This repository has been archived on 2025-03-02. You can view files and clone it, but cannot push or open issues or pull requests.
lain/sasl.rb

201 lines
5.5 KiB
Ruby

require 'digest/sha1'
require 'openssl'
require 'xmpp4r/client'
require 'xmpp4r/sasl'
module Jabber
class Client
def auth(password)
#begin
if @stream_mechanisms.include? 'SCRAM-SHA-1'
auth_sasl SASL.new(self, 'SCRAM-SHA-1'), password
elsif @stream_mechanisms.include? 'DIGEST-MD5'
auth_sasl SASL.new(self, 'DIGEST-MD5'), password
elsif @stream_mechanisms.include? 'PLAIN'
auth_sasl SASL.new(self, 'PLAIN'), password
else
auth_nonsasl(password)
end
#rescue
# Jabber::debuglog("#{$!.class}: #{$!}\n#{$!.backtrace.join("\n")}")
# raise ClientAuthenticationFailure.new, $!.to_s
#end
end
end
module SASL
##
# Factory function to obtain a SASL helper for the specified mechanism
def SASL.new(stream, mechanism)
case mechanism
when 'SCRAM-SHA-1'
SCRAMSHA1.new(stream)
when 'DIGEST-MD5'
DigestMD5.new(stream)
when 'PLAIN'
Plain.new(stream)
when 'ANONYMOUS'
Anonymous.new(stream)
else
raise "Unknown SASL mechanism: #{mechanism}"
end
end
##
# SASL SCRAM-SHA1 authentication helper
class SCRAMSHA1 < Base
##
# Sends the wished auth mechanism and wait for a challenge
#
# (proceed with SCRAMSHA1#auth)
def initialize(stream)
super
@nonce = generate_nonce
@client_fm = "n=#{escape @stream.jid.node },r=#{@nonce}"
challenge = {}
challenge_text = ''
error = nil
@stream.send(generate_auth('SCRAM-SHA-1', text=Base64::strict_encode64('n,,'+@client_fm))) { |reply|
if reply.name == 'challenge' and reply.namespace == NS_SASL
challenge_text = Base64::decode64(reply.text)
challenge = decode_challenge(challenge_text)
else
error = reply.first_element(nil).name
end
true
}
raise error if error
@server_fm = challenge_text
@cnonce = challenge['r']
@salt = Base64::decode64(challenge['s'])
@iterations = challenge['i'].to_i
raise 'SCRAM-SHA-1 protocol error' if @cnonce[0, @nonce.length] != @nonce
end
def decode_challenge(text)
res = {}
state = :key
key = ''
value = ''
text.scan(/./) do |ch|
if state == :key
if ch == '='
state = :value
else
key += ch
end
elsif state == :value
if ch == ','
# due to our home-made parsing of the challenge, the key could have
# leading whitespace. strip it, or that would break jabberd2 support.
key = key.strip
res[key] = value
key = ''
value = ''
state = :key
elsif ch == '"' and value == ''
state = :quote
else
value += ch
end
elsif state == :quote
if ch == '"'
state = :value
else
value += ch
end
end
end
# due to our home-made parsing of the challenge, the key could have
# leading whitespace. strip it, or that would break jabberd2 support.
key = key.strip
res[key] = value unless key == ''
Jabber::debuglog("SASL SCRAM-SHA-1 challenge:\n#{text}\n#{res.inspect}")
res
end
##
# * Send a response
# * Wait for the server's challenge (which aren't checked)
# * Send a blind response to the server's challenge
def auth(password)
salted_password = hi(password, @salt, @iterations)
client_key = hmac(salted_password, 'Client Key')
stored_key = h(client_key)
final_message = "c=#{Base64::strict_encode64('n,,')},r=#{@cnonce}"
auth_message = "#{@client_fm},#{@server_fm},#{final_message}"
client_signature = hmac(stored_key, auth_message)
client_proof = xor(client_key, client_signature)
response_text = "#{final_message},p=#{Base64::strict_encode64(client_proof)}"
Jabber::debuglog("SASL SCRAM-SHA-1 response:\n#{response_text}")
r = REXML::Element.new('response')
r.add_namespace NS_SASL
r.text = Base64::strict_encode64(response_text)
error = nil
success = {}
@stream.send(r) { |reply|
if reply.name == 'success' and reply.namespace == NS_SASL
success = decode_challenge(Base64::decode64(reply.text))
elsif reply.name != 'challenge'
error = reply.first_element(nil).name
end
true
}
raise error if error
server_key = hmac(salted_password, 'Server Key')
server_signature = hmac(server_key, auth_message)
raise "Server authentication failed" if Base64::decode64(success['v']) != server_signature
end
private
def xor(a, b)
a.unpack('C*').zip(b.unpack('C*')).collect { | x, y | x ^ y }.pack('C*')
end
def h(s)
Digest::SHA1.digest(s)
end
def hmac(key, s)
OpenSSL::HMAC.digest('sha1', key, s)
end
def hi(s, salt, i)
r = Array.new(size=20, obj=0).pack('C*')
u = salt + [0, 0, 0, 1].pack('C*')
i.times do |x|
u = hmac(s, u)
r = xor(r, u)
end
r
end
def escape(data)
data.gsub(/=/, '=3D').gsub(/,/, '=2C')
end
end
end
end