[389-devel] Please Review: (221905) Add SMD5 password storage support

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




>From 2d5e6350805f81d19ce086e779f5712c3e9228ef Mon Sep 17 00:00:00 2001
From: Nathan Kinder <nkinder@xxxxxxxxxx>
Date: Mon, 26 Oct 2009 13:08:31 -0700
Subject: [PATCH] BZ 221905 - Add SMD5 password storage support.

This adds SMD5 password storage support to the existing password
storage plug-in.  Add upgrade LDIF has been added to ensure that
this new functionality will be available to servers that are
upgraded from previous versions.
---
 Makefile.am                                        |    3 +
 ldap/admin/src/scripts/50smd5pwdstorageplugin.ldif |    8 +
 ldap/ldif/template-dse.ldif.in                     |    9 +
 ldap/servers/plugins/pwdstorage/pwd_init.c         |   26 +++
 ldap/servers/plugins/pwdstorage/pwd_util.c         |   69 ++++++++
 ldap/servers/plugins/pwdstorage/pwdstorage.h       |    7 +
 ldap/servers/plugins/pwdstorage/sha_pwd.c          |   24 +---
 ldap/servers/plugins/pwdstorage/smd5_pwd.c         |  168 ++++++++++++++++++++
 ldap/servers/plugins/pwdstorage/ssha_pwd.c         |   17 +--
 9 files changed, 292 insertions(+), 39 deletions(-)
 create mode 100644 ldap/admin/src/scripts/50smd5pwdstorageplugin.ldif
 create mode 100644 ldap/servers/plugins/pwdstorage/pwd_util.c
 create mode 100644 ldap/servers/plugins/pwdstorage/smd5_pwd.c

diff --git a/Makefile.am b/Makefile.am
index c34e6fe..676b5cf 100644
--- a/Makefile.am
+++ b/Makefile.am
@@ -418,6 +418,7 @@ update_DATA = ldap/admin/src/scripts/exampleupdate.pl \
 	ldap/admin/src/scripts/50guidesyntaxplugin.ldif \
 	ldap/admin/src/scripts/50linkedattrsplugin.ldif \
 	ldap/admin/src/scripts/50usnplugin.ldif \
+	ldap/admin/src/scripts/50smd5pwdstorageplugin.ldif \
 	ldap/admin/src/scripts/60upgradeschemafiles.pl \
 	ldap/admin/src/scripts/dnaplugindepends.ldif
 
@@ -902,7 +903,9 @@ libpwdstorage_plugin_la_SOURCES = ldap/servers/plugins/pwdstorage/clear_pwd.c \
 	ldap/servers/plugins/pwdstorage/md5c.c \
 	ldap/servers/plugins/pwdstorage/ns-mta-md5_pwd.c \
 	ldap/servers/plugins/pwdstorage/pwd_init.c \
+	ldap/servers/plugins/pwdstorage/pwd_util.c \
 	ldap/servers/plugins/pwdstorage/sha_pwd.c \
+	ldap/servers/plugins/pwdstorage/smd5_pwd.c \
 	ldap/servers/plugins/pwdstorage/ssha_pwd.c
 
 libpwdstorage_plugin_la_CPPFLAGS = $(PLUGIN_CPPFLAGS)
diff --git a/ldap/admin/src/scripts/50smd5pwdstorageplugin.ldif b/ldap/admin/src/scripts/50smd5pwdstorageplugin.ldif
new file mode 100644
index 0000000..5375c9f
--- /dev/null
+++ b/ldap/admin/src/scripts/50smd5pwdstorageplugin.ldif
@@ -0,0 +1,8 @@
+dn: cn=SMD5,cn=Password Storage Schemes,cn=plugins,cn=config
+objectclass: top
+objectclass: nsSlapdPlugin
+cn: SMD5
+nsslapd-pluginpath: libpwdstorage-plugin
+nsslapd-plugininitfunc: smd5_pwd_storage_scheme_init
+nsslapd-plugintype: pwdstoragescheme
+nsslapd-pluginenabled: on
diff --git a/ldap/ldif/template-dse.ldif.in b/ldap/ldif/template-dse.ldif.in
index 72708a0..7bcb48a 100644
--- a/ldap/ldif/template-dse.ldif.in
+++ b/ldap/ldif/template-dse.ldif.in
@@ -155,6 +155,15 @@ nsslapd-plugininitfunc: md5_pwd_storage_scheme_init
 nsslapd-plugintype: pwdstoragescheme
 nsslapd-pluginenabled: on
 
+dn: cn=SMD5,cn=Password Storage Schemes,cn=plugins,cn=config
+objectclass: top
+objectclass: nsSlapdPlugin
+cn: SMD5
+nsslapd-pluginpath: libpwdstorage-plugin
+nsslapd-plugininitfunc: smd5_pwd_storage_scheme_init
+nsslapd-plugintype: pwdstoragescheme
+nsslapd-pluginenabled: on
+
 dn: cn=CLEAR,cn=Password Storage Schemes,cn=plugins,cn=config
 objectclass: top
 objectclass: nsSlapdPlugin
diff --git a/ldap/servers/plugins/pwdstorage/pwd_init.c b/ldap/servers/plugins/pwdstorage/pwd_init.c
index 6ae2669..1bd24fd 100644
--- a/ldap/servers/plugins/pwdstorage/pwd_init.c
+++ b/ldap/servers/plugins/pwdstorage/pwd_init.c
@@ -73,6 +73,8 @@ static Slapi_PluginDesc ns_mta_md5_pdesc = { "NS-MTA-MD5-password-storage-scheme
 
 static Slapi_PluginDesc md5_pdesc = { "md5-password-storage-scheme", VENDOR, PACKAGE_VERSION, "MD5 hash algorithm (MD5)" };
 
+static Slapi_PluginDesc smd5_pdesc = { "smd5-password-storage-scheme", VENDOR, PACKAGE_VERSION, "Salted MD5 hash algorithm (SMD5)" };
+
 static char *plugin_name = "NSPwdStoragePlugin";
 
 int
@@ -369,3 +371,27 @@ md5_pwd_storage_scheme_init( Slapi_PBlock *pb )
 	slapi_log_error( SLAPI_LOG_PLUGIN, plugin_name, "<= md5_pwd_storage_scheme_init %d\n\n", rc );
 	return( rc );
 }
+
+int
+smd5_pwd_storage_scheme_init( Slapi_PBlock *pb )
+{
+	int     rc;
+	char *name;
+
+	slapi_log_error( SLAPI_LOG_PLUGIN, plugin_name, "=> smd5_pwd_storage_scheme_init\n" );
+
+	rc = slapi_pblock_set( pb, SLAPI_PLUGIN_VERSION,
+							(void *) SLAPI_PLUGIN_VERSION_01 );
+	rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_DESCRIPTION,
+							(void *)&smd5_pdesc );
+	rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_PWD_STORAGE_SCHEME_ENC_FN,
+							(void *) smd5_pw_enc );
+	rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_PWD_STORAGE_SCHEME_CMP_FN,
+							(void *) smd5_pw_cmp );
+	name = slapi_ch_strdup("SMD5");
+	rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_PWD_STORAGE_SCHEME_NAME,
+							name );
+
+	slapi_log_error( SLAPI_LOG_PLUGIN, plugin_name, "<= smd5_pwd_storage_scheme_init %d\n\n", rc );
+	return( rc );
+}
diff --git a/ldap/servers/plugins/pwdstorage/pwd_util.c b/ldap/servers/plugins/pwdstorage/pwd_util.c
new file mode 100644
index 0000000..c7b4fda
--- /dev/null
+++ b/ldap/servers/plugins/pwdstorage/pwd_util.c
@@ -0,0 +1,69 @@
+/** BEGIN COPYRIGHT BLOCK
+ * This Program is free software; you can redistribute it and/or modify it under
+ * the terms of the GNU General Public License as published by the Free Software
+ * Foundation; version 2 of the License.
+ * 
+ * This Program is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
+ * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
+ * 
+ * You should have received a copy of the GNU General Public License along with
+ * this Program; if not, write to the Free Software Foundation, Inc., 59 Temple
+ * Place, Suite 330, Boston, MA 02111-1307 USA.
+ * 
+ * In addition, as a special exception, Red Hat, Inc. gives You the additional
+ * right to link the code of this Program with code not covered under the GNU
+ * General Public License ("Non-GPL Code") and to distribute linked combinations
+ * including the two, subject to the limitations in this paragraph. Non-GPL Code
+ * permitted under this exception must only link to the code of this Program
+ * through those well defined interfaces identified in the file named EXCEPTION
+ * found in the source code files (the "Approved Interfaces"). The files of
+ * Non-GPL Code may instantiate templates or use macros or inline functions from
+ * the Approved Interfaces without causing the resulting work to be covered by
+ * the GNU General Public License. Only Red Hat, Inc. may make changes or
+ * additions to the list of Approved Interfaces. You must obey the GNU General
+ * Public License in all respects for all of the Program code and other code used
+ * in conjunction with the Program except the Non-GPL Code covered by this
+ * exception. If you modify this file, you may extend this exception to your
+ * version of the file, but you are not obligated to do so. If you do not wish to
+ * provide this exception without modification, you must delete this exception
+ * statement from your version and license this file solely under the GPL without
+ * exception. 
+ * 
+ * 
+ * Copyright (C) 2009 Red Hat, Inc.
+ * All rights reserved.
+ * END COPYRIGHT BLOCK **/
+
+#ifdef HAVE_CONFIG_H
+#  include <config.h>
+#endif
+
+#include <string.h>
+#include "pwdstorage.h"
+
+/*
+ * Utility functions for the Password Storage Scheme plugins.
+ */
+
+/*
+ * calculate the number of bytes the base64 encoded encval
+ * will have when decoded, taking into account padding
+ */
+int
+pwdstorage_base64_decode_len(const char *encval)
+{
+    int len = strlen(encval);
+    if (len && (0 == (len & 3))) {
+        if('=' == encval[len - 1]) {
+            if('=' == encval[len - 2]) {
+                len -= 2;
+            } else {
+                len -= 1;
+            }
+        }
+    }
+
+    return ((len * 3) / 4);
+}
+
diff --git a/ldap/servers/plugins/pwdstorage/pwdstorage.h b/ldap/servers/plugins/pwdstorage/pwdstorage.h
index 895ac4e..f43e63e 100644
--- a/ldap/servers/plugins/pwdstorage/pwdstorage.h
+++ b/ldap/servers/plugins/pwdstorage/pwdstorage.h
@@ -80,6 +80,8 @@
 #define CLEARTEXT_NAME_LEN  5
 #define MD5_SCHEME_NAME "MD5"
 #define MD5_NAME_LEN 3
+#define SALTED_MD5_SCHEME_NAME "SMD5"
+#define SALTED_MD5_NAME_LEN 4
 
 SECStatus sha_salted_hash(char *hash_out, const char *pwd, struct berval *salt, unsigned int secOID);
 int sha_pw_cmp( const char *userpwd, const char *dbpwd, unsigned int shaLen );
@@ -107,5 +109,10 @@ char *crypt_pw_enc( const char *pwd );
 int ns_mta_md5_pw_cmp( const char *userpwd, const char *dbpwd );
 int md5_pw_cmp( const char *userpwd, const char *dbpwd );
 char *md5_pw_enc( const char *pwd );
+int smd5_pw_cmp( const char *userpwd, const char *dbpwd );
+char *smd5_pw_enc( const char *pwd );
+
+/* Utility functions */
+int pwdstorage_base64_decode_len(const char *encval);
 
 #endif /* _PWDSTORAGE_H */
diff --git a/ldap/servers/plugins/pwdstorage/sha_pwd.c b/ldap/servers/plugins/pwdstorage/sha_pwd.c
index ecade7a..d7fb693 100644
--- a/ldap/servers/plugins/pwdstorage/sha_pwd.c
+++ b/ldap/servers/plugins/pwdstorage/sha_pwd.c
@@ -67,28 +67,6 @@ static char *plugin_name = "NSPwdStoragePlugin";
  * It's obsolescent now, but we still handle such stored values.
  */
 
-
-/*
-  calculate the number of bytes the base64 encoded encval
-  will have when decoded, taking into account padding
-*/
-static int
-base64_decode_len(const char *encval)
-{
-    int len = strlen(encval);
-    if (len && (0 == (len & 3))) {
-        if('=' == encval[len - 1]) {
-            if('=' == encval[len - 2]) {
-                len -= 2;
-            } else {
-                len -= 1;
-            }
-        }
-    }
-
-    return ((len * 3) / 4);
-}
-
 int
 sha_pw_cmp (const char *userpwd, const char *dbpwd, unsigned int shaLen )
 {
@@ -132,7 +110,7 @@ sha_pw_cmp (const char *userpwd, const char *dbpwd, unsigned int shaLen )
     /*
      * Decode hash stored in database.
      */
-    hash_len = base64_decode_len(dbpwd);
+    hash_len = pwdstorage_base64_decode_len(dbpwd);
     if ( hash_len > sizeof(quick_dbhash) ) { /* get more space: */
         dbhash = (char*) slapi_ch_calloc( hash_len, sizeof(char) );
         if ( dbhash == NULL ) goto loser;
diff --git a/ldap/servers/plugins/pwdstorage/smd5_pwd.c b/ldap/servers/plugins/pwdstorage/smd5_pwd.c
new file mode 100644
index 0000000..f7689ed
--- /dev/null
+++ b/ldap/servers/plugins/pwdstorage/smd5_pwd.c
@@ -0,0 +1,168 @@
+/** BEGIN COPYRIGHT BLOCK
+ * This Program is free software; you can redistribute it and/or modify it under
+ * the terms of the GNU General Public License as published by the Free Software
+ * Foundation; version 2 of the License.
+ * 
+ * This Program is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
+ * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
+ * 
+ * You should have received a copy of the GNU General Public License along with
+ * this Program; if not, write to the Free Software Foundation, Inc., 59 Temple
+ * Place, Suite 330, Boston, MA 02111-1307 USA.
+ * 
+ * In addition, as a special exception, Red Hat, Inc. gives You the additional
+ * right to link the code of this Program with code not covered under the GNU
+ * General Public License ("Non-GPL Code") and to distribute linked combinations
+ * including the two, subject to the limitations in this paragraph. Non-GPL Code
+ * permitted under this exception must only link to the code of this Program
+ * through those well defined interfaces identified in the file named EXCEPTION
+ * found in the source code files (the "Approved Interfaces"). The files of
+ * Non-GPL Code may instantiate templates or use macros or inline functions from
+ * the Approved Interfaces without causing the resulting work to be covered by
+ * the GNU General Public License. Only Red Hat, Inc. may make changes or
+ * additions to the list of Approved Interfaces. You must obey the GNU General
+ * Public License in all respects for all of the Program code and other code used
+ * in conjunction with the Program except the Non-GPL Code covered by this
+ * exception. If you modify this file, you may extend this exception to your
+ * version of the file, but you are not obligated to do so. If you do not wish to
+ * provide this exception without modification, you must delete this exception
+ * statement from your version and license this file solely under the GPL without
+ * exception. 
+ * 
+ * 
+ * Copyright (C) 2005 Red Hat, Inc.
+ * All rights reserved.
+ * END COPYRIGHT BLOCK **/
+
+#ifdef HAVE_CONFIG_H
+#  include <config.h>
+#endif
+
+/*
+ * Based on MD5 Password Encryption/Comparison routines by David Irving,
+ * Fred Brittain, and Aaron Gagnon --  University of Maine Farmington
+ * Donated to the RedHat Directory Server Project 2005-06-10 
+ */
+
+#include <string.h>
+#include <sys/types.h>
+#include <stdio.h>
+#include <pk11func.h>
+#include <nss.h>
+#include <nssb64.h>
+#include <sechash.h>
+#include "pwdstorage.h"
+
+#define MD5_DEFAULT_SALT_LENGTH 4
+#define MD5_MAX_SALT_LENGTH 16
+#define SALTED_MD5_SUBSYSTEM_NAME "Salted MD5 password hash"
+
+int
+smd5_pw_cmp( const char *userpwd, const char *dbpwd )
+{
+   int rc=-1;
+   PK11Context *ctx=NULL;
+   unsigned int outLen;
+   unsigned char userhash[MD5_LENGTH];
+   int hash_len;
+   unsigned char quick_dbhash[MD5_LENGTH + MD5_DEFAULT_SALT_LENGTH + 1];
+   unsigned char *dbhash = quick_dbhash;
+   struct berval salt;
+   char *hashresult = NULL;
+   SECItem binary_item;
+
+   ctx = PK11_CreateDigestContext(SEC_OID_MD5);
+   if (ctx == NULL) {
+	   slapi_log_error(SLAPI_LOG_PLUGIN, SALTED_MD5_SUBSYSTEM_NAME,
+					   "Could not create context for digest operation for password compare");
+	   goto loser;
+   }
+
+   /*
+    * Decode hash stored in database.
+    */
+   hash_len = pwdstorage_base64_decode_len(dbpwd);
+   if ( hash_len >= sizeof(quick_dbhash) ) { /* get more space: */
+      dbhash = (char*) slapi_ch_calloc( hash_len + 1, sizeof(char) );
+      if ( dbhash == NULL ) goto loser;
+   } else {
+      memset( quick_dbhash, 0, sizeof(quick_dbhash) );
+   }
+
+   hashresult = PL_Base64Decode( dbpwd, 0, dbhash );
+   if (NULL == hashresult) {
+      slapi_log_error( SLAPI_LOG_PLUGIN, SALTED_MD5_SUBSYSTEM_NAME,
+            "smd5_pw_cmp: userPassword \"%s\" is the wrong length "
+            "or is not properly encoded BASE64\n", dbpwd );
+      goto loser;
+   }
+
+   salt.bv_val = (void*)(dbhash + MD5_LENGTH); /* salt starts after hash value */
+   salt.bv_len = hash_len - MD5_LENGTH; /* remaining bytes must be salt */
+
+   /* create the hash */
+   memset( userhash, 0, sizeof(userhash) );
+   PK11_DigestBegin(ctx);
+   PK11_DigestOp(ctx, (const unsigned char *)userpwd, strlen(userpwd));
+   PK11_DigestOp(ctx, (unsigned char*)(salt.bv_val), salt.bv_len);
+   PK11_DigestFinal(ctx, userhash, &outLen, sizeof userhash);
+   PK11_DestroyContext(ctx, 1);
+
+   /* Compare everything up to the salt. */
+   rc = memcmp( userhash, dbhash, MD5_LENGTH );
+
+loser:
+   if ( dbhash && dbhash != quick_dbhash ) slapi_ch_free_string( (char **)&dbhash );
+   return rc;
+}
+
+char *
+smd5_pw_enc( const char *pwd )
+{
+   char * bver, *enc=NULL;
+   PK11Context *ctx=NULL;
+   unsigned int outLen;
+   unsigned char hash_out[MD5_LENGTH + MD5_DEFAULT_SALT_LENGTH];
+   unsigned char b2a_out[(MD5_LENGTH*2) + (MD5_MAX_SALT_LENGTH*2)]; /* conservative */
+   char *salt = hash_out + MD5_LENGTH;
+   struct berval saltval;
+   SECItem binary_item;
+
+   ctx = PK11_CreateDigestContext(SEC_OID_MD5);
+   if (ctx == NULL) {
+	   slapi_log_error(SLAPI_LOG_PLUGIN, SALTED_MD5_SUBSYSTEM_NAME,
+					   "Could not create context for digest operation for password encoding");
+	   return NULL;
+   }
+
+   /* prepare the hash output area */
+   memset( hash_out, 0, sizeof(hash_out) );
+
+   /* generate a new random salt */
+   slapi_rand_array( salt, MD5_DEFAULT_SALT_LENGTH );
+   saltval.bv_val = (void*)salt;
+   saltval.bv_len = MD5_DEFAULT_SALT_LENGTH;
+
+   /* create the hash */
+   PK11_DigestBegin(ctx);
+   PK11_DigestOp(ctx, (const unsigned char *)pwd, strlen(pwd));
+   PK11_DigestOp(ctx, (unsigned char*)(saltval.bv_val), saltval.bv_len);
+   PK11_DigestFinal(ctx, hash_out, &outLen, sizeof hash_out);
+   PK11_DestroyContext(ctx, 1);
+
+   /* convert the binary hash to base64 */
+   binary_item.data = hash_out;
+   binary_item.len = outLen + MD5_DEFAULT_SALT_LENGTH;
+   bver = NSSBase64_EncodeItem(NULL, (char *)b2a_out, sizeof b2a_out, &binary_item);
+   if (bver) {
+	   enc = slapi_ch_smprintf("%c%s%c%s", PWD_HASH_PREFIX_START, SALTED_MD5_SCHEME_NAME,
+							   PWD_HASH_PREFIX_END, bver );
+   } else {
+	   slapi_log_error(SLAPI_LOG_PLUGIN, SALTED_MD5_SUBSYSTEM_NAME,
+					   "Could not base64 encode hashed value for password encoding");
+   }
+	   
+   return( enc );
+}
+
diff --git a/ldap/servers/plugins/pwdstorage/ssha_pwd.c b/ldap/servers/plugins/pwdstorage/ssha_pwd.c
index 6f09d5e..2bd8ef1 100644
--- a/ldap/servers/plugins/pwdstorage/ssha_pwd.c
+++ b/ldap/servers/plugins/pwdstorage/ssha_pwd.c
@@ -58,21 +58,6 @@
 
 #define SHA_SALT_LENGTH    8   /* number of bytes of data in salt */
 
-static void ssha_rand_array(void *randx, size_t len);
-
-
-/* ***************************************************
-	Identical function to slapi_rand_array in util.c, but can't use
-	that here since this module is included in libds_admin, which doesn't
-	link to libslapd.
-   *************************************************** */
-static void
-ssha_rand_array(void *randx, size_t len)
-{
-    PK11_RandomUpdate(randx, len);
-    PK11_GenerateRandom((unsigned char *)randx, (int)len);
-}
-
 SECStatus
 sha_salted_hash(char *hash_out, const char *pwd, struct berval *salt, unsigned int secOID)
 {
@@ -168,7 +153,7 @@ salted_sha_pw_enc( const char *pwd, unsigned int shaLen )
     saltval.bv_len = SHA_SALT_LENGTH;
 
     /* generate a new random salt */
-    ssha_rand_array( salt, SHA_SALT_LENGTH );
+    slapi_rand_array( salt, SHA_SALT_LENGTH );
 
     /* hash the user's key */
     if ( sha_salted_hash( hash, pwd, &saltval, secOID ) != SECSuccess ) {
-- 
1.6.2.5

--
389-devel mailing list
389-devel@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-directory-devel

[Index of Archives]     [Fedora Directory Announce]     [Fedora Users]     [Older Fedora Users Mail]     [Fedora Advisory Board]     [Fedora Security]     [Fedora Devel Java]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Mentors]     [Fedora Package Review]     [Fedora Art]     [Fedora Music]     [Fedora Packaging]     [CentOS]     [Fedora SELinux]     [Big List of Linux Books]     [KDE Users]     [Fedora Art]     [Fedora Docs]

  Powered by Linux