File: [local] / src / sbin / isakmpd / cookie.c (download)
Revision 1.6, Thu Aug 5 22:40:37 1999 UTC (24 years, 10 months ago) by niklas
Branch: MAIN
CVS Tags: OPENBSD_2_9_BASE, OPENBSD_2_9, OPENBSD_2_8_BASE, OPENBSD_2_8, OPENBSD_2_7_BASE, OPENBSD_2_7, OPENBSD_2_6_BASE, OPENBSD_2_6 Changes since 1.5: +7 -4 lines
regress/rsakeygen/Makefile: Merge with EOM 1.5
sysdep/openbsd/sysdep.c: Merge with EOM 1.8
cookie.c: Merge with EOM 1.21
util.c: Merge with EOM 1.15
util.h: Merge with EOM 1.7
author: niklas
Move regrand var to util.c, and get the decl from util.h, do not update the
cookie secret if in deterministic mode.
|
/* $OpenBSD: cookie.c,v 1.6 1999/08/05 22:40:37 niklas Exp $ */
/* $EOM: cookie.c,v 1.21 1999/08/05 15:00:04 niklas Exp $ */
/*
* Copyright (c) 1998, 1999 Niklas Hallqvist. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* This product includes software developed by Ericsson Radio Systems.
* 4. The name of the author may not be used to endorse or promote products
* derived from this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
/*
* This code was written under funding by Ericsson Radio Systems.
*/
#include <sys/types.h>
#include <sys/socket.h>
#include <sha1.h>
#include <stdlib.h>
#include <string.h>
#include "sysdep.h"
#include "cookie.h"
#include "exchange.h"
#include "hash.h"
#include "log.h"
#include "timer.h"
#include "transport.h"
#include "util.h"
#define COOKIE_EVENT_FREQ 360
#define COOKIE_SECRET_SIZE 16
void cookie_secret_reset (void);
u_int8_t cookie_secret[COOKIE_SECRET_SIZE];
/*
* Generate an anti-clogging token (a protection against an attacker forcing
* us to keep state for a flood of connection requests) a.k.a. a cookie
* at BUF, LEN bytes long. The cookie will be generated by hashing of
* information found, among otherplaces, in transport T and exchange
* EXCHANGE.
*/
void
cookie_gen (struct transport *t, struct exchange *exchange, u_int8_t *buf,
size_t len)
{
struct hash* hash = hash_get (HASH_SHA1);
struct sockaddr *name;
int name_len;
hash->Init (hash->ctx);
(*t->vtbl->get_dst) (t, &name, &name_len);
hash->Update (hash->ctx, (u_int8_t *)name, name_len);
(*t->vtbl->get_src) (t, &name, &name_len);
hash->Update (hash->ctx, (u_int8_t *)name, name_len);
if (exchange->initiator)
{
u_int8_t tmpsecret[COOKIE_SECRET_SIZE];
getrandom (tmpsecret, COOKIE_SECRET_SIZE);
hash->Update (hash->ctx, tmpsecret, COOKIE_SECRET_SIZE);
}
else
{
hash->Update (hash->ctx, exchange->cookies + ISAKMP_HDR_ICOOKIE_OFF,
ISAKMP_HDR_ICOOKIE_LEN);
hash->Update (hash->ctx, cookie_secret, COOKIE_SECRET_SIZE);
}
hash->Final (hash->digest, hash->ctx);
memcpy (buf, hash->digest, len);
}
/*
* Reset the secret which is used for the responder cookie.
* As responder we do not want to keep state in the cookie
* exchange, which means when the cookie secret is reset,
* our cookie response has timed out.
*/
void
cookie_secret_reset (void)
{
getrandom (cookie_secret, COOKIE_SECRET_SIZE);
}
/*
* Handle the cookie reset event, and reschedule with timer.
*/
void
cookie_reset_event (void *arg)
{
struct timeval now;
cookie_secret_reset ();
gettimeofday (&now, 0);
now.tv_sec += COOKIE_EVENT_FREQ;
timer_add_event ("cookie_reset_event", cookie_reset_event, arg, &now);
}
void
cookie_init (void)
{
if (regrand)
cookie_secret_reset ();
else
/* Start responder cookie resets. */
cookie_reset_event (0);
}