Initial import
This commit is contained in:
parent
9ac84371d5
commit
a4dc349656
339
COPYING
Normal file
339
COPYING
Normal file
@ -0,0 +1,339 @@
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
Version 2, June 1991
|
||||
|
||||
Copyright (C) 1989, 1991 Free Software Foundation, Inc.,
|
||||
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The licenses for most software are designed to take away your
|
||||
freedom to share and change it. By contrast, the GNU General Public
|
||||
License is intended to guarantee your freedom to share and change free
|
||||
software--to make sure the software is free for all its users. This
|
||||
General Public License applies to most of the Free Software
|
||||
Foundation's software and to any other program whose authors commit to
|
||||
using it. (Some other Free Software Foundation software is covered by
|
||||
the GNU Lesser General Public License instead.) You can apply it to
|
||||
your programs, too.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
this service if you wish), that you receive source code or can get it
|
||||
if you want it, that you can change the software or use pieces of it
|
||||
in new free programs; and that you know you can do these things.
|
||||
|
||||
To protect your rights, we need to make restrictions that forbid
|
||||
anyone to deny you these rights or to ask you to surrender the rights.
|
||||
These restrictions translate to certain responsibilities for you if you
|
||||
distribute copies of the software, or if you modify it.
|
||||
|
||||
For example, if you distribute copies of such a program, whether
|
||||
gratis or for a fee, you must give the recipients all the rights that
|
||||
you have. You must make sure that they, too, receive or can get the
|
||||
source code. And you must show them these terms so they know their
|
||||
rights.
|
||||
|
||||
We protect your rights with two steps: (1) copyright the software, and
|
||||
(2) offer you this license which gives you legal permission to copy,
|
||||
distribute and/or modify the software.
|
||||
|
||||
Also, for each author's protection and ours, we want to make certain
|
||||
that everyone understands that there is no warranty for this free
|
||||
software. If the software is modified by someone else and passed on, we
|
||||
want its recipients to know that what they have is not the original, so
|
||||
that any problems introduced by others will not reflect on the original
|
||||
authors' reputations.
|
||||
|
||||
Finally, any free program is threatened constantly by software
|
||||
patents. We wish to avoid the danger that redistributors of a free
|
||||
program will individually obtain patent licenses, in effect making the
|
||||
program proprietary. To prevent this, we have made it clear that any
|
||||
patent must be licensed for everyone's free use or not licensed at all.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
GNU GENERAL PUBLIC LICENSE
|
||||
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
|
||||
|
||||
0. This License applies to any program or other work which contains
|
||||
a notice placed by the copyright holder saying it may be distributed
|
||||
under the terms of this General Public License. The "Program", below,
|
||||
refers to any such program or work, and a "work based on the Program"
|
||||
means either the Program or any derivative work under copyright law:
|
||||
that is to say, a work containing the Program or a portion of it,
|
||||
either verbatim or with modifications and/or translated into another
|
||||
language. (Hereinafter, translation is included without limitation in
|
||||
the term "modification".) Each licensee is addressed as "you".
|
||||
|
||||
Activities other than copying, distribution and modification are not
|
||||
covered by this License; they are outside its scope. The act of
|
||||
running the Program is not restricted, and the output from the Program
|
||||
is covered only if its contents constitute a work based on the
|
||||
Program (independent of having been made by running the Program).
|
||||
Whether that is true depends on what the Program does.
|
||||
|
||||
1. You may copy and distribute verbatim copies of the Program's
|
||||
source code as you receive it, in any medium, provided that you
|
||||
conspicuously and appropriately publish on each copy an appropriate
|
||||
copyright notice and disclaimer of warranty; keep intact all the
|
||||
notices that refer to this License and to the absence of any warranty;
|
||||
and give any other recipients of the Program a copy of this License
|
||||
along with the Program.
|
||||
|
||||
You may charge a fee for the physical act of transferring a copy, and
|
||||
you may at your option offer warranty protection in exchange for a fee.
|
||||
|
||||
2. You may modify your copy or copies of the Program or any portion
|
||||
of it, thus forming a work based on the Program, and copy and
|
||||
distribute such modifications or work under the terms of Section 1
|
||||
above, provided that you also meet all of these conditions:
|
||||
|
||||
a) You must cause the modified files to carry prominent notices
|
||||
stating that you changed the files and the date of any change.
|
||||
|
||||
b) You must cause any work that you distribute or publish, that in
|
||||
whole or in part contains or is derived from the Program or any
|
||||
part thereof, to be licensed as a whole at no charge to all third
|
||||
parties under the terms of this License.
|
||||
|
||||
c) If the modified program normally reads commands interactively
|
||||
when run, you must cause it, when started running for such
|
||||
interactive use in the most ordinary way, to print or display an
|
||||
announcement including an appropriate copyright notice and a
|
||||
notice that there is no warranty (or else, saying that you provide
|
||||
a warranty) and that users may redistribute the program under
|
||||
these conditions, and telling the user how to view a copy of this
|
||||
License. (Exception: if the Program itself is interactive but
|
||||
does not normally print such an announcement, your work based on
|
||||
the Program is not required to print an announcement.)
|
||||
|
||||
These requirements apply to the modified work as a whole. If
|
||||
identifiable sections of that work are not derived from the Program,
|
||||
and can be reasonably considered independent and separate works in
|
||||
themselves, then this License, and its terms, do not apply to those
|
||||
sections when you distribute them as separate works. But when you
|
||||
distribute the same sections as part of a whole which is a work based
|
||||
on the Program, the distribution of the whole must be on the terms of
|
||||
this License, whose permissions for other licensees extend to the
|
||||
entire whole, and thus to each and every part regardless of who wrote it.
|
||||
|
||||
Thus, it is not the intent of this section to claim rights or contest
|
||||
your rights to work written entirely by you; rather, the intent is to
|
||||
exercise the right to control the distribution of derivative or
|
||||
collective works based on the Program.
|
||||
|
||||
In addition, mere aggregation of another work not based on the Program
|
||||
with the Program (or with a work based on the Program) on a volume of
|
||||
a storage or distribution medium does not bring the other work under
|
||||
the scope of this License.
|
||||
|
||||
3. You may copy and distribute the Program (or a work based on it,
|
||||
under Section 2) in object code or executable form under the terms of
|
||||
Sections 1 and 2 above provided that you also do one of the following:
|
||||
|
||||
a) Accompany it with the complete corresponding machine-readable
|
||||
source code, which must be distributed under the terms of Sections
|
||||
1 and 2 above on a medium customarily used for software interchange; or,
|
||||
|
||||
b) Accompany it with a written offer, valid for at least three
|
||||
years, to give any third party, for a charge no more than your
|
||||
cost of physically performing source distribution, a complete
|
||||
machine-readable copy of the corresponding source code, to be
|
||||
distributed under the terms of Sections 1 and 2 above on a medium
|
||||
customarily used for software interchange; or,
|
||||
|
||||
c) Accompany it with the information you received as to the offer
|
||||
to distribute corresponding source code. (This alternative is
|
||||
allowed only for noncommercial distribution and only if you
|
||||
received the program in object code or executable form with such
|
||||
an offer, in accord with Subsection b above.)
|
||||
|
||||
The source code for a work means the preferred form of the work for
|
||||
making modifications to it. For an executable work, complete source
|
||||
code means all the source code for all modules it contains, plus any
|
||||
associated interface definition files, plus the scripts used to
|
||||
control compilation and installation of the executable. However, as a
|
||||
special exception, the source code distributed need not include
|
||||
anything that is normally distributed (in either source or binary
|
||||
form) with the major components (compiler, kernel, and so on) of the
|
||||
operating system on which the executable runs, unless that component
|
||||
itself accompanies the executable.
|
||||
|
||||
If distribution of executable or object code is made by offering
|
||||
access to copy from a designated place, then offering equivalent
|
||||
access to copy the source code from the same place counts as
|
||||
distribution of the source code, even though third parties are not
|
||||
compelled to copy the source along with the object code.
|
||||
|
||||
4. You may not copy, modify, sublicense, or distribute the Program
|
||||
except as expressly provided under this License. Any attempt
|
||||
otherwise to copy, modify, sublicense or distribute the Program is
|
||||
void, and will automatically terminate your rights under this License.
|
||||
However, parties who have received copies, or rights, from you under
|
||||
this License will not have their licenses terminated so long as such
|
||||
parties remain in full compliance.
|
||||
|
||||
5. You are not required to accept this License, since you have not
|
||||
signed it. However, nothing else grants you permission to modify or
|
||||
distribute the Program or its derivative works. These actions are
|
||||
prohibited by law if you do not accept this License. Therefore, by
|
||||
modifying or distributing the Program (or any work based on the
|
||||
Program), you indicate your acceptance of this License to do so, and
|
||||
all its terms and conditions for copying, distributing or modifying
|
||||
the Program or works based on it.
|
||||
|
||||
6. Each time you redistribute the Program (or any work based on the
|
||||
Program), the recipient automatically receives a license from the
|
||||
original licensor to copy, distribute or modify the Program subject to
|
||||
these terms and conditions. You may not impose any further
|
||||
restrictions on the recipients' exercise of the rights granted herein.
|
||||
You are not responsible for enforcing compliance by third parties to
|
||||
this License.
|
||||
|
||||
7. If, as a consequence of a court judgment or allegation of patent
|
||||
infringement or for any other reason (not limited to patent issues),
|
||||
conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot
|
||||
distribute so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you
|
||||
may not distribute the Program at all. For example, if a patent
|
||||
license would not permit royalty-free redistribution of the Program by
|
||||
all those who receive copies directly or indirectly through you, then
|
||||
the only way you could satisfy both it and this License would be to
|
||||
refrain entirely from distribution of the Program.
|
||||
|
||||
If any portion of this section is held invalid or unenforceable under
|
||||
any particular circumstance, the balance of the section is intended to
|
||||
apply and the section as a whole is intended to apply in other
|
||||
circumstances.
|
||||
|
||||
It is not the purpose of this section to induce you to infringe any
|
||||
patents or other property right claims or to contest validity of any
|
||||
such claims; this section has the sole purpose of protecting the
|
||||
integrity of the free software distribution system, which is
|
||||
implemented by public license practices. Many people have made
|
||||
generous contributions to the wide range of software distributed
|
||||
through that system in reliance on consistent application of that
|
||||
system; it is up to the author/donor to decide if he or she is willing
|
||||
to distribute software through any other system and a licensee cannot
|
||||
impose that choice.
|
||||
|
||||
This section is intended to make thoroughly clear what is believed to
|
||||
be a consequence of the rest of this License.
|
||||
|
||||
8. If the distribution and/or use of the Program is restricted in
|
||||
certain countries either by patents or by copyrighted interfaces, the
|
||||
original copyright holder who places the Program under this License
|
||||
may add an explicit geographical distribution limitation excluding
|
||||
those countries, so that distribution is permitted only in or among
|
||||
countries not thus excluded. In such case, this License incorporates
|
||||
the limitation as if written in the body of this License.
|
||||
|
||||
9. The Free Software Foundation may publish revised and/or new versions
|
||||
of the General Public License from time to time. Such new versions will
|
||||
be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the Program
|
||||
specifies a version number of this License which applies to it and "any
|
||||
later version", you have the option of following the terms and conditions
|
||||
either of that version or of any later version published by the Free
|
||||
Software Foundation. If the Program does not specify a version number of
|
||||
this License, you may choose any version ever published by the Free Software
|
||||
Foundation.
|
||||
|
||||
10. If you wish to incorporate parts of the Program into other free
|
||||
programs whose distribution conditions are different, write to the author
|
||||
to ask for permission. For software which is copyrighted by the Free
|
||||
Software Foundation, write to the Free Software Foundation; we sometimes
|
||||
make exceptions for this. Our decision will be guided by the two goals
|
||||
of preserving the free status of all derivatives of our free software and
|
||||
of promoting the sharing and reuse of software generally.
|
||||
|
||||
NO WARRANTY
|
||||
|
||||
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
|
||||
FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
|
||||
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
|
||||
PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED
|
||||
OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
||||
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS
|
||||
TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE
|
||||
PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
|
||||
REPAIR OR CORRECTION.
|
||||
|
||||
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
|
||||
REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES,
|
||||
INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING
|
||||
OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
|
||||
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY
|
||||
YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER
|
||||
PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
|
||||
POSSIBILITY OF SUCH DAMAGES.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
How to Apply These Terms to Your New Programs
|
||||
|
||||
If you develop a new program, and you want it to be of the greatest
|
||||
possible use to the public, the best way to achieve this is to make it
|
||||
free software which everyone can redistribute and change under these terms.
|
||||
|
||||
To do so, attach the following notices to the program. It is safest
|
||||
to attach them to the start of each source file to most effectively
|
||||
convey the exclusion of warranty; and each file should have at least
|
||||
the "copyright" line and a pointer to where the full notice is found.
|
||||
|
||||
<one line to give the program's name and a brief idea of what it does.>
|
||||
Copyright (C) <year> <name of author>
|
||||
|
||||
This program is free software; you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation; either version 2 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License along
|
||||
with this program; if not, write to the Free Software Foundation, Inc.,
|
||||
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If the program is interactive, make it output a short notice like this
|
||||
when it starts in an interactive mode:
|
||||
|
||||
Gnomovision version 69, Copyright (C) year name of author
|
||||
Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||
This is free software, and you are welcome to redistribute it
|
||||
under certain conditions; type `show c' for details.
|
||||
|
||||
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||
parts of the General Public License. Of course, the commands you use may
|
||||
be called something other than `show w' and `show c'; they could even be
|
||||
mouse-clicks or menu items--whatever suits your program.
|
||||
|
||||
You should also get your employer (if you work as a programmer) or your
|
||||
school, if any, to sign a "copyright disclaimer" for the program, if
|
||||
necessary. Here is a sample; alter the names:
|
||||
|
||||
Yoyodyne, Inc., hereby disclaims all copyright interest in the program
|
||||
`Gnomovision' (which makes passes at compilers) written by James Hacker.
|
||||
|
||||
<signature of Ty Coon>, 1 April 1989
|
||||
Ty Coon, President of Vice
|
||||
|
||||
This General Public License does not permit incorporating your program into
|
||||
proprietary programs. If your program is a subroutine library, you may
|
||||
consider it more useful to permit linking proprietary applications with the
|
||||
library. If this is what you want to do, use the GNU Lesser General
|
||||
Public License instead of this License.
|
30
Makefile
Normal file
30
Makefile
Normal file
@ -0,0 +1,30 @@
|
||||
CC = gcc
|
||||
CFLAGS = -O2 -s -D_GNU_SOURCE
|
||||
LDLIBS = -lcrypt
|
||||
PREFIX =
|
||||
BINDIR = $(PREFIX)/usr/sbin
|
||||
|
||||
all: sessmgr
|
||||
@echo "All done!"
|
||||
|
||||
sessmgr: sessmgr.o sha256.o
|
||||
$(CC) $(CFLAGS) $(LDLIBS) sessmgr.o sha256.o -o sessmgr
|
||||
|
||||
sessmgr.o: sessmgr.c
|
||||
$(CC) $(CFLAGS) -c sessmgr.c
|
||||
|
||||
sha256.o: sha256.c
|
||||
$(CC) $(CFLAGS) -c sha256.c
|
||||
|
||||
install:
|
||||
mkdir -p $(BINDIR)
|
||||
cp sessmgr $(BINDIR)
|
||||
@echo "All done!"
|
||||
|
||||
uninstall:
|
||||
rm -f $(BINDIR)/sessmgr
|
||||
@echo "All done!"
|
||||
|
||||
clean:
|
||||
rm -f sessmgr *.o
|
||||
@echo "All done!"
|
10
README
Normal file
10
README
Normal file
@ -0,0 +1,10 @@
|
||||
Session Manager
|
||||
===============
|
||||
|
||||
SessMgr is a small utility for Kagera Firmware Administrator's WebUI session validation.
|
||||
Its task is to check password, validate sessions and authorize administrator access.
|
||||
For security reasons, it also saves all success authorization in system logger and allows
|
||||
to easily log out from Web Interface.
|
||||
|
||||
|
||||
It is based on Gargoyle Session Validator <http://www.gargoyle-router.com/>
|
317
sessmgr.c
Normal file
317
sessmgr.c
Normal file
@ -0,0 +1,317 @@
|
||||
/**
|
||||
* @PROJECT Session Manager
|
||||
* @COPYRIGHT See COPYING in the top level directory
|
||||
* @FILE sessmgr.h
|
||||
* @PURPOSE WebUI session manager
|
||||
* @DEVELOPERS Eric Bishop <eric@gargoyle-router.com>
|
||||
* Rafal Kupiec <belliash@asiotec.eu.org>
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <unistd.h>
|
||||
#include <pwd.h>
|
||||
#include <stdarg.h>
|
||||
#include <time.h>
|
||||
|
||||
#include "sessmgr.h"
|
||||
#include "sha256.h"
|
||||
|
||||
char* get_cookie_time(time_t t) {
|
||||
struct tm* utc = gmtime(&t);
|
||||
char wday[4];
|
||||
char month[4];
|
||||
switch(utc->tm_wday) {
|
||||
case 0:
|
||||
sprintf(wday, "Sun");
|
||||
break;
|
||||
case 1:
|
||||
sprintf(wday, "Mon");
|
||||
break;
|
||||
case 2:
|
||||
sprintf(wday, "Tue");
|
||||
break;
|
||||
case 3:
|
||||
sprintf(wday, "Wed");
|
||||
break;
|
||||
case 4:
|
||||
sprintf(wday, "Thu");
|
||||
break;
|
||||
case 5:
|
||||
sprintf(wday, "Fri");
|
||||
break;
|
||||
case 6:
|
||||
sprintf(wday, "Sat");
|
||||
break;
|
||||
}
|
||||
switch(utc->tm_mon) {
|
||||
case 0:
|
||||
sprintf(month, "Jan");
|
||||
break;
|
||||
case 1:
|
||||
sprintf(month, "Feb");
|
||||
break;
|
||||
case 2:
|
||||
sprintf(month, "Mar");
|
||||
break;
|
||||
case 3:
|
||||
sprintf(month, "Apr");
|
||||
break;
|
||||
case 4:
|
||||
sprintf(month, "May");
|
||||
break;
|
||||
case 5:
|
||||
sprintf(month, "Jun");
|
||||
break;
|
||||
case 6:
|
||||
sprintf(month, "Jul");
|
||||
break;
|
||||
case 7:
|
||||
sprintf(month, "Aug");
|
||||
break;
|
||||
case 8:
|
||||
sprintf(month, "Sep");
|
||||
break;
|
||||
case 9:
|
||||
sprintf(month, "Oct");
|
||||
break;
|
||||
case 10:
|
||||
sprintf(month, "Nov");
|
||||
break;
|
||||
case 11:
|
||||
sprintf(month, "Dec");
|
||||
break;
|
||||
}
|
||||
char utc_str[200];
|
||||
sprintf(utc_str, "%s, %d %s %d %02d:%02d:%02d UTC", wday, utc->tm_mday, month, (utc->tm_year + 1900), utc->tm_hour, utc->tm_min, utc->tm_sec);
|
||||
return safe_strdup(utc_str);
|
||||
}
|
||||
|
||||
char* get_root_hash(void) {
|
||||
char* root_hash = get_root_hash_from_file("/etc/shadow");
|
||||
if(root_hash == NULL) {
|
||||
root_hash = get_root_hash_from_file("/etc/passwd");
|
||||
}
|
||||
return root_hash;
|
||||
}
|
||||
|
||||
char* get_root_hash_from_file(const char* passwd_file) {
|
||||
int found = 0;
|
||||
FILE *pw = fopen(passwd_file, "r");
|
||||
char* root_hash = NULL;
|
||||
if(pw != NULL) {
|
||||
char line[512];
|
||||
char* test = fgets(line, 511, pw);
|
||||
while(test != NULL && !found) {
|
||||
if(strlen(test) > 5) {
|
||||
test[4] = '\0';
|
||||
if(strcmp(test, "root") == 0) {
|
||||
char* hash_end;
|
||||
found = 1;
|
||||
test = test + 5;
|
||||
hash_end = strchr(test, ':');
|
||||
*hash_end = '\0';
|
||||
root_hash = safe_strdup(test);
|
||||
}
|
||||
}
|
||||
test = fgets(line, 511, pw);
|
||||
}
|
||||
fclose(pw);
|
||||
}
|
||||
return root_hash;
|
||||
}
|
||||
|
||||
int main(int argc, char **argv) {
|
||||
char *password = NULL;
|
||||
char *cookie_hash = NULL;
|
||||
char *cookie_exp = NULL;
|
||||
char *user_agent = NULL;
|
||||
char *src_ip = NULL;
|
||||
char *redirect = NULL;
|
||||
int timeout_minutes = DEFAULT_SESSION_TIMEOUT;
|
||||
unsigned long browser_time = 0;
|
||||
int loggedout = 0;
|
||||
int unconditionally_generate = 0;
|
||||
int next_opt;
|
||||
int read;
|
||||
|
||||
while((next_opt = getopt(argc, argv, "p:P:c:C:e:E:a:A:i:I:r:R:t:T:b:B:lL:gG")) != -1) {
|
||||
switch(next_opt) {
|
||||
case 'p':
|
||||
case 'P':
|
||||
password = safe_strdup(optarg);
|
||||
break;
|
||||
case 'c':
|
||||
case 'C':
|
||||
cookie_hash = safe_strdup(optarg);
|
||||
break;
|
||||
case 'e':
|
||||
case 'E':
|
||||
cookie_exp = safe_strdup(optarg);
|
||||
break;
|
||||
case 'a':
|
||||
case 'A':
|
||||
user_agent = safe_strdup(optarg);
|
||||
break;
|
||||
case 'i':
|
||||
case 'I':
|
||||
src_ip = safe_strdup(optarg);
|
||||
break;
|
||||
case 'r':
|
||||
case 'R':
|
||||
redirect = safe_strdup(optarg);
|
||||
break;
|
||||
case 't':
|
||||
case 'T':
|
||||
read = sscanf(optarg, "%d", &timeout_minutes);
|
||||
if(read > 0) {
|
||||
timeout_minutes = timeout_minutes > 0 ? timeout_minutes : DEFAULT_SESSION_TIMEOUT;
|
||||
} else {
|
||||
timeout_minutes = DEFAULT_SESSION_TIMEOUT;
|
||||
}
|
||||
timeout_minutes *= 60;
|
||||
break;
|
||||
case 'b':
|
||||
case 'B':
|
||||
read = sscanf(optarg, "%ld", &browser_time);
|
||||
browser_time = read > 0 ? browser_time : 0;
|
||||
break;
|
||||
case 'l':
|
||||
case 'L':
|
||||
loggedout = 1;
|
||||
break;
|
||||
case 'g':
|
||||
case 'G':
|
||||
unconditionally_generate = 1;
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
int expired = 0;
|
||||
int valid = 0;
|
||||
char* root_hash = get_root_hash();
|
||||
if(loggedout == 1) {
|
||||
printf("echo \"Set-Cookie:kagera_sid=loggedout;\"; ");
|
||||
} else if(root_hash != NULL) {
|
||||
time_t now;
|
||||
time(&now);
|
||||
if(password != NULL) {
|
||||
valid = strcmp(crypt(password, root_hash), root_hash) == 0 ? 1 : 0;
|
||||
if(valid) {
|
||||
printf("logger -t webui \"Kagera Administration Interface authorization succeeded from ${REMOTE_ADDR}\"; ");
|
||||
}
|
||||
} else if(cookie_hash != NULL && cookie_exp != NULL && user_agent != NULL && src_ip != NULL) {
|
||||
time_t exp_time;
|
||||
int read = sscanf(cookie_exp, "%ld", &exp_time);
|
||||
if(read > 0) {
|
||||
expired = 1;
|
||||
if(exp_time > now && (exp_time - (timeout_minutes) - 2) <= now) {
|
||||
expired = 0;
|
||||
}
|
||||
}
|
||||
char *combined = safe_strcat(4, root_hash, cookie_exp, user_agent, src_ip);
|
||||
char* hashed = get_sha256_hash_hex_str(combined);
|
||||
if(strcmp(hashed, cookie_hash) == 0) {
|
||||
if(expired == 0 && read > 0) {
|
||||
valid = 1;
|
||||
}
|
||||
} else {
|
||||
expired = 0;
|
||||
}
|
||||
free(hashed);
|
||||
free(combined);
|
||||
}
|
||||
if(unconditionally_generate == 1) {
|
||||
valid = 1;
|
||||
}
|
||||
if(valid == 1 && src_ip != NULL && user_agent != NULL) {
|
||||
char* new_hash;
|
||||
char* combined;
|
||||
char new_exp[100] = "";
|
||||
time_t new_exp_t = now + (timeout_minutes);
|
||||
sprintf(new_exp, "%ld", new_exp_t);
|
||||
char* cookie_exp;
|
||||
if(browser_time > 0 && ((browser_time - now) < (-5*60) || (browser_time - now) > (5*60))) {
|
||||
time_t cookie_exp_t = browser_time+(timeout_minutes);
|
||||
cookie_exp = get_cookie_time(cookie_exp_t);
|
||||
} else {
|
||||
cookie_exp = get_cookie_time(new_exp_t);
|
||||
}
|
||||
combined = safe_strcat(4, root_hash, new_exp, user_agent, src_ip);
|
||||
new_hash = get_sha256_hash_hex_str(combined);
|
||||
if(browser_time == 0) {
|
||||
printf("echo \"Set-Cookie:kagera_sid=%s; Path=/;\"; echo \"Set-Cookie:kagera_exp=%s; Path=/;\"; ", new_hash, new_exp);
|
||||
} else {
|
||||
printf("echo \"Set-Cookie:kagera_sid=%s; Expires=%s; Path=/;\"; echo \"Set-Cookie:kagera_exp=%s; Expires=%s; Path=/;\"; ", new_hash, cookie_exp, new_exp, cookie_exp);
|
||||
}
|
||||
free(new_hash);
|
||||
free(combined);
|
||||
free(cookie_exp);
|
||||
} else {
|
||||
printf("KAGERA_LOGGEDOUT=1\n");
|
||||
}
|
||||
free(root_hash);
|
||||
}
|
||||
if(redirect != NULL) {
|
||||
char str[20] = "";
|
||||
if(expired == 1) {
|
||||
sprintf(str, "&expired=1");
|
||||
} else if(loggedout == 1) {
|
||||
sprintf(str, "&loggedout=1");
|
||||
}
|
||||
printf("echo \"HTTP/1.1 301 Moved Permanently;\"; echo \"Location: %s%s\"; exit", redirect, str);
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
void* safe_malloc(size_t size) {
|
||||
void* val = malloc(size);
|
||||
if(val == NULL) {
|
||||
fprintf(stderr, "ERROR: MALLOC FAILURE!\n");
|
||||
exit(1);
|
||||
}
|
||||
return val;
|
||||
}
|
||||
|
||||
char* safe_strcat(int num_strs, ...) {
|
||||
va_list strs;
|
||||
int new_length = 0;
|
||||
int i;
|
||||
int next_start;
|
||||
char* new_str;
|
||||
|
||||
va_start(strs, num_strs);
|
||||
for(i=0; i < num_strs; i++) {
|
||||
char* next_arg = va_arg(strs, char*);
|
||||
if(next_arg != NULL) {
|
||||
new_length = new_length + strlen(next_arg);
|
||||
}
|
||||
}
|
||||
va_end(strs);
|
||||
new_str = safe_malloc((1 + new_length) * sizeof(char));
|
||||
va_start(strs, num_strs);
|
||||
next_start = 0;
|
||||
for(i=0; i < num_strs; i++) {
|
||||
char* next_arg = va_arg(strs, char*);
|
||||
if(next_arg != NULL) {
|
||||
int next_length = strlen(next_arg);
|
||||
memcpy(new_str+next_start,next_arg, next_length);
|
||||
next_start = next_start+next_length;
|
||||
}
|
||||
}
|
||||
new_str[next_start] = '\0';
|
||||
return new_str;
|
||||
}
|
||||
|
||||
char* safe_strdup(const char* str) {
|
||||
char* new_str = NULL;
|
||||
if(str != NULL) {
|
||||
new_str = strdup(str);
|
||||
if(new_str == NULL) {
|
||||
fprintf(stderr, "ERROR: MALLOC FAILURE!\n");
|
||||
exit(1);
|
||||
}
|
||||
}
|
||||
return new_str;
|
||||
}
|
23
sessmgr.h
Normal file
23
sessmgr.h
Normal file
@ -0,0 +1,23 @@
|
||||
/**
|
||||
* @PROJECT Session Manager
|
||||
* @COPYRIGHT See COPYING in the top level directory
|
||||
* @FILE sessmgr.h
|
||||
* @PURPOSE WebUI session manager
|
||||
* @DEVELOPERS Eric Bishop <eric@gargoyle-router.com>
|
||||
* Rafal Kupiec <belliash@asiotec.eu.org>
|
||||
*/
|
||||
|
||||
#ifndef __SESSMGR_H
|
||||
#define __SESSMGR_H
|
||||
|
||||
#define DEFAULT_SESSION_TIMEOUT 15
|
||||
|
||||
extern char* crypt(const char* key, const char* setting);
|
||||
char* get_cookie_time(time_t t);
|
||||
char* get_root_hash(void);
|
||||
char* get_root_hash_from_file(const char* passwd_file);
|
||||
void* safe_malloc(size_t size);
|
||||
char* safe_strcat(int num_strs, ...);
|
||||
char* safe_strdup(const char* str);
|
||||
|
||||
#endif
|
180
sha256.c
Normal file
180
sha256.c
Normal file
@ -0,0 +1,180 @@
|
||||
/*
|
||||
* sha256.c - Implementation of the Secure Hash Algorithm-256 (SHA-256).
|
||||
*
|
||||
* Implemented from the description on the NIST Web site:
|
||||
* http://csrc.nist.gov/cryptval/shs.html
|
||||
*
|
||||
*
|
||||
* Copyright (C) 2012 Rafal Kupiec (customized for sessmgr)
|
||||
* Copyright (C) 2009 Eric Bishop (adapted as standalone utility)
|
||||
* Copyright (C) 2002 Southern Storm Software, Pty Ltd.
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify
|
||||
* it under the terms of the GNU General Public License as published by
|
||||
* the Free Software Foundation; either version 2 of the License, or
|
||||
* (at your option) any later version.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU General Public License for more details.
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License
|
||||
* along with this program; if not, write to the Free Software
|
||||
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||||
*/
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <ctype.h>
|
||||
#include <unistd.h>
|
||||
|
||||
#include "sha256.h"
|
||||
|
||||
static void ProcessBlock(SHA256Context *sha, const unsigned char *block) {
|
||||
u_int32_t W[64];
|
||||
u_int32_t a, b, c, d, e, f, g, h;
|
||||
u_int32_t temp, temp2;
|
||||
int t;
|
||||
|
||||
for(t = 0; t < 16; ++t) {
|
||||
W[t] = (((u_int32_t) (block[t * 4 + 0])) << 24) | (((u_int32_t) (block[t * 4 + 1])) << 16) | (((u_int32_t) (block[t * 4 + 2])) << 8) | ((u_int32_t) (block[t * 4 + 3]));
|
||||
}
|
||||
for(t = 16; t < 64; ++t) {
|
||||
W[t] = TRUNCLONG(RHO1(W[t - 2]) + W[t - 7] + RHO0(W[t - 15]) + W[t - 16]);
|
||||
}
|
||||
a = sha->A;
|
||||
b = sha->B;
|
||||
c = sha->C;
|
||||
d = sha->D;
|
||||
e = sha->E;
|
||||
f = sha->F;
|
||||
g = sha->G;
|
||||
h = sha->H;
|
||||
for(t = 0; t < 64; ++t) {
|
||||
temp = TRUNCLONG(h + SUM1(e) + CH(e, f, g) + K[t] + W[t]);
|
||||
temp2 = TRUNCLONG(SUM0(a) + MAJ(a, b, c));
|
||||
h = g;
|
||||
g = f;
|
||||
f = e;
|
||||
e = TRUNCLONG(d + temp);
|
||||
d = c;
|
||||
c = b;
|
||||
b = a;
|
||||
a = TRUNCLONG(temp + temp2);
|
||||
}
|
||||
sha->A = TRUNCLONG(sha->A + a);
|
||||
sha->B = TRUNCLONG(sha->B + b);
|
||||
sha->C = TRUNCLONG(sha->C + c);
|
||||
sha->D = TRUNCLONG(sha->D + d);
|
||||
sha->E = TRUNCLONG(sha->E + e);
|
||||
sha->F = TRUNCLONG(sha->F + f);
|
||||
sha->G = TRUNCLONG(sha->G + g);
|
||||
sha->H = TRUNCLONG(sha->H + h);
|
||||
DoMemZero(W, sizeof(u_int32_t) * 64);
|
||||
a = b = c = d = e = f = g = h = temp = temp2 = 0;
|
||||
}
|
||||
|
||||
void SHA256Data(SHA256Context *sha, const void *buffer, unsigned long len) {
|
||||
unsigned long templen;
|
||||
|
||||
sha->totalLen += (u_int64_t)len;
|
||||
while(len > 0) {
|
||||
if(!(sha->inputLen) && len >= 64) {
|
||||
ProcessBlock(sha, (const unsigned char *) buffer);
|
||||
buffer = (const void *) (((const unsigned char *) buffer) + 64);
|
||||
len -= 64;
|
||||
} else {
|
||||
templen = len;
|
||||
if(templen > (64 - sha->inputLen)) {
|
||||
templen = 64 - sha->inputLen;
|
||||
}
|
||||
memcpy(sha->input + sha->inputLen, buffer, templen);
|
||||
if((sha->inputLen += templen) >= 64) {
|
||||
ProcessBlock(sha, sha->input);
|
||||
sha->inputLen = 0;
|
||||
}
|
||||
buffer = (const void *) (((const unsigned char *) buffer) + templen);
|
||||
len -= templen;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
void SHA256Finalize(SHA256Context *sha, unsigned char hash[SHA256_HASH_SIZE]) {
|
||||
u_int64_t totalBits;
|
||||
|
||||
if(hash) {
|
||||
if(sha->inputLen >= 56) {
|
||||
sha->input[(sha->inputLen)++] = (unsigned char) 0x80;
|
||||
while(sha->inputLen < 64) {
|
||||
sha->input[(sha->inputLen)++] = (unsigned char) 0x00;
|
||||
}
|
||||
ProcessBlock(sha, sha->input);
|
||||
sha->inputLen = 0;
|
||||
} else {
|
||||
sha->input[(sha->inputLen)++] = (unsigned char) 0x80;
|
||||
}
|
||||
while(sha->inputLen < 56) {
|
||||
sha->input[(sha->inputLen)++] = (unsigned char) 0x00;
|
||||
}
|
||||
totalBits = (sha->totalLen << 3);
|
||||
WriteLong(sha->input + 56, (u_int32_t) (totalBits >> 32));
|
||||
WriteLong(sha->input + 60, (u_int32_t) totalBits);
|
||||
ProcessBlock(sha, sha->input);
|
||||
WriteLong(hash, sha->A);
|
||||
WriteLong(hash + 4, sha->B);
|
||||
WriteLong(hash + 8, sha->C);
|
||||
WriteLong(hash + 12, sha->D);
|
||||
WriteLong(hash + 16, sha->E);
|
||||
WriteLong(hash + 20, sha->F);
|
||||
WriteLong(hash + 24, sha->G);
|
||||
WriteLong(hash + 28, sha->H);
|
||||
}
|
||||
DoMemZero(sha, sizeof(SHA256Context));
|
||||
}
|
||||
|
||||
void SHA256Init(SHA256Context *sha) {
|
||||
sha->inputLen = 0;
|
||||
sha->A = 0x6a09e667;
|
||||
sha->B = 0xbb67ae85;
|
||||
sha->C = 0x3c6ef372;
|
||||
sha->D = 0xa54ff53a;
|
||||
sha->E = 0x510e527f;
|
||||
sha->F = 0x9b05688c;
|
||||
sha->G = 0x1f83d9ab;
|
||||
sha->H = 0x5be0cd19;
|
||||
sha->totalLen = 0;
|
||||
}
|
||||
|
||||
static void WriteLong(unsigned char *buf, u_int32_t value) {
|
||||
buf[0] = (unsigned char)(value >> 24);
|
||||
buf[1] = (unsigned char)(value >> 16);
|
||||
buf[2] = (unsigned char)(value >> 8);
|
||||
buf[3] = (unsigned char)value;
|
||||
}
|
||||
|
||||
unsigned char* get_sha256_hash(const char* unhashed) {
|
||||
SHA256Context sha;
|
||||
unsigned char* hash = (unsigned char*) malloc(32);
|
||||
|
||||
SHA256Init(&sha);
|
||||
SHA256Data(&sha, unhashed, strlen(unhashed));
|
||||
SHA256Finalize(&sha, hash);
|
||||
return hash;
|
||||
}
|
||||
|
||||
char* get_sha256_hash_hex_str(const char* unhashed) {
|
||||
unsigned char* hashed = get_sha256_hash(unhashed);
|
||||
char* hashed_hex = (char*) malloc(65);
|
||||
char next_hex[3];
|
||||
int index =0;
|
||||
|
||||
hashed_hex[0] = '\0';
|
||||
for(index=0; index < 32; index++) {
|
||||
sprintf(next_hex, "%02X", hashed[index]);
|
||||
strcat(hashed_hex, next_hex);
|
||||
}
|
||||
free(hashed);
|
||||
return hashed_hex;
|
||||
}
|
59
sha256.h
Normal file
59
sha256.h
Normal file
@ -0,0 +1,59 @@
|
||||
#ifndef __SHA256_H
|
||||
#define __SHA256_H
|
||||
|
||||
#define DoMemZero(dest,len) (memset((dest), 0, (len)))
|
||||
|
||||
#if SIZEOF_LONG > 4
|
||||
#define TRUNCLONG(x) ((x) & IL_MAX_UINT32)
|
||||
#define ROTATE(x,n) (TRUNCLONG(((x) >> (n))) | ((x) << (32 - (n))))
|
||||
#define SHIFT(x,n) (TRUNCLONG(((x) >> (n))))
|
||||
#else
|
||||
#define TRUNCLONG(x) (x)
|
||||
#define ROTATE(x,n) (((x) >> (n)) | ((x) << (32 - (n))))
|
||||
#define SHIFT(x,n) ((x) >> (n))
|
||||
#endif
|
||||
|
||||
#define CH(x,y,z) (((x) & (y)) ^ (TRUNCLONG(~(x)) & (z)))
|
||||
#define MAJ(x,y,z) (((x) & (y)) ^ ((x) & (z)) ^ ((y) & (z)))
|
||||
#define SUM0(x) (ROTATE((x), 2) ^ ROTATE((x), 13) ^ ROTATE((x), 22))
|
||||
#define SUM1(x) (ROTATE((x), 6) ^ ROTATE((x), 11) ^ ROTATE((x), 25))
|
||||
#define RHO0(x) (ROTATE((x), 7) ^ ROTATE((x), 18) ^ SHIFT((x), 3))
|
||||
#define RHO1(x) (ROTATE((x), 17) ^ ROTATE((x), 19) ^ SHIFT((x), 10))
|
||||
|
||||
#define SHA256_HASH_SIZE 32
|
||||
|
||||
typedef struct _tagSHA256Context {
|
||||
unsigned char input[64];
|
||||
u_int32_t inputLen;
|
||||
u_int32_t A, B, C, D, E, F, G, H;
|
||||
u_int64_t totalLen;
|
||||
} SHA256Context;
|
||||
|
||||
static u_int32_t const K[64] = {
|
||||
0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5,
|
||||
0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,
|
||||
0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,
|
||||
0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,
|
||||
0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc,
|
||||
0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
|
||||
0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7,
|
||||
0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,
|
||||
0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,
|
||||
0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,
|
||||
0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3,
|
||||
0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
|
||||
0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5,
|
||||
0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,
|
||||
0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,
|
||||
0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2
|
||||
};
|
||||
|
||||
static void ProcessBlock(SHA256Context *sha, const unsigned char *block);
|
||||
void SHA256Data(SHA256Context *sha, const void *buffer, unsigned long len);
|
||||
void SHA256Finalize(SHA256Context *sha, unsigned char hash[SHA256_HASH_SIZE]);
|
||||
void SHA256Init(SHA256Context *sha);
|
||||
static void WriteLong(unsigned char *buf, u_int32_t value);
|
||||
extern unsigned char* get_sha256_hash(const char* unhashed);
|
||||
extern char* get_sha256_hash_hex_str(const char* unhashed);
|
||||
|
||||
#endif
|
Loading…
Reference in New Issue
Block a user