718 nsc
->ns_outbuflen
+= size
;
725 * Our network printf() routine, which really just calls netsec_vprintf().
729 netsec_printf(netsec_context
*nsc
, char **errstr
, const char *format
, ...)
734 va_start(ap
, format
);
735 rc
= netsec_vprintf(nsc
, errstr
, format
, ap
);
742 * Write bytes to the network using printf()-style formatting.
744 * Again, for the most part copy stuff into our buffer to be flushed
749 netsec_vprintf(netsec_context
*nsc
, char **errstr
, const char *format
,
755 * Cheat a little. If we can fit the data into our outgoing buffer,
756 * great! If not, generate a flush and retry once.
760 rc
= vsnprintf((char *) nsc
->ns_outptr
,
761 nsc
->ns_outbufsize
- nsc
->ns_outbuflen
, format
, ap
);
763 if (rc
>= (int) (nsc
->ns_outbufsize
- nsc
->ns_outbuflen
)) {
765 * This means we have an overflow. Note that we don't actually
766 * make use of the terminating NUL, but according to the spec
767 * vsnprintf() won't write to the last byte in the string; that's
768 * why we have to use >= in the comparison above.
770 if (nsc
->ns_outbuffer
== nsc
->ns_outptr
) {
772 * Whoops, if the buffer pointer was the same as the start of the
773 * buffer, that means we overflowed the internal buffer.
774 * At that point, just give up.
776 netsec_err(errstr
, "Internal error: wanted to printf() a total of "
777 "%d bytes, but our buffer size was only %d bytes",
778 rc
, nsc
->ns_outbufsize
);
782 * Generate a flush (which may be inefficient, but hopefully
783 * it isn't) and then try again.
785 if (netsec_flush(nsc
, errstr
) != OK
)
788 * After this, outbuffer should == outptr, so we shouldn't
789 * hit this next time around.
797 if (outlen
> 0 && nsc
->ns_outptr
[outlen
- 1] == '\n') {
799 if (outlen
> 0 && nsc
->ns_outptr
[outlen
- 1] == '\r')
802 nsc
->ns_snoop_noend
= 1;
804 if (outlen
> 0 || nsc
->ns_snoop_noend
== 0) {
806 if (nsc
->sasl_seclayer
)
807 fprintf(stderr
, "(sasl-encrypted) ");
808 #endif /* CYRUS_SASL */
811 fprintf(stderr
, "(tls-encrypted) ");
812 #endif /* TLS_SUPPORT */
813 fprintf(stderr
, "=> ");
814 if (nsc
->ns_snoop_cb
)
815 nsc
->ns_snoop_cb(nsc
, (char *) nsc
->ns_outptr
, outlen
,
816 nsc
->ns_snoop_context
);
818 fprintf(stderr
, "%.*s\n", outlen
, nsc
->ns_outptr
);
820 nsc
->ns_snoop_noend
= 0;
824 nsc
->ns_outptr
+= rc
;
825 nsc
->ns_outbuflen
+= rc
;
831 * Flush out any buffered data in our output buffers. This routine is
832 * actually where the real network writes take place.
836 netsec_flush(netsec_context
*nsc
, char **errstr
)
838 const char *netoutbuf
= (const char *) nsc
->ns_outbuffer
;
839 unsigned int netoutlen
= nsc
->ns_outbuflen
;
850 * If SASL security layers are in effect, run the data through
851 * sasl_encode() first.
854 if (nsc
->sasl_seclayer
) {
855 rc
= sasl_encode(nsc
->sasl_conn
, (const char *) nsc
->ns_outbuffer
,
856 nsc
->ns_outbuflen
, &netoutbuf
, &netoutlen
);
859 netsec_err(errstr
, "SASL data encoding failed: %s",
860 sasl_errdetail(nsc
->sasl_conn
));
865 #endif /* CYRUS_SASL */
868 * If TLS is active, then use those functions to write out the
872 if (nsc
->tls_active
) {
873 if (BIO_write(nsc
->ssl_io
, netoutbuf
, netoutlen
) <= 0) {
874 netsec_err(errstr
, "Error writing to TLS connection: %s",
875 ERR_error_string(ERR_get_error(), NULL
));
879 #endif /* TLS_SUPPORT */
881 rc
= write(nsc
->ns_writefd
, netoutbuf
, netoutlen
);
884 netsec_err(errstr
, "write() failed: %s", strerror(errno
));
889 nsc
->ns_outptr
= nsc
->ns_outbuffer
;
890 nsc
->ns_outbuflen
= 0;
896 * Set various SASL protocol parameters
900 netsec_set_sasl_params(netsec_context
*nsc
, const char *hostname
,
901 const char *service
, const char *mechanism
,
902 netsec_sasl_callback callback
, char **errstr
)
905 sasl_callback_t
*sasl_cbs
;
908 if (! sasl_initialized
) {
909 retval
= sasl_client_init(NULL
);
910 if (retval
!= SASL_OK
) {
911 netsec_err(errstr
, "SASL client initialization failed: %s",
912 sasl_errstring(retval
, NULL
, NULL
));
919 * Allocate an array of SASL callbacks for this connection.
920 * Right now we just allocate an array of four callbacks.
923 sasl_cbs
= mh_xmalloc(sizeof(*sasl_cbs
) * 4);
925 sasl_cbs
[0].id
= SASL_CB_USER
;
926 sasl_cbs
[0].proc
= (sasl_callback_ft
) netsec_get_user
;
927 sasl_cbs
[0].context
= nsc
;
929 sasl_cbs
[1].id
= SASL_CB_AUTHNAME
;
930 sasl_cbs
[1].proc
= (sasl_callback_ft
) netsec_get_user
;
931 sasl_cbs
[1].context
= nsc
;
933 sasl_cbs
[2].id
= SASL_CB_PASS
;
934 sasl_cbs
[2].proc
= (sasl_callback_ft
) netsec_get_password
;
935 sasl_cbs
[2].context
= nsc
;
937 sasl_cbs
[3].id
= SASL_CB_LIST_END
;
938 sasl_cbs
[3].proc
= NULL
;
939 sasl_cbs
[3].context
= NULL
;
941 nsc
->sasl_cbs
= sasl_cbs
;
943 retval
= sasl_client_new(service
, hostname
, NULL
, NULL
, nsc
->sasl_cbs
, 0,
947 netsec_err(errstr
, "SASL new client allocation failed: %s",
948 sasl_errstring(retval
, NULL
, NULL
));
952 nsc
->sasl_hostname
= getcpy(hostname
);
953 #else /* CYRUS_SASL */
954 NMH_UNUSED(hostname
);
957 #endif /* CYRUS_SASL */
960 * According to the RFC, mechanisms can only be uppercase letter, numbers,
961 * and a hypen or underscore. So make sure we uppercase any letters
962 * in case the user passed in lowercase.
967 nsc
->sasl_mech
= getcpy(mechanism
);
969 for (p
= nsc
->sasl_mech
; *p
; p
++)
970 if (isascii((unsigned char) *p
)) /* Just in case */
971 *p
= toupper((unsigned char) *p
);
974 nsc
->sasl_proto_cb
= callback
;
981 * Our userid callback; return the specified username to the SASL
982 * library when asked.
985 int netsec_get_user(void *context
, int id
, const char **result
,
988 netsec_context
*nsc
= (netsec_context
*) context
;
990 if (! result
|| (id
!= SASL_CB_USER
&& id
!= SASL_CB_AUTHNAME
))
991 return SASL_BADPARAM
;
993 if (nsc
->ns_userid
== NULL
) {
995 * Pass the 1 third argument to nmh_get_credentials() so that
996 * a defauly user if the -user switch wasn't supplied, and so
997 * that a default password will be supplied. That's used when
998 * those values really don't matter, and only with legacy/.netrc,
999 * i.e., with a credentials profile entry.
1002 if (nsc
->sasl_creds
== NULL
) {
1003 nsc
->sasl_creds
= mh_xmalloc(sizeof(*nsc
->sasl_creds
));
1004 nsc
->sasl_creds
->user
= NULL
;
1005 nsc
->sasl_creds
->password
= NULL
;
1008 if (nmh_get_credentials(nsc
->sasl_hostname
, nsc
->ns_userid
, 1,
1009 nsc
->sasl_creds
) != OK
)
1010 return SASL_BADPARAM
;
1012 if (nsc
->ns_userid
!= nsc
->sasl_creds
->user
) {
1014 free(nsc
->ns_userid
);
1015 nsc
->ns_userid
= getcpy(nsc
->sasl_creds
->user
);
1019 *result
= nsc
->ns_userid
;
1021 *len
= strlen(nsc
->ns_userid
);
1027 * Retrieve a password and return it to SASL
1031 netsec_get_password(sasl_conn_t
*conn
, void *context
, int id
,
1032 sasl_secret_t
**psecret
)
1034 netsec_context
*nsc
= (netsec_context
*) context
;
1039 if (! psecret
|| id
!= SASL_CB_PASS
)
1040 return SASL_BADPARAM
;
1042 if (nsc
->sasl_creds
== NULL
) {
1043 nsc
->sasl_creds
= mh_xmalloc(sizeof(*nsc
->sasl_creds
));
1044 nsc
->sasl_creds
->user
= NULL
;
1045 nsc
->sasl_creds
->password
= NULL
;
1048 if (nsc
->sasl_creds
->password
== NULL
) {
1050 * Pass the 0 third argument to nmh_get_credentials() so
1051 * that the default password isn't used. With legacy/.netrc
1052 * credentials support, we'll only get here if the -user
1053 * switch to send(1)/post(8) wasn't used.
1056 if (nmh_get_credentials(nsc
->sasl_hostname
, nsc
->ns_userid
, 0,
1057 nsc
->sasl_creds
) != OK
) {
1058 return SASL_BADPARAM
;
1062 len
= strlen(nsc
->sasl_creds
->password
);
1065 * sasl_secret_t includes 1 bytes for "data" already, so that leaves
1066 * us room for a terminating NUL
1069 *psecret
= (sasl_secret_t
*) malloc(sizeof(sasl_secret_t
) + len
);
1074 (*psecret
)->len
= len
;
1075 strcpy((char *) (*psecret
)->data
, nsc
->sasl_creds
->password
);
1077 nsc
->sasl_secret
= *psecret
;
1081 #endif /* CYRUS_SASL */
1084 * Negotiate SASL on this connection
1088 netsec_negotiate_sasl(netsec_context
*nsc
, const char *mechlist
, char **errstr
)
1091 sasl_security_properties_t secprops
;
1092 const char *chosen_mech
;
1093 const unsigned char *saslbuf
;
1094 unsigned char *outbuf
;
1095 unsigned int saslbuflen
, outbuflen
;
1099 #ifdef OAUTH_SUPPORT
1100 unsigned char *xoauth_client_res
;
1101 size_t xoauth_client_res_len
;
1102 #endif /* OAUTH_SUPPORT */
1106 * If we've been passed a requested mechanism, check our mechanism
1107 * list from the protocol. If it's not supported, return an error.
1110 if (nsc
->sasl_mech
) {
1111 char **str
, *mlist
= getcpy(mechlist
);
1114 str
= brkstring(mlist
, " ", NULL
);
1116 for (i
= 0; str
[i
] != NULL
; i
++) {
1117 if (strcasecmp(nsc
->sasl_mech
, str
[i
]) == 0) {
1122 i
= (str
[i
] == NULL
);
1127 netsec_err(errstr
, "Chosen mechanism %s not supported by server",
1133 #ifdef OAUTH_SUPPORT
1134 if (nsc
->sasl_mech
&& strcasecmp(nsc
->sasl_mech
, "XOAUTH2") == 0) {
1136 * This should be relatively straightforward, but requires some
1137 * help from the plugin. Basically, if XOAUTH2 is a success,
1138 * the callback has to return success, but no output data. If
1139 * there is output data, it will be assumed that it is the JSON
1143 if (! nsc
->oauth_service
) {
1144 netsec_err(errstr
, "Internal error: OAuth2 service name not given");
1148 nsc
->sasl_chosen_mech
= getcpy(nsc
->sasl_mech
);
1150 if (mh_oauth_do_xoauth(nsc
->ns_userid
, nsc
->oauth_service
,
1151 &xoauth_client_res
, &xoauth_client_res_len
,
1152 nsc
->ns_snoop
? stderr
: NULL
) != OK
) {
1153 netsec_err(errstr
, "Internal error: Unable to get OAuth2 "
1158 rc
= nsc
->sasl_proto_cb(NETSEC_SASL_START
, xoauth_client_res
,
1159 xoauth_client_res_len
, NULL
, 0, errstr
);
1160 free(xoauth_client_res
);
1166 * Okay, we need to do a NETSEC_SASL_FINISH now. If we return
1167 * success, we indicate that with no output data. But if we
1168 * fail, then send a blank message and get the resulting
1172 rc
= nsc
->sasl_proto_cb(NETSEC_SASL_FINISH
, NULL
, 0, NULL
, 0, errstr
);
1176 * We're going to assume the error here is a JSON response;
1177 * we ignore it and send a blank message in response. We should
1178 * then get a failure messages with a useful error. We should
1179 * NOT get a success message at this point.
1182 nsc
->sasl_proto_cb(NETSEC_SASL_WRITE
, NULL
, 0, NULL
, 0, NULL
);
1183 rc
= nsc
->sasl_proto_cb(NETSEC_SASL_FINISH
, NULL
, 0, NULL
, 0,
1186 netsec_err(errstr
, "Unexpected success after OAuth failure!");
1192 #endif /* OAUTH_SUPPORT */
1196 * In netsec_set_sasl_params, we've already done all of our setup with
1197 * sasl_client_init() and sasl_client_new(). So time to set security
1198 * properties, call sasl_client_start(), and generate the protocol
1202 memset(&secprops
, 0, sizeof(secprops
));
1203 secprops
.maxbufsize
= SASL_MAXRECVBUF
;
1206 * If we're using TLS, do not negotiate a security layer
1211 nsc
->tls_active
? 0 :
1212 #endif /* TLS_SUPPORT */
1215 rc
= sasl_setprop(nsc
->sasl_conn
, SASL_SEC_PROPS
, &secprops
);
1217 if (rc
!= SASL_OK
) {
1218 netsec_err(errstr
, "SASL security property initialization failed: %s",
1219 sasl_errstring(rc
, NULL
, NULL
));
1224 * Start the actual protocol negotiation, and go through the
1225 * sasl_client_step() loop (after sasl_client_start, of course).
1228 rc
= sasl_client_start(nsc
->sasl_conn
,
1229 nsc
->sasl_mech
? nsc
->sasl_mech
: mechlist
, NULL
,
1230 (const char **) &saslbuf
, &saslbuflen
,
1233 if (rc
!= SASL_OK
&& rc
!= SASL_CONTINUE
) {
1234 netsec_err(errstr
, "SASL client start failed: %s",
1235 sasl_errdetail(nsc
->sasl_conn
));
1239 nsc
->sasl_chosen_mech
= getcpy(chosen_mech
);
1241 if (nsc
->sasl_proto_cb(NETSEC_SASL_START
, saslbuf
, saslbuflen
, NULL
, 0,
1246 * We've written out our first message; enter in the step loop
1249 while (rc
== SASL_CONTINUE
) {
1251 * Call our SASL callback, which will handle the details of
1252 * reading data from the network.
1255 if (nsc
->sasl_proto_cb(NETSEC_SASL_READ
, NULL
, 0, &outbuf
, &outbuflen
,
1257 nsc
->sasl_proto_cb(NETSEC_SASL_CANCEL
, NULL
, 0, NULL
, 0, NULL
);
1261 rc
= sasl_client_step(nsc
->sasl_conn
, (char *) outbuf
, outbuflen
, NULL
,
1262 (const char **) &saslbuf
, &saslbuflen
);
1267 if (rc
!= SASL_OK
&& rc
!= SASL_CONTINUE
) {
1268 netsec_err(errstr
, "SASL client negotiation failed: %s",
1269 sasl_errdetail(nsc
->sasl_conn
));
1270 nsc
->sasl_proto_cb(NETSEC_SASL_CANCEL
, NULL
, 0, NULL
, 0, NULL
);
1274 if (nsc
->sasl_proto_cb(NETSEC_SASL_WRITE
, saslbuf
, saslbuflen
,
1275 NULL
, 0, errstr
) != OK
) {
1276 nsc
->sasl_proto_cb(NETSEC_SASL_CANCEL
, NULL
, 0, NULL
, 0, NULL
);
1282 * SASL exchanges should be complete, process the final response message
1286 if (nsc
->sasl_proto_cb(NETSEC_SASL_FINISH
, NULL
, 0, NULL
, 0,
1289 * At this point we can't really send an abort since the SASL dialog
1290 * has completed, so just bubble back up the error message.
1297 * At this point, SASL should be complete. Get a few properties
1298 * from the authentication exchange.
1301 rc
= sasl_getprop(nsc
->sasl_conn
, SASL_SSF
, (const void **) &ssf
);
1303 if (rc
!= SASL_OK
) {
1304 netsec_err(errstr
, "Cannot retrieve SASL negotiated security "
1305 "strength factor: %s", sasl_errstring(rc
, NULL
, NULL
));
1309 nsc
->sasl_ssf
= *ssf
;
1311 if (nsc
->sasl_ssf
> 0) {
1312 rc
= sasl_getprop(nsc
->sasl_conn
, SASL_MAXOUTBUF
,
1313 (const void **) &outbufmax
);
1315 if (rc
!= SASL_OK
) {
1316 netsec_err(errstr
, "Cannot retrieve SASL negotiated output "
1317 "buffer size: %s", sasl_errstring(rc
, NULL
, NULL
));
1322 * If our output buffer isn't the same size as the input buffer,
1323 * reallocate it and set the new size (since we won't encode any
1324 * data larger than that).
1327 nsc
->sasl_maxbufsize
= *outbufmax
;
1329 if (nsc
->ns_outbufsize
!= nsc
->sasl_maxbufsize
) {
1330 nsc
->ns_outbufsize
= nsc
->sasl_maxbufsize
;
1331 nsc
->ns_outbuffer
= mh_xrealloc(nsc
->ns_outbuffer
,
1332 nsc
->ns_outbufsize
);
1334 * There shouldn't be any data in the buffer, but for
1335 * consistency's sake discard it.
1337 nsc
->ns_outptr
= nsc
->ns_outbuffer
;
1338 nsc
->ns_outbuflen
= 0;
1342 * Allocate a buffer to do temporary reads into, before we
1343 * call sasl_decode()
1346 nsc
->sasl_tmpbuf
= mh_xmalloc(nsc
->sasl_maxbufsize
);
1349 * Okay, this is a bit weird. Make sure that the input buffer
1350 * is at least TWICE the size of the max buffer size. That's
1351 * because if we're consuming data but want to extend the current
1352 * buffer, we want to be sure there's room for another full buffer's
1356 if (nsc
->ns_inbufsize
< nsc
->sasl_maxbufsize
* 2) {
1357 size_t offset
= nsc
->ns_inptr
- nsc
->ns_inbuffer
;
1358 nsc
->ns_inbufsize
= nsc
->sasl_maxbufsize
* 2;
1359 nsc
->ns_inbuffer
= mh_xrealloc(nsc
->ns_inbuffer
, nsc
->ns_inbufsize
);
1360 nsc
->ns_inptr
= nsc
->ns_inbuffer
+ offset
;
1363 nsc
->sasl_seclayer
= 1;
1369 * If we're at this point, then either we have NEITHER OAuth2 or
1370 * Cyrus-SASL compiled in, or have OAuth2 but didn't give the XOAUTH2
1371 * mechanism on the command line.
1374 if (! nsc
->sasl_mech
)
1375 netsec_err(errstr
, "SASL library support not available; please "
1376 "specify a SASL mechanism to use");
1378 netsec_err(errstr
, "No support for the %s SASL mechanism",
1382 #endif /* CYRUS_SASL */
1386 * Retrieve our chosen SASL mechanism
1390 netsec_get_sasl_mechanism(netsec_context
*nsc
)
1392 return nsc
->sasl_chosen_mech
;
1396 * Set an OAuth2 service name, if we support it.
1400 netsec_set_oauth_service(netsec_context
*nsc
, const char *service
)
1402 #ifdef OAUTH_SUPPORT
1403 nsc
->oauth_service
= getcpy(service
);
1405 #else /* OAUTH_SUPPORT */
1407 #endif /* OAUTH_SUPPORT */
1411 * Initialize (and enable) TLS for this connection
1415 netsec_set_tls(netsec_context
*nsc
, int tls
, char **errstr
)
1420 BIO
*rbio
, *wbio
, *ssl_bio
;;
1422 if (! tls_initialized
) {
1424 SSL_load_error_strings();
1427 * Create the SSL context; this has the properties for all
1428 * SSL connections (we are only doing one), though. Make sure
1429 * we only support secure (known as of now) TLS protocols.
1432 sslctx
= SSL_CTX_new(SSLv23_client_method());
1435 netsec_err(errstr
, "Unable to initialize OpenSSL context: %s",
1436 ERR_error_string(ERR_get_error(), NULL
));
1440 SSL_CTX_set_options(sslctx
, SSL_OP_NO_SSLv2
| SSL_OP_NO_SSLv3
|
1446 if (nsc
->ns_readfd
== -1 || nsc
->ns_writefd
== -1) {
1447 netsec_err(errstr
, "Invalid file descriptor in netsec context");
1452 * Create the SSL structure which holds the data for a single
1456 ssl
= SSL_new(sslctx
);
1459 netsec_err(errstr
, "Unable to create SSL connection: %s",
1460 ERR_error_string(ERR_get_error(), NULL
));
1465 * Never bother us, since we are using blocking sockets.
1468 SSL_set_mode(ssl
, SSL_MODE_AUTO_RETRY
);
1471 * This is a bit weird, so pay attention.
1473 * We create a socket BIO, and bind it to our SSL connection.
1474 * That means reads and writes to the SSL connection will use our
1477 * Then we create an SSL BIO, and assign our current SSL connection
1478 * to it. This is done so our code stays simple if we want to use
1479 * any buffering BIOs (right now we do our own buffering).
1480 * So the chain looks like:
1482 * SSL BIO -> socket BIO.
1485 rbio
= BIO_new_socket(nsc
->ns_readfd
, BIO_NOCLOSE
);
1488 netsec_err(errstr
, "Unable to create a read socket BIO: %s",
1489 ERR_error_string(ERR_get_error(), NULL
));
1494 wbio
= BIO_new_socket(nsc
->ns_writefd
, BIO_NOCLOSE
);
1497 netsec_err(errstr
, "Unable to create a write socket BIO: %s",
1498 ERR_error_string(ERR_get_error(), NULL
));
1504 SSL_set_bio(ssl
, rbio
, wbio
);
1505 SSL_set_connect_state(ssl
);
1507 ssl_bio
= BIO_new(BIO_f_ssl());
1510 netsec_err(errstr
, "Unable to create a SSL BIO: %s",
1511 ERR_error_string(ERR_get_error(), NULL
));
1516 BIO_set_ssl(ssl_bio
, ssl
, BIO_CLOSE
);
1517 nsc
->ssl_io
= ssl_bio
;
1521 BIO_free_all(nsc
->ssl_io
);
1526 #else /* TLS_SUPPORT */
1527 netsec_err(errstr
, "TLS is not supported");
1531 #endif /* TLS_SUPPORT */
1535 * Start TLS negotiation on this connection
1539 netsec_negotiate_tls(netsec_context
*nsc
, char **errstr
)
1542 if (! nsc
->ssl_io
) {
1543 netsec_err(errstr
, "TLS has not been configured for this connection");
1547 if (BIO_do_handshake(nsc
->ssl_io
) < 1) {
1548 netsec_err(errstr
, "TLS negotiation failed: %s",
1549 ERR_error_string(ERR_get_error(), NULL
));
1553 if (nsc
->ns_snoop
) {
1556 if (BIO_get_ssl(nsc
->ssl_io
, &ssl
) < 1) {
1557 fprintf(stderr
, "WARNING: cannot determine SSL ciphers\n");
1559 const SSL_CIPHER
*cipher
= SSL_get_current_cipher(ssl
);
1560 fprintf(stderr
, "TLS negotiation successful: %s(%d) %s\n",
1561 SSL_CIPHER_get_name(cipher
),
1562 SSL_CIPHER_get_bits(cipher
, NULL
),
1563 SSL_CIPHER_get_version(cipher
));
1567 nsc
->tls_active
= 1;
1570 #else /* TLS_SUPPORT */
1571 netsec_err(errstr
, "TLS not supported");
1574 #endif /* TLS_SUPPORT */
1578 * Generate an (allocated) error string
1582 netsec_err(char **errstr
, const char *fmt
, ...)
1586 char *errbuf
= NULL
;
1593 errbufsize
= rc
+ 1;
1594 errbuf
= mh_xrealloc(errbuf
, errbufsize
);
1596 rc
= vsnprintf(errbuf
, errbufsize
, fmt
, ap
);
1598 } while (rc
>= (int) errbufsize
);