blob: 1f1b03621108a3f223f6df9ff1f9b06a22de6f56 [file] [log] [blame]
Junxiao Shid7631272016-08-17 04:16:31 +00001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
Davide Pesaventod96744d2018-02-03 19:16:07 -05002/*
Davide Pesavento2c9d2ca2024-01-27 16:36:51 -05003 * Copyright (c) 2014-2024, Regents of the University of California,
Junxiao Shid7631272016-08-17 04:16:31 +00004 * Arizona Board of Regents,
5 * Colorado State University,
6 * University Pierre & Marie Curie, Sorbonne University,
7 * Washington University in St. Louis,
8 * Beijing Institute of Technology,
9 * The University of Memphis.
10 *
11 * This file is part of NFD (Named Data Networking Forwarding Daemon).
12 * See AUTHORS.md for complete list of NFD authors and contributors.
13 *
14 * NFD is free software: you can redistribute it and/or modify it under the terms
15 * of the GNU General Public License as published by the Free Software Foundation,
16 * either version 3 of the License, or (at your option) any later version.
17 *
18 * NFD is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
19 * without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
20 * PURPOSE. See the GNU General Public License for more details.
21 *
22 * You should have received a copy of the GNU General Public License along with
23 * NFD, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
24 */
25
26#include "command-authenticator.hpp"
Davide Pesavento2cae8ca2019-04-18 20:48:05 -040027#include "common/logger.hpp"
Junxiao Shid7631272016-08-17 04:16:31 +000028
Alexander Afanasyeva1583702020-06-03 13:55:45 -040029#include <ndn-cxx/security/certificate-fetcher-offline.hpp>
30#include <ndn-cxx/security/certificate-request.hpp>
31#include <ndn-cxx/security/validation-policy.hpp>
32#include <ndn-cxx/security/validation-policy-accept-all.hpp>
33#include <ndn-cxx/security/validation-policy-command-interest.hpp>
Davide Pesavento152874a2024-02-20 22:07:07 -050034#include <ndn-cxx/tag.hpp>
Junxiao Shid7631272016-08-17 04:16:31 +000035#include <ndn-cxx/util/io.hpp>
36
Davide Pesavento152874a2024-02-20 22:07:07 -050037#include <boost/filesystem/operations.hpp>
38#include <boost/filesystem/path.hpp>
Junxiao Shid7631272016-08-17 04:16:31 +000039
Alexander Afanasyeva1583702020-06-03 13:55:45 -040040namespace security = ndn::security;
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000041
Junxiao Shid7631272016-08-17 04:16:31 +000042namespace nfd {
43
Davide Pesaventoa3148082018-04-12 18:21:54 -040044NFD_LOG_INIT(CommandAuthenticator);
Junxiao Shid7631272016-08-17 04:16:31 +000045// INFO: configuration change, etc
46// DEBUG: per authentication request result
47
Davide Pesaventob83d3df2022-09-13 14:04:34 -040048/**
49 * \brief An Interest tag to store the command signer.
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000050 */
51using SignerTag = ndn::SimpleTag<Name, 20>;
52
Davide Pesaventob83d3df2022-09-13 14:04:34 -040053/**
54 * \brief Obtain signer from a SignerTag attached to \p interest, if available.
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000055 */
Davide Pesaventob7bfcb92022-05-22 23:55:23 -040056static std::optional<std::string>
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000057getSignerFromTag(const Interest& interest)
58{
Davide Pesaventob7bfcb92022-05-22 23:55:23 -040059 auto signerTag = interest.getTag<SignerTag>();
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000060 if (signerTag == nullptr) {
Davide Pesaventob7bfcb92022-05-22 23:55:23 -040061 return std::nullopt;
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000062 }
63 else {
64 return signerTag->get().toUri();
65 }
66}
67
Davide Pesaventob83d3df2022-09-13 14:04:34 -040068/**
69 * \brief A validation policy that only permits Interests signed by a trust anchor.
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000070 */
Davide Pesavento3db98072021-03-09 23:03:27 -050071class CommandAuthenticatorValidationPolicy final : public security::ValidationPolicy
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000072{
73public:
74 void
Alexander Afanasyeva1583702020-06-03 13:55:45 -040075 checkPolicy(const Interest& interest, const shared_ptr<security::ValidationState>& state,
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000076 const ValidationContinuation& continueValidation) final
77 {
Davide Pesaventob83d3df2022-09-13 14:04:34 -040078 auto sigInfo = getSignatureInfo(interest, *state);
79 if (!state->getOutcome()) { // already failed
80 return;
81 }
82 Name klName = getKeyLocatorName(sigInfo, *state);
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000083 if (!state->getOutcome()) { // already failed
84 return;
85 }
86
87 // SignerTag must be placed on the 'original Interest' in ValidationState to be available for
88 // InterestValidationSuccessCallback. The 'interest' parameter refers to a different instance
89 // which is copied into 'original Interest'.
Davide Pesavento2c9d2ca2024-01-27 16:36:51 -050090 auto state1 = std::dynamic_pointer_cast<security::InterestValidationState>(state);
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000091 state1->getOriginalInterest().setTag(make_shared<SignerTag>(klName));
92
Davide Pesavento22085362021-03-18 22:08:03 -040093 continueValidation(make_shared<security::CertificateRequest>(klName), state);
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000094 }
95
96 void
Davide Pesavento3db98072021-03-09 23:03:27 -050097 checkPolicy(const Data&, const shared_ptr<security::ValidationState>&,
98 const ValidationContinuation&) final
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000099 {
100 // Non-certificate Data are not handled by CommandAuthenticator.
101 // Non-anchor certificates cannot be retrieved by offline fetcher.
102 BOOST_ASSERT_MSG(false, "Data should not be passed to this policy");
103 }
104};
105
Junxiao Shid7631272016-08-17 04:16:31 +0000106shared_ptr<CommandAuthenticator>
107CommandAuthenticator::create()
108{
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000109 return shared_ptr<CommandAuthenticator>(new CommandAuthenticator);
Junxiao Shid7631272016-08-17 04:16:31 +0000110}
111
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000112CommandAuthenticator::CommandAuthenticator() = default;
Junxiao Shid7631272016-08-17 04:16:31 +0000113
114void
115CommandAuthenticator::setConfigFile(ConfigFile& configFile)
116{
Davide Pesavento412c9822021-07-02 00:21:05 -0400117 configFile.addSectionHandler("authorizations", [this] (auto&&... args) {
118 processConfig(std::forward<decltype(args)>(args)...);
119 });
Junxiao Shid7631272016-08-17 04:16:31 +0000120}
121
122void
123CommandAuthenticator::processConfig(const ConfigSection& section, bool isDryRun, const std::string& filename)
124{
125 if (!isDryRun) {
Davide Pesavento22085362021-03-18 22:08:03 -0400126 NFD_LOG_DEBUG("resetting authorizations");
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000127 for (auto& kv : m_validators) {
Alexander Afanasyeva1583702020-06-03 13:55:45 -0400128 kv.second = make_shared<security::Validator>(
129 make_unique<security::ValidationPolicyCommandInterest>(make_unique<CommandAuthenticatorValidationPolicy>()),
130 make_unique<security::CertificateFetcherOffline>());
Junxiao Shid7631272016-08-17 04:16:31 +0000131 }
132 }
133
134 if (section.empty()) {
Davide Pesavento19779d82019-02-14 13:40:04 -0500135 NDN_THROW(ConfigFile::Error("'authorize' is missing under 'authorizations'"));
Junxiao Shid7631272016-08-17 04:16:31 +0000136 }
137
138 int authSectionIndex = 0;
Davide Pesavento20cafa82022-07-25 01:15:03 -0400139 for (const auto& [sectionName, authSection] : section) {
140 if (sectionName != "authorize") {
141 NDN_THROW(ConfigFile::Error("'" + sectionName + "' section is not permitted under 'authorizations'"));
Junxiao Shid7631272016-08-17 04:16:31 +0000142 }
Junxiao Shid7631272016-08-17 04:16:31 +0000143
144 std::string certfile;
145 try {
146 certfile = authSection.get<std::string>("certfile");
147 }
148 catch (const boost::property_tree::ptree_error&) {
Davide Pesavento19779d82019-02-14 13:40:04 -0500149 NDN_THROW(ConfigFile::Error("'certfile' is missing under authorize[" +
Davide Pesavento2c9d2ca2024-01-27 16:36:51 -0500150 std::to_string(authSectionIndex) + "]"));
Junxiao Shid7631272016-08-17 04:16:31 +0000151 }
152
153 bool isAny = false;
Alexander Afanasyeva1583702020-06-03 13:55:45 -0400154 shared_ptr<security::Certificate> cert;
Junxiao Shid7631272016-08-17 04:16:31 +0000155 if (certfile == "any") {
156 isAny = true;
157 NFD_LOG_WARN("'certfile any' is intended for demo purposes only and "
158 "SHOULD NOT be used in production environments");
159 }
160 else {
161 using namespace boost::filesystem;
162 path certfilePath = absolute(certfile, path(filename).parent_path());
Alexander Afanasyeva1583702020-06-03 13:55:45 -0400163 cert = ndn::io::load<security::Certificate>(certfilePath.string());
Junxiao Shid7631272016-08-17 04:16:31 +0000164 if (cert == nullptr) {
Davide Pesavento19779d82019-02-14 13:40:04 -0500165 NDN_THROW(ConfigFile::Error("cannot load certfile " + certfilePath.string() +
Davide Pesavento2c9d2ca2024-01-27 16:36:51 -0500166 " for authorize[" + std::to_string(authSectionIndex) + "]"));
Junxiao Shid7631272016-08-17 04:16:31 +0000167 }
168 }
169
170 const ConfigSection* privSection = nullptr;
171 try {
172 privSection = &authSection.get_child("privileges");
173 }
174 catch (const boost::property_tree::ptree_error&) {
Davide Pesavento19779d82019-02-14 13:40:04 -0500175 NDN_THROW(ConfigFile::Error("'privileges' is missing under authorize[" +
Davide Pesavento2c9d2ca2024-01-27 16:36:51 -0500176 std::to_string(authSectionIndex) + "]"));
Junxiao Shid7631272016-08-17 04:16:31 +0000177 }
178
179 if (privSection->empty()) {
180 NFD_LOG_WARN("No privileges granted to certificate " << certfile);
181 }
182 for (const auto& kv : *privSection) {
183 const std::string& module = kv.first;
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000184 auto found = m_validators.find(module);
185 if (found == m_validators.end()) {
Davide Pesavento19779d82019-02-14 13:40:04 -0500186 NDN_THROW(ConfigFile::Error("unknown module '" + module +
Davide Pesavento2c9d2ca2024-01-27 16:36:51 -0500187 "' under authorize[" + std::to_string(authSectionIndex) + "]"));
Junxiao Shid7631272016-08-17 04:16:31 +0000188 }
189
190 if (isDryRun) {
191 continue;
192 }
193
194 if (isAny) {
Alexander Afanasyeva1583702020-06-03 13:55:45 -0400195 found->second = make_shared<security::Validator>(make_unique<security::ValidationPolicyAcceptAll>(),
196 make_unique<security::CertificateFetcherOffline>());
Junxiao Shid7631272016-08-17 04:16:31 +0000197 NFD_LOG_INFO("authorize module=" << module << " signer=any");
198 }
199 else {
Junxiao Shi16a3adf2017-05-26 17:38:51 +0000200 const Name& keyName = cert->getKeyName();
Alexander Afanasyeva1583702020-06-03 13:55:45 -0400201 security::Certificate certCopy = *cert;
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000202 found->second->loadAnchor(certfile, std::move(certCopy));
Davide Pesavento19779d82019-02-14 13:40:04 -0500203 NFD_LOG_INFO("authorize module=" << module << " signer=" << keyName << " certfile=" << certfile);
Junxiao Shid7631272016-08-17 04:16:31 +0000204 }
205 }
206
207 ++authSectionIndex;
208 }
209}
210
211ndn::mgmt::Authorization
212CommandAuthenticator::makeAuthorization(const std::string& module, const std::string& verb)
213{
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000214 m_validators[module]; // declares module, so that privilege is recognized
Junxiao Shid7631272016-08-17 04:16:31 +0000215
Davide Pesaventob83d3df2022-09-13 14:04:34 -0400216 return [module, self = shared_from_this()] (const Name&, const Interest& interest,
217 const ndn::mgmt::ControlParameters*,
218 const ndn::mgmt::AcceptContinuation& accept,
219 const ndn::mgmt::RejectContinuation& reject) {
Davide Pesaventod96744d2018-02-03 19:16:07 -0500220 auto validator = self->m_validators.at(module);
Davide Pesavento22085362021-03-18 22:08:03 -0400221
Davide Pesaventod96744d2018-02-03 19:16:07 -0500222 auto successCb = [accept, validator] (const Interest& interest1) {
223 auto signer1 = getSignerFromTag(interest1);
224 BOOST_ASSERT(signer1 || // signer must be available unless 'certfile any'
Alexander Afanasyeva1583702020-06-03 13:55:45 -0400225 dynamic_cast<security::ValidationPolicyAcceptAll*>(&validator->getPolicy()) != nullptr);
Davide Pesaventod96744d2018-02-03 19:16:07 -0500226 std::string signer = signer1.value_or("*");
227 NFD_LOG_DEBUG("accept " << interest1.getName() << " signer=" << signer);
228 accept(signer);
229 };
Davide Pesavento22085362021-03-18 22:08:03 -0400230
Davide Pesaventob83d3df2022-09-13 14:04:34 -0400231 using ndn::security::ValidationError;
232 auto failureCb = [reject] (const Interest& interest1, const ValidationError& err) {
233 auto reply = ndn::mgmt::RejectReply::STATUS403;
234 if (err.getCode() == ValidationError::MALFORMED_SIGNATURE ||
235 err.getCode() == ValidationError::INVALID_KEY_LOCATOR) {
236 // do not waste cycles signing and sending a reply if the command is clearly malformed
237 reply = ndn::mgmt::RejectReply::SILENT;
Davide Pesaventod96744d2018-02-03 19:16:07 -0500238 }
239 NFD_LOG_DEBUG("reject " << interest1.getName() << " signer=" <<
240 getSignerFromTag(interest1).value_or("?") << " reason=" << err);
241 reject(reply);
242 };
243
244 if (validator) {
245 validator->validate(interest, successCb, failureCb);
246 }
247 else {
248 NFD_LOG_DEBUG("reject " << interest.getName() << " signer=" <<
249 getSignerFromTag(interest).value_or("?") << " reason=Unauthorized");
250 reject(ndn::mgmt::RejectReply::STATUS403);
251 }
Junxiao Shid7631272016-08-17 04:16:31 +0000252 };
253}
254
Junxiao Shid7631272016-08-17 04:16:31 +0000255} // namespace nfd