2011-03-17 18:23:40 +01:00
|
|
|
/*
|
2012-01-23 20:25:06 +01:00
|
|
|
* Copyright (c) 2011-2012 Yubico AB
|
2011-03-17 18:23:40 +01:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Author : Fredrik Thulin <fredrik@yubico.com>
|
|
|
|
*
|
|
|
|
* Based on ykchalresp.c from yubikey-personalization.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions are
|
|
|
|
* met:
|
|
|
|
*
|
|
|
|
* * Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
*
|
|
|
|
* * Redistributions in binary form must reproduce the above
|
|
|
|
* copyright notice, this list of conditions and the following
|
|
|
|
* disclaimer in the documentation and/or other materials provided
|
|
|
|
* with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <sys/types.h>
|
|
|
|
#include <pwd.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <errno.h>
|
2012-11-14 14:14:06 +01:00
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <sys/types.h>
|
2011-03-17 18:23:40 +01:00
|
|
|
|
|
|
|
#include <ykpers.h>
|
|
|
|
|
|
|
|
#undef DEBUG_PAM
|
|
|
|
#include "util.h"
|
|
|
|
|
|
|
|
#define ACTION_ADD_HMAC_CHALRESP "add_hmac_chalresp"
|
|
|
|
|
|
|
|
const char *usage =
|
|
|
|
"Usage: ykpamcfg [options]\n"
|
|
|
|
"\n"
|
|
|
|
"Options :\n"
|
|
|
|
"\n"
|
|
|
|
"\t-1 Send challenge to slot 1. This is the default.\n"
|
|
|
|
"\t-2 Send challenge to slot 2.\n"
|
2011-04-11 14:49:02 +02:00
|
|
|
"\t-A action What to do.\n"
|
2012-11-14 10:43:47 +01:00
|
|
|
"\t-p path Specify an output path for the challenge file.\n"
|
2011-03-17 18:23:40 +01:00
|
|
|
"\n"
|
|
|
|
"\t-v verbose\n"
|
|
|
|
"\t-h help (this text)\n"
|
|
|
|
"\n"
|
|
|
|
"Actions :\n"
|
|
|
|
"\n"
|
|
|
|
"\t" ACTION_ADD_HMAC_CHALRESP "\tAdds a challenge-response state file for a connected YubiKey (default)\n"
|
|
|
|
"\n"
|
|
|
|
"\n"
|
|
|
|
;
|
2012-11-14 10:43:47 +01:00
|
|
|
const char *optstring = "12A:p:vh";
|
2011-03-17 18:23:40 +01:00
|
|
|
|
|
|
|
static void
|
|
|
|
report_yk_error()
|
|
|
|
{
|
|
|
|
if (ykp_errno)
|
|
|
|
fprintf(stderr, "Yubikey personalization error: %s\n",
|
|
|
|
ykp_strerror(ykp_errno));
|
|
|
|
if (yk_errno) {
|
|
|
|
if (yk_errno == YK_EUSBERR) {
|
|
|
|
fprintf(stderr, "USB error: %s\n",
|
|
|
|
yk_usb_strerror());
|
|
|
|
} else {
|
|
|
|
fprintf(stderr, "Yubikey core error: %s\n",
|
|
|
|
yk_strerror(yk_errno));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
parse_args(int argc, char **argv,
|
|
|
|
int *slot, bool *verbose,
|
2012-11-14 10:43:47 +01:00
|
|
|
char **action, char **output_dir,
|
2011-03-17 18:23:40 +01:00
|
|
|
int *exit_code)
|
|
|
|
{
|
2011-11-22 11:03:51 +01:00
|
|
|
int c;
|
2011-03-17 18:23:40 +01:00
|
|
|
|
|
|
|
while((c = getopt(argc, argv, optstring)) != -1) {
|
|
|
|
switch (c) {
|
|
|
|
case '1':
|
|
|
|
*slot = 1;
|
|
|
|
break;
|
|
|
|
case '2':
|
|
|
|
*slot = 2;
|
|
|
|
break;
|
|
|
|
case 'A':
|
|
|
|
*action = optarg;
|
|
|
|
break;
|
2012-11-14 10:43:47 +01:00
|
|
|
case 'p':
|
|
|
|
*output_dir = optarg;
|
|
|
|
break;
|
2011-03-17 18:23:40 +01:00
|
|
|
case 'v':
|
|
|
|
*verbose = true;
|
|
|
|
break;
|
|
|
|
case 'h':
|
|
|
|
default:
|
|
|
|
fputs(usage, stderr);
|
|
|
|
*exit_code = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
2011-04-11 14:49:02 +02:00
|
|
|
|
2011-03-17 18:23:40 +01:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
2011-12-06 11:56:52 +01:00
|
|
|
do_add_hmac_chalresp(YK_KEY *yk, uint8_t slot, bool verbose, char *output_dir, int *exit_code)
|
2011-03-17 18:23:40 +01:00
|
|
|
{
|
2011-12-06 13:46:30 +01:00
|
|
|
char buf[CR_RESPONSE_SIZE + 16];
|
2011-03-17 18:23:40 +01:00
|
|
|
CR_STATE state;
|
|
|
|
unsigned int flags = 0;
|
|
|
|
int ret = 0;
|
|
|
|
unsigned int response_len;
|
|
|
|
char *fn;
|
|
|
|
struct passwd *p;
|
|
|
|
FILE *f = NULL;
|
|
|
|
|
|
|
|
state.slot = slot;
|
|
|
|
flags |= YK_FLAG_MAYBLOCK;
|
|
|
|
*exit_code = 1;
|
|
|
|
|
|
|
|
p = getpwuid (getuid ());
|
2012-11-14 14:14:06 +01:00
|
|
|
|
2011-03-17 18:23:40 +01:00
|
|
|
if (! p) {
|
|
|
|
fprintf (stderr, "Who am I???");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2012-11-14 14:14:06 +01:00
|
|
|
/*
|
|
|
|
* Create default output directory for the user
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (!output_dir){
|
|
|
|
const char *pathname = p->pw_dir;
|
|
|
|
char fullpath[256];
|
|
|
|
snprintf(fullpath, 256,"%s/.yubico",p->pw_dir);
|
|
|
|
struct stat st;
|
|
|
|
|
|
|
|
//check if directory exists
|
|
|
|
if (stat(fullpath,&st)!=0 ){
|
|
|
|
if(mkdir(fullpath, S_IRWXU)==-1){
|
|
|
|
fprintf(stderr, "Failed creating directory '%s' :%s\n",
|
|
|
|
fullpath, strerror(errno));
|
|
|
|
}
|
|
|
|
if(verbose){
|
|
|
|
printf("Directory %s created successfully.\n", fullpath);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else{
|
|
|
|
if(!S_ISDIR(st.st_mode)){
|
|
|
|
fprintf(stderr, "Destination %s already exist and is not a directory.\n",
|
|
|
|
fullpath);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-03-17 18:23:40 +01:00
|
|
|
if (! get_user_challenge_file(yk, output_dir, p->pw_name, &fn)) {
|
|
|
|
fprintf (stderr, "Failed getting chalresp state filename\n");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (generate_random(state.challenge, CR_CHALLENGE_SIZE)) {
|
|
|
|
fprintf (stderr, "FAILED getting %i bytes of random data\n", CR_CHALLENGE_SIZE);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
state.challenge_len = CR_CHALLENGE_SIZE;
|
|
|
|
|
|
|
|
if (! challenge_response(yk, state.slot, state.challenge, CR_CHALLENGE_SIZE,
|
|
|
|
true, flags, verbose,
|
|
|
|
buf, sizeof(buf), &response_len))
|
|
|
|
goto out;
|
|
|
|
|
2012-06-08 13:11:12 +02:00
|
|
|
/* Make sure we get different responses for different challenges
|
|
|
|
There is a firmware bug in YubiKey 2.2 that makes it issue same
|
|
|
|
response for all challenges unless HMAC_LT64 is set. */
|
|
|
|
{
|
|
|
|
char buf2[CR_RESPONSE_SIZE + 16];
|
|
|
|
char challenge[CR_CHALLENGE_SIZE];
|
|
|
|
CR_STATE state2;
|
|
|
|
|
|
|
|
if (generate_random(challenge, CR_CHALLENGE_SIZE)) {
|
|
|
|
fprintf (stderr, "FAILED getting %i bytes of random data\n", CR_CHALLENGE_SIZE);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (! challenge_response(yk, state.slot, challenge, CR_CHALLENGE_SIZE,
|
|
|
|
true, flags, verbose,
|
|
|
|
buf2, sizeof(buf2), &response_len))
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (memcmp(buf, buf2, response_len) == 0) {
|
|
|
|
fprintf (stderr, "FAILED YubiKey is outputting the same response for different challenges."
|
|
|
|
"Make sure you configure the key with the option HMAC_LT64.\n");
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-03-17 18:23:40 +01:00
|
|
|
if (response_len > sizeof (state.response)) {
|
2012-02-08 15:53:18 +01:00
|
|
|
fprintf (stderr, "Got too long response ??? (%u/%lu)", response_len, (unsigned long) sizeof(state.response));
|
2011-03-17 18:23:40 +01:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
memcpy (state.response, buf, response_len);
|
|
|
|
state.response_len = response_len;
|
|
|
|
|
|
|
|
f = fopen (fn, "w");
|
|
|
|
if (! f) {
|
|
|
|
fprintf (stderr, "Failed opening '%s' for writing : %s\n", fn, strerror (errno));
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (! write_chalresp_state (f, &state))
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
printf ("Stored initial challenge and expected response in '%s'.\n", fn);
|
|
|
|
|
|
|
|
*exit_code = 0;
|
|
|
|
ret = 1;
|
|
|
|
|
|
|
|
out:
|
|
|
|
if (f)
|
|
|
|
fclose (f);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
main(int argc, char **argv)
|
|
|
|
{
|
|
|
|
YK_KEY *yk = NULL;
|
|
|
|
bool error = true;
|
|
|
|
int exit_code = 0;
|
|
|
|
|
|
|
|
/* Options */
|
|
|
|
bool verbose = false;
|
2011-12-06 11:56:52 +01:00
|
|
|
char *action = ACTION_ADD_HMAC_CHALRESP;
|
2012-11-14 10:43:47 +01:00
|
|
|
char *output_dir = NULL;
|
2011-03-17 18:23:40 +01:00
|
|
|
int slot = 1;
|
|
|
|
|
|
|
|
ykp_errno = 0;
|
|
|
|
yk_errno = 0;
|
|
|
|
|
|
|
|
if (! parse_args(argc, argv,
|
|
|
|
&slot, &verbose,
|
2012-11-14 10:43:47 +01:00
|
|
|
&action, &output_dir,
|
2011-03-17 18:23:40 +01:00
|
|
|
&exit_code))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
exit_code = 1;
|
|
|
|
|
|
|
|
if (! strcmp(action, ACTION_ADD_HMAC_CHALRESP)) {
|
|
|
|
/*
|
|
|
|
* Set up challenge-response login authentication
|
|
|
|
*/
|
|
|
|
if (! init_yubikey (&yk))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
if (! check_firmware_version(yk, verbose, false))
|
2012-11-14 14:14:06 +01:00
|
|
|
goto err;
|
2011-03-17 18:23:40 +01:00
|
|
|
|
2012-11-14 10:43:47 +01:00
|
|
|
if (! do_add_hmac_chalresp (yk, slot, verbose, output_dir, &exit_code))
|
2011-03-17 18:23:40 +01:00
|
|
|
goto err;
|
|
|
|
} else {
|
|
|
|
fprintf (stderr, "Unknown action '%s'\n", action);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
exit_code = 0;
|
|
|
|
error = false;
|
|
|
|
|
|
|
|
err:
|
|
|
|
if (error || exit_code != 0) {
|
|
|
|
report_yk_error ();
|
|
|
|
}
|
|
|
|
|
|
|
|
if (yk && !yk_close_key (yk)) {
|
|
|
|
report_yk_error ();
|
|
|
|
exit_code = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!yk_release ()) {
|
|
|
|
report_yk_error ();
|
|
|
|
exit_code = 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
exit (exit_code);
|
|
|
|
}
|