| line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
|
1
|
3
|
|
|
3
|
|
9391
|
use 5.008; |
|
|
3
|
|
|
|
|
9
|
|
|
2
|
3
|
|
|
3
|
|
16
|
use strict; |
|
|
3
|
|
|
|
|
4
|
|
|
|
3
|
|
|
|
|
52
|
|
|
3
|
3
|
|
|
3
|
|
11
|
use warnings; |
|
|
3
|
|
|
|
|
5
|
|
|
|
3
|
|
|
|
|
111
|
|
|
4
|
|
|
|
|
|
|
|
|
5
|
|
|
|
|
|
|
package Authen::SCRAM::Server; |
|
6
|
|
|
|
|
|
|
# ABSTRACT: RFC 5802 SCRAM Server |
|
7
|
|
|
|
|
|
|
|
|
8
|
|
|
|
|
|
|
our $VERSION = '0.011'; |
|
9
|
|
|
|
|
|
|
|
|
10
|
3
|
|
|
3
|
|
480
|
use Moo 1.001000; |
|
|
3
|
|
|
|
|
8331
|
|
|
|
3
|
|
|
|
|
16
|
|
|
11
|
|
|
|
|
|
|
|
|
12
|
3
|
|
|
3
|
|
2323
|
use Authen::SASL::SASLprep qw/saslprep/; |
|
|
3
|
|
|
|
|
60831
|
|
|
|
3
|
|
|
|
|
140
|
|
|
13
|
3
|
|
|
3
|
|
16
|
use Carp qw/croak/; |
|
|
3
|
|
|
|
|
5
|
|
|
|
3
|
|
|
|
|
129
|
|
|
14
|
3
|
|
|
3
|
|
397
|
use Crypt::URandom qw/urandom/; |
|
|
3
|
|
|
|
|
3145
|
|
|
|
3
|
|
|
|
|
111
|
|
|
15
|
3
|
|
|
3
|
|
17
|
use Encode qw/encode_utf8/; |
|
|
3
|
|
|
|
|
7
|
|
|
|
3
|
|
|
|
|
217
|
|
|
16
|
3
|
|
|
3
|
|
16
|
use MIME::Base64 qw/decode_base64/; |
|
|
3
|
|
|
|
|
5
|
|
|
|
3
|
|
|
|
|
112
|
|
|
17
|
3
|
|
|
3
|
|
13
|
use PBKDF2::Tiny 0.003 qw/derive digest_fcn hmac/; |
|
|
3
|
|
|
|
|
42
|
|
|
|
3
|
|
|
|
|
130
|
|
|
18
|
3
|
|
|
3
|
|
444
|
use Types::Standard qw/Str Num CodeRef Bool/; |
|
|
3
|
|
|
|
|
60808
|
|
|
|
3
|
|
|
|
|
41
|
|
|
19
|
|
|
|
|
|
|
|
|
20
|
3
|
|
|
3
|
|
3076
|
use namespace::clean; |
|
|
3
|
|
|
|
|
7819
|
|
|
|
3
|
|
|
|
|
20
|
|
|
21
|
|
|
|
|
|
|
|
|
22
|
|
|
|
|
|
|
with 'Authen::SCRAM::Role::Common'; |
|
23
|
|
|
|
|
|
|
|
|
24
|
|
|
|
|
|
|
#--------------------------------------------------------------------------# |
|
25
|
|
|
|
|
|
|
# public attributes |
|
26
|
|
|
|
|
|
|
#--------------------------------------------------------------------------# |
|
27
|
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
#pod =attr credential_cb (required) |
|
29
|
|
|
|
|
|
|
#pod |
|
30
|
|
|
|
|
|
|
#pod This attribute must contain a code reference that takes a username (as a |
|
31
|
|
|
|
|
|
|
#pod character string normalized by SASLprep) and returns the four user-credential |
|
32
|
|
|
|
|
|
|
#pod parameters required by SCRAM: C, C, C, and |
|
33
|
|
|
|
|
|
|
#pod C. The C, C and C must be |
|
34
|
|
|
|
|
|
|
#pod provided as octets (i.e. B base64 encoded). |
|
35
|
|
|
|
|
|
|
#pod |
|
36
|
|
|
|
|
|
|
#pod If the username is unknown, it should return an empty list. |
|
37
|
|
|
|
|
|
|
#pod |
|
38
|
|
|
|
|
|
|
#pod ($salt, $stored_key, $server_key, $iterations) = |
|
39
|
|
|
|
|
|
|
#pod $server->credential_cb->( $username ); |
|
40
|
|
|
|
|
|
|
#pod |
|
41
|
|
|
|
|
|
|
#pod See L |
|
42
|
|
|
|
|
|
|
#pod for details. |
|
43
|
|
|
|
|
|
|
#pod |
|
44
|
|
|
|
|
|
|
#pod =cut |
|
45
|
|
|
|
|
|
|
|
|
46
|
|
|
|
|
|
|
has credential_cb => ( |
|
47
|
|
|
|
|
|
|
is => 'ro', |
|
48
|
|
|
|
|
|
|
isa => CodeRef, |
|
49
|
|
|
|
|
|
|
required => 1, |
|
50
|
|
|
|
|
|
|
); |
|
51
|
|
|
|
|
|
|
|
|
52
|
|
|
|
|
|
|
#pod =attr auth_proxy_cb |
|
53
|
|
|
|
|
|
|
#pod |
|
54
|
|
|
|
|
|
|
#pod If provided, this attribute must contain a code reference that takes an |
|
55
|
|
|
|
|
|
|
#pod B username and a B username (both as character |
|
56
|
|
|
|
|
|
|
#pod strings), and return a true value if the authentication username is permitted |
|
57
|
|
|
|
|
|
|
#pod to act as the authorization username: |
|
58
|
|
|
|
|
|
|
#pod |
|
59
|
|
|
|
|
|
|
#pod $bool = $server->auth_proxy_cb->( |
|
60
|
|
|
|
|
|
|
#pod $authentication_user, $authorization_user |
|
61
|
|
|
|
|
|
|
#pod ); |
|
62
|
|
|
|
|
|
|
#pod |
|
63
|
|
|
|
|
|
|
#pod It will only be all called if the authentication username has successfully |
|
64
|
|
|
|
|
|
|
#pod authenticated. Both usernames will have been normalized via C with |
|
65
|
|
|
|
|
|
|
#pod any transport encoding removed before being passed to this function. |
|
66
|
|
|
|
|
|
|
#pod |
|
67
|
|
|
|
|
|
|
#pod =cut |
|
68
|
|
|
|
|
|
|
|
|
69
|
|
|
|
|
|
|
has auth_proxy_cb => ( |
|
70
|
|
|
|
|
|
|
is => 'ro', |
|
71
|
|
|
|
|
|
|
isa => CodeRef, |
|
72
|
|
|
|
|
|
|
default => sub { |
|
73
|
|
|
|
|
|
|
return sub { 1 } |
|
74
|
|
|
|
|
|
|
}, |
|
75
|
|
|
|
|
|
|
); |
|
76
|
|
|
|
|
|
|
|
|
77
|
|
|
|
|
|
|
#--------------------------------------------------------------------------# |
|
78
|
|
|
|
|
|
|
# provided by Authen::SCRAM::Role::Common |
|
79
|
|
|
|
|
|
|
#--------------------------------------------------------------------------# |
|
80
|
|
|
|
|
|
|
|
|
81
|
|
|
|
|
|
|
with 'Authen::SCRAM::Role::Common'; |
|
82
|
|
|
|
|
|
|
|
|
83
|
|
|
|
|
|
|
#pod =attr digest |
|
84
|
|
|
|
|
|
|
#pod |
|
85
|
|
|
|
|
|
|
#pod Name of a digest function available via L. Valid values are |
|
86
|
|
|
|
|
|
|
#pod SHA-1, SHA-224, SHA-256, SHA-384, or SHA-512. Defaults to SHA-1. |
|
87
|
|
|
|
|
|
|
#pod |
|
88
|
|
|
|
|
|
|
#pod =attr nonce_size |
|
89
|
|
|
|
|
|
|
#pod |
|
90
|
|
|
|
|
|
|
#pod Size of the client-generated nonce, in bits. Defaults to 192. |
|
91
|
|
|
|
|
|
|
#pod The server-nonce will be appended, so the final nonce size will |
|
92
|
|
|
|
|
|
|
#pod be substantially larger. |
|
93
|
|
|
|
|
|
|
#pod |
|
94
|
|
|
|
|
|
|
#pod =attr skip_saslprep |
|
95
|
|
|
|
|
|
|
#pod |
|
96
|
|
|
|
|
|
|
#pod A boolean that defaults to false. If set to true, usernames and passwords will |
|
97
|
|
|
|
|
|
|
#pod not be normalized through SASLprep. This is a deviation from the RFC5802 spec |
|
98
|
|
|
|
|
|
|
#pod and is not recommended. |
|
99
|
|
|
|
|
|
|
#pod |
|
100
|
|
|
|
|
|
|
#pod =cut |
|
101
|
|
|
|
|
|
|
|
|
102
|
|
|
|
|
|
|
#--------------------------------------------------------------------------# |
|
103
|
|
|
|
|
|
|
# private attributes |
|
104
|
|
|
|
|
|
|
#--------------------------------------------------------------------------# |
|
105
|
|
|
|
|
|
|
|
|
106
|
|
|
|
|
|
|
has _proof_ok => ( |
|
107
|
|
|
|
|
|
|
is => 'ro', |
|
108
|
|
|
|
|
|
|
isa => Bool, |
|
109
|
|
|
|
|
|
|
writer => '_set_proof_ok', |
|
110
|
|
|
|
|
|
|
); |
|
111
|
|
|
|
|
|
|
|
|
112
|
|
|
|
|
|
|
#--------------------------------------------------------------------------# |
|
113
|
|
|
|
|
|
|
# public methods |
|
114
|
|
|
|
|
|
|
#--------------------------------------------------------------------------# |
|
115
|
|
|
|
|
|
|
|
|
116
|
|
|
|
|
|
|
#pod =method first_msg |
|
117
|
|
|
|
|
|
|
#pod |
|
118
|
|
|
|
|
|
|
#pod $server_first_msg = $server->first_msg( $client_first_msg ); |
|
119
|
|
|
|
|
|
|
#pod |
|
120
|
|
|
|
|
|
|
#pod This takes the C received from the client and returns the |
|
121
|
|
|
|
|
|
|
#pod C string to be sent to the client to continue a SCRAM |
|
122
|
|
|
|
|
|
|
#pod session. Calling this again will reset the internal state and initiate a new |
|
123
|
|
|
|
|
|
|
#pod session. This will throw an exception should an error occur. |
|
124
|
|
|
|
|
|
|
#pod |
|
125
|
|
|
|
|
|
|
#pod =cut |
|
126
|
|
|
|
|
|
|
|
|
127
|
|
|
|
|
|
|
sub first_msg { |
|
128
|
17
|
|
|
17
|
1
|
27939
|
my ( $self, $msg ) = @_; |
|
129
|
17
|
|
|
|
|
328
|
$self->_clear_session; |
|
130
|
|
|
|
|
|
|
|
|
131
|
17
|
|
|
|
|
102
|
my ( $cbind, $authz, $c_1_bare, $mext, @params ) = $msg =~ $self->_client_first_re; |
|
132
|
|
|
|
|
|
|
|
|
133
|
17
|
100
|
|
|
|
45
|
if ( !defined $cbind ) { |
|
134
|
9
|
|
|
|
|
631
|
croak "SCRAM client-first-message could not be parsed"; |
|
135
|
|
|
|
|
|
|
} |
|
136
|
8
|
50
|
|
|
|
30
|
if ( $cbind eq 'p' ) { |
|
137
|
0
|
|
|
|
|
0
|
croak |
|
138
|
|
|
|
|
|
|
"SCRAM client-first-message required channel binding, but we do not support it"; |
|
139
|
|
|
|
|
|
|
} |
|
140
|
8
|
50
|
|
|
|
19
|
if ( defined $mext ) { |
|
141
|
0
|
|
|
|
|
0
|
croak |
|
142
|
|
|
|
|
|
|
"SCRAM client-first-message required mandatory extension '$mext', but we do not support it"; |
|
143
|
|
|
|
|
|
|
} |
|
144
|
|
|
|
|
|
|
|
|
145
|
8
|
100
|
|
|
|
16
|
push @params, $authz if defined $authz; |
|
146
|
8
|
|
|
|
|
30
|
$self->_parse_to_session(@params); |
|
147
|
8
|
|
|
|
|
29
|
$self->_extend_nonce; |
|
148
|
|
|
|
|
|
|
|
|
149
|
8
|
|
|
|
|
111
|
my $name = $self->_get_session('n'); |
|
150
|
8
|
|
|
|
|
78
|
my ( $salt, $stored_key, $server_key, $iters ) = $self->credential_cb->($name); |
|
151
|
|
|
|
|
|
|
|
|
152
|
8
|
100
|
|
|
|
87
|
if ( !defined $salt ) { |
|
153
|
1
|
|
|
|
|
191
|
croak "SCRAM client-first-message had unknown user '$name'"; |
|
154
|
|
|
|
|
|
|
} |
|
155
|
|
|
|
|
|
|
|
|
156
|
|
|
|
|
|
|
$self->_set_session( |
|
157
|
7
|
|
|
|
|
28
|
s => $self->_base64($salt), |
|
158
|
|
|
|
|
|
|
i => $iters, |
|
159
|
|
|
|
|
|
|
_c1b => $c_1_bare, |
|
160
|
|
|
|
|
|
|
_stored_key => $stored_key, |
|
161
|
|
|
|
|
|
|
_server_key => $server_key |
|
162
|
|
|
|
|
|
|
); |
|
163
|
|
|
|
|
|
|
|
|
164
|
7
|
|
|
|
|
23
|
my $reply = $self->_join_reply(qw/r s i/); |
|
165
|
7
|
|
|
|
|
23
|
$self->_set_session( _s1 => $reply ); |
|
166
|
|
|
|
|
|
|
|
|
167
|
7
|
|
|
|
|
23
|
return $reply; |
|
168
|
|
|
|
|
|
|
} |
|
169
|
|
|
|
|
|
|
|
|
170
|
|
|
|
|
|
|
#pod =method final_msg |
|
171
|
|
|
|
|
|
|
#pod |
|
172
|
|
|
|
|
|
|
#pod $server_final_msg = $server->final_msg( $client_final_msg ); |
|
173
|
|
|
|
|
|
|
#pod |
|
174
|
|
|
|
|
|
|
#pod This takes the C received from the client and returns the |
|
175
|
|
|
|
|
|
|
#pod C string containing the verification signature to be sent |
|
176
|
|
|
|
|
|
|
#pod to the client. |
|
177
|
|
|
|
|
|
|
#pod |
|
178
|
|
|
|
|
|
|
#pod If an authorization identity was provided by the client, it will confirm that |
|
179
|
|
|
|
|
|
|
#pod the authenticating username is authorized to act as the authorization id using |
|
180
|
|
|
|
|
|
|
#pod the L attribute. |
|
181
|
|
|
|
|
|
|
#pod |
|
182
|
|
|
|
|
|
|
#pod If the client credentials do not match or the authentication name is not |
|
183
|
|
|
|
|
|
|
#pod authorized to act as the authorization name, then an exception will be thrown. |
|
184
|
|
|
|
|
|
|
#pod |
|
185
|
|
|
|
|
|
|
#pod =cut |
|
186
|
|
|
|
|
|
|
|
|
187
|
|
|
|
|
|
|
sub final_msg { |
|
188
|
7
|
|
|
7
|
1
|
4578
|
my ( $self, $msg ) = @_; |
|
189
|
|
|
|
|
|
|
|
|
190
|
7
|
|
|
|
|
34
|
my ( $c2wop, @params ) = $msg =~ $self->_client_final_re; |
|
191
|
7
|
|
|
|
|
33
|
$self->_set_session( _c2wop => $c2wop ); |
|
192
|
|
|
|
|
|
|
|
|
193
|
7
|
50
|
|
|
|
20
|
if ( !defined $c2wop ) { |
|
194
|
0
|
|
|
|
|
0
|
croak "SCRAM client-first-message could not be parsed"; |
|
195
|
|
|
|
|
|
|
} |
|
196
|
|
|
|
|
|
|
|
|
197
|
|
|
|
|
|
|
# confirm nonce |
|
198
|
7
|
|
|
|
|
32
|
my $original_nonce = $self->_get_session("r"); |
|
199
|
7
|
|
|
|
|
75
|
$self->_parse_to_session(@params); |
|
200
|
7
|
|
|
|
|
21
|
my $joint_nonce = $self->_get_session("r"); |
|
201
|
7
|
50
|
|
|
|
62
|
unless ( $joint_nonce eq $original_nonce ) { |
|
202
|
0
|
|
|
|
|
0
|
croak "SCRAM client-final-message nonce invalid"; |
|
203
|
|
|
|
|
|
|
} |
|
204
|
|
|
|
|
|
|
|
|
205
|
|
|
|
|
|
|
# confirm channel bindings |
|
206
|
7
|
|
|
|
|
24
|
my $cbind = |
|
207
|
|
|
|
|
|
|
$self->_base64( encode_utf8( $self->_construct_gs2( $self->_get_session("a") ) ) ); |
|
208
|
7
|
50
|
|
|
|
24
|
if ( $cbind ne $self->_get_session("c") ) { |
|
209
|
0
|
|
|
|
|
0
|
croak "SCRAM client-final-message channel binding didn't match"; |
|
210
|
|
|
|
|
|
|
} |
|
211
|
|
|
|
|
|
|
|
|
212
|
|
|
|
|
|
|
# confirm proof |
|
213
|
|
|
|
|
|
|
|
|
214
|
7
|
|
|
|
|
73
|
my $client_sig = $self->_client_sig; |
|
215
|
7
|
|
|
|
|
123
|
my $proof = decode_base64( $self->_get_session("p") ); |
|
216
|
7
|
|
|
|
|
69
|
my $client_key = $proof ^ $client_sig; |
|
217
|
7
|
|
|
|
|
98
|
my $computed_key = $self->_digest_fcn->($client_key); |
|
218
|
7
|
|
|
|
|
146
|
my $name = $self->_get_session("n"); |
|
219
|
|
|
|
|
|
|
|
|
220
|
7
|
100
|
|
|
|
62
|
if ( !$self->_const_eq_fcn->( $computed_key, $self->_get_session("_stored_key") ) ) { |
|
221
|
1
|
|
|
|
|
137
|
croak "SCRAM authentication for user '$name' failed"; |
|
222
|
|
|
|
|
|
|
} |
|
223
|
|
|
|
|
|
|
|
|
224
|
6
|
100
|
|
|
|
20
|
if ( my $authz = $self->_get_session("a") ) { |
|
225
|
3
|
100
|
|
|
|
38
|
$self->auth_proxy_cb->( $name, $authz ) |
|
226
|
|
|
|
|
|
|
or croak("SCRAM authentication failed; '$name' not authorized to act as '$authz'"); |
|
227
|
|
|
|
|
|
|
} |
|
228
|
|
|
|
|
|
|
|
|
229
|
5
|
|
|
|
|
60
|
$self->_set_session( _proof_ok => 1 ); |
|
230
|
|
|
|
|
|
|
|
|
231
|
5
|
|
|
|
|
15
|
my $server_sig = |
|
232
|
|
|
|
|
|
|
$self->_hmac_fcn->( $self->_get_session('_server_key'), $self->_auth_msg ); |
|
233
|
|
|
|
|
|
|
|
|
234
|
5
|
|
|
|
|
76
|
$self->_set_session( v => $self->_base64($server_sig) ); |
|
235
|
|
|
|
|
|
|
|
|
236
|
5
|
|
|
|
|
13
|
$self->_join_reply('v'); |
|
237
|
|
|
|
|
|
|
} |
|
238
|
|
|
|
|
|
|
|
|
239
|
|
|
|
|
|
|
#pod =method authorization_id |
|
240
|
|
|
|
|
|
|
#pod |
|
241
|
|
|
|
|
|
|
#pod $username = $client->authorization_id(); |
|
242
|
|
|
|
|
|
|
#pod |
|
243
|
|
|
|
|
|
|
#pod This takes no arguments and returns the authorization identity resulting from |
|
244
|
|
|
|
|
|
|
#pod the SCRAM exchange. This is the client-supplied authorization identity (if one |
|
245
|
|
|
|
|
|
|
#pod was provided and validated) or else the successfully authenticated identity. |
|
246
|
|
|
|
|
|
|
#pod |
|
247
|
|
|
|
|
|
|
#pod =cut |
|
248
|
|
|
|
|
|
|
|
|
249
|
|
|
|
|
|
|
sub authorization_id { |
|
250
|
8
|
|
|
8
|
1
|
5199
|
my ($self) = @_; |
|
251
|
8
|
100
|
|
|
|
29
|
return '' unless $self->_get_session("_proof_ok"); |
|
252
|
5
|
|
|
|
|
51
|
my $authz = $self->_get_session("a"); |
|
253
|
5
|
100
|
66
|
|
|
65
|
return ( defined($authz) && length($authz) ) ? $authz : $self->_get_session("n"); |
|
254
|
|
|
|
|
|
|
} |
|
255
|
|
|
|
|
|
|
|
|
256
|
|
|
|
|
|
|
1; |
|
257
|
|
|
|
|
|
|
|
|
258
|
|
|
|
|
|
|
|
|
259
|
|
|
|
|
|
|
# vim: ts=4 sts=4 sw=4 et: |
|
260
|
|
|
|
|
|
|
|
|
261
|
|
|
|
|
|
|
__END__ |