Blob Blame History Raw
/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
/* tests/replay.c - test replay cache using libkrb5 functions */
/*
 * Copyright (C) 2019 by the Massachusetts Institute of Technology.
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 *
 * * Redistributions of source code must retain the above copyright
 *   notice, this list of conditions and the following disclaimer.
 *
 * * Redistributions in binary form must reproduce the above copyright
 *   notice, this list of conditions and the following disclaimer in
 *   the documentation and/or other materials provided with the
 *   distribution.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
 * COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 */

#include "k5-int.h"

int
main(int argc, char **argv)
{
    krb5_error_code ret;
    krb5_context ctx;
    krb5_auth_context c_authcon, s_authcon, s_authcon2;
    krb5_rcache rc;
    krb5_ccache cc;
    krb5_principal client, server;
    krb5_creds mcred, *cred, **tmpcreds;
    krb5_data der_apreq, der_krbsafe, der_krbpriv, *der_krbcred, tmpdata;
    krb5_address addr;
    struct in_addr inaddr;
    const char *server_name;

    assert(argc == 2);
    server_name = argv[1];

    /* Create client and server auth contexts.  (They will use a replay cache
     * by default.) */
    ret = krb5_init_context(&ctx);
    assert(ret == 0);
    ret = krb5_auth_con_init(ctx, &c_authcon);
    assert(ret == 0);
    ret = krb5_auth_con_init(ctx, &s_authcon);
    assert(ret == 0);

    /* Set dummy addresses for the auth contexts. */
    memset(&inaddr, 0, sizeof(inaddr));
    addr.addrtype = ADDRTYPE_INET;
    addr.length = sizeof(inaddr);
    addr.contents = (uint8_t *)&inaddr;
    ret = krb5_auth_con_setaddrs(ctx, c_authcon, &addr, &addr);
    assert(ret == 0);
    ret = krb5_auth_con_setaddrs(ctx, s_authcon, &addr, &addr);
    assert(ret == 0);

    /* Set up replay caches for the auth contexts. */
    tmpdata = string2data("testclient");
    ret = krb5_get_server_rcache(ctx, &tmpdata, &rc);
    assert(ret == 0);
    ret = krb5_auth_con_setrcache(ctx, c_authcon, rc);
    assert(ret == 0);
    tmpdata = string2data("testserver");
    ret = krb5_get_server_rcache(ctx, &tmpdata, &rc);
    assert(ret == 0);
    ret = krb5_auth_con_setrcache(ctx, s_authcon, rc);
    assert(ret == 0);

    /* Construct the client and server principal names. */
    ret = krb5_cc_default(ctx, &cc);
    assert(ret == 0);
    ret = krb5_cc_get_principal(ctx, cc, &client);
    assert(ret == 0);
    ret = krb5_parse_name(ctx, server_name, &server);
    assert(ret == 0);

    /* Get credentials for the client. */
    memset(&mcred, 0, sizeof(mcred));
    mcred.client = client;
    mcred.server = server;
    ret = krb5_get_credentials(ctx, 0, cc, &mcred, &cred);
    assert(ret == 0);

    /* Send an AP-REP to establish the sessions. */
    ret = krb5_mk_req_extended(ctx, &c_authcon, 0, NULL, cred, &der_apreq);
    assert(ret == 0);
    ret = krb5_rd_req(ctx, &s_authcon, &der_apreq, NULL, NULL, NULL, NULL);
    assert(ret == 0);

    /* Set up another server auth context with the same rcache name and replay
     * the AP-REQ. */
    ret = krb5_auth_con_init(ctx, &s_authcon2);
    assert(ret == 0);
    tmpdata = string2data("testserver");
    ret = krb5_get_server_rcache(ctx, &tmpdata, &rc);
    assert(ret == 0);
    ret = krb5_auth_con_setrcache(ctx, s_authcon2, rc);
    assert(ret == 0);
    ret = krb5_rd_req(ctx, &s_authcon2, &der_apreq, NULL, NULL, NULL, NULL);
    assert(ret == KRB5KRB_AP_ERR_REPEAT);
    krb5_auth_con_free(ctx, s_authcon2);

    /* Make a KRB-SAFE message with the client auth context. */
    tmpdata = string2data("safemsg");
    ret = krb5_mk_safe(ctx, c_authcon, &tmpdata, &der_krbsafe, NULL);
    assert(ret == 0);
    /* Play it back to the client to detect a reflection. */
    ret = krb5_rd_safe(ctx, c_authcon, &der_krbsafe, &tmpdata, NULL);
    assert(ret == KRB5KRB_AP_ERR_REPEAT);
    /* Send it to the server auth context twice, to detect a replay. */
    ret = krb5_rd_safe(ctx, s_authcon, &der_krbsafe, &tmpdata, NULL);
    assert(ret == 0);
    krb5_free_data_contents(ctx, &tmpdata);
    ret = krb5_rd_safe(ctx, s_authcon, &der_krbsafe, &tmpdata, NULL);
    assert(ret == KRB5KRB_AP_ERR_REPEAT);

    /* Make a KRB-PRIV message with the client auth context. */
    tmpdata = string2data("safemsg");
    ret = krb5_mk_priv(ctx, c_authcon, &tmpdata, &der_krbpriv, NULL);
    assert(ret == 0);
    /* Play it back to the client to detect a reflection. */
    ret = krb5_rd_priv(ctx, c_authcon, &der_krbpriv, &tmpdata, NULL);
    assert(ret == KRB5KRB_AP_ERR_REPEAT);
    /* Send it to the server auth context twice, to detect a replay. */
    ret = krb5_rd_priv(ctx, s_authcon, &der_krbpriv, &tmpdata, NULL);
    assert(ret == 0);
    krb5_free_data_contents(ctx, &tmpdata);
    ret = krb5_rd_priv(ctx, s_authcon, &der_krbpriv, &tmpdata, NULL);
    assert(ret == KRB5KRB_AP_ERR_REPEAT);

    /* Make a KRB-CRED message with the client auth context. */
    tmpdata = string2data("safemsg");
    ret = krb5_mk_1cred(ctx, c_authcon, cred, &der_krbcred, NULL);
    assert(ret == 0);
    /* Play it back to the client to detect a reflection. */
    ret = krb5_rd_cred(ctx, c_authcon, der_krbcred, &tmpcreds, NULL);
    assert(ret == KRB5KRB_AP_ERR_REPEAT);
    /* Send it to the server auth context twice, to detect a replay. */
    ret = krb5_rd_cred(ctx, s_authcon, der_krbcred, &tmpcreds, NULL);
    assert(ret == 0);
    krb5_free_tgt_creds(ctx, tmpcreds);
    ret = krb5_rd_cred(ctx, s_authcon, der_krbcred, &tmpcreds, NULL);
    assert(ret == KRB5KRB_AP_ERR_REPEAT);

    krb5_free_data_contents(ctx, &der_apreq);
    krb5_free_data_contents(ctx, &der_krbsafe);
    krb5_free_data_contents(ctx, &der_krbpriv);
    krb5_free_data(ctx, der_krbcred);
    krb5_free_creds(ctx, cred);
    krb5_cc_close(ctx, cc);
    krb5_free_principal(ctx, client);
    krb5_free_principal(ctx, server);
    krb5_auth_con_free(ctx, c_authcon);
    krb5_auth_con_free(ctx, s_authcon);
    krb5_free_context(ctx);
    return 0;
}