mirror of
https://github.com/progval/irctest.git
synced 2025-04-05 06:49:47 +00:00
basic server test for SCRAM-SHA-256 (#84)
This commit is contained in:
committed by
GitHub
parent
ec386a1fc9
commit
9de76b6063
1
.github/workflows/test-devel.yml
vendored
1
.github/workflows/test-devel.yml
vendored
@ -394,6 +394,7 @@ jobs:
|
||||
python-version: 3.7
|
||||
- name: Install dependencies
|
||||
run: pip install git+https://github.com/ProgVal/Limnoria.git@testing cryptography
|
||||
pyxmpp2-scram
|
||||
- name: Install Atheme
|
||||
run: sudo apt-get install atheme-services
|
||||
- name: Install irctest dependencies
|
||||
|
2
.github/workflows/test-stable.yml
vendored
2
.github/workflows/test-stable.yml
vendored
@ -497,7 +497,7 @@ jobs:
|
||||
with:
|
||||
python-version: 3.7
|
||||
- name: Install dependencies
|
||||
run: pip install limnoria==2021.06.15 cryptography
|
||||
run: pip install limnoria==2021.06.15 cryptography pyxmpp2-scram
|
||||
- name: Install Atheme
|
||||
run: sudo apt-get install atheme-services
|
||||
- name: Install irctest dependencies
|
||||
|
@ -1,3 +1,5 @@
|
||||
exclude: ^irctest/scram
|
||||
|
||||
repos:
|
||||
- repo: https://github.com/psf/black
|
||||
rev: 20.8b1
|
||||
|
2
Makefile
2
Makefile
@ -98,7 +98,7 @@ UNREALIRCD_SELECTORS := \
|
||||
all: flakes charybdis ergo inspircd mammon limnoria sopel solanum unrealircd
|
||||
|
||||
flakes:
|
||||
pyflakes3 irctest
|
||||
find irctest/ -name "*.py" -not -path "irctest/scram/*" -print0 | xargs -0 pyflakes3
|
||||
|
||||
charybdis:
|
||||
$(PYTEST) $(PYTEST_ARGS) \
|
||||
|
@ -8,12 +8,7 @@ try:
|
||||
except ImportError:
|
||||
ecdsa = None
|
||||
|
||||
try:
|
||||
import pyxmpp2_scram as scram
|
||||
except ImportError:
|
||||
scram = None
|
||||
|
||||
from irctest import authentication, cases
|
||||
from irctest import authentication, cases, scram
|
||||
from irctest.irc_utils.message_parser import Message
|
||||
|
||||
ECDSA_KEY = """
|
||||
@ -182,7 +177,6 @@ class SaslTestCase(cases.BaseClientTestCase, cases.OptionalityHelper):
|
||||
m = self.negotiateCapabilities(["sasl"], False)
|
||||
self.assertEqual(m, Message({}, None, "CAP", ["END"]))
|
||||
|
||||
@pytest.mark.skipif(scram is None, reason="pyxmpp2-scram is not available")
|
||||
@cases.OptionalityHelper.skipUnlessHasMechanism("SCRAM-SHA-256")
|
||||
def testScram(self):
|
||||
"""Test SCRAM-SHA-256 authentication."""
|
||||
@ -225,7 +219,6 @@ class SaslTestCase(cases.BaseClientTestCase, cases.OptionalityHelper):
|
||||
self.assertEqual(m.command, "AUTHENTICATE", m)
|
||||
self.assertEqual(m.params, ["+"], m)
|
||||
|
||||
@pytest.mark.skipif(scram is None, reason="pyxmpp2-scram is not available")
|
||||
@cases.OptionalityHelper.skipUnlessHasMechanism("SCRAM-SHA-256")
|
||||
def testScramBadPassword(self):
|
||||
"""Test SCRAM-SHA-256 authentication with a bad password."""
|
||||
|
@ -136,7 +136,7 @@ def hash_password(password: Union[str, bytes]) -> str:
|
||||
class ErgoController(BaseServerController, DirectoryBasedController):
|
||||
software_name = "Ergo"
|
||||
_port_wait_interval = 0.01
|
||||
supported_sasl_mechanisms = {"PLAIN"}
|
||||
supported_sasl_mechanisms = {"PLAIN", "SCRAM-SHA-256"}
|
||||
supports_sts = True
|
||||
extban_mute_char = "m"
|
||||
|
||||
|
2
irctest/scram/__init__.py
Normal file
2
irctest/scram/__init__.py
Normal file
@ -0,0 +1,2 @@
|
||||
from .scram import *
|
||||
from .exceptions import *
|
9
irctest/scram/core.py
Normal file
9
irctest/scram/core.py
Normal file
@ -0,0 +1,9 @@
|
||||
import uuid
|
||||
|
||||
def default_nonce_factory():
|
||||
"""Generate a random string for digest authentication challenges.
|
||||
The string should be cryptographicaly secure random pattern.
|
||||
:return: the string generated.
|
||||
:returntype: `bytes`
|
||||
"""
|
||||
return uuid.uuid4().hex.encode("us-ascii")
|
17
irctest/scram/exceptions.py
Normal file
17
irctest/scram/exceptions.py
Normal file
@ -0,0 +1,17 @@
|
||||
class ScramException(Exception):
|
||||
pass
|
||||
|
||||
class BadChallengeException(ScramException):
|
||||
pass
|
||||
|
||||
class ExtraChallengeException(ScramException):
|
||||
pass
|
||||
|
||||
class ServerScramError(ScramException):
|
||||
pass
|
||||
|
||||
class BadSuccessException(ScramException):
|
||||
pass
|
||||
|
||||
class NotAuthorizedException(ScramException):
|
||||
pass
|
561
irctest/scram/scram.py
Normal file
561
irctest/scram/scram.py
Normal file
@ -0,0 +1,561 @@
|
||||
#
|
||||
# (C) Copyright 2011 Jacek Konieczny <jajcus@jajcus.net>
|
||||
#
|
||||
# This program is free software; you can redistribute it and/or modify
|
||||
# it under the terms of the GNU Lesser General Public License Version
|
||||
# 2.1 as published by the Free Software Foundation.
|
||||
#
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU Lesser General Public License for more details.
|
||||
#
|
||||
# You should have received a copy of the GNU Lesser General Public
|
||||
# License along with this program; if not, write to the Free Software
|
||||
# Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
#
|
||||
"""SCRAM authentication mechanisms for PyXMPP SASL implementation.
|
||||
|
||||
Normative reference:
|
||||
- :RFC:`5802`
|
||||
"""
|
||||
|
||||
from __future__ import absolute_import, division, unicode_literals
|
||||
|
||||
__docformat__ = "restructuredtext en"
|
||||
|
||||
import sys
|
||||
import re
|
||||
import logging
|
||||
import hashlib
|
||||
import hmac
|
||||
|
||||
from binascii import a2b_base64
|
||||
from base64 import standard_b64encode
|
||||
|
||||
from .core import default_nonce_factory
|
||||
from .exceptions import BadChallengeException, \
|
||||
ExtraChallengeException, ServerScramError, BadSuccessException, \
|
||||
NotAuthorizedException
|
||||
|
||||
|
||||
logger = logging.getLogger("pyxmpp2_scram")
|
||||
|
||||
HASH_FACTORIES = {
|
||||
"SHA-1": hashlib.sha1, # pylint: disable=E1101
|
||||
"SHA-224": hashlib.sha224, # pylint: disable=E1101
|
||||
"SHA-256": hashlib.sha256, # pylint: disable=E1101
|
||||
"SHA-384": hashlib.sha384, # pylint: disable=E1101
|
||||
"SHA-512": hashlib.sha512, # pylint: disable=E1101
|
||||
"MD-5": hashlib.md5, # pylint: disable=E1101
|
||||
}
|
||||
|
||||
VALUE_CHARS_RE = re.compile(br"^[\x21-\x2B\x2D-\x7E]+$")
|
||||
_QUOTED_VALUE_RE = br"(?:[\x21-\x2B\x2D-\x7E]|=2C|=3D)+"
|
||||
|
||||
CLIENT_FIRST_MESSAGE_RE = re.compile(
|
||||
br"^(?P<gs2_header>(?:y|n|p=(?P<cb_name>[a-zA-z0-9.-]+)),"
|
||||
br"(?:a=(?P<authzid>" + _QUOTED_VALUE_RE + br"))?,)"
|
||||
br"(?P<client_first_bare>(?P<mext>m=[^\000=]+,)?"
|
||||
br"n=(?P<username>" + _QUOTED_VALUE_RE + br"),"
|
||||
br"r=(?P<nonce>[\x21-\x2B\x2D-\x7E]+)"
|
||||
br"(?:,.*)?)$"
|
||||
)
|
||||
|
||||
SERVER_FIRST_MESSAGE_RE = re.compile(
|
||||
br"^(?P<mext>m=[^\000=]+,)?"
|
||||
br"r=(?P<nonce>[\x21-\x2B\x2D-\x7E]+),"
|
||||
br"s=(?P<salt>[a-zA-Z0-9/+=]+),"
|
||||
br"i=(?P<iteration_count>\d+)"
|
||||
br"(?:,.*)?$"
|
||||
)
|
||||
|
||||
CLIENT_FINAL_MESSAGE_RE = re.compile(
|
||||
br"(?P<without_proof>c=(?P<cb>[a-zA-Z0-9/+=]+),"
|
||||
br"(?:r=(?P<nonce>[\x21-\x2B\x2D-\x7E]+))"
|
||||
br"(?:,.*)?)"
|
||||
br",p=(?P<proof>[a-zA-Z0-9/+=]+)$"
|
||||
)
|
||||
|
||||
SERVER_FINAL_MESSAGE_RE = re.compile(
|
||||
br"^(?:e=(?P<error>[^,]+)|v=(?P<verifier>[a-zA-Z0-9/+=]+)(?:,.*)?)$")
|
||||
|
||||
class SCRAMOperations(object):
|
||||
"""Functions used during SCRAM authentication and defined in the RFC.
|
||||
|
||||
"""
|
||||
def __init__(self, hash_function_name):
|
||||
self.hash_function_name = hash_function_name
|
||||
self.hash_factory = HASH_FACTORIES[hash_function_name]
|
||||
self.digest_size = self.hash_factory().digest_size
|
||||
|
||||
@staticmethod
|
||||
def Normalize(str_):
|
||||
"""The Normalize(str) function.
|
||||
|
||||
This one also accepts Unicode string input (in the RFC only UTF-8
|
||||
strings are used).
|
||||
"""
|
||||
# pylint: disable=C0103
|
||||
if isinstance(str_, bytes):
|
||||
str_ = str_.decode("utf-8")
|
||||
return str_.encode("utf-8")
|
||||
|
||||
def HMAC(self, key, str_):
|
||||
"""The HMAC(key, str) function."""
|
||||
# pylint: disable=C0103
|
||||
return hmac.new(key, str_, self.hash_factory).digest()
|
||||
|
||||
def H(self, str_):
|
||||
"""The H(str) function."""
|
||||
# pylint: disable=C0103
|
||||
return self.hash_factory(str_).digest()
|
||||
|
||||
if sys.version_info.major >= 3:
|
||||
@staticmethod
|
||||
# pylint: disable=C0103
|
||||
def XOR(str1, str2):
|
||||
"""The XOR operator for two byte strings."""
|
||||
return bytes(a ^ b for a, b in zip(str1, str2))
|
||||
else:
|
||||
@staticmethod
|
||||
# pylint: disable=C0103
|
||||
def XOR(str1, str2):
|
||||
"""The XOR operator for two byte strings."""
|
||||
return "".join(chr(ord(a) ^ ord(b)) for a, b in zip(str1, str2))
|
||||
|
||||
def Hi(self, str_, salt, i):
|
||||
"""The Hi(str, salt, i) function."""
|
||||
# pylint: disable=C0103
|
||||
Uj = self.HMAC(str_, salt + b"\000\000\000\001") # U1
|
||||
result = Uj
|
||||
for _ in range(2, i + 1):
|
||||
Uj = self.HMAC(str_, Uj) # Uj = HMAC(str, Uj-1)
|
||||
result = self.XOR(result, Uj) # ... XOR Uj-1 XOR Uj
|
||||
return result
|
||||
|
||||
@staticmethod
|
||||
def escape(data):
|
||||
"""Escape the ',' and '=' characters for 'a=' and 'n=' attributes.
|
||||
|
||||
Replaces '=' with '=3D' and ',' with '=2C'.
|
||||
|
||||
:Parameters:
|
||||
- `data`: string to escape
|
||||
:Types:
|
||||
- `data`: `bytes`
|
||||
"""
|
||||
return data.replace(b'=', b'=3D').replace(b',', b'=2C')
|
||||
|
||||
@staticmethod
|
||||
def unescape(data):
|
||||
"""Unescape the ',' and '=' characters for 'a=' and 'n=' attributes.
|
||||
|
||||
Reverse of `escape`.
|
||||
|
||||
:Parameters:
|
||||
- `data`: string to unescape
|
||||
:Types:
|
||||
- `data`: `bytes`
|
||||
"""
|
||||
return data.replace(b'=2C', b',').replace(b'=3D', b'=')
|
||||
|
||||
class SCRAMClientAuthenticator(SCRAMOperations):
|
||||
"""Provides SCRAM SASL authentication for a client.
|
||||
|
||||
:Ivariables:
|
||||
- `password`: current authentication password
|
||||
- `pformat`: current authentication password format
|
||||
- `realm`: current authentication realm
|
||||
"""
|
||||
# pylint: disable-msg=R0902
|
||||
def __init__(self, hash_name, channel_binding):
|
||||
"""Initialize a `SCRAMClientAuthenticator` object.
|
||||
|
||||
:Parameters:
|
||||
- `hash_function_name`: hash function name, e.g. ``"SHA-1"``
|
||||
- `channel_binding`: `True` to enable channel binding
|
||||
:Types:
|
||||
- `hash_function_name`: `unicode`
|
||||
- `channel_binding`: `bool`
|
||||
"""
|
||||
SCRAMOperations.__init__(self, hash_name)
|
||||
self.name = "SCRAM-{0}".format(hash_name)
|
||||
if channel_binding:
|
||||
self.name += "-PLUS"
|
||||
self.channel_binding = channel_binding
|
||||
self.username = None
|
||||
self.password = None
|
||||
self.authzid = None
|
||||
self._c_nonce = None
|
||||
self._server_first_message = False
|
||||
self._client_first_message_bare = False
|
||||
self._gs2_header = None
|
||||
self._finished = False
|
||||
self._auth_message = None
|
||||
self._salted_password = None
|
||||
self._cb_data = None
|
||||
|
||||
@classmethod
|
||||
def are_properties_sufficient(cls, properties):
|
||||
return "username" in properties and "password" in properties
|
||||
|
||||
def start(self, properties):
|
||||
self.username = properties["username"]
|
||||
self.password = properties["password"]
|
||||
self.authzid = properties.get("authzid", "")
|
||||
c_nonce = properties.get("nonce_factory", default_nonce_factory)()
|
||||
if not VALUE_CHARS_RE.match(c_nonce):
|
||||
c_nonce = standard_b64encode(c_nonce)
|
||||
self._c_nonce = c_nonce
|
||||
|
||||
if self.channel_binding:
|
||||
cb_data = properties.get("channel-binding")
|
||||
if not cb_data:
|
||||
raise ValueError("No channel binding data provided")
|
||||
if "tls-unique" in cb_data:
|
||||
cb_type = "tls-unique"
|
||||
elif "tls-server-end-point" in cb_data:
|
||||
cb_type = "tls-server-end-point"
|
||||
elif cb_data:
|
||||
cb_type = cb_data.keys()[0]
|
||||
self._cb_data = cb_data[cb_type]
|
||||
cb_flag = b"p=" + cb_type.encode("utf-8")
|
||||
else:
|
||||
plus_name = self.name + "-PLUS"
|
||||
if plus_name in properties.get("enabled_mechanisms", []):
|
||||
# -PLUS is enabled (supported) on our side,
|
||||
# but was not selected - that means it was not included
|
||||
# in the server features
|
||||
cb_flag = b"y"
|
||||
else:
|
||||
cb_flag = b"n"
|
||||
|
||||
if self.authzid:
|
||||
authzid = b"a=" + self.escape(self.authzid.encode("utf-8"))
|
||||
else:
|
||||
authzid = b""
|
||||
gs2_header = cb_flag + b"," + authzid + b","
|
||||
self._gs2_header = gs2_header
|
||||
nonce = b"r=" + c_nonce
|
||||
client_first_message_bare = (b"n=" +
|
||||
self.escape(self.username.encode("utf-8")) + b"," + nonce)
|
||||
self._client_first_message_bare = client_first_message_bare
|
||||
client_first_message = gs2_header + client_first_message_bare
|
||||
return client_first_message
|
||||
|
||||
def challenge(self, challenge):
|
||||
"""Process a challenge and return the response.
|
||||
|
||||
:Parameters:
|
||||
- `challenge`: the challenge from server.
|
||||
:Types:
|
||||
- `challenge`: `bytes`
|
||||
|
||||
:return: the response
|
||||
:returntype: bytes
|
||||
:raises: `BadChallengeException`
|
||||
"""
|
||||
# pylint: disable=R0911
|
||||
if not challenge:
|
||||
raise BadChallengeException('Empty challenge')
|
||||
|
||||
if self._server_first_message:
|
||||
return self._final_challenge(challenge)
|
||||
|
||||
match = SERVER_FIRST_MESSAGE_RE.match(challenge)
|
||||
if not match:
|
||||
raise BadChallengeException("Bad challenge syntax: {0!r}".format(challenge))
|
||||
|
||||
self._server_first_message = challenge
|
||||
|
||||
mext = match.group("mext")
|
||||
if mext:
|
||||
raise BadChallengeException("Unsupported extension received: {0!r}".format(mext))
|
||||
|
||||
nonce = match.group("nonce")
|
||||
if not nonce.startswith(self._c_nonce):
|
||||
raise BadChallengeException("Nonce does not start with our nonce")
|
||||
|
||||
salt = match.group("salt")
|
||||
try:
|
||||
salt = a2b_base64(salt)
|
||||
except ValueError:
|
||||
raise BadChallengeException("Bad base64 encoding for salt: {0!r}".format(salt))
|
||||
|
||||
iteration_count = match.group("iteration_count")
|
||||
try:
|
||||
iteration_count = int(iteration_count)
|
||||
except ValueError:
|
||||
raise BadChallengeException("Bad iteration_count: {0!r}".format(iteration_count))
|
||||
|
||||
return self._make_response(nonce, salt, iteration_count)
|
||||
|
||||
def _make_response(self, nonce, salt, iteration_count):
|
||||
"""Make a response for the first challenge from the server.
|
||||
|
||||
:return: the response
|
||||
:returntype: bytes
|
||||
"""
|
||||
self._salted_password = self.Hi(self.Normalize(self.password), salt,
|
||||
iteration_count)
|
||||
self.password = None # not needed any more
|
||||
if self.channel_binding:
|
||||
channel_binding = b"c=" + standard_b64encode(self._gs2_header +
|
||||
self._cb_data)
|
||||
else:
|
||||
channel_binding = b"c=" + standard_b64encode(self._gs2_header)
|
||||
|
||||
# pylint: disable=C0103
|
||||
client_final_message_without_proof = (channel_binding + b",r=" + nonce)
|
||||
|
||||
client_key = self.HMAC(self._salted_password, b"Client Key")
|
||||
stored_key = self.H(client_key)
|
||||
auth_message = ( self._client_first_message_bare + b"," +
|
||||
self._server_first_message + b"," +
|
||||
client_final_message_without_proof )
|
||||
self._auth_message = auth_message
|
||||
client_signature = self.HMAC(stored_key, auth_message)
|
||||
client_proof = self.XOR(client_key, client_signature)
|
||||
proof = b"p=" + standard_b64encode(client_proof)
|
||||
client_final_message = (client_final_message_without_proof + b"," +
|
||||
proof)
|
||||
return client_final_message
|
||||
|
||||
def _final_challenge(self, challenge):
|
||||
"""Process the second challenge from the server and return the
|
||||
response.
|
||||
|
||||
:Parameters:
|
||||
- `challenge`: the challenge from server.
|
||||
:Types:
|
||||
- `challenge`: `bytes`
|
||||
|
||||
:raises: `ExtraChallengeException`, `BadChallengeException`, `ServerScramError`, or `BadSuccessException`
|
||||
"""
|
||||
if self._finished:
|
||||
return ExtraChallengeException()
|
||||
|
||||
match = SERVER_FINAL_MESSAGE_RE.match(challenge)
|
||||
if not match:
|
||||
raise BadChallengeException("Bad final message syntax: {0!r}".format(challenge))
|
||||
|
||||
error = match.group("error")
|
||||
if error:
|
||||
raise ServerScramError("{0!r}".format(error))
|
||||
|
||||
verifier = match.group("verifier")
|
||||
if not verifier:
|
||||
raise BadSuccessException("No verifier value in the final message")
|
||||
|
||||
server_key = self.HMAC(self._salted_password, b"Server Key")
|
||||
server_signature = self.HMAC(server_key, self._auth_message)
|
||||
if server_signature != a2b_base64(verifier):
|
||||
raise BadSuccessException("Server verifier does not match")
|
||||
|
||||
self._finished = True
|
||||
|
||||
def finish(self, data):
|
||||
"""Process success indicator from the server.
|
||||
|
||||
Process any addiitional data passed with the success.
|
||||
Fail if the server was not authenticated.
|
||||
|
||||
:Parameters:
|
||||
- `data`: an optional additional data with success.
|
||||
:Types:
|
||||
- `data`: `bytes`
|
||||
|
||||
:return: username and authzid
|
||||
:returntype: `dict`
|
||||
:raises: `BadSuccessException`"""
|
||||
if not self._server_first_message:
|
||||
raise BadSuccessException("Got success too early")
|
||||
if self._finished:
|
||||
return {"username": self.username, "authzid": self.authzid}
|
||||
else:
|
||||
self._final_challenge(data)
|
||||
if self._finished:
|
||||
return {"username": self.username,
|
||||
"authzid": self.authzid}
|
||||
else:
|
||||
raise BadSuccessException("Something went wrong when processing additional"
|
||||
" data with success?")
|
||||
|
||||
class SCRAMServerAuthenticator(SCRAMOperations):
|
||||
"""Provides SCRAM SASL authentication for a server.
|
||||
"""
|
||||
def __init__(self, hash_name, channel_binding, password_database):
|
||||
"""Initialize a `SCRAMClientAuthenticator` object.
|
||||
|
||||
:Parameters:
|
||||
- `hash_function_name`: hash function name, e.g. ``"SHA-1"``
|
||||
- `channel_binding`: `True` to enable channel binding
|
||||
:Types:
|
||||
- `hash_function_name`: `unicode`
|
||||
- `channel_binding`: `bool`
|
||||
"""
|
||||
SCRAMOperations.__init__(self, hash_name)
|
||||
self.name = "SCRAM-{0}".format(hash_name)
|
||||
if channel_binding:
|
||||
self.name += "-PLUS"
|
||||
self.channel_binding = channel_binding
|
||||
self.properties = None
|
||||
self.out_properties = None
|
||||
self.password_database = password_database
|
||||
self._client_first_message_bare = None
|
||||
self._stored_key = None
|
||||
self._server_key = None
|
||||
|
||||
def start(self, properties, initial_response):
|
||||
self.properties = properties
|
||||
self._client_first_message_bare = None
|
||||
self.out_properties = {}
|
||||
if not initial_response:
|
||||
return b""
|
||||
return self.response(initial_response)
|
||||
|
||||
def response(self, response):
|
||||
if self._client_first_message_bare:
|
||||
logger.debug("Client final message: {0!r}".format(response))
|
||||
return self._handle_final_response(response)
|
||||
else:
|
||||
logger.debug("Client first message: {0!r}".format(response))
|
||||
return self._handle_first_response(response)
|
||||
|
||||
def _handle_first_response(self, response):
|
||||
match = CLIENT_FIRST_MESSAGE_RE.match(response)
|
||||
if not match:
|
||||
raise NotAuthorizedException("Bad response syntax: {0!r}".format(response))
|
||||
|
||||
mext = match.group("mext")
|
||||
if mext:
|
||||
raise NotAuthorizedException("Unsupported extension received: {0!r}".format(mext))
|
||||
|
||||
gs2_header = match.group("gs2_header")
|
||||
cb_name = match.group("cb_name")
|
||||
if self.channel_binding:
|
||||
if not cb_name:
|
||||
raise NotAuthorizedException("{0!r} used with no channel-binding"
|
||||
.format(self.name))
|
||||
cb_name = cb_name.decode("utf-8")
|
||||
if cb_name not in self.properties["channel-binding"]:
|
||||
raise NotAuthorizedException("Channel binding data type {0!r} not available"
|
||||
.format(cb_name))
|
||||
else:
|
||||
if gs2_header.startswith(b'y'):
|
||||
plus_name = self.name + "-PLUS"
|
||||
if plus_name in self.properties.get("enabled_mechanisms", []):
|
||||
raise NotAuthorizedException("Channel binding downgrade attack detected")
|
||||
elif gs2_header.startswith(b'p'):
|
||||
# is this really an error?
|
||||
raise NotAuthorizedException("Channel binding requested for {0!r}"
|
||||
.format(self.name))
|
||||
|
||||
authzid = match.group("authzid")
|
||||
if authzid:
|
||||
self.out_properties['authzid'] = self.unescape(authzid
|
||||
).decode("utf-8")
|
||||
else:
|
||||
self.out_properties['authzid'] = None
|
||||
username = self.unescape(match.group("username")).decode("utf-8")
|
||||
self.out_properties['username'] = username
|
||||
|
||||
nonce_factory = self.properties.get("nonce_factory",
|
||||
default_nonce_factory)
|
||||
|
||||
properties = dict(self.properties)
|
||||
properties.update(self.out_properties)
|
||||
|
||||
s_pformat = "SCRAM-{0}-SaltedPassword".format(self.hash_function_name)
|
||||
k_pformat = "SCRAM-{0}-Keys".format(self.hash_function_name)
|
||||
password, pformat = self.password_database.get_password(username,
|
||||
(s_pformat, "plain"), properties)
|
||||
if pformat == s_pformat:
|
||||
if password is not None:
|
||||
salt, iteration_count, salted_password = password
|
||||
else:
|
||||
logger.debug("No password for user {0!r}".format(username))
|
||||
elif pformat != k_pformat:
|
||||
salt = self.properties.get("SCRAM-salt")
|
||||
if not salt:
|
||||
salt = nonce_factory()
|
||||
iteration_count = self.properties.get("SCRAM-iteration-count", 4096)
|
||||
if pformat == "plain" and password is not None:
|
||||
salted_password = self.Hi(self.Normalize(password), salt,
|
||||
iteration_count)
|
||||
else:
|
||||
logger.debug("No password for user {0!r}".format(username))
|
||||
password = None
|
||||
# to prevent timing attack, compute the key anyway
|
||||
salted_password = self.Hi(self.Normalize(""), salt,
|
||||
iteration_count)
|
||||
if pformat == k_pformat:
|
||||
salt, iteration_count, stored_key, server_key = password
|
||||
else:
|
||||
client_key = self.HMAC(salted_password, b"Client Key")
|
||||
stored_key = self.H(client_key)
|
||||
server_key = self.HMAC(salted_password, b"Server Key")
|
||||
|
||||
if password is not None:
|
||||
self._stored_key = stored_key
|
||||
self._server_key = server_key
|
||||
else:
|
||||
self._stored_key = None
|
||||
self._server_key = None
|
||||
|
||||
c_nonce = match.group("nonce")
|
||||
s_nonce = nonce_factory()
|
||||
if not VALUE_CHARS_RE.match(s_nonce):
|
||||
s_nonce = standard_b64encode(s_nonce)
|
||||
nonce = c_nonce + s_nonce
|
||||
server_first_message = (
|
||||
b"r=" + nonce
|
||||
+ b",s=" + standard_b64encode(salt)
|
||||
+ b",i=" + str(iteration_count).encode("utf-8")
|
||||
)
|
||||
self._nonce = nonce
|
||||
self._cb_name = cb_name
|
||||
self._gs2_header = gs2_header
|
||||
self._client_first_message_bare = match.group("client_first_bare")
|
||||
self._server_first_message = server_first_message
|
||||
return server_first_message
|
||||
|
||||
def _handle_final_response(self, response):
|
||||
match = CLIENT_FINAL_MESSAGE_RE.match(response)
|
||||
if not match:
|
||||
raise NotAuthorizedException("Bad response syntax: {0!r}".format(response))
|
||||
if match.group("nonce") != self._nonce:
|
||||
raise NotAuthorizedException("Bad nonce in the final client response")
|
||||
cb_input = a2b_base64(match.group("cb"))
|
||||
if not cb_input.startswith(self._gs2_header):
|
||||
raise NotAuthorizedException("GS2 header in the final response ({0!r}) doesn't"
|
||||
" match the one sent in the first message ({1!r})"
|
||||
.format(cb_input, self._gs2_header))
|
||||
if self._cb_name:
|
||||
cb_data = cb_input[len(self._gs2_header):]
|
||||
if cb_data != self.properties["channel-binding"][self._cb_name]:
|
||||
raise NotAuthorizedException("Channel binding data doesn't match")
|
||||
|
||||
proof = a2b_base64(match.group("proof"))
|
||||
|
||||
auth_message = (self._client_first_message_bare + b"," +
|
||||
self._server_first_message + b"," +
|
||||
match.group("without_proof"))
|
||||
if self._stored_key is None:
|
||||
# compute something to prevent timing attack
|
||||
client_signature = self.HMAC(b"", auth_message)
|
||||
client_key = self.XOR(client_signature, proof)
|
||||
self.H(client_key)
|
||||
raise NotAuthorizedException("Authentication failed (bad username)")
|
||||
|
||||
client_signature = self.HMAC(self._stored_key, auth_message)
|
||||
client_key = self.XOR(client_signature, proof)
|
||||
if self.H(client_key) != self._stored_key:
|
||||
raise NotAuthorizedException("Authentication failed")
|
||||
|
||||
server_signature = self.HMAC(self._server_key, auth_message)
|
||||
server_final_message = b"v=" + standard_b64encode(server_signature)
|
||||
return (self.out_properties, server_final_message)
|
||||
|
||||
|
@ -1,6 +1,7 @@
|
||||
import base64
|
||||
|
||||
from irctest import cases, runner
|
||||
from irctest import cases, runner, scram
|
||||
from irctest.numerics import ERR_SASLFAIL
|
||||
from irctest.patma import ANYSTR
|
||||
|
||||
|
||||
@ -274,3 +275,110 @@ class SaslTestCase(cases.BaseServerTestCase, cases.OptionalityHelper):
|
||||
# TODO: add a test for when the length of the authstring is 800.
|
||||
# I don't know how to do it, because it would make the registration
|
||||
# message's length too big for it to be valid.
|
||||
|
||||
@cases.mark_specifications("IRCv3")
|
||||
@cases.OptionalityHelper.skipUnlessHasMechanism("SCRAM-SHA-256")
|
||||
def testScramSha256Success(self):
|
||||
self.controller.registerUser(self, "Scramtest", "sesame")
|
||||
|
||||
self.addClient()
|
||||
self.sendLine(1, "CAP LS 302")
|
||||
capabilities = self.getCapLs(1)
|
||||
self.assertIn(
|
||||
"sasl",
|
||||
capabilities,
|
||||
fail_msg="Does not have SASL as the controller claims.",
|
||||
)
|
||||
if capabilities["sasl"] is not None:
|
||||
self.assertIn(
|
||||
"SCRAM-SHA-256",
|
||||
capabilities["sasl"],
|
||||
fail_msg="Does not have SCRAM-SHA-256 mechanism as the "
|
||||
"controller claims",
|
||||
)
|
||||
self.requestCapabilities(1, ["sasl"], skip_if_cap_nak=False)
|
||||
|
||||
self.sendLine(1, "AUTHENTICATE SCRAM-SHA-256")
|
||||
m = self.getRegistrationMessage(1)
|
||||
self.assertMessageMatch(
|
||||
m,
|
||||
command="AUTHENTICATE",
|
||||
params=["+"],
|
||||
fail_msg="Sent “AUTHENTICATE SCRAM-SHA-256”, expected "
|
||||
"“AUTHENTICATE +” as a response, but got: {msg}",
|
||||
)
|
||||
|
||||
authenticator = scram.SCRAMClientAuthenticator("SHA-256", False)
|
||||
first_message = authenticator.start(
|
||||
{
|
||||
"username": "Scramtest",
|
||||
"password": "sesame",
|
||||
}
|
||||
)
|
||||
self.sendLine(
|
||||
1, "AUTHENTICATE " + base64.b64encode(first_message).decode("ascii")
|
||||
)
|
||||
m = self.getRegistrationMessage(1)
|
||||
self.assertMessageMatch(m, command="AUTHENTICATE")
|
||||
second_message = authenticator.challenge(base64.b64decode(m.params[0]))
|
||||
self.sendLine(
|
||||
1, "AUTHENTICATE " + base64.b64encode(second_message).decode("ascii")
|
||||
)
|
||||
m = self.getRegistrationMessage(1)
|
||||
self.assertMessageMatch(m, command="AUTHENTICATE")
|
||||
# test the server's attempt to authenticate to us:
|
||||
result = authenticator.finish(base64.b64decode(m.params[0]))
|
||||
self.assertEqual(result["username"], "Scramtest")
|
||||
self.sendLine(1, "AUTHENTICATE +")
|
||||
self.confirmSuccessfulAuth()
|
||||
|
||||
@cases.mark_specifications("IRCv3")
|
||||
@cases.OptionalityHelper.skipUnlessHasMechanism("SCRAM-SHA-256")
|
||||
def testScramSha256Failure(self):
|
||||
self.controller.registerUser(self, "Scramtest", "sesame")
|
||||
|
||||
self.addClient()
|
||||
self.sendLine(1, "CAP LS 302")
|
||||
capabilities = self.getCapLs(1)
|
||||
self.assertIn(
|
||||
"sasl",
|
||||
capabilities,
|
||||
fail_msg="Does not have SASL as the controller claims.",
|
||||
)
|
||||
if capabilities["sasl"] is not None:
|
||||
self.assertIn(
|
||||
"SCRAM-SHA-256",
|
||||
capabilities["sasl"],
|
||||
fail_msg="Does not have SCRAM-SHA-256 mechanism as the "
|
||||
"controller claims",
|
||||
)
|
||||
self.requestCapabilities(1, ["sasl"], skip_if_cap_nak=False)
|
||||
|
||||
self.sendLine(1, "AUTHENTICATE SCRAM-SHA-256")
|
||||
m = self.getRegistrationMessage(1)
|
||||
self.assertMessageMatch(
|
||||
m,
|
||||
command="AUTHENTICATE",
|
||||
params=["+"],
|
||||
fail_msg="Sent “AUTHENTICATE SCRAM-SHA-256”, expected "
|
||||
"“AUTHENTICATE +” as a response, but got: {msg}",
|
||||
)
|
||||
|
||||
authenticator = scram.SCRAMClientAuthenticator("SHA-256", False)
|
||||
first_message = authenticator.start(
|
||||
{
|
||||
"username": "Scramtest",
|
||||
"password": "millet",
|
||||
}
|
||||
)
|
||||
self.sendLine(
|
||||
1, "AUTHENTICATE " + base64.b64encode(first_message).decode("ascii")
|
||||
)
|
||||
m = self.getRegistrationMessage(1)
|
||||
self.assertMessageMatch(m, command="AUTHENTICATE")
|
||||
second_message = authenticator.challenge(base64.b64decode(m.params[0]))
|
||||
self.sendLine(
|
||||
1, "AUTHENTICATE " + base64.b64encode(second_message).decode("ascii")
|
||||
)
|
||||
m = self.getRegistrationMessage(1)
|
||||
self.assertMessageMatch(m, command=ERR_SASLFAIL)
|
||||
|
4
mypy.ini
4
mypy.ini
@ -18,5 +18,5 @@ ignore_missing_imports = True
|
||||
[mypy-ecdsa.util]
|
||||
ignore_missing_imports = True
|
||||
|
||||
[mypy-pyxmpp2_scram]
|
||||
ignore_missing_imports = True
|
||||
[mypy-irctest.scram.*]
|
||||
disallow_untyped_defs = False
|
||||
|
@ -1,4 +1,3 @@
|
||||
# The following dependencies are actually optional:
|
||||
pyxmpp2-scram
|
||||
ecdsa
|
||||
pytest
|
||||
|
@ -163,13 +163,13 @@ software:
|
||||
install_steps:
|
||||
stable:
|
||||
- name: Install dependencies
|
||||
run: pip install limnoria==2021.06.15 cryptography
|
||||
run: pip install limnoria==2021.06.15 cryptography pyxmpp2-scram
|
||||
release:
|
||||
- name: Install dependencies
|
||||
run: pip install limnoria cryptography
|
||||
run: pip install limnoria cryptography pyxmpp2-scram
|
||||
devel:
|
||||
- name: Install dependencies
|
||||
run: pip install git+https://github.com/ProgVal/Limnoria.git@testing cryptography
|
||||
run: pip install git+https://github.com/ProgVal/Limnoria.git@testing cryptography pyxmpp2-scram
|
||||
devel_release: null
|
||||
|
||||
sopel:
|
||||
|
Reference in New Issue
Block a user