blob: 6f85fc7923aee4425d8b56b1b9b2e39dd13ce7d6 [file] [log] [blame]
Junxiao Shid7631272016-08-17 04:16:31 +00001/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
Davide Pesaventod96744d2018-02-03 19:16:07 -05002/*
3 * Copyright (c) 2014-2018, Regents of the University of California,
Junxiao Shid7631272016-08-17 04:16:31 +00004 * Arizona Board of Regents,
5 * Colorado State University,
6 * University Pierre & Marie Curie, Sorbonne University,
7 * Washington University in St. Louis,
8 * Beijing Institute of Technology,
9 * The University of Memphis.
10 *
11 * This file is part of NFD (Named Data Networking Forwarding Daemon).
12 * See AUTHORS.md for complete list of NFD authors and contributors.
13 *
14 * NFD is free software: you can redistribute it and/or modify it under the terms
15 * of the GNU General Public License as published by the Free Software Foundation,
16 * either version 3 of the License, or (at your option) any later version.
17 *
18 * NFD is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
19 * without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
20 * PURPOSE. See the GNU General Public License for more details.
21 *
22 * You should have received a copy of the GNU General Public License along with
23 * NFD, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
24 */
25
26#include "command-authenticator.hpp"
27#include "core/logger.hpp"
28
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000029#include <ndn-cxx/tag.hpp>
30#include <ndn-cxx/security/v2/certificate-fetcher-offline.hpp>
31#include <ndn-cxx/security/v2/certificate-request.hpp>
32#include <ndn-cxx/security/v2/validation-policy.hpp>
33#include <ndn-cxx/security/v2/validation-policy-accept-all.hpp>
34#include <ndn-cxx/security/v2/validation-policy-command-interest.hpp>
35#include <ndn-cxx/security/v2/validator.hpp>
Junxiao Shid7631272016-08-17 04:16:31 +000036#include <ndn-cxx/util/io.hpp>
37
38#include <boost/filesystem.hpp>
39
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000040namespace sec2 = ndn::security::v2;
41
Junxiao Shid7631272016-08-17 04:16:31 +000042namespace nfd {
43
44NFD_LOG_INIT("CommandAuthenticator");
45// INFO: configuration change, etc
46// DEBUG: per authentication request result
47
Junxiao Shidbb6b3e2017-07-03 12:42:07 +000048/** \brief an Interest tag to indicate command signer
49 */
50using SignerTag = ndn::SimpleTag<Name, 20>;
51
52/** \brief obtain signer from SignerTag attached to Interest, if available
53 */
54static ndn::optional<std::string>
55getSignerFromTag(const Interest& interest)
56{
57 shared_ptr<SignerTag> signerTag = interest.getTag<SignerTag>();
58 if (signerTag == nullptr) {
59 return ndn::nullopt;
60 }
61 else {
62 return signerTag->get().toUri();
63 }
64}
65
66/** \brief a validation policy that only permits Interest signed by a trust anchor
67 */
68class CommandAuthenticatorValidationPolicy : public sec2::ValidationPolicy
69{
70public:
71 void
72 checkPolicy(const Interest& interest, const shared_ptr<sec2::ValidationState>& state,
73 const ValidationContinuation& continueValidation) final
74 {
75 Name klName = getKeyLocatorName(interest, *state);
76 if (!state->getOutcome()) { // already failed
77 return;
78 }
79
80 // SignerTag must be placed on the 'original Interest' in ValidationState to be available for
81 // InterestValidationSuccessCallback. The 'interest' parameter refers to a different instance
82 // which is copied into 'original Interest'.
83 auto state1 = dynamic_pointer_cast<sec2::InterestValidationState>(state);
84 state1->getOriginalInterest().setTag(make_shared<SignerTag>(klName));
85
86 continueValidation(make_shared<sec2::CertificateRequest>(Interest(klName)), state);
87 }
88
89 void
90 checkPolicy(const Data& data, const shared_ptr<sec2::ValidationState>& state,
91 const ValidationContinuation& continueValidation) final
92 {
93 // Non-certificate Data are not handled by CommandAuthenticator.
94 // Non-anchor certificates cannot be retrieved by offline fetcher.
95 BOOST_ASSERT_MSG(false, "Data should not be passed to this policy");
96 }
97};
98
Junxiao Shid7631272016-08-17 04:16:31 +000099shared_ptr<CommandAuthenticator>
100CommandAuthenticator::create()
101{
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000102 return shared_ptr<CommandAuthenticator>(new CommandAuthenticator);
Junxiao Shid7631272016-08-17 04:16:31 +0000103}
104
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000105CommandAuthenticator::CommandAuthenticator() = default;
Junxiao Shid7631272016-08-17 04:16:31 +0000106
107void
108CommandAuthenticator::setConfigFile(ConfigFile& configFile)
109{
110 configFile.addSectionHandler("authorizations",
111 bind(&CommandAuthenticator::processConfig, this, _1, _2, _3));
112}
113
114void
115CommandAuthenticator::processConfig(const ConfigSection& section, bool isDryRun, const std::string& filename)
116{
117 if (!isDryRun) {
118 NFD_LOG_INFO("clear-authorizations");
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000119 for (auto& kv : m_validators) {
120 kv.second = make_shared<sec2::Validator>(
121 make_unique<sec2::ValidationPolicyCommandInterest>(make_unique<CommandAuthenticatorValidationPolicy>()),
122 make_unique<sec2::CertificateFetcherOffline>());
Junxiao Shid7631272016-08-17 04:16:31 +0000123 }
124 }
125
126 if (section.empty()) {
127 BOOST_THROW_EXCEPTION(ConfigFile::Error("'authorize' is missing under 'authorizations'"));
128 }
129
130 int authSectionIndex = 0;
131 for (const auto& kv : section) {
132 if (kv.first != "authorize") {
133 BOOST_THROW_EXCEPTION(ConfigFile::Error(
134 "'" + kv.first + "' section is not permitted under 'authorizations'"));
135 }
136 const ConfigSection& authSection = kv.second;
137
138 std::string certfile;
139 try {
140 certfile = authSection.get<std::string>("certfile");
141 }
142 catch (const boost::property_tree::ptree_error&) {
143 BOOST_THROW_EXCEPTION(ConfigFile::Error(
144 "'certfile' is missing under authorize[" + to_string(authSectionIndex) + "]"));
145 }
146
147 bool isAny = false;
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000148 shared_ptr<sec2::Certificate> cert;
Junxiao Shid7631272016-08-17 04:16:31 +0000149 if (certfile == "any") {
150 isAny = true;
151 NFD_LOG_WARN("'certfile any' is intended for demo purposes only and "
152 "SHOULD NOT be used in production environments");
153 }
154 else {
155 using namespace boost::filesystem;
156 path certfilePath = absolute(certfile, path(filename).parent_path());
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000157 cert = ndn::io::load<sec2::Certificate>(certfilePath.string());
Junxiao Shid7631272016-08-17 04:16:31 +0000158 if (cert == nullptr) {
159 BOOST_THROW_EXCEPTION(ConfigFile::Error(
160 "cannot load certfile " + certfilePath.string() +
161 " for authorize[" + to_string(authSectionIndex) + "]"));
162 }
163 }
164
165 const ConfigSection* privSection = nullptr;
166 try {
167 privSection = &authSection.get_child("privileges");
168 }
169 catch (const boost::property_tree::ptree_error&) {
170 BOOST_THROW_EXCEPTION(ConfigFile::Error(
171 "'privileges' is missing under authorize[" + to_string(authSectionIndex) + "]"));
172 }
173
174 if (privSection->empty()) {
175 NFD_LOG_WARN("No privileges granted to certificate " << certfile);
176 }
177 for (const auto& kv : *privSection) {
178 const std::string& module = kv.first;
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000179 auto found = m_validators.find(module);
180 if (found == m_validators.end()) {
Junxiao Shid7631272016-08-17 04:16:31 +0000181 BOOST_THROW_EXCEPTION(ConfigFile::Error(
182 "unknown module '" + module + "' under authorize[" + to_string(authSectionIndex) + "]"));
183 }
184
185 if (isDryRun) {
186 continue;
187 }
188
189 if (isAny) {
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000190 found->second = make_shared<sec2::Validator>(make_unique<sec2::ValidationPolicyAcceptAll>(),
191 make_unique<sec2::CertificateFetcherOffline>());
Junxiao Shid7631272016-08-17 04:16:31 +0000192 NFD_LOG_INFO("authorize module=" << module << " signer=any");
193 }
194 else {
Junxiao Shi16a3adf2017-05-26 17:38:51 +0000195 const Name& keyName = cert->getKeyName();
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000196 sec2::Certificate certCopy = *cert;
197 found->second->loadAnchor(certfile, std::move(certCopy));
Junxiao Shid7631272016-08-17 04:16:31 +0000198 NFD_LOG_INFO("authorize module=" << module << " signer=" << keyName <<
199 " certfile=" << certfile);
200 }
201 }
202
203 ++authSectionIndex;
204 }
205}
206
207ndn::mgmt::Authorization
208CommandAuthenticator::makeAuthorization(const std::string& module, const std::string& verb)
209{
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000210 m_validators[module]; // declares module, so that privilege is recognized
Junxiao Shid7631272016-08-17 04:16:31 +0000211
212 auto self = this->shared_from_this();
Davide Pesaventod96744d2018-02-03 19:16:07 -0500213 return [=] (const Name&, const Interest& interest,
214 const ndn::mgmt::ControlParameters*,
Junxiao Shid7631272016-08-17 04:16:31 +0000215 const ndn::mgmt::AcceptContinuation& accept,
216 const ndn::mgmt::RejectContinuation& reject) {
Davide Pesaventod96744d2018-02-03 19:16:07 -0500217 auto validator = self->m_validators.at(module);
218 auto successCb = [accept, validator] (const Interest& interest1) {
219 auto signer1 = getSignerFromTag(interest1);
220 BOOST_ASSERT(signer1 || // signer must be available unless 'certfile any'
221 dynamic_cast<sec2::ValidationPolicyAcceptAll*>(&validator->getPolicy()) != nullptr);
222 std::string signer = signer1.value_or("*");
223 NFD_LOG_DEBUG("accept " << interest1.getName() << " signer=" << signer);
224 accept(signer);
225 };
226 auto failureCb = [reject] (const Interest& interest1, const sec2::ValidationError& err) {
227 using ndn::mgmt::RejectReply;
228 RejectReply reply = RejectReply::STATUS403;
229 switch (err.getCode()) {
230 case sec2::ValidationError::NO_SIGNATURE:
231 case sec2::ValidationError::INVALID_KEY_LOCATOR:
232 reply = RejectReply::SILENT;
233 break;
234 case sec2::ValidationError::POLICY_ERROR:
235 if (interest1.getName().size() < ndn::command_interest::MIN_SIZE) { // "name too short"
236 reply = RejectReply::SILENT;
Junxiao Shidbb6b3e2017-07-03 12:42:07 +0000237 }
Davide Pesaventod96744d2018-02-03 19:16:07 -0500238 break;
239 }
240 NFD_LOG_DEBUG("reject " << interest1.getName() << " signer=" <<
241 getSignerFromTag(interest1).value_or("?") << " reason=" << err);
242 reject(reply);
243 };
244
245 if (validator) {
246 validator->validate(interest, successCb, failureCb);
247 }
248 else {
249 NFD_LOG_DEBUG("reject " << interest.getName() << " signer=" <<
250 getSignerFromTag(interest).value_or("?") << " reason=Unauthorized");
251 reject(ndn::mgmt::RejectReply::STATUS403);
252 }
Junxiao Shid7631272016-08-17 04:16:31 +0000253 };
254}
255
Junxiao Shid7631272016-08-17 04:16:31 +0000256} // namespace nfd