diff --git a/exec/binkit.js b/exec/binkit.js index 73237cbe146cbf62608c5c19899d1dbbbaefc3fc..8a7b8cf71685d4cf8218730fefd540f4c6c950b2 100644 --- a/exec/binkit.js +++ b/exec/binkit.js @@ -653,6 +653,7 @@ function inbound_auth_cb(pwd, bp) * the same password that we can send mail for. */ var addrs = []; + var ret = '-'; bp.remote_addrs.forEach(function(addr) { var cpw; @@ -661,13 +662,17 @@ function inbound_auth_cb(pwd, bp) if (cpw === undefined) cpw = '-'; if (pwd[0].substr(0, 9) === 'CRAM-MD5-') { - if (bp.getCRAM('MD5', cpw) === pwd[0]) + if (bp.getCRAM('MD5', cpw) === pwd[0]) { addrs.push(addr); + ret = cpw; + } } else { // TODO: Deal with arrays of passwords? - if (bp.cb_data.binkitcfg.node[addr].nomd5 === false && bp.cb_data.binkitcfg.node[addr].pass === pwd[0]) + if (bp.cb_data.binkitcfg.node[addr].nomd5 === false && bp.cb_data.binkitcfg.node[addr].pass === pwd[0]) { addrs.push(addr); + ret = cpw; + } } } else @@ -676,7 +681,7 @@ function inbound_auth_cb(pwd, bp) bp.remote_addrs = addrs; add_outbound_files(addrs, bp); - return addrs.length > 0; + return ret; } function run_inbound(sock) diff --git a/exec/load/binkp.js b/exec/load/binkp.js index 9dc5464a6fc7a2b9d2a22156d1032831961e1640..ffb9a5d6ec146ccde9e631941abff89b5452377e 100644 --- a/exec/load/binkp.js +++ b/exec/load/binkp.js @@ -2,6 +2,8 @@ load("sockdefs.js"); load("fido.js"); /* + * TODO: Add a configuation to force encryption. + * * A binkp implementation... * * Create a new instance with New passing a path to place received files @@ -78,6 +80,9 @@ function BinkP(name_ver, inbound, rx_callback, tx_callback) this.system_location = system.location; system.fido_addr_list.forEach(function(faddr){this.addr_list.push(FIDO.parse_addr(faddr, this.default_zone));}, this); this.want_callback = this.default_want; + this.will_crypt = false; + this.in_keys = undefined; + this.out_keys = undefined; this.sent_files = []; this.failed_sent_files = []; @@ -85,6 +90,142 @@ function BinkP(name_ver, inbound, rx_callback, tx_callback) this.received_files = []; this.failed_received_files = []; } +BinkP.prototype.crypt = { + crc32tab:[ 0x00000000, 0x77073096, 0xee0e612c, 0x990951ba, 0x076dc419, + 0x706af48f, 0xe963a535, 0x9e6495a3, 0x0edb8832, 0x79dcb8a4, + 0xe0d5e91e, 0x97d2d988, 0x09b64c2b, 0x7eb17cbd, 0xe7b82d07, + 0x90bf1d91, 0x1db71064, 0x6ab020f2, 0xf3b97148, 0x84be41de, + 0x1adad47d, 0x6ddde4eb, 0xf4d4b551, 0x83d385c7, 0x136c9856, + 0x646ba8c0, 0xfd62f97a, 0x8a65c9ec, 0x14015c4f, 0x63066cd9, + 0xfa0f3d63, 0x8d080df5, 0x3b6e20c8, 0x4c69105e, 0xd56041e4, + 0xa2677172, 0x3c03e4d1, 0x4b04d447, 0xd20d85fd, 0xa50ab56b, + 0x35b5a8fa, 0x42b2986c, 0xdbbbc9d6, 0xacbcf940, 0x32d86ce3, + 0x45df5c75, 0xdcd60dcf, 0xabd13d59, 0x26d930ac, 0x51de003a, + 0xc8d75180, 0xbfd06116, 0x21b4f4b5, 0x56b3c423, 0xcfba9599, + 0xb8bda50f, 0x2802b89e, 0x5f058808, 0xc60cd9b2, 0xb10be924, + 0x2f6f7c87, 0x58684c11, 0xc1611dab, 0xb6662d3d, 0x76dc4190, + 0x01db7106, 0x98d220bc, 0xefd5102a, 0x71b18589, 0x06b6b51f, + 0x9fbfe4a5, 0xe8b8d433, 0x7807c9a2, 0x0f00f934, 0x9609a88e, + 0xe10e9818, 0x7f6a0dbb, 0x086d3d2d, 0x91646c97, 0xe6635c01, + 0x6b6b51f4, 0x1c6c6162, 0x856530d8, 0xf262004e, 0x6c0695ed, + 0x1b01a57b, 0x8208f4c1, 0xf50fc457, 0x65b0d9c6, 0x12b7e950, + 0x8bbeb8ea, 0xfcb9887c, 0x62dd1ddf, 0x15da2d49, 0x8cd37cf3, + 0xfbd44c65, 0x4db26158, 0x3ab551ce, 0xa3bc0074, 0xd4bb30e2, + 0x4adfa541, 0x3dd895d7, 0xa4d1c46d, 0xd3d6f4fb, 0x4369e96a, + 0x346ed9fc, 0xad678846, 0xda60b8d0, 0x44042d73, 0x33031de5, + 0xaa0a4c5f, 0xdd0d7cc9, 0x5005713c, 0x270241aa, 0xbe0b1010, + 0xc90c2086, 0x5768b525, 0x206f85b3, 0xb966d409, 0xce61e49f, + 0x5edef90e, 0x29d9c998, 0xb0d09822, 0xc7d7a8b4, 0x59b33d17, + 0x2eb40d81, 0xb7bd5c3b, 0xc0ba6cad, 0xedb88320, 0x9abfb3b6, + 0x03b6e20c, 0x74b1d29a, 0xead54739, 0x9dd277af, 0x04db2615, + 0x73dc1683, 0xe3630b12, 0x94643b84, 0x0d6d6a3e, 0x7a6a5aa8, + 0xe40ecf0b, 0x9309ff9d, 0x0a00ae27, 0x7d079eb1, 0xf00f9344, + 0x8708a3d2, 0x1e01f268, 0x6906c2fe, 0xf762575d, 0x806567cb, + 0x196c3671, 0x6e6b06e7, 0xfed41b76, 0x89d32be0, 0x10da7a5a, + 0x67dd4acc, 0xf9b9df6f, 0x8ebeeff9, 0x17b7be43, 0x60b08ed5, + 0xd6d6a3e8, 0xa1d1937e, 0x38d8c2c4, 0x4fdff252, 0xd1bb67f1, + 0xa6bc5767, 0x3fb506dd, 0x48b2364b, 0xd80d2bda, 0xaf0a1b4c, + 0x36034af6, 0x41047a60, 0xdf60efc3, 0xa867df55, 0x316e8eef, + 0x4669be79, 0xcb61b38c, 0xbc66831a, 0x256fd2a0, 0x5268e236, + 0xcc0c7795, 0xbb0b4703, 0x220216b9, 0x5505262f, 0xc5ba3bbe, + 0xb2bd0b28, 0x2bb45a92, 0x5cb36a04, 0xc2d7ffa7, 0xb5d0cf31, + 0x2cd99e8b, 0x5bdeae1d, 0x9b64c2b0, 0xec63f226, 0x756aa39c, + 0x026d930a, 0x9c0906a9, 0xeb0e363f, 0x72076785, 0x05005713, + 0x95bf4a82, 0xe2b87a14, 0x7bb12bae, 0x0cb61b38, 0x92d28e9b, + 0xe5d5be0d, 0x7cdcefb7, 0x0bdbdf21, 0x86d3d2d4, 0xf1d4e242, + 0x68ddb3f8, 0x1fda836e, 0x81be16cd, 0xf6b9265b, 0x6fb077e1, + 0x18b74777, 0x88085ae6, 0xff0f6a70, 0x66063bca, 0x11010b5c, + 0x8f659eff, 0xf862ae69, 0x616bffd3, 0x166ccf45, 0xa00ae278, + 0xd70dd2ee, 0x4e048354, 0x3903b3c2, 0xa7672661, 0xd06016f7, + 0x4969474d, 0x3e6e77db, 0xaed16a4a, 0xd9d65adc, 0x40df0b66, + 0x37d83bf0, 0xa9bcae53, 0xdebb9ec5, 0x47b2cf7f, 0x30b5ffe9, + 0xbdbdf21c, 0xcabac28a, 0x53b39330, 0x24b4a3a6, 0xbad03605, + 0xcdd70693, 0x54de5729, 0x23d967bf, 0xb3667a2e, 0xc4614ab8, + 0x5d681b02, 0x2a6f2b94, 0xb40bbe37, 0xc30c8ea1, 0x5a05df1b, + 0x2d02ef8d + ], + uint:function(val) { + val &= 0xffffffff; + if (val < 0) + return (val + 0x100000000); + return val; + }, + crc32:function(c, b) { + var idx = (c & 0xff) ^ (b & 0xff); + var sft = (c >> 8) & 0xffffff; + var ret = this.uint(this.crc32tab[idx] ^ sft); + return ret; + }, + mult32:function(x, y) { + var total; + + total = (x * (y & 0xff)) & 0xffffffff; + total += (((x * ((y >> 8) & 0xff)) & 0xffffff) << 8); + total += (((x * ((y >> 16) & 0xff)) & 0xffff) << 16); + total += (((x * ((y >> 24) & 0xff)) & 0xff) << 24); + + return (this.uint(total)); + }, + update_keys:function(keys, c) { + var keyshift; + + keys[0] = this.crc32(keys[0], ascii(c)); + keys[1] += (keys[0] & 0xff); + keys[1] = this.mult32(keys[1], 134775813) + 1; + keyshift = this.uint(keys[1] >> 24); + keys[2] = this.crc32(keys[2], keyshift); + return ascii(c); + }, + init_keys:function(keys, passwd) { + var i; + + keys[0] = 305419896; + keys[1] = 591751049; + keys[2] = 878082192; + for (i=0; i<passwd.length; i++) + this.update_keys(keys, passwd[i]); + }, + decrypt_byte:function(keys) { + var temp; + + temp = (keys[2] & 0xffff) | 2; + return ((temp * (temp ^ 1)) >> 8) & 0xff; + }, + decrypt_buf:function(buf, keys) { + var i; + var ret = ''; + var ch; + + for (i=0; i<buf.length; i++) { + ch = ascii(ascii(buf[i]) ^ this.decrypt_byte(keys)); + ret += ch; + this.update_keys(keys, ch); + } + return ret; + }, + encrypt_buf:function(buf, keys) { + var t; + var i; + var ret = ''; + + for (i=0; i<buf.length; i++) { + t = this.decrypt_byte(keys); + this.update_keys(keys, buf[i]); + ret += ascii(ascii(buf[i]) ^ t); + } + return ret; + }, +}; +BinkP.prototype.send_buf = function(str) { + if (this.out_keys === undefined) + return str; + return this.crypt.encrypt_buf(str, this.out_keys); +}; +BinkP.prototype.recv_buf = function(str) { + if (this.in_keys === undefined) + return str; + return this.crypt.decrypt_buf(str, this.in_keys); +}; BinkP.prototype.Frame = function() {}; BinkP.prototype.default_want = function(fobj, fsize, fdate, offset) { @@ -223,7 +364,12 @@ BinkP.prototype.parseArgs = function(data) BinkP.prototype.connect = function(addr, password, auth_cb, port) { var pkt; + var i; + this.outgoing = true; + this.will_crypt = false; + this.in_keys = undefined; + this.out_keys = undefined; if (addr === undefined) throw("No address specified!"); addr = FIDO.parse_addr(addr, this.default_zone, this.default_domain); @@ -243,6 +389,7 @@ BinkP.prototype.connect = function(addr, password, auth_cb, port) } this.authenticated = undefined; + this.sendCmd(this.command.M_NUL, "OPT CRYPT"); this.sendCmd(this.command.M_NUL, "SYS "+this.system_name); this.sendCmd(this.command.M_NUL, "ZYZ "+this.system_operator); this.sendCmd(this.command.M_NUL, "LOC "+this.system_location); @@ -278,6 +425,16 @@ BinkP.prototype.connect = function(addr, password, auth_cb, port) if (auth_cb !== undefined) auth_cb(this.authenticated, this); + if (this.will_crypt) { + log(LOG_INFO, "Initializing crypt keys."); + this.out_keys = [0, 0, 0]; + this.in_keys = [0, 0, 0]; + this.crypt.init_keys(this.out_keys, password); + this.crypt.init_keys(this.in_keys, "-"); + for (i=0; i<password.length; i++) + this.crypt.update_keys(this.in_keys, password[i]); + } + if (js.terminated) { this.close(); return false; @@ -288,7 +445,7 @@ BinkP.prototype.connect = function(addr, password, auth_cb, port) * sock can be either a lisening socket or a connected socket. * * auth_cb(passwds, this) is called to accept and add - * files if it returns true, the session is considered secure. auth_cb() + * files if it returns a password, the session is considered secure. auth_cb() * is explicitly allowed to change the inbound property and call * this.sendCmd(this.command.M_ERR, "Error String"); * @@ -299,7 +456,12 @@ BinkP.prototype.accept = function(sock, auth_cb) var challenge=''; var i; var pkt; + var pwd; + this.outgoing = false; + this.will_crypt = false; + this.in_keys = undefined; + this.out_keys = undefined; if (sock === undefined || auth_cb === undefined) return false; @@ -325,7 +487,7 @@ BinkP.prototype.accept = function(sock, auth_cb) this.cram = {algo:'MD5', challenge:challenge.replace(/[0-9a-fA-F]{2}/g, hex2ascii)}; this.authenticated = undefined; - this.sendCmd(this.command.M_NUL, "OPT CRAM-MD5-"+challenge); + this.sendCmd(this.command.M_NUL, "OPT CRAM-MD5-"+challenge+" CRYPT"); this.sendCmd(this.command.M_NUL, "SYS "+this.system_name); this.sendCmd(this.command.M_NUL, "ZYZ "+this.system_operator); this.sendCmd(this.command.M_NUL, "LOC "+this.system_location); @@ -341,10 +503,13 @@ BinkP.prototype.accept = function(sock, auth_cb) if (pkt !== null && pkt !== this.partialFrame) { if (pkt.is_cmd) { if (pkt.command === this.command.M_PWD) { - if (auth_cb(this.parseArgs(pkt.data), this)) - this.authenticated = 'secure'; - else + pwd = auth_cb(this.parseArgs(pkt.data), this); + if (pwd === undefined) + pwd = '-'; + if (pwd === '-') this.authenticated = 'non-secure'; + else + this.authenticated = 'secure'; this.sendCmd(this.command.M_OK, this.authenticated); break; } @@ -352,6 +517,16 @@ BinkP.prototype.accept = function(sock, auth_cb) } } + if (this.will_crypt) { + log(LOG_INFO, "Initializing crypt keys."); + this.out_keys = [0, 0, 0]; + this.in_keys = [0, 0, 0]; + this.crypt.init_keys(this.in_keys, password); + this.crypt.init_keys(this.out_keys, "-"); + for (i=0; i<password.length; i++) + this.crypt.update_keys(this.out_keys, password[i]); + } + if (js.terminated) { this.close(); return false; @@ -600,7 +775,7 @@ BinkP.prototype.sendCmd = function(cmd, data) var len = data.length+1; len |= 0x8000; // We'll send it all in one go to avoid sending small packets... - if (!this.sock.send(ascii((len & 0xff00)>>8) + ascii(len & 0xff) + ascii(cmd) + data)) + if (!this.sock.send(this.send_buf(ascii((len & 0xff00)>>8) + ascii(len & 0xff) + ascii(cmd) + data))) return false; switch(cmd) { case this.command.M_EOB: @@ -630,7 +805,7 @@ BinkP.prototype.sendData = function(data) if (this.debug) log(LOG_DEBUG, "Sending "+data.length+" bytes of data"); // We'll send it all in one go to avoid sending small packets... - if (!this.sock.send(ascii((len & 0xff00)>>8) + ascii(len & 0xff) + data)) + if (!this.sock.send(this.send_buf(ascii((len & 0xff00)>>8) + ascii(len & 0xff) + data))) return false; return true; }; @@ -645,6 +820,7 @@ BinkP.prototype.recvFrame = function(timeout) var ver; var avail; var nullpos; + var buf; // Avoid warning from syncjslint by putting this in a closure. function hex2ascii(hex) @@ -679,7 +855,33 @@ BinkP.prototype.recvFrame = function(timeout) case 1: break; } - ret.length = this.sock.recvBin(2); + buf = this.sock.recv(1); + switch(this.sock.poll(timeout)) { + case 0: // Timeout + if (timeout) { + log(LOG_ERROR, "Timed out receiving second byte of packet header!"); + this.sock.close(); + this.sock = undefined; + return undefined; + } + return null; + default: + log(LOG_ERROR, "Error select()ing socket."); + this.sock.close(); + this.sock = undefined; + return undefined; + case 1: + break; + } + buf += this.sock.recv(1); + buf = this.recv_buf(buf); + if (buf.length !== 2) { + log(LOG_ERROR, "Timed out receiving second byte of packet header!"); + this.sock.close(); + this.sock = undefined; + return undefined; + } + ret.length = (ascii(buf[0]) << 8) | ascii(buf[1]); ret.is_cmd = (ret.length & 0x8000) ? true : false; ret.length &= 0x7fff; ret.data = ''; @@ -699,7 +901,7 @@ BinkP.prototype.recvFrame = function(timeout) } if (avail > (ret.length - ret.data.length)) avail = ret.length - ret.data.length; - ret.data += this.sock.recv(avail); + ret.data += this.recv_buf(this.sock.recv(avail)); break; case 0: if (timeout) { @@ -786,11 +988,16 @@ BinkP.prototype.recvFrame = function(timeout) this.cram = {algo:'MD5', challenge:args[i].substr(9).replace(/[0-9a-fA-F]{2}/g, hex2ascii)}; } else { - if (args[i] === 'NR') { - if (!this.sent_nr) - this.sendCmd(this.command.M_NUL, "NR"); - this.non_reliable = true; - break; + switch(args[i]) { + case 'NR': + if (!this.sent_nr) + this.sendCmd(this.command.M_NUL, "NR"); + this.non_reliable = true; + break; + case 'CRYPT': + this.will_crypt = true; + log(LOG_INFO, "Will encrypt session."); + break; } } }