/* * AUTHOR: Arjan de Vet * * Example authentication program for Squid, based on the original * proxy_auth code from client_side.c, written by * Jon Thackray . * * Uses a NCSA httpd style password file for authentication with the * following improvements suggested by various people: * * - comment lines are possible and should start with a '#'; * - empty or blank lines are possible; * - extra fields in the password file are ignored; this makes it * possible to use a Unix password file but I do not recommend that. * * MD5 without salt and magic strings - Added by Ramon de Carvalho and Rodrigo Rubira Branco */ #include "squid.h" #include "crypt_md5.h" #include "hash.h" #include "helpers/defines.h" #include "rfc1738.h" #include "util.h" #if HAVE_STDIO_H #include #endif #if HAVE_UNISTD_H #include #endif #if HAVE_STRING_H #include #endif #if HAVE_SYS_STAT_H #include #endif #if HAVE_CRYPT_H #include #endif #if HAVE_ERRNO_H #include #endif static hash_table *hash = NULL; static HASHFREE my_free; typedef struct _user_data { /* first two items must be same as hash_link */ char *user; struct _user_data *next; char *passwd; } user_data; static void my_free(void *p) { user_data *u = static_cast(p); xfree(u->user); xfree(u->passwd); xfree(u); } static void read_passwd_file(const char *passwdfile) { FILE *f; char buf[HELPER_INPUT_BUFFER]; user_data *u; char *user; char *passwd; if (hash != NULL) { hashFreeItems(hash, my_free); hashFreeMemory(hash); } /* initial setup */ hash = hash_create((HASHCMP *) strcmp, 7921, hash_string); if (NULL == hash) { fprintf(stderr, "FATAL: Cannot create hash table\n"); exit(1); } f = fopen(passwdfile, "r"); if (NULL == f) { fprintf(stderr, "FATAL: %s: %s\n", passwdfile, xstrerror()); exit(1); } unsigned int lineCount = 0; buf[HELPER_INPUT_BUFFER-1] = '\0'; while (fgets(buf, sizeof(buf)-1, f) != NULL) { ++lineCount; if ((buf[0] == '#') || (buf[0] == ' ') || (buf[0] == '\t') || (buf[0] == '\n')) continue; user = strtok(buf, ":\n\r"); if (user == NULL) { fprintf(stderr, "ERROR: Missing user name at %s line %d\n", passwdfile, lineCount); continue; } passwd = strtok(NULL, ":\n\r"); if ((strlen(user) > 0) && passwd) { u = static_cast(xmalloc(sizeof(*u))); u->user = xstrdup(user); u->passwd = xstrdup(passwd); hash_join(hash, (hash_link *) u); } } fclose(f); } int main(int argc, char **argv) { struct stat sb; time_t change_time = -1; char buf[HELPER_INPUT_BUFFER]; char *user, *passwd, *p; user_data *u; setbuf(stdout, NULL); if (argc != 2) { fprintf(stderr, "Usage: ncsa_auth \n"); exit(1); } if (stat(argv[1], &sb) != 0) { fprintf(stderr, "FATAL: cannot stat %s\n", argv[1]); exit(1); } while (fgets(buf, HELPER_INPUT_BUFFER, stdin) != NULL) { if ((p = strchr(buf, '\n')) != NULL) *p = '\0'; /* strip \n */ if (stat(argv[1], &sb) == 0) { if (sb.st_mtime != change_time) { read_passwd_file(argv[1]); change_time = sb.st_mtime; } } if ((user = strtok(buf, " ")) == NULL) { SEND_ERR(""); continue; } if ((passwd = strtok(NULL, "")) == NULL) { SEND_ERR(""); continue; } rfc1738_unescape(user); rfc1738_unescape(passwd); u = (user_data *) hash_lookup(hash, user); if (u == NULL) { SEND_ERR("No such user"); continue; } char *crypted = NULL; #if HAVE_CRYPT size_t passwordLength = strlen(passwd); // Bug 3831: given algorithms more secure than DES crypt() does not truncate, so we can ignore the bug 3107 length checks below // '$1$' = MD5, '$2a$' = Blowfish, '$5$' = SHA256 (Linux), '$6$' = SHA256 (BSD) and SHA512 if (passwordLength > 1 && u->passwd[0] == '$' && (crypted = crypt(passwd, u->passwd)) && strcmp(u->passwd, crypted) == 0) { SEND_OK(""); continue; } // 'other' prefixes indicate DES algorithm. if (passwordLength <= 8 && (crypted = crypt(passwd, u->passwd)) && (strcmp(u->passwd, crypted) == 0)) { SEND_OK(""); continue; } if (passwordLength > 8 && (crypted = crypt(passwd, u->passwd)) && (strcmp(u->passwd, crypted) == 0)) { // Bug 3107: crypt() DES functionality silently truncates long passwords. SEND_ERR("Password too long. Only 8 characters accepted."); continue; } #endif if ( (crypted = crypt_md5(passwd, u->passwd)) && strcmp(u->passwd, crypted) == 0) { SEND_OK(""); continue; } if ( (crypted = md5sum(passwd)) && strcmp(u->passwd, crypted) == 0) { SEND_OK(""); continue; } SEND_ERR("Wrong password"); } if (hash != NULL) { hashFreeItems(hash, my_free); hashFreeMemory(hash); } exit(0); }