2 * Barebones SASL authentication service for XMPP (Jabber) clients.
4 * Note: RFC3920 says we "must" support DIGEST-MD5 but we only support PLAIN.
6 * Copyright (c) 2007-2018 by Art Cancro
8 * This program is open source software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 3.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
25 #include <sys/types.h>
27 #if TIME_WITH_SYS_TIME
28 # include <sys/time.h>
32 # include <sys/time.h>
43 #include <libcitadel.h>
46 #include "citserver.h"
50 #include "internet_addressing.h"
51 #include "ctdl_module.h"
52 #include "serv_xmpp.h"
56 * PLAIN authentication. Returns zero on success, nonzero on failure.
58 int xmpp_auth_plain(char *authstring)
60 char decoded_authstring[1024];
68 /* Take apart the authentication string */
69 memset(pass, 0, sizeof(pass));
71 CtdlDecodeBase64(decoded_authstring, authstring, strlen(authstring));
72 safestrncpy(ident, decoded_authstring, sizeof ident);
73 safestrncpy(user, &decoded_authstring[strlen(ident) + 1], sizeof user);
74 len = safestrncpy(pass, &decoded_authstring[strlen(ident) + strlen(user) + 2], sizeof pass);
78 /* If there are underscores in either string, change them to spaces. Some clients
79 * do not allow spaces so we can tell the user to substitute underscores if their
80 * login name contains spaces.
82 for (i=0; ident[i]!=0; ++i) {
83 if (ident[i] == '_') {
87 for (i=0; user[i]!=0; ++i) {
93 /* Now attempt authentication */
95 if (!IsEmptyStr(ident)) {
96 result = CtdlLoginExistingUser(ident);
99 result = CtdlLoginExistingUser(user);
102 if (result == login_ok) {
103 if (CtdlTryPassword(pass, len) == pass_ok) {
104 return(0); /* success */
108 return(1); /* failure */
113 * Output the list of SASL mechanisms offered by this stream.
115 void xmpp_output_auth_mechs(void) {
116 cprintf("<mechanisms xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">");
117 cprintf("<mechanism>PLAIN</mechanism>");
118 cprintf("</mechanisms>");
123 * Here we go ... client is trying to authenticate.
125 void xmpp_sasl_auth(char *sasl_auth_mech, char *authstring) {
127 if (strcasecmp(sasl_auth_mech, "PLAIN")) {
128 cprintf("<failure xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">");
129 cprintf("<invalid-mechanism/>");
130 cprintf("</failure>");
135 CtdlUserLogout(); /* Client may try to log in twice. Handle this. */
139 cprintf("<failure xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">");
140 cprintf("<system-shutdown/>");
141 cprintf("</failure>");
144 else if (xmpp_auth_plain(authstring) == 0) {
145 cprintf("<success xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\"/>");
149 cprintf("<failure xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">");
150 cprintf("<not-authorized/>");
151 cprintf("</failure>");
157 * Non-SASL authentication
159 void xmpp_non_sasl_authenticate(char *iq_id, char *username, char *password) {
164 CtdlUserLogout(); /* Client may try to log in twice. Handle this. */
167 result = CtdlLoginExistingUser(username);
168 if (result == login_ok) {
169 result = CtdlTryPassword(password, strlen(password));
170 if (result == pass_ok) {
171 cprintf("<iq type=\"result\" id=\"%s\"></iq>", xmlesc(xmlbuf, iq_id, sizeof xmlbuf)); /* success */
177 cprintf("<iq type=\"error\" id=\"%s\">", xmlesc(xmlbuf, iq_id, sizeof xmlbuf));
178 cprintf("<error code=\"401\" type=\"auth\">"
179 "<not-authorized xmlns=\"urn:ietf:params:xml:ns:xmpp-stanzas\"/>"