X-Git-Url: https://git.netwichtig.de/gitweb/?a=blobdiff_plain;f=src%2Fmodules%2Fm_password_hash.cpp;h=98462780b09a7fda288759b029d0a9bd327ca845;hb=4c751dbbe8945e5efc230a59b0ed51c2ba10cf92;hp=45f986be8fb59e7de3899d819749e03fdd6fc6b1;hpb=20bea3078d67a090ebcca64bf3cdbd7e6ab6adb6;p=user%2Fhenk%2Fcode%2Finspircd.git diff --git a/src/modules/m_password_hash.cpp b/src/modules/m_password_hash.cpp index 45f986be8..98462780b 100644 --- a/src/modules/m_password_hash.cpp +++ b/src/modules/m_password_hash.cpp @@ -1,156 +1,140 @@ -/* +------------------------------------+ - * | Inspire Internet Relay Chat Daemon | - * +------------------------------------+ +/* + * InspIRCd -- Internet Relay Chat Daemon * - * InspIRCd: (C) 2002-2008 InspIRCd Development Team - * See: http://www.inspircd.org/wiki/index.php/Credits + * Copyright (C) 2009-2010 Daniel De Graaf + * Copyright (C) 2008 Thomas Stagner * - * This program is free but copyrighted software; see - * the file COPYING for details. + * This file is part of InspIRCd. InspIRCd is free software: you can + * redistribute it and/or modify it under the terms of the GNU General Public + * License as published by the Free Software Foundation, version 2. * - * --------------------------------------------------- + * This program is distributed in the hope that it will be useful, but WITHOUT + * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS + * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more + * details. + * + * You should have received a copy of the GNU General Public License + * along with this program. If not, see . */ + /* $ModDesc: Allows for hashed oper passwords */ -/* $ModDep: m_hash.h */ #include "inspircd.h" -#include "m_hash.h" - -typedef std::map hashymodules; +#include "hash.h" /* Handle /MKPASSWD */ class CommandMkpasswd : public Command { - Module* Sender; - hashymodules &hashers; - std::deque &names; public: - CommandMkpasswd (InspIRCd* Instance, Module* S, hashymodules &h, std::deque &n) - : Command(Instance,"MKPASSWD", 'o', 2), Sender(S), hashers(h), names(n) + CommandMkpasswd(Module* Creator) : Command(Creator, "MKPASSWD", 2) { - this->source = "m_oper_hash.so"; syntax = " "; + Penalty = 5; } - void MakeHash(User* user, const char* algo, const char* stuff) + void MakeHash(User* user, const std::string& algo, const std::string& stuff) { - /* Lets see if they gave us an algorithm which has been implemented */ - hashymodules::iterator x = hashers.find(algo); - if (x != hashers.end()) + if (algo.substr(0,5) == "hmac-") + { + std::string type = algo.substr(5); + HashProvider* hp = ServerInstance->Modules->FindDataService("hash/" + type); + if (!hp) + { + user->WriteServ("NOTICE %s :Unknown hash type", user->nick.c_str()); + return; + } + std::string salt = ServerInstance->GenRandomStr(6, false); + std::string target = hp->hmac(salt, stuff); + std::string str = BinToBase64(salt) + "$" + BinToBase64(target, NULL, 0); + + user->WriteServ("NOTICE %s :%s hashed password for %s is %s", + user->nick.c_str(), algo.c_str(), stuff.c_str(), str.c_str()); + return; + } + HashProvider* hp = ServerInstance->Modules->FindDataService("hash/" + algo); + if (hp) { - /* Yup, reset it first (Always ALWAYS do this) */ - HashResetRequest(Sender, x->second).Send(); /* Now attempt to generate a hash */ - user->WriteServ("NOTICE %s :%s hashed password for %s is %s",user->nick, algo, stuff, HashSumRequest(Sender, x->second, stuff).Send() ); + std::string hexsum = hp->hexsum(stuff); + user->WriteServ("NOTICE %s :%s hashed password for %s is %s", + user->nick.c_str(), algo.c_str(), stuff.c_str(), hexsum.c_str()); } else { - /* I dont do flying, bob. */ - user->WriteServ("NOTICE %s :Unknown hash type, valid hash types are: %s", user->nick, irc::stringjoiner(", ", names, 0, names.size() - 1).GetJoined().c_str() ); + user->WriteServ("NOTICE %s :Unknown hash type", user->nick.c_str()); } } - CmdResult Handle (const char** parameters, int pcnt, User *user) + CmdResult Handle (const std::vector& parameters, User *user) { MakeHash(user, parameters[0], parameters[1]); - /* NOTE: Don't propagate this across the network! - * We dont want plaintext passes going all over the place... - * To make sure it goes nowhere, return CMD_FAILURE! - */ - return CMD_FAILURE; + + return CMD_SUCCESS; } }; class ModuleOperHash : public Module { - - CommandMkpasswd* mycommand; - ConfigReader* Conf; - hashymodules hashers; /* List of modules which implement HashRequest */ - std::deque names; /* Module names which implement HashRequest */ - + CommandMkpasswd cmd; public: - ModuleOperHash(InspIRCd* Me) - : Module(Me) - { - - /* Read the config file first */ - Conf = NULL; - OnRehash(NULL,""); - - /* Find all modules which implement the interface 'HashRequest' */ - modulelist* ml = ServerInstance->Modules->FindInterface("HashRequest"); - - /* Did we find any modules? */ - if (ml) - { - /* Yes, enumerate them all to find out the hashing algorithm name */ - for (modulelist::iterator m = ml->begin(); m != ml->end(); m++) - { - /* Make a request to it for its name, its implementing - * HashRequest so we know its safe to do this - */ - std::string name = HashNameRequest(this, *m).Send(); - /* Build a map of them */ - hashers[name.c_str()] = *m; - names.push_back(name); - } - } - else - { - throw ModuleException("I can't find any modules loaded which implement the HashRequest interface! You probably forgot to load a hashing module such as m_md5.so or m_sha256.so."); - } - - ServerInstance->Modules->UseInterface("HashRequest"); - - mycommand = new CommandMkpasswd(ServerInstance, this, hashers, names); - ServerInstance->AddCommand(mycommand); - Implementation eventlist[] = { I_OnRehash, I_OnPassCompare }; - ServerInstance->Modules->Attach(eventlist, this, 2); - } - - virtual ~ModuleOperHash() + ModuleOperHash() : cmd(this) { - ServerInstance->Modules->DoneWithInterface("HashRequest"); } - - virtual void OnRehash(User* user, const std::string ¶meter) + void init() { - /* Re-read configuration file */ - if (Conf) - delete Conf; + /* Read the config file first */ + OnRehash(NULL); - Conf = new ConfigReader(ServerInstance); + ServerInstance->Modules->AddService(cmd); + Implementation eventlist[] = { I_OnPassCompare }; + ServerInstance->Modules->Attach(eventlist, this, sizeof(eventlist)/sizeof(Implementation)); } - virtual int OnPassCompare(Extensible* ex, const std::string &data, const std::string &input, const std::string &hashtype) + virtual ModResult OnPassCompare(Extensible* ex, const std::string &data, const std::string &input, const std::string &hashtype) { - /* First, lets see what hash theyre using on this oper */ - hashymodules::iterator x = hashers.find(hashtype.c_str()); + if (hashtype.substr(0,5) == "hmac-") + { + std::string type = hashtype.substr(5); + HashProvider* hp = ServerInstance->Modules->FindDataService("hash/" + type); + if (!hp) + return MOD_RES_PASSTHRU; + // this is a valid hash, from here on we either accept or deny + std::string::size_type sep = data.find('$'); + if (sep == std::string::npos) + return MOD_RES_DENY; + std::string salt = Base64ToBin(data.substr(0, sep)); + std::string target = Base64ToBin(data.substr(sep + 1)); + + if (target == hp->hmac(salt, input)) + return MOD_RES_ALLOW; + else + return MOD_RES_DENY; + } + + HashProvider* hp = ServerInstance->Modules->FindDataService("hash/" + hashtype); - /* Is this a valid hash name? (case insensitive) */ - if (x != hashers.end()) + /* Is this a valid hash name? */ + if (hp) { - /* Reset the hashing module */ - HashResetRequest(this, x->second).Send(); /* Compare the hash in the config to the generated hash */ - if (!strcasecmp(data.c_str(), HashSumRequest(this, x->second, input.c_str()).Send())) - return 1; - /* No match, and must be hashed, forbid */ - else return -1; + if (data == hp->hexsum(input)) + return MOD_RES_ALLOW; + else + /* No match, and must be hashed, forbid */ + return MOD_RES_DENY; } /* Not a hash, fall through to strcmp in core */ - return 0; + return MOD_RES_PASSTHRU; } virtual Version GetVersion() { - return Version(1,1,0,1,VF_VENDOR,API_VERSION); + return Version("Allows for hashed oper passwords",VF_VENDOR); } };