auth2-chall.c revision 1.1 1 1.1 christos /* $NetBSD: auth2-chall.c,v 1.1 2009/06/07 22:19:02 christos Exp $ */
2 1.1 christos /* $OpenBSD: auth2-chall.c,v 1.34 2008/12/09 04:32:22 djm Exp $ */
3 1.1 christos /*
4 1.1 christos * Copyright (c) 2001 Markus Friedl. All rights reserved.
5 1.1 christos * Copyright (c) 2001 Per Allansson. All rights reserved.
6 1.1 christos *
7 1.1 christos * Redistribution and use in source and binary forms, with or without
8 1.1 christos * modification, are permitted provided that the following conditions
9 1.1 christos * are met:
10 1.1 christos * 1. Redistributions of source code must retain the above copyright
11 1.1 christos * notice, this list of conditions and the following disclaimer.
12 1.1 christos * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 christos * notice, this list of conditions and the following disclaimer in the
14 1.1 christos * documentation and/or other materials provided with the distribution.
15 1.1 christos *
16 1.1 christos * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
17 1.1 christos * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
18 1.1 christos * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
19 1.1 christos * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
20 1.1 christos * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
21 1.1 christos * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
22 1.1 christos * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
23 1.1 christos * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
24 1.1 christos * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
25 1.1 christos * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26 1.1 christos */
27 1.1 christos
28 1.1 christos #include <sys/types.h>
29 1.1 christos
30 1.1 christos #include <stdio.h>
31 1.1 christos #include <string.h>
32 1.1 christos
33 1.1 christos #include "xmalloc.h"
34 1.1 christos #include "ssh2.h"
35 1.1 christos #include "key.h"
36 1.1 christos #include "hostfile.h"
37 1.1 christos #include "auth.h"
38 1.1 christos #include "buffer.h"
39 1.1 christos #include "packet.h"
40 1.1 christos #include "dispatch.h"
41 1.1 christos #include "log.h"
42 1.1 christos
43 1.1 christos static int auth2_challenge_start(Authctxt *);
44 1.1 christos static int send_userauth_info_request(Authctxt *);
45 1.1 christos static void input_userauth_info_response(int, u_int32_t, void *);
46 1.1 christos
47 1.1 christos extern KbdintDevice bsdauth_device;
48 1.1 christos
49 1.1 christos KbdintDevice *devices[] = {
50 1.1 christos &bsdauth_device,
51 1.1 christos NULL
52 1.1 christos };
53 1.1 christos
54 1.1 christos typedef struct KbdintAuthctxt KbdintAuthctxt;
55 1.1 christos struct KbdintAuthctxt
56 1.1 christos {
57 1.1 christos char *devices;
58 1.1 christos void *ctxt;
59 1.1 christos KbdintDevice *device;
60 1.1 christos u_int nreq;
61 1.1 christos };
62 1.1 christos
63 1.1 christos static KbdintAuthctxt *
64 1.1 christos kbdint_alloc(const char *devs)
65 1.1 christos {
66 1.1 christos KbdintAuthctxt *kbdintctxt;
67 1.1 christos Buffer b;
68 1.1 christos int i;
69 1.1 christos
70 1.1 christos kbdintctxt = xmalloc(sizeof(KbdintAuthctxt));
71 1.1 christos if (strcmp(devs, "") == 0) {
72 1.1 christos buffer_init(&b);
73 1.1 christos for (i = 0; devices[i]; i++) {
74 1.1 christos if (buffer_len(&b) > 0)
75 1.1 christos buffer_append(&b, ",", 1);
76 1.1 christos buffer_append(&b, devices[i]->name,
77 1.1 christos strlen(devices[i]->name));
78 1.1 christos }
79 1.1 christos buffer_append(&b, "\0", 1);
80 1.1 christos kbdintctxt->devices = xstrdup(buffer_ptr(&b));
81 1.1 christos buffer_free(&b);
82 1.1 christos } else {
83 1.1 christos kbdintctxt->devices = xstrdup(devs);
84 1.1 christos }
85 1.1 christos debug("kbdint_alloc: devices '%s'", kbdintctxt->devices);
86 1.1 christos kbdintctxt->ctxt = NULL;
87 1.1 christos kbdintctxt->device = NULL;
88 1.1 christos kbdintctxt->nreq = 0;
89 1.1 christos
90 1.1 christos return kbdintctxt;
91 1.1 christos }
92 1.1 christos static void
93 1.1 christos kbdint_reset_device(KbdintAuthctxt *kbdintctxt)
94 1.1 christos {
95 1.1 christos if (kbdintctxt->ctxt) {
96 1.1 christos kbdintctxt->device->free_ctx(kbdintctxt->ctxt);
97 1.1 christos kbdintctxt->ctxt = NULL;
98 1.1 christos }
99 1.1 christos kbdintctxt->device = NULL;
100 1.1 christos }
101 1.1 christos static void
102 1.1 christos kbdint_free(KbdintAuthctxt *kbdintctxt)
103 1.1 christos {
104 1.1 christos if (kbdintctxt->device)
105 1.1 christos kbdint_reset_device(kbdintctxt);
106 1.1 christos if (kbdintctxt->devices) {
107 1.1 christos xfree(kbdintctxt->devices);
108 1.1 christos kbdintctxt->devices = NULL;
109 1.1 christos }
110 1.1 christos xfree(kbdintctxt);
111 1.1 christos }
112 1.1 christos /* get next device */
113 1.1 christos static int
114 1.1 christos kbdint_next_device(KbdintAuthctxt *kbdintctxt)
115 1.1 christos {
116 1.1 christos size_t len;
117 1.1 christos char *t;
118 1.1 christos int i;
119 1.1 christos
120 1.1 christos if (kbdintctxt->device)
121 1.1 christos kbdint_reset_device(kbdintctxt);
122 1.1 christos do {
123 1.1 christos len = kbdintctxt->devices ?
124 1.1 christos strcspn(kbdintctxt->devices, ",") : 0;
125 1.1 christos
126 1.1 christos if (len == 0)
127 1.1 christos break;
128 1.1 christos for (i = 0; devices[i]; i++)
129 1.1 christos if (strncmp(kbdintctxt->devices, devices[i]->name, len) == 0)
130 1.1 christos kbdintctxt->device = devices[i];
131 1.1 christos t = kbdintctxt->devices;
132 1.1 christos kbdintctxt->devices = t[len] ? xstrdup(t+len+1) : NULL;
133 1.1 christos xfree(t);
134 1.1 christos debug2("kbdint_next_device: devices %s", kbdintctxt->devices ?
135 1.1 christos kbdintctxt->devices : "<empty>");
136 1.1 christos } while (kbdintctxt->devices && !kbdintctxt->device);
137 1.1 christos
138 1.1 christos return kbdintctxt->device ? 1 : 0;
139 1.1 christos }
140 1.1 christos
141 1.1 christos /*
142 1.1 christos * try challenge-response, set authctxt->postponed if we have to
143 1.1 christos * wait for the response.
144 1.1 christos */
145 1.1 christos int
146 1.1 christos auth2_challenge(Authctxt *authctxt, char *devs)
147 1.1 christos {
148 1.1 christos debug("auth2_challenge: user=%s devs=%s",
149 1.1 christos authctxt->user ? authctxt->user : "<nouser>",
150 1.1 christos devs ? devs : "<no devs>");
151 1.1 christos
152 1.1 christos if (authctxt->user == NULL || !devs)
153 1.1 christos return 0;
154 1.1 christos if (authctxt->kbdintctxt == NULL)
155 1.1 christos authctxt->kbdintctxt = kbdint_alloc(devs);
156 1.1 christos return auth2_challenge_start(authctxt);
157 1.1 christos }
158 1.1 christos
159 1.1 christos /* unregister kbd-int callbacks and context */
160 1.1 christos void
161 1.1 christos auth2_challenge_stop(Authctxt *authctxt)
162 1.1 christos {
163 1.1 christos /* unregister callback */
164 1.1 christos dispatch_set(SSH2_MSG_USERAUTH_INFO_RESPONSE, NULL);
165 1.1 christos if (authctxt->kbdintctxt != NULL) {
166 1.1 christos kbdint_free(authctxt->kbdintctxt);
167 1.1 christos authctxt->kbdintctxt = NULL;
168 1.1 christos }
169 1.1 christos }
170 1.1 christos
171 1.1 christos /* side effect: sets authctxt->postponed if a reply was sent*/
172 1.1 christos static int
173 1.1 christos auth2_challenge_start(Authctxt *authctxt)
174 1.1 christos {
175 1.1 christos KbdintAuthctxt *kbdintctxt = authctxt->kbdintctxt;
176 1.1 christos
177 1.1 christos debug2("auth2_challenge_start: devices %s",
178 1.1 christos kbdintctxt->devices ? kbdintctxt->devices : "<empty>");
179 1.1 christos
180 1.1 christos if (kbdint_next_device(kbdintctxt) == 0) {
181 1.1 christos auth2_challenge_stop(authctxt);
182 1.1 christos return 0;
183 1.1 christos }
184 1.1 christos debug("auth2_challenge_start: trying authentication method '%s'",
185 1.1 christos kbdintctxt->device->name);
186 1.1 christos
187 1.1 christos if ((kbdintctxt->ctxt = kbdintctxt->device->init_ctx(authctxt)) == NULL) {
188 1.1 christos auth2_challenge_stop(authctxt);
189 1.1 christos return 0;
190 1.1 christos }
191 1.1 christos if (send_userauth_info_request(authctxt) == 0) {
192 1.1 christos auth2_challenge_stop(authctxt);
193 1.1 christos return 0;
194 1.1 christos }
195 1.1 christos dispatch_set(SSH2_MSG_USERAUTH_INFO_RESPONSE,
196 1.1 christos &input_userauth_info_response);
197 1.1 christos
198 1.1 christos authctxt->postponed = 1;
199 1.1 christos return 0;
200 1.1 christos }
201 1.1 christos
202 1.1 christos static int
203 1.1 christos send_userauth_info_request(Authctxt *authctxt)
204 1.1 christos {
205 1.1 christos KbdintAuthctxt *kbdintctxt;
206 1.1 christos char *name, *instr, **prompts;
207 1.1 christos u_int i, *echo_on;
208 1.1 christos
209 1.1 christos kbdintctxt = authctxt->kbdintctxt;
210 1.1 christos if (kbdintctxt->device->query(kbdintctxt->ctxt,
211 1.1 christos &name, &instr, &kbdintctxt->nreq, &prompts, &echo_on))
212 1.1 christos return 0;
213 1.1 christos
214 1.1 christos packet_start(SSH2_MSG_USERAUTH_INFO_REQUEST);
215 1.1 christos packet_put_cstring(name);
216 1.1 christos packet_put_cstring(instr);
217 1.1 christos packet_put_cstring(""); /* language not used */
218 1.1 christos packet_put_int(kbdintctxt->nreq);
219 1.1 christos for (i = 0; i < kbdintctxt->nreq; i++) {
220 1.1 christos packet_put_cstring(prompts[i]);
221 1.1 christos packet_put_char(echo_on[i]);
222 1.1 christos }
223 1.1 christos packet_send();
224 1.1 christos packet_write_wait();
225 1.1 christos
226 1.1 christos for (i = 0; i < kbdintctxt->nreq; i++)
227 1.1 christos xfree(prompts[i]);
228 1.1 christos xfree(prompts);
229 1.1 christos xfree(echo_on);
230 1.1 christos xfree(name);
231 1.1 christos xfree(instr);
232 1.1 christos return 1;
233 1.1 christos }
234 1.1 christos
235 1.1 christos static void
236 1.1 christos input_userauth_info_response(int type, u_int32_t seq, void *ctxt)
237 1.1 christos {
238 1.1 christos Authctxt *authctxt = ctxt;
239 1.1 christos KbdintAuthctxt *kbdintctxt;
240 1.1 christos int authenticated = 0, res;
241 1.1 christos u_int i, nresp;
242 1.1 christos char **response = NULL, *method;
243 1.1 christos
244 1.1 christos if (authctxt == NULL)
245 1.1 christos fatal("input_userauth_info_response: no authctxt");
246 1.1 christos kbdintctxt = authctxt->kbdintctxt;
247 1.1 christos if (kbdintctxt == NULL || kbdintctxt->ctxt == NULL)
248 1.1 christos fatal("input_userauth_info_response: no kbdintctxt");
249 1.1 christos if (kbdintctxt->device == NULL)
250 1.1 christos fatal("input_userauth_info_response: no device");
251 1.1 christos
252 1.1 christos authctxt->postponed = 0; /* reset */
253 1.1 christos nresp = packet_get_int();
254 1.1 christos if (nresp != kbdintctxt->nreq)
255 1.1 christos fatal("input_userauth_info_response: wrong number of replies");
256 1.1 christos if (nresp > 100)
257 1.1 christos fatal("input_userauth_info_response: too many replies");
258 1.1 christos if (nresp > 0) {
259 1.1 christos response = xcalloc(nresp, sizeof(char *));
260 1.1 christos for (i = 0; i < nresp; i++)
261 1.1 christos response[i] = packet_get_string(NULL);
262 1.1 christos }
263 1.1 christos packet_check_eom();
264 1.1 christos
265 1.1 christos res = kbdintctxt->device->respond(kbdintctxt->ctxt, nresp, response);
266 1.1 christos
267 1.1 christos for (i = 0; i < nresp; i++) {
268 1.1 christos memset(response[i], 'r', strlen(response[i]));
269 1.1 christos xfree(response[i]);
270 1.1 christos }
271 1.1 christos if (response)
272 1.1 christos xfree(response);
273 1.1 christos
274 1.1 christos switch (res) {
275 1.1 christos case 0:
276 1.1 christos /* Success! */
277 1.1 christos authenticated = authctxt->valid ? 1 : 0;
278 1.1 christos break;
279 1.1 christos case 1:
280 1.1 christos /* Authentication needs further interaction */
281 1.1 christos if (send_userauth_info_request(authctxt) == 1)
282 1.1 christos authctxt->postponed = 1;
283 1.1 christos break;
284 1.1 christos default:
285 1.1 christos /* Failure! */
286 1.1 christos break;
287 1.1 christos }
288 1.1 christos
289 1.1 christos xasprintf(&method, "keyboard-interactive/%s", kbdintctxt->device->name);
290 1.1 christos
291 1.1 christos if (!authctxt->postponed) {
292 1.1 christos if (authenticated) {
293 1.1 christos auth2_challenge_stop(authctxt);
294 1.1 christos } else {
295 1.1 christos /* start next device */
296 1.1 christos /* may set authctxt->postponed */
297 1.1 christos auth2_challenge_start(authctxt);
298 1.1 christos }
299 1.1 christos }
300 1.1 christos userauth_finish(authctxt, authenticated, method);
301 1.1 christos xfree(method);
302 1.1 christos }
303 1.1 christos
304 1.1 christos void
305 1.1 christos privsep_challenge_enable(void)
306 1.1 christos {
307 1.1 christos extern KbdintDevice mm_bsdauth_device;
308 1.1 christos /* As long as SSHv1 has devices[0] hard coded this is fine */
309 1.1 christos devices[0] = &mm_bsdauth_device;
310 1.1 christos }
311