[BACK]Return to cookie.c CVS log [TXT][DIR] Up to [local] / src / sbin / isakmpd

File: [local] / src / sbin / isakmpd / cookie.c (download)

Revision 1.6, Thu Aug 5 22:40:37 1999 UTC (24 years, 10 months ago) by niklas
Branch: MAIN
CVS Tags: OPENBSD_2_9_BASE, OPENBSD_2_9, OPENBSD_2_8_BASE, OPENBSD_2_8, OPENBSD_2_7_BASE, OPENBSD_2_7, OPENBSD_2_6_BASE, OPENBSD_2_6
Changes since 1.5: +7 -4 lines

regress/rsakeygen/Makefile: Merge with EOM 1.5
sysdep/openbsd/sysdep.c: Merge with EOM 1.8
cookie.c: Merge with EOM 1.21
util.c: Merge with EOM 1.15
util.h: Merge with EOM 1.7

author: niklas
Move regrand var to util.c, and get the decl from util.h, do not update the
cookie secret if in deterministic mode.

/*	$OpenBSD: cookie.c,v 1.6 1999/08/05 22:40:37 niklas Exp $	*/
/*	$EOM: cookie.c,v 1.21 1999/08/05 15:00:04 niklas Exp $	*/

/*
 * Copyright (c) 1998, 1999 Niklas Hallqvist.  All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the above copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 * 3. All advertising materials mentioning features or use of this software
 *    must display the following acknowledgement:
 *	This product includes software developed by Ericsson Radio Systems.
 * 4. The name of the author may not be used to endorse or promote products
 *    derived from this software without specific prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 */

/*
 * This code was written under funding by Ericsson Radio Systems.
 */

#include <sys/types.h>
#include <sys/socket.h>
#include <sha1.h>
#include <stdlib.h>
#include <string.h>

#include "sysdep.h"

#include "cookie.h"
#include "exchange.h"
#include "hash.h"
#include "log.h"
#include "timer.h"
#include "transport.h"
#include "util.h"

#define COOKIE_EVENT_FREQ	360
#define COOKIE_SECRET_SIZE	16

void cookie_secret_reset (void);

u_int8_t cookie_secret[COOKIE_SECRET_SIZE];

/*
 * Generate an anti-clogging token (a protection against an attacker forcing
 * us to keep state for a flood of connection requests) a.k.a. a cookie
 * at BUF, LEN bytes long.  The cookie will be generated by hashing of
 * information found, among otherplaces, in transport T and exchange
 * EXCHANGE.
 */
void
cookie_gen (struct transport *t, struct exchange *exchange, u_int8_t *buf,
	    size_t len)
{
  struct hash* hash = hash_get (HASH_SHA1);
  struct sockaddr *name;
  int name_len;

  hash->Init (hash->ctx);
  (*t->vtbl->get_dst) (t, &name, &name_len);
  hash->Update (hash->ctx, (u_int8_t *)name, name_len);
  (*t->vtbl->get_src) (t, &name, &name_len);
  hash->Update (hash->ctx, (u_int8_t *)name, name_len);
  if (exchange->initiator)
    {
      u_int8_t tmpsecret[COOKIE_SECRET_SIZE];

      getrandom (tmpsecret, COOKIE_SECRET_SIZE);
      hash->Update (hash->ctx, tmpsecret, COOKIE_SECRET_SIZE);
    }
  else
    {
      hash->Update (hash->ctx, exchange->cookies + ISAKMP_HDR_ICOOKIE_OFF,
		    ISAKMP_HDR_ICOOKIE_LEN);
      hash->Update (hash->ctx, cookie_secret, COOKIE_SECRET_SIZE);
    }

  hash->Final (hash->digest, hash->ctx);
  memcpy (buf, hash->digest, len);
}

/*
 * Reset the secret which is used for the responder cookie.
 * As responder we do not want to keep state in the cookie
 * exchange, which means when the cookie secret is reset,
 * our cookie response has timed out.
 */
void
cookie_secret_reset (void)
{
  getrandom (cookie_secret, COOKIE_SECRET_SIZE);
}

/*
 * Handle the cookie reset event, and reschedule with timer.
 */
void
cookie_reset_event (void *arg)
{
  struct timeval now;

  cookie_secret_reset ();

  gettimeofday (&now, 0);
  now.tv_sec += COOKIE_EVENT_FREQ;
  timer_add_event ("cookie_reset_event", cookie_reset_event, arg, &now);
}

void
cookie_init (void)
{
  if (regrand)
    cookie_secret_reset ();
  else
    /* Start responder cookie resets.  */
    cookie_reset_event (0);
}