NeoMutt  2025-12-11-800-ga0ee0f
Teaching an old dog new tricks
DOXYGEN
Loading...
Searching...
No Matches
auth_gss.c
Go to the documentation of this file.
1
24
37
38#include "config.h"
39#include <arpa/inet.h>
40#include <string.h>
41#include "private.h"
42#include "mutt/lib.h"
43#include "config/lib.h"
44#include "core/lib.h"
45#include "conn/lib.h"
46#include "adata.h"
47#include "auth.h"
48#ifdef HAVE_HEIMDAL
49#include <gssapi/gssapi.h>
50#define gss_nt_service_name GSS_C_NT_HOSTBASED_SERVICE
51#else
52#include <gssapi/gssapi.h>
53#include <gssapi/gssapi_generic.h>
54#endif
55
56#define GSS_AUTH_P_NONE 1
57#define GSS_AUTH_P_INTEGRITY 2
58#define GSS_AUTH_P_PRIVACY 4
59
65static void print_gss_error(OM_uint32 err_maj, OM_uint32 err_min)
66{
67 OM_uint32 maj_stat, min_stat;
68 OM_uint32 msg_ctx = 0;
69 gss_buffer_desc status_string;
70 char buf_maj[512] = { 0 };
71 char buf_min[512] = { 0 };
72
73 do
74 {
75 maj_stat = gss_display_status(&min_stat, err_maj, GSS_C_GSS_CODE,
76 GSS_C_NO_OID, &msg_ctx, &status_string);
77 if (GSS_ERROR(maj_stat))
78 break;
79 size_t status_len = status_string.length;
80 if (status_len >= sizeof(buf_maj))
81 status_len = sizeof(buf_maj) - 1;
82 strncpy(buf_maj, (char *) status_string.value, status_len);
83 buf_maj[status_len] = '\0';
84 gss_release_buffer(&min_stat, &status_string);
85
86 maj_stat = gss_display_status(&min_stat, err_min, GSS_C_MECH_CODE,
87 GSS_C_NULL_OID, &msg_ctx, &status_string);
88 if (!GSS_ERROR(maj_stat))
89 {
90 status_len = status_string.length;
91 if (status_len >= sizeof(buf_min))
92 status_len = sizeof(buf_min) - 1;
93 strncpy(buf_min, (char *) status_string.value, status_len);
94 buf_min[status_len] = '\0';
95 gss_release_buffer(&min_stat, &status_string);
96 }
97 } while (!GSS_ERROR(maj_stat) && (msg_ctx != 0));
98
99 mutt_debug(LL_DEBUG2, "((%s:%d )(%s:%d))\n", buf_maj, err_maj, buf_min, err_min);
100}
101
105enum ImapAuthRes imap_auth_gss(struct ImapAccountData *adata, const char *method)
106{
107 gss_buffer_desc request_buf, send_token;
108 gss_buffer_t sec_token;
109 gss_name_t target_name;
110 gss_ctx_id_t context;
111 gss_OID mech_name;
112 char server_conf_flags;
113 gss_qop_t quality;
114 int cflags;
115 OM_uint32 maj_stat, min_stat;
116 unsigned long buf_size;
117 int rc2, rc = IMAP_AUTH_FAILURE;
118
119 if (!(adata->capabilities & IMAP_CAP_AUTH_GSSAPI))
120 return IMAP_AUTH_UNAVAIL;
121
122 if (mutt_account_getuser(&adata->conn->account) < 0)
123 return IMAP_AUTH_FAILURE;
124
125 struct Buffer *buf1 = buf_pool_get();
126 struct Buffer *buf2 = buf_pool_get();
127
128 /* get an IMAP service ticket for the server */
129 buf_printf(buf1, "imap@%s", adata->conn->account.host);
130 request_buf.value = buf1->data;
131 request_buf.length = buf_len(buf1);
132
133 const short c_debug_level = cs_subset_number(NeoMutt->sub, "debug_level");
134 maj_stat = gss_import_name(&min_stat, &request_buf, gss_nt_service_name, &target_name);
135 if (maj_stat != GSS_S_COMPLETE)
136 {
137 mutt_debug(LL_DEBUG2, "Couldn't get service name for [%s]\n", buf1->data);
139 goto cleanup;
140 }
141 else if (c_debug_level >= 2)
142 {
143 gss_display_name(&min_stat, target_name, &request_buf, &mech_name);
144 mutt_debug(LL_DEBUG2, "Using service name [%s]\n", (char *) request_buf.value);
145 gss_release_buffer(&min_stat, &request_buf);
146 }
147 /* Acquire initial credentials - without a TGT GSSAPI is UNAVAIL */
148 sec_token = GSS_C_NO_BUFFER;
149 context = GSS_C_NO_CONTEXT;
150
151 /* build token */
152 maj_stat = gss_init_sec_context(&min_stat, GSS_C_NO_CREDENTIAL, &context, target_name,
153 GSS_C_NO_OID, GSS_C_MUTUAL_FLAG | GSS_C_SEQUENCE_FLAG,
154 0, GSS_C_NO_CHANNEL_BINDINGS, sec_token, NULL,
155 &send_token, (unsigned int *) &cflags, NULL);
156 if ((maj_stat != GSS_S_COMPLETE) && (maj_stat != GSS_S_CONTINUE_NEEDED))
157 {
158 print_gss_error(maj_stat, min_stat);
159 mutt_debug(LL_DEBUG1, "Error acquiring credentials - no TGT?\n");
160 gss_release_name(&min_stat, &target_name);
161
163 goto cleanup;
164 }
165
166 /* now begin login */
167 // L10N: (%s) is the method name, e.g. Anonymous, CRAM-MD5, GSSAPI, SASL
168 mutt_message(_("Authenticating (%s)..."), "GSSAPI");
169
170 imap_cmd_start(adata, "AUTHENTICATE GSSAPI");
171
172 /* expect a null continuation response ("+") */
173 do
174 {
175 rc2 = imap_cmd_step(adata);
176 } while (rc2 == IMAP_RES_CONTINUE);
177
178 if (rc2 != IMAP_RES_RESPOND)
179 {
180 mutt_debug(LL_DEBUG2, "Invalid response from server: %s\n", buf1->data);
181 gss_release_name(&min_stat, &target_name);
182 goto bail;
183 }
184
185 /* now start the security context initialisation loop... */
186 mutt_debug(LL_DEBUG2, "Sending credentials\n");
187 mutt_b64_buffer_encode(buf1, send_token.value, send_token.length);
188 gss_release_buffer(&min_stat, &send_token);
189 buf_addstr(buf1, "\r\n");
190 mutt_socket_send(adata->conn, buf_string(buf1));
191
192 while (maj_stat == GSS_S_CONTINUE_NEEDED)
193 {
194 /* Read server data */
195 do
196 {
197 rc2 = imap_cmd_step(adata);
198 } while (rc2 == IMAP_RES_CONTINUE);
199
200 if (rc2 != IMAP_RES_RESPOND)
201 {
202 mutt_debug(LL_DEBUG1, "#1 Error receiving server response\n");
203 gss_release_name(&min_stat, &target_name);
204 goto bail;
205 }
206
207 if (mutt_b64_buffer_decode(buf2, adata->buf + 2) < 0)
208 {
209 mutt_debug(LL_DEBUG1, "Invalid base64 server response\n");
210 gss_release_name(&min_stat, &target_name);
211 goto err_abort_cmd;
212 }
213 request_buf.value = buf2->data;
214 request_buf.length = buf_len(buf2);
215 sec_token = &request_buf;
216
217 /* Write client data */
218 maj_stat = gss_init_sec_context(&min_stat, GSS_C_NO_CREDENTIAL, &context, target_name,
219 GSS_C_NO_OID, GSS_C_MUTUAL_FLAG | GSS_C_SEQUENCE_FLAG,
220 0, GSS_C_NO_CHANNEL_BINDINGS, sec_token, NULL,
221 &send_token, (unsigned int *) &cflags, NULL);
222 if ((maj_stat != GSS_S_COMPLETE) && (maj_stat != GSS_S_CONTINUE_NEEDED))
223 {
224 print_gss_error(maj_stat, min_stat);
225 mutt_debug(LL_DEBUG1, "Error exchanging credentials\n");
226 gss_release_name(&min_stat, &target_name);
227
228 goto err_abort_cmd;
229 }
230 mutt_b64_buffer_encode(buf1, send_token.value, send_token.length);
231 gss_release_buffer(&min_stat, &send_token);
232 buf_addstr(buf1, "\r\n");
233 mutt_socket_send(adata->conn, buf_string(buf1));
234 }
235
236 gss_release_name(&min_stat, &target_name);
237
238 /* get security flags and buffer size */
239 do
240 {
241 rc2 = imap_cmd_step(adata);
242 } while (rc2 == IMAP_RES_CONTINUE);
243
244 if (rc2 != IMAP_RES_RESPOND)
245 {
246 mutt_debug(LL_DEBUG1, "#2 Error receiving server response\n");
247 goto bail;
248 }
249 if (mutt_b64_buffer_decode(buf2, adata->buf + 2) < 0)
250 {
251 mutt_debug(LL_DEBUG1, "Invalid base64 server response\n");
252 goto err_abort_cmd;
253 }
254 request_buf.value = buf2->data;
255 request_buf.length = buf_len(buf2);
256
257 maj_stat = gss_unwrap(&min_stat, context, &request_buf, &send_token, &cflags, &quality);
258 if (maj_stat != GSS_S_COMPLETE)
259 {
260 print_gss_error(maj_stat, min_stat);
261 mutt_debug(LL_DEBUG2, "Couldn't unwrap security level data\n");
262 gss_release_buffer(&min_stat, &send_token);
263 goto err_abort_cmd;
264 }
265 mutt_debug(LL_DEBUG2, "Credential exchange complete\n");
266
267 /* The unwrapped token must be at least 4 bytes: 1 byte of security flags
268 * followed by 3 bytes of maximum buffer size. Reject tokens that are
269 * too short to prevent an out-of-bounds read. */
270 if (send_token.length < 4)
271 {
272 mutt_debug(LL_DEBUG2, "Unwrapped security token too short (%zu bytes)\n",
273 send_token.length);
274 gss_release_buffer(&min_stat, &send_token);
275 goto err_abort_cmd;
276 }
277
278 /* first byte is security levels supported. We want NONE */
279 server_conf_flags = ((char *) send_token.value)[0];
280 if (!(((char *) send_token.value)[0] & GSS_AUTH_P_NONE))
281 {
282 mutt_debug(LL_DEBUG2, "Server requires integrity or privacy\n");
283 gss_release_buffer(&min_stat, &send_token);
284 goto err_abort_cmd;
285 }
286
287 /* we don't care about buffer size if we don't wrap content. But here it is */
288 ((char *) send_token.value)[0] = '\0';
289 buf_size = ntohl(*((long *) send_token.value));
290 gss_release_buffer(&min_stat, &send_token);
291 mutt_debug(LL_DEBUG2, "Unwrapped security level flags: %c%c%c\n",
292 (server_conf_flags & GSS_AUTH_P_NONE) ? 'N' : '-',
293 (server_conf_flags & GSS_AUTH_P_INTEGRITY) ? 'I' : '-',
294 (server_conf_flags & GSS_AUTH_P_PRIVACY) ? 'P' : '-');
295 mutt_debug(LL_DEBUG2, "Maximum GSS token size is %ld\n", buf_size);
296
297 /* agree to terms (hack!) */
298 buf_size = htonl(buf_size); /* not relevant without integrity/privacy */
299 buf_reset(buf1);
301 buf_addstr_n(buf1, ((char *) &buf_size) + 1, 3);
302 /* server decides if principal can log in as user */
303 buf_addstr(buf1, adata->conn->account.user);
304 request_buf.value = buf1->data;
305 request_buf.length = buf_len(buf1);
306 maj_stat = gss_wrap(&min_stat, context, 0, GSS_C_QOP_DEFAULT, &request_buf,
307 &cflags, &send_token);
308 if (maj_stat != GSS_S_COMPLETE)
309 {
310 mutt_debug(LL_DEBUG2, "Error creating login request\n");
311 goto err_abort_cmd;
312 }
313
314 mutt_b64_buffer_encode(buf1, send_token.value, send_token.length);
315 mutt_debug(LL_DEBUG2, "Requesting authorisation as %s\n", adata->conn->account.user);
316 buf_addstr(buf1, "\r\n");
317 mutt_socket_send(adata->conn, buf_string(buf1));
318
319 /* Joy of victory or agony of defeat? */
320 do
321 {
322 rc2 = imap_cmd_step(adata);
323 } while (rc2 == IMAP_RES_CONTINUE);
324 if (rc2 == IMAP_RES_RESPOND)
325 {
326 mutt_debug(LL_DEBUG1, "Unexpected server continuation request\n");
327 goto err_abort_cmd;
328 }
329 if (imap_code(adata->buf))
330 {
331 /* flush the security context */
332 mutt_debug(LL_DEBUG2, "Releasing GSS credentials\n");
333 maj_stat = gss_delete_sec_context(&min_stat, &context, &send_token);
334 if (maj_stat != GSS_S_COMPLETE)
335 mutt_debug(LL_DEBUG1, "Error releasing credentials\n");
336
337 /* send_token may contain a notification to the server to flush
338 * credentials. RFC1731 doesn't specify what to do, and since this
339 * support is only for authentication, we'll assume the server knows
340 * enough to flush its own credentials */
341 gss_release_buffer(&min_stat, &send_token);
342
344 goto cleanup;
345 }
346 else
347 {
348 goto bail;
349 }
350
351err_abort_cmd:
352 mutt_socket_send(adata->conn, "*\r\n");
353 do
354 {
355 rc2 = imap_cmd_step(adata);
356 } while (rc2 == IMAP_RES_CONTINUE);
357
358bail:
359 // L10N: %s is the method name, e.g. Anonymous, CRAM-MD5, GSSAPI, SASL
360 mutt_error(_("%s authentication failed"), "GSSAPI");
362
363cleanup:
364 buf_pool_release(&buf1);
365 buf_pool_release(&buf2);
366
367 return rc;
368}
IMAP authenticator multiplexor.
ImapAuthRes
Results of IMAP Authentication.
Definition auth.h:39
@ IMAP_AUTH_FAILURE
Authentication failed.
Definition auth.h:41
@ IMAP_AUTH_SUCCESS
Authentication successful.
Definition auth.h:40
@ IMAP_AUTH_UNAVAIL
Authentication method not permitted.
Definition auth.h:42
#define GSS_AUTH_P_NONE
No protection (authentication only)
Definition auth_gss.c:56
static void print_gss_error(OM_uint32 err_maj, OM_uint32 err_min)
Print detailed error message to the debug log.
Definition auth_gss.c:65
#define GSS_AUTH_P_PRIVACY
Privacy protection (encryption)
Definition auth_gss.c:58
#define GSS_AUTH_P_INTEGRITY
Integrity protection.
Definition auth_gss.c:57
size_t mutt_b64_buffer_encode(struct Buffer *buf, const char *in, size_t len)
Convert raw bytes to NUL-terminated base64 string.
Definition base64.c:243
int mutt_b64_buffer_decode(struct Buffer *buf, const char *in)
Convert NUL-terminated base64 string to raw bytes.
Definition base64.c:261
int buf_printf(struct Buffer *buf, const char *fmt,...)
Format a string overwriting a Buffer.
Definition buffer.c:161
size_t buf_addstr_n(struct Buffer *buf, const char *s, size_t len)
Add a string to a Buffer, expanding it if necessary.
Definition buffer.c:96
size_t buf_len(const struct Buffer *buf)
Calculate the length of a Buffer.
Definition buffer.c:491
void buf_reset(struct Buffer *buf)
Reset an existing Buffer.
Definition buffer.c:76
size_t buf_addch(struct Buffer *buf, char c)
Add a single character to a Buffer.
Definition buffer.c:241
size_t buf_addstr(struct Buffer *buf, const char *s)
Add a string to a Buffer.
Definition buffer.c:226
static const char * buf_string(const struct Buffer *buf)
Convert a buffer to a const char * "string".
Definition buffer.h:96
short cs_subset_number(const struct ConfigSubset *sub, const char *name)
Get a number config item by name.
Definition helpers.c:143
Convenience wrapper for the config headers.
Connection Library.
int mutt_account_getuser(struct ConnAccount *cac)
Retrieve username into ConnAccount, if necessary.
Definition connaccount.c:51
Convenience wrapper for the core headers.
enum ImapAuthRes imap_auth_gss(struct ImapAccountData *adata, const char *method)
GSS Authentication support - Implements ImapAuth::authenticate() -.
Definition auth_gss.c:105
#define mutt_error(...)
Definition logging2.h:94
#define mutt_message(...)
Definition logging2.h:93
#define mutt_debug(LEVEL,...)
Definition logging2.h:91
Imap-specific Account data.
int imap_cmd_start(struct ImapAccountData *adata, const char *cmdstr)
Given an IMAP command, send it to the server.
Definition command.c:1211
int imap_cmd_step(struct ImapAccountData *adata)
Reads server responses from an IMAP command.
Definition command.c:1225
bool imap_code(const char *s)
Was the command successful.
Definition command.c:1367
Shared constants/structs that are private to IMAP.
#define IMAP_RES_RESPOND
+
Definition private.h:56
#define IMAP_CAP_AUTH_GSSAPI
RFC1731: GSSAPI authentication.
Definition private.h:127
#define IMAP_RES_CONTINUE
* ...
Definition private.h:55
@ LL_DEBUG2
Log at debug level 2.
Definition logging2.h:46
@ LL_DEBUG1
Log at debug level 1.
Definition logging2.h:45
Convenience wrapper for the library headers.
#define _(a)
Definition message.h:28
struct Buffer * buf_pool_get(void)
Get a Buffer from the pool.
Definition pool.c:91
void buf_pool_release(struct Buffer **ptr)
Return a Buffer to the pool.
Definition pool.c:111
#define mutt_socket_send(conn, buf)
Definition socket.h:56
String manipulation buffer.
Definition buffer.h:36
char * data
Pointer to data.
Definition buffer.h:37
char user[128]
Username.
Definition connaccount.h:56
char host[128]
Server to login to.
Definition connaccount.h:54
struct ConnAccount account
Account details: username, password, etc.
Definition connection.h:49
IMAP-specific Account data -.
Definition adata.h:40
ImapCapFlags capabilities
Capability flags.
Definition adata.h:55
char * buf
Command buffer.
Definition adata.h:60
struct Connection * conn
Connection to IMAP server.
Definition adata.h:41
Container for Accounts, Notifications.
Definition neomutt.h:41
struct ConfigSubset * sub
Inherited config items.
Definition neomutt.h:49