Ejemplo n.º 1
0
int
main (int argc, char *argv[])
{
  unsigned int client_id;
  char *token, *url = NULL, *ca = NULL, *api_key = NULL, *cai = NULL;
  int debug = 0;
  ykclient_rc ret;
  ykclient_t *ykc = NULL;

  parse_args (argc, argv, &client_id, &token, &url, &ca, &cai, &api_key,
	      &debug);

  if (ca || cai)
    {
      ret = ykclient_init (&ykc);
      if (ret != YKCLIENT_OK)
	return EXIT_FAILURE;
    }

  if (ca)
    {
      ykclient_set_ca_path (ykc, ca);
    }

  if (cai)
    {
      ykclient_set_ca_info (ykc, cai);
    }

  if (debug)
    {
      fprintf (stderr, "Input:\n");
      if (url)
	fprintf (stderr, "  validation URL: %s\n", url);
      if (ca)
	fprintf (stderr, "  CA Path: %s\n", ca);
      if (cai)
	fprintf (stderr, "  CA Info: %s\n", cai);
      fprintf (stderr, "  client id: %d\n", client_id);
      fprintf (stderr, "  token: %s\n", token);
      if (api_key != NULL)
	fprintf (stderr, "  api key: %s\n", api_key);
    }

  ret = ykclient_verify_otp_v2 (ykc, token, client_id, NULL, 1,
				(const char **) &url, api_key);

  if (debug)
    printf ("Verification output (%d): %s\n", ret, ykclient_strerror (ret));

  if (ret == YKCLIENT_REPLAYED_OTP)
    return 2;
  else if (ret != YKCLIENT_OK)
    return 3;

  return EXIT_SUCCESS;
}
Ejemplo n.º 2
0
PAM_EXTERN int
pam_sm_authenticate (pam_handle_t * pamh,
                     int flags, int argc, const char **argv)
{
    int retval, rc;
    const char *user = NULL;
    const char *password = NULL;
    char otp[MAX_TOKEN_ID_LEN + TOKEN_OTP_LEN + 1] = { 0 };
    char otp_id[MAX_TOKEN_ID_LEN + 1] = { 0 };
    int password_len = 0;
    int skip_bytes = 0;
    int valid_token = 0;
    struct pam_conv *conv;
    struct pam_message *pmsg[1], msg[1];
    struct pam_response *resp;
    int nargs = 1;
    ykclient_t *ykc = NULL;
    struct cfg cfg_st;
    struct cfg *cfg = &cfg_st; /* for DBG macro */

    parse_cfg (flags, argc, argv, cfg);

    retval = pam_get_user (pamh, &user, NULL);
    if (retval != PAM_SUCCESS)
    {
        DBG (("get user returned error: %s", pam_strerror (pamh, retval)));
        goto done;
    }
    DBG (("get user returned: %s", user));

    if (cfg->mode == CHRESP) {
#if HAVE_LIBYKPERS_1
        return do_challenge_response(pamh, cfg, user);
#else
        DBG (("no support for challenge/response"));
        retval = PAM_AUTH_ERR;
        goto done;
#endif
    }

    if (cfg->try_first_pass || cfg->use_first_pass)
    {
        retval = pam_get_item (pamh, PAM_AUTHTOK, (const void **) &password);
        if (retval != PAM_SUCCESS)
        {
            DBG (("get password returned error: %s",
                  pam_strerror (pamh, retval)));
            goto done;
        }
        DBG (("get password returned: %s", password));
    }

    if (cfg->use_first_pass && password == NULL)
    {
        DBG (("use_first_pass set and no password, giving up"));
        retval = PAM_AUTH_ERR;
        goto done;
    }

    rc = ykclient_init (&ykc);
    if (rc != YKCLIENT_OK)
    {
        DBG (("ykclient_init() failed (%d): %s", rc, ykclient_strerror (rc)));
        retval = PAM_AUTHINFO_UNAVAIL;
        goto done;
    }

    rc = ykclient_set_client_b64 (ykc, cfg->client_id, cfg->client_key);
    if (rc != YKCLIENT_OK)
    {
        DBG (("ykclient_set_client_b64() failed (%d): %s",
              rc, ykclient_strerror (rc)));
        retval = PAM_AUTHINFO_UNAVAIL;
        goto done;
    }

    if (cfg->capath)
        ykclient_set_ca_path (ykc, cfg->capath);

    if (cfg->url)
        ykclient_set_url_template (ykc, cfg->url);

    if (password == NULL)
    {
        retval = pam_get_item (pamh, PAM_CONV, (const void **) &conv);
        if (retval != PAM_SUCCESS)
        {
            DBG (("get conv returned error: %s", pam_strerror (pamh, retval)));
            goto done;
        }

        pmsg[0] = &msg[0];
        {
            const char *query_template = "Yubikey for `%s': ";
            size_t len = strlen (query_template) + strlen (user);
            size_t wrote;

            msg[0].msg = malloc (len);
            if (!msg[0].msg)
            {
                retval = PAM_BUF_ERR;
                goto done;
            }

            wrote = snprintf ((char *) msg[0].msg, len, query_template, user);
            if (wrote < 0 || wrote >= len)
            {
                retval = PAM_BUF_ERR;
                goto done;
            }
        }
        msg[0].msg_style = cfg->verbose_otp ? PAM_PROMPT_ECHO_ON : PAM_PROMPT_ECHO_OFF;
        resp = NULL;

        retval = conv->conv (nargs, (const struct pam_message **) pmsg,
                             &resp, conv->appdata_ptr);

        free ((char *) msg[0].msg);

        if (retval != PAM_SUCCESS)
        {
            DBG (("conv returned error: %s", pam_strerror (pamh, retval)));
            goto done;
        }

        if (resp->resp == NULL)
        {
            DBG (("conv returned NULL passwd?"));
            goto done;
        }

        DBG (("conv returned %i bytes", strlen(resp->resp)));

        password = resp->resp;
    }

    password_len = strlen (password);
    if (password_len < (cfg->token_id_length + TOKEN_OTP_LEN))
    {
        DBG (("OTP too short to be considered : %i < %i", password_len, (cfg->token_id_length + TOKEN_OTP_LEN)));
        retval = PAM_AUTH_ERR;
        goto done;
    }

    /* In case the input was systempassword+YubiKeyOTP, we want to skip over
       "systempassword" when copying the token_id and OTP to separate buffers */
    skip_bytes = password_len - (cfg->token_id_length + TOKEN_OTP_LEN);

    DBG (("Skipping first %i bytes. Length is %i, token_id set to %i and token OTP always %i.",
          skip_bytes, password_len, cfg->token_id_length, TOKEN_OTP_LEN));

    /* Copy full YubiKey output (public ID + OTP) into otp */
    strncpy (otp, password + skip_bytes, sizeof (otp) - 1);
    /* Copy only public ID into otp_id. Destination buffer is zeroed. */
    strncpy (otp_id, password + skip_bytes, cfg->token_id_length);

    DBG (("OTP: %s ID: %s ", otp, otp_id));

    /* user entered their system password followed by generated OTP? */
    if (password_len > TOKEN_OTP_LEN + cfg->token_id_length)
    {
        char *onlypasswd = strdup (password);

        onlypasswd[password_len - (TOKEN_OTP_LEN + cfg->token_id_length)] = '\0';

        DBG (("Extracted a probable system password entered before the OTP - "
              "setting item PAM_AUTHTOK"));

        retval = pam_set_item (pamh, PAM_AUTHTOK, onlypasswd);
        free (onlypasswd);
        if (retval != PAM_SUCCESS)
        {
            DBG (("set_item returned error: %s", pam_strerror (pamh, retval)));
            goto done;
        }
    }
    else
        password = NULL;

    rc = ykclient_request (ykc, otp);

    DBG (("ykclient return value (%d): %s", rc,
          ykclient_strerror (rc)));

    switch (rc)
    {
    case YKCLIENT_OK:
        break;

    case YKCLIENT_BAD_OTP:
    case YKCLIENT_REPLAYED_OTP:
        retval = PAM_AUTH_ERR;
        goto done;

    default:
        retval = PAM_AUTHINFO_UNAVAIL;
        goto done;
    }

    /* authorize the user with supplied token id */
    if (cfg->ldapserver != NULL || cfg->ldap_uri != NULL)
        valid_token = authorize_user_token_ldap (cfg, user, otp_id);
    else
        valid_token = authorize_user_token (cfg, user, otp_id);

    if (valid_token == 0)
    {
        DBG (("Yubikey not authorized to login as user"));
        retval = PAM_AUTHINFO_UNAVAIL;
        goto done;
    }

    retval = PAM_SUCCESS;

done:
    if (ykc)
        ykclient_done (&ykc);
    if (cfg->alwaysok && retval != PAM_SUCCESS)
    {
        DBG (("alwaysok needed (otherwise return with %d)", retval));
        retval = PAM_SUCCESS;
    }
    DBG (("done. [%s]", pam_strerror (pamh, retval)));
    pam_set_data (pamh, "yubico_setcred_return", (void*) (intptr_t) retval, NULL);

    return retval;
}