/* * $Id: authenticate.c,v 1.51.6.2 2008/05/04 23:23:13 hno Exp $ * * DEBUG: section 29 Authenticator * AUTHOR: Duane Wessels * * SQUID Web Proxy Cache http://www.squid-cache.org/ * ---------------------------------------------------------- * * Squid is the result of efforts by numerous individuals from * the Internet community; see the CONTRIBUTORS file for full * details. Many organizations have provided support for Squid's * development; see the SPONSORS file for full details. Squid is * Copyrighted (C) 2001 by the Regents of the University of * California; see the COPYRIGHT file for full details. Squid * incorporates software developed and/or copyrighted by other * sources; see the CREDITS file for full details. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111, USA. * */ /* The functions in this file handle authentication. * They DO NOT perform access control or auditing. * See acl.c for access control and client_side.c for auditing */ #include "squid.h" CBDATA_TYPE(auth_user_ip_t); static void authenticateDecodeAuth(const char *proxy_auth, auth_user_request_t * auth_user_request); static auth_acl_t authenticateAuthenticate(auth_user_request_t ** auth_user_request, http_hdr_type headertype, request_t * request, ConnStateData * conn, struct in_addr src_addr); static void authenticateAuthUserRequestUnlinkIp(const struct in_addr ipaddr); /* * * Private Data * */ MemPool *auth_user_request_pool = NULL; /* Generic Functions */ static int authenticateAuthSchemeConfigured(const char *proxy_auth) { authScheme *scheme; int i; for (i = 0; i < Config.authConfig.n_configured; i++) { scheme = Config.authConfig.schemes + i; if ((strncasecmp(proxy_auth, scheme->typestr, strlen(scheme->typestr)) == 0) && (authscheme_list[scheme->Id].Active())) return 1; } return 0; } int authenticateAuthSchemeId(const char *typestr) { int i = 0; for (i = 0; authscheme_list && authscheme_list[i].typestr; i++) { if (strncasecmp(typestr, authscheme_list[i].typestr, strlen(authscheme_list[i].typestr)) == 0) { return i; } } return -1; } static void authenticateDecodeAuth(const char *proxy_auth, auth_user_request_t * auth_user_request) { int i = 0; assert(proxy_auth != NULL); assert(auth_user_request != NULL); /* we need this created for us. */ debug(29, 9) ("authenticateDecodeAuth: header = '%s'\n", proxy_auth); if (authenticateAuthSchemeConfigured(proxy_auth)) { /* we're configured to use this scheme - but is it active ? */ if ((i = authenticateAuthSchemeId(proxy_auth)) != -1) { authscheme_list[i].decodeauth(auth_user_request, proxy_auth); if (auth_user_request->auth_user) { auth_user_request->auth_user->auth_module = i + 1; } else { debug(29, 1) ("authenticateDecodeAuth: Invalid proxy-auth header, '%s'\n", proxy_auth); } return; } } debug(29, 1) ("authenticateDecodeAuth: Unsupported or unconfigured proxy-auth scheme, '%s'\n", proxy_auth); return; } /* clear any connection related authentication details */ void authenticateOnCloseConnection(ConnStateData * conn) { auth_user_request_t *auth_user_request; assert(conn != NULL); if (conn->auth_user_request != NULL) { auth_user_request = conn->auth_user_request; /* if the auth type gets reset, the connection shouldn't * remain linked to it - the next type might not be conn based */ assert(auth_user_request->auth_user->auth_module); if (authscheme_list[auth_user_request->auth_user->auth_module - 1].oncloseconnection) { authscheme_list[auth_user_request->auth_user->auth_module - 1].oncloseconnection(conn); } } } /**** PUBLIC FUNCTIONS (ALL GENERIC!) ****/ /* send the initial data to an authenticator module */ void authenticateStart(auth_user_request_t * auth_user_request, RH * handler, void *data) { assert(auth_user_request); assert(handler); debug(29, 9) ("authenticateStart: auth_user_request '%p'\n", auth_user_request); if (auth_user_request->auth_user->auth_module > 0) authscheme_list[auth_user_request->auth_user->auth_module - 1].authStart(auth_user_request, handler, data); else handler(data, NULL); } /* * Check a auth_user pointer for validity. Does not check passwords, just data * sensability. Broken or Unknown auth_types are not valid for use... */ int authenticateValidateUser(auth_user_request_t * auth_user_request) { debug(29, 9) ("authenticateValidateUser: Validating Auth_user request '%p'.\n", auth_user_request); if (auth_user_request == NULL) { debug(29, 4) ("authenticateValidateUser: Auth_user_request was NULL!\n"); return 0; } if (auth_user_request->auth_user == NULL) { debug(29, 4) ("authenticateValidateUser: No associated auth_user structure\n"); return 0; } if (auth_user_request->auth_user->auth_type == AUTH_UNKNOWN) { debug(29, 4) ("authenticateValidateUser: Auth_user '%p' uses unknown scheme.\n", auth_user_request->auth_user); return 0; } if (auth_user_request->auth_user->auth_type == AUTH_BROKEN) { debug(29, 4) ("authenticateValidateUser: Auth_user '%p' is broken for it's scheme.\n", auth_user_request->auth_user); return 0; } if (!auth_user_request->auth_user->scheme_data) { debug(29, 4) ("authenticateValidateUser: auth_user '%p' has no scheme data\n", auth_user_request->auth_user); return 0; } /* any other sanity checks that we need in the future */ /* Thus should a module call to something like authValidate */ /* finally return ok */ debug(29, 5) ("authenticateValidateUser: Validated Auth_user request '%p'.\n", auth_user_request); return 1; } auth_user_t * authenticateAuthUserNew(const char *scheme) { auth_user_t *temp_auth; temp_auth = memAllocate(MEM_AUTH_USER_T); assert(temp_auth != NULL); memset(temp_auth, '\0', sizeof(auth_user_t)); temp_auth->auth_type = AUTH_UNKNOWN; temp_auth->references = 0; temp_auth->auth_module = authenticateAuthSchemeId(scheme) + 1; temp_auth->usernamehash = NULL; return temp_auth; } static auth_user_request_t * authenticateAuthUserRequestNew(void) { auth_user_request_t *temp_request; if (!auth_user_request_pool) auth_user_request_pool = memPoolCreate("Authenticate Request Data", sizeof(auth_user_request_t)); temp_request = memPoolAlloc(auth_user_request_pool); assert(temp_request != NULL); memset(temp_request, '\0', sizeof(auth_user_request_t)); return temp_request; } static void authenticateAuthUserRequestFree(auth_user_request_t * auth_user_request) { dlink_node *link; debug(29, 5) ("authenticateAuthUserRequestFree: freeing request %p\n", auth_user_request); if (!auth_user_request) return; assert(auth_user_request->references == 0); if (auth_user_request->auth_user) { if (auth_user_request->scheme_data != NULL) { /* we MUST know the module */ assert((auth_user_request->auth_user->auth_module > 0)); /* and the module MUST support requestFree if it has created scheme data */ assert(authscheme_list[auth_user_request->auth_user->auth_module - 1].requestFree != NULL); authscheme_list[auth_user_request->auth_user->auth_module - 1].requestFree(auth_user_request); } /* unlink from the auth_user struct */ link = auth_user_request->auth_user->requests.head; while (link && (link->data != auth_user_request)) link = link->next; assert(link != NULL); dlinkDelete(link, &auth_user_request->auth_user->requests); dlinkNodeDelete(link); /* unlock the request structure's lock */ authenticateAuthUserUnlock(auth_user_request->auth_user); auth_user_request->auth_user = NULL; } else assert(auth_user_request->scheme_data == NULL); if (auth_user_request->message) xfree(auth_user_request->message); memPoolFree(auth_user_request_pool, auth_user_request); } char * authenticateAuthUserRequestMessage(auth_user_request_t * auth_user_request) { if (auth_user_request) return auth_user_request->message; return NULL; } static inline void authenticateAuthUserRemoveIpEntry(auth_user_t * auth_user, auth_user_ip_t * ipdata) { /* remove the node */ dlinkDelete(&ipdata->node, &auth_user->ip_list); authenticateAuthUserRequestUnlinkIp(ipdata->ipaddr); cbdataFree(ipdata); /* catch incipient underflow */ assert(auth_user->ipcount); auth_user->ipcount--; } typedef struct { hash_link hash; /* must be first */ struct in_addr ipaddr; auth_user_request_t *auth_user_request; time_t last_seen; } auth_user_request_ip_hash_t; MemPool *auth_user_request_ip_pool = NULL; hash_table *auth_user_request_ip_hash = NULL; static unsigned int hash_in_addr(const void *a, unsigned int size) { const struct in_addr *ipaddr = a; const uint32_t ip = ntohl(ipaddr->s_addr); return ip % size; } static int cmp_in_addr(const struct in_addr *a, const struct in_addr *b) { const uint32_t ipa = ntohl(a->s_addr); const uint32_t ipb = ntohl(b->s_addr); return memcmp(&ipa, &ipb, 4); } static void authenticateAuthUserRequestUnlinkIp(const struct in_addr ipaddr) { auth_user_request_ip_hash_t *hash_entry; if (!auth_user_request_ip_hash) return; hash_entry = hash_lookup(auth_user_request_ip_hash, &ipaddr); if (hash_entry) { hash_remove_link(auth_user_request_ip_hash, &hash_entry->hash); authenticateAuthUserRequestUnlock(hash_entry->auth_user_request); memPoolFree(auth_user_request_ip_pool, hash_entry); } } static void authenticateAuthUserRequestLinkIp(auth_user_request_t * auth_user_request, const struct in_addr ipaddr, request_t * request) { auth_user_request_ip_hash_t *hash_entry; if (!Config.authenticateIpShortcircuitTTL) return; if (Config.accessList.auth_ip_shortcircuit && !aclCheckFastRequest(Config.accessList.auth_ip_shortcircuit, request)) return; if (!auth_user_request_ip_hash) { auth_user_request_ip_hash = hash_create((HASHCMP *) cmp_in_addr, 7921, hash_in_addr); auth_user_request_ip_pool = memPoolCreate("auth_user_request_ip_hash_t", sizeof(auth_user_request_ip_hash_t)); } authenticateAuthUserRequestUnlinkIp(ipaddr); hash_entry = memPoolAlloc(auth_user_request_ip_pool); hash_entry->ipaddr = ipaddr; hash_entry->hash.key = &hash_entry->ipaddr; hash_entry->auth_user_request = auth_user_request; authenticateAuthUserRequestLock(hash_entry->auth_user_request); hash_entry->last_seen = squid_curtime; hash_join(auth_user_request_ip_hash, &hash_entry->hash); } static auth_user_request_t * authenticateAuthUserRequestFindByIp(const struct in_addr ipaddr) { time_t delta = Config.authenticateIpShortcircuitTTL; auth_user_request_ip_hash_t *hash_entry; auth_user_request_t *auth_user_request = NULL; if (!auth_user_request_ip_hash) return NULL; hash_entry = hash_lookup(auth_user_request_ip_hash, &ipaddr); if (!hash_entry) return NULL; auth_user_request = hash_entry->auth_user_request; if (hash_entry->last_seen + delta < squid_curtime) { authenticateAuthUserRequestUnlinkIp(ipaddr); return NULL; } return hash_entry->auth_user_request; } static void authenticateAuthUserRequestSetIp(auth_user_request_t * auth_user_request, struct in_addr ipaddr, request_t * request) { auth_user_ip_t *ipdata, *next; auth_user_t *auth_user; char *ip1; int found = 0; CBDATA_INIT_TYPE(auth_user_ip_t); if (!auth_user_request->auth_user) return; auth_user = auth_user_request->auth_user; next = (auth_user_ip_t *) auth_user->ip_list.head; /* * we walk the entire list to prevent the first item in the list * preventing old entries being flushed and locking a user out after * a timeout+reconfigure */ while ((ipdata = next) != NULL) { next = (auth_user_ip_t *) ipdata->node.next; /* walk the ip list */ if (ipdata->ipaddr.s_addr == ipaddr.s_addr) { /* This ip has already been seen. */ found = 1; /* update IP ttl */ ipdata->ip_expiretime = squid_curtime; } else if (ipdata->ip_expiretime + Config.authenticateIpTTL < squid_curtime) { /* This IP has expired - remove from the seen list */ authenticateAuthUserRemoveIpEntry(auth_user, ipdata); } } authenticateAuthUserRequestLinkIp(auth_user_request, ipaddr, request); if (found) return; /* This ip is not in the seen list */ ipdata = cbdataAlloc(auth_user_ip_t); ipdata->ip_expiretime = squid_curtime; ipdata->ipaddr = ipaddr; dlinkAddTail(ipdata, &ipdata->node, &auth_user->ip_list); auth_user->ipcount++; ip1 = xstrdup(inet_ntoa(ipaddr)); debug(29, 2) ("authenticateAuthUserRequestSetIp: user '%s' has been seen at a new IP address (%s)\n", authenticateUserUsername(auth_user), ip1); safe_free(ip1); } void authenticateAuthUserRequestRemoveIp(auth_user_request_t * auth_user_request, struct in_addr ipaddr) { auth_user_ip_t *ipdata; auth_user_t *auth_user; if (!auth_user_request->auth_user) return; auth_user = auth_user_request->auth_user; ipdata = (auth_user_ip_t *) auth_user->ip_list.head; while (ipdata) { /* walk the ip list */ if (ipdata->ipaddr.s_addr == ipaddr.s_addr) { authenticateAuthUserRemoveIpEntry(auth_user, ipdata); return; } ipdata = (auth_user_ip_t *) ipdata->node.next; } } static void authenticateAuthUserClearIp(auth_user_t * auth_user) { auth_user_ip_t *ipdata, *next; if (!auth_user) return; next = (auth_user_ip_t *) auth_user->ip_list.head; while ((ipdata = next) != NULL) { next = (auth_user_ip_t *) ipdata->node.next; authenticateAuthUserRemoveIpEntry(auth_user, ipdata); } /* integrity check */ assert(auth_user->ipcount == 0); } void authenticateAuthUserRequestClearIp(auth_user_request_t * auth_user_request) { if (auth_user_request) authenticateAuthUserClearIp(auth_user_request->auth_user); } int authenticateAuthUserRequestIPCount(auth_user_request_t * auth_user_request) { assert(auth_user_request); assert(auth_user_request->auth_user); return auth_user_request->auth_user->ipcount; } /* Get Auth User: Return a filled out auth_user structure for the given * Proxy Auth (or Auth) header. It may be a cached Auth User or a new * Unauthenticated structure. The structure is given an inital lock here. */ static auth_user_request_t * authenticateGetAuthUser(const char *proxy_auth) { auth_user_request_t *auth_user_request = authenticateAuthUserRequestNew(); /* and lock for the callers instance */ authenticateAuthUserRequestLock(auth_user_request); /* The scheme is allowed to provide a cached auth_user or a new one */ authenticateDecodeAuth(proxy_auth, auth_user_request); return auth_user_request; } /* * authenticateUserAuthenticated: is this auth_user structure logged in ? */ int authenticateUserAuthenticated(auth_user_request_t * auth_user_request) { if (!authenticateValidateUser(auth_user_request)) return 0; if (auth_user_request->lastReply == AUTH_AUTHENTICATED) return 1; if (auth_user_request->auth_user->auth_module > 0) return authscheme_list[auth_user_request->auth_user->auth_module - 1].authenticated(auth_user_request); else return 0; } /* * authenticateAuthenticateUser: call the module specific code to * log this user request in. * Cache hits may change the auth_user pointer in the structure if needed. * This is basically a handle approach. */ static void authenticateAuthenticateUser(auth_user_request_t * auth_user_request, request_t * request, ConnStateData * conn, http_hdr_type type) { assert(auth_user_request != NULL); if (auth_user_request->auth_user->auth_module > 0) authscheme_list[auth_user_request->auth_user->auth_module - 1].authAuthenticate(auth_user_request, request, conn, type); } static auth_user_request_t * authTryGetUser(auth_user_request_t ** auth_user_request, ConnStateData * conn, request_t * request) { if (*auth_user_request) return *auth_user_request; else if (request && request->auth_user_request) return request->auth_user_request; else if (conn && conn->auth_user_request) return conn->auth_user_request; else { request->auth_user_request = authenticateAuthUserRequestFindByIp(request->client_addr); if (request->auth_user_request) authenticateAuthUserRequestLock(request->auth_user_request); return request->auth_user_request; } } /* returns one of * AUTH_ACL_CHALLENGE, * AUTH_ACL_HELPER, * AUTH_ACL_CANNOT_AUTHENTICATE, * AUTH_AUTHENTICATED * * How to use: In your proxy-auth dependent acl code, use the following * construct: * int rv; * if ((rv = AuthenticateAuthenticate()) != AUTH_AUTHENTICATED) * return rv; * * when this code is reached, the request/connection is authenticated. * * if you have non-acl code, but want to force authentication, you need a * callback mechanism like the acl testing routines that will send a 40[1|7] to * the client when rv==AUTH_ACL_CHALLENGE, and will communicate with * the authenticateStart routine for rv==AUTH_ACL_HELPER */ auth_acl_t authenticateAuthenticate(auth_user_request_t ** auth_user_request, http_hdr_type headertype, request_t * request, ConnStateData * conn, struct in_addr src_addr) { const char *proxy_auth; assert(headertype != 0); proxy_auth = httpHeaderGetStr(&request->header, headertype); /* * a note on proxy_auth logix here: * proxy_auth==NULL -> unauthenticated request || already * authenticated connection so we test for an authenticated * connection when we recieve no authentication header. */ if (((proxy_auth == NULL) && (!authenticateUserAuthenticated(authTryGetUser(auth_user_request, conn, request)))) || (conn && conn->auth_type == AUTH_BROKEN)) { /* no header or authentication failed/got corrupted - restart */ if (conn) conn->auth_type = AUTH_UNKNOWN; debug(29, 4) ("authenticateAuthenticate: broken auth or no proxy_auth header. Requesting auth header.\n"); /* something wrong with the AUTH credentials. Force a new attempt */ if (conn && conn->auth_user_request) { authenticateAuthUserRequestUnlock(conn->auth_user_request); conn->auth_user_request = NULL; } if (*auth_user_request) { /* unlock the ACL lock */ authenticateAuthUserRequestUnlock(*auth_user_request); *auth_user_request = NULL; } return AUTH_ACL_CHALLENGE; } #if 0 /* * Is this an already authenticated connection with a new auth header? * No check for function required in the if: its compulsory for conn based * auth modules */ if (proxy_auth && conn && conn->auth_user_request && authenticateUserAuthenticated(conn->auth_user_request) && strcmp(proxy_auth, authscheme_list[conn->auth_user_request->auth_user->auth_module - 1].authConnLastHeader(conn->auth_user_request))) { debug(29, 2) ("authenticateAuthenticate: DUPLICATE AUTH - authentication header on already authenticated connection!. AU %p, Current user '%s' proxy_auth %s\n", conn->auth_user_request, authenticateUserRequestUsername(conn->auth_user_request), proxy_auth); /* remove this request struct - the link is already authed and it can't be to * reauth. */ /* This should _only_ ever occur on the first pass through * authenticateAuthenticate */ assert(*auth_user_request == NULL); /* unlock the conn lock on the auth_user_request */ authenticateAuthUserRequestUnlock(conn->auth_user_request); /* mark the conn as non-authed. */ conn->auth_user_request = NULL; /* Set the connection auth type */ conn->auth_type = AUTH_UNKNOWN; } #endif /* we have a proxy auth header and as far as we know this connection has * not had bungled connection oriented authentication happen on it. */ debug(29, 9) ("authenticateAuthenticate: header %s.\n", proxy_auth ? proxy_auth : NULL); if (*auth_user_request == NULL) { debug(29, 9) ("authenticateAuthenticate: This is a new checklist test on FD:%d\n", conn ? conn->fd : -1); if (proxy_auth && !request->auth_user_request && conn && conn->auth_user_request) { int id = authenticateAuthSchemeId(proxy_auth) + 1; if (!conn->auth_user_request->auth_user || conn->auth_user_request->auth_user->auth_module != id) { debug(29, 1) ("authenticateAuthenticate: Unexpected change of authentication scheme from '%s' to '%s' (client %s)\n", authscheme_list[conn->auth_user_request->auth_user->auth_module - 1].typestr, proxy_auth, inet_ntoa(src_addr)); authenticateAuthUserRequestUnlock(conn->auth_user_request); conn->auth_user_request = NULL; conn->auth_type = AUTH_UNKNOWN; } } if ((!request->auth_user_request) && (!conn || conn->auth_type == AUTH_UNKNOWN)) { /* beginning of a new request check */ debug(29, 4) ("authenticateAuthenticate: no connection authentication type\n"); if (!authenticateValidateUser(*auth_user_request = authenticateGetAuthUser(proxy_auth))) { /* the decode might have left a username for logging, or a message to * the user */ if (authenticateUserRequestUsername(*auth_user_request)) { /* lock the user for the request structure link */ authenticateAuthUserRequestLock(*auth_user_request); request->auth_user_request = *auth_user_request; } /* unlock the ACL reference granted by ...GetAuthUser. */ authenticateAuthUserRequestUnlock(*auth_user_request); *auth_user_request = NULL; return AUTH_ACL_CHALLENGE; } /* the user_request comes prelocked for the caller to GetAuthUser (us) */ } else if (request->auth_user_request) { *auth_user_request = request->auth_user_request; /* lock the user request for this ACL processing */ authenticateAuthUserRequestLock(*auth_user_request); } else { assert(conn); if (conn->auth_user_request != NULL) { *auth_user_request = conn->auth_user_request; /* lock the user request for this ACL processing */ authenticateAuthUserRequestLock(*auth_user_request); } else { /* failed connection based authentication */ debug(29, 4) ("authenticateAuthenticate: Auth user request %p conn-auth user request %p conn type %d authentication failed.\n", *auth_user_request, conn->auth_user_request, conn->auth_type); if (*auth_user_request) { authenticateAuthUserRequestUnlock(*auth_user_request); *auth_user_request = NULL; } return AUTH_ACL_CHALLENGE; } } } if (!authenticateUserAuthenticated(*auth_user_request)) { /* User not logged in. Log them in */ authenticateAuthenticateUser(*auth_user_request, request, conn, headertype); switch (authenticateDirection(*auth_user_request)) { case 1: if (!request->auth_user_request) { /* lock the user for the request structure link */ authenticateAuthUserRequestLock(*auth_user_request); request->auth_user_request = *auth_user_request; } /* fallthrough to -2 */ case -2: /* this ACL check is finished. Unlock. */ authenticateAuthUserRequestUnlock(*auth_user_request); *auth_user_request = NULL; return AUTH_ACL_CHALLENGE; case -1: /* we are partway through authentication within squid, * the *auth_user_request variables stores the auth_user_request * for the callback to here - Do not Unlock */ return AUTH_ACL_HELPER; } /* on 0 the authentication is finished - fallthrough */ /* See if user authentication failed for some reason */ if (!authenticateUserAuthenticated(*auth_user_request)) { if ((authenticateUserRequestUsername(*auth_user_request))) { if (!request->auth_user_request) { /* lock the user for the request structure link */ authenticateAuthUserRequestLock(*auth_user_request); request->auth_user_request = *auth_user_request; } } /* this ACL check is finished. Unlock. */ authenticateAuthUserRequestUnlock(*auth_user_request); *auth_user_request = NULL; return AUTH_ACL_CHALLENGE; } } /* copy username to request for logging on client-side */ /* the credentials are correct at this point */ if (!request->auth_user_request) { /* lock the user for the request structure link */ authenticateAuthUserRequestLock(*auth_user_request); request->auth_user_request = *auth_user_request; authenticateAuthUserRequestSetIp(*auth_user_request, src_addr, request); } /* Unlock the request - we've authenticated it */ authenticateAuthUserRequestUnlock(*auth_user_request); *auth_user_request = NULL; return AUTH_AUTHENTICATED; } auth_acl_t authenticateTryToAuthenticateAndSetAuthUser(auth_user_request_t ** auth_user_request, http_hdr_type headertype, request_t * request, ConnStateData * conn, struct in_addr src_addr) { /* If we have already been called, return the cached value */ auth_user_request_t *t = authTryGetUser(auth_user_request, conn, request); auth_acl_t result; if (t && t->lastReply != AUTH_ACL_CANNOT_AUTHENTICATE && t->lastReply != AUTH_ACL_HELPER) { if (!*auth_user_request) { *auth_user_request = t; authenticateAuthUserRequestLock(*auth_user_request); } if (!request->auth_user_request && t->lastReply == AUTH_AUTHENTICATED) { request->auth_user_request = t; authenticateAuthUserRequestLock(request->auth_user_request); } return t->lastReply; } /* ok, call the actual authenticator routine. */ result = authenticateAuthenticate(auth_user_request, headertype, request, conn, src_addr); t = authTryGetUser(auth_user_request, conn, request); if (t && result != AUTH_ACL_CANNOT_AUTHENTICATE && result != AUTH_ACL_HELPER) { t->lastReply = result; } return result; } /* authenticateUserUsername: return a pointer to the username in the */ char * authenticateUserUsername(auth_user_t * auth_user) { if (!auth_user) return NULL; if (auth_user->auth_module > 0) return authscheme_list[auth_user->auth_module - 1].authUserUsername(auth_user); return NULL; } /* authenticateUserRequestUsername: return a pointer to the username in the */ char * authenticateUserRequestUsername(auth_user_request_t * auth_user_request) { assert(auth_user_request != NULL); if (auth_user_request->auth_user) return authenticateUserUsername(auth_user_request->auth_user); else return NULL; } /* returns * 0: no output needed * 1: send to client * -1: send to helper * -2: authenticate broken in some fashion */ int authenticateDirection(auth_user_request_t * auth_user_request) { if (!auth_user_request) return -2; if (authenticateUserAuthenticated(auth_user_request)) return 0; if (auth_user_request->auth_user->auth_module > 0) return authscheme_list[auth_user_request->auth_user->auth_module - 1].getdirection(auth_user_request); return -2; } int authenticateActiveSchemeCount(void) { int i = 0, rv = 0; for (i = 0; authscheme_list && authscheme_list[i].typestr; i++) if (authscheme_list[i].configured()) rv++; debug(29, 9) ("authenticateActiveSchemeCount: %d active.\n", rv); return rv; } int authenticateSchemeCount(void) { int i = 0, rv = 0; for (i = 0; authscheme_list && authscheme_list[i].typestr; i++) rv++; debug(29, 9) ("authenticateSchemeCount: %d active.\n", rv); return rv; } void authenticateSchemeInit(void) { authSchemeSetup(); } void authenticateConfigure(authConfig * config) { int i; authScheme *scheme; for (i = 0; i < config->n_configured; i++) { scheme = config->schemes + i; if (authscheme_list[scheme->Id].checkconfig && authscheme_list[scheme->Id].configured()) { authscheme_list[scheme->Id].checkconfig(scheme); } } } void authenticateInit(authConfig * config) { int i; authScheme *scheme; for (i = 0; i < config->n_configured; i++) { scheme = config->schemes + i; if (authscheme_list[scheme->Id].init && authscheme_list[scheme->Id].configured()) { authscheme_list[scheme->Id].init(scheme); } } if (!proxy_auth_username_cache) authenticateInitUserCache(); } void authenticateShutdown(void) { int i; debug(29, 2) ("authenticateShutdown: shutting down auth schemes\n"); /* find the currently known authscheme types */ for (i = 0; authscheme_list && authscheme_list[i].typestr; i++) { if (authscheme_list[i].donefunc != NULL) authscheme_list[i].donefunc(); else debug(29, 2) ("authenticateShutdown: scheme %s has not registered a shutdown function.\n", authscheme_list[i].typestr); if (shutting_down) authscheme_list[i].typestr = NULL; } } void authenticateFixHeader(HttpReply * rep, auth_user_request_t * auth_user_request, request_t * request, int accelerated, int internal) /* send the auth types we are configured to support (and have compiled in!) */ { int type = 0; switch (rep->sline.status) { case HTTP_PROXY_AUTHENTICATION_REQUIRED: /* Proxy authorisation needed */ type = HDR_PROXY_AUTHENTICATE; break; case HTTP_UNAUTHORIZED: /* WWW Authorisation needed */ type = HDR_WWW_AUTHENTICATE; break; default: /* Keep GCC happy */ /* some other HTTP status */ break; } debug(29, 9) ("authenticateFixHeader: headertype:%d authuser:%p\n", type, auth_user_request); if (((rep->sline.status == HTTP_PROXY_AUTHENTICATION_REQUIRED) || (rep->sline.status == HTTP_UNAUTHORIZED)) && internal) /* this is a authenticate-needed response */ { if ((auth_user_request != NULL) && (auth_user_request->auth_user->auth_module > 0) && authenticateDirection(auth_user_request) == 1) authscheme_list[auth_user_request->auth_user->auth_module - 1].authFixHeader(auth_user_request, rep, type, request); else { int i; authScheme *scheme; /* call each configured & running authscheme */ for (i = 0; i < Config.authConfig.n_configured; i++) { scheme = Config.authConfig.schemes + i; if (authscheme_list[scheme->Id].Active()) { if (auth_user_request && scheme->Id == auth_user_request->auth_user->auth_module - 1) authscheme_list[scheme->Id].authFixHeader( auth_user_request, rep, type, request); else authscheme_list[scheme->Id].authFixHeader( NULL, rep, type, request); } else { debug(29, 4) ("authenticateFixHeader: Configured scheme %s not Active\n", scheme->typestr); } } } } /* * allow protocol specific headers to be _added_ to the existing * response - ie digest auth */ if ((auth_user_request != NULL) && (auth_user_request->auth_user->auth_module > 0) && (authscheme_list[auth_user_request->auth_user->auth_module - 1].AddHeader)) authscheme_list[auth_user_request->auth_user->auth_module - 1].AddHeader(auth_user_request, rep, accelerated); if (auth_user_request != NULL && auth_user_request->lastReply != AUTH_AUTHENTICATED) auth_user_request->lastReply = AUTH_ACL_CANNOT_AUTHENTICATE; } /* call the active auth module and allow it to add a trailer to the request */ void authenticateAddTrailer(HttpReply * rep, auth_user_request_t * auth_user_request, request_t * request, int accelerated) { if ((auth_user_request != NULL) && (auth_user_request->auth_user->auth_module > 0) && (authscheme_list[auth_user_request->auth_user->auth_module - 1].AddTrailer)) authscheme_list[auth_user_request->auth_user->auth_module - 1].AddTrailer(auth_user_request, rep, accelerated); } void authenticateAuthUserLock(auth_user_t * auth_user) { debug(29, 9) ("authenticateAuthUserLock auth_user '%p'.\n", auth_user); assert(auth_user != NULL); auth_user->references++; debug(29, 9) ("authenticateAuthUserLock auth_user '%p' now at '%ld'.\n", auth_user, (long int) auth_user->references); } void authenticateAuthUserUnlock(auth_user_t * auth_user) { debug(29, 9) ("authenticateAuthUserUnlock auth_user '%p'.\n", auth_user); assert(auth_user != NULL); if (auth_user->references > 0) { auth_user->references--; } else { fatalf("Attempt to lower Auth User %p refcount below 0!\n", auth_user); } debug(29, 9) ("authenticateAuthUserUnlock auth_user '%p' now at '%ld'.\n", auth_user, (long int) auth_user->references); if (auth_user->references == 0) authenticateFreeProxyAuthUser(auth_user); } void authenticateAuthUserRequestLock(auth_user_request_t * auth_user_request) { debug(29, 9) ("authenticateAuthUserRequestLock auth_user request '%p'.\n", auth_user_request); assert(auth_user_request != NULL); auth_user_request->references++; debug(29, 9) ("authenticateAuthUserRequestLock auth_user request '%p' now at '%ld'.\n", auth_user_request, (long int) auth_user_request->references); } void authenticateAuthUserRequestUnlock(auth_user_request_t * auth_user_request) { debug(29, 9) ("authenticateAuthUserRequestUnlock auth_user request '%p'.\n", auth_user_request); assert(auth_user_request != NULL); if (auth_user_request->references > 0) { auth_user_request->references--; } else { debug(29, 1) ("Attempt to lower Auth User request %p refcount below 0!\n", auth_user_request); } debug(29, 9) ("authenticateAuthUserRequestUnlock auth_user_request '%p' now at '%ld'.\n", auth_user_request, (long int) auth_user_request->references); if (auth_user_request->references == 0) { /* not locked anymore */ authenticateAuthUserRequestFree(auth_user_request); } } int authenticateAuthUserInuse(auth_user_t * auth_user) /* returns 0 for not in use */ { assert(auth_user != NULL); return auth_user->references; } /* * Combine two user structs. ONLY to be called from within a scheme * module. The scheme module is responsible for ensuring that the * two users _can_ be merged without invalidating all the request * scheme data. the scheme is also responsible for merging any user * related scheme data itself. */ void authenticateAuthUserMerge(auth_user_t * from, auth_user_t * to) { dlink_node *link, *tmplink; auth_user_request_t *auth_user_request; /* * XXX combine two authuser structs. Incomplete: it should merge * in hash references too and ask the module to merge in scheme * data */ debug(29, 5) ("authenticateAuthUserMerge auth_user '%p' into auth_user '%p'.\n", from, to); link = from->requests.head; while (link) { auth_user_request = link->data; tmplink = link; link = link->next; dlinkDelete(tmplink, &from->requests); dlinkAddTail(auth_user_request, tmplink, &to->requests); auth_user_request->auth_user = to; } to->references += from->references; from->references = 0; authenticateFreeProxyAuthUser(from); } void authenticateFreeProxyAuthUser(void *data) { auth_user_t *u = data; auth_user_request_t *auth_user_request; dlink_node *link, *tmplink; assert(data != NULL); debug(29, 5) ("authenticateFreeProxyAuthUser: Freeing auth_user '%p' with refcount '%ld'.\n", u, (long int) u->references); assert(u->references == 0); /* were they linked in by username ? */ if (u->usernamehash) { assert(u->usernamehash->auth_user == u); debug(29, 5) ("authenticateFreeProxyAuthUser: removing usernamehash entry '%p'\n", u->usernamehash); hash_remove_link(proxy_auth_username_cache, (hash_link *) u->usernamehash); /* don't free the key as we use the same user string as the auth_user * structure */ memFree(u->usernamehash, MEM_AUTH_USER_HASH); } /* remove any outstanding requests */ link = u->requests.head; while (link) { debug(29, 5) ("authenticateFreeProxyAuthUser: removing request entry '%p'\n", link->data); auth_user_request = link->data; tmplink = link; link = link->next; dlinkDelete(tmplink, &u->requests); dlinkNodeDelete(tmplink); authenticateAuthUserRequestFree(auth_user_request); } /* free cached acl results */ aclCacheMatchFlush(&u->proxy_match_cache); /* free seen ip address's */ authenticateAuthUserClearIp(u); if (u->scheme_data && u->auth_module > 0) authscheme_list[u->auth_module - 1].FreeUser(u); /* prevent accidental reuse */ u->auth_type = AUTH_UNKNOWN; memFree(u, MEM_AUTH_USER_T); } void authenticateInitUserCache(void) { if (!proxy_auth_username_cache) { /* First time around, 7921 should be big enough */ proxy_auth_username_cache = hash_create((HASHCMP *) strcmp, 7921, hash_string); assert(proxy_auth_username_cache); eventAdd("User Cache Maintenance", authenticateProxyUserCacheCleanup, NULL, Config.authenticateGCInterval, 1); } } void authenticateProxyUserCacheCleanup(void *datanotused) { /* * We walk the hash by username as that is the unique key we use. * For big hashs we could consider stepping through the cache, 100/200 * entries at a time. Lets see how it flys first. */ auth_user_hash_pointer *usernamehash; auth_user_t *auth_user; char *username = NULL; debug(29, 3) ("authenticateProxyUserCacheCleanup: Cleaning the user cache now\n"); debug(29, 3) ("authenticateProxyUserCacheCleanup: Current time: %ld\n", (long int) current_time.tv_sec); hash_first(proxy_auth_username_cache); while ((usernamehash = ((auth_user_hash_pointer *) hash_next(proxy_auth_username_cache)))) { auth_user = usernamehash->auth_user; username = authenticateUserUsername(auth_user); /* if we need to have inpedendent expiry clauses, insert a module call * here */ debug(29, 4) ("authenticateProxyUserCacheCleanup: Cache entry:\n\tType: %d\n\tUsername: %s\n\texpires: %ld\n\treferences: %ld\n", auth_user->auth_type, username, (long int) (auth_user->expiretime + Config.authenticateTTL), (long int) auth_user->references); if (auth_user->expiretime + Config.authenticateTTL <= current_time.tv_sec) { debug(29, 5) ("authenticateProxyUserCacheCleanup: Removing user %s from cache due to timeout.\n", username); /* the minus 1 accounts for the cache lock */ if ((authenticateAuthUserInuse(auth_user) - 1)) debug(29, 4) ("authenticateProxyUserCacheCleanup: this cache entry has expired AND has a non-zero ref count.\n"); else authenticateAuthUserUnlock(auth_user); } } debug(29, 3) ("authenticateProxyUserCacheCleanup: Finished cleaning the user cache.\n"); eventAdd("User Cache Maintenance", authenticateProxyUserCacheCleanup, NULL, Config.authenticateGCInterval, 1); } /* * authenticateUserCacheRestart() cleans all config-dependent data from the * auth_user cache. It DOES NOT Flush the user cache. */ void authenticateUserCacheRestart(void) { auth_user_hash_pointer *usernamehash; auth_user_t *auth_user; char *username = NULL; debug(29, 3) ("authenticateUserCacheRestart: Clearing config dependent cache data.\n"); hash_first(proxy_auth_username_cache); while ((usernamehash = ((auth_user_hash_pointer *) hash_next(proxy_auth_username_cache)))) { auth_user = usernamehash->auth_user; username = authenticateUserUsername(auth_user); debug(29, 5) ("authenticateUserCacheRestart: Clearing cache ACL results for user: %s\n", username); aclCacheMatchFlush(&auth_user->proxy_match_cache); } } /* * called to add another auth scheme module */ void authSchemeAdd(const char *type, AUTHSSETUP * setup) { int i; debug(29, 4) ("authSchemeAdd: adding %s\n", type); /* find the number of currently known authscheme types */ for (i = 0; authscheme_list && authscheme_list[i].typestr; i++) { assert(strcmp(authscheme_list[i].typestr, type) != 0); } /* add the new type */ authscheme_list = xrealloc(authscheme_list, (i + 2) * sizeof(authscheme_entry_t)); memset(&authscheme_list[i], 0, sizeof(authscheme_entry_t)); memset(&authscheme_list[i + 1], 0, sizeof(authscheme_entry_t)); authscheme_list[i].typestr = type; /* Call the scheme module to set up capabilities and initialize any global data */ setup(&authscheme_list[i]); } /* UserNameCacheAdd: add a auth_user structure to the username cache */ void authenticateUserNameCacheAdd(auth_user_t * auth_user) { auth_user_hash_pointer *usernamehash; usernamehash = memAllocate(MEM_AUTH_USER_HASH); usernamehash->key = authenticateUserUsername(auth_user); usernamehash->auth_user = auth_user; hash_join(proxy_auth_username_cache, (hash_link *) usernamehash); auth_user->usernamehash = usernamehash; /* lock for presence in the cache */ authenticateAuthUserLock(auth_user); }