curl_ntlm_wb.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393
  1. /***************************************************************************
  2. * _ _ ____ _
  3. * Project ___| | | | _ \| |
  4. * / __| | | | |_) | |
  5. * | (__| |_| | _ <| |___
  6. * \___|\___/|_| \_\_____|
  7. *
  8. * Copyright (C) 1998 - 2014, Daniel Stenberg, <daniel@haxx.se>, et al.
  9. *
  10. * This software is licensed as described in the file COPYING, which
  11. * you should have received as part of this distribution. The terms
  12. * are also available at http://curl.haxx.se/docs/copyright.html.
  13. *
  14. * You may opt to use, copy, modify, merge, publish, distribute and/or sell
  15. * copies of the Software, and permit persons to whom the Software is
  16. * furnished to do so, under the terms of the COPYING file.
  17. *
  18. * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
  19. * KIND, either express or implied.
  20. *
  21. ***************************************************************************/
  22. #include "curl_setup.h"
  23. #if defined(USE_NTLM) && defined(NTLM_WB_ENABLED)
  24. /*
  25. * NTLM details:
  26. *
  27. * http://davenport.sourceforge.net/ntlm.html
  28. * http://www.innovation.ch/java/ntlm.html
  29. */
  30. #define DEBUG_ME 0
  31. #ifdef HAVE_SYS_WAIT_H
  32. #include <sys/wait.h>
  33. #endif
  34. #ifdef HAVE_SIGNAL_H
  35. #include <signal.h>
  36. #endif
  37. #include "urldata.h"
  38. #include "sendf.h"
  39. #include "select.h"
  40. #include "curl_ntlm_msgs.h"
  41. #include "curl_ntlm_wb.h"
  42. #include "url.h"
  43. #include "strerror.h"
  44. #include "curl_memory.h"
  45. #define _MPRINTF_REPLACE /* use our functions only */
  46. #include <curl/mprintf.h>
  47. /* The last #include file should be: */
  48. #include "memdebug.h"
  49. #if DEBUG_ME
  50. # define DEBUG_OUT(x) x
  51. #else
  52. # define DEBUG_OUT(x) Curl_nop_stmt
  53. #endif
  54. /* Portable 'sclose_nolog' used only in child process instead of 'sclose'
  55. to avoid fooling the socket leak detector */
  56. #if defined(HAVE_CLOSESOCKET)
  57. # define sclose_nolog(x) closesocket((x))
  58. #elif defined(HAVE_CLOSESOCKET_CAMEL)
  59. # define sclose_nolog(x) CloseSocket((x))
  60. #else
  61. # define sclose_nolog(x) close((x))
  62. #endif
  63. void Curl_ntlm_wb_cleanup(struct connectdata *conn)
  64. {
  65. if(conn->ntlm_auth_hlpr_socket != CURL_SOCKET_BAD) {
  66. sclose(conn->ntlm_auth_hlpr_socket);
  67. conn->ntlm_auth_hlpr_socket = CURL_SOCKET_BAD;
  68. }
  69. if(conn->ntlm_auth_hlpr_pid) {
  70. int i;
  71. for(i = 0; i < 4; i++) {
  72. pid_t ret = waitpid(conn->ntlm_auth_hlpr_pid, NULL, WNOHANG);
  73. if(ret == conn->ntlm_auth_hlpr_pid || errno == ECHILD)
  74. break;
  75. switch(i) {
  76. case 0:
  77. kill(conn->ntlm_auth_hlpr_pid, SIGTERM);
  78. break;
  79. case 1:
  80. /* Give the process another moment to shut down cleanly before
  81. bringing down the axe */
  82. Curl_wait_ms(1);
  83. break;
  84. case 2:
  85. kill(conn->ntlm_auth_hlpr_pid, SIGKILL);
  86. break;
  87. case 3:
  88. break;
  89. }
  90. }
  91. conn->ntlm_auth_hlpr_pid = 0;
  92. }
  93. Curl_safefree(conn->challenge_header);
  94. conn->challenge_header = NULL;
  95. Curl_safefree(conn->response_header);
  96. conn->response_header = NULL;
  97. }
  98. static CURLcode ntlm_wb_init(struct connectdata *conn, const char *userp)
  99. {
  100. curl_socket_t sockfds[2];
  101. pid_t child_pid;
  102. const char *username;
  103. char *slash, *domain = NULL;
  104. const char *ntlm_auth = NULL;
  105. char *ntlm_auth_alloc = NULL;
  106. int error;
  107. /* Return if communication with ntlm_auth already set up */
  108. if(conn->ntlm_auth_hlpr_socket != CURL_SOCKET_BAD ||
  109. conn->ntlm_auth_hlpr_pid)
  110. return CURLE_OK;
  111. username = userp;
  112. slash = strpbrk(username, "\\/");
  113. if(slash) {
  114. if((domain = strdup(username)) == NULL)
  115. return CURLE_OUT_OF_MEMORY;
  116. slash = domain + (slash - username);
  117. *slash = '\0';
  118. username = username + (slash - domain) + 1;
  119. }
  120. /* For testing purposes, when DEBUGBUILD is defined and environment
  121. variable CURL_NTLM_WB_FILE is set a fake_ntlm is used to perform
  122. NTLM challenge/response which only accepts commands and output
  123. strings pre-written in test case definitions */
  124. #ifdef DEBUGBUILD
  125. ntlm_auth_alloc = curl_getenv("CURL_NTLM_WB_FILE");
  126. if(ntlm_auth_alloc)
  127. ntlm_auth = ntlm_auth_alloc;
  128. else
  129. #endif
  130. ntlm_auth = NTLM_WB_FILE;
  131. if(access(ntlm_auth, X_OK) != 0) {
  132. error = ERRNO;
  133. failf(conn->data, "Could not access ntlm_auth: %s errno %d: %s",
  134. ntlm_auth, error, Curl_strerror(conn, error));
  135. goto done;
  136. }
  137. if(socketpair(AF_UNIX, SOCK_STREAM, 0, sockfds)) {
  138. error = ERRNO;
  139. failf(conn->data, "Could not open socket pair. errno %d: %s",
  140. error, Curl_strerror(conn, error));
  141. goto done;
  142. }
  143. child_pid = fork();
  144. if(child_pid == -1) {
  145. error = ERRNO;
  146. sclose(sockfds[0]);
  147. sclose(sockfds[1]);
  148. failf(conn->data, "Could not fork. errno %d: %s",
  149. error, Curl_strerror(conn, error));
  150. goto done;
  151. }
  152. else if(!child_pid) {
  153. /*
  154. * child process
  155. */
  156. /* Don't use sclose in the child since it fools the socket leak detector */
  157. sclose_nolog(sockfds[0]);
  158. if(dup2(sockfds[1], STDIN_FILENO) == -1) {
  159. error = ERRNO;
  160. failf(conn->data, "Could not redirect child stdin. errno %d: %s",
  161. error, Curl_strerror(conn, error));
  162. exit(1);
  163. }
  164. if(dup2(sockfds[1], STDOUT_FILENO) == -1) {
  165. error = ERRNO;
  166. failf(conn->data, "Could not redirect child stdout. errno %d: %s",
  167. error, Curl_strerror(conn, error));
  168. exit(1);
  169. }
  170. if(domain)
  171. execl(ntlm_auth, ntlm_auth,
  172. "--helper-protocol", "ntlmssp-client-1",
  173. "--use-cached-creds",
  174. "--username", username,
  175. "--domain", domain,
  176. NULL);
  177. else
  178. execl(ntlm_auth, ntlm_auth,
  179. "--helper-protocol", "ntlmssp-client-1",
  180. "--use-cached-creds",
  181. "--username", username,
  182. NULL);
  183. error = ERRNO;
  184. sclose_nolog(sockfds[1]);
  185. failf(conn->data, "Could not execl(). errno %d: %s",
  186. error, Curl_strerror(conn, error));
  187. exit(1);
  188. }
  189. sclose(sockfds[1]);
  190. conn->ntlm_auth_hlpr_socket = sockfds[0];
  191. conn->ntlm_auth_hlpr_pid = child_pid;
  192. Curl_safefree(domain);
  193. Curl_safefree(ntlm_auth_alloc);
  194. return CURLE_OK;
  195. done:
  196. Curl_safefree(domain);
  197. Curl_safefree(ntlm_auth_alloc);
  198. return CURLE_REMOTE_ACCESS_DENIED;
  199. }
  200. static CURLcode ntlm_wb_response(struct connectdata *conn,
  201. const char *input, curlntlm state)
  202. {
  203. ssize_t size;
  204. char buf[NTLM_BUFSIZE];
  205. char *tmpbuf = buf;
  206. size_t len_in = strlen(input);
  207. size_t len_out = sizeof(buf);
  208. while(len_in > 0) {
  209. ssize_t written = swrite(conn->ntlm_auth_hlpr_socket, input, len_in);
  210. if(written == -1) {
  211. /* Interrupted by a signal, retry it */
  212. if(errno == EINTR)
  213. continue;
  214. /* write failed if other errors happen */
  215. goto done;
  216. }
  217. input += written;
  218. len_in -= written;
  219. }
  220. /* Read one line */
  221. while(len_out > 0) {
  222. size = sread(conn->ntlm_auth_hlpr_socket, tmpbuf, len_out);
  223. if(size == -1) {
  224. if(errno == EINTR)
  225. continue;
  226. goto done;
  227. }
  228. else if(size == 0)
  229. goto done;
  230. else if(tmpbuf[size - 1] == '\n') {
  231. tmpbuf[size - 1] = '\0';
  232. goto wrfinish;
  233. }
  234. tmpbuf += size;
  235. len_out -= size;
  236. }
  237. goto done;
  238. wrfinish:
  239. /* Samba/winbind installed but not configured */
  240. if(state == NTLMSTATE_TYPE1 &&
  241. size == 3 &&
  242. buf[0] == 'P' && buf[1] == 'W')
  243. return CURLE_REMOTE_ACCESS_DENIED;
  244. /* invalid response */
  245. if(size < 4)
  246. goto done;
  247. if(state == NTLMSTATE_TYPE1 &&
  248. (buf[0]!='Y' || buf[1]!='R' || buf[2]!=' '))
  249. goto done;
  250. if(state == NTLMSTATE_TYPE2 &&
  251. (buf[0]!='K' || buf[1]!='K' || buf[2]!=' ') &&
  252. (buf[0]!='A' || buf[1]!='F' || buf[2]!=' '))
  253. goto done;
  254. conn->response_header = aprintf("NTLM %.*s", size - 4, buf + 3);
  255. return CURLE_OK;
  256. done:
  257. return CURLE_REMOTE_ACCESS_DENIED;
  258. }
  259. /*
  260. * This is for creating ntlm header output by delegating challenge/response
  261. * to Samba's winbind daemon helper ntlm_auth.
  262. */
  263. CURLcode Curl_output_ntlm_wb(struct connectdata *conn,
  264. bool proxy)
  265. {
  266. /* point to the address of the pointer that holds the string to send to the
  267. server, which is for a plain host or for a HTTP proxy */
  268. char **allocuserpwd;
  269. /* point to the name and password for this */
  270. const char *userp;
  271. /* point to the correct struct with this */
  272. struct ntlmdata *ntlm;
  273. struct auth *authp;
  274. CURLcode res = CURLE_OK;
  275. char *input;
  276. DEBUGASSERT(conn);
  277. DEBUGASSERT(conn->data);
  278. if(proxy) {
  279. allocuserpwd = &conn->allocptr.proxyuserpwd;
  280. userp = conn->proxyuser;
  281. ntlm = &conn->proxyntlm;
  282. authp = &conn->data->state.authproxy;
  283. }
  284. else {
  285. allocuserpwd = &conn->allocptr.userpwd;
  286. userp = conn->user;
  287. ntlm = &conn->ntlm;
  288. authp = &conn->data->state.authhost;
  289. }
  290. authp->done = FALSE;
  291. /* not set means empty */
  292. if(!userp)
  293. userp="";
  294. switch(ntlm->state) {
  295. case NTLMSTATE_TYPE1:
  296. default:
  297. /* Use Samba's 'winbind' daemon to support NTLM authentication,
  298. * by delegating the NTLM challenge/response protocal to a helper
  299. * in ntlm_auth.
  300. * http://devel.squid-cache.org/ntlm/squid_helper_protocol.html
  301. * http://www.samba.org/samba/docs/man/manpages-3/winbindd.8.html
  302. * http://www.samba.org/samba/docs/man/manpages-3/ntlm_auth.1.html
  303. * Preprocessor symbol 'NTLM_WB_ENABLED' is defined when this
  304. * feature is enabled and 'NTLM_WB_FILE' symbol holds absolute
  305. * filename of ntlm_auth helper.
  306. * If NTLM authentication using winbind fails, go back to original
  307. * request handling process.
  308. */
  309. /* Create communication with ntlm_auth */
  310. res = ntlm_wb_init(conn, userp);
  311. if(res)
  312. return res;
  313. res = ntlm_wb_response(conn, "YR\n", ntlm->state);
  314. if(res)
  315. return res;
  316. Curl_safefree(*allocuserpwd);
  317. *allocuserpwd = aprintf("%sAuthorization: %s\r\n",
  318. proxy ? "Proxy-" : "",
  319. conn->response_header);
  320. DEBUG_OUT(fprintf(stderr, "**** Header %s\n ", *allocuserpwd));
  321. Curl_safefree(conn->response_header);
  322. conn->response_header = NULL;
  323. break;
  324. case NTLMSTATE_TYPE2:
  325. input = aprintf("TT %s\n", conn->challenge_header);
  326. if(!input)
  327. return CURLE_OUT_OF_MEMORY;
  328. res = ntlm_wb_response(conn, input, ntlm->state);
  329. free(input);
  330. input = NULL;
  331. if(res)
  332. return res;
  333. Curl_safefree(*allocuserpwd);
  334. *allocuserpwd = aprintf("%sAuthorization: %s\r\n",
  335. proxy ? "Proxy-" : "",
  336. conn->response_header);
  337. DEBUG_OUT(fprintf(stderr, "**** %s\n ", *allocuserpwd));
  338. ntlm->state = NTLMSTATE_TYPE3; /* we sent a type-3 */
  339. authp->done = TRUE;
  340. Curl_ntlm_wb_cleanup(conn);
  341. break;
  342. case NTLMSTATE_TYPE3:
  343. /* connection is already authenticated,
  344. * don't send a header in future requests */
  345. if(*allocuserpwd) {
  346. free(*allocuserpwd);
  347. *allocuserpwd=NULL;
  348. }
  349. authp->done = TRUE;
  350. break;
  351. }
  352. return CURLE_OK;
  353. }
  354. #endif /* USE_NTLM && NTLM_WB_ENABLED */