X-Git-Url: https://git.netwichtig.de/gitweb/?a=blobdiff_plain;f=src%2Fmodules%2Fm_password_hash.cpp;h=696c4fe6d4b8ecba877378a07425b5edc23f9568;hb=4e3d655dff6f8a5aed626475fbf19c2a7119c20b;hp=4762026164747344e6b926eeff846096ea630d25;hpb=6c1554c87332e420042243397d1567400ac61b8b;p=user%2Fhenk%2Fcode%2Finspircd.git diff --git a/src/modules/m_password_hash.cpp b/src/modules/m_password_hash.cpp index 476202616..696c4fe6d 100644 --- a/src/modules/m_password_hash.cpp +++ b/src/modules/m_password_hash.cpp @@ -1,157 +1,135 @@ -/* +------------------------------------+ - * | Inspire Internet Relay Chat Daemon | - * +------------------------------------+ +/* + * InspIRCd -- Internet Relay Chat Daemon * - * InspIRCd: (C) 2002-2008 InspIRCd Development Team - * See: http://www.inspircd.org/wiki/index.php/Credits + * Copyright (C) 2009-2010 Daniel De Graaf + * Copyright (C) 2008 Thomas Stagner * - * This program is free but copyrighted software; see - * the file COPYING for details. + * This file is part of InspIRCd. InspIRCd is free software: you can + * redistribute it and/or modify it under the terms of the GNU General Public + * License as published by the Free Software Foundation, version 2. * - * --------------------------------------------------- + * This program is distributed in the hope that it will be useful, but WITHOUT + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS + * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more + * details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see . */ -/* $ModDesc: Allows for hashed oper passwords */ -/* $ModDep: m_hash.h */ #include "inspircd.h" -#include "m_hash.h" - -typedef std::map hashymodules; +#include "modules/hash.h" /* Handle /MKPASSWD */ class CommandMkpasswd : public Command { - Module* Sender; - hashymodules &hashers; - std::deque &names; public: - CommandMkpasswd (InspIRCd* Instance, Module* S, hashymodules &h, std::deque &n) - : Command(Instance,"MKPASSWD", 'o', 2), Sender(S), hashers(h), names(n) + CommandMkpasswd(Module* Creator) : Command(Creator, "MKPASSWD", 2) { - this->source = "m_password_hash.so"; - syntax = " "; + syntax = " "; + Penalty = 5; } - void MakeHash(User* user, const char* algo, const char* stuff) + CmdResult Handle(User* user, const Params& parameters) CXX11_OVERRIDE { - /* Lets see if they gave us an algorithm which has been implemented */ - hashymodules::iterator x = hashers.find(algo); - if (x != hashers.end()) + if (!parameters[0].compare(0, 5, "hmac-", 5)) { - /* Yup, reset it first (Always ALWAYS do this) */ - HashResetRequest(Sender, x->second).Send(); - /* Now attempt to generate a hash */ - user->WriteServ("NOTICE %s :%s hashed password for %s is %s",user->nick, algo, stuff, HashSumRequest(Sender, x->second, stuff).Send() ); + std::string type(parameters[0], 5); + HashProvider* hp = ServerInstance->Modules->FindDataService<HashProvider>("hash/" + type); + if (!hp) + { + user->WriteNotice("Unknown hash type"); + return CMD_FAILURE; + } + + if (hp->IsKDF()) + { + user->WriteNotice(type + " does not support HMAC"); + return CMD_FAILURE; + } + + std::string salt = ServerInstance->GenRandomStr(hp->out_size, false); + std::string target = hp->hmac(salt, parameters[1]); + std::string str = BinToBase64(salt) + "$" + BinToBase64(target, NULL, 0); + + user->WriteNotice(parameters[0] + " hashed password for " + parameters[1] + " is " + str); + return CMD_SUCCESS; } - else + + HashProvider* hp = ServerInstance->Modules->FindDataService<HashProvider>("hash/" + parameters[0]); + if (!hp) { - /* I dont do flying, bob. */ - user->WriteServ("NOTICE %s :Unknown hash type, valid hash types are: %s", user->nick, irc::stringjoiner(", ", names, 0, names.size() - 1).GetJoined().c_str() ); + user->WriteNotice("Unknown hash type"); + return CMD_FAILURE; } - } - CmdResult Handle (const char** parameters, int pcnt, User *user) - { - MakeHash(user, parameters[0], parameters[1]); - /* NOTE: Don't propagate this across the network! - * We dont want plaintext passes going all over the place... - * To make sure it goes nowhere, return CMD_FAILURE! - */ - return CMD_FAILURE; + std::string hexsum = hp->Generate(parameters[1]); + user->WriteNotice(parameters[0] + " hashed password for " + parameters[1] + " is " + hexsum); + return CMD_SUCCESS; } }; -class ModuleOperHash : public Module +class ModulePasswordHash : public Module { - - CommandMkpasswd* mycommand; - ConfigReader* Conf; - hashymodules hashers; /* List of modules which implement HashRequest */ - std::deque<std::string> names; /* Module names which implement HashRequest */ + private: + CommandMkpasswd cmd; public: - - ModuleOperHash(InspIRCd* Me) - : Module(Me) + ModulePasswordHash() + : cmd(this) { + } - /* Read the config file first */ - Conf = NULL; - OnRehash(NULL,""); - - /* Find all modules which implement the interface 'HashRequest' */ - modulelist* ml = ServerInstance->Modules->FindInterface("HashRequest"); - - /* Did we find any modules? */ - if (ml) + ModResult OnPassCompare(Extensible* ex, const std::string &data, const std::string &input, const std::string &hashtype) CXX11_OVERRIDE + { + if (!hashtype.compare(0, 5, "hmac-", 5)) { - /* Yes, enumerate them all to find out the hashing algorithm name */ - for (modulelist::iterator m = ml->begin(); m != ml->end(); m++) + std::string type(hashtype, 5); + HashProvider* hp = ServerInstance->Modules->FindDataService<HashProvider>("hash/" + type); + if (!hp) + return MOD_RES_PASSTHRU; + + if (hp->IsKDF()) { - /* Make a request to it for its name, its implementing - * HashRequest so we know its safe to do this - */ - std::string name = HashNameRequest(this, *m).Send(); - /* Build a map of them */ - hashers[name.c_str()] = *m; - names.push_back(name); + ServerInstance->Logs->Log(MODNAME, LOG_DEFAULT, "Tried to use HMAC with %s, which does not support HMAC", type.c_str()); + return MOD_RES_DENY; } - } - else - { - throw ModuleException("I can't find any modules loaded which implement the HashRequest interface! You probably forgot to load a hashing module such as m_md5.so or m_sha256.so."); - } - - ServerInstance->Modules->UseInterface("HashRequest"); - - mycommand = new CommandMkpasswd(ServerInstance, this, hashers, names); - ServerInstance->AddCommand(mycommand); - Implementation eventlist[] = { I_OnRehash, I_OnPassCompare }; - ServerInstance->Modules->Attach(eventlist, this, 2); - } - - virtual ~ModuleOperHash() - { - ServerInstance->Modules->DoneWithInterface("HashRequest"); - } - - - virtual void OnRehash(User* user, const std::string &parameter) - { - /* Re-read configuration file */ - if (Conf) - delete Conf; - Conf = new ConfigReader(ServerInstance); - } + // this is a valid hash, from here on we either accept or deny + std::string::size_type sep = data.find('$'); + if (sep == std::string::npos) + return MOD_RES_DENY; + std::string salt = Base64ToBin(data.substr(0, sep)); + std::string target = Base64ToBin(data.substr(sep + 1)); + + if (target == hp->hmac(salt, input)) + return MOD_RES_ALLOW; + else + return MOD_RES_DENY; + } - virtual int OnPassCompare(Extensible* ex, const std::string &data, const std::string &input, const std::string &hashtype) - { - /* First, lets see what hash theyre using on this oper */ - hashymodules::iterator x = hashers.find(hashtype.c_str()); + HashProvider* hp = ServerInstance->Modules->FindDataService<HashProvider>("hash/" + hashtype); - /* Is this a valid hash name? (case insensitive) */ - if (x != hashers.end()) + /* Is this a valid hash name? */ + if (hp) { - /* Reset the hashing module */ - HashResetRequest(this, x->second).Send(); - /* Compare the hash in the config to the generated hash */ - if (!strcasecmp(data.c_str(), HashSumRequest(this, x->second, input.c_str()).Send())) - return 1; - /* No match, and must be hashed, forbid */ - else return -1; + if (hp->Compare(input, data)) + return MOD_RES_ALLOW; + else + /* No match, and must be hashed, forbid */ + return MOD_RES_DENY; } - /* Not a hash, fall through to strcmp in core */ - return 0; + // We don't handle this type, let other mods or the core decide + return MOD_RES_PASSTHRU; } - virtual Version GetVersion() + Version GetVersion() CXX11_OVERRIDE { - return Version(1,1,0,1,VF_VENDOR,API_VERSION); + return Version("Provides the ability to hash passwords to other modules", VF_VENDOR); } }; -MODULE_INIT(ModuleOperHash) +MODULE_INIT(ModulePasswordHash)