|
1
|
|
|
<?php |
|
2
|
|
|
|
|
3
|
|
|
/** |
|
4
|
|
|
* Sasl library. |
|
5
|
|
|
* |
|
6
|
|
|
* Copyright (c) 2002-2003 Richard Heyes, |
|
7
|
|
|
* 2014-2024 Fabian Grutschus |
|
8
|
|
|
* All rights reserved. |
|
9
|
|
|
* |
|
10
|
|
|
* Redistribution and use in source and binary forms, with or without |
|
11
|
|
|
* modification, are permitted provided that the following conditions |
|
12
|
|
|
* are met: |
|
13
|
|
|
* |
|
14
|
|
|
* o Redistributions of source code must retain the above copyright |
|
15
|
|
|
* notice, this list of conditions and the following disclaimer. |
|
16
|
|
|
* o Redistributions in binary form must reproduce the above copyright |
|
17
|
|
|
* notice, this list of conditions and the following disclaimer in the |
|
18
|
|
|
* documentation and/or other materials provided with the distribution.| |
|
19
|
|
|
* o The names of the authors may not be used to endorse or promote |
|
20
|
|
|
* products derived from this software without specific prior written |
|
21
|
|
|
* permission. |
|
22
|
|
|
* |
|
23
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
|
24
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
|
25
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
|
26
|
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
|
27
|
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
|
28
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
|
29
|
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
|
30
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
|
31
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
|
32
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
|
33
|
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
|
34
|
|
|
* |
|
35
|
|
|
* @author Richard Heyes <[email protected]> |
|
36
|
|
|
*/ |
|
37
|
|
|
|
|
38
|
|
|
namespace Fabiang\Sasl\Authentication; |
|
39
|
|
|
|
|
40
|
|
|
use Fabiang\Sasl\Exception\InvalidArgumentException; |
|
41
|
|
|
use Fabiang\Sasl\Exception\RuntimeException; |
|
42
|
|
|
|
|
43
|
|
|
/** |
|
44
|
|
|
* Implmentation of DIGEST-MD5 SASL mechanism |
|
45
|
|
|
* |
|
46
|
|
|
* @author Richard Heyes <[email protected]> |
|
47
|
|
|
*/ |
|
48
|
|
|
class DigestMD5 extends AbstractAuthentication implements ChallengeAuthenticationInterface |
|
49
|
|
|
{ |
|
50
|
|
|
/** |
|
51
|
|
|
* Provides the (main) client response for DIGEST-MD5 |
|
52
|
|
|
* requires a few extra parameters than the other |
|
53
|
|
|
* mechanisms, which are unavoidable. |
|
54
|
|
|
* |
|
55
|
|
|
* @param string $challenge The digest challenge sent by the server |
|
56
|
|
|
* @return string The digest response (NOT base64 encoded) |
|
57
|
|
|
*/ |
|
58
|
12 |
|
public function createResponse($challenge = null) |
|
59
|
|
|
{ |
|
60
|
12 |
|
$parsedChallenge = $this->parseChallenge($challenge); |
|
61
|
12 |
|
$authzidString = ''; |
|
62
|
|
|
|
|
63
|
12 |
|
$authcid = $this->options->getAuthcid(); |
|
64
|
12 |
|
$pass = $this->options->getSecret(); |
|
65
|
12 |
|
$authzid = $this->options->getAuthzid(); |
|
66
|
12 |
|
$service = $this->options->getService(); |
|
67
|
12 |
|
$hostname = $this->options->getHostname(); |
|
68
|
12 |
|
if (!empty($authzid)) { |
|
69
|
10 |
|
$authzidString = 'authzid="' . $authzid . '",'; |
|
70
|
|
|
} |
|
71
|
|
|
|
|
72
|
12 |
|
if (!empty($parsedChallenge)) { |
|
73
|
8 |
|
$cnonce = $this->generateCnonce(); |
|
74
|
8 |
|
$digestUri = sprintf('%s/%s', $service, $hostname); |
|
75
|
8 |
|
$responseValue = $this->getResponseValue( |
|
76
|
|
|
$authcid, |
|
77
|
|
|
$pass, |
|
78
|
8 |
|
$parsedChallenge['realm'], |
|
79
|
8 |
|
$parsedChallenge['nonce'], |
|
80
|
|
|
$cnonce, |
|
81
|
|
|
$digestUri, |
|
82
|
|
|
$authzid |
|
83
|
|
|
); |
|
84
|
|
|
|
|
85
|
8 |
|
$realm = ''; |
|
86
|
8 |
|
if ($parsedChallenge['realm']) { |
|
87
|
4 |
|
$realm = 'realm="' . $parsedChallenge['realm'] . '",'; |
|
88
|
|
|
} |
|
89
|
|
|
|
|
90
|
8 |
|
return sprintf( |
|
91
|
8 |
|
'username="%s",%s%snonce="%s",cnonce="%s",nc=00000001,qop=auth,digest-uri="%s",' |
|
92
|
|
|
. 'response=%s,maxbuf=%d', |
|
93
|
|
|
$authcid, |
|
94
|
|
|
$realm, |
|
95
|
|
|
$authzidString, |
|
96
|
8 |
|
$parsedChallenge['nonce'], |
|
97
|
|
|
$cnonce, |
|
98
|
|
|
$digestUri, |
|
99
|
|
|
$responseValue, |
|
100
|
8 |
|
$parsedChallenge['maxbuf'] |
|
101
|
|
|
); |
|
102
|
|
|
} |
|
103
|
|
|
|
|
104
|
4 |
|
throw new InvalidArgumentException('Invalid digest challenge'); |
|
105
|
|
|
} |
|
106
|
|
|
|
|
107
|
|
|
/** |
|
108
|
|
|
* Parses and verifies the digest challenge* |
|
109
|
|
|
* |
|
110
|
|
|
* @param string $challenge The digest challenge |
|
111
|
|
|
* @return array The parsed challenge as an assoc |
|
112
|
|
|
* array in the form "directive => value". |
|
113
|
|
|
* @access private |
|
114
|
|
|
*/ |
|
115
|
12 |
|
private function parseChallenge($challenge) |
|
116
|
|
|
{ |
|
117
|
|
|
/** |
|
118
|
|
|
* Defaults and required directives |
|
119
|
|
|
*/ |
|
120
|
|
|
$tokens = array( |
|
121
|
|
|
'realm' => '', |
|
122
|
|
|
'maxbuf' => 65536, |
|
123
|
|
|
); |
|
124
|
|
|
|
|
125
|
12 |
|
$matches = array(); |
|
126
|
12 |
|
while (preg_match('/^(?<key>[a-z-]+)=(?<value>"[^"]+(?<!\\\)"|[^,]+)/i', $challenge, $matches)) { |
|
127
|
10 |
|
$match = $matches[0]; |
|
128
|
10 |
|
$key = $matches['key']; |
|
129
|
10 |
|
$value = $matches['value']; |
|
130
|
|
|
|
|
131
|
10 |
|
$this->checkToken($tokens, $key, $value); |
|
132
|
|
|
|
|
133
|
|
|
// Remove the just parsed directive from the challenge |
|
134
|
10 |
|
$challenge = substr($challenge, strlen($match) + 1); |
|
135
|
|
|
} |
|
136
|
|
|
|
|
137
|
|
|
// Required: nonce, algorithm |
|
138
|
12 |
|
if (empty($tokens['nonce']) || empty($tokens['algorithm'])) { |
|
139
|
4 |
|
return array(); |
|
140
|
|
|
} |
|
141
|
|
|
|
|
142
|
8 |
|
return $tokens; |
|
143
|
|
|
} |
|
144
|
|
|
|
|
145
|
|
|
/** |
|
146
|
|
|
* Check found token. |
|
147
|
|
|
* |
|
148
|
|
|
* @param array $tokens |
|
149
|
|
|
* @param string $key |
|
150
|
|
|
* @param string $value |
|
151
|
|
|
*/ |
|
152
|
12 |
|
private function checkToken(array &$tokens, $key, $value) |
|
153
|
|
|
{ |
|
154
|
|
|
// Ignore these as per rfc2831 |
|
155
|
12 |
|
if ($key !== 'opaque' && $key !== 'domain') { |
|
156
|
12 |
|
if (!empty($tokens[$key])) { |
|
157
|
|
|
// Allowed multiple "realm" and "auth-param" |
|
158
|
6 |
|
if ('realm' === $key || 'auth-param' === $key) { |
|
159
|
|
|
// we don't support multiple realms yet |
|
160
|
4 |
|
if ('realm' === $key) { |
|
161
|
2 |
|
throw new RuntimeException('Multiple realms are not supported'); |
|
162
|
|
|
} |
|
163
|
|
|
|
|
164
|
2 |
|
$tokens[$key] = (array) $tokens[$key]; |
|
165
|
2 |
|
$tokens[$key][] = $this->trim($value); |
|
166
|
|
|
|
|
167
|
|
|
// Any other multiple instance = failure |
|
168
|
|
|
} else { |
|
169
|
4 |
|
return array(); |
|
170
|
|
|
} |
|
171
|
|
|
} else { |
|
172
|
12 |
|
$tokens[$key] = $this->trim($value); |
|
173
|
|
|
} |
|
174
|
|
|
} |
|
175
|
|
|
} |
|
176
|
|
|
|
|
177
|
|
|
/** |
|
178
|
|
|
* |
|
179
|
|
|
* @param string $string |
|
180
|
|
|
* @return string |
|
181
|
|
|
*/ |
|
182
|
10 |
|
private function trim($string) |
|
183
|
|
|
{ |
|
184
|
10 |
|
return trim($string, '"'); |
|
185
|
|
|
} |
|
186
|
|
|
|
|
187
|
|
|
/** |
|
188
|
|
|
* Creates the response= part of the digest response |
|
189
|
|
|
* |
|
190
|
|
|
* @param string $authcid Authentication id (username) |
|
191
|
|
|
* @param string $pass Password |
|
192
|
|
|
* @param string $realm Realm as provided by the server |
|
193
|
|
|
* @param string $nonce Nonce as provided by the server |
|
194
|
|
|
* @param string $cnonce Client nonce |
|
195
|
|
|
* @param string $digest_uri The digest-uri= value part of the response |
|
196
|
|
|
* @param string $authzid Authorization id |
|
197
|
|
|
* @return string The response= part of the digest response |
|
198
|
|
|
* @access private |
|
199
|
|
|
*/ |
|
200
|
8 |
|
private function getResponseValue($authcid, $pass, $realm, $nonce, $cnonce, $digest_uri, $authzid = '') |
|
201
|
|
|
{ |
|
202
|
8 |
|
if ($authzid == '') { |
|
203
|
2 |
|
$A1 = sprintf('%s:%s:%s', pack('H32', md5(sprintf('%s:%s:%s', $authcid, $realm, $pass))), $nonce, $cnonce); |
|
204
|
|
|
} else { |
|
205
|
6 |
|
$A1 = sprintf( |
|
206
|
|
|
'%s:%s:%s:%s', |
|
207
|
6 |
|
pack('H32', md5(sprintf('%s:%s:%s', $authcid, $realm, $pass))), |
|
208
|
|
|
$nonce, |
|
209
|
|
|
$cnonce, |
|
210
|
|
|
$authzid |
|
211
|
|
|
); |
|
212
|
|
|
} |
|
213
|
8 |
|
$A2 = 'AUTHENTICATE:' . $digest_uri; |
|
214
|
8 |
|
return md5(sprintf('%s:%s:00000001:%s:auth:%s', md5($A1), $nonce, $cnonce, md5($A2))); |
|
215
|
|
|
} |
|
216
|
|
|
} |
|
217
|
|
|
|