Config.cc
Go to the documentation of this file.
1 /*
2  * Copyright (C) 1996-2023 The Squid Software Foundation and contributors
3  *
4  * Squid software is distributed under GPLv2+ license and includes
5  * contributions from numerous individuals and organizations.
6  * Please see the COPYING and CONTRIBUTORS files for details.
7  */
8 
9 /* DEBUG: section 29 Authenticator */
10 
11 /* The functions in this file handle authentication.
12  * They DO NOT perform access control or auditing.
13  * See acl.c for access control and client_side.c for auditing */
14 
15 #include "squid.h"
16 #include "auth/basic/Config.h"
17 #include "auth/basic/Scheme.h"
18 #include "auth/basic/User.h"
19 #include "auth/basic/UserRequest.h"
20 #include "auth/CredentialsCache.h"
21 #include "auth/Gadgets.h"
22 #include "auth/State.h"
23 #include "auth/toUtf.h"
24 #include "base64.h"
25 #include "cache_cf.h"
26 #include "helper.h"
27 #include "HttpHeaderTools.h"
28 #include "HttpReply.h"
29 #include "mgr/Registration.h"
30 #include "rfc1738.h"
31 #include "sbuf/SBuf.h"
32 #include "Store.h"
33 #include "util.h"
34 #include "wordlist.h"
35 
36 /* Basic Scheme */
38 
40 
41 static int authbasic_initialised = 0;
42 
43 /*
44  *
45  * Public Functions
46  *
47  */
48 
49 /* internal functions */
50 
51 bool
52 Auth::Basic::Config::active() const
53 {
54  return authbasic_initialised == 1;
55 }
56 
57 bool
58 Auth::Basic::Config::configured() const
59 {
60  if ((authenticateProgram != nullptr) && (authenticateChildren.n_max != 0) && !realm.isEmpty()) {
61  debugs(29, 9, "returning configured");
62  return true;
63  }
64 
65  debugs(29, 9, "returning unconfigured");
66  return false;
67 }
68 
69 const char *
70 Auth::Basic::Config::type() const
71 {
72  return Auth::Basic::Scheme::GetInstance()->type();
73 }
74 
75 void
76 Auth::Basic::Config::fixHeader(Auth::UserRequest::Pointer, HttpReply *rep, Http::HdrType hdrType, HttpRequest *)
77 {
78  if (authenticateProgram) {
79  if (utf8) {
80  debugs(29, 9, "Sending type:" << hdrType << " header: 'Basic realm=\"" << realm << "\", charset=\"UTF-8\"'");
81  httpHeaderPutStrf(&rep->header, hdrType, "Basic realm=\"" SQUIDSBUFPH "\", charset=\"UTF-8\"", SQUIDSBUFPRINT(realm));
82  } else {
83  debugs(29, 9, "Sending type:" << hdrType << " header: 'Basic realm=\"" << realm << "\"'");
84  httpHeaderPutStrf(&rep->header, hdrType, "Basic realm=\"" SQUIDSBUFPH "\"", SQUIDSBUFPRINT(realm));
85  }
86  }
87 }
88 
89 void
90 Auth::Basic::Config::rotateHelpers()
91 {
92  /* schedule closure of existing helpers */
93  if (basicauthenticators) {
95  }
96 
97  /* NP: dynamic helper restart will ensure they start up again as needed. */
98 }
99 
101 void
102 Auth::Basic::Config::done()
103 {
105 
107 
108  if (basicauthenticators) {
110  }
111 
112  basicauthenticators = nullptr;
113 
114  if (authenticateProgram)
115  wordlistDestroy(&authenticateProgram);
116 }
117 
118 bool
119 Auth::Basic::Config::dump(StoreEntry * entry, const char *name, Auth::SchemeConfig * scheme) const
120 {
121  if (!Auth::SchemeConfig::dump(entry, name, scheme))
122  return false; // not configured
123 
124  storeAppendPrintf(entry, "%s basic credentialsttl %d seconds\n", name, (int) credentialsTTL);
125  storeAppendPrintf(entry, "%s basic casesensitive %s\n", name, casesensitive ? "on" : "off");
126  return true;
127 }
128 
130  credentialsTTL( 2*60*60 ),
131  casesensitive(0)
132 {
133  static const SBuf defaultRealm("Squid proxy-caching web server");
134  realm = defaultRealm;
135 }
136 
137 void
138 Auth::Basic::Config::parse(Auth::SchemeConfig * scheme, int n_configured, char *param_str)
139 {
140  if (strcmp(param_str, "credentialsttl") == 0) {
141  parse_time_t(&credentialsTTL);
142  } else if (strcmp(param_str, "casesensitive") == 0) {
143  parse_onoff(&casesensitive);
144  } else
145  Auth::SchemeConfig::parse(scheme, n_configured, param_str);
146 }
147 
148 static void
150 {
152  basicauthenticators->packStatsInto(sentry, "Basic Authenticator Statistics");
153 }
154 
155 char *
156 Auth::Basic::Config::decodeCleartext(const char *httpAuthHeader, const HttpRequest *request)
157 {
158  const char *proxy_auth = httpAuthHeader;
159 
160  /* trim BASIC from string */
161  while (xisgraph(*proxy_auth))
162  ++proxy_auth;
163 
164  /* Trim leading whitespace before decoding */
165  while (xisspace(*proxy_auth))
166  ++proxy_auth;
167 
168  /* Trim trailing \n before decoding */
169  // XXX: really? is the \n actually still there? does the header parse not drop it?
170  char *eek = xstrdup(proxy_auth);
171  strtok(eek, "\n");
172 
173  const size_t srcLen = strlen(eek);
174  char *cleartext = static_cast<char*>(xmalloc(BASE64_DECODE_LENGTH(srcLen)+1));
175 
176  struct base64_decode_ctx ctx;
177  base64_decode_init(&ctx);
178 
179  size_t dstLen = 0;
180  if (base64_decode_update(&ctx, &dstLen, reinterpret_cast<uint8_t*>(cleartext), srcLen, eek) && base64_decode_final(&ctx)) {
181  cleartext[dstLen] = '\0';
182 
183  if (utf8 && !isValidUtf8String(cleartext, cleartext + dstLen)) {
184  auto str = isCP1251EncodingAllowed(request) ?
185  Cp1251ToUtf8(cleartext) : Latin1ToUtf8(cleartext);
186  safe_free(cleartext);
187  cleartext = xstrdup(str.c_str());
188  }
189 
190  /*
191  * Don't allow NL or CR in the credentials.
192  * Oezguer Kesim <oec@codeblau.de>
193  */
194  debugs(29, 9, "'" << cleartext << "'");
195 
196  if (strcspn(cleartext, "\r\n") != strlen(cleartext)) {
197  debugs(29, DBG_IMPORTANT, "WARNING: Bad characters in authorization header '" << httpAuthHeader << "'");
198  safe_free(cleartext);
199  }
200  } else {
201  debugs(29, 2, "WARNING: Invalid Base64 character in authorization header '" << httpAuthHeader << "'");
202  safe_free(cleartext);
203  }
204 
205  safe_free(eek);
206  return cleartext;
207 }
208 
217 Auth::Basic::Config::decode(char const *proxy_auth, const HttpRequest *request, const char *aRequestRealm)
218 {
219  Auth::UserRequest::Pointer auth_user_request = dynamic_cast<Auth::UserRequest*>(new Auth::Basic::UserRequest);
220  /* decode the username */
221 
222  // retrieve the cleartext (in a dynamically allocated char*)
223  const auto cleartext = decodeCleartext(proxy_auth, request);
224 
225  // empty header? no auth details produced...
226  if (!cleartext)
227  return auth_user_request;
228 
230  /* permitted because local_basic is purely local function scope. */
231  Auth::Basic::User *local_basic = nullptr;
232 
233  char *separator = strchr(cleartext, ':');
234 
235  lb = local_basic = new Auth::Basic::User(this, aRequestRealm);
236 
237  if (separator) {
238  /* terminate the username */
239  *separator = '\0';
240  local_basic->passwd = xstrdup(separator+1);
241  }
242 
243  if (!casesensitive)
244  Tolower(cleartext);
245  local_basic->username(cleartext);
246 
247  if (local_basic->passwd == nullptr) {
248  debugs(29, 4, "no password in proxy authorization header '" << proxy_auth << "'");
249  auth_user_request->setDenyMessage("no password was present in the HTTP [proxy-]authorization header. This is most likely a browser bug");
250  } else {
251  if (local_basic->passwd[0] == '\0') {
252  debugs(29, 4, "Disallowing empty password. User is '" << local_basic->username() << "'");
253  safe_free(local_basic->passwd);
254  auth_user_request->setDenyMessage("Request denied because you provided an empty password. Users MUST have a password.");
255  }
256  }
257 
258  xfree(cleartext);
259 
260  if (!local_basic->valid()) {
261  lb->auth_type = Auth::AUTH_BROKEN;
262  auth_user_request->user(lb);
263  return auth_user_request;
264  }
265 
266  /* now lookup and see if we have a matching auth_user structure in memory. */
267  Auth::User::Pointer auth_user;
268 
269  if (!(auth_user = Auth::Basic::User::Cache()->lookup(lb->userKey()))) {
270  /* the user doesn't exist in the username cache yet */
271  /* save the credentials */
272  debugs(29, 9, "Creating new user '" << lb->username() << "'");
273  /* set the auth_user type */
274  lb->auth_type = Auth::AUTH_BASIC;
275  /* current time for timeouts */
276  lb->expiretime = current_time.tv_sec;
277 
278  /* this basic_user struct is the 'lucky one' to get added to the username cache */
279  /* the requests after this link to the basic_user */
280  /* store user in hash */
281  lb->addToNameCache();
282 
283  auth_user = lb;
284  assert(auth_user != nullptr);
285  } else {
286  /* replace the current cached password with the new one */
287  Auth::Basic::User *basic_auth = dynamic_cast<Auth::Basic::User *>(auth_user.getRaw());
288  assert(basic_auth);
289  basic_auth->updateCached(local_basic);
290  auth_user = basic_auth;
291  }
292 
293  /* link the request to the in-cache user */
294  auth_user_request->user(auth_user);
295  return auth_user_request;
296 }
297 
300 void
301 Auth::Basic::Config::init(Auth::SchemeConfig *)
302 {
303  if (authenticateProgram) {
305 
306  if (basicauthenticators == nullptr)
307  basicauthenticators = Helper::Client::Make("basicauthenticator");
308 
309  basicauthenticators->cmdline = authenticateProgram;
310 
311  basicauthenticators->childs.updateLimits(authenticateChildren);
312 
313  basicauthenticators->ipc_type = IPC_STREAM;
314 
315  basicauthenticators->openSessions();
316  }
317 }
318 
319 void
320 Auth::Basic::Config::registerWithCacheManager(void)
321 {
322  Mgr::RegisterAction("basicauthenticator",
323  "Basic User Authenticator Stats",
324  authenticateBasicStats, 0, 1);
325 }
326 
void wordlistDestroy(wordlist **list)
destroy a wordlist
Definition: wordlist.cc:16
#define xmalloc
HttpHeader header
Definition: Message.h:74
void base64_decode_init(struct base64_decode_ctx *ctx)
Definition: base64.c:54
void storeAppendPrintf(StoreEntry *e, const char *fmt,...)
Definition: store.cc:855
Definition: SBuf.h:93
#define xstrdup
C * getRaw() const
Definition: RefCount.h:89
static struct node * parse(FILE *fp)
Definition: parse.c:965
void setDenyMessage(char const *)
Definition: UserRequest.cc:114
virtual User::Pointer user()
Definition: UserRequest.h:143
static Pointer Make(const char *name)
Definition: helper.cc:757
void httpHeaderPutStrf(HttpHeader *hdr, Http::HdrType id, const char *fmt,...)
void helperShutdown(const Helper::Client::Pointer &hlp)
Definition: helper.cc:769
virtual void parse(SchemeConfig *, int, char *)
Definition: SchemeConfig.cc:84
void Tolower(char *)
Definition: util.cc:28
SBuf Latin1ToUtf8(const char *in)
converts ISO-LATIN-1 to UTF-8
Definition: toUtf.cc:16
int base64_decode_final(struct base64_decode_ctx *ctx)
Definition: base64.c:159
struct timeval current_time
the current UNIX time in timeval {seconds, microseconds} format
Definition: gadgets.cc:18
void parse_time_t(time_t *var)
Definition: cache_cf.cc:2952
#define SQUIDSBUFPRINT(s)
Definition: SBuf.h:32
static int authbasic_initialised
Definition: Config.cc:41
struct _Cache Cache
#define xisgraph(x)
Definition: xis.h:28
#define safe_free(x)
Definition: xalloc.h:73
#define assert(EX)
Definition: assert.h:17
int base64_decode_update(struct base64_decode_ctx *ctx, size_t *dst_length, uint8_t *dst, size_t src_length, const char *src)
Definition: base64.c:129
static AUTHSSTATS authenticateBasicStats
Definition: Config.cc:37
bool isValidUtf8String(const char *source, const char *sourceEnd)
returns whether the given input is a valid (or empty) sequence of UTF-8 code points
Definition: toUtf.cc:172
#define xfree
void AUTHSSTATS(StoreEntry *)
Definition: Gadgets.h:21
@ AUTH_BASIC
Definition: Type.h:19
void RegisterAction(char const *action, char const *desc, OBJH *handler, Protected, Atomic, Format)
Definition: Registration.cc:54
#define DBG_IMPORTANT
Definition: Stream.h:38
void parse_onoff(int *var)
Definition: cache_cf.cc:2580
virtual void done()
virtual bool dump(StoreEntry *, const char *, SchemeConfig *) const
@ AUTH_BROKEN
Definition: Type.h:23
#define xisspace(x)
Definition: xis.h:15
#define IPC_STREAM
Definition: defines.h:104
#define debugs(SECTION, LEVEL, CONTENT)
Definition: Stream.h:192
SBuf Cp1251ToUtf8(const char *in)
converts CP1251 to UTF-8
Definition: toUtf.cc:37
#define SQUIDSBUFPH
Definition: SBuf.h:31
#define BASE64_DECODE_LENGTH(length)
Definition: base64.h:120
class SquidConfig Config
Definition: SquidConfig.cc:12
Helper::ClientPointer basicauthenticators
Definition: Config.cc:39

 

Introduction

Documentation

Support

Miscellaneous