1 Commits
pkg ... 0.2.4

Author SHA1 Message Date
c6e10471b8 added debug flag
All checks were successful
continuous-integration/drone/tag Build is passing
2020-04-04 15:35:11 +02:00
4 changed files with 4 additions and 150 deletions

View File

@@ -6,14 +6,14 @@ steps:
image: rust:1.41.0
commands:
- apt update && apt install -y libpam-dev
- cargo test --debug
- cargo test --release
- name: build_relase
image: rust:1.41.0
commands:
- apt update && apt install -y libpam-dev
- cargo build --debug
- cargo build --release
- mkdir -p bin lib
- bash -c 'cp $${CARGO_TARGET_DIR:-target}/debug/pam_fido2-cli bin/; cp $${CARGO_TARGET_DIR:-target}/debug/libpam_fido2.so lib/'
- bash -c 'cp $${CARGO_TARGET_DIR:-target}/release/pam_fido2-cli bin/; cp $${CARGO_TARGET_DIR:-target}/release/libpam_fido2.so lib/'
- strip bin/*
- tar cvzf pam_fido2.tar.gz bin lib src Cargo.*
when:

2
Cargo.lock generated
View File

@@ -403,7 +403,7 @@ dependencies = [
[[package]]
name = "pam_fido2"
version = "0.2.2"
version = "0.2.4"
dependencies = [
"ctap_hmac 0.4.0 (git+https://git.shimun.net/shimun/ctap?rev=cc48719cfa1375909877265905264fad875d1fa3)",
"ctrlc 3.1.4 (registry+https://github.com/rust-lang/crates.io-index)",

View File

@@ -1,25 +0,0 @@
{ stdenv, fetchgit, pkgconfig, libu2f-host, pam, rustPlatform }:
rustPlatform.buildRustPackage rec {
pname = "pam_fido2";
version = "0.2.4";
src = fetchgit {
url = "https://git.shimun.net/shimun/fido2pam.git";
rev = "${version}";
sha256 = "0i1x0axhdnbza9sx8nyh8dqmc2hacjqya54415kixfm9ddx519q0";
};
nativeBuildInputs = [ pkgconfig ];
buildInputs = [ pam ];
cargoSha256 = "0qjw3hrjdldqbv57i1sx3vmr5rhvmjf5axc2ypn9rzkb1sa500rz";
meta = with stdenv.lib; {
homepage = "https://git.shimun.net/shimun/fido2pam";
description = "A PAM module for allowing authentication with a FIDO2 device";
license = licenses.lgpl2;
platforms = platforms.unix;
maintainers = with maintainers; [ shimun ];
};
}

View File

@@ -1,121 +0,0 @@
#[macro_use]
extern crate pamsm;
extern crate ctap_hmac as ctap;
use pamsm::{Pam, PamError, PamFlag, PamServiceModule};
use rand::Rng;
use regex::Regex;
use std::fs::File;
use std::io::{self, prelude::*, BufReader};
use std::time::{Duration, SystemTime};
struct PamFido2;
struct Settings {
pub device_timeout: Duration,
pub user_credentials: Vec<(String, String)>,
}
impl Default for Settings {
fn default() -> Self {
Settings {
device_timeout: Duration::from_secs(15),
user_credentials: vec![("091566e43802c5a29971c1e08d7865d959af862cc28af22dacf413ac26b90f6dea7d1ac491d9d3712c63f7b8d6cfadf86d057d099d382246dbe9c87f133ed167881b65030000".into(),".*".into())],
}
}
}
impl Settings {
/*pub fn load(file: impl Read) -> io::Result<Settings> {
}*/
pub fn load() -> Settings {
let mut creds = Vec::new();
for path in &["/etc/pam_fido2.conf"] {
let file = match File::open(&path) {
Ok(file) => file,
_ => continue,
};
let reader = BufReader::new(file);
for line in reader.lines() {
let line = line.unwrap();
let mut parts = line.split(":");
let user = parts.by_ref().next().unwrap();
creds.push((
(&parts.collect::<Vec<_>>()[..].join(":")).to_string(),
user.to_string(),
));
}
}
Settings {
user_credentials: creds,
..Default::default()
}
}
pub fn get_credential(&self, user: &str) -> Option<ctap::FidoCredential> {
for (cred, pattern) in self.user_credentials.iter() {
let re = Regex::new(&pattern).expect(&["Invalid regex pattern:", &pattern].join(" "));
if re.is_match(user) {
let mut parts = cred.split(":");
//TODO: use expect
let id = parts.by_ref().next().unwrap();
let key = parts.by_ref().next().unwrap();
return Some(ctap::FidoCredential {
id: hex::decode(id).unwrap(),
public_key: hex::decode(key).unwrap(),
rp_id: "pam".into(),
});
}
}
None
}
}
impl PamFido2 {
fn settings(&self) -> Settings {
Settings::load()
}
}
impl PamServiceModule for PamFido2 {
fn authenticate(self: &Self, pamh: Pam, _: PamFlag, _args: Vec<String>) -> PamError {
let settings = self.settings();
let begin = SystemTime::now();
let mut device = loop {
if let Ok(mut devices) = ctap::get_devices() {
if let Some(dev) = devices.next() {
break ctap::FidoDevice::new(&dev).unwrap();
}
}
if begin.elapsed().unwrap() > settings.device_timeout {
return PamError::AUTH_ERR;
}
};
let challenge = rand::thread_rng().gen::<[u8; 32]>();
let credential = match settings
.get_credential(
&pamh
.get_cached_user()
.ok()
.map(|name| name.unwrap().to_str().unwrap().to_string())
.expect("Faied to get username"),
) { Some(cred) => cred, _ => return PamError::CRED_UNAVAIL };
match device.get_assertion(&credential, &challenge) {
Ok(true) => PamError::SUCCESS,
_ => PamError::AUTH_ERR,
}
}
}
pamsm_init!(Box::new(PamFido2));
#[cfg(test)]
mod tests {
#[test]
fn it_works() {
assert_eq!(2 + 2, 4);
}
}