support SCRAM-SHA-1

This commit is contained in:
lumi 2017-02-24 23:42:08 +01:00
parent 74fb4fd9ad
commit ff7387a92a
6 changed files with 283 additions and 10 deletions

View file

@ -4,7 +4,7 @@ use xmpp::jid::Jid;
use xmpp::client::ClientBuilder;
use xmpp::plugins::messaging::{MessagingPlugin, MessageEvent};
use xmpp::plugins::presence::{PresencePlugin, Show};
use xmpp::sasl::mechanisms::Plain;
use xmpp::sasl::mechanisms::{Scram, Sha1, Plain};
use std::env;
@ -14,7 +14,10 @@ fn main() {
client.register_plugin(MessagingPlugin::new());
client.register_plugin(PresencePlugin::new());
let pass = env::var("PASS").unwrap();
client.connect(&mut Plain::new(jid.node.clone().expect("JID requires a node"), pass)).unwrap();
let name = jid.node.clone().expect("JID requires a node");
client.connect(&mut Plain::new(name, pass)).unwrap();
// Replace with this line if you want SCRAM-SHA-1 authentication:
// client.connect(&mut Scram::<Sha1>::new(name, pass).unwrap()).unwrap();
client.plugin::<PresencePlugin>().set_presence(Show::Available, None).unwrap();
loop {
let event = client.next_event().unwrap();

View file

@ -16,6 +16,7 @@ use xml::reader::XmlEvent as ReaderEvent;
use std::sync::mpsc::{Receiver, channel};
/// Struct that should be moved somewhere else and cleaned up.
#[derive(Debug)]
pub struct StreamFeatures {
pub sasl_mechanisms: Option<Vec<String>>,
}
@ -129,7 +130,7 @@ impl Client {
/// Connects and authenticates using the specified SASL mechanism.
pub fn connect<S: SaslMechanism>(&mut self, mechanism: &mut S) -> Result<(), Error> {
self.wait_for_features()?;
let auth = mechanism.initial();
let auth = mechanism.initial().map_err(|x| Error::SaslError(Some(x)))?;
let mut elem = Element::builder("auth")
.ns(ns::SASL)
.attr("mechanism", S::name())
@ -148,7 +149,7 @@ impl Client {
else {
base64::decode(&text)?
};
let response = mechanism.response(&challenge);
let response = mechanism.response(&challenge).map_err(|x| Error::SaslError(Some(x)))?;
let mut elem = Element::builder("response")
.ns(ns::SASL)
.build();
@ -158,6 +159,14 @@ impl Client {
self.transport.write_element(&elem)?;
}
else if n.is("success", ns::SASL) {
let text = n.text();
let data = if text == "" {
Vec::new()
}
else {
base64::decode(&text)?
};
mechanism.success(&data).map_err(|x| Error::SaslError(Some(x)))?;
self.transport.reset_stream();
C2S::init(&mut self.transport, &self.jid.domain, "after_sasl")?;
return self.bind();

View file

@ -2,6 +2,8 @@
mod anonymous;
mod plain;
mod scram;
pub use self::anonymous::Anonymous;
pub use self::plain::Plain;
pub use self::scram::{Scram, Sha1, ScramProvider};

View file

@ -19,12 +19,12 @@ impl Plain {
impl SaslMechanism for Plain {
fn name() -> &'static str { "PLAIN" }
fn initial(&mut self) -> Vec<u8> {
fn initial(&mut self) -> Result<Vec<u8>, String> {
let mut auth = Vec::new();
auth.push(0);
auth.extend(self.name.bytes());
auth.push(0);
auth.extend(self.password.bytes());
auth
Ok(auth)
}
}

View file

@ -0,0 +1,254 @@
//! Provides the SASL "SCRAM-*" mechanisms and a way to implement more.
use base64;
use sasl::SaslMechanism;
use error::Error;
use openssl::pkcs5::pbkdf2_hmac;
use openssl::hash::hash;
use openssl::hash::MessageDigest;
use openssl::sign::Signer;
use openssl::pkey::PKey;
use openssl::rand::rand_bytes;
use openssl::error::ErrorStack;
use std::marker::PhantomData;
#[cfg(test)]
#[test]
fn xor_works() {
assert_eq!( xor( &[135, 94, 53, 134, 73, 233, 140, 221, 150, 12, 96, 111, 54, 66, 11, 76]
, &[163, 9, 122, 180, 107, 44, 22, 252, 248, 134, 112, 82, 84, 122, 56, 209] )
, &[36, 87, 79, 50, 34, 197, 154, 33, 110, 138, 16, 61, 98, 56, 51, 157] );
}
fn xor(a: &[u8], b: &[u8]) -> Vec<u8> {
assert_eq!(a.len(), b.len());
let mut ret = Vec::with_capacity(a.len());
for (a, b) in a.into_iter().zip(b) {
ret.push(a ^ b);
}
ret
}
fn generate_nonce() -> Result<String, ErrorStack> {
let mut data = vec![0; 32];
rand_bytes(&mut data)?;
Ok(base64::encode(&data))
}
pub trait ScramProvider {
fn name() -> &'static str;
fn hash(data: &[u8]) -> Vec<u8>;
fn hmac(data: &[u8], key: &[u8]) -> Vec<u8>;
fn derive(data: &[u8], salt: &[u8], iterations: usize) -> Vec<u8>;
}
pub struct Sha1;
impl ScramProvider for Sha1 { // TODO: look at all these unwraps
fn name() -> &'static str { "SCRAM-SHA-1" }
fn hash(data: &[u8]) -> Vec<u8> {
hash(MessageDigest::sha1(), data).unwrap()
}
fn hmac(data: &[u8], key: &[u8]) -> Vec<u8> {
let pkey = PKey::hmac(key).unwrap();
let mut signer = Signer::new(MessageDigest::sha1(), &pkey).unwrap();
signer.update(data).unwrap();
signer.finish().unwrap()
}
fn derive(data: &[u8], salt: &[u8], iterations: usize) -> Vec<u8> {
let mut result = vec![0; 20];
pbkdf2_hmac(data, salt, iterations, MessageDigest::sha1(), &mut result).unwrap();
result
}
}
enum ScramState {
Init,
SentInitialMessage { initial_message: Vec<u8> },
GotServerData { server_signature: Vec<u8> },
}
pub struct Scram<S: ScramProvider> {
name: String,
password: String,
client_nonce: String,
state: ScramState,
_marker: PhantomData<S>,
}
impl<S: ScramProvider> Scram<S> {
pub fn new<N: Into<String>, P: Into<String>>(name: N, password: P) -> Result<Scram<S>, Error> {
Ok(Scram {
name: name.into(),
password: password.into(),
client_nonce: generate_nonce()?,
state: ScramState::Init,
_marker: PhantomData,
})
}
pub fn new_with_nonce<N: Into<String>, P: Into<String>>(name: N, password: P, nonce: String) -> Scram<S> {
Scram {
name: name.into(),
password: password.into(),
client_nonce: nonce,
state: ScramState::Init,
_marker: PhantomData,
}
}
}
impl<S: ScramProvider> SaslMechanism for Scram<S> {
fn name() -> &'static str {
S::name()
}
fn initial(&mut self) -> Result<Vec<u8>, String> {
let mut bare = Vec::new();
bare.extend(b"n=");
bare.extend(self.name.bytes());
bare.extend(b",r=");
bare.extend(self.client_nonce.bytes());
self.state = ScramState::SentInitialMessage { initial_message: bare.clone() };
let mut data = Vec::new();
data.extend(b"n,,");
data.extend(bare);
Ok(data)
}
fn response(&mut self, challenge: &[u8]) -> Result<Vec<u8>, String> {
let next_state;
let ret;
match self.state {
ScramState::SentInitialMessage { ref initial_message } => {
let chal = String::from_utf8(challenge.to_owned()).map_err(|_| "can't decode challenge".to_owned())?;
let mut server_nonce: Option<String> = None;
let mut salt: Option<Vec<u8>> = None;
let mut iterations: Option<usize> = None;
for s in chal.split(',') {
let mut tmp = s.splitn(2, '=');
let key = tmp.next();
if let Some(val) = tmp.next() {
match key {
Some("r") => {
if val.starts_with(&self.client_nonce) {
server_nonce = Some(val.to_owned());
}
},
Some("s") => {
if let Ok(s) = base64::decode(val) {
salt = Some(s);
}
},
Some("i") => {
if let Ok(iters) = val.parse() {
iterations = Some(iters);
}
},
_ => (),
}
}
}
let server_nonce = server_nonce.ok_or_else(|| "no server nonce".to_owned())?;
let salt = salt.ok_or_else(|| "no server salt".to_owned())?;
let iterations = iterations.ok_or_else(|| "no server iterations".to_owned())?;
// TODO: SASLprep
let mut client_final_message_bare = Vec::new();
client_final_message_bare.extend(b"c=biws,r=");
client_final_message_bare.extend(server_nonce.bytes());
let salted_password = S::derive(self.password.as_bytes(), &salt, iterations);
let client_key = S::hmac(b"Client Key", &salted_password);
let server_key = S::hmac(b"Server Key", &salted_password);
let mut auth_message = Vec::new();
auth_message.extend(initial_message);
auth_message.push(b',');
auth_message.extend(challenge);
auth_message.push(b',');
auth_message.extend(&client_final_message_bare);
let stored_key = S::hash(&client_key);
let client_signature = S::hmac(&auth_message, &stored_key);
let client_proof = xor(&client_key, &client_signature);
let server_signature = S::hmac(&auth_message, &server_key);
let mut client_final_message = Vec::new();
client_final_message.extend(&client_final_message_bare);
client_final_message.extend(b",p=");
client_final_message.extend(base64::encode(&client_proof).bytes());
next_state = ScramState::GotServerData {
server_signature: server_signature,
};
ret = client_final_message;
},
_ => { return Err("not in the right state to receive this response".to_owned()); }
}
self.state = next_state;
Ok(ret)
}
fn success(&mut self, data: &[u8]) -> Result<(), String> {
let data = String::from_utf8(data.to_owned()).map_err(|_| "can't decode success message".to_owned())?;
let mut received_signature = None;
match self.state {
ScramState::GotServerData { ref server_signature } => {
for s in data.split(',') {
let mut tmp = s.splitn(2, '=');
let key = tmp.next();
if let Some(val) = tmp.next() {
match key {
Some("v") => {
if let Ok(v) = base64::decode(val) {
received_signature = Some(v);
}
},
_ => (),
}
}
}
if let Some(sig) = received_signature {
if sig == *server_signature {
Ok(())
}
else {
Err("invalid signature in success response".to_owned())
}
}
else {
Err("no signature in success response".to_owned())
}
},
_ => Err("not in the right state to get a success response".to_owned()),
}
}
}
#[cfg(test)]
mod tests {
use sasl::SaslMechanism;
use super::*;
#[test]
fn scram_sha1_works() { // Source: https://wiki.xmpp.org/web/SASLandSCRAM-SHA-1
let username = "user";
let password = "pencil";
let client_nonce = "fyko+d2lbbFgONRv9qkxdawL";
let client_init = b"n,,n=user,r=fyko+d2lbbFgONRv9qkxdawL";
let server_init = b"r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j,s=QSXCR+Q6sek8bf92,i=4096";
let client_final = b"c=biws,r=fyko+d2lbbFgONRv9qkxdawL3rfcNHYJY1ZVvWVs7j,p=v0X8v3Bz2T0CJGbJQyF0X+HI4Ts=";
let server_final = b"v=rmF9pqV8S7suAoZWja4dJRkFsKQ=";
let mut mechanism = Scram::<Sha1>::new_with_nonce(username, password, client_nonce.to_owned());
let init = mechanism.initial().unwrap();
assert_eq!( String::from_utf8(init.clone()).unwrap()
, String::from_utf8(client_init[..].to_owned()).unwrap() ); // depends on ordering…
let resp = mechanism.response(&server_init[..]).unwrap();
assert_eq!( String::from_utf8(resp.clone()).unwrap()
, String::from_utf8(client_final[..].to_owned()).unwrap() ); // again, depends on ordering…
mechanism.success(&server_final[..]).unwrap();
}
}

View file

@ -5,13 +5,18 @@ pub trait SaslMechanism {
fn name() -> &'static str;
/// Provides initial payload of the SASL mechanism.
fn initial(&mut self) -> Vec<u8> {
Vec::new()
fn initial(&mut self) -> Result<Vec<u8>, String> {
Ok(Vec::new())
}
/// Creates a response to the SASL challenge.
fn response(&mut self, _challenge: &[u8]) -> Vec<u8> {
Vec::new()
fn response(&mut self, _challenge: &[u8]) -> Result<Vec<u8>, String> {
Ok(Vec::new())
}
/// Verifies the server success response, if there is one.
fn success(&mut self, _data: &[u8]) -> Result<(), String> {
Ok(())
}
}