Annotation of ChivanetAimPidgin/oscarprpl/src/c/kerberos.c, revision 1.1

1.1     ! snw         1: /*
        !             2:  * Purple's oscar protocol plugin
        !             3:  * This file is the legal property of its developers.
        !             4:  * Please see the AUTHORS file distributed alongside this file.
        !             5:  *
        !             6:  * This library is free software; you can redistribute it and/or
        !             7:  * modify it under the terms of the GNU Lesser General Public
        !             8:  * License as published by the Free Software Foundation; either
        !             9:  * version 2 of the License, or (at your option) any later version.
        !            10:  *
        !            11:  * This library is distributed in the hope that it will be useful,
        !            12:  * but WITHOUT ANY WARRANTY; without even the implied warranty of
        !            13:  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
        !            14:  * Lesser General Public License for more details.
        !            15:  *
        !            16:  * You should have received a copy of the GNU Lesser General Public
        !            17:  * License along with this library; if not, write to the Free Software
        !            18:  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02111-1301  USA
        !            19: */
        !            20: 
        !            21: /**
        !            22:  * This file implements AIM's kerberos procedure for authenticating
        !            23:  * users.  This replaces the older MD5-based and XOR-based
        !            24:  * authentication methods that use SNAC family 0x0017.
        !            25:  *
        !            26:  * This doesn't use SNACs or FLAPs at all.  It makes https
        !            27:  * POSTs to AOL KDC server to validate the user based on the password they
        !            28:  * provided to us.  Upon successful authentication we receive two tokens
        !            29:  * in the response. One is assumed to be the kerberos ticket for authentication
        !            30:  * on the various AOL websites, while the other contains BOSS information, such
        !            31:  * as the hostname and port number to use, the TLS certificate name as well as
        !            32:  * the cookie to use to authenticate to the BOS server.
        !            33:  * And then everything else is the same as with BUCP.
        !            34:  *
        !            35:  */
        !            36: 
        !            37: #include "oscar.h"
        !            38: #include "oscarcommon.h"
        !            39: #include "core.h"
        !            40: 
        !            41: #define MAXAIMPASSLEN 16
        !            42: 
        !            43: /*
        !            44:  * Incomplete X-SNAC format taken from reverse engineering doen by digsby:
        !            45:  * https://github.com/ifwe/digsby/blob/master/digsby/src/oscar/login2.py
        !            46:  */
        !            47: typedef struct {
        !            48:        aim_tlv_t *main_tlv;
        !            49:        gchar *principal1;
        !            50:        gchar *service;
        !            51:        gchar *principal1_again;
        !            52:        gchar *principal2;
        !            53:        gchar unknown;
        !            54:        guint8 *footer;
        !            55:        struct {
        !            56:                guint32 unknown1;
        !            57:                guint32 unknown2;
        !            58:                guint32 epoch_now;
        !            59:                guint32 epoch_valid;
        !            60:                guint32 epoch_renew;
        !            61:                guint32 epoch_expire;
        !            62:                guint32 unknown3;
        !            63:                guint32 unknown4;
        !            64:                guint32 unknown5;
        !            65:        } dates;
        !            66:        GSList *tlvlist;
        !            67: } aim_xsnac_token_t;
        !            68: 
        !            69: typedef struct {
        !            70:        guint16 family;
        !            71:        guint16 subtype;
        !            72:        guint8 flags[8];
        !            73:        guint16 request_id;
        !            74:        guint32 epoch;
        !            75:        guint32 unknown;
        !            76:        gchar *principal1;
        !            77:        gchar *principal2;
        !            78:        guint16 num_tokens;
        !            79:        aim_xsnac_token_t *tokens;
        !            80:        GSList *tlvlist;
        !            81: } aim_xsnac_t;
        !            82: 
        !            83: static gchar *get_kdc_url(OscarData *od)
        !            84: {
        !            85:        PurpleAccount *account = purple_connection_get_account(od->gc);
        !            86:        const gchar *server;
        !            87:        gchar *url;
        !            88:        gchar *port_str = NULL;
        !            89:        gint port;
        !            90: 
        !            91:        server = purple_account_get_string(account, "server", AIM_DEFAULT_KDC_SERVER);
        !            92:        port = purple_account_get_int(account, "port", AIM_DEFAULT_KDC_PORT);
        !            93:        if (port != 443)
        !            94:                port_str = g_strdup_printf(":%d", port);
        !            95:        url = g_strdup_printf("https://%s%s/", server, port_str ? port_str : "");
        !            96:        g_free(port_str);
        !            97: 
        !            98:        return url;
        !            99: }
        !           100: 
        !           101: static const char *get_client_key(OscarData *od)
        !           102: {
        !           103:        return oscar_get_ui_info_string(
        !           104:                        od->icq ? "prpl-icq-clientkey" : "prpl-aim-clientkey",
        !           105:                        od->icq ? ICQ_DEFAULT_CLIENT_KEY : AIM_DEFAULT_CLIENT_KEY);
        !           106: }
        !           107: 
        !           108: static void
        !           109: aim_encode_password(const char *password, gchar *encoded)
        !           110: {
        !           111:        guint8 encoding_table[] = {
        !           112:                0x76, 0x91, 0xc5, 0xe7,
        !           113:                0xd0, 0xd9, 0x95, 0xdd,
        !           114:                0x9e, 0x2F, 0xea, 0xd8,
        !           115:                0x6B, 0x21, 0xc2, 0xbc,
        !           116: 
        !           117:        };
        !           118:        guint i;
        !           119: 
        !           120:        /*
        !           121:         * We truncate AIM passwords to 16 characters since that's what
        !           122:         * the official client does as well.
        !           123:         */
        !           124:        for (i = 0; i < strlen(password) && i < MAXAIMPASSLEN; i++)
        !           125:                encoded[i] = (password[i] ^ encoding_table[i]);
        !           126: }
        !           127: 
        !           128: static void
        !           129: aim_xsnac_free(aim_xsnac_t *xsnac)
        !           130: {
        !           131:        gint i;
        !           132: 
        !           133:        g_free(xsnac->principal1);
        !           134:        g_free(xsnac->principal2);
        !           135:        aim_tlvlist_free(xsnac->tlvlist);
        !           136: 
        !           137:        for (i = 0; i < xsnac->num_tokens; i++) {
        !           138:                g_free(xsnac->tokens[i].main_tlv->value);
        !           139:                g_free(xsnac->tokens[i].main_tlv);
        !           140:                g_free(xsnac->tokens[i].principal1);
        !           141:                g_free(xsnac->tokens[i].service);
        !           142:                g_free(xsnac->tokens[i].principal1_again);
        !           143:                g_free(xsnac->tokens[i].principal2);
        !           144:                g_free(xsnac->tokens[i].footer);
        !           145:                aim_tlvlist_free(xsnac->tokens[i].tlvlist);
        !           146:        }
        !           147:        g_free(xsnac->tokens);
        !           148: }
        !           149: 
        !           150: static void
        !           151: kerberos_login_cb(PurpleUtilFetchUrlData *url_data, gpointer user_data,
        !           152:        const gchar *got_data, gsize got_len, const gchar *error_message)
        !           153: {
        !           154:        OscarData *od = user_data;
        !           155:        PurpleConnection *gc;
        !           156:        ByteStream bs;
        !           157:        aim_xsnac_t xsnac = {0};
        !           158:        guint16 len;
        !           159:        gchar *bosip = NULL;
        !           160:        gchar *tlsCertName = NULL;
        !           161:        guint8 *cookie = NULL;
        !           162:        guint32 cookie_len = 0;
        !           163:        char *host; int port;
        !           164:        gsize i;
        !           165: 
        !           166:        gc = od->gc;
        !           167: 
        !           168:        od->url_data = NULL;
        !           169: 
        !           170:        if (error_message != NULL || got_len == 0) {
        !           171:                gchar *tmp;
        !           172:                gchar *url;
        !           173: 
        !           174:                url = get_kdc_url(od);
        !           175:                tmp = g_strdup_printf(_("Error requesting %s: %s"),
        !           176:                                url, error_message ?
        !           177:                                error_message : _("The server returned an empty response"));
        !           178:                purple_connection_error_reason(gc,
        !           179:                                PURPLE_CONNECTION_ERROR_NETWORK_ERROR, tmp);
        !           180:                g_free(tmp);
        !           181:                g_free(url);
        !           182:                return;
        !           183:        }
        !           184: 
        !           185:        purple_debug_info("oscar", "Received kerberos login HTTP response %lu : ", got_len);
        !           186: 
        !           187:        byte_stream_init(&bs, (guint8 *)got_data, got_len);
        !           188: 
        !           189:        xsnac.family = byte_stream_get16(&bs);
        !           190:        xsnac.subtype = byte_stream_get16(&bs);
        !           191:        byte_stream_getrawbuf(&bs, (guint8 *) xsnac.flags, 8);
        !           192: 
        !           193:        if (xsnac.family == 0x50C && xsnac.subtype == 0x0005) {
        !           194:                purple_connection_error_reason(gc,
        !           195:                        PURPLE_CONNECTION_ERROR_AUTHENTICATION_FAILED,
        !           196:                        _("Incorrect password"));
        !           197:                return;
        !           198:        }
        !           199:        if (xsnac.family != 0x50C || xsnac.subtype != 0x0003) {
        !           200:                purple_connection_error_reason(gc,
        !           201:                                PURPLE_CONNECTION_ERROR_NETWORK_ERROR,
        !           202:                        _("Error parsing response from authentication server"));
        !           203:                return;
        !           204:        }
        !           205:        xsnac.request_id = byte_stream_get16(&bs);
        !           206:        xsnac.epoch = byte_stream_get32(&bs);
        !           207:        xsnac.unknown = byte_stream_get32(&bs);
        !           208:        len = byte_stream_get16(&bs);
        !           209:        xsnac.principal1 = byte_stream_getstr(&bs, len);
        !           210:        len = byte_stream_get16(&bs);
        !           211:        xsnac.principal2 = byte_stream_getstr(&bs, len);
        !           212:        xsnac.num_tokens = byte_stream_get16(&bs);
        !           213: 
        !           214:        purple_debug_info("oscar", "KDC: %d tokens between '%s' and '%s'\n",
        !           215:                xsnac.num_tokens, xsnac.principal1, xsnac.principal2);
        !           216:        xsnac.tokens = g_new0(aim_xsnac_token_t, xsnac.num_tokens);
        !           217:        for (i = 0; i < xsnac.num_tokens; i++) {
        !           218:                GSList *tlv;
        !           219: 
        !           220:                tlv = aim_tlvlist_readnum(&bs, 1);
        !           221:                if (tlv)
        !           222:                        xsnac.tokens[i].main_tlv = tlv->data;
        !           223:                g_slist_free(tlv);
        !           224: 
        !           225:                len = byte_stream_get16(&bs);
        !           226:                xsnac.tokens[i].principal1 = byte_stream_getstr(&bs, len);
        !           227:                len = byte_stream_get16(&bs);
        !           228:                xsnac.tokens[i].service = byte_stream_getstr(&bs, len);
        !           229:                len = byte_stream_get16(&bs);
        !           230:                xsnac.tokens[i].principal1_again = byte_stream_getstr(&bs, len);
        !           231:                len = byte_stream_get16(&bs);
        !           232:                xsnac.tokens[i].principal2 = byte_stream_getstr(&bs, len);
        !           233:                xsnac.tokens[i].unknown = byte_stream_get8(&bs);
        !           234:                len = byte_stream_get16(&bs);
        !           235:                xsnac.tokens[i].footer = byte_stream_getraw(&bs, len);
        !           236: 
        !           237:                xsnac.tokens[i].dates.unknown1 = byte_stream_get32(&bs);
        !           238:                xsnac.tokens[i].dates.unknown2 = byte_stream_get32(&bs);
        !           239:                xsnac.tokens[i].dates.epoch_now = byte_stream_get32(&bs);
        !           240:                xsnac.tokens[i].dates.epoch_valid = byte_stream_get32(&bs);
        !           241:                xsnac.tokens[i].dates.epoch_renew = byte_stream_get32(&bs);
        !           242:                xsnac.tokens[i].dates.epoch_expire = byte_stream_get32(&bs);
        !           243:                xsnac.tokens[i].dates.unknown3 = byte_stream_get32(&bs);
        !           244:                xsnac.tokens[i].dates.unknown4 = byte_stream_get32(&bs);
        !           245:                xsnac.tokens[i].dates.unknown5 = byte_stream_get32(&bs);
        !           246: 
        !           247:                len = byte_stream_get16(&bs);
        !           248:                xsnac.tokens[i].tlvlist = aim_tlvlist_readnum(&bs, len);
        !           249: 
        !           250:                purple_debug_info("oscar", "Token %lu has %d TLVs for service '%s'\n",
        !           251:                        i, len, xsnac.tokens[i].service);
        !           252:        }
        !           253:        len = byte_stream_get16(&bs);
        !           254:        xsnac.tlvlist = aim_tlvlist_readnum(&bs, len);
        !           255: 
        !           256:        for (i = 0; i < xsnac.num_tokens; i++) {
        !           257:                if (purple_strequal(xsnac.tokens[i].service, "im/boss")) {
        !           258:                        aim_tlv_t *tlv;
        !           259:                        GSList *tlvlist;
        !           260:                        ByteStream tbs;
        !           261: 
        !           262:                        tlv = aim_tlv_gettlv(xsnac.tokens[i].tlvlist, 0x0003, 1);
        !           263:                        if (tlv != NULL) {
        !           264:                                byte_stream_init(&tbs, tlv->value, tlv->length);
        !           265:                                byte_stream_get32(&tbs);
        !           266:                                tlvlist =  aim_tlvlist_read(&tbs);
        !           267:                                if (aim_tlv_gettlv(tlvlist, 0x0005, 1))
        !           268:                                        bosip = aim_tlv_getstr(tlvlist, 0x0005, 1);
        !           269:                                if (aim_tlv_gettlv(tlvlist, 0x0005, 1))
        !           270:                                        tlsCertName = aim_tlv_getstr(tlvlist, 0x008D, 1);
        !           271:                                tlv = aim_tlv_gettlv(tlvlist, 0x0006, 1);
        !           272:                                if (tlv) {
        !           273:                                        cookie_len = tlv->length;
        !           274:                                        cookie = tlv->value;
        !           275:                                }
        !           276:                        }
        !           277:                        break;
        !           278:                }
        !           279:        }
        !           280:        if (bosip && cookie) {
        !           281:                port = AIM_DEFAULT_KDC_PORT;
        !           282:                for (i = 0; i < strlen(bosip); i++) {
        !           283:                        if (bosip[i] == ':') {
        !           284:                                port = atoi(&(bosip[i+1]));
        !           285:                                break;
        !           286:                        }
        !           287:                }
        !           288:                host = g_strndup(bosip, i);
        !           289:                oscar_connect_to_bos(gc, od, host, port, cookie, cookie_len, tlsCertName);
        !           290:                g_free(host);
        !           291:        } else {
        !           292:                purple_connection_error_reason(gc,
        !           293:                        PURPLE_CONNECTION_ERROR_NETWORK_ERROR,
        !           294:                        _("Unknown error during authentication"));
        !           295:        }
        !           296:        aim_xsnac_free(&xsnac);
        !           297:        g_free(tlsCertName);
        !           298:        g_free(bosip);
        !           299: }
        !           300: 
        !           301: /**
        !           302:  * This function sends a binary blob request to the Kerberos KDC server
        !           303:  * https://kdc.uas.aol.com with the user's username and password and
        !           304:  * receives the IM cookie, which is used to request a connection to the
        !           305:  * BOSS server.
        !           306:  * The binary data below is what AIM 8.0.8.1 sends in order to authenticate
        !           307:  * to the KDC server. It is an 'X-SNAC' packet, which is relatively similar
        !           308:  * to SNAC packets but somehow different.
        !           309:  * The header starts with the 0x50C family follow by 0x0002 subtype, then
        !           310:  * some fixed length data and TLVs. The string "COOL" appears in there for
        !           311:  * some reason followed by the 'US' and 'en' strings.
        !           312:  * Then the 'imApp key=<client key>' comes after that, and then the username
        !           313:  * and the string "im/boss" which seems to represent the service we are
        !           314:  * requesting the authentication for. Changing that will lead to a
        !           315:  * 'unknown service' error. The client key is then added again (without the
        !           316:  * 'imApp key' string prepended to it) then a XOR-ed version of the password.
        !           317:  * The meaning of the header/footer/in-between bytes is not known but never
        !           318:  * seems to change so there is no need to reverse engineer their meaning at
        !           319:  * this point.
        !           320:  */
        !           321: void send_kerberos_login(OscarData *od, const char *username)
        !           322: {
        !           323:        PurpleConnection *gc;
        !           324:        GString *request;
        !           325:        gchar *url;
        !           326:        const gchar *password;
        !           327:        gchar password_xored[MAXAIMPASSLEN];
        !           328:        const gchar *client_key;
        !           329:        gchar *imapp_key;
        !           330:        GString *body;
        !           331:        guint16 len_be;
        !           332:        guint16 reqid;
        !           333:        const gchar header[] = {
        !           334:                0x05, 0x0C, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00,
        !           335:                0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
        !           336:                0x00, 0x00, 0x00, 0x00, 0x00, 0x05, 0x00, 0x00,
        !           337:                0x00, 0x08, 0x10, 0x00, 0x00, 0x00, 0x00, 0x05,
        !           338:                0x00, 0x01, 0x00, 0x04, 0x00, 0x00, 0x00, 0x05,
        !           339:                0x00, 0x02, 0x00, 0x04, 0x00, 0x00, 0x18, 0x99,
        !           340:                0x00, 0x05, 0x00, 0x04, 0x43, 0x4F, 0x4F, 0x4C,
        !           341:                0x00, 0x0A, 0x00, 0x02, 0x00, 0x01, 0x00, 0x0B,
        !           342:                0x00, 0x04, 0x00, 0x10, 0x00, 0x01, 0x00, 0x00,
        !           343:                0x00, 0x07, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02,
        !           344:                0x55, 0x53, 0x00, 0x02, 0x65, 0x6E, 0x00, 0x04,
        !           345:                0x00, 0x01, 0x00, 0x04, 0x00, 0x00, 0x00, 0x0D,
        !           346:                0x00, 0x02, 0x00, 0x04, 0x00, 0x00, 0x00, 0x04,
        !           347:                0x00, 0x05};
        !           348:        const gchar pre_username[] = {
        !           349:                0x00, 0x07, 0x00, 0x04, 0x00, 0x00, 0x01, 0x8B,
        !           350:                0x01, 0x00, 0x00, 0x00, 0x00};
        !           351:        const gchar post_username[] = {
        !           352:                0x00, 0x07, 0x69, 0x6D, 0x2F, 0x62, 0x6F, 0x73,
        !           353:                0x73, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
        !           354:                0x04, 0x00, 0x02};
        !           355:        const gchar pre_password[] = {
        !           356:                0x40, 0x00, 0x00, 0x00, 0x00, 0x04, 0x00, 0x01,
        !           357:                0x00, 0x00};
        !           358:        const gchar post_password[] = {0x00, 0x00, 0x00, 0x1D};
        !           359:        const gchar footer[] = {
        !           360:                0x00, 0x21, 0x00, 0x32, 0x00, 0x01, 0x10, 0x03,
        !           361:                0x00, 0x2C, 0x00, 0x07, 0x00, 0x14, 0x00, 0x04,
        !           362:                0x00, 0x00, 0x01, 0x8B, 0x00, 0x16, 0x00, 0x02,
        !           363:                0x00, 0x26, 0x00, 0x17, 0x00, 0x02, 0x00, 0x07,
        !           364:                0x00, 0x18, 0x00, 0x02, 0x00, 0x00, 0x00, 0x19,
        !           365:                0x00, 0x02, 0x00, 0x0D, 0x00, 0x1A, 0x00, 0x02,
        !           366:                0x00, 0x04, 0x00, 0xAB, 0x00, 0x00, 0x00, 0x28,
        !           367:                0x00, 0x00};
        !           368: 
        !           369:        gc = od->gc;
        !           370: 
        !           371:        password = purple_connection_get_password(gc);
        !           372:        aim_encode_password(password, password_xored);
        !           373: 
        !           374:        client_key = get_client_key(od);
        !           375:        imapp_key = g_strdup_printf("imApp key=%s", client_key);
        !           376: 
        !           377:        /* Construct the body of the HTTP POST request */
        !           378:        body = g_string_new(NULL);
        !           379:        g_string_append_len(body, header, sizeof(header));
        !           380:        reqid = (guint16) g_random_int();
        !           381:        g_string_overwrite_len(body, 0xC, (void *)&reqid, sizeof(guint16));
        !           382: 
        !           383:        len_be = GUINT16_TO_BE(strlen(imapp_key));
        !           384:        g_string_append_len(body, (void *)&len_be, sizeof(guint16));
        !           385:        g_string_append(body, imapp_key);
        !           386: 
        !           387:        len_be = GUINT16_TO_BE(strlen(username));
        !           388:        g_string_append_len(body, pre_username, sizeof(pre_username));
        !           389:        g_string_append_len(body, (void *)&len_be, sizeof(guint16));
        !           390:        g_string_append(body, username);
        !           391:        g_string_append_len(body, post_username, sizeof(post_username));
        !           392: 
        !           393:        len_be = GUINT16_TO_BE(strlen(password) + 0x10);
        !           394:        g_string_append_len(body, (void *)&len_be, sizeof(guint16));
        !           395:        g_string_append_len(body, pre_password, sizeof(pre_password));
        !           396:        len_be = GUINT16_TO_BE(strlen(password) + 4);
        !           397:        g_string_append_len(body, (void *)&len_be, sizeof(guint16));
        !           398:        len_be = GUINT16_TO_BE(strlen(password));
        !           399:        g_string_append_len(body, (void *)&len_be, sizeof(guint16));
        !           400:        g_string_append_len(body, password_xored, strlen(password));
        !           401:        g_string_append_len(body, post_password, sizeof(post_password));
        !           402: 
        !           403:        len_be = GUINT16_TO_BE(strlen(client_key));
        !           404:        g_string_append_len(body, (void *)&len_be, sizeof(guint16));
        !           405:        g_string_append(body, client_key);
        !           406:        g_string_append_len(body, footer, sizeof(footer));
        !           407: 
        !           408:        g_free(imapp_key);
        !           409: 
        !           410:        url = get_kdc_url(od);
        !           411: 
        !           412:        /* Construct an HTTP POST request */
        !           413:        request = g_string_new("POST / HTTP/1.1\n"
        !           414:                        "Connection: close\n"
        !           415:                        "Accept: application/x-snac\n"
        !           416:                        "Host: kdc.uas.nina.chat\n");
        !           417: 
        !           418:        /* Tack on the body */
        !           419:        g_string_append_printf(request, "Content-Type: application/x-snac\n");
        !           420:        g_string_append_printf(request, "Content-Length: %" G_GSIZE_FORMAT "\n\n", body->len);
        !           421:        g_string_append_len(request, body->str, body->len);
        !           422: 
        !           423:        /* Send the POST request  */
        !           424:        od->url_data = purple_util_fetch_url_request_data_len_with_account(
        !           425:                        purple_connection_get_account(gc), url,
        !           426:                        TRUE, NULL, TRUE, request->str, request->len, FALSE, -1,
        !           427:                        kerberos_login_cb, od);
        !           428:        g_string_free(request, TRUE);
        !           429: 
        !           430:        g_string_free(body, TRUE);
        !           431:        g_free(url);
        !           432: }

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>