blob: 7eac260bc56825047c2146bd3b141ceefa1766b1 [file] [log] [blame]
/*
*
* Wireless daemon for Linux
*
* Copyright (C) 2016 Markus Ongyerth. All rights reserved.
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <ctype.h>
#include <stdio.h>
#include <errno.h>
#include <ell/ell.h>
#include "src/missing.h"
#include "src/eap.h"
#include "src/eap-private.h"
#include "src/eap-mschapv2.h"
#include "src/mschaputil.h"
#define MSCHAPV2_CHAL_LEN 16
#define MSCHAPV2_NT_RESPONSE_LEN 24
#define MSCHAPV2_AUTH_RESPONSE_LEN 20
#define MSCHAPV2_MASTER_KEY_LEN 16
#define MSCHAPV2_OP_CHALLENGE 1
#define MSCHAPV2_OP_RESPONSE 2
#define MSCHAPV2_OP_SUCCESS 3
#define MSCHAPV2_OP_FAILURE 4
struct eap_mschapv2_state {
uint8_t password_hash[16];
char *user;
size_t user_len;
uint8_t current_id;
uint8_t peer_challenge[MSCHAPV2_CHAL_LEN];
uint8_t server_challenge[MSCHAPV2_CHAL_LEN];
};
struct mschapv2_header {
uint8_t op_code;
uint8_t mschap_id;
uint16_t mschap_len;
} __attribute__((packed));
struct mschapv2_value {
uint8_t peer_challenge[MSCHAPV2_CHAL_LEN];
uint8_t reserved[8];
uint8_t nt_response[MSCHAPV2_NT_RESPONSE_LEN];
uint8_t flags;
} __attribute__((packed));
struct mschapv2_response {
struct mschapv2_header hdr;
/* This will always be sizeof(value) */
uint8_t val_length;
struct mschapv2_value value;
char name[0];
} __attribute__((packed));
/**
* Generate the asymmetric start keys from our mschapv2 master key for MPPE
* This function is specified in:
* https://tools.ietf.org/html/draft-ietf-pppext-mschapv2-keys-02
*
* @master_key: The master key
* @session_key: the destination
* @session_len: The length of the requested key in octets (<= 20)
* @server: if the key should be generated for server side
* @send: if the send or the receive key should be generated
*
* Returns: true on success, false if hash/encrypt couldn't be done
**/
bool mschapv2_get_asymmetric_start_key(const uint8_t master_key[static 16],
uint8_t *session_key, size_t session_len,
bool server, bool send)
{
static const uint8_t magic2[] = {
0x4f, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x63, 0x6c, 0x69,
0x65, 0x6e, 0x74, 0x20, 0x73, 0x69, 0x64, 0x65, 0x2c, 0x20,
0x74, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, 0x74, 0x68,
0x65, 0x20, 0x73, 0x65, 0x6e, 0x64, 0x20, 0x6b, 0x65, 0x79,
0x3b, 0x20, 0x6f, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x73,
0x65, 0x72, 0x76, 0x65, 0x72, 0x20, 0x73, 0x69, 0x64, 0x65,
0x2c, 0x20, 0x69, 0x74, 0x20, 0x69, 0x73, 0x20, 0x74, 0x68,
0x65, 0x20, 0x72, 0x65, 0x63, 0x65, 0x69, 0x76, 0x65, 0x20,
0x6b, 0x65, 0x79, 0x2e
};
static const uint8_t magic3[] = {
0x4f, 0x6e, 0x20, 0x74, 0x68, 0x65, 0x20, 0x63, 0x6c, 0x69,
0x65, 0x6e, 0x74, 0x20, 0x73, 0x69, 0x64, 0x65, 0x2c, 0x20,
0x74, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, 0x74, 0x68,
0x65, 0x20, 0x72, 0x65, 0x63, 0x65, 0x69, 0x76, 0x65, 0x20,
0x6b, 0x65, 0x79, 0x3b, 0x20, 0x6f, 0x6e, 0x20, 0x74, 0x68,
0x65, 0x20, 0x73, 0x65, 0x72, 0x76, 0x65, 0x72, 0x20, 0x73,
0x69, 0x64, 0x65, 0x2c, 0x20, 0x69, 0x74, 0x20, 0x69, 0x73,
0x20, 0x74, 0x68, 0x65, 0x20, 0x73, 0x65, 0x6e, 0x64, 0x20,
0x6b, 0x65, 0x79, 0x2e
};
static const uint8_t shs_pad1[] = {
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00
};
static const uint8_t shs_pad2[] = {
0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2,
0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2,
0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2,
0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2, 0xf2
};
const uint8_t *magic;
struct l_checksum *check;
if (send == server)
magic = magic3;
else
magic = magic2;
check = l_checksum_new(L_CHECKSUM_SHA1);
if (!check)
return false;
l_checksum_update(check, master_key, 16);
l_checksum_update(check, shs_pad1, 40);
l_checksum_update(check, magic, 84);
l_checksum_update(check, shs_pad2, 40);
l_checksum_get_digest(check, session_key, session_len);
l_checksum_free(check);
return true;
}
/**
* Generate the master key for MPPE from mschapv2
* This function is specified in:
* https://tools.ietf.org/html/draft-ietf-pppext-mschapv2-keys-02
*
* @pw_hash_hash: The MD4 hash of the password hash
* @nt_response: The nt_response generated for mschapv2
* @master_key: The destination
*
* Returns: true on success, false if hash/encrypt couldn't be done
**/
bool mschapv2_get_master_key(const uint8_t pw_hash_hash[static 16],
const uint8_t nt_response[static 24],
uint8_t master_key[static 16])
{
static const uint8_t magic[] = {
0x54, 0x68, 0x69, 0x73, 0x20, 0x69, 0x73, 0x20, 0x74,
0x68, 0x65, 0x20, 0x4d, 0x50, 0x50, 0x45, 0x20, 0x4d,
0x61, 0x73, 0x74, 0x65, 0x72, 0x20, 0x4b, 0x65, 0x79
};
struct l_checksum *check;
check = l_checksum_new(L_CHECKSUM_SHA1);
if (!check)
return false;
l_checksum_update(check, pw_hash_hash, 16);
l_checksum_update(check, nt_response, 24);
l_checksum_update(check, magic, sizeof(magic));
l_checksum_get_digest(check, master_key, 16);
l_checksum_free(check);
return true;
}
static bool eap_mschapv2_reset_state(struct eap_state *eap)
{
struct eap_mschapv2_state *state = eap_get_data(eap);
memset(state->peer_challenge, 0, sizeof(state->peer_challenge));
memset(state->server_challenge, 0, sizeof(state->server_challenge));
return true;
}
static void eap_mschapv2_state_free(struct eap_mschapv2_state *state)
{
explicit_bzero(state->password_hash, sizeof(state->password_hash));
explicit_bzero(state->user, state->user_len);
l_free(state->user);
state->user_len = 0;
l_free(state);
}
static void eap_mschapv2_free(struct eap_state *eap)
{
struct eap_mschapv2_state *state;
eap_mschapv2_reset_state(eap);
state = eap_get_data(eap);
eap_set_data(eap, NULL);
eap_mschapv2_state_free(state);
}
static bool eap_mschapv2_send_response(struct eap_state *eap)
{
struct eap_mschapv2_state *state = eap_get_data(eap);
size_t size = sizeof(struct mschapv2_response) + state->user_len;
uint8_t output[size + 5];
struct mschapv2_response *response =
(struct mschapv2_response *) (output + 5);
bool ret;
/*
* Make sure to initialize the response structure to 0 since
* we're not filling in some of the reserved or optional fields
*/
memset(response, 0, size);
ret = mschapv2_generate_nt_response(state->password_hash,
state->peer_challenge,
state->server_challenge,
state->user,
response->value.nt_response);
if (!ret)
return false;
response->hdr.op_code = MSCHAPV2_OP_RESPONSE;
response->hdr.mschap_id = state->current_id;
response->hdr.mschap_len = L_BE16_TO_CPU(size);
response->val_length = sizeof(struct mschapv2_value);
memcpy(response->value.peer_challenge, state->peer_challenge,
MSCHAPV2_CHAL_LEN);
memcpy(response->name, state->user, state->user_len);
eap_method_respond(eap, output, sizeof(output));
return true;
}
static void eap_mschapv2_handle_challenge(struct eap_state *eap,
const uint8_t *pkt, size_t len)
{
struct eap_mschapv2_state *state = eap_get_data(eap);
if (pkt[0] != MSCHAPV2_CHAL_LEN) {
l_error("MSCHAPV2-Challenge had unexpected length: %x",
pkt[0]);
goto err;
}
if (len - 1 < MSCHAPV2_CHAL_LEN) {
l_error("MSCHAPV2-Challenge packet was to short for challenge");
goto err;
}
memcpy(state->server_challenge, pkt + 1, MSCHAPV2_CHAL_LEN);
l_getrandom(state->peer_challenge, MSCHAPV2_CHAL_LEN);
if (eap_mschapv2_send_response(eap))
return;
err:
eap_method_error(eap);
}
/*
* We need to verify the authenticator response from the server
* and generate the master session key.
*/
static void eap_mschapv2_handle_success(struct eap_state *eap,
const uint8_t *pkt, size_t len)
{
struct eap_mschapv2_state *state = eap_get_data(eap);
uint8_t nt_response[24];
uint8_t password_hash_hash[16];
uint8_t master_key[16];
uint8_t session_key[32];
char authenticator_resp[42];
bool ret;
uint8_t buffer[5 + 1];
mschapv2_hash_nt_password_hash(state->password_hash,
password_hash_hash);
ret = mschapv2_generate_nt_response(state->password_hash,
state->peer_challenge,
state->server_challenge,
state->user, nt_response);
if (!ret)
goto done;
ret = mschapv2_generate_authenticator_response(password_hash_hash,
nt_response,
state->peer_challenge,
state->server_challenge,
state->user,
authenticator_resp);
if (!ret)
goto done;
/*
* For iwd timing attacks are unlikely because media access will
* influence timing. If this code is ever taken out of iwd, memcmp
* should be replaced by a constant time memcmp
*/
if (len < 42 || memcmp(authenticator_resp, pkt, 42)) {
l_warn("Authenticator response didn't match");
ret = false;
goto done;
}
ret = mschapv2_get_master_key(password_hash_hash, nt_response,
master_key);
ret &= mschapv2_get_asymmetric_start_key(master_key, session_key,
16, false, true);
ret &= mschapv2_get_asymmetric_start_key(master_key, session_key + 16,
16, false, false);
if (!ret)
goto done;
eap_method_success(eap);
buffer[5] = MSCHAPV2_OP_SUCCESS;
eap_method_respond(eap, buffer, sizeof(buffer));
/* The eapol set_key_material only needs msk, and that's all we got */
eap_set_key_material(eap, session_key, 32, NULL, 0, NULL, 0, NULL, 0);
done:
if (!ret)
eap_method_error(eap);
explicit_bzero(master_key, sizeof(master_key));
explicit_bzero(session_key, sizeof(session_key));
explicit_bzero(password_hash_hash, sizeof(password_hash_hash));
}
static void eap_mschapv2_handle_failure(struct eap_state *eap,
const uint8_t *pkt, size_t len)
{
/*
* From what I have seen, we can't prompt the user in any useful way
* yet, so we can't do any proper error handling.
* The values we can read from this are defined in:
* https://tools.ietf.org/html/draft-ietf-pppext-mschap-v2-01
* Section 9
*
* At the current point, this will be a fail.
*/
l_debug("");
eap_method_error(eap);
}
static void eap_mschapv2_handle_request(struct eap_state *eap,
const uint8_t *pkt, size_t len)
{
struct eap_mschapv2_state *state = eap_get_data(eap);
const struct mschapv2_header *hdr = (struct mschapv2_header *) pkt;
size_t size = sizeof(*hdr);
if (len < sizeof(struct mschapv2_header) + 1) {
l_error("EAP-MSCHAPV2 packet too short");
goto err;
}
state->current_id = hdr->mschap_id;
if (L_BE16_TO_CPU(hdr->mschap_len) != len) {
l_error("EAP-MSCHAPV2 packet contains invalid length");
goto err;
}
switch (hdr->op_code) {
case MSCHAPV2_OP_CHALLENGE:
eap_mschapv2_handle_challenge(eap, pkt + size, len - size);
break;
case MSCHAPV2_OP_SUCCESS:
eap_mschapv2_handle_success(eap, pkt + size, len - size);
break;
case MSCHAPV2_OP_FAILURE:
eap_mschapv2_handle_failure(eap, pkt + size, len - size);
break;
default:
l_error("Got unknown OP-Code in MSCHPV2 packet: %x",
hdr->op_code);
goto err;
}
return;
err:
eap_method_error(eap);
}
static bool set_password_from_string(struct eap_mschapv2_state *state,
const char *password)
{
return mschap_nt_password_hash(password, state->password_hash);
}
static int eap_mschapv2_check_settings(struct l_settings *settings,
struct l_queue *secrets,
const char *prefix,
struct l_queue **out_missing)
{
L_AUTO_FREE_VAR(uint8_t *, password_hash) = NULL;
L_AUTO_FREE_VAR(char *, password) = NULL;
L_AUTO_FREE_VAR(char *, identity);
const struct eap_secret_info *secret;
char setting[64], setting2[64];
uint8_t hash[16];
int r = 0;
size_t hash_len;
snprintf(setting, sizeof(setting), "%sIdentity", prefix);
identity = l_settings_get_string(settings, "Security", setting);
snprintf(setting2, sizeof(setting2), "%sPassword", prefix);
if (!identity) {
secret = l_queue_find(secrets, eap_secret_info_match, setting);
if (secret) {
identity = l_strdup(secret->value);
password = l_strdup(secret->value +
strlen(secret->value) + 1);
goto validate;
}
eap_append_secret(out_missing, EAP_SECRET_REMOTE_USER_PASSWORD,
setting, setting2, NULL,
EAP_CACHE_TEMPORARY);
return 0;
}
password = l_settings_get_string(settings, "Security", setting2);
snprintf(setting, sizeof(setting), "%sPassword-Hash", prefix);
password_hash = l_settings_get_bytes(settings, "Security",
setting, &hash_len);
if (password && password_hash) {
l_error("Exactly one of (%s, %s) must be present",
setting, setting2);
r = -EEXIST;
goto cleanup;
}
if (password_hash) {
if (hash_len != 16) {
l_error("Property %s is not a 16-byte hexstring",
setting);
return -EINVAL;
}
return 0;
} else if (password)
goto validate;
secret = l_queue_find(secrets, eap_secret_info_match, setting2);
if (!secret) {
eap_append_secret(out_missing, EAP_SECRET_REMOTE_PASSWORD,
setting2, NULL, identity,
EAP_CACHE_TEMPORARY);
return 0;
}
password = l_strdup(secret->value);
validate:
if (!mschap_nt_password_hash(password, hash))
r = -EINVAL;
cleanup:
explicit_bzero(password, strlen(password));
return r;
}
static bool eap_mschapv2_load_settings(struct eap_state *eap,
struct l_settings *settings,
const char *prefix)
{
struct eap_mschapv2_state *state;
L_AUTO_FREE_VAR(char *, password) = NULL;
char setting[64];
state = l_new(struct eap_mschapv2_state, 1);
snprintf(setting, sizeof(setting), "%sIdentity", prefix);
state->user = l_settings_get_string(settings, "Security", setting);
if (!state->user)
goto error;
state->user_len = strlen(state->user);
/* Either read the password-hash from hexdump or password and hash it */
snprintf(setting, sizeof(setting), "%sPassword", prefix);
password = l_settings_get_string(settings, "Security", setting);
if (password) {
set_password_from_string(state, password);
explicit_bzero(password, strlen(password));
} else {
size_t hash_len;
uint8_t *hash;
snprintf(setting, sizeof(setting), "%sPassword-Hash", prefix);
hash = l_settings_get_bytes(settings, "Security", setting,
&hash_len);
memcpy(state->password_hash, hash, 16);
explicit_bzero(hash, 16);
l_free(hash);
}
eap_set_data(eap, state);
return true;
error:
free(state);
return false;
}
static struct eap_method eap_mschapv2 = {
.request_type = EAP_TYPE_MSCHAPV2,
.exports_msk = true,
.name = "MSCHAPV2",
.free = eap_mschapv2_free,
.handle_request = eap_mschapv2_handle_request,
.check_settings = eap_mschapv2_check_settings,
.load_settings = eap_mschapv2_load_settings,
.reset_state = eap_mschapv2_reset_state,
};
static int eap_mschapv2_init(void)
{
l_debug("");
if (!l_checksum_is_supported(L_CHECKSUM_MD4, false)) {
l_warn("EAP_MSCHAPv2 init: MD4 support not found, skipping");
l_warn("Ensure that CONFIG_CRYPTO_MD4 is enabled");
return -ENOTSUP;
}
return eap_register_method(&eap_mschapv2);
}
static void eap_mschapv2_exit(void)
{
l_debug("");
eap_unregister_method(&eap_mschapv2);
}
EAP_METHOD_BUILTIN(eap_mschapv2, eap_mschapv2_init, eap_mschapv2_exit)