Commit graph

233 commits

Author SHA1 Message Date
Kim Alvefur
a2197df832 mod_saslauth: Use fully qualified import here too
Looks like I forgot to update these when merging the channel binding
changes after the great renamening.

Ref #1223
2024-11-24 14:53:49 +01:00
Matthew Wild
d1022fe0c4 mod_saslauth: Log when tls-exporter is NOT supported, as well as when it is 2024-04-17 16:47:38 +01:00
Matthew Wild
c35307551b mod_saslauth: Fire event per SASL step
This matches the behaviour of the newer mod_sasl2 implementation. It allows
plugins to observe (and potentially, with caution, modify) the SASL exchange.
2023-12-05 11:39:11 +00:00
Kim Alvefur
3fbec27699 mod_saslauth: Fire event at start of authentication attempt
As extension point for rate limiting and similar checks, so they can
hook a single event instead of <{sasl1}auth> or stream features, which
might not be fired in case of SASL2 or e.g. HTTP based login.
2023-12-01 23:43:18 +01:00
Matthew Wild
82e46a35f5 mod_saslauth: Allow plugins to override return SASL condition/text 2023-11-30 11:22:40 +00:00
Matthew Wild
c7cf6a8dc3 mod_saslauth: Clear 'auto' from endpoint hash var, it's not a real hash (thanks tmolitor) 2023-10-26 18:30:47 +01:00
Matthew Wild
18db016c2f mod_saslauth, mod_c2s: Disable tls-server-end-point channel binding by default
This channel binding method is now enabled when a hash is manually set in the
config, or it attempts to discover the hash automatically if the value is the
special string "auto".

A related change to mod_c2s prevents complicated certificate lookups in the
client connection hot path - this work now happens only when this channel
binding method is used. I'm not aware of anything else that uses ssl_cfg (vs
ssl_ctx).

Rationale for disabling by default:

- Minor performance impact in automatic cert detection
- This method is weak against a leaked/stolen private key (other methods such
  as 'tls-exporter' would not be compromised in such a case)

Rationale for keeping the implementation:

- For some deployments, this may be the only method available (e.g. due to
  TLS offloading in another process/server).
2023-10-26 15:14:39 +01:00
Matthew Wild
4cd3032523 mod_saslauth: Fix traceback in tls-server-end-point channel binding 2023-10-26 14:40:48 +01:00
Matthew Wild
b029c17c91 mod_saslauth: Actively close cert file after reading
Explicit > implicit
2023-10-24 09:24:01 +01:00
Matthew Wild
a4c91c7646 mod_saslauth: Fix read format string (thanks tmolitor) 2023-10-24 09:23:31 +01:00
Kim Alvefur
c159b0b683 mod_saslauth: Get correct 'tls-server-end-point' with new LuaSec API
MattJ contributed new APIs for retrieving the actually used certificate
and chain to LuaSec, which are not in a release at the time of this
commit.
2022-10-23 02:49:05 +02:00
Kim Alvefur
c6b7b011c0 mod_saslauth: Derive hash from certificate per tls-server-end-point
This originally used a WIP implementation of cert:sigalg(), a method to
retrieve certificate signature algorithm, but it was never submitted
upstream. https://github.com/Zash/luasec/tree/zash/sigalg

cert:getsignaturename() was merged in
de393417b7

XEP-0440 v0.3.0 made implementing tls-server-end-point a MUST
2021-06-29 00:22:36 +02:00
Kim Alvefur
f11fca3cef mod_saslauth: Support tls-server-end-point via manually specified hash
Since this channel binding method is said to enable TLS offloading then
you need tell Prosody the hash (or the full cert), so this seems like a
good start.

Support is RECOMMENDED in XEP-0440 version 0.2
2020-12-07 19:53:26 +01:00
Kim Alvefur
98922d54b1 plugins: Prefix module imports with prosody namespace 2023-03-24 13:15:28 +01:00
Matthew Wild
16137b3b14 mod_saslauth: Support for SASL handlers forcing a specific resource
The token layer supports tokens that are tied to a given resource.
2023-03-01 12:56:08 +00:00
Matthew Wild
afa583dfcd mod_saslauth: Put <sasl-channel-binding> in stream:features per XEP-0440 0.4.0 2022-09-21 15:00:06 +01:00
Matthew Wild
af0f1947cf mod_saslauth: Fix incorrect variable name introduced in 27a4a7e64831 2022-09-03 21:25:51 +01:00
Matthew Wild
5eef82fdcf mod_saslauth: Only announce bind feature if no resource yet bound
It's now possible to bind during SASL2 negotiation.
2022-09-03 21:19:00 +01:00
Matthew Wild
8b384dc77f mod_saslauth: Rename field from 'scope'->'role'
The 'scope' term derives from OAuth, and represents a bundle of permissions.
We're now setting on the term 'role' for a bundle of permissions.

This change does not affect any public modules I'm aware of.
2022-06-15 11:47:39 +01:00
Kim Alvefur
8db7cdc713 mod_saslauth: Implement RFC 9266 'tls-exporter' channel binding (#1760)
Brings back SCRAM-SHA-*-PLUS from its hiatus brought on by the earlier
channel binding method being undefined for TLS 1.3, and the increasing
deployment of TLS 1.3.

See 1bfd238e05ad and #1542

Requires future version of LuaSec, once support for this key material
export method is merged.

See https://github.com/brunoos/luasec/pull/187
2022-06-01 15:06:59 +02:00
Kim Alvefur
2048a7a762 mod_saslauth: Advertise channel bindings via XEP-0440
This is useful when there's more than one channel binding in
circulation, since perhaps there will be varying support for them.
2020-12-06 22:04:43 +01:00
Jonas Schäfer
38346dd6f1 net: isolate LuaSec-specifics
For this, various accessor functions are now provided directly on the
sockets, which reach down into the LuaSec implementation to obtain the
information.

While this may seem of little gain at first, it hides the implementation
detail of the LuaSec+LuaSocket combination that the actual socket and
the TLS layer are separate objects.

The net gain here is that an alternative implementation does not have to
emulate that specific implementation detail and "only" has to expose
LuaSec-compatible data structures on the new functions.
2022-04-27 17:44:14 +02:00
Matthew Wild
067a0ad4d8 usermanager, mod_saslauth: Default to internal_hashed if no auth module specified
The default config was updated in this way long ago, but if no option was
present in the config, Prosody would load internal_plain.

This change can result in changes (for the better) for people using very old
configuration files lacking an 'authentication' setting.
2022-02-10 19:54:14 +00:00
Kim Alvefur
73d1bb1218 various: Require encryption by default for real
These options have been specified (and enabled) in the default config file for
a long time. However if unspecified in the config, they were not enabled. Now
they are.

This may result in a change of behaviour for people using very old config
files that lack the require_encryption options. But that's what we want.
2021-12-25 16:23:40 +01:00
Jonas Schäfer
f18e33228d s2s et al.: Add counters for connection state transitions 2021-04-21 17:11:58 +02:00
Kim Alvefur
7c5659808a Merge 0.11->trunk 2021-04-10 16:45:44 +02:00
Kim Alvefur
f1550b900d mod_saslauth: Use a defined SASL error 2021-03-18 16:16:54 +01:00
Kim Alvefur
139cafdbaf mod_saslauth: Improve code style
This many returns deserve their own line.

`session["sasl_handler"]` style isn't used anywhere else.
2021-03-18 16:17:45 +01:00
tmolitor
a7cc31c6bb mod_saslauth: Don't throw errors in async code when connections are gone
Fixes #1515
2021-03-18 14:30:47 +01:00
Kim Alvefur
15b64ea4ff mod_saslauth: Only advertise channel binding if a finished message is available
In some cases this method returns nothing, unclear why.
2020-11-23 21:52:46 +01:00
Kim Alvefur
b62216fab3 mod_saslauth: Disable 'tls-unique' channel binding with TLS 1.3 (closes #1542)
The 'tls-unique' channel binding is undefined in TLS 1.3 according to a
single sentence in parenthesis in Apendix C of RFC 8446

This may trigger downgrade protection in clients that were expecting
channel binding to be available.
2020-11-23 21:42:52 +01:00
Kim Alvefur
b7a02665ea Merge 0.11->trunk 2020-11-23 21:56:26 +01:00
Matthew Wild
cfa4181982 mod_saslauth: Pass through any auth scope from the SASL handler to sessionmanager.make_authenticated() 2020-02-05 17:56:44 +00:00
Kim Alvefur
9589da30b6 mod_saslauth: Set a nicer bounce error explaining SASL EXTERNAL failures
Better than the previous string concatenation of SASL failure condition
and optional text sent by the remote server.

Would be nice to have a text per condition, other than the probably most
common 'not-authorized'.
2019-12-07 22:55:51 +01:00
Kim Alvefur
0de6ce740e mod_saslauth: Collect SASL EXTERNAL failures into an util.error object
Will be easier than that concatenated string to extract info out of for
use elsewhere.
2019-12-07 22:51:43 +01:00
Kim Alvefur
4053cdb848 mod_saslauth: Advertise correct set of mechanisms
Mistakenly iterates over the set of all supported mechanisms instead of
the one without insecure mechanisms if the connection is insecure.

Not a problem if c2s_require_encryption is true

Introduced in 56a0f68b7797
2019-12-02 16:00:16 +01:00
Kim Alvefur
4d28443876 mod_saslauth: Demote "no SASL mechanisms" error back to warning
This gets printed before TLS if c2s_require_encryption = false,
in which case it is just annoying.
2019-10-15 23:38:29 +02:00
Kim Alvefur
57a86c0b0c mod_saslauth: Improve logging of why no SASL mechanisms were offered 2019-10-15 22:05:51 +02:00
Kim Alvefur
668089d57c mod_saslauth: Use the power of Set Theory to mange sets of SASL mechanisms
This makes sets of excluded mechanisms easily available for use later.
2019-10-15 21:58:10 +02:00
Kim Alvefur
a375a34332 mod_saslauth: Log (debug) messages about channel binding 2019-10-15 21:37:19 +02:00
Kim Alvefur
8eb15f32e1 mod_saslauth: Remove useless debug log line
Fairly useless to only log half of SASL messages.

Use mod_stanza_debug instead to get the full exchange.
2019-10-13 00:33:35 +02:00
Kim Alvefur
bf566284b1 mod_saslauth: Remove commented-out debug log line 2019-10-13 00:32:58 +02:00
Kim Alvefur
40b1e3e0ed plugins: Remove tostring call from logging
Taken care of by loggingmanager now

Mass-rewrite using lua pattern like `tostring%b()`
2019-07-30 02:29:36 +02:00
Kim Alvefur
c1157eb0ae mod_saslauth: Ignore unused argument [luacheck] 2018-02-04 01:05:06 +01:00
Kim Alvefur
e1542aa2ee mod_saslauth: Use renamed API for hooking non-stanzas 2018-02-04 01:03:44 +01:00
Kim Alvefur
e925f5a34a mod_saslauth: Pass SASL EXTERNAL failure reason on to be used in error bounces 2018-02-04 01:01:50 +01:00
Kim Alvefur
477f77e250 mod_saslauth: Close connection if no fallback kicks in on SASL EXTERNAL failure 2018-02-04 00:58:38 +01:00
Kim Alvefur
5a07b39c7f Backed out changeset 89c42aff8510: The problem in ejabberd has reportedly been resolved and this change causes more problems than it solves (fixes #1006) 2018-02-04 01:13:27 +01:00
Kim Alvefur
2d4c94e612 mod_saslauth: Log which mechanisms are offered 2017-12-21 10:15:47 +01:00
Kim Alvefur
3e4952567c mod_saslauth: Remove unused argument [luacheck] 2017-04-01 22:34:15 +02:00