1 /*************************************************
2 * Exim - an Internet mail transport agent *
3 *************************************************/
5 /* Copyright (c) University of Cambridge 1995 - 2016 */
6 /* See the file NOTICE for conditions of use and distribution. */
9 /* The stand-alone version just tests the algorithm. We have to drag
10 in the MD5 computation functions, without their own stand-alone main
14 #define CRAM_STAND_ALONE
18 /* This is the normal, non-stand-alone case */
24 /* Options specific to the cram_md5 authentication mechanism. */
26 optionlist auth_cram_md5_options[] = {
27 { "client_name", opt_stringptr,
28 (void *)(offsetof(auth_cram_md5_options_block, client_name)) },
29 { "client_secret", opt_stringptr,
30 (void *)(offsetof(auth_cram_md5_options_block, client_secret)) },
31 { "server_secret", opt_stringptr,
32 (void *)(offsetof(auth_cram_md5_options_block, server_secret)) }
35 /* Size of the options list. An extern variable has to be used so that its
36 address can appear in the tables drtables.c. */
38 int auth_cram_md5_options_count =
39 sizeof(auth_cram_md5_options)/sizeof(optionlist);
41 /* Default private options block for the condition authentication method. */
43 auth_cram_md5_options_block auth_cram_md5_option_defaults = {
44 NULL, /* server_secret */
45 NULL, /* client_secret */
46 NULL /* client_name */
50 /*************************************************
51 * Initialization entry point *
52 *************************************************/
54 /* Called for each instance, after its options have been read, to
55 enable consistency checks to be done, or anything else that needs
59 auth_cram_md5_init(auth_instance *ablock)
61 auth_cram_md5_options_block *ob =
62 (auth_cram_md5_options_block *)(ablock->options_block);
63 if (ob->server_secret != NULL) ablock->server = TRUE;
64 if (ob->client_secret != NULL)
66 ablock->client = TRUE;
67 if (ob->client_name == NULL) ob->client_name = primary_hostname;
71 #endif /* STAND_ALONE */
75 /*************************************************
76 * Perform the CRAM-MD5 algorithm *
77 *************************************************/
79 /* The CRAM-MD5 algorithm is described in RFC 2195. It computes
81 MD5((secret XOR opad), MD5((secret XOR ipad), challenge))
83 where secret is padded out to 64 characters (after being reduced to an MD5
84 digest if longer than 64) and ipad and opad are 64-byte strings of 0x36 and
85 0x5c respectively, and comma means concatenation.
88 secret the shared secret
89 challenge the challenge text
90 digest 16-byte slot to put the answer in
96 compute_cram_md5(uschar *secret, uschar *challenge, uschar *digestptr)
100 int len = Ustrlen(secret);
103 uschar md5secret[16];
105 /* If the secret is longer than 64 characters, we compute its MD5 digest
111 md5_end(&base, (uschar *)secret, len, md5secret);
112 secret = (uschar *)md5secret;
116 /* The key length is now known to be <= 64. Set up the padded and xor'ed
119 memcpy(isecret, secret, len);
120 memset(isecret+len, 0, 64-len);
121 memcpy(osecret, isecret, 64);
123 for (i = 0; i < 64; i++)
129 /* Compute the inner MD5 digest */
132 md5_mid(&base, isecret);
133 md5_end(&base, (uschar *)challenge, Ustrlen(challenge), md5secret);
135 /* Compute the outer MD5 digest */
138 md5_mid(&base, osecret);
139 md5_end(&base, md5secret, 16, digestptr);
145 /*************************************************
146 * Server entry point *
147 *************************************************/
149 /* For interface, see auths/README */
152 auth_cram_md5_server(auth_instance *ablock, uschar *data)
154 auth_cram_md5_options_block *ob =
155 (auth_cram_md5_options_block *)(ablock->options_block);
156 uschar *challenge = string_sprintf("<%d.%ld@%s>", getpid(),
157 (long int) time(NULL), primary_hostname);
158 uschar *clear, *secret;
162 /* If we are running in the test harness, always send the same challenge,
163 an example string taken from the RFC. */
165 if (running_in_test_harness)
166 challenge = US"<1896.697170952@postoffice.reston.mci.net>";
168 /* No data should have been sent with the AUTH command */
170 if (*data != 0) return UNEXPECTED;
172 /* Send the challenge, read the return */
174 if ((rc = auth_get_data(&data, challenge, Ustrlen(challenge))) != OK) return rc;
175 if ((len = b64decode(data, &clear)) < 0) return BAD64;
177 /* The return consists of a user name, space-separated from the CRAM-MD5
178 digest, expressed in hex. Extract the user name and put it in $auth1 and $1.
179 The former is now the preferred variable; the latter is the original one. Then
180 check that the remaining length is 32. */
182 auth_vars[0] = expand_nstring[1] = clear;
183 while (*clear != 0 && !isspace(*clear)) clear++;
184 if (!isspace(*clear)) return FAIL;
187 expand_nlength[1] = clear - expand_nstring[1] - 1;
188 if (len - expand_nlength[1] - 1 != 32) return FAIL;
191 /* Expand the server_secret string so that it can compute a value dependent on
192 the user name if necessary. */
194 debug_print_string(ablock->server_debug_string); /* customized debugging */
195 secret = expand_string(ob->server_secret);
197 /* A forced fail implies failure of authentication - i.e. we have no secret for
202 if (expand_string_forcedfail) return FAIL;
203 auth_defer_msg = expand_string_message;
207 /* Compute the CRAM-MD5 digest that we should have received from the client. */
209 compute_cram_md5(secret, challenge, digest);
214 debug_printf("CRAM-MD5: user name = %s\n", auth_vars[0]);
215 debug_printf(" challenge = %s\n", challenge);
216 debug_printf(" received = %s\n", clear);
217 Ustrcpy(buff," digest = ");
218 for (i = 0; i < 16; i++) sprintf(CS buff+22+2*i, "%02x", digest[i]);
219 debug_printf("%.54s\n", buff);
222 /* We now have to compare the digest, which is 16 bytes in binary, with the
223 data received, which is expressed in lower case hex. We checked above that
224 there were 32 characters of data left. */
226 for (i = 0; i < 16; i++)
230 if (((((a >= 'a')? a - 'a' + 10 : a - '0') << 4) +
231 ((b >= 'a')? b - 'a' + 10 : b - '0')) != digest[i]) return FAIL;
234 /* Expand server_condition as an authorization check */
235 return auth_check_serv_cond(ablock);
240 /*************************************************
241 * Client entry point *
242 *************************************************/
244 /* For interface, see auths/README */
247 auth_cram_md5_client(
248 auth_instance *ablock, /* authenticator block */
249 smtp_inblock *inblock, /* input connection */
250 smtp_outblock *outblock, /* output connection */
251 int timeout, /* command timeout */
252 uschar *buffer, /* for reading response */
253 int buffsize) /* size of buffer */
255 auth_cram_md5_options_block *ob =
256 (auth_cram_md5_options_block *)(ablock->options_block);
257 uschar *secret = expand_string(ob->client_secret);
258 uschar *name = expand_string(ob->client_name);
259 uschar *challenge, *p;
263 /* If expansion of either the secret or the user name failed, return CANCELLED
264 or ERROR, as appropriate. */
266 if (!secret || !name)
268 if (expand_string_forcedfail)
270 *buffer = 0; /* No message */
273 string_format(buffer, buffsize, "expansion of \"%s\" failed in "
274 "%s authenticator: %s",
275 !secret ? ob->client_secret : ob->client_name,
276 ablock->name, expand_string_message);
280 /* Initiate the authentication exchange and read the challenge, which arrives
283 if (smtp_write_command(outblock, FALSE, "AUTH %s\r\n", ablock->public_name) < 0)
285 if (!smtp_read_response(inblock, buffer, buffsize, '3', timeout))
288 if (b64decode(buffer + 4, &challenge) < 0)
290 string_format(buffer, buffsize, "bad base 64 string in challenge: %s",
295 /* Run the CRAM-MD5 algorithm on the secret and the challenge */
297 compute_cram_md5(secret, challenge, digest);
299 /* Create the response from the user name plus the CRAM-MD5 digest */
301 string_format(big_buffer, big_buffer_size - 36, "%s", name);
302 for (p = big_buffer; *p; ) p++;
305 for (i = 0; i < 16; i++)
307 sprintf(CS p, "%02x", digest[i]);
311 /* Send the response, in base 64, and check the result. The response is
312 in big_buffer, but b64encode() returns its result in working store,
313 so calling smtp_write_command(), which uses big_buffer, is OK. */
316 if (smtp_write_command(outblock, FALSE, "%s\r\n", b64encode(big_buffer,
317 p - big_buffer)) < 0) return FAIL_SEND;
319 return smtp_read_response(inblock, (uschar *)buffer, buffsize, '2', timeout)
322 #endif /* STAND_ALONE */
325 /*************************************************
326 **************************************************
327 * Stand-alone test program *
328 **************************************************
329 *************************************************/
333 int main(int argc, char **argv)
336 uschar *secret = US argv[1];
337 uschar *challenge = US argv[2];
340 compute_cram_md5(secret, challenge, digest);
342 for (i = 0; i < 16; i++) printf("%02x", digest[i]);
350 /* End of cram_md5.c */