164 lines
5.1 KiB
C++
164 lines
5.1 KiB
C++
/*
|
|
* Copyright (c) 2016 MariaDB Corporation Ab
|
|
*
|
|
* Use of this software is governed by the Business Source License included
|
|
* in the LICENSE.TXT file and at www.mariadb.com/bsl11.
|
|
*
|
|
* Change Date: 2022-01-01
|
|
*
|
|
* On the date above, in accordance with the Business Source License, use
|
|
* of this software will be governed by version 2 or later of the General
|
|
* Public License.
|
|
*/
|
|
|
|
#include "pam_backend_session.hh"
|
|
#include <maxscale/server.h>
|
|
|
|
namespace
|
|
{
|
|
/**
|
|
* Check that the AuthSwitchRequest packet is as expected. Inverse of
|
|
* create_auth_change_packet() in pam_auth.cc.
|
|
*
|
|
* @param dcb Backend DCB
|
|
* @param buffer Buffer containing an AuthSwitchRequest packet
|
|
* @return True on success, false on error
|
|
*/
|
|
bool check_auth_switch_request(DCB *dcb, GWBUF *buffer)
|
|
{
|
|
/**
|
|
* The AuthSwitchRequest packet:
|
|
* 4 bytes - Header
|
|
* 0xfe - Command byte
|
|
* string[NUL] - Auth plugin name
|
|
* byte - Message type
|
|
* string[EOF] - Message
|
|
*/
|
|
/** We know how long the packet should be in the simple case. */
|
|
unsigned int expected_buflen = MYSQL_HEADER_LEN + 1 + DIALOG_SIZE + 1 + PASSWORD.length();
|
|
uint8_t data[expected_buflen];
|
|
size_t copied = gwbuf_copy_data(buffer, 0, expected_buflen, data);
|
|
|
|
/* Check that this is an AuthSwitchRequest. */
|
|
if ((copied <= MYSQL_HEADER_LEN) || (data[MYSQL_HEADER_LEN] != MYSQL_REPLY_AUTHSWITCHREQUEST))
|
|
{
|
|
/** Server responded with something we did not expect. If it's an OK packet,
|
|
* it's possible that the server authenticated us as the anonymous user. This
|
|
* means that the server is not secure. */
|
|
bool was_ok_packet = copied > MYSQL_HEADER_LEN &&
|
|
data[MYSQL_HEADER_LEN + 1] == MYSQL_REPLY_OK;
|
|
MXS_ERROR("Server '%s' returned an unexpected authentication response.%s",
|
|
dcb->server->name, was_ok_packet ?
|
|
" Authentication was complete before it even started, "
|
|
"anonymous users might not be disabled." : "");
|
|
return false;
|
|
}
|
|
unsigned int buflen = gwbuf_length(buffer);
|
|
if (buflen != expected_buflen)
|
|
{
|
|
MXS_ERROR("Length of server AuthSwitchRequest packet was '%u', expected '%u'. %s",
|
|
buflen, expected_buflen, GENERAL_ERRMSG);
|
|
return false;
|
|
}
|
|
|
|
/* Check that the server is using the "dialog" plugin and asking for the password. */
|
|
uint8_t* plugin_name_loc = data + MYSQL_HEADER_LEN + 1;
|
|
uint8_t* msg_type_loc = plugin_name_loc + DIALOG_SIZE;
|
|
uint8_t msg_type = *msg_type_loc;
|
|
uint8_t* msg_loc = msg_type_loc + 1;
|
|
|
|
bool rval = false;
|
|
if ((DIALOG == (char*)plugin_name_loc) &&
|
|
(msg_type == DIALOG_ECHO_ENABLED || msg_type == DIALOG_ECHO_DISABLED) &&
|
|
PASSWORD.compare(0, PASSWORD.length(), (char*)msg_loc, PASSWORD.length()) == 0)
|
|
{
|
|
rval = true;
|
|
}
|
|
else
|
|
{
|
|
MXS_ERROR("AuthSwitchRequest packet contents unexpected. %s", GENERAL_ERRMSG);
|
|
}
|
|
return rval;
|
|
}
|
|
}
|
|
PamBackendSession::PamBackendSession()
|
|
: m_state(PAM_AUTH_INIT)
|
|
, m_sequence(0)
|
|
{
|
|
}
|
|
|
|
/**
|
|
* Send password to server
|
|
*
|
|
* @param dcb Backend DCB
|
|
* @return True on success, false on error
|
|
*/
|
|
bool PamBackendSession::send_client_password(DCB *dcb)
|
|
{
|
|
bool rval = false;
|
|
MYSQL_session *ses = (MYSQL_session*)dcb->session->client_dcb->data;
|
|
size_t buflen = MYSQL_HEADER_LEN + ses->auth_token_len;
|
|
uint8_t bufferdata[buflen];
|
|
gw_mysql_set_byte3(bufferdata, ses->auth_token_len);
|
|
bufferdata[MYSQL_SEQ_OFFSET] = m_sequence;
|
|
memcpy(bufferdata + MYSQL_HEADER_LEN, ses->auth_token, ses->auth_token_len);
|
|
return dcb_write(dcb, gwbuf_alloc_and_load(buflen, bufferdata));
|
|
}
|
|
|
|
bool PamBackendSession::extract(DCB *dcb, GWBUF *buffer)
|
|
{
|
|
gwbuf_copy_data(buffer, MYSQL_SEQ_OFFSET, 1, &m_sequence);
|
|
m_sequence++;
|
|
bool rval = false;
|
|
|
|
if (m_state == PAM_AUTH_INIT && check_auth_switch_request(dcb, buffer))
|
|
{
|
|
rval = true;
|
|
}
|
|
else if (m_state == PAM_AUTH_DATA_SENT)
|
|
{
|
|
/** Read authentication response */
|
|
if (mxs_mysql_is_ok_packet(buffer))
|
|
{
|
|
MXS_DEBUG("pam_backend_auth_extract received ok packet from '%s'.",
|
|
dcb->server->name);
|
|
m_state = PAM_AUTH_OK;
|
|
rval = true;
|
|
}
|
|
else
|
|
{
|
|
MXS_ERROR("Expected ok from server but got something else. Authentication"
|
|
" failed.");
|
|
}
|
|
}
|
|
|
|
if (!rval)
|
|
{
|
|
MXS_DEBUG("pam_backend_auth_extract to backend '%s' failed for user '%s'.",
|
|
dcb->server->name, dcb->user);
|
|
}
|
|
return rval;
|
|
}
|
|
|
|
int PamBackendSession::authenticate(DCB *dcb)
|
|
{
|
|
int rval = MXS_AUTH_FAILED;
|
|
|
|
if (m_state == PAM_AUTH_INIT)
|
|
{
|
|
MXS_DEBUG("pam_backend_auth_authenticate sending password to '%s'.",
|
|
dcb->server->name);
|
|
if (send_client_password(dcb))
|
|
{
|
|
rval = MXS_AUTH_INCOMPLETE;
|
|
m_state = PAM_AUTH_DATA_SENT;
|
|
}
|
|
}
|
|
else if (m_state == PAM_AUTH_OK)
|
|
{
|
|
rval = MXS_AUTH_SUCCEEDED;
|
|
}
|
|
|
|
return rval;
|
|
}
|