sasl-server.c revision 5a250816ffc4cc5db203f9410ea99b6601c7b91a
76b43e4417bab52e913da39b5f5bc2a130d3f149Timo Sirainen/* Copyright (c) 2002-2011 Dovecot authors, see the included COPYING file */
0cb2e8eb55e70f8ebe1e8349bdf49e4cbe5d8834Timo Sirainen "Maximum number of connections from user+IP exceeded " \
ccc895c0358108d2304239063e940b7d75f364abTimo Sirainen "(mail_max_userip_connections=%u)"
b5e6f6f27c1461f0f9f202615eeb738a645188c3Timo Sirainen unsigned char cookie[MASTER_AUTH_COOKIE_SIZE];
0cb2e8eb55e70f8ebe1e8349bdf49e4cbe5d8834Timo Sirainensasl_server_get_advertised_mechs(struct client *client, unsigned int *count_r)
ccc895c0358108d2304239063e940b7d75f364abTimo Sirainen unsigned int i, j, count;
0cb2e8eb55e70f8ebe1e8349bdf49e4cbe5d8834Timo Sirainen mech = auth_client_get_available_mechs(auth_client, &count);
0cb2e8eb55e70f8ebe1e8349bdf49e4cbe5d8834Timo Sirainen ret_mech = t_new(struct auth_mech_desc, count);
b6a7e0a7899e7f5d60c23cdaa50e025e4c67d05fTimo Sirainen for (i = j = 0; i < count; i++) {
b6a7e0a7899e7f5d60c23cdaa50e025e4c67d05fTimo Sirainen /* a) transport is secured
0cb2e8eb55e70f8ebe1e8349bdf49e4cbe5d8834Timo Sirainen b) auth mechanism isn't plaintext
b6a7e0a7899e7f5d60c23cdaa50e025e4c67d05fTimo Sirainen c) we allow insecure authentication
b6a7e0a7899e7f5d60c23cdaa50e025e4c67d05fTimo Sirainen if ((mech[i].flags & MECH_SEC_PRIVATE) == 0 &&
b6a7e0a7899e7f5d60c23cdaa50e025e4c67d05fTimo Sirainen (client->secured || !client->set->disable_plaintext_auth ||
0cb2e8eb55e70f8ebe1e8349bdf49e4cbe5d8834Timo Sirainen ssl_proxy_has_valid_client_cert(client->ssl_proxy))
0cb2e8eb55e70f8ebe1e8349bdf49e4cbe5d8834Timo Sirainen auth_flags |= AUTH_REQUEST_FLAG_VALID_CLIENT_CERT;
90adcaa0a00eba29b7fbd50ca66be11c8d086d6aTimo Sirainen /* e.g. webmail */
83bb013a99f0936995f9c7a1077822662d8fefdbTimo Sirainencall_client_callback(struct client *client, enum sasl_server_reply reply,
0cb2e8eb55e70f8ebe1e8349bdf49e4cbe5d8834Timo Sirainen i_assert(reply != SASL_SERVER_REPLY_CONTINUE);
90adcaa0a00eba29b7fbd50ca66be11c8d086d6aTimo Sirainen /* NOTE: client may be destroyed now */
e9d29ae46d435aee85514decfe6ee27399ebf794Timo Sirainenmaster_auth_callback(const struct master_auth_reply *reply, void *context)
90adcaa0a00eba29b7fbd50ca66be11c8d086d6aTimo Sirainen enum sasl_server_reply sasl_reply = SASL_SERVER_REPLY_MASTER_FAILED;
90adcaa0a00eba29b7fbd50ca66be11c8d086d6aTimo Sirainen auth_client_send_cancel(auth_client, client->master_auth_id);
90adcaa0a00eba29b7fbd50ca66be11c8d086d6aTimo Sirainen call_client_callback(client, sasl_reply, data, NULL);
90adcaa0a00eba29b7fbd50ca66be11c8d086d6aTimo Sirainenstatic void master_send_request(struct anvil_request *anvil_request)
83bb013a99f0936995f9c7a1077822662d8fefdbTimo Sirainen struct client *client = anvil_request->client;
ae1b268ffff743ad9927c304a1344c5cbd7f909dTimo Sirainen const unsigned char *data;
90adcaa0a00eba29b7fbd50ca66be11c8d086d6aTimo Sirainen req.flags |= MAIL_AUTH_REQUEST_FLAG_TLS_COMPRESSION;
90adcaa0a00eba29b7fbd50ca66be11c8d086d6aTimo Sirainen memcpy(req.cookie, anvil_request->cookie, sizeof(req.cookie));
90adcaa0a00eba29b7fbd50ca66be11c8d086d6aTimo Sirainen buf = buffer_create_dynamic(pool_datastack_create(), 256);
ae1b268ffff743ad9927c304a1344c5cbd7f909dTimo Sirainen buffer_append(buf, client->master_data_prefix,
90adcaa0a00eba29b7fbd50ca66be11c8d086d6aTimo Sirainen data = i_stream_get_data(client->input, &size);
3ec2c1f31631bb5ff86f5fc93a563c33e5cae90dTimo Sirainen master_auth_request(master_auth, client->fd, &req, buf->data,
3ec2c1f31631bb5ff86f5fc93a563c33e5cae90dTimo Sirainen master_auth_callback, client, &client->master_tag);
3ec2c1f31631bb5ff86f5fc93a563c33e5cae90dTimo Sirainenstatic void anvil_lookup_callback(const char *reply, void *context)
3ec2c1f31631bb5ff86f5fc93a563c33e5cae90dTimo Sirainen const struct login_settings *set = client->set;
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainen strtoul(reply, NULL, 10) < set->mail_max_userip_connections)
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainen auth_client_send_cancel(auth_client, req->auth_id);
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainen errmsg = t_strdup_printf(ERR_TOO_MANY_USERIP_CONNECTIONS,
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainen call_client_callback(client, SASL_SERVER_REPLY_MASTER_FAILED,
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainenanvil_check_too_many_connections(struct client *client,
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainen req->auth_pid = auth_client_request_get_server_pid(request);
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainen req->auth_id = auth_client_request_get_id(request);
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainen buffer_create_data(&buf, req->cookie, sizeof(req->cookie));
97eb53ade9057e6966dbb77289ad0204c7e1657bTimo Sirainen cookie = auth_client_request_get_cookie(request);
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainen if (strlen(cookie) == MASTER_AUTH_COOKIE_SIZE*2)
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainen client->set->mail_max_userip_connections == 0) {
97eb53ade9057e6966dbb77289ad0204c7e1657bTimo Sirainen query = t_strconcat("LOOKUP\t", login_binary->protocol, "/",
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainen anvil_client_query(anvil, query, anvil_lookup_callback, req);
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainenauthenticate_callback(struct auth_client_request *request,
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainen enum auth_request_status status, const char *data_base64,
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainen unsigned int i;
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainen /* client aborted */
b5e6f6f27c1461f0f9f202615eeb738a645188c3Timo Sirainen /* continue */
97eb53ade9057e6966dbb77289ad0204c7e1657bTimo Sirainen client->sasl_callback(client, SASL_SERVER_REPLY_CONTINUE,
0cb2e8eb55e70f8ebe1e8349bdf49e4cbe5d8834Timo Sirainen /* user can't login */
c36ec256c1bd1abe1c12e792cf64f0b7e3b3135aTimo Sirainen call_client_callback(client, SASL_SERVER_REPLY_SUCCESS,
97eb53ade9057e6966dbb77289ad0204c7e1657bTimo Sirainen anvil_check_too_many_connections(client, request);
97eb53ade9057e6966dbb77289ad0204c7e1657bTimo Sirainen /* parse our username if it's there */
ae1b268ffff743ad9927c304a1344c5cbd7f909dTimo Sirainen call_client_callback(client, SASL_SERVER_REPLY_AUTH_FAILED,
97eb53ade9057e6966dbb77289ad0204c7e1657bTimo Sirainenvoid sasl_server_auth_begin(struct client *client,
7aeaf23f760d86aad525d831efcac9f860a55a39Timo Sirainen i_assert(auth_client_is_connected(auth_client));
18065635d4e79dd96eb3b3215718abd12f6a6808Timo Sirainen client->auth_mech_name = str_ucase(i_strdup(mech_name));
97eb53ade9057e6966dbb77289ad0204c7e1657bTimo Sirainen mech = auth_client_find_mech(auth_client, mech_name);
97eb53ade9057e6966dbb77289ad0204c7e1657bTimo Sirainen "Unsupported authentication mechanism.");
ae1b268ffff743ad9927c304a1344c5cbd7f909dTimo Sirainen if (!client->secured && client->set->disable_plaintext_auth &&
ae1b268ffff743ad9927c304a1344c5cbd7f909dTimo Sirainen "Plaintext authentication disabled.");
97eb53ade9057e6966dbb77289ad0204c7e1657bTimo Sirainen info.cert_username = client->ssl_proxy == NULL ? NULL :
ae1b268ffff743ad9927c304a1344c5cbd7f909dTimo Sirainen info.initial_resp_base64 = initial_resp_base64;
ae1b268ffff743ad9927c304a1344c5cbd7f909dTimo Sirainenstatic void sasl_server_auth_cancel(struct client *client, const char *reason,
97eb53ade9057e6966dbb77289ad0204c7e1657bTimo Sirainen if (client->set->verbose_auth && reason != NULL) {
83bb013a99f0936995f9c7a1077822662d8fefdbTimo Sirainen str_sanitize(client->auth_mech_name, MAX_MECH_NAME);
d67fde1a8ebc1d85704c5986d8f93aae97eccef3Timo Sirainen "Authenticate %s failed: %s", auth_name, reason));
97eb53ade9057e6966dbb77289ad0204c7e1657bTimo Sirainen auth_client_request_abort(&client->auth_request);
97eb53ade9057e6966dbb77289ad0204c7e1657bTimo Sirainen call_client_callback(client, reply, reason, NULL);
97eb53ade9057e6966dbb77289ad0204c7e1657bTimo Sirainenvoid sasl_server_auth_failed(struct client *client, const char *reason)
97eb53ade9057e6966dbb77289ad0204c7e1657bTimo Sirainen sasl_server_auth_cancel(client, reason, SASL_SERVER_REPLY_AUTH_FAILED);
97eb53ade9057e6966dbb77289ad0204c7e1657bTimo Sirainenvoid sasl_server_auth_abort(struct client *client)