blob: acf7c7482cd351017527cd809e63b238ee62caad [file] [log] [blame]
/*
// Copyright (c) 2018 Intel Corporation
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
*/
#include "passwd_mgr.hpp"
#include "file.hpp"
#include "shadowlock.hpp"
#include <openssl/hmac.h>
#include <openssl/rand.h>
#include <openssl/sha.h>
#include <string.h>
#include <sys/stat.h>
#include <unistd.h>
#include <phosphor-logging/log.hpp>
#include <cerrno>
#include <cstring>
#include <fstream>
#include <iomanip>
namespace ipmi
{
static const char* passwdFileName = "/etc/ipmi_pass";
static const char* encryptKeyFileName = "/etc/key_file";
static const size_t maxKeySize = 8;
constexpr mode_t modeMask =
(S_ISUID | S_ISGID | S_ISVTX | S_IRWXU | S_IRWXG | S_IRWXO);
#define META_PASSWD_SIG "=OPENBMC="
/*
* Meta data struct for encrypted password file
*/
struct MetaPassStruct
{
char signature[10];
unsigned char reseved[2];
size_t hashSize;
size_t ivSize;
size_t dataSize;
size_t padSize;
size_t macSize;
};
using namespace phosphor::logging;
PasswdMgr::PasswdMgr()
{
restrictFilesPermission();
initPasswordMap();
}
void PasswdMgr::restrictFilesPermission(void)
{
struct stat st = {};
// Restrict file permission to owner read & write
if (stat(passwdFileName, &st) == 0)
{
if ((st.st_mode & modeMask) != (S_IRUSR | S_IWUSR))
{
if (chmod(passwdFileName, S_IRUSR | S_IWUSR) == -1)
{
log<level::DEBUG>("Error setting chmod for ipmi_pass file");
}
}
}
if (stat(encryptKeyFileName, &st) == 0)
{
if ((st.st_mode & modeMask) != (S_IRUSR | S_IWUSR))
{
if (chmod(encryptKeyFileName, S_IRUSR | S_IWUSR) == -1)
{
log<level::DEBUG>("Error setting chmod for ipmi_pass file");
}
}
}
}
SecureString PasswdMgr::getPasswdByUserName(const std::string& userName)
{
checkAndReload();
auto iter = passwdMapList.find(userName);
if (iter == passwdMapList.end())
{
return SecureString();
}
return iter->second;
}
int PasswdMgr::updateUserEntry(const std::string& userName,
const std::string& newUserName)
{
std::time_t updatedTime = getUpdatedFileTime();
// Check file time stamp to know passwdMapList is up-to-date.
// If not up-to-date, then updatePasswdSpecialFile will read and
// check the user entry existance.
if (fileLastUpdatedTime == updatedTime && updatedTime != -EIO)
{
if (passwdMapList.find(userName) == passwdMapList.end())
{
log<level::DEBUG>("User not found");
return 0;
}
}
// Write passwdMap to Encryted file
if (updatePasswdSpecialFile(userName, newUserName) != 0)
{
log<level::DEBUG>("Passwd file update failed");
return -EIO;
}
log<level::DEBUG>("Passwd file updated successfully");
return 0;
}
void PasswdMgr::checkAndReload(void)
{
std::time_t updatedTime = getUpdatedFileTime();
if (fileLastUpdatedTime != updatedTime && updatedTime != -1)
{
log<level::DEBUG>("Reloading password map list");
passwdMapList.clear();
initPasswordMap();
}
}
int PasswdMgr::encryptDecryptData(bool doEncrypt, const EVP_CIPHER* cipher,
uint8_t* key, size_t keyLen, uint8_t* iv,
size_t ivLen, uint8_t* inBytes,
size_t inBytesLen, uint8_t* mac,
size_t* macLen, unsigned char* outBytes,
size_t* outBytesLen)
{
if (cipher == NULL || key == NULL || iv == NULL || inBytes == NULL ||
outBytes == NULL || mac == NULL || inBytesLen == 0 ||
(size_t)EVP_CIPHER_key_length(cipher) > keyLen ||
(size_t)EVP_CIPHER_iv_length(cipher) > ivLen)
{
log<level::DEBUG>("Error Invalid Inputs");
return -EINVAL;
}
if (!doEncrypt)
{
// verify MAC before decrypting the data.
std::array<uint8_t, EVP_MAX_MD_SIZE> calMac;
size_t calMacLen = calMac.size();
// calculate MAC for the encrypted message.
if (NULL == HMAC(EVP_sha256(), key, keyLen, inBytes, inBytesLen,
calMac.data(),
reinterpret_cast<unsigned int*>(&calMacLen)))
{
log<level::DEBUG>("Error: Failed to calculate MAC");
return -EIO;
}
if (!((calMacLen == *macLen) &&
(std::memcmp(calMac.data(), mac, calMacLen) == 0)))
{
log<level::DEBUG>("Authenticated message doesn't match");
return -EBADMSG;
}
}
std::unique_ptr<EVP_CIPHER_CTX, decltype(&::EVP_CIPHER_CTX_free)> ctx(
EVP_CIPHER_CTX_new(), ::EVP_CIPHER_CTX_free);
if (!ctx)
{
log<level::DEBUG>("Error: EVP_CIPHER_CTX is NULL");
return -ENOMEM;
}
EVP_CIPHER_CTX_set_padding(ctx.get(), 1);
// Set key & IV
int retval = EVP_CipherInit_ex(ctx.get(), cipher, NULL, key, iv,
static_cast<int>(doEncrypt));
if (!retval)
{
log<level::DEBUG>("EVP_CipherInit_ex failed",
entry("RET_VAL=%d", retval));
return -EIO;
}
int outLen = 0, outEVPLen = 0;
if ((retval = EVP_CipherUpdate(ctx.get(), outBytes + outLen, &outEVPLen,
inBytes, inBytesLen)))
{
outLen += outEVPLen;
if ((retval = EVP_CipherFinal(ctx.get(), outBytes + outLen,
&outEVPLen)))
{
outLen += outEVPLen;
*outBytesLen = outLen;
}
else
{
log<level::DEBUG>("EVP_CipherFinal fails",
entry("RET_VAL=%d", retval));
return -EIO;
}
}
else
{
log<level::DEBUG>("EVP_CipherUpdate fails",
entry("RET_VAL=%d", retval));
return -EIO;
}
if (doEncrypt)
{
// Create MAC for the encrypted message
if (NULL == HMAC(EVP_sha256(), key, keyLen, outBytes, *outBytesLen, mac,
reinterpret_cast<unsigned int*>(macLen)))
{
log<level::DEBUG>("Failed to create authentication");
return -EIO;
}
}
return 0;
}
void PasswdMgr::initPasswordMap(void)
{
// TODO phosphor-host-ipmid#170 phosphor::user::shadow::Lock lock{};
SecureString dataBuf;
if (readPasswdFileData(dataBuf) != 0)
{
log<level::DEBUG>("Error in reading the encrypted pass file");
return;
}
if (dataBuf.size() != 0)
{
// populate the user list with password
char* outPtr = dataBuf.data();
char* nToken = NULL;
char* linePtr = strtok_r(outPtr, "\n", &nToken);
size_t lineSize = 0;
while (linePtr != NULL)
{
size_t userEPos = 0;
SecureString lineStr(linePtr);
if ((userEPos = lineStr.find(":")) != std::string::npos)
{
lineSize = lineStr.size();
passwdMapList.emplace(
lineStr.substr(0, userEPos),
lineStr.substr(userEPos + 1, lineSize - (userEPos + 1)));
}
linePtr = strtok_r(NULL, "\n", &nToken);
}
}
// Update the timestamp
fileLastUpdatedTime = getUpdatedFileTime();
return;
}
int PasswdMgr::readPasswdFileData(SecureString& outBytes)
{
std::array<uint8_t, maxKeySize> keyBuff;
std::ifstream keyFile(encryptKeyFileName, std::ios::in | std::ios::binary);
if (!keyFile.is_open())
{
log<level::DEBUG>("Error in opening encryption key file");
return -EIO;
}
keyFile.read(reinterpret_cast<char*>(keyBuff.data()), keyBuff.size());
if (keyFile.fail())
{
log<level::DEBUG>("Error in reading encryption key file");
return -EIO;
}
std::ifstream passwdFile(passwdFileName, std::ios::in | std::ios::binary);
if (!passwdFile.is_open())
{
log<level::DEBUG>("Error in opening ipmi password file");
return -EIO;
}
// calculate file size and read the data
passwdFile.seekg(0, std::ios::end);
ssize_t fileSize = passwdFile.tellg();
passwdFile.seekg(0, std::ios::beg);
std::vector<uint8_t> input(fileSize);
passwdFile.read(reinterpret_cast<char*>(input.data()), fileSize);
if (passwdFile.fail())
{
log<level::DEBUG>("Error in reading encryption key file");
return -EIO;
}
// verify the signature first
MetaPassStruct* metaData = reinterpret_cast<MetaPassStruct*>(input.data());
if (std::strncmp(metaData->signature, META_PASSWD_SIG,
sizeof(metaData->signature)))
{
log<level::DEBUG>("Error signature mismatch in password file");
return -EBADMSG;
}
size_t inBytesLen = metaData->dataSize + metaData->padSize;
// If data is empty i.e no password map then return success
if (inBytesLen == 0)
{
log<level::DEBUG>("Empty password file");
return 0;
}
// compute the key needed to decrypt
std::array<uint8_t, EVP_MAX_KEY_LENGTH> key;
auto keyLen = key.size();
if (NULL == HMAC(EVP_sha256(), keyBuff.data(), keyBuff.size(),
input.data() + sizeof(*metaData), metaData->hashSize,
key.data(), reinterpret_cast<unsigned int*>(&keyLen)))
{
log<level::DEBUG>("Failed to create MAC for authentication");
return -EIO;
}
// decrypt the data
uint8_t* iv = input.data() + sizeof(*metaData) + metaData->hashSize;
size_t ivLen = metaData->ivSize;
uint8_t* inBytes = iv + ivLen;
uint8_t* mac = inBytes + inBytesLen;
size_t macLen = metaData->macSize;
size_t outBytesLen = 0;
// Resize to actual data size
outBytes.resize(inBytesLen + EVP_MAX_BLOCK_LENGTH, '\0');
if (encryptDecryptData(false, EVP_aes_128_cbc(), key.data(), keyLen, iv,
ivLen, inBytes, inBytesLen, mac, &macLen,
reinterpret_cast<unsigned char*>(outBytes.data()),
&outBytesLen) != 0)
{
log<level::DEBUG>("Error in decryption");
return -EIO;
}
// Resize the vector to outBytesLen
outBytes.resize(outBytesLen);
OPENSSL_cleanse(key.data(), keyLen);
OPENSSL_cleanse(iv, ivLen);
return 0;
}
int PasswdMgr::updatePasswdSpecialFile(const std::string& userName,
const std::string& newUserName)
{
// TODO phosphor-host-ipmid#170 phosphor::user::shadow::Lock lock{};
size_t bytesWritten = 0;
size_t inBytesLen = 0;
size_t isUsrFound = false;
const EVP_CIPHER* cipher = EVP_aes_128_cbc();
SecureString dataBuf;
// Read the encrypted file and get the file data
// Check user existance and return if not exist.
if (readPasswdFileData(dataBuf) != 0)
{
log<level::DEBUG>("Error in reading the encrypted pass file");
return -EIO;
}
if (dataBuf.size() != 0)
{
inBytesLen = dataBuf.size() + newUserName.size() +
EVP_CIPHER_block_size(cipher);
}
SecureString inBytes(inBytesLen, '\0');
if (inBytesLen != 0)
{
char* outPtr = reinterpret_cast<char*>(dataBuf.data());
char* nToken = NULL;
char* linePtr = strtok_r(outPtr, "\n", &nToken);
while (linePtr != NULL)
{
size_t userEPos = 0;
SecureString lineStr(linePtr);
if ((userEPos = lineStr.find(":")) != std::string::npos)
{
if (userName.compare(lineStr.substr(0, userEPos)) == 0)
{
isUsrFound = true;
if (!newUserName.empty())
{
bytesWritten += std::snprintf(
&inBytes[0] + bytesWritten,
(inBytesLen - bytesWritten), "%s%s\n",
newUserName.c_str(),
lineStr.substr(userEPos, lineStr.size()).data());
}
}
else
{
bytesWritten += std::snprintf(&inBytes[0] + bytesWritten,
(inBytesLen - bytesWritten),
"%s\n", lineStr.data());
}
}
linePtr = strtok_r(NULL, "\n", &nToken);
}
inBytesLen = bytesWritten;
}
if (!isUsrFound)
{
log<level::DEBUG>("User doesn't exist");
return 0;
}
// Read the key buff from key file
std::array<uint8_t, maxKeySize> keyBuff;
std::ifstream keyFile(encryptKeyFileName, std::ios::in | std::ios::binary);
if (!keyFile.good())
{
log<level::DEBUG>("Error in opening encryption key file");
return -EIO;
}
keyFile.read(reinterpret_cast<char*>(keyBuff.data()), keyBuff.size());
if (keyFile.fail())
{
log<level::DEBUG>("Error in reading encryption key file");
return -EIO;
}
keyFile.close();
// Read the original passwd file mode
struct stat st = {};
if (stat(passwdFileName, &st) != 0)
{
log<level::DEBUG>("Error in getting password file fstat()");
return -EIO;
}
// Create temporary file for write
std::string pwdFile(passwdFileName);
std::vector<char> tempFileName(pwdFile.begin(), pwdFile.end());
std::vector<char> fileTemplate = {'_', '_', 'X', 'X', 'X',
'X', 'X', 'X', '\0'};
tempFileName.insert(tempFileName.end(), fileTemplate.begin(),
fileTemplate.end());
int fd = mkstemp((char*)tempFileName.data());
if (fd == -1)
{
log<level::DEBUG>("Error creating temp file");
return -EIO;
}
std::string strTempFileName(tempFileName.data());
// Open the temp file for writing from provided fd
// By "true", remove it at exit if still there.
// This is needed to cleanup the temp file at exception
phosphor::user::File temp(fd, strTempFileName, "w", true);
if ((temp)() == NULL)
{
close(fd);
log<level::DEBUG>("Error creating temp file");
return -EIO;
}
// Set the file mode as read-write for owner only
if (fchmod(fileno((temp)()), S_IRUSR | S_IWUSR) < 0)
{
log<level::DEBUG>("Error setting fchmod for temp file");
return -EIO;
}
const EVP_MD* digest = EVP_sha256();
size_t hashLen = EVP_MD_block_size(digest);
std::vector<uint8_t> hash(hashLen);
size_t ivLen = EVP_CIPHER_iv_length(cipher);
std::vector<uint8_t> iv(ivLen);
std::array<uint8_t, EVP_MAX_KEY_LENGTH> key;
size_t keyLen = key.size();
std::array<uint8_t, EVP_MAX_MD_SIZE> mac;
size_t macLen = mac.size();
// Create random hash and generate hash key which will be used for
// encryption.
if (RAND_bytes(hash.data(), hashLen) != 1)
{
log<level::DEBUG>("Hash genertion failed, bailing out");
return -EIO;
}
if (NULL == HMAC(digest, keyBuff.data(), keyBuff.size(), hash.data(),
hashLen, key.data(),
reinterpret_cast<unsigned int*>(&keyLen)))
{
log<level::DEBUG>("Failed to create MAC for authentication");
return -EIO;
}
// Generate IV values
if (RAND_bytes(iv.data(), ivLen) != 1)
{
log<level::DEBUG>("UV genertion failed, bailing out");
return -EIO;
}
// Encrypt the input data
std::vector<uint8_t> outBytes(inBytesLen + EVP_MAX_BLOCK_LENGTH);
size_t outBytesLen = 0;
if (inBytesLen != 0)
{
if (encryptDecryptData(
true, EVP_aes_128_cbc(), key.data(), keyLen, iv.data(), ivLen,
reinterpret_cast<unsigned char*>(inBytes.data()), inBytesLen,
mac.data(), &macLen, outBytes.data(), &outBytesLen) != 0)
{
log<level::DEBUG>("Error while encrypting the data");
return -EIO;
}
outBytes[outBytesLen] = 0;
}
OPENSSL_cleanse(key.data(), keyLen);
// Update the meta password structure.
MetaPassStruct metaData = {META_PASSWD_SIG, {0, 0}, 0, 0, 0, 0, 0};
metaData.hashSize = hashLen;
metaData.ivSize = ivLen;
metaData.dataSize = bytesWritten;
metaData.padSize = outBytesLen - bytesWritten;
metaData.macSize = macLen;
if (fwrite(&metaData, 1, sizeof(metaData), (temp)()) != sizeof(metaData))
{
log<level::DEBUG>("Error in writing meta data");
return -EIO;
}
if (fwrite(&hash[0], 1, hashLen, (temp)()) != hashLen)
{
log<level::DEBUG>("Error in writing hash data");
return -EIO;
}
if (fwrite(&iv[0], 1, ivLen, (temp)()) != ivLen)
{
log<level::DEBUG>("Error in writing IV data");
return -EIO;
}
if (fwrite(&outBytes[0], 1, outBytesLen, (temp)()) != outBytesLen)
{
log<level::DEBUG>("Error in writing encrypted data");
return -EIO;
}
if (fwrite(&mac[0], 1, macLen, (temp)()) != macLen)
{
log<level::DEBUG>("Error in writing MAC data");
return -EIO;
}
if (fflush((temp)()))
{
log<level::DEBUG>(
"File fflush error while writing entries to special file");
return -EIO;
}
OPENSSL_cleanse(iv.data(), ivLen);
// Rename the tmp file to actual file
if (std::rename(strTempFileName.data(), passwdFileName) != 0)
{
log<level::DEBUG>("Failed to rename tmp file to ipmi-pass");
return -EIO;
}
return 0;
}
std::time_t PasswdMgr::getUpdatedFileTime()
{
struct stat fileStat = {};
if (stat(passwdFileName, &fileStat) != 0)
{
log<level::DEBUG>("Error - Getting passwd file time stamp");
return -EIO;
}
return fileStat.st_mtime;
}
} // namespace ipmi