| /* |
| * Copyright (C) 2008-2013 Sergio Talens-Oliag <sto@iti.es> |
| * |
| * Based on nginx's 'ngx_http_auth_basic_module.c' by Igor Sysoev and apache's |
| * 'mod_auth_pam.c' by Ingo Luetkebolhe. |
| * |
| * SVN Id: $Id: ngx_http_auth_pam_module.c 7626 2013-09-17 10:00:49Z sto $ |
| */ |
| |
| #include <ngx_config.h> |
| #include <ngx_core.h> |
| #include <ngx_http.h> |
| #include <security/pam_appl.h> |
| |
| #define NGX_PAM_SERVICE_NAME "nginx" |
| |
| /* Module context data */ |
| typedef struct { |
| ngx_str_t passwd; |
| } ngx_http_auth_pam_ctx_t; |
| |
| /* PAM userinfo */ |
| typedef struct { |
| ngx_str_t username; |
| ngx_str_t password; |
| } ngx_pam_userinfo; |
| |
| /* Module configuration struct */ |
| typedef struct { |
| ngx_str_t realm; /* http basic auth realm */ |
| ngx_str_t service_name; /* pam service name */ |
| ngx_flag_t set_pam_env; /* flag that indicates if we should export |
| variables to PAM or NOT */ |
| } ngx_http_auth_pam_loc_conf_t; |
| |
| /* Module handler */ |
| static ngx_int_t ngx_http_auth_pam_handler(ngx_http_request_t *r); |
| |
| /* Function that authenticates the user -- is the only function that uses PAM */ |
| static ngx_int_t ngx_http_auth_pam_authenticate(ngx_http_request_t *r, |
| ngx_http_auth_pam_ctx_t *ctx, |
| ngx_str_t *passwd, void *conf); |
| |
| static ngx_int_t ngx_http_auth_pam_set_realm(ngx_http_request_t *r, |
| ngx_str_t *realm); |
| |
| static void *ngx_http_auth_pam_create_loc_conf(ngx_conf_t *cf); |
| |
| static char *ngx_http_auth_pam_merge_loc_conf(ngx_conf_t *cf, |
| void *parent, void *child); |
| |
| static ngx_int_t ngx_http_auth_pam_init(ngx_conf_t *cf); |
| |
| static char *ngx_http_auth_pam(ngx_conf_t *cf, void *post, void *data); |
| |
| static ngx_conf_post_handler_pt ngx_http_auth_pam_p = ngx_http_auth_pam; |
| |
| static int ngx_auth_pam_talker(int num_msg, const struct pam_message ** msg, |
| struct pam_response ** resp, void *appdata_ptr); |
| |
| static ngx_command_t ngx_http_auth_pam_commands[] = { |
| |
| { ngx_string("auth_pam"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF |
| |NGX_CONF_TAKE1, |
| ngx_conf_set_str_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_auth_pam_loc_conf_t, realm), |
| &ngx_http_auth_pam_p }, |
| |
| { ngx_string("auth_pam_service_name"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF |
| |NGX_CONF_TAKE1, |
| ngx_conf_set_str_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_auth_pam_loc_conf_t, service_name), |
| NULL }, |
| |
| { ngx_string("auth_pam_set_pam_env"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_HTTP_LMT_CONF |
| |NGX_CONF_FLAG, |
| ngx_conf_set_flag_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_auth_pam_loc_conf_t, set_pam_env), |
| NULL }, |
| |
| ngx_null_command |
| }; |
| |
| |
| static ngx_http_module_t ngx_http_auth_pam_module_ctx = { |
| NULL, /* preconfiguration */ |
| ngx_http_auth_pam_init, /* postconfiguration */ |
| |
| NULL, /* create main configuration */ |
| NULL, /* init main configuration */ |
| |
| NULL, /* create server configuration */ |
| NULL, /* merge server configuration */ |
| |
| ngx_http_auth_pam_create_loc_conf, /* create location configuration */ |
| ngx_http_auth_pam_merge_loc_conf /* merge location configuration */ |
| }; |
| |
| |
| ngx_module_t ngx_http_auth_pam_module = { |
| NGX_MODULE_V1, |
| &ngx_http_auth_pam_module_ctx, /* module context */ |
| ngx_http_auth_pam_commands, /* module directives */ |
| NGX_HTTP_MODULE, /* module type */ |
| NULL, /* init master */ |
| NULL, /* init module */ |
| NULL, /* init process */ |
| NULL, /* init thread */ |
| NULL, /* exit thread */ |
| NULL, /* exit process */ |
| NULL, /* exit master */ |
| NGX_MODULE_V1_PADDING |
| }; |
| |
| /* |
| * ngx_auth_pam_talker: supply authentication information to PAM when asked |
| * |
| * Assumptions: |
| * A password is asked for by requesting input without echoing |
| * A username is asked for by requesting input _with_ echoing |
| */ |
| static int |
| ngx_auth_pam_talker(int num_msg, const struct pam_message ** msg, |
| struct pam_response ** resp, void *appdata_ptr) |
| { |
| int i; |
| ngx_pam_userinfo *uinfo; |
| struct pam_response *response; |
| |
| uinfo = (ngx_pam_userinfo *) appdata_ptr; |
| response = NULL; |
| |
| /* parameter sanity checking */ |
| if (!resp || !msg || !uinfo) |
| return PAM_CONV_ERR; |
| |
| /* allocate memory to store response */ |
| response = malloc(num_msg * sizeof(struct pam_response)); |
| if (!response) |
| return PAM_CONV_ERR; |
| |
| /* copy values */ |
| for (i = 0; i < num_msg; i++) { |
| /* initialize to safe values */ |
| response[i].resp_retcode = 0; |
| response[i].resp = 0; |
| |
| /* select response based on requested output style */ |
| switch (msg[i]->msg_style) { |
| case PAM_PROMPT_ECHO_ON: |
| /* on memory allocation failure, auth fails */ |
| response[i].resp = strdup((const char *)uinfo->username.data); |
| break; |
| case PAM_PROMPT_ECHO_OFF: |
| response[i].resp = strdup((const char *)uinfo->password.data); |
| break; |
| default: |
| if (response) { |
| free(response); |
| } |
| return PAM_CONV_ERR; |
| } |
| } |
| /* everything okay, set PAM response values */ |
| *resp = response; |
| return PAM_SUCCESS; |
| } |
| |
| static ngx_int_t |
| ngx_http_auth_pam_handler(ngx_http_request_t *r) |
| { |
| ngx_int_t rc; |
| ngx_http_auth_pam_ctx_t *ctx; |
| ngx_http_auth_pam_loc_conf_t *alcf; |
| |
| alcf = ngx_http_get_module_loc_conf(r, ngx_http_auth_pam_module); |
| |
| if (alcf->realm.len == 0) { |
| return NGX_DECLINED; |
| } |
| |
| ctx = ngx_http_get_module_ctx(r, ngx_http_auth_pam_module); |
| |
| if (ctx) { |
| return ngx_http_auth_pam_authenticate(r, ctx, &ctx->passwd, alcf); |
| } |
| |
| /* Decode http auth user and passwd, leaving values on the request */ |
| rc = ngx_http_auth_basic_user(r); |
| |
| if (rc == NGX_DECLINED) { |
| return ngx_http_auth_pam_set_realm(r, &alcf->realm); |
| } |
| |
| if (rc == NGX_ERROR) { |
| return NGX_HTTP_INTERNAL_SERVER_ERROR; |
| } |
| |
| /* Check user & password using PAM */ |
| return ngx_http_auth_pam_authenticate(r, ctx, &ctx->passwd, alcf); |
| } |
| |
| /** |
| * create a key value pair from the given key and value string |
| */ |
| static void set_to_pam_env(pam_handle_t *pamh, ngx_http_request_t *r, |
| char *key, char *value) |
| { |
| if (key != NULL && value != NULL) { |
| size_t size = strlen(key) + strlen(value) + 1 * sizeof(char); |
| char *key_value_pair = ngx_palloc(r->pool, size); |
| sprintf(key_value_pair, "%s=%s", key, value); |
| |
| pam_putenv(pamh, key_value_pair); |
| } |
| } |
| |
| /** |
| * creates a '\0' terminated string from the given ngx_str_t |
| * |
| * @param source nginx string structure with data and length |
| * @param pool pool of the request used for memory allocation |
| */ |
| static char* ngx_strncpy_s(ngx_str_t source, ngx_pool_t *pool) |
| { |
| // allocate memory in pool |
| char* destination = ngx_palloc(pool, source.len + 1); |
| strncpy(destination, (char *) source.data, source.len); |
| // add null terminator |
| destination[source.len] = '\0'; |
| return destination; |
| } |
| |
| /** |
| * enrich pam environment with request parameters |
| */ |
| static void add_request_info_to_pam_env(pam_handle_t *pamh, |
| ngx_http_request_t *r) |
| { |
| char *request_info = ngx_strncpy_s(r->request_line, r->pool); |
| char *host_info = ngx_strncpy_s(r->headers_in.host->value, r->pool); |
| |
| set_to_pam_env(pamh, r, "REQUEST", request_info); |
| set_to_pam_env(pamh, r, "HOST", host_info); |
| } |
| |
| static ngx_int_t |
| ngx_http_auth_pam_authenticate(ngx_http_request_t *r, |
| ngx_http_auth_pam_ctx_t *ctx, ngx_str_t *passwd, |
| void *conf) |
| { |
| ngx_int_t rc; |
| ngx_http_auth_pam_loc_conf_t *alcf; |
| |
| ngx_pam_userinfo uinfo; |
| struct pam_conv conv_info; /* PAM struct */ |
| pam_handle_t *pamh; |
| u_char *service_name; |
| |
| alcf = conf; |
| |
| size_t len; |
| u_char *uname_buf, *p; |
| |
| /** |
| * Get username and password, note that r->headers_in.user contains the |
| * string 'user:pass', so we need to copy the username |
| **/ |
| for (len = 0; len < r->headers_in.user.len; len++) { |
| if (r->headers_in.user.data[len] == ':') { |
| break; |
| } |
| } |
| uname_buf = ngx_palloc(r->pool, len+1); |
| if (uname_buf == NULL) { |
| return NGX_HTTP_INTERNAL_SERVER_ERROR; |
| } |
| p = ngx_cpymem(uname_buf, r->headers_in.user.data , len); |
| *p ='\0'; |
| |
| uinfo.username.data = uname_buf; |
| uinfo.username.len = len; |
| |
| uinfo.password.data = r->headers_in.passwd.data; |
| uinfo.password.len = r->headers_in.passwd.len; |
| |
| conv_info.conv = &ngx_auth_pam_talker; |
| conv_info.appdata_ptr = (void *) &uinfo; |
| |
| pamh = NULL; |
| |
| /* Initialize PAM */ |
| if (alcf->service_name.data == NULL) { |
| service_name = (u_char *) NGX_PAM_SERVICE_NAME; |
| } else { |
| service_name = alcf->service_name.data; |
| } |
| if ((rc = pam_start((const char *) service_name, |
| (const char *) uinfo.username.data, |
| &conv_info, |
| &pamh)) != PAM_SUCCESS) { |
| ngx_log_debug1(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, |
| "PAM: Could not start pam service: %s", |
| pam_strerror(pamh, rc)); |
| return NGX_HTTP_INTERNAL_SERVER_ERROR; |
| } |
| |
| if (alcf->set_pam_env) { |
| add_request_info_to_pam_env(pamh, r); |
| } |
| |
| /* try to authenticate user, log error on failure */ |
| if ((rc = pam_authenticate(pamh, |
| PAM_DISALLOW_NULL_AUTHTOK)) != PAM_SUCCESS) { |
| ngx_log_debug2(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, |
| "PAM: user '%s' - not authenticated: %s", |
| uinfo.username.data, pam_strerror(pamh, rc)); |
| pam_end(pamh, PAM_SUCCESS); |
| return ngx_http_auth_pam_set_realm(r, &alcf->realm); |
| } /* endif authenticate */ |
| |
| /* check that the account is healthy */ |
| if ((rc = pam_acct_mgmt(pamh, PAM_DISALLOW_NULL_AUTHTOK)) != PAM_SUCCESS) { |
| ngx_log_debug2(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, |
| "PAM: user '%s' - invalid account: %s", |
| uinfo.username.data, pam_strerror(pamh, rc)); |
| pam_end(pamh, PAM_SUCCESS); |
| return ngx_http_auth_pam_set_realm(r, &alcf->realm); |
| } |
| |
| pam_end(pamh, PAM_SUCCESS); |
| return NGX_OK; |
| } |
| |
| static ngx_int_t |
| ngx_http_auth_pam_set_realm(ngx_http_request_t *r, ngx_str_t *realm) |
| { |
| r->headers_out.www_authenticate = ngx_list_push(&r->headers_out.headers); |
| if (r->headers_out.www_authenticate == NULL) { |
| return NGX_HTTP_INTERNAL_SERVER_ERROR; |
| } |
| |
| r->headers_out.www_authenticate->hash = 1; |
| r->headers_out.www_authenticate->key.len = sizeof("WWW-Authenticate") - 1; |
| r->headers_out.www_authenticate->key.data = (u_char *) "WWW-Authenticate"; |
| r->headers_out.www_authenticate->value = *realm; |
| |
| return NGX_HTTP_UNAUTHORIZED; |
| } |
| |
| static void * |
| ngx_http_auth_pam_create_loc_conf(ngx_conf_t *cf) |
| { |
| ngx_http_auth_pam_loc_conf_t *conf; |
| |
| conf = ngx_pcalloc(cf->pool, sizeof(ngx_http_auth_pam_loc_conf_t)); |
| if (conf == NULL) { |
| return NGX_CONF_ERROR; |
| } |
| |
| /* Strings are already NULL, but the flags have to be marked as unset */ |
| conf->set_pam_env = NGX_CONF_UNSET; |
| |
| return conf; |
| } |
| |
| static char * |
| ngx_http_auth_pam_merge_loc_conf(ngx_conf_t *cf, void *parent, void *child) |
| { |
| ngx_http_auth_pam_loc_conf_t *prev = parent; |
| ngx_http_auth_pam_loc_conf_t *conf = child; |
| |
| if (conf->realm.data == NULL) { |
| conf->realm = prev->realm; |
| } |
| |
| if (conf->service_name.data == NULL) { |
| conf->service_name = prev->service_name; |
| } |
| |
| /* By default set_pam_env is off */ |
| ngx_conf_merge_value(conf->set_pam_env, prev->set_pam_env, 0); |
| |
| return NGX_CONF_OK; |
| } |
| |
| static ngx_int_t |
| ngx_http_auth_pam_init(ngx_conf_t *cf) |
| { |
| ngx_http_handler_pt *h; |
| ngx_http_core_main_conf_t *cmcf; |
| |
| cmcf = ngx_http_conf_get_module_main_conf(cf, ngx_http_core_module); |
| |
| h = ngx_array_push(&cmcf->phases[NGX_HTTP_ACCESS_PHASE].handlers); |
| if (h == NULL) { |
| return NGX_ERROR; |
| } |
| |
| *h = ngx_http_auth_pam_handler; |
| |
| return NGX_OK; |
| } |
| |
| static char * |
| ngx_http_auth_pam(ngx_conf_t *cf, void *post, void *data) |
| { |
| ngx_str_t *realm = data; |
| |
| size_t len; |
| u_char *basic, *p; |
| |
| if (ngx_strcmp(realm->data, "off") == 0) { |
| realm->len = 0; |
| realm->data = (u_char *) ""; |
| |
| return NGX_CONF_OK; |
| } |
| |
| len = sizeof("Basic realm=\"") - 1 + realm->len + 1; |
| |
| basic = ngx_palloc(cf->pool, len); |
| if (basic == NULL) { |
| return NGX_CONF_ERROR; |
| } |
| |
| p = ngx_cpymem(basic, "Basic realm=\"", sizeof("Basic realm=\"") - 1); |
| p = ngx_cpymem(p, realm->data, realm->len); |
| *p = '"'; |
| |
| realm->len = len; |
| realm->data = basic; |
| |
| return NGX_CONF_OK; |
| } |
| |
| /* SVN Id: $Id: ngx_http_auth_pam_module.c 7626 2013-09-17 10:00:49Z sto $ */ |