Go to the documentation of this file.
58 #if defined(HAVE_DUP) && defined(HAVE_DUP2)
60 if ((fd = open(
"/dev/null", O_RDWR, 0)) != -1)
92 buf_printf(&hname,
"%s.%s", rnd_str, hostname);
97 #ifdef ENABLE_MANAGEMENT
103 const char *sc = NULL;
122 msg(
M_FATAL,
"ERROR: could not read %s username/password/ok/string from management interface", prefix);
160 if (strcmp(work,
"CRV1"))
170 for (cp = work; *cp !=
'\0'; ++cp)
212 const char *auth_file,
214 const unsigned int flags,
221 bool from_authfile = (auth_file && !
streq(auth_file,
"stdin"));
222 bool username_from_stdin =
false;
223 bool password_from_stdin =
false;
224 bool response_from_stdin =
true;
229 msg(
M_WARN,
"Note: previous '%s' credentials failed", prefix);
232 #ifdef ENABLE_MANAGEMENT
240 response_from_stdin =
false;
259 msg(
M_FATAL,
"ERROR: could not read %s ok-confirmation from stdin", prefix);
270 buf_set_read(&buf, (uint8_t *) auth_file, strlen(auth_file) + 1);
279 password_from_stdin = 1;
296 msg(
M_ERR,
"Error opening '%s' auth file: %s", prefix, auth_file);
304 msg(
M_FATAL,
"Error reading username from %s authfile: %s",
318 msg(
M_FATAL,
"Error reading password from %s authfile: %s", prefix, auth_file);
329 #if defined(ENABLE_MANAGEMENT)
334 msg(
D_LOW,
"No password found in %s authfile '%s'. Querying the management interface", prefix, auth_file);
344 password_from_stdin = 1;
351 msg(
M_FATAL,
"ERROR: username from %s authfile '%s' is empty", prefix, auth_file);
356 username_from_stdin =
true;
357 password_from_stdin =
true;
363 if (username_from_stdin || password_from_stdin || response_from_stdin)
365 #ifdef ENABLE_MANAGEMENT
372 struct buffer packed_resp, challenge;
381 msg(
M_FATAL,
"ERROR: could not read challenge response from stdin");
388 msg(
M_FATAL,
"ERROR: received malformed challenge request from server");
398 buf_printf(&user_prompt,
"Enter %s Username:", prefix);
399 buf_printf(&pass_prompt,
"Enter %s Password:", prefix);
407 if (password_from_stdin)
415 msg(
M_FATAL,
"ERROR: Failed retrieving username or password");
422 msg(
M_FATAL,
"ERROR: %s username is empty", prefix);
426 #ifdef ENABLE_MANAGEMENT
430 struct buffer packed_resp, challenge;
431 char *pw64 = NULL, *resp64 = NULL;
440 msg(
M_FATAL,
"ERROR: could not retrieve static challenge response");
447 msg(
M_FATAL,
"ERROR: could not base64-encode password/static_response");
450 buf_printf(&packed_resp,
"SCRV1:%s:%s", pw64, resp64);
460 msg(
M_FATAL,
"ERROR: could not concatenate password/static_response: string too long");
487 const bool nocache = up->
nocache;
488 static bool warn_shown =
false;
489 if (nocache || force)
503 msg(
M_WARN,
"WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this");
532 if (strlen(username))
543 msg(
D_PUSH,
"Error decoding auth-token-username");
581 n =
parse_line(parms, &ret[base], max_parms - base - 1,
"make_arg_array", 0,
M_WARN,
gc);
582 ASSERT(n >= 0 && n + base + 1 <= max_parms);
584 ret[base + n] = NULL;
586 return (
const char **)ret;
599 while (
buf_parse(&buf,
'\n', line,
sizeof(line)))
608 while (
buf_parse(&buf,
'\n', line,
sizeof(line)))
617 return (
const char **)ret;
625 const int max_parms =
len + 1;
631 for (i = 0; i <
len; ++i)
636 return (
const char **)ret;
684 if (c ==
'S' && !strncmp(src,
"SESS_ID_", 8))
689 else if (c ==
'e' && !strncmp(src,
"echo ", 5))
695 && (c ==
'a' && !strncmp(src,
"auth-token ", 11)))
744 if (c ==
'=' && state == 1)
748 else if (isalnum(c) || c ==
'_')
759 if (!isprint(c) || isspace(c)
760 || c ==
'$' || c ==
'(' || c ==
'`')
775 buf_set_read(&buf, (
const uint8_t *) peer_info, strlen(peer_info));
776 while (
buf_parse(&buf,
'\n', line,
sizeof(line)))
780 && (strncmp(line,
"IV_", 3) == 0 || strncmp(line,
"UV_", 3) == 0) )
787 msg(
M_WARN,
"validation failed on peer_info line received from client");
800 return combined_path;
void output_peer_info_env(struct env_set *es, const char *peer_info)
void unprotect_user_pass(struct user_pass *up)
Decrypt username and password buffers in user_pass.
int openvpn_base64_decode(const char *str, void *data, int size)
void set_auth_token_user(struct user_pass *tk, const char *username)
Sets the auth-token username by base64 decoding the passed username.
#define GET_USER_PASS_PREVIOUS_CREDS_FAILED
#define GET_USER_PASS_STATIC_CHALLENGE_CONCAT
static struct gc_arena gc_new(void)
int string_array_len(const char **array)
static const char ** make_arg_copy(char **p, struct gc_arena *gc)
bool get_user_pass_cr(struct user_pass *up, const char *auth_file, const char *prefix, const unsigned int flags, const char *auth_challenge)
Retrieves the user credentials from various sources depending on the flags.
int len
Length in bytes of the actual content within the allocated memory.
void protect_user_pass(struct user_pass *up)
Encrypt username and password buffers in user_pass.
struct buffer prepend_dir(const char *dir, const char *path, struct gc_arena *gc)
Prepend a directory to a path.
#define GET_USER_PASS_STATIC_CHALLENGE_ECHO
void management_auth_failure(struct management *man, const char *type, const char *reason)
void set_auth_token(struct user_pass *tk, const char *token)
Sets the auth-token to token.
char username[USER_PASS_LEN]
bool management_query_user_pass(struct management *man, struct user_pass *up, const char *type, const unsigned int flags, const char *static_challenge)
static struct auth_challenge_info * parse_auth_challenge(const char *auth_challenge, struct gc_arena *gc)
Parses an authentication challenge string and returns an auth_challenge_info structure.
const char ** make_extended_arg_array(char **p, bool is_inline, struct gc_arena *gc)
struct buffer alloc_buf_gc(size_t size, struct gc_arena *gc)
#define CC_CRLF
carriage return or newline
int openvpn_base64_encode(const void *data, int size, char **str)
const char * safe_print(const char *str, struct gc_arena *gc)
int parse_line(const char *line, char *p[], const int n, const char *file, const int line_num, int msglevel, struct gc_arena *gc)
void prng_bytes(uint8_t *output, int len)
char * format_hex_ex(const uint8_t *data, int size, int maxoutput, unsigned int space_break_flags, const char *separator, struct gc_arena *gc)
#define GET_USER_PASS_MANAGEMENT
void env_set_add(struct env_set *es, const char *str)
static bool query_user_SINGLE(char *prompt, size_t prompt_len, char *resp, size_t resp_len, bool echo)
A plain "make Gert happy" wrapper.
char * string_alloc(const char *str, struct gc_arena *gc)
static void secure_memzero(void *data, size_t len)
Securely zeroise memory.
void string_clear(char *str)
void query_user_add(char *prompt, size_t prompt_len, char *resp, size_t resp_len, bool echo)
Adds an item to ask the user for.
bool unprotect_buffer_win32(char *buf, size_t len)
Decrypt a previously encrypted region of memory using CryptUnProtectMemory() with access restricted t...
static bool query_user_exec(void)
Wrapper function enabling query_user_exec() if no alternative methods have been enabled.
const char ** make_arg_array(const char *first, const char *parms, struct gc_arena *gc)
void purge_user_pass(struct user_pass *up, const bool force)
const char * challenge_text
static char * auth_challenge
#define CC_PRINT
printable (>= 32, != 127)
#define GET_USER_PASS_DYNAMIC_CHALLENGE
bool string_mod(char *str, const unsigned int inclusive, const unsigned int exclusive, const char replace)
Modifies a string in place by replacing certain classes of characters of it with a specified characte...
#define ALLOC_ARRAY_CLEAR_GC(dptr, type, n, gc)
static const char ** make_inline_array(const char *str, struct gc_arena *gc)
#define ALLOC_OBJ_CLEAR_GC(dptr, type, gc)
#define GET_USER_PASS_NOFATAL
Wrapper structure for dynamically allocated memory.
void query_user_clear(void)
Wipes all data put into all of the query_user structs.
static bool management_query_user_pass_enabled(const struct management *man)
Garbage collection arena used to keep track of dynamically allocated memory.
static void buf_set_write(struct buffer *buf, uint8_t *data, int size)
static void strncpynt(char *dest, const char *src, size_t maxlen)
static bool check_debug_level(unsigned int level)
void set_std_files_to_null(bool stdin_only)
void * gc_malloc(size_t size, bool clear, struct gc_arena *a)
static void gc_free(struct gc_arena *a)
#define GET_USER_PASS_PASSWORD_ONLY
#define GET_USER_PASS_NEED_OK
bool validate_peer_info_line(char *line)
const char * sanitize_control_message(const char *src, struct gc_arena *gc)
char password[USER_PASS_LEN]
#define GET_USER_PASS_INLINE_CREDS
#define PATH_SEPARATOR_STR
static bool auth_user_pass_mgmt(struct user_pass *up, const char *prefix, const unsigned int flags, const char *auth_challenge)
const char * skip_leading_whitespace(const char *str)
#define GET_USER_PASS_STATIC_CHALLENGE
const char * string_mod_const(const char *str, const unsigned int inclusive, const unsigned int exclusive, const char replace, struct gc_arena *gc)
Returns a copy of a string with certain classes of characters of it replaced with a specified charact...
bool buf_printf(struct buffer *buf, const char *format,...)
static void buf_set_read(struct buffer *buf, const uint8_t *data, size_t size)
const char * hostname_randomize(const char *hostname, struct gc_arena *gc)
bool protect_buffer_win32(char *buf, size_t len)
Encrypt a region of memory using CryptProtectMemory() with access restricted to the current process.
bool buf_parse(struct buffer *buf, const int delim, char *line, const int size)