/usr/lib/python2.7/dist-packages/epsilon/ampauth.py is in python-epsilon 0.7.1-1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 | # -*- test-case-name: epsilon.test.test_ampauth -*-
# Copyright (c) 2008 Divmod. See LICENSE for details.
"""
This module provides integration between L{AMP<twisted.protocols.amp.AMP>} and
L{cred<twisted.cred>}.
"""
from hashlib import sha1
from zope.interface import implements
from twisted.python.randbytes import secureRandom
from twisted.cred.error import UnauthorizedLogin
from twisted.cred.credentials import IUsernameHashedPassword, IUsernamePassword
from twisted.cred.checkers import ICredentialsChecker
from twisted.protocols.amp import IBoxReceiver, String, Command, AMP
from twisted.internet.protocol import ServerFactory
from epsilon.iepsilon import IOneTimePad
from epsilon.structlike import record
__metaclass__ = type
class UnhandledCredentials(Exception):
"""
L{login} was passed a credentials object which did not provide a recognized
credentials interface.
"""
class OTPLogin(Command):
"""
Command to initiate a login attempt where a one-time pad is to be used in
place of username/password credentials.
"""
arguments = [('pad', String())]
errors = {
# Invalid username or password
UnauthorizedLogin: 'UNAUTHORIZED_LOGIN',
# No IBoxReceiver avatar
NotImplementedError: 'NOT_IMPLEMENTED_ERROR'}
class PasswordLogin(Command):
"""
Command to initiate a username/password-based login attempt. The response
to this command is a challenge which must be responded to based on the
correct password associated with the username given to this command.
"""
arguments = [('username', String())]
response = [('challenge', String())]
def _calcResponse(challenge, nonce, password):
"""
Compute the response to the given challenge.
@type challenge: C{str}
@param challenge: An arbitrary byte string, probably received in response
to (or generated for) the L{PasswordLogin} command.
@type nonce: C{str}
@param nonce: An arbitrary byte string, generated by the client to include
in the hash to avoid making the client an oracle.
@type password: C{str}
@param password: The known correct password for the account being
authenticated.
@rtype: C{str}
@return: A hash constructed from the three parameters.
"""
return sha1('%s %s %s' % (challenge, nonce, password)).digest()
class PasswordChallengeResponse(Command):
"""
Command to respond to a challenge issued in the response to a
L{PasswordLogin} command and complete a username/password-based login
attempt.
@param cnonce: A randomly generated string used only in this response.
@param response: The SHA-1 hash of the challenge, cnonce, and password.
"""
arguments = [('cnonce', String()),
('response', String())]
errors = {
# Invalid username or password
UnauthorizedLogin: 'UNAUTHORIZED_LOGIN',
# No IBoxReceiver avatar
NotImplementedError: 'NOT_IMPLEMENTED_ERROR'}
@classmethod
def determineFrom(cls, challenge, password):
"""
Create a nonce and use it, along with the given challenge and password,
to generate the parameters for a response.
@return: A C{dict} suitable to be used as the keyword arguments when
calling this command.
"""
nonce = secureRandom(16)
response = _calcResponse(challenge, nonce, password)
return dict(cnonce=nonce, response=response)
class _AMPUsernamePassword(record('username challenge nonce response')):
"""
L{IUsernameHashedPassword} implementation used by L{PasswordLogin} and
related commands.
"""
implements(IUsernameHashedPassword)
def checkPassword(self, password):
"""
Check the given plaintext password against the response in this
credentials object.
@type password: C{str}
@param password: The known correct password associated with
C{self.username}.
@return: A C{bool}, C{True} if this credentials object agrees with the
given password, C{False} otherwise.
"""
if isinstance(password, unicode):
password = password.encode('utf-8')
correctResponse = _calcResponse(self.challenge, self.nonce, password)
return correctResponse == self.response
class _AMPOneTimePad(record('padValue')):
"""
L{IOneTimePad} implementation used by L{OTPLogin}.
@ivar padValue: The value of the one-time pad.
@type padValue: C{str}
"""
implements(IOneTimePad)
class CredReceiver(AMP):
"""
Integration between AMP and L{twisted.cred}.
This implementation is limited to a single authentication per connection.
A future implementation may use I{routes} to allow multiple authentications
over the same connection.
@ivar portal: The L{Portal} against which login will be performed. This is
expected to be set by the factory which creates instances of this
class.
@ivar logout: C{None} or a no-argument callable. This is set to the logout
object returned by L{Portal.login} and is set while an avatar is logged
in.
@ivar challenge: The C{str} which was sent as a challenge in response to
the L{PasswordLogin} command. If multiple L{PasswordLogin} commands
are sent, this is the challenge sent in response to the most recent of
them. It is not set before L{PasswordLogin} is received.
@ivar username: The C{str} which was received for the I{username} parameter
of the L{PasswordLogin} command. The lifetime is the same as that of
the I{challenge} attribute.
"""
portal = None
logout = None
@PasswordLogin.responder
def passwordLogin(self, username):
"""
Generate a new challenge for the given username.
"""
self.challenge = secureRandom(16)
self.username = username
return {'challenge': self.challenge}
def _login(self, credentials):
"""
Actually login to our portal with the given credentials.
"""
d = self.portal.login(credentials, None, IBoxReceiver)
def cbLoggedIn((interface, avatar, logout)):
self.logout = logout
self.boxReceiver = avatar
self.boxReceiver.startReceivingBoxes(self.boxSender)
return {}
d.addCallback(cbLoggedIn)
return d
@PasswordChallengeResponse.responder
def passwordChallengeResponse(self, cnonce, response):
"""
Verify the response to a challenge.
"""
return self._login(_AMPUsernamePassword(
self.username, self.challenge, cnonce, response))
@OTPLogin.responder
def otpLogin(self, pad):
"""
Verify the given pad.
"""
return self._login(_AMPOneTimePad(pad))
def connectionLost(self, reason):
"""
If a login has happened, perform a logout.
"""
AMP.connectionLost(self, reason)
if self.logout is not None:
self.logout()
self.boxReceiver = self.logout = None
class OneTimePadChecker(record('pads')):
"""
Checker which validates one-time pads.
@ivar pads: Mapping between valid one-time pads and avatar IDs.
@type pads: C{dict}
"""
implements(ICredentialsChecker)
credentialInterfaces = (IOneTimePad,)
# ICredentialsChecker
def requestAvatarId(self, credentials):
if credentials.padValue in self.pads:
return self.pads.pop(credentials.padValue)
raise UnauthorizedLogin('Unknown one-time pad')
class CredAMPServerFactory(ServerFactory):
"""
Server factory useful for creating L{CredReceiver} instances.
This factory takes care of associating a L{Portal} with L{CredReceiver}
instances it creates.
@ivar portal: The portal which will be used by L{CredReceiver} instances
created by this factory.
"""
protocol = CredReceiver
def __init__(self, portal):
self.portal = portal
def buildProtocol(self, addr):
proto = ServerFactory.buildProtocol(self, addr)
proto.portal = self.portal
return proto
def login(client, credentials):
"""
Authenticate using the given L{AMP} instance. The protocol must be
connected to a server with responders for L{PasswordLogin} and
L{PasswordChallengeResponse}.
@param client: A connected L{AMP} instance which will be used to issue
authentication commands.
@param credentials: An object providing L{IUsernamePassword} which will
be used to authenticate this connection to the server.
@return: A L{Deferred} which fires when authentication has succeeded or
which fails with L{UnauthorizedLogin} if the server rejects the
authentication attempt.
"""
if not IUsernamePassword.providedBy(credentials):
raise UnhandledCredentials()
d = client.callRemote(
PasswordLogin, username=credentials.username)
def cbChallenge(response):
args = PasswordChallengeResponse.determineFrom(
response['challenge'], credentials.password)
d = client.callRemote(PasswordChallengeResponse, **args)
return d.addCallback(lambda ignored: client)
d.addCallback(cbChallenge)
return d
__all__ = [
'UnhandledCredentials',
'OTPLogin', 'OneTimePadChecker',
'PasswordLogin', 'PasswordChallengeResponse', 'CredReceiver',
'CredAMPServerFactory', 'login']
|