You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

222 lines
6.4 KiB
Go

3 months ago
// Package digest provides a limited implementation of HTTP Digest
// Authentication, as defined in RFC 2617.
//
// Only the "auth" QOP directive is handled at this time, and while support for
// the SHA-256 algorithm is implemented here it does not actually work in
// either Chrome or Firefox.
//
// For more info, see:
// https://tools.ietf.org/html/rfc2617
// https://en.wikipedia.org/wiki/Digest_access_authentication
package digest
import (
"crypto/md5"
"crypto/sha256"
"crypto/subtle"
"fmt"
"math/rand"
"net/http"
"strings"
"time"
)
// digestAlgorithm is an algorithm used to hash digest payloads
type digestAlgorithm int
// Digest algorithms supported by this package
const (
MD5 digestAlgorithm = iota
SHA256
)
func (a digestAlgorithm) String() string {
switch a {
case MD5:
return "MD5"
case SHA256:
return "SHA-256"
}
return "UNKNOWN"
}
// Check returns a bool indicating whether the request is correctly
// authenticated for the given username and password.
func Check(req *http.Request, username, password string) bool {
auth := parseAuthorizationHeader(req.Header.Get("Authorization"))
if auth == nil || auth.username != username {
return false
}
expectedResponse := response(auth, password, req.Method, req.RequestURI)
return compare(auth.response, expectedResponse)
}
// Challenge returns a WWW-Authenticate header value for the given realm and
// algorithm. If an invalid realm or an unsupported algorithm is given
func Challenge(realm string, algorithm digestAlgorithm) string {
entropy := make([]byte, 32)
rand.Read(entropy)
opaqueVal := entropy[:16]
nonceVal := fmt.Sprintf("%s:%x", time.Now(), entropy[16:31])
// we use MD5 to hash nonces regardless of hash used for authentication
opaque := hash(opaqueVal, MD5)
nonce := hash([]byte(nonceVal), MD5)
return fmt.Sprintf("Digest qop=auth, realm=%#v, algorithm=%s, nonce=%s, opaque=%s", sanitizeRealm(realm), algorithm, nonce, opaque)
}
// sanitizeRealm tries to ensure that a given realm does not include any
// characters that will trip up our extremely simplistic header parser.
func sanitizeRealm(realm string) string {
realm = strings.Replace(realm, `"`, "", -1)
realm = strings.Replace(realm, ",", "", -1)
return realm
}
// authorization is the result of parsing an Authorization header
type authorization struct {
algorithm digestAlgorithm
cnonce string
nc string
nonce string
opaque string
qop string
realm string
response string
uri string
username string
}
// parseAuthorizationHeader parses an Authorization header into an
// Authorization struct, given a an authorization header like:
//
// Authorization: Digest username="Mufasa",
// realm="testrealm@host.com",
// nonce="dcd98b7102dd2f0e8b11d0f600bfb0c093",
// uri="/dir/index.html",
// qop=auth,
// nc=00000001,
// cnonce="0a4f113b",
// response="6629fae49393a05397450978507c4ef1",
// opaque="5ccc069c403ebaf9f0171e9517f40e41"
//
// If the given value does not contain a Digest authorization header, or is in
// some other way malformed, nil is returned.
//
// Example from Wikipedia: https://en.wikipedia.org/wiki/Digest_access_authentication#Example_with_explanation
func parseAuthorizationHeader(value string) *authorization {
if value == "" {
return nil
}
parts := strings.SplitN(value, " ", 2)
if parts[0] != "Digest" || len(parts) != 2 {
return nil
}
authInfo := parts[1]
auth := parseDictHeader(authInfo)
algo := MD5
if strings.ToLower(auth["algorithm"]) == "sha-256" {
algo = SHA256
}
return &authorization{
algorithm: algo,
cnonce: auth["cnonce"],
nc: auth["nc"],
nonce: auth["nonce"],
opaque: auth["opaque"],
qop: auth["qop"],
realm: auth["realm"],
response: auth["response"],
uri: auth["uri"],
username: auth["username"],
}
}
// parseDictHeader is a simplistic, buggy, and incomplete implementation of
// parsing key-value pairs from a header value into a map.
func parseDictHeader(value string) map[string]string {
pairs := strings.Split(value, ",")
res := make(map[string]string, len(pairs))
for _, pair := range pairs {
parts := strings.SplitN(strings.TrimSpace(pair), "=", 2)
key := strings.TrimSpace(parts[0])
if len(key) == 0 {
continue
}
val := ""
if len(parts) > 1 {
val = strings.TrimSpace(parts[1])
if strings.HasPrefix(val, `"`) && strings.HasSuffix(val, `"`) {
val = val[1 : len(val)-1]
}
}
res[key] = val
}
return res
}
// hash generates the hex digest of the given data using the given hashing
// algorithm, which must be one of MD5 or SHA256.
func hash(data []byte, algorithm digestAlgorithm) string {
switch algorithm {
case SHA256:
return fmt.Sprintf("%x", sha256.Sum256(data))
default:
return fmt.Sprintf("%x", md5.Sum(data))
}
}
// makeHA1 returns the HA1 hash, where
//
// HA1 = H(A1) = H(username:realm:password)
//
// and H is one of MD5 or SHA256.
func makeHA1(realm, username, password string, algorithm digestAlgorithm) string {
A1 := fmt.Sprintf("%s:%s:%s", username, realm, password)
return hash([]byte(A1), algorithm)
}
// makeHA2 returns the HA2 hash, where
//
// HA2 = H(A2) = H(method:digestURI)
//
// and H is one of MD5 or SHA256.
func makeHA2(auth *authorization, method, uri string) string {
A2 := fmt.Sprintf("%s:%s", method, uri)
return hash([]byte(A2), auth.algorithm)
}
// Response calculates the correct digest auth response. If the qop directive's
// value is "auth" or "auth-int" , then compute the response as
//
// RESPONSE = H(HA1:nonce:nonceCount:clientNonce:qop:HA2)
//
// and if the qop directive is unspecified, then compute the response as
//
// RESPONSE = H(HA1:nonce:HA2)
//
// where H is one of MD5 or SHA256.
func response(auth *authorization, password, method, uri string) string {
ha1 := makeHA1(auth.realm, auth.username, password, auth.algorithm)
ha2 := makeHA2(auth, method, uri)
var r string
if auth.qop == "auth" || auth.qop == "auth-int" {
r = fmt.Sprintf("%s:%s:%s:%s:%s:%s", ha1, auth.nonce, auth.nc, auth.cnonce, auth.qop, ha2)
} else {
r = fmt.Sprintf("%s:%s:%s", ha1, auth.nonce, ha2)
}
return hash([]byte(r), auth.algorithm)
}
// compare is a constant-time string comparison
func compare(x, y string) bool {
return subtle.ConstantTimeCompare([]byte(x), []byte(y)) == 1
}