4 * Barebones SASL authentication service for XMPP (Jabber) clients.
6 * Note: RFC3920 says we "must" support DIGEST-MD5 but we only support PLAIN.
8 * Copyright (c) 2007-2009 by Art Cancro
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; either version 3 of the License, or
13 * (at your option) any later version.
15 * This program is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 * GNU General Public License for more details.
20 * You should have received a copy of the GNU General Public License
21 * along with this program; if not, write to the Free Software
22 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
34 #include <sys/types.h>
36 #if TIME_WITH_SYS_TIME
37 # include <sys/time.h>
41 # include <sys/time.h>
52 #include <libcitadel.h>
55 #include "citserver.h"
59 #include "internet_addressing.h"
61 #include "ctdl_module.h"
62 #include "serv_xmpp.h"
66 * PLAIN authentication. Returns zero on success, nonzero on failure.
68 int xmpp_auth_plain(char *authstring)
70 char decoded_authstring[1024];
77 /* Take apart the authentication string */
78 memset(pass, 0, sizeof(pass));
80 CtdlDecodeBase64(decoded_authstring, authstring, strlen(authstring));
81 safestrncpy(ident, decoded_authstring, sizeof ident);
82 safestrncpy(user, &decoded_authstring[strlen(ident) + 1], sizeof user);
83 safestrncpy(pass, &decoded_authstring[strlen(ident) + strlen(user) + 2], sizeof pass);
86 /* If there are underscores in either string, change them to spaces. Some clients
87 * do not allow spaces so we can tell the user to substitute underscores if their
88 * login name contains spaces.
90 convert_spaces_to_underscores(ident);
91 convert_spaces_to_underscores(user);
93 /* Now attempt authentication */
95 if (!IsEmptyStr(ident)) {
96 result = CtdlLoginExistingUser(user, ident);
99 result = CtdlLoginExistingUser(NULL, user);
102 if (result == login_ok) {
103 if (CtdlTryPassword(pass) == pass_ok) {
104 return(0); /* success */
108 return(1); /* failure */
113 * Output the list of SASL mechanisms offered by this stream.
115 void xmpp_output_auth_mechs(void) {
116 cprintf("<mechanisms xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">");
117 cprintf("<mechanism>PLAIN</mechanism>");
118 cprintf("</mechanisms>");
122 * Here we go ... client is trying to authenticate.
124 void xmpp_sasl_auth(char *sasl_auth_mech, char *authstring) {
126 if (strcasecmp(sasl_auth_mech, "PLAIN")) {
127 cprintf("<failure xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">");
128 cprintf("<invalid-mechanism/>");
129 cprintf("</failure>");
133 if (CC->logged_in) CtdlUserLogout(); /* Client may try to log in twice. Handle this. */
136 cprintf("<failure xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">");
137 cprintf("<system-shutdown/>");
138 cprintf("</failure>");
141 else if (xmpp_auth_plain(authstring) == 0) {
142 cprintf("<success xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\"/>");
146 cprintf("<failure xmlns=\"urn:ietf:params:xml:ns:xmpp-sasl\">");
147 cprintf("<not-authorized/>");
148 cprintf("</failure>");
155 * Non-SASL authentication
157 void xmpp_non_sasl_authenticate(char *iq_id, char *username, char *password, char *resource) {
160 if (CC->logged_in) CtdlUserLogout(); /* Client may try to log in twice. Handle this. */
162 result = CtdlLoginExistingUser(NULL, username);
163 if (result == login_ok) {
164 result = CtdlTryPassword(password);
165 if (result == pass_ok) {
166 cprintf("<iq type=\"result\" id=\"%s\"></iq>", iq_id); /* success */
172 cprintf("<iq type=\"error\" id=\"%s\">", iq_id);
173 cprintf("<error code=\"401\" type=\"auth\">"
174 "<not-authorized xmlns=\"urn:ietf:params:xml:ns:xmpp-stanzas\"/>"