Annotation of ChivanetAimPidgin/oscarprpl/src/c/kerberos.c, revision 1.1.1.1
1.1 snw 1: /*
2: * Purple's oscar protocol plugin
3: * This file is the legal property of its developers.
4: * Please see the AUTHORS file distributed alongside this file.
5: *
6: * This library is free software; you can redistribute it and/or
7: * modify it under the terms of the GNU Lesser General Public
8: * License as published by the Free Software Foundation; either
9: * version 2 of the License, or (at your option) any later version.
10: *
11: * This library is distributed in the hope that it will be useful,
12: * but WITHOUT ANY WARRANTY; without even the implied warranty of
13: * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14: * Lesser General Public License for more details.
15: *
16: * You should have received a copy of the GNU Lesser General Public
17: * License along with this library; if not, write to the Free Software
18: * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02111-1301 USA
19: */
20:
21: /**
22: * This file implements AIM's kerberos procedure for authenticating
23: * users. This replaces the older MD5-based and XOR-based
24: * authentication methods that use SNAC family 0x0017.
25: *
26: * This doesn't use SNACs or FLAPs at all. It makes https
27: * POSTs to AOL KDC server to validate the user based on the password they
28: * provided to us. Upon successful authentication we receive two tokens
29: * in the response. One is assumed to be the kerberos ticket for authentication
30: * on the various AOL websites, while the other contains BOSS information, such
31: * as the hostname and port number to use, the TLS certificate name as well as
32: * the cookie to use to authenticate to the BOS server.
33: * And then everything else is the same as with BUCP.
34: *
35: */
36:
37: #include "oscar.h"
38: #include "oscarcommon.h"
39: #include "core.h"
40:
41: #define MAXAIMPASSLEN 16
42:
43: /*
44: * Incomplete X-SNAC format taken from reverse engineering doen by digsby:
45: * https://github.com/ifwe/digsby/blob/master/digsby/src/oscar/login2.py
46: */
47: typedef struct {
48: aim_tlv_t *main_tlv;
49: gchar *principal1;
50: gchar *service;
51: gchar *principal1_again;
52: gchar *principal2;
53: gchar unknown;
54: guint8 *footer;
55: struct {
56: guint32 unknown1;
57: guint32 unknown2;
58: guint32 epoch_now;
59: guint32 epoch_valid;
60: guint32 epoch_renew;
61: guint32 epoch_expire;
62: guint32 unknown3;
63: guint32 unknown4;
64: guint32 unknown5;
65: } dates;
66: GSList *tlvlist;
67: } aim_xsnac_token_t;
68:
69: typedef struct {
70: guint16 family;
71: guint16 subtype;
72: guint8 flags[8];
73: guint16 request_id;
74: guint32 epoch;
75: guint32 unknown;
76: gchar *principal1;
77: gchar *principal2;
78: guint16 num_tokens;
79: aim_xsnac_token_t *tokens;
80: GSList *tlvlist;
81: } aim_xsnac_t;
82:
83: static gchar *get_kdc_url(OscarData *od)
84: {
85: PurpleAccount *account = purple_connection_get_account(od->gc);
86: const gchar *server;
87: gchar *url;
88: gchar *port_str = NULL;
89: gint port;
90:
91: server = purple_account_get_string(account, "server", AIM_DEFAULT_KDC_SERVER);
92: port = purple_account_get_int(account, "port", AIM_DEFAULT_KDC_PORT);
93: if (port != 443)
94: port_str = g_strdup_printf(":%d", port);
95: url = g_strdup_printf("https://%s%s/", server, port_str ? port_str : "");
96: g_free(port_str);
97:
98: return url;
99: }
100:
101: static const char *get_client_key(OscarData *od)
102: {
103: return oscar_get_ui_info_string(
104: od->icq ? "prpl-icq-clientkey" : "prpl-aim-clientkey",
105: od->icq ? ICQ_DEFAULT_CLIENT_KEY : AIM_DEFAULT_CLIENT_KEY);
106: }
107:
108: static void
109: aim_encode_password(const char *password, gchar *encoded)
110: {
111: guint8 encoding_table[] = {
112: 0x76, 0x91, 0xc5, 0xe7,
113: 0xd0, 0xd9, 0x95, 0xdd,
114: 0x9e, 0x2F, 0xea, 0xd8,
115: 0x6B, 0x21, 0xc2, 0xbc,
116:
117: };
118: guint i;
119:
120: /*
121: * We truncate AIM passwords to 16 characters since that's what
122: * the official client does as well.
123: */
124: for (i = 0; i < strlen(password) && i < MAXAIMPASSLEN; i++)
125: encoded[i] = (password[i] ^ encoding_table[i]);
126: }
127:
128: static void
129: aim_xsnac_free(aim_xsnac_t *xsnac)
130: {
131: gint i;
132:
133: g_free(xsnac->principal1);
134: g_free(xsnac->principal2);
135: aim_tlvlist_free(xsnac->tlvlist);
136:
137: for (i = 0; i < xsnac->num_tokens; i++) {
138: g_free(xsnac->tokens[i].main_tlv->value);
139: g_free(xsnac->tokens[i].main_tlv);
140: g_free(xsnac->tokens[i].principal1);
141: g_free(xsnac->tokens[i].service);
142: g_free(xsnac->tokens[i].principal1_again);
143: g_free(xsnac->tokens[i].principal2);
144: g_free(xsnac->tokens[i].footer);
145: aim_tlvlist_free(xsnac->tokens[i].tlvlist);
146: }
147: g_free(xsnac->tokens);
148: }
149:
150: static void
151: kerberos_login_cb(PurpleUtilFetchUrlData *url_data, gpointer user_data,
152: const gchar *got_data, gsize got_len, const gchar *error_message)
153: {
154: OscarData *od = user_data;
155: PurpleConnection *gc;
156: ByteStream bs;
157: aim_xsnac_t xsnac = {0};
158: guint16 len;
159: gchar *bosip = NULL;
160: gchar *tlsCertName = NULL;
161: guint8 *cookie = NULL;
162: guint32 cookie_len = 0;
163: char *host; int port;
164: gsize i;
165:
166: gc = od->gc;
167:
168: od->url_data = NULL;
169:
170: if (error_message != NULL || got_len == 0) {
171: gchar *tmp;
172: gchar *url;
173:
174: url = get_kdc_url(od);
175: tmp = g_strdup_printf(_("Error requesting %s: %s"),
176: url, error_message ?
177: error_message : _("The server returned an empty response"));
178: purple_connection_error_reason(gc,
179: PURPLE_CONNECTION_ERROR_NETWORK_ERROR, tmp);
180: g_free(tmp);
181: g_free(url);
182: return;
183: }
184:
185: purple_debug_info("oscar", "Received kerberos login HTTP response %lu : ", got_len);
186:
187: byte_stream_init(&bs, (guint8 *)got_data, got_len);
188:
189: xsnac.family = byte_stream_get16(&bs);
190: xsnac.subtype = byte_stream_get16(&bs);
191: byte_stream_getrawbuf(&bs, (guint8 *) xsnac.flags, 8);
192:
193: if (xsnac.family == 0x50C && xsnac.subtype == 0x0005) {
194: purple_connection_error_reason(gc,
195: PURPLE_CONNECTION_ERROR_AUTHENTICATION_FAILED,
196: _("Incorrect password"));
197: return;
198: }
199: if (xsnac.family != 0x50C || xsnac.subtype != 0x0003) {
200: purple_connection_error_reason(gc,
201: PURPLE_CONNECTION_ERROR_NETWORK_ERROR,
202: _("Error parsing response from authentication server"));
203: return;
204: }
205: xsnac.request_id = byte_stream_get16(&bs);
206: xsnac.epoch = byte_stream_get32(&bs);
207: xsnac.unknown = byte_stream_get32(&bs);
208: len = byte_stream_get16(&bs);
209: xsnac.principal1 = byte_stream_getstr(&bs, len);
210: len = byte_stream_get16(&bs);
211: xsnac.principal2 = byte_stream_getstr(&bs, len);
212: xsnac.num_tokens = byte_stream_get16(&bs);
213:
214: purple_debug_info("oscar", "KDC: %d tokens between '%s' and '%s'\n",
215: xsnac.num_tokens, xsnac.principal1, xsnac.principal2);
216: xsnac.tokens = g_new0(aim_xsnac_token_t, xsnac.num_tokens);
217: for (i = 0; i < xsnac.num_tokens; i++) {
218: GSList *tlv;
219:
220: tlv = aim_tlvlist_readnum(&bs, 1);
221: if (tlv)
222: xsnac.tokens[i].main_tlv = tlv->data;
223: g_slist_free(tlv);
224:
225: len = byte_stream_get16(&bs);
226: xsnac.tokens[i].principal1 = byte_stream_getstr(&bs, len);
227: len = byte_stream_get16(&bs);
228: xsnac.tokens[i].service = byte_stream_getstr(&bs, len);
229: len = byte_stream_get16(&bs);
230: xsnac.tokens[i].principal1_again = byte_stream_getstr(&bs, len);
231: len = byte_stream_get16(&bs);
232: xsnac.tokens[i].principal2 = byte_stream_getstr(&bs, len);
233: xsnac.tokens[i].unknown = byte_stream_get8(&bs);
234: len = byte_stream_get16(&bs);
235: xsnac.tokens[i].footer = byte_stream_getraw(&bs, len);
236:
237: xsnac.tokens[i].dates.unknown1 = byte_stream_get32(&bs);
238: xsnac.tokens[i].dates.unknown2 = byte_stream_get32(&bs);
239: xsnac.tokens[i].dates.epoch_now = byte_stream_get32(&bs);
240: xsnac.tokens[i].dates.epoch_valid = byte_stream_get32(&bs);
241: xsnac.tokens[i].dates.epoch_renew = byte_stream_get32(&bs);
242: xsnac.tokens[i].dates.epoch_expire = byte_stream_get32(&bs);
243: xsnac.tokens[i].dates.unknown3 = byte_stream_get32(&bs);
244: xsnac.tokens[i].dates.unknown4 = byte_stream_get32(&bs);
245: xsnac.tokens[i].dates.unknown5 = byte_stream_get32(&bs);
246:
247: len = byte_stream_get16(&bs);
248: xsnac.tokens[i].tlvlist = aim_tlvlist_readnum(&bs, len);
249:
250: purple_debug_info("oscar", "Token %lu has %d TLVs for service '%s'\n",
251: i, len, xsnac.tokens[i].service);
252: }
253: len = byte_stream_get16(&bs);
254: xsnac.tlvlist = aim_tlvlist_readnum(&bs, len);
255:
256: for (i = 0; i < xsnac.num_tokens; i++) {
257: if (purple_strequal(xsnac.tokens[i].service, "im/boss")) {
258: aim_tlv_t *tlv;
259: GSList *tlvlist;
260: ByteStream tbs;
261:
262: tlv = aim_tlv_gettlv(xsnac.tokens[i].tlvlist, 0x0003, 1);
263: if (tlv != NULL) {
264: byte_stream_init(&tbs, tlv->value, tlv->length);
265: byte_stream_get32(&tbs);
266: tlvlist = aim_tlvlist_read(&tbs);
267: if (aim_tlv_gettlv(tlvlist, 0x0005, 1))
268: bosip = aim_tlv_getstr(tlvlist, 0x0005, 1);
269: if (aim_tlv_gettlv(tlvlist, 0x0005, 1))
270: tlsCertName = aim_tlv_getstr(tlvlist, 0x008D, 1);
271: tlv = aim_tlv_gettlv(tlvlist, 0x0006, 1);
272: if (tlv) {
273: cookie_len = tlv->length;
274: cookie = tlv->value;
275: }
276: }
277: break;
278: }
279: }
280: if (bosip && cookie) {
281: port = AIM_DEFAULT_KDC_PORT;
282: for (i = 0; i < strlen(bosip); i++) {
283: if (bosip[i] == ':') {
284: port = atoi(&(bosip[i+1]));
285: break;
286: }
287: }
288: host = g_strndup(bosip, i);
289: oscar_connect_to_bos(gc, od, host, port, cookie, cookie_len, tlsCertName);
290: g_free(host);
291: } else {
292: purple_connection_error_reason(gc,
293: PURPLE_CONNECTION_ERROR_NETWORK_ERROR,
294: _("Unknown error during authentication"));
295: }
296: aim_xsnac_free(&xsnac);
297: g_free(tlsCertName);
298: g_free(bosip);
299: }
300:
301: /**
302: * This function sends a binary blob request to the Kerberos KDC server
303: * https://kdc.uas.aol.com with the user's username and password and
304: * receives the IM cookie, which is used to request a connection to the
305: * BOSS server.
306: * The binary data below is what AIM 8.0.8.1 sends in order to authenticate
307: * to the KDC server. It is an 'X-SNAC' packet, which is relatively similar
308: * to SNAC packets but somehow different.
309: * The header starts with the 0x50C family follow by 0x0002 subtype, then
310: * some fixed length data and TLVs. The string "COOL" appears in there for
311: * some reason followed by the 'US' and 'en' strings.
312: * Then the 'imApp key=<client key>' comes after that, and then the username
313: * and the string "im/boss" which seems to represent the service we are
314: * requesting the authentication for. Changing that will lead to a
315: * 'unknown service' error. The client key is then added again (without the
316: * 'imApp key' string prepended to it) then a XOR-ed version of the password.
317: * The meaning of the header/footer/in-between bytes is not known but never
318: * seems to change so there is no need to reverse engineer their meaning at
319: * this point.
320: */
321: void send_kerberos_login(OscarData *od, const char *username)
322: {
323: PurpleConnection *gc;
324: GString *request;
325: gchar *url;
326: const gchar *password;
327: gchar password_xored[MAXAIMPASSLEN];
328: const gchar *client_key;
329: gchar *imapp_key;
330: GString *body;
331: guint16 len_be;
332: guint16 reqid;
333: const gchar header[] = {
334: 0x05, 0x0C, 0x00, 0x02, 0x00, 0x00, 0x00, 0x00,
335: 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
336: 0x00, 0x00, 0x00, 0x00, 0x00, 0x05, 0x00, 0x00,
337: 0x00, 0x08, 0x10, 0x00, 0x00, 0x00, 0x00, 0x05,
338: 0x00, 0x01, 0x00, 0x04, 0x00, 0x00, 0x00, 0x05,
339: 0x00, 0x02, 0x00, 0x04, 0x00, 0x00, 0x18, 0x99,
340: 0x00, 0x05, 0x00, 0x04, 0x43, 0x4F, 0x4F, 0x4C,
341: 0x00, 0x0A, 0x00, 0x02, 0x00, 0x01, 0x00, 0x0B,
342: 0x00, 0x04, 0x00, 0x10, 0x00, 0x01, 0x00, 0x00,
343: 0x00, 0x07, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02,
344: 0x55, 0x53, 0x00, 0x02, 0x65, 0x6E, 0x00, 0x04,
345: 0x00, 0x01, 0x00, 0x04, 0x00, 0x00, 0x00, 0x0D,
346: 0x00, 0x02, 0x00, 0x04, 0x00, 0x00, 0x00, 0x04,
347: 0x00, 0x05};
348: const gchar pre_username[] = {
349: 0x00, 0x07, 0x00, 0x04, 0x00, 0x00, 0x01, 0x8B,
350: 0x01, 0x00, 0x00, 0x00, 0x00};
351: const gchar post_username[] = {
352: 0x00, 0x07, 0x69, 0x6D, 0x2F, 0x62, 0x6F, 0x73,
353: 0x73, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
354: 0x04, 0x00, 0x02};
355: const gchar pre_password[] = {
356: 0x40, 0x00, 0x00, 0x00, 0x00, 0x04, 0x00, 0x01,
357: 0x00, 0x00};
358: const gchar post_password[] = {0x00, 0x00, 0x00, 0x1D};
359: const gchar footer[] = {
360: 0x00, 0x21, 0x00, 0x32, 0x00, 0x01, 0x10, 0x03,
361: 0x00, 0x2C, 0x00, 0x07, 0x00, 0x14, 0x00, 0x04,
362: 0x00, 0x00, 0x01, 0x8B, 0x00, 0x16, 0x00, 0x02,
363: 0x00, 0x26, 0x00, 0x17, 0x00, 0x02, 0x00, 0x07,
364: 0x00, 0x18, 0x00, 0x02, 0x00, 0x00, 0x00, 0x19,
365: 0x00, 0x02, 0x00, 0x0D, 0x00, 0x1A, 0x00, 0x02,
366: 0x00, 0x04, 0x00, 0xAB, 0x00, 0x00, 0x00, 0x28,
367: 0x00, 0x00};
368:
369: gc = od->gc;
370:
371: password = purple_connection_get_password(gc);
372: aim_encode_password(password, password_xored);
373:
374: client_key = get_client_key(od);
375: imapp_key = g_strdup_printf("imApp key=%s", client_key);
376:
377: /* Construct the body of the HTTP POST request */
378: body = g_string_new(NULL);
379: g_string_append_len(body, header, sizeof(header));
380: reqid = (guint16) g_random_int();
381: g_string_overwrite_len(body, 0xC, (void *)&reqid, sizeof(guint16));
382:
383: len_be = GUINT16_TO_BE(strlen(imapp_key));
384: g_string_append_len(body, (void *)&len_be, sizeof(guint16));
385: g_string_append(body, imapp_key);
386:
387: len_be = GUINT16_TO_BE(strlen(username));
388: g_string_append_len(body, pre_username, sizeof(pre_username));
389: g_string_append_len(body, (void *)&len_be, sizeof(guint16));
390: g_string_append(body, username);
391: g_string_append_len(body, post_username, sizeof(post_username));
392:
393: len_be = GUINT16_TO_BE(strlen(password) + 0x10);
394: g_string_append_len(body, (void *)&len_be, sizeof(guint16));
395: g_string_append_len(body, pre_password, sizeof(pre_password));
396: len_be = GUINT16_TO_BE(strlen(password) + 4);
397: g_string_append_len(body, (void *)&len_be, sizeof(guint16));
398: len_be = GUINT16_TO_BE(strlen(password));
399: g_string_append_len(body, (void *)&len_be, sizeof(guint16));
400: g_string_append_len(body, password_xored, strlen(password));
401: g_string_append_len(body, post_password, sizeof(post_password));
402:
403: len_be = GUINT16_TO_BE(strlen(client_key));
404: g_string_append_len(body, (void *)&len_be, sizeof(guint16));
405: g_string_append(body, client_key);
406: g_string_append_len(body, footer, sizeof(footer));
407:
408: g_free(imapp_key);
409:
410: url = get_kdc_url(od);
411:
412: /* Construct an HTTP POST request */
413: request = g_string_new("POST / HTTP/1.1\n"
414: "Connection: close\n"
415: "Accept: application/x-snac\n"
416: "Host: kdc.uas.nina.chat\n");
417:
418: /* Tack on the body */
419: g_string_append_printf(request, "Content-Type: application/x-snac\n");
420: g_string_append_printf(request, "Content-Length: %" G_GSIZE_FORMAT "\n\n", body->len);
421: g_string_append_len(request, body->str, body->len);
422:
423: /* Send the POST request */
424: od->url_data = purple_util_fetch_url_request_data_len_with_account(
425: purple_connection_get_account(gc), url,
426: TRUE, NULL, TRUE, request->str, request->len, FALSE, -1,
427: kerberos_login_cb, od);
428: g_string_free(request, TRUE);
429:
430: g_string_free(body, TRUE);
431: g_free(url);
432: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>