123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292 |
- 'use strict';
- const crypto = require('crypto');
- const Buffer = require('safe-buffer').Buffer;
- const retrieveBSON = require('../connection/utils').retrieveBSON;
- const MongoError = require('../error').MongoError;
- const AuthProvider = require('./auth_provider').AuthProvider;
- const BSON = retrieveBSON();
- const Binary = BSON.Binary;
- let saslprep;
- try {
- saslprep = require('saslprep');
- } catch (e) {
- // don't do anything;
- }
- var parsePayload = function(payload) {
- var dict = {};
- var parts = payload.split(',');
- for (var i = 0; i < parts.length; i++) {
- var valueParts = parts[i].split('=');
- dict[valueParts[0]] = valueParts[1];
- }
- return dict;
- };
- var passwordDigest = function(username, password) {
- if (typeof username !== 'string') throw new MongoError('username must be a string');
- if (typeof password !== 'string') throw new MongoError('password must be a string');
- if (password.length === 0) throw new MongoError('password cannot be empty');
- // Use node md5 generator
- var md5 = crypto.createHash('md5');
- // Generate keys used for authentication
- md5.update(username + ':mongo:' + password, 'utf8');
- return md5.digest('hex');
- };
- // XOR two buffers
- function xor(a, b) {
- if (!Buffer.isBuffer(a)) a = Buffer.from(a);
- if (!Buffer.isBuffer(b)) b = Buffer.from(b);
- const length = Math.max(a.length, b.length);
- const res = [];
- for (let i = 0; i < length; i += 1) {
- res.push(a[i] ^ b[i]);
- }
- return Buffer.from(res).toString('base64');
- }
- function H(method, text) {
- return crypto
- .createHash(method)
- .update(text)
- .digest();
- }
- function HMAC(method, key, text) {
- return crypto
- .createHmac(method, key)
- .update(text)
- .digest();
- }
- var _hiCache = {};
- var _hiCacheCount = 0;
- var _hiCachePurge = function() {
- _hiCache = {};
- _hiCacheCount = 0;
- };
- const hiLengthMap = {
- sha256: 32,
- sha1: 20
- };
- function HI(data, salt, iterations, cryptoMethod) {
- // omit the work if already generated
- const key = [data, salt.toString('base64'), iterations].join('_');
- if (_hiCache[key] !== undefined) {
- return _hiCache[key];
- }
- // generate the salt
- const saltedData = crypto.pbkdf2Sync(
- data,
- salt,
- iterations,
- hiLengthMap[cryptoMethod],
- cryptoMethod
- );
- // cache a copy to speed up the next lookup, but prevent unbounded cache growth
- if (_hiCacheCount >= 200) {
- _hiCachePurge();
- }
- _hiCache[key] = saltedData;
- _hiCacheCount += 1;
- return saltedData;
- }
- /**
- * Creates a new ScramSHA authentication mechanism
- * @class
- * @extends AuthProvider
- */
- class ScramSHA extends AuthProvider {
- constructor(bson, cryptoMethod) {
- super(bson);
- this.cryptoMethod = cryptoMethod || 'sha1';
- }
- static _getError(err, r) {
- if (err) {
- return err;
- }
- if (r.$err || r.errmsg) {
- return new MongoError(r);
- }
- }
- /**
- * @ignore
- */
- _executeScram(sendAuthCommand, connection, credentials, nonce, callback) {
- let username = credentials.username;
- const password = credentials.password;
- const db = credentials.source;
- const cryptoMethod = this.cryptoMethod;
- let mechanism = 'SCRAM-SHA-1';
- let processedPassword;
- if (cryptoMethod === 'sha256') {
- mechanism = 'SCRAM-SHA-256';
- processedPassword = saslprep ? saslprep(password) : password;
- } else {
- try {
- processedPassword = passwordDigest(username, password);
- } catch (e) {
- return callback(e);
- }
- }
- // Clean up the user
- username = username.replace('=', '=3D').replace(',', '=2C');
- // NOTE: This is done b/c Javascript uses UTF-16, but the server is hashing in UTF-8.
- // Since the username is not sasl-prep-d, we need to do this here.
- const firstBare = Buffer.concat([
- Buffer.from('n=', 'utf8'),
- Buffer.from(username, 'utf8'),
- Buffer.from(',r=', 'utf8'),
- Buffer.from(nonce, 'utf8')
- ]);
- // Build command structure
- const saslStartCmd = {
- saslStart: 1,
- mechanism,
- payload: new Binary(Buffer.concat([Buffer.from('n,,', 'utf8'), firstBare])),
- autoAuthorize: 1
- };
- // Write the commmand on the connection
- sendAuthCommand(connection, `${db}.$cmd`, saslStartCmd, (err, r) => {
- let tmpError = ScramSHA._getError(err, r);
- if (tmpError) {
- return callback(tmpError, null);
- }
- const dict = parsePayload(r.payload.value());
- const iterations = parseInt(dict.i, 10);
- const salt = dict.s;
- const rnonce = dict.r;
- // Set up start of proof
- const withoutProof = `c=biws,r=${rnonce}`;
- const saltedPassword = HI(
- processedPassword,
- Buffer.from(salt, 'base64'),
- iterations,
- cryptoMethod
- );
- if (iterations && iterations < 4096) {
- const error = new MongoError(`Server returned an invalid iteration count ${iterations}`);
- return callback(error, false);
- }
- const clientKey = HMAC(cryptoMethod, saltedPassword, 'Client Key');
- const storedKey = H(cryptoMethod, clientKey);
- const authMessage = [firstBare, r.payload.value().toString('base64'), withoutProof].join(',');
- const clientSignature = HMAC(cryptoMethod, storedKey, authMessage);
- const clientProof = `p=${xor(clientKey, clientSignature)}`;
- const clientFinal = [withoutProof, clientProof].join(',');
- const saslContinueCmd = {
- saslContinue: 1,
- conversationId: r.conversationId,
- payload: new Binary(Buffer.from(clientFinal))
- };
- sendAuthCommand(connection, `${db}.$cmd`, saslContinueCmd, (err, r) => {
- if (!r || r.done !== false) {
- return callback(err, r);
- }
- const retrySaslContinueCmd = {
- saslContinue: 1,
- conversationId: r.conversationId,
- payload: Buffer.alloc(0)
- };
- sendAuthCommand(connection, `${db}.$cmd`, retrySaslContinueCmd, callback);
- });
- });
- }
- /**
- * Implementation of authentication for a single connection
- * @override
- */
- _authenticateSingleConnection(sendAuthCommand, connection, credentials, callback) {
- // Create a random nonce
- crypto.randomBytes(24, (err, buff) => {
- if (err) {
- return callback(err, null);
- }
- return this._executeScram(
- sendAuthCommand,
- connection,
- credentials,
- buff.toString('base64'),
- callback
- );
- });
- }
- /**
- * Authenticate
- * @override
- * @method
- */
- auth(sendAuthCommand, connections, credentials, callback) {
- this._checkSaslprep();
- super.auth(sendAuthCommand, connections, credentials, callback);
- }
- _checkSaslprep() {
- const cryptoMethod = this.cryptoMethod;
- if (cryptoMethod === 'sha256') {
- if (!saslprep) {
- console.warn('Warning: no saslprep library specified. Passwords will not be sanitized');
- }
- }
- }
- }
- /**
- * Creates a new ScramSHA1 authentication mechanism
- * @class
- * @extends ScramSHA
- */
- class ScramSHA1 extends ScramSHA {
- constructor(bson) {
- super(bson, 'sha1');
- }
- }
- /**
- * Creates a new ScramSHA256 authentication mechanism
- * @class
- * @extends ScramSHA
- */
- class ScramSHA256 extends ScramSHA {
- constructor(bson) {
- super(bson, 'sha256');
- }
- }
- module.exports = { ScramSHA1, ScramSHA256 };
|