3
|
1 local usermanager = require "core.usermanager" |
|
2 local httpserver = require "net.httpserver" |
|
3 local jidutil = require "util.jid" |
|
4 local hmac = require "hmac" |
|
5 |
|
6 local base64 = require "util.encodings".base64 |
|
7 |
|
8 local humane = require "util.serialization".serialize |
|
9 |
|
10 -- Configuration |
|
11 local base = "openid" |
|
12 local openidns = "http://specs.openid.net/auth/2.0" -- [#4.1.2] |
|
13 local response_404 = { status = "404 Not Found", body = "<h1>Page Not Found</h1>Sorry, we couldn't find what you were looking for :(" }; |
|
14 |
|
15 local associations = {} |
|
16 |
|
17 local function genkey(length) |
|
18 -- FIXME not cryptographically secure |
|
19 str = {} |
|
20 |
|
21 for i = 1,length do |
|
22 local rand = math.random(33, 126) |
|
23 table.insert(str, string.char(rand)) |
|
24 end |
|
25 |
|
26 return table.concat(str) |
|
27 end |
|
28 |
|
29 local function tokvstring(dict) |
|
30 -- key-value encoding for a dictionary [#4.1.3] |
|
31 local str = "" |
|
32 |
|
33 for k,v in pairs(dict) do |
|
34 str = str..k..":"..v.."\n" |
|
35 end |
|
36 |
|
37 return str |
|
38 end |
|
39 |
|
40 local function newassoc(key, shared) |
|
41 -- TODO don't use genkey here |
|
42 local handle = genkey(16) |
|
43 associations[handle] = {} |
|
44 associations[handle]["key"] = key |
|
45 associations[handle]["shared"] = shared |
|
46 associations[handle]["time"] = os.time() |
|
47 return handle |
|
48 end |
|
49 |
|
50 local function split(str, sep) |
|
51 local splits = {} |
|
52 str:gsub("([^.."..sep.."]*)"..sep, function(c) table.insert(splits, c) end) |
|
53 return splits |
|
54 end |
|
55 |
|
56 local function sign(response, key) |
|
57 local fields = {} |
|
58 |
|
59 for _,field in pairs(split(response["openid.signed"],",")) do |
|
60 fields[field] = response["openid."..field] |
|
61 end |
|
62 |
|
63 -- [#10.1] |
|
64 return base64.encode(hmac.sha256(key, tokvstring(fields))) |
|
65 end |
|
66 |
|
67 local function urlencode(s) |
|
68 return (string.gsub(s, "%W", |
|
69 function(str) |
|
70 return string.format("%%%02X", string.byte(str)) |
|
71 end)) |
|
72 end |
|
73 |
|
74 local function urldecode(s) |
|
75 return(string.gsub(string.gsub(s, "+", " "), "%%(%x%x)", |
|
76 function(str) |
|
77 return string.char(tonumber(str,16)) |
|
78 end)) |
|
79 end |
|
80 |
|
81 local function utctime() |
|
82 local now = os.time() |
|
83 local diff = os.difftime(now, os.time(os.date("!*t", now))) |
|
84 return now-diff |
|
85 end |
|
86 |
|
87 local function nonce() |
|
88 -- generate a response nonce [#10.1] |
|
89 local random = "" |
|
90 for i=0,10 do |
|
91 random = random..string.char(math.random(33,126)) |
|
92 end |
|
93 |
|
94 local timestamp = os.date("%Y-%m-%dT%H:%M:%SZ", utctime()) |
|
95 |
|
96 return timestamp..random |
|
97 end |
|
98 |
|
99 local function query_params(query) |
|
100 if type(query) == "string" and #query > 0 then |
|
101 if query:match("=") then |
|
102 local params = {} |
|
103 for k, v in query:gmatch("&?([^=%?]+)=([^&%?]+)&?") do |
|
104 if k and v then |
|
105 params[urldecode(k)] = urldecode(v) |
|
106 end |
|
107 end |
|
108 return params |
|
109 else |
|
110 return urldecode(query) |
|
111 end |
|
112 end |
|
113 end |
|
114 |
|
115 local function split_host_port(combined) |
|
116 local host = combined |
|
117 local port = "" |
|
118 local cpos = string.find(combined, ":") |
|
119 if cpos ~= nil then |
|
120 host = string.sub(combined, 0, cpos-1) |
|
121 port = string.sub(combined, cpos+1) |
|
122 end |
|
123 |
|
124 return host, port |
|
125 end |
|
126 |
|
127 local function toquerystring(dict) |
|
128 -- query string encoding for a dictionary [#4.1.3] |
|
129 local str = "" |
|
130 |
|
131 for k,v in pairs(dict) do |
|
132 str = str..urlencode(k).."="..urlencode(v).."&" |
|
133 end |
|
134 |
|
135 return string.sub(str, 0, -1) |
|
136 end |
|
137 |
|
138 local function match_realm(url, realm) |
|
139 -- FIXME do actual match [#9.2] |
|
140 return true |
|
141 end |
|
142 |
|
143 local function handle_endpoint(method, body, request) |
|
144 module:log("debug", "Request at OpenID provider endpoint") |
|
145 |
|
146 local params = nil |
|
147 |
|
148 if method == "GET" then |
|
149 params = query_params(request.url.query) |
|
150 elseif method == "POST" then |
|
151 params = query_params(body) |
|
152 else |
|
153 -- TODO error |
|
154 return response_404 |
|
155 end |
|
156 |
|
157 module:log("debug", "Request Parameters:\n"..humane(params)) |
|
158 |
|
159 if params["openid.ns"] == openidns then |
|
160 -- OpenID 2.0 request [#5.1.1] |
|
161 if params["openid.mode"] == "associate" then |
|
162 -- Associate mode [#8] |
|
163 -- TODO implement association |
|
164 |
|
165 -- Error response [#8.2.4] |
|
166 local openidresponse = { |
|
167 ["ns"] = openidns, |
|
168 ["session_type"] = params["openid.session_type"], |
|
169 ["assoc_type"] = params["openid.assoc_type"], |
|
170 ["error"] = "Association not supported... yet", |
|
171 ["error_code"] = "unsupported-type", |
|
172 } |
|
173 |
|
174 local kvresponse = tokvstring(openidresponse) |
|
175 module:log("debug", "OpenID Response:\n"..kvresponse) |
|
176 return { |
|
177 headers = { |
|
178 ["Content-Type"] = "text/plain" |
|
179 }, |
|
180 body = kvresponse |
|
181 } |
|
182 elseif params["openid.mode"] == "checkid_setup" or params["openid.mode"] == "checkid_immediate" then |
|
183 -- Requesting authentication [#9] |
|
184 if not params["openid.realm"] then |
|
185 -- set realm to default value of return_to [#9.1] |
|
186 if params["openid.return_to"] then |
|
187 params["openid.realm"] = params["openid.return_to"] |
|
188 else |
|
189 -- neither was sent, error [#9.1] |
|
190 -- FIXME return proper error |
|
191 return response_404 |
|
192 end |
|
193 end |
|
194 |
|
195 if params["openid.return_to"] then |
|
196 -- Assure that the return_to url matches the realm [#9.2] |
|
197 if not match_realm(params["openid.return_to"], params["openid.realm"]) then |
|
198 -- FIXME return proper error |
|
199 return response_404 |
|
200 end |
|
201 |
|
202 -- Verify the return url [#9.2.1] |
|
203 -- TODO implement return url verification |
|
204 end |
|
205 |
|
206 if params["openid.claimed_id"] and params["openid.identity"] then |
|
207 -- asserting an identifier [#9.1] |
|
208 |
|
209 if params["openid.identity"] == "http://specs.openid.net/auth/2.0/identifier_select" then |
|
210 -- automatically select an identity [#9.1] |
|
211 params["openid.identity"] = params["openid.claimed_id"] |
|
212 end |
|
213 |
|
214 if params["openid.mode"] == "checkid_setup" then |
|
215 -- Check ID Setup mode |
|
216 -- TODO implement: NEXT STEP |
|
217 local head = "<title>Prosody OpenID : Login</title>" |
|
218 local body = string.format([[ |
|
219 <p>Open ID Authentication<p> |
|
220 <p>Identifier: <tt>%s</tt></p> |
|
221 <p>Realm: <tt>%s</tt></p> |
|
222 <p>Return: <tt>%s</tt></p> |
|
223 <form method="POST" action="%s"> |
|
224 Jabber ID: <input type="text" name="jid"/><br/> |
|
225 Password: <input type="password" name="password"/><br/> |
|
226 <input type="hidden" name="openid.return_to" value="%s"/> |
|
227 <input type="submit" value="Authenticate"/> |
|
228 </form> |
|
229 ]], params["openid.claimed_id"], params["openid.realm"], params["openid.return_to"], base, params["openid.return_to"]) |
|
230 |
|
231 return string.format([[ |
|
232 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" |
|
233 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> |
|
234 <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> |
|
235 <head> |
|
236 <meta http-equiv="Content-type" content="text/html;charset=UTF-8" /> |
|
237 %s |
|
238 </head> |
|
239 <body> |
|
240 %s |
|
241 </body> |
|
242 </html> |
|
243 ]], head, body) |
|
244 elseif params["openid.mode"] == "checkid_immediate" then |
|
245 -- Check ID Immediate mode [#9.3] |
|
246 -- TODO implement check id immediate |
|
247 end |
|
248 else |
|
249 -- not asserting an identifier [#9.1] |
|
250 -- used for extensions |
|
251 -- TODO implement common extensions |
|
252 end |
|
253 elseif params["openid.mode"] == "check_authentication" then |
|
254 module:log("debug", "OpenID Check Authentication Mode") |
|
255 local assoc = associations[params["openid.assoc_handle"]] |
|
256 module:log("debug", "Checking Association Handle: "..params["openid.assoc_handle"]) |
|
257 if assoc and not assoc["shared"] then |
|
258 module:log("debug", "Found valid association") |
|
259 local sig = sign(params, assoc["key"]) |
|
260 |
|
261 local is_valid = "false" |
|
262 if sig == params["openid.sig"] then |
|
263 is_valid = "true" |
|
264 end |
|
265 |
|
266 module:log("debug", "Signature is: "..is_valid) |
|
267 |
|
268 openidresponse = { |
|
269 ns = openidns, |
|
270 is_valid = is_valid, |
|
271 } |
|
272 |
|
273 -- Delete this association |
|
274 associations[params["openid.assoc_handle"]] = nil |
|
275 return { |
|
276 headers = { |
|
277 ["Content-Type"] = "text/plain" |
|
278 }, |
|
279 body = tokvstring(openidresponse), |
|
280 } |
|
281 else |
|
282 module:log("debug", "No valid association") |
|
283 -- TODO return error |
|
284 -- Invalidate the handle [#11.4.2.2] |
|
285 end |
|
286 else |
|
287 -- Some other mode |
|
288 -- TODO error |
|
289 end |
|
290 elseif params["password"] then |
|
291 -- User is authenticating |
|
292 local user, domain = jidutil.split(params["jid"]) |
|
293 module:log("debug", "Authenticating "..params["jid"].." ("..user..","..domain..") with password: "..params["password"]) |
|
294 local valid = usermanager.validate_credentials(domain, user, params["password"], "PLAIN") |
|
295 if valid then |
|
296 module:log("debug", "Authentication Succeeded: "..params["jid"]) |
|
297 if params["openid.return_to"] ~= "" then |
|
298 -- TODO redirect the user to return_to with the openid response |
|
299 -- included, need to handle the case if its a GET, that there are |
|
300 -- existing query parameters on the return_to URL [#10.1] |
|
301 local host, port = split_host_port(request.headers.host) |
|
302 local endpointurl = "" |
|
303 if port == '' then |
|
304 endpointurl = string.format("http://%s/%s", host, base) |
|
305 else |
|
306 endpointurl = string.format("http://%s:%s/%s", host, port, base) |
|
307 end |
|
308 |
|
309 local nonce = nonce() |
|
310 local key = genkey(32) |
|
311 local assoc_handle = newassoc(key) |
|
312 |
|
313 local openidresponse = { |
|
314 ["openid.ns"] = openidns, |
|
315 ["openid.mode"] = "id_res", |
|
316 ["openid.op_endpoint"] = endpointurl, |
|
317 ["openid.claimed_id"] = endpointurl.."/"..user, |
|
318 ["openid.identity"] = endpointurl.."/"..user, |
|
319 ["openid.return_to"] = params["openid.return_to"], |
|
320 ["openid.response_nonce"] = nonce, |
|
321 ["openid.assoc_handle"] = assoc_handle, |
|
322 ["openid.signed"] = "op_endpoint,identity,claimed_id,return_to,assoc_handle,response_nonce", -- FIXME |
|
323 ["openid.sig"] = nil, |
|
324 } |
|
325 |
|
326 openidresponse["openid.sig"] = sign(openidresponse, key) |
|
327 |
|
328 queryresponse = toquerystring(openidresponse) |
|
329 |
|
330 redirecturl = params["openid.return_to"] |
|
331 -- add the parameters to the return_to |
|
332 if redirecturl:match("?") then |
|
333 redirecturl = redirecturl.."&" |
|
334 else |
|
335 redirecturl = redirecturl.."?" |
|
336 end |
|
337 |
|
338 redirecturl = redirecturl..queryresponse |
|
339 |
|
340 module:log("debug", "Open ID Positive Assertion Response Table:\n"..humane(openidresponse)) |
|
341 module:log("debug", "Open ID Positive Assertion Response URL:\n"..queryresponse) |
|
342 module:log("debug", "Redirecting User to:\n"..redirecturl) |
|
343 return { |
|
344 status = "303 See Other", |
|
345 headers = { |
|
346 Location = redirecturl, |
|
347 }, |
|
348 body = "Redirecting to: "..redirecturl -- TODO Include a note with a hyperlink to redirect |
|
349 } |
|
350 else |
|
351 -- TODO Do something useful is there is no return_to |
|
352 end |
|
353 else |
|
354 module:log("debug", "Authentication Failed: "..params["jid"]) |
|
355 -- TODO let them try again |
|
356 end |
|
357 else |
|
358 -- Not an Open ID request, do something useful |
|
359 -- TODO |
|
360 end |
|
361 |
|
362 return response_404 |
|
363 end |
|
364 |
|
365 local function handle_identifier(method, body, request, id) |
|
366 module:log("debug", "Request at OpenID identifier") |
|
367 local host, port = split_host_port(request.headers.host) |
|
368 |
|
369 local user_name = "" |
|
370 local user_domain = "" |
|
371 local apos = string.find(id, "@") |
|
372 if apos == nil then |
|
373 user_name = id |
|
374 user_domain = host |
|
375 else |
|
376 user_name = string.sub(id, 0, apos-1) |
|
377 user_domain = string.sub(id, apos+1) |
|
378 end |
|
379 |
|
380 user, domain = jidutil.split(id) |
|
381 |
|
382 local exists = usermanager.user_exists(user_name, user_domain) |
|
383 |
|
384 if not exists then |
|
385 return response_404 |
|
386 end |
|
387 |
|
388 local endpointurl = "" |
|
389 if port == '' then |
|
390 endpointurl = string.format("http://%s/%s", host, base) |
|
391 else |
|
392 endpointurl = string.format("http://%s:%s/%s", host, port, base) |
|
393 end |
|
394 |
|
395 local head = string.format("<title>Prosody OpenID : %s@%s</title>", user_name, user_domain) |
|
396 -- OpenID HTML discovery [#7.3] |
|
397 head = head .. string.format('<link rel="openid2.provider" href="%s" />', endpointurl) |
|
398 |
|
399 local content = 'request.url.path: ' .. request.url.path .. '<br/>' |
|
400 content = content .. 'host+port: ' .. request.headers.host .. '<br/>' |
|
401 content = content .. 'host: ' .. tostring(host) .. '<br/>' |
|
402 content = content .. 'port: ' .. tostring(port) .. '<br/>' |
|
403 content = content .. 'user_name: ' .. user_name .. '<br/>' |
|
404 content = content .. 'user_domain: ' .. user_domain .. '<br/>' |
|
405 content = content .. 'exists: ' .. tostring(exists) .. '<br/>' |
|
406 |
|
407 local body = string.format('<p>%s</p>', content) |
|
408 |
|
409 local data = string.format([[ |
|
410 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" |
|
411 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> |
|
412 <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> |
|
413 <head> |
|
414 <meta http-equiv="Content-type" content="text/html;charset=UTF-8" /> |
|
415 %s |
|
416 </head> |
|
417 <body> |
|
418 %s |
|
419 </body> |
|
420 </html> |
|
421 ]], head, body) |
|
422 return data; |
|
423 end |
|
424 |
|
425 local function handle_request(method, body, request) |
|
426 module:log("debug", "Received request") |
|
427 |
|
428 -- Make sure the host is enabled |
|
429 local host = split_host_port(request.headers.host) |
|
430 if not hosts[host] then |
|
431 return response_404 |
|
432 end |
|
433 |
|
434 if request.url.path == "/"..base then |
|
435 -- OpenID Provider Endpoint |
|
436 return handle_endpoint(method, body, request) |
|
437 else |
|
438 local id = request.url.path:match("^/"..base.."/(.+)$") |
|
439 if id then |
|
440 -- OpenID Identifier |
|
441 return handle_identifier(method, body, request, id) |
|
442 else |
|
443 return response_404 |
|
444 end |
|
445 end |
|
446 end |
|
447 |
|
448 httpserver.new{ port = 5280, base = base, handler = handle_request, ssl = false} |