plain_server.cpp 12.1 KB
Newer Older
1
/*
2
    Copyright (c) 2007-2015 Contributors as noted in the AUTHORS file
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

    This file is part of 0MQ.

    0MQ is free software; you can redistribute it and/or modify it under
    the terms of the GNU Lesser General Public License as published by
    the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.

    0MQ is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU Lesser General Public License for more details.

    You should have received a copy of the GNU Lesser General Public License
    along with this program.  If not, see <http://www.gnu.org/licenses/>.
*/

#include "platform.hpp"
#ifdef ZMQ_HAVE_WINDOWS
#include "windows.hpp"
#endif

#include <string>

#include "msg.hpp"
28
#include "session_base.hpp"
29
#include "err.hpp"
30
#include "plain_server.hpp"
31 32
#include "wire.hpp"

33 34 35
zmq::plain_server_t::plain_server_t (session_base_t *session_,
                                     const std::string &peer_address_,
                                     const options_t &options_) :
36
    mechanism_t (options_),
37
    session (session_),
38
    peer_address (peer_address_),
39
    state (waiting_for_hello)
40 41 42
{
}

43
zmq::plain_server_t::~plain_server_t ()
44 45 46
{
}

47
int zmq::plain_server_t::next_handshake_command (msg_t *msg_)
48 49 50 51
{
    int rc = 0;

    switch (state) {
52
        case sending_welcome:
53
            rc = produce_welcome (msg_);
54 55 56 57
            if (rc == 0)
                state = waiting_for_initiate;
            break;
        case sending_ready:
58
            rc = produce_ready (msg_);
59 60 61
            if (rc == 0)
                state = ready;
            break;
62 63 64 65 66
        case sending_error:
            rc = produce_error (msg_);
            if (rc == 0)
                state = error_command_sent;
            break;
67 68 69
        default:
            errno = EAGAIN;
            rc = -1;
70 71 72 73
    }
    return rc;
}

74
int zmq::plain_server_t::process_handshake_command (msg_t *msg_)
75 76 77 78
{
    int rc = 0;

    switch (state) {
79
        case waiting_for_hello:
80
            rc = process_hello (msg_);
81 82
            break;
        case waiting_for_initiate:
83
            rc = process_initiate (msg_);
84 85
            break;
        default:
86 87
            //  Temporary support for security debugging
            puts ("PLAIN I: invalid handshake command");
88
            errno = EPROTO;
89
            rc = -1;
90
            break;
91 92 93 94 95 96 97
    }
    if (rc == 0) {
        rc = msg_->close ();
        errno_assert (rc == 0);
        rc = msg_->init ();
        errno_assert (rc == 0);
    }
98
    return rc;
99 100
}

101
zmq::mechanism_t::status_t zmq::plain_server_t::status () const
102
{
103 104 105 106 107 108 109
    if (state == ready)
        return mechanism_t::ready;
    else
    if (state == error_command_sent)
        return mechanism_t::error;
    else
        return mechanism_t::handshaking;
110 111
}

112
int zmq::plain_server_t::zap_msg_available ()
113 114 115 116 117 118 119
{
    if (state != waiting_for_zap_reply) {
        errno = EFSM;
        return -1;
    }
    const int rc = receive_and_process_zap_reply ();
    if (rc == 0)
120 121 122
        state = status_code == "200"
            ? sending_welcome
            : sending_error;
123 124
    return rc;
}
125

126
int zmq::plain_server_t::process_hello (msg_t *msg_)
127 128 129 130
{
    const unsigned char *ptr = static_cast <unsigned char *> (msg_->data ());
    size_t bytes_left = msg_->size ();

131
    if (bytes_left < 6 || memcmp (ptr, "\x05HELLO", 6)) {
132 133
        //  Temporary support for security debugging
        puts ("PLAIN I: invalid PLAIN client, did not send HELLO");
134 135 136
        errno = EPROTO;
        return -1;
    }
137 138
    ptr += 6;
    bytes_left -= 6;
139 140

    if (bytes_left < 1) {
141 142
        //  Temporary support for security debugging
        puts ("PLAIN I: invalid PLAIN client, did not send username");
143 144 145
        errno = EPROTO;
        return -1;
    }
Martin Hurton's avatar
Martin Hurton committed
146
    const size_t username_length = static_cast <size_t> (*ptr++);
147 148 149
    bytes_left -= 1;

    if (bytes_left < username_length) {
150 151
        //  Temporary support for security debugging
        puts ("PLAIN I: invalid PLAIN client, sent malformed username");
152 153 154 155 156 157 158
        errno = EPROTO;
        return -1;
    }
    const std::string username = std::string ((char *) ptr, username_length);
    ptr += username_length;
    bytes_left -= username_length;
    if (bytes_left < 1) {
159 160
        //  Temporary support for security debugging
        puts ("PLAIN I: invalid PLAIN client, did not send password");
161 162 163
        errno = EPROTO;
        return -1;
    }
164

Martin Hurton's avatar
Martin Hurton committed
165
    const size_t password_length = static_cast <size_t> (*ptr++);
166 167
    bytes_left -= 1;
    if (bytes_left < password_length) {
168 169
        //  Temporary support for security debugging
        puts ("PLAIN I: invalid PLAIN client, sent malformed password");
170 171 172
        errno = EPROTO;
        return -1;
    }
173

174 175 176 177
    const std::string password = std::string ((char *) ptr, password_length);
    ptr += password_length;
    bytes_left -= password_length;
    if (bytes_left > 0) {
178 179
        //  Temporary support for security debugging
        puts ("PLAIN I: invalid PLAIN client, sent extraneous data");
180 181 182
        errno = EPROTO;
        return -1;
    }
183

184
    //  Use ZAP protocol (RFC 27) to authenticate the user.
185
    int rc = session->zap_connect ();
186 187 188
    if (rc == 0) {
        send_zap_request (username, password);
        rc = receive_and_process_zap_reply ();
189 190 191 192 193 194 195 196 197
        if (rc == 0)
            state = status_code == "200"
                ? sending_welcome
                : sending_error;
        else
        if (errno == EAGAIN)
            state = waiting_for_zap_reply;
        else
            return -1;
198
    }
199 200
    else
        state = sending_welcome;
201

202 203 204
    return 0;
}

205
int zmq::plain_server_t::produce_welcome (msg_t *msg_) const
206 207 208
{
    const int rc = msg_->init_size (8);
    errno_assert (rc == 0);
209
    memcpy (msg_->data (), "\x07WELCOME", 8);
210 211 212
    return 0;
}

213
int zmq::plain_server_t::process_initiate (msg_t *msg_)
214 215
{
    const unsigned char *ptr = static_cast <unsigned char *> (msg_->data ());
216
    const size_t bytes_left = msg_->size ();
217

218
    if (bytes_left < 9 || memcmp (ptr, "\x08INITIATE", 9)) {
219 220
        //  Temporary support for security debugging
        puts ("PLAIN I: invalid PLAIN client, did not send INITIATE");
221 222 223
        errno = EPROTO;
        return -1;
    }
224 225 226 227
    const int rc = parse_metadata (ptr + 9, bytes_left - 9);
    if (rc == 0)
        state = sending_ready;
    return rc;
228 229
}

230
int zmq::plain_server_t::produce_ready (msg_t *msg_) const
231 232 233 234 235 236
{
    unsigned char * const command_buffer = (unsigned char *) malloc (512);
    alloc_assert (command_buffer);

    unsigned char *ptr = command_buffer;

237
    //  Add command name
238
    memcpy (ptr, "\x05READY", 6);
239
    ptr += 6;
240 241 242 243 244 245 246 247

    //  Add socket type property
    const char *socket_type = socket_type_string (options.type);
    ptr += add_property (ptr, "Socket-Type", socket_type, strlen (socket_type));

    //  Add identity property
    if (options.type == ZMQ_REQ
    ||  options.type == ZMQ_DEALER
Pieter Hintjens's avatar
Pieter Hintjens committed
248
    ||  options.type == ZMQ_ROUTER)
249 250
        ptr += add_property (
            ptr, "Identity", options.identity, options.identity_size);
251 252 253 254 255 256 257 258 259 260

    const size_t command_size = ptr - command_buffer;
    const int rc = msg_->init_size (command_size);
    errno_assert (rc == 0);
    memcpy (msg_->data (), command_buffer, command_size);
    free (command_buffer);

    return 0;
}

261 262 263
int zmq::plain_server_t::produce_error (msg_t *msg_) const
{
    zmq_assert (status_code.length () == 3);
264
    const int rc = msg_->init_size (6 + 1 + status_code.length ());
265 266 267
    zmq_assert (rc == 0);
    char *msg_data = static_cast <char *> (msg_->data ());
    memcpy (msg_data, "\5ERROR", 6);
268 269
    msg_data [6] = status_code.length ();
    memcpy (msg_data + 7, status_code.c_str (), status_code.length ());
270 271 272
    return 0;
}

273 274
void zmq::plain_server_t::send_zap_request (const std::string &username,
                                            const std::string &password)
275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293
{
    int rc;
    msg_t msg;

    //  Address delimiter frame
    rc = msg.init ();
    errno_assert (rc == 0);
    msg.set_flags (msg_t::more);
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);

    //  Version frame
    rc = msg.init_size (3);
    errno_assert (rc == 0);
    memcpy (msg.data (), "1.0", 3);
    msg.set_flags (msg_t::more);
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);

294
    //  Request id frame
295 296 297 298 299 300 301 302
    rc = msg.init_size (1);
    errno_assert (rc == 0);
    memcpy (msg.data (), "1", 1);
    msg.set_flags (msg_t::more);
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);

    //  Domain frame
303
    rc = msg.init_size (options.zap_domain.length ());
304
    errno_assert (rc == 0);
305
    memcpy (msg.data (), options.zap_domain.c_str (), options.zap_domain.length ());
306 307 308 309
    msg.set_flags (msg_t::more);
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);

310 311 312 313 314 315 316 317
    //  Address frame
    rc = msg.init_size (peer_address.length ());
    errno_assert (rc == 0);
    memcpy (msg.data (), peer_address.c_str (), peer_address.length ());
    msg.set_flags (msg_t::more);
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);

318
    //  Identity frame
319
    rc = msg.init_size (options.identity_size);
320
    errno_assert (rc == 0);
321 322 323 324 325
    memcpy (msg.data (), options.identity, options.identity_size);
    msg.set_flags (msg_t::more);
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);

326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349
    //  Mechanism frame
    rc = msg.init_size (5);
    errno_assert (rc == 0);
    memcpy (msg.data (), "PLAIN", 5);
    msg.set_flags (msg_t::more);
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);

    //  Username frame
    rc = msg.init_size (username.length ());
    errno_assert (rc == 0);
    memcpy (msg.data (), username.c_str (), username.length ());
    msg.set_flags (msg_t::more);
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);

    //  Password frame
    rc = msg.init_size (password.length ());
    errno_assert (rc == 0);
    memcpy (msg.data (), password.c_str (), password.length ());
    rc = session->write_zap_msg (&msg);
    errno_assert (rc == 0);
}

350
int zmq::plain_server_t::receive_and_process_zap_reply ()
351 352
{
    int rc = 0;
353
    msg_t msg [7];  //  ZAP reply consists of 7 frames
354

355 356
    //  Initialize all reply frames
    for (int i = 0; i < 7; i++) {
357 358 359 360
        rc = msg [i].init ();
        errno_assert (rc == 0);
    }

361
    for (int i = 0; i < 7; i++) {
362 363 364
        rc = session->read_zap_msg (&msg [i]);
        if (rc == -1)
            break;
365
        if ((msg [i].flags () & msg_t::more) == (i < 6? 0: msg_t::more)) {
366 367
            //  Temporary support for security debugging
            puts ("PLAIN I: ZAP handler sent incomplete reply message");
368 369 370 371 372 373 374 375 376 377 378
            errno = EPROTO;
            rc = -1;
            break;
        }
    }

    if (rc != 0)
        goto error;

    //  Address delimiter frame
    if (msg [0].size () > 0) {
379 380
        //  Temporary support for security debugging
        puts ("PLAIN I: ZAP handler sent malformed reply message");
381
        errno = EPROTO;
382
        rc = -1;
383 384 385 386 387
        goto error;
    }

    //  Version frame
    if (msg [1].size () != 3 || memcmp (msg [1].data (), "1.0", 3)) {
388 389
        //  Temporary support for security debugging
        puts ("PLAIN I: ZAP handler sent bad version number");
390
        errno = EPROTO;
391
        rc = -1;
392 393 394
        goto error;
    }

395
    //  Request id frame
396
    if (msg [2].size () != 1 || memcmp (msg [2].data (), "1", 1)) {
397 398
        //  Temporary support for security debugging
        puts ("PLAIN I: ZAP handler sent bad request ID");
399
        rc = -1;
400 401 402 403 404
        errno = EPROTO;
        goto error;
    }

    //  Status code frame
405
    if (msg [3].size () != 3) {
406 407
        //  Temporary support for security debugging
        puts ("PLAIN I: ZAP handler rejected client authentication");
408
        errno = EACCES;
409
        rc = -1;
410 411 412
        goto error;
    }

413 414 415
    //  Save status code
    status_code.assign (static_cast <char *> (msg [3].data ()), 3);

416 417 418
    //  Save user id
    set_user_id (msg [5].data (), msg [5].size ());

419 420
    //  Process metadata frame
    rc = parse_metadata (static_cast <const unsigned char*> (msg [6].data ()),
421
                         msg [6].size (), true);
422

423
error:
424
    for (int i = 0; i < 7; i++) {
425 426 427 428 429 430
        const int rc2 = msg [i].close ();
        errno_assert (rc2 == 0);
    }

    return rc;
}