@@ -83,7 +83,8 @@ static int _handle_digestmd5_rspauth(xmpp_conn_t *conn,
83
83
static int _handle_scram_challenge (xmpp_conn_t * conn ,
84
84
xmpp_stanza_t * stanza ,
85
85
void * userdata );
86
- static char * _make_scram_init_msg (xmpp_conn_t * conn );
86
+ struct scram_user_data ;
87
+ static int _make_scram_init_msg (struct scram_user_data * scram );
87
88
88
89
static int _handle_missing_features_sasl (xmpp_conn_t * conn , void * userdata );
89
90
static int _handle_missing_bind (xmpp_conn_t * conn , void * userdata );
@@ -250,8 +251,12 @@ _handle_features(xmpp_conn_t *conn, xmpp_stanza_t *stanza, void *userdata)
250
251
conn -> sasl_support |= SASL_MASK_EXTERNAL ;
251
252
else if (strcasecmp (text , "DIGEST-MD5" ) == 0 )
252
253
conn -> sasl_support |= SASL_MASK_DIGESTMD5 ;
254
+ else if (strcasecmp (text , "SCRAM-SHA-1-PLUS" ) == 0 )
255
+ conn -> sasl_support |= SASL_MASK_SCRAMSHA1_PLUS ;
253
256
else if (strcasecmp (text , "SCRAM-SHA-1" ) == 0 )
254
257
conn -> sasl_support |= SASL_MASK_SCRAMSHA1 ;
258
+ else if (strcasecmp (text , "SCRAM-SHA-256-PLUS" ) == 0 )
259
+ conn -> sasl_support |= SASL_MASK_SCRAMSHA256_PLUS ;
255
260
else if (strcasecmp (text , "SCRAM-SHA-256" ) == 0 )
256
261
conn -> sasl_support |= SASL_MASK_SCRAMSHA256 ;
257
262
else if (strcasecmp (text , "SCRAM-SHA-512" ) == 0 )
@@ -439,7 +444,11 @@ static int _handle_digestmd5_rspauth(xmpp_conn_t *conn,
439
444
}
440
445
441
446
struct scram_user_data {
447
+ xmpp_conn_t * conn ;
448
+ int sasl_plus ;
442
449
char * scram_init ;
450
+ char * channel_binding ;
451
+ const char * first_bare ;
443
452
const struct hash_alg * alg ;
444
453
};
445
454
@@ -471,8 +480,9 @@ static int _handle_scram_challenge(xmpp_conn_t *conn,
471
480
if (!challenge )
472
481
goto err ;
473
482
474
- response = sasl_scram (conn -> ctx , scram_ctx -> alg , challenge ,
475
- scram_ctx -> scram_init , conn -> jid , conn -> pass );
483
+ response =
484
+ sasl_scram (conn -> ctx , scram_ctx -> alg , scram_ctx -> channel_binding ,
485
+ challenge , scram_ctx -> first_bare , conn -> jid , conn -> pass );
476
486
strophe_free (conn -> ctx , challenge );
477
487
if (!response )
478
488
goto err ;
@@ -506,7 +516,8 @@ static int _handle_scram_challenge(xmpp_conn_t *conn,
506
516
*/
507
517
rc = _handle_sasl_result (conn , stanza ,
508
518
(void * )scram_ctx -> alg -> scram_name );
509
- strophe_free (conn -> ctx , scram_ctx -> scram_init );
519
+ strophe_free_and_null (conn -> ctx , scram_ctx -> channel_binding );
520
+ strophe_free_and_null (conn -> ctx , scram_ctx -> scram_init );
510
521
strophe_free (conn -> ctx , scram_ctx );
511
522
}
512
523
@@ -517,33 +528,97 @@ static int _handle_scram_challenge(xmpp_conn_t *conn,
517
528
err_free_response :
518
529
strophe_free (conn -> ctx , response );
519
530
err :
520
- strophe_free (conn -> ctx , scram_ctx -> scram_init );
531
+ strophe_free_and_null (conn -> ctx , scram_ctx -> channel_binding );
532
+ strophe_free_and_null (conn -> ctx , scram_ctx -> scram_init );
521
533
strophe_free (conn -> ctx , scram_ctx );
522
534
disconnect_mem_error (conn );
523
535
return 0 ;
524
536
}
525
537
526
- static char * _make_scram_init_msg (xmpp_conn_t * conn )
538
+ static int _make_scram_init_msg (struct scram_user_data * scram )
527
539
{
540
+ xmpp_conn_t * conn = scram -> conn ;
528
541
xmpp_ctx_t * ctx = conn -> ctx ;
529
- size_t message_len ;
530
- char * node ;
531
- char * message ;
532
- char nonce [32 ];
542
+ void * binding_data ;
543
+ char * node , * message , * binding_type ;
544
+ size_t message_len , binding_type_len = 0 , binding_data_len ;
545
+ int l , is_secured = xmpp_conn_is_secured (conn );
546
+ char buf [64 ];
547
+
548
+ if (scram -> sasl_plus ) {
549
+ if (!is_secured ) {
550
+ strophe_error (
551
+ ctx , "xmpp" ,
552
+ "SASL: Server requested a -PLUS variant to authenticate, "
553
+ "but the connection is not secured. This is an error on "
554
+ "the server side we can't do anything about." );
555
+ return -1 ;
556
+ }
557
+ if (tls_init_channel_binding (conn -> tls , & binding_type ,
558
+ & binding_type_len )) {
559
+ return -1 ;
560
+ }
561
+ /* directly account for the '=' char in 'p=<binding-type>' */
562
+ binding_type_len += 1 ;
563
+ }
533
564
534
565
node = xmpp_jid_node (ctx , conn -> jid );
535
566
if (!node ) {
536
- return NULL ;
567
+ return -1 ;
537
568
}
538
- xmpp_rand_nonce (ctx -> rand , nonce , sizeof (nonce ));
539
- message_len = strlen (node ) + strlen (nonce ) + 8 + 1 ;
569
+ xmpp_rand_nonce (ctx -> rand , buf , sizeof (buf ));
570
+ message_len = strlen (node ) + strlen (buf ) + 8 + binding_type_len + 1 ;
540
571
message = strophe_alloc (ctx , message_len );
541
572
if (message ) {
542
- strophe_snprintf (message , message_len , "n,,n=%s,r=%s" , node , nonce );
573
+ /* increase length to account for 'y,,', 'n,,' or 'p,,'.
574
+ * In the 'p' case the '=' sign has already been accounted for above.
575
+ */
576
+ binding_type_len += 3 ;
577
+ if (scram -> sasl_plus ) {
578
+ l = strophe_snprintf (message , message_len , "p=%s,,n=%s,r=%s" ,
579
+ binding_type , node , buf );
580
+ } else {
581
+ l = strophe_snprintf (message , message_len , "%c,,n=%s,r=%s" ,
582
+ is_secured ? 'y' : 'n' , node , buf );
583
+ }
584
+ if (l < 0 || (size_t )l >= message_len ) {
585
+ goto err_out ;
586
+ } else {
587
+ /* Make `first_bare` point to the 'n' of the client-first-message */
588
+ scram -> first_bare = message + binding_type_len ;
589
+ memcpy (buf , message , binding_type_len );
590
+ if (scram -> sasl_plus ) {
591
+ binding_data =
592
+ tls_get_channel_binding_data (conn -> tls , & binding_data_len );
593
+ if (!binding_data ) {
594
+ goto err_out ;
595
+ }
596
+ if (binding_data_len > sizeof (buf ) - binding_type_len ) {
597
+ strophe_error (ctx , "xmpp" ,
598
+ "Channel binding data len is too long (%zu)" ,
599
+ binding_data_len );
600
+ goto err_out ;
601
+ }
602
+ memcpy (& buf [binding_type_len ], binding_data , binding_data_len );
603
+ binding_type_len += binding_data_len ;
604
+ }
605
+ if (scram -> channel_binding )
606
+ strophe_free (ctx , scram -> channel_binding );
607
+ scram -> channel_binding =
608
+ xmpp_base64_encode (ctx , (void * )buf , binding_type_len );
609
+ memset (buf , 0 , binding_type_len );
610
+ }
543
611
}
544
612
strophe_free (ctx , node );
613
+ scram -> scram_init = message ;
545
614
546
- return message ;
615
+ return message == NULL ? -1 : 0 ;
616
+ err_out :
617
+ strophe_free (ctx , node );
618
+ strophe_free (ctx , message );
619
+ scram -> first_bare = NULL ;
620
+ scram -> scram_init = NULL ;
621
+ return -1 ;
547
622
}
548
623
549
624
static xmpp_stanza_t * _make_starttls (xmpp_conn_t * conn )
@@ -636,7 +711,7 @@ static void _auth(xmpp_conn_t *conn)
636
711
return ;
637
712
}
638
713
639
- if (anonjid && conn -> sasl_support & SASL_MASK_ANONYMOUS ) {
714
+ if (anonjid && ( conn -> sasl_support & SASL_MASK_ANONYMOUS ) ) {
640
715
/* some crap here */
641
716
auth = _make_sasl_auth (conn , "ANONYMOUS" );
642
717
if (!auth ) {
@@ -703,21 +778,29 @@ static void _auth(xmpp_conn_t *conn)
703
778
xmpp_disconnect (conn );
704
779
} else if (conn -> sasl_support & SASL_MASK_SCRAM ) {
705
780
scram_ctx = strophe_alloc (conn -> ctx , sizeof (* scram_ctx ));
706
- if (conn -> sasl_support & SASL_MASK_SCRAMSHA512 )
781
+ memset (scram_ctx , 0 , sizeof (* scram_ctx ));
782
+ if (conn -> sasl_support & SASL_MASK_SCRAMSHA256_PLUS ) {
783
+ scram_ctx -> alg = & scram_sha256_plus ;
784
+ } else if (conn -> sasl_support & SASL_MASK_SCRAMSHA1_PLUS ) {
785
+ scram_ctx -> alg = & scram_sha1_plus ;
786
+ } else if (conn -> sasl_support & SASL_MASK_SCRAMSHA512 ) {
707
787
scram_ctx -> alg = & scram_sha512 ;
708
- else if (conn -> sasl_support & SASL_MASK_SCRAMSHA256 )
788
+ } else if (conn -> sasl_support & SASL_MASK_SCRAMSHA256 ) {
709
789
scram_ctx -> alg = & scram_sha256 ;
710
- else if (conn -> sasl_support & SASL_MASK_SCRAMSHA1 )
790
+ } else if (conn -> sasl_support & SASL_MASK_SCRAMSHA1 ) {
711
791
scram_ctx -> alg = & scram_sha1 ;
792
+ }
793
+
712
794
auth = _make_sasl_auth (conn , scram_ctx -> alg -> scram_name );
713
795
if (!auth ) {
714
796
disconnect_mem_error (conn );
715
797
return ;
716
798
}
717
799
718
- /* don't free scram_init on success */
719
- scram_ctx -> scram_init = _make_scram_init_msg (conn );
720
- if (!scram_ctx -> scram_init ) {
800
+ scram_ctx -> conn = conn ;
801
+ scram_ctx -> sasl_plus =
802
+ scram_ctx -> alg -> mask & SASL_MASK_SCRAM_PLUS ? 1 : 0 ;
803
+ if (_make_scram_init_msg (scram_ctx )) {
721
804
strophe_free (conn -> ctx , scram_ctx );
722
805
xmpp_stanza_release (auth );
723
806
disconnect_mem_error (conn );
@@ -753,7 +836,7 @@ static void _auth(xmpp_conn_t *conn)
753
836
754
837
send_stanza (conn , auth , XMPP_QUEUE_STROPHE );
755
838
756
- /* SASL SCRAM-SHA-1 was tried, unset flag */
839
+ /* SASL algorithm was tried, unset flag */
757
840
conn -> sasl_support &= ~scram_ctx -> alg -> mask ;
758
841
} else if (conn -> sasl_support & SASL_MASK_DIGESTMD5 ) {
759
842
auth = _make_sasl_auth (conn , "DIGEST-MD5" );
0 commit comments