0
0
mirror of https://github.com/mongodb/mongo.git synced 2024-11-30 09:06:21 +01:00
mongodb/db/security_commands.cpp

191 lines
6.5 KiB
C++
Raw Normal View History

2009-01-19 01:13:12 +01:00
// security_commands.cpp
/*
* Copyright (C) 2010 10gen Inc.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License, version 3,
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
2009-01-19 01:13:12 +01:00
// security.cpp links with both dbgrid and db. this file db only -- at least for now.
// security.cpp
#include "stdafx.h"
#include "security.h"
#include "../util/md5.hpp"
#include "json.h"
#include "pdfile.h"
#include "db.h"
#include "dbhelpers.h"
#include "commands.h"
#include "jsobj.h"
#include "client.h"
2009-01-19 01:13:12 +01:00
namespace mongo {
/* authentication
system.users contains
{ user : <username>, pwd : <pwd_digest>, ... }
2009-01-19 01:13:12 +01:00
getnonce sends nonce to client
client then sends { authenticate:1, nonce:<nonce_str>, user:<username>, key:<key> }
2009-01-19 01:13:12 +01:00
where <key> is md5(<nonce_str><username><pwd_digest_str>) as a string
2009-01-19 01:13:12 +01:00
*/
boost::thread_specific_ptr<nonce> lastNonce;
2009-01-19 01:13:12 +01:00
class CmdGetNonce : public Command {
public:
2009-01-19 02:31:33 +01:00
virtual bool requiresAuth() { return false; }
2009-01-19 01:13:12 +01:00
virtual bool logTheOp() {
return false;
}
virtual bool slaveOk() {
return true;
}
2010-02-26 20:38:51 +01:00
virtual LockType locktype(){ return NONE; }
2009-01-19 01:13:12 +01:00
CmdGetNonce() : Command("getnonce") {}
bool run(const char *ns, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result, bool fromRepl) {
nonce *n = new nonce(security.getNonce());
2009-01-20 17:37:15 +01:00
stringstream ss;
ss << hex << *n;
2009-01-20 17:37:15 +01:00
result.append("nonce", ss.str() );
lastNonce.reset(n);
2009-01-19 01:13:12 +01:00
return true;
}
} cmdGetNonce;
class CmdLogout : public Command {
public:
virtual bool logTheOp() {
return false;
}
virtual bool slaveOk() {
return true;
}
2010-02-26 20:38:51 +01:00
virtual LockType locktype(){ return NONE; }
2009-01-19 01:13:12 +01:00
CmdLogout() : Command("logout") {}
bool run(const char *ns, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result, bool fromRepl) {
// database->name is the one we are logging out...
Client& client = cc();
AuthenticationInfo *ai = client.getAuthenticationInfo();
ai->logout(client.database()->name.c_str());
2009-01-19 01:13:12 +01:00
return true;
}
} cmdLogout;
2009-01-19 01:13:12 +01:00
class CmdAuthenticate : public Command {
public:
2009-01-19 02:31:33 +01:00
virtual bool requiresAuth() { return false; }
2009-01-19 01:13:12 +01:00
virtual bool logTheOp() {
return false;
}
virtual bool slaveOk() {
return true;
}
2010-02-26 20:38:51 +01:00
virtual LockType locktype(){ return WRITE; } // TODO: make this READ
2009-01-19 01:13:12 +01:00
CmdAuthenticate() : Command("authenticate") {}
bool run(const char *ns, BSONObj& cmdObj, string& errmsg, BSONObjBuilder& result, bool fromRepl) {
log(1) << " authenticate: " << cmdObj << endl;
2009-01-19 01:13:12 +01:00
string user = cmdObj.getStringField("user");
2009-01-20 17:37:15 +01:00
string key = cmdObj.getStringField("key");
string received_nonce = cmdObj.getStringField("nonce");
2009-01-20 17:37:15 +01:00
if( user.empty() || key.empty() || received_nonce.empty() ) {
log() << "field missing/wrong type in received authenticate command "
<< cc().database()->name
<< '\n';
2009-01-19 01:13:12 +01:00
errmsg = "auth fails";
sleepmillis(10);
return false;
}
2009-01-20 17:37:15 +01:00
stringstream digestBuilder;
2009-01-19 01:13:12 +01:00
{
bool reject = false;
nonce *ln = lastNonce.release();
if ( ln == 0 ) {
reject = true;
} else {
digestBuilder << hex << *ln;
reject = digestBuilder.str() != received_nonce;
}
if ( reject ) {
log() << "auth: bad nonce received or getnonce not called. could be a driver bug or a security attack. db:" << cc().database()->name << '\n';
2009-01-19 01:13:12 +01:00
errmsg = "auth fails";
sleepmillis(30);
return false;
}
}
static BSONObj userPattern = fromjson("{\"user\":1}");
string systemUsers = cc().database()->name + ".system.users";
OCCASIONALLY Helpers::ensureIndex(systemUsers.c_str(), userPattern, false, "user_1");
2009-01-19 01:13:12 +01:00
BSONObj userObj;
{
BSONObjBuilder b;
b << "user" << user;
BSONObj query = b.done();
if( !Helpers::findOne(systemUsers.c_str(), query, userObj) ) {
log() << "auth: couldn't find user " << user << ", " << systemUsers << '\n';
errmsg = "auth fails";
return false;
}
}
2009-01-20 17:37:15 +01:00
2009-01-19 01:13:12 +01:00
md5digest d;
{
2009-01-20 17:37:15 +01:00
string pwd = userObj.getStringField("pwd");
digestBuilder << user << pwd;
string done = digestBuilder.str();
2009-01-19 01:13:12 +01:00
md5_state_t st;
md5_init(&st);
2009-01-20 17:37:15 +01:00
md5_append(&st, (const md5_byte_t *) done.c_str(), done.size());
2009-01-19 01:13:12 +01:00
md5_finish(&st, d);
}
2009-01-20 17:37:15 +01:00
string computed = digestToString( d );
if ( key != computed ){
2009-01-19 01:13:12 +01:00
log() << "auth: key mismatch " << user << ", ns:" << ns << '\n';
errmsg = "auth fails";
return false;
}
AuthenticationInfo *ai = cc().getAuthenticationInfo();
2010-01-27 02:04:09 +01:00
if ( userObj[ "readOnly" ].isBoolean() && userObj[ "readOnly" ].boolean() ) {
if ( readLockSupported() ){
ai->authorizeReadOnly( cc().database()->name.c_str() );
}
else {
log() << "warning: old version of boost, read-only users not supported" << endl;
ai->authorize( cc().database()->name.c_str() );
}
2010-01-27 02:04:09 +01:00
} else {
ai->authorize( cc().database()->name.c_str() );
}
2009-01-19 01:13:12 +01:00
return true;
}
} cmdAuthenticate;
2009-01-20 17:37:15 +01:00
2009-01-19 01:13:12 +01:00
} // namespace mongo