comparison mod_client_certs/mod_client_certs.lua @ 695:f6be46f15b74

mod_client_certs: Checking in the latest version I have with Zash's changes.
author Thijs Alkemade <thijsalkemade@gmail.com>
date Tue, 05 Jun 2012 18:02:28 +0200
parents
children c3337f62a538
comparison
equal deleted inserted replaced
694:02fcb102b9aa 695:f6be46f15b74
1 -- XEP-0257: Client Certificates Management implementation for Prosody
2 -- Copyright (C) 2012 Thijs Alkemade
3 --
4 -- This file is MIT/X11 licensed.
5
6 local st = require "util.stanza";
7 local jid_bare = require "util.jid".bare;
8 local xmlns_saslcert = "urn:xmpp:saslcert:0";
9 local xmlns_pubkey = "urn:xmpp:tmp:pubkey";
10 local dm_load = require "util.datamanager".load;
11 local dm_store = require "util.datamanager".store;
12 local dm_table = "client_certs";
13 local x509 = require "ssl.x509";
14 local id_on_xmppAddr = "1.3.6.1.5.5.7.8.5";
15 local digest_algo = "sha1";
16
17 local function enable_cert(username, cert, info)
18 local certs = dm_load(username, module.host, dm_table) or {};
19 local all_certs = dm_load(nil, module.host, dm_table) or {};
20
21 info.pem = cert:pem();
22 local digest = cert:digest(digest_algo);
23 info.digest = digest;
24 certs[info.id] = info;
25 all_certs[digest] = username;
26 -- Or, have it be keyed by the entire PEM representation
27
28 dm_store(username, module.host, dm_table, certs);
29 dm_store(nil, module.host, dm_table, all_certs);
30 return true
31 end
32
33 local function disable_cert(username, name)
34 local certs = dm_load(username, module.host, dm_table) or {};
35 local all_certs = dm_load(nil, module.host, dm_table) or {};
36
37 local info = certs[name];
38 local cert;
39 if info then
40 certs[name] = nil;
41 cert = x509.cert_from_pem(info.pem);
42 all_certs[cert:digest(digest_algo)] = nil;
43 else
44 return nil, "item-not-found"
45 end
46
47 dm_store(username, module.host, dm_table, certs);
48 dm_store(nil, module.host, dm_table, all_certs);
49 return cert; -- So we can compare it with stuff
50 end
51
52 module:hook("iq/self/"..xmlns_saslcert..":items", function(event)
53 local origin, stanza = event.origin, event.stanza;
54 if stanza.attr.type == "get" then
55 module:log("debug", "%s requested items", origin.full_jid);
56
57 local reply = st.reply(stanza):tag("items", { xmlns = xmlns_saslcert });
58 local certs = dm_load(origin.username, module.host, dm_table) or {};
59
60 for digest,info in pairs(certs) do
61 reply:tag("item", { id = info.id })
62 :tag("name"):text(info.name):up()
63 :tag("keyinfo", { xmlns = xmlns_pubkey }):tag("name"):text(info["key_name"]):up()
64 :tag("x509cert"):text(info.x509cert)
65 :up();
66 end
67
68 origin.send(reply);
69 return true
70 end
71 end);
72
73 module:hook("iq/self/"..xmlns_saslcert..":append", function(event)
74 local origin, stanza = event.origin, event.stanza;
75 if stanza.attr.type == "set" then
76
77 local append = stanza:get_child("append", xmlns_saslcert);
78 local name = append:get_child_text("name", xmlns_saslcert);
79 local key_info = append:get_child("keyinfo", xmlns_pubkey);
80
81 if not key_info or not name then
82 origin.send(st.error_reply(stanza, "cancel", "bad-request", "Missing fields.")); -- cancel? not modify?
83 return true
84 end
85
86 local id = key_info:get_child_text("name", xmlns_pubkey);
87 local x509cert = key_info:get_child_text("x509cert", xmlns_pubkey);
88
89 if not id or not x509cert then
90 origin.send(st.error_reply(stanza, "cancel", "bad-request", "No certificate found."));
91 return true
92 end
93
94 local can_manage = key_info:get_child("no-cert-management", xmlns_saslcert) ~= nil;
95 local x509cert = key_info:get_child_text("x509cert");
96
97 local cert = x509.cert_from_pem(
98 "-----BEGIN CERTIFICATE-----\n"
99 .. x509cert ..
100 "\n-----END CERTIFICATE-----\n");
101
102
103 if not cert then
104 origin.send(st.error_reply(stanza, "modify", "not-acceptable", "Could not parse X.509 certificate"));
105 return true;
106 end
107
108 -- Check the certificate. Is it not expired? Does it include id-on-xmppAddr?
109
110 --[[ the method expired doesn't exist in luasec .. yet?
111 if cert:expired() then
112 module:log("debug", "This certificate is already expired.");
113 origin.send(st.error_reply(stanza, "cancel", "bad-request", "This certificate is expired."));
114 return true
115 end
116 --]]
117
118 if not cert:valid_at(os.time()) then
119 module:log("debug", "This certificate is not valid at this moment.");
120 end
121
122 local valid_id_on_xmppAddrs;
123 local require_id_on_xmppAddr = false;
124 if require_id_on_xmppAddr then
125 --local info = {};
126 valid_id_on_xmppAddrs = {};
127 for _,v in ipairs(cert:subject()) do
128 --info[#info+1] = (v.name or v.oid) ..":" .. v.value;
129 if v.oid == id_on_xmppAddr then
130 if jid_bare(v.value) == jid_bare(origin.full_jid) then
131 module:log("debug", "The certificate contains a id-on-xmppAddr key, and it is valid.");
132 valid_id_on_xmppAddrs[#valid_id_on_xmppAddrs+1] = v.value;
133 -- Is there a point in having >1 ids? Reject?!
134 else
135 module:log("debug", "The certificate contains a id-on-xmppAddr key, but it is for %s.", v.value);
136 -- Reject?
137 end
138 end
139 end
140
141 if #valid_id_on_xmppAddrs == 0 then
142 origin.send(st.error_reply(stanza, "cancel", "bad-request", "This certificate is has no valid id-on-xmppAddr field."));
143 return true -- REJECT?!
144 end
145 end
146
147 enable_cert(origin.username, cert, {
148 id = id,
149 name = name,
150 x509cert = x509cert,
151 no_cert_management = can_manage,
152 jids = valid_id_on_xmppAddrs,
153 });
154
155 module:log("debug", "%s added certificate named %s", origin.full_jid, name);
156
157 origin.send(st.reply(stanza));
158
159 return true
160 end
161 end);
162
163
164 local function handle_disable(event)
165 local origin, stanza = event.origin, event.stanza;
166 if stanza.attr.type == "set" then
167 local disable = stanza.tags[1];
168 module:log("debug", "%s disabled a certificate", origin.full_jid);
169
170 if disable.name == "revoke" then
171 module:log("debug", "%s revoked a certificate! Should disconnect all clients that used it", origin.full_jid);
172 -- TODO hosts.sessions[user].sessions.each{close if uses this cert}
173 end
174 local item = disable:get_child("item");
175 local name = item and item.attr.id;
176
177 if not name then
178 origin.send(st.error_reply(stanza, "cancel", "bad-request", "No key specified."));
179 return true
180 end
181
182 disable_cert(origin.username, name);
183
184 origin.send(st.reply(stanza));
185
186 return true
187 end
188 end
189
190 module:hook("iq/self/"..xmlns_saslcert..":disable", handle_disable);
191 module:hook("iq/self/"..xmlns_saslcert..":revoke", handle_disable);
192
193 -- Here comes the SASL EXTERNAL stuff
194
195 local now = os.time;
196 module:hook("stream-features", function(event)
197 local session, features = event.origin, event.features;
198 if session.secure and session.type == "c2s_unauthed" then
199 local cert = session.conn:socket():getpeercertificate();
200 if not cert then
201 module:log("error", "No Client Certificate");
202 return
203 end
204 module:log("info", "Client Certificate: %s", cert:digest(digest_algo));
205 local all_certs = dm_load(nil, module.host, dm_table) or {};
206 local digest = cert:digest(digest_algo);
207 local username = all_certs[digest];
208 if not cert:valid_at(now()) then
209 module:log("debug", "Client has an expired certificate", cert:digest(digest_algo));
210 return
211 end
212 if username then
213 local certs = dm_load(username, module.host, dm_table) or {};
214 local pem = cert:pem();
215 for name,info in pairs(certs) do
216 if info.digest == digest and info.pem == pem then
217 session.external_auth_cert, session.external_auth_user = pem, username;
218 module:log("debug", "Stream features:\n%s", tostring(features));
219 local mechs = features:get_child("mechanisms", "urn:ietf:params:xml:ns:xmpp-sasl");
220 if mechs then
221 mechs:tag("mechanism"):text("EXTERNAL");
222 end
223 end
224 end
225 end
226 end
227 end, -1);
228
229 local sm_make_authenticated = require "core.sessionmanager".make_authenticated;
230
231 module:hook("stanza/urn:ietf:params:xml:ns:xmpp-sasl:auth", function(event)
232 local session, stanza = event.origin, event.stanza;
233 if session.type == "c2s_unauthed" and event.stanza.attr.mechanism == "EXTERNAL" then
234 if session.secure then
235 local cert = session.conn:socket():getpeercertificate();
236 if cert:pem() == session.external_auth_cert then
237 sm_make_authenticated(session, session.external_auth_user);
238 module:fire_event("authentication-success", { session = session });
239 session.external_auth, session.external_auth_user = nil, nil;
240 session.send(st.stanza("success", { xmlns="urn:ietf:params:xml:ns:xmpp-sasl"}));
241 session:reset_stream();
242 else
243 module:fire_event("authentication-failure", { session = session, condition = "not-authorized" });
244 session.send(st.stanza("failure", { xmlns="urn:ietf:params:xml:ns:xmpp-sasl"}):tag"not-authorized");
245 end
246 else
247 session.send(st.stanza("failure", { xmlns="urn:ietf:params:xml:ns:xmpp-sasl"}):tag"encryption-required");
248 end
249 return true;
250 end
251 end, 1);
252