Annotation of embedaddon/strongswan/src/conftest/hooks/pretend_auth.c, revision 1.1.1.1
1.1 misho 1: /*
2: * Copyright (C) 2010 Martin Willi
3: * Copyright (C) 2010 revosec AG
4: *
5: * This program is free software; you can redistribute it and/or modify it
6: * under the terms of the GNU General Public License as published by the
7: * Free Software Foundation; either version 2 of the License, or (at your
8: * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
9: *
10: * This program is distributed in the hope that it will be useful, but
11: * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
12: * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
13: * for more details.
14: */
15:
16: #include "hook.h"
17:
18: #include <sa/ikev2/keymat_v2.h>
19: #include <encoding/payloads/nonce_payload.h>
20: #include <encoding/payloads/cert_payload.h>
21: #include <encoding/payloads/auth_payload.h>
22: #include <encoding/payloads/id_payload.h>
23: #include <encoding/payloads/sa_payload.h>
24: #include <encoding/payloads/ts_payload.h>
25:
26: typedef struct private_pretend_auth_t private_pretend_auth_t;
27:
28: /**
29: * Private data of an pretend_auth_t object.
30: */
31: struct private_pretend_auth_t {
32:
33: /**
34: * Implements the hook_t interface.
35: */
36: hook_t hook;
37:
38: /**
39: * remote peer identity
40: */
41: identification_t *id;
42:
43: /**
44: * reserved bytes of ID payload
45: */
46: char reserved[3];
47:
48: /**
49: * IKE_SA_INIT data for signature
50: */
51: chunk_t ike_init;
52:
53: /**
54: * Nonce for signature
55: */
56: chunk_t nonce;
57:
58: /**
59: * Selected CHILD_SA proposal
60: */
61: proposal_t *proposal;
62:
63: /**
64: * List of initiators Traffic Selectors
65: */
66: linked_list_t *tsi;
67:
68: /**
69: * List of responders Traffic Selectors
70: */
71: linked_list_t *tsr;
72: };
73:
74: /**
75: * Process IKE_SA_INIT request message, outgoing
76: */
77: static void process_init_request(private_pretend_auth_t *this,
78: ike_sa_t *ike_sa, message_t *message)
79: {
80: nonce_payload_t *nonce;
81:
82: nonce = (nonce_payload_t*)message->get_payload(message, PLV2_NONCE);
83: if (nonce)
84: {
85: free(this->nonce.ptr);
86: this->nonce = nonce->get_nonce(nonce);
87: }
88: }
89:
90: /**
91: * Process IKE_AUTH request message, outgoing
92: */
93: static void process_auth_request(private_pretend_auth_t *this,
94: ike_sa_t *ike_sa, message_t *message)
95: {
96: id_payload_t *id;
97: sa_payload_t *sa;
98: ts_payload_t *tsi, *tsr;
99: linked_list_t *proposals;
100:
101: id = (id_payload_t*)message->get_payload(message, PLV2_ID_RESPONDER);
102: if (id)
103: {
104: this->id->destroy(this->id);
105: this->id = id->get_identification(id);
106: }
107: sa = (sa_payload_t*)message->get_payload(message, PLV2_SECURITY_ASSOCIATION);
108: if (sa)
109: {
110: proposals = sa->get_proposals(sa);
111: proposals->remove_first(proposals, (void**)&this->proposal);
112: if (this->proposal)
113: {
114: this->proposal->set_spi(this->proposal, htonl(0x12345678));
115: }
116: proposals->destroy_offset(proposals, offsetof(proposal_t, destroy));
117: }
118: tsi = (ts_payload_t*)message->get_payload(message,
119: PLV2_TS_INITIATOR);
120: if (tsi)
121: {
122: this->tsi = tsi->get_traffic_selectors(tsi);
123: }
124: tsr = (ts_payload_t*)message->get_payload(message,
125: PLV2_TS_RESPONDER);
126: if (tsr)
127: {
128: this->tsr = tsr->get_traffic_selectors(tsr);
129: }
130:
131: }
132:
133: /**
134: * Process IKE_SA_INIT response message, incoming
135: */
136: static void process_init_response(private_pretend_auth_t *this,
137: ike_sa_t *ike_sa, message_t *message)
138: {
139: this->ike_init = chunk_clone(message->get_packet_data(message));
140: }
141:
142: /**
143: * Build CERT payloads
144: */
145: static void build_certs(private_pretend_auth_t *this,
146: ike_sa_t *ike_sa, message_t *message, auth_cfg_t *auth)
147: {
148: enumerator_t *enumerator;
149: cert_payload_t *payload;
150: certificate_t *cert;
151: auth_rule_t type;
152:
153: /* get subject cert first, then issuing certificates */
154: cert = auth->get(auth, AUTH_RULE_SUBJECT_CERT);
155: if (cert)
156: {
157: payload = cert_payload_create_from_cert(PLV2_CERTIFICATE, cert);
158: if (payload)
159: {
160: DBG1(DBG_IKE, "pretending end entity cert \"%Y\"",
161: cert->get_subject(cert));
162: message->add_payload(message, (payload_t*)payload);
163: }
164: }
165: enumerator = auth->create_enumerator(auth);
166: while (enumerator->enumerate(enumerator, &type, &cert))
167: {
168: if (type == AUTH_RULE_IM_CERT)
169: {
170: payload = cert_payload_create_from_cert(PLV2_CERTIFICATE, cert);
171: if (payload)
172: {
173: DBG1(DBG_IKE, "pretending issuer cert \"%Y\"",
174: cert->get_subject(cert));
175: message->add_payload(message, (payload_t*)payload);
176: }
177: }
178: }
179: enumerator->destroy(enumerator);
180: }
181:
182: /**
183: * Build faked AUTH payload
184: */
185: static bool build_auth(private_pretend_auth_t *this,
186: ike_sa_t *ike_sa, message_t *message)
187: {
188: chunk_t octets, auth_data;
189: private_key_t *private;
190: auth_cfg_t *auth;
191: auth_payload_t *auth_payload;
192: auth_method_t auth_method;
193: signature_scheme_t scheme;
194: keymat_v2_t *keymat;
195:
196: auth = auth_cfg_create();
197: private = lib->credmgr->get_private(lib->credmgr, KEY_ANY, this->id, auth);
198: build_certs(this, ike_sa, message, auth);
199: auth->destroy(auth);
200: if (private == NULL)
201: {
202: DBG1(DBG_CFG, "no private key found for '%Y' to pretend AUTH", this->id);
203: return FALSE;
204: }
205:
206: switch (private->get_type(private))
207: {
208: case KEY_RSA:
209: scheme = SIGN_RSA_EMSA_PKCS1_SHA1;
210: auth_method = AUTH_RSA;
211: break;
212: case KEY_ECDSA:
213: /* we try to deduct the signature scheme from the keysize */
214: switch (private->get_keysize(private))
215: {
216: case 256:
217: scheme = SIGN_ECDSA_256;
218: auth_method = AUTH_ECDSA_256;
219: break;
220: case 384:
221: scheme = SIGN_ECDSA_384;
222: auth_method = AUTH_ECDSA_384;
223: break;
224: case 521:
225: scheme = SIGN_ECDSA_521;
226: auth_method = AUTH_ECDSA_521;
227: break;
228: default:
229: DBG1(DBG_CFG, "%d bit ECDSA private key size not supported",
230: private->get_keysize(private));
231: return FALSE;
232: }
233: break;
234: default:
235: DBG1(DBG_CFG, "private key of type %N not supported",
236: key_type_names, private->get_type(private));
237: return FALSE;
238: }
239: keymat = (keymat_v2_t*)ike_sa->get_keymat(ike_sa);
240: if (!keymat->get_auth_octets(keymat, TRUE, this->ike_init, this->nonce,
241: chunk_empty, this->id, this->reserved,
242: &octets, NULL))
243: {
244: private->destroy(private);
245: return FALSE;
246: }
247: if (!private->sign(private, scheme, NULL, octets, &auth_data))
248: {
249: chunk_free(&octets);
250: private->destroy(private);
251: return FALSE;
252: }
253: auth_payload = auth_payload_create();
254: auth_payload->set_auth_method(auth_payload, auth_method);
255: auth_payload->set_data(auth_payload, auth_data);
256: chunk_free(&auth_data);
257: chunk_free(&octets);
258: private->destroy(private);
259: message->add_payload(message, (payload_t*)auth_payload);
260: DBG1(DBG_CFG, "pretending AUTH payload for '%Y' with %N",
261: this->id, auth_method_names, auth_method);
262: return TRUE;
263: }
264:
265: /**
266: * Process IKE_AUTH response message, incoming
267: */
268: static void process_auth_response(private_pretend_auth_t *this,
269: ike_sa_t *ike_sa, message_t *message)
270: {
271: enumerator_t *enumerator;
272: payload_t *payload;
273:
274: /* check for, and remove AUTHENTICATION_FAILED notify */
275: enumerator = message->create_payload_enumerator(message);
276: while (enumerator->enumerate(enumerator, &payload))
277: {
278: notify_payload_t *notify = (notify_payload_t*)payload;
279:
280: if (payload->get_type(payload) != PLV2_NOTIFY ||
281: notify->get_notify_type(notify) != AUTHENTICATION_FAILED)
282: {
283: DBG1(DBG_CFG, "no %N notify found, disabling AUTH pretending",
284: notify_type_names, AUTHENTICATION_FAILED);
285: enumerator->destroy(enumerator);
286: return;
287: }
288: message->remove_payload_at(message, enumerator);
289: payload->destroy(payload);
290: }
291: enumerator->destroy(enumerator);
292:
293: if (!build_auth(this, ike_sa, message))
294: {
295: message->add_notify(message, TRUE, AUTHENTICATION_FAILED, chunk_empty);
296: return;
297: }
298: message->add_payload(message, (payload_t*)
299: id_payload_create_from_identification(PLV2_ID_RESPONDER, this->id));
300: if (this->proposal)
301: {
302: message->add_payload(message, (payload_t*)
303: sa_payload_create_from_proposal_v2(this->proposal));
304: }
305: if (this->tsi)
306: {
307: message->add_payload(message, (payload_t*)
308: ts_payload_create_from_traffic_selectors(TRUE, this->tsi));
309: }
310: if (this->tsr)
311: {
312: message->add_payload(message, (payload_t*)
313: ts_payload_create_from_traffic_selectors(FALSE, this->tsr));
314: }
315: }
316:
317: METHOD(listener_t, message, bool,
318: private_pretend_auth_t *this, ike_sa_t *ike_sa, message_t *message,
319: bool incoming, bool plain)
320: {
321: if (plain)
322: {
323: if (incoming)
324: {
325: if (!message->get_request(message))
326: {
327: if (message->get_exchange_type(message) == IKE_SA_INIT)
328: {
329: process_init_response(this, ike_sa, message);
330: }
331: if (message->get_exchange_type(message) == IKE_AUTH &&
332: message->get_message_id(message) == 1)
333: {
334: process_auth_response(this, ike_sa, message);
335: }
336: }
337: }
338: else
339: {
340: if (message->get_request(message))
341: {
342: if (message->get_exchange_type(message) == IKE_SA_INIT)
343: {
344: process_init_request(this, ike_sa, message);
345: }
346: if (message->get_exchange_type(message) == IKE_AUTH &&
347: message->get_message_id(message) == 1)
348: {
349: process_auth_request(this, ike_sa, message);
350: }
351: }
352: }
353: }
354: return TRUE;
355: }
356:
357: METHOD(hook_t, destroy, void,
358: private_pretend_auth_t *this)
359: {
360: if (this->tsi)
361: {
362: this->tsi->destroy_offset(this->tsi, offsetof(traffic_selector_t, destroy));
363: }
364: if (this->tsr)
365: {
366: this->tsr->destroy_offset(this->tsr, offsetof(traffic_selector_t, destroy));
367: }
368: DESTROY_IF(this->proposal);
369: this->id->destroy(this->id);
370: free(this->ike_init.ptr);
371: free(this->nonce.ptr);
372: free(this);
373: }
374:
375: /**
376: * Create the IKE_AUTH fill hook
377: */
378: hook_t *pretend_auth_hook_create(char *name)
379: {
380: private_pretend_auth_t *this;
381:
382: INIT(this,
383: .hook = {
384: .listener = {
385: .message = _message,
386: },
387: .destroy = _destroy,
388: },
389: .id = identification_create_from_string(
390: conftest->test->get_str(conftest->test,
391: "hooks.%s.peer", "%any", name)),
392: );
393:
394: return &this->hook;
395: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>