-
Notifications
You must be signed in to change notification settings - Fork 20
/
Copy pathgssapi_.py
390 lines (316 loc) · 15 KB
/
gssapi_.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
import logging
import re
import socket
from base64 import b64decode, b64encode
import gssapi
from requests.auth import AuthBase
from requests.compat import urlparse
from requests.cookies import cookiejar_from_dict
from requests.models import Response
from requests.structures import CaseInsensitiveDict
from .exceptions import MutualAuthenticationError, SPNEGOExchangeError
log = logging.getLogger(__name__)
# Different types of mutual authentication:
# with mutual_authentication set to REQUIRED, all responses will be
# authenticated with the exception of errors. Errors will have their contents
# and headers stripped. If a non-error response cannot be authenticated, a
# MutualAuthenticationError exception will be raised.
# with mutual_authentication set to OPTIONAL, mutual authentication will be
# attempted if supported, and if supported and failed, a
# MutualAuthenticationError exception will be raised. Responses which do not
# support mutual authentication will be returned directly to the user.
# with mutual_authentication set to DISABLED, mutual authentication will not be
# attempted, even if supported.
REQUIRED = 1
OPTIONAL = 2
DISABLED = 3
# OID for the SPNEGO mechanism
SPNEGO = gssapi.OID.from_int_seq("1.3.6.1.5.5.2")
class SanitizedResponse(Response):
"""The :class:`Response <Response>` object, which contains a server's
response to an HTTP request.
This differs from `requests.models.Response` in that it's headers and
content have been sanitized. This is only used for HTTP Error messages
which do not support mutual authentication when mutual authentication is
required."""
def __init__(self, response):
super(SanitizedResponse, self).__init__()
self.status_code = response.status_code
self.encoding = response.encoding
self.raw = response.raw
self.reason = response.reason
self.url = response.url
self.request = response.request
self.connection = response.connection
self._content_consumed = True
self._content = b""
self.cookies = cookiejar_from_dict({})
self.headers = CaseInsensitiveDict()
self.headers["content-length"] = "0"
for header in ("date", "server"):
if header in response.headers:
self.headers[header] = response.headers[header]
def _negotiate_value(response):
"""Extracts the gssapi authentication token from the appropriate header"""
if hasattr(_negotiate_value, "regex"):
regex = _negotiate_value.regex
else:
# There's no need to re-compile this EVERY time it is called. Compile
# it once and you won't have the performance hit of the compilation.
regex = re.compile(r"Negotiate\s*([^,]*)", re.I)
_negotiate_value.regex = regex
authreq = response.headers.get("www-authenticate", None)
if authreq:
match_obj = regex.search(authreq)
if match_obj:
return b64decode(match_obj.group(1))
return None
class HTTPSPNEGOAuth(AuthBase):
"""Attaches HTTP GSSAPI Authentication to the given Request object.
`mutual_authentication` controls whether GSSAPI should attempt mutual
authentication. It may be `REQUIRED`, `OPTIONAL`, or `DISABLED`
(default).
`target_name` specifies the remote principal name. It may be either a
GSSAPI Name type or a string. If a string, it will be treated as a
hostbased service; if it contains no '@', the DNS host will be supplied.
(default: "HTTP" at the DNS host).
`delegate` indicates whether we should attempt credential delegation.
Default is `False`.
`opportunistic_auth` indicates whether we should assume the server will
ask for Negotiation. Defaut is `False`.
`creds` is GSSAPI credentials (gssapi.Credentials) to use for negotiation.
Default is `None`.
`mech` is GSSAPI Mechanism (gssapi.Mechanism) to use for negotiation.
Default is `SPNEGO`
`sanitize_mutual_error_response` controls whether we should clean up
server responses. See the `SanitizedResponse` class.
"""
def __init__(
self,
mutual_authentication=DISABLED,
target_name="HTTP",
delegate=False,
opportunistic_auth=False,
creds=None,
mech=SPNEGO,
sanitize_mutual_error_response=True,
):
self.context = {}
self.pos = None
self.mutual_authentication = mutual_authentication
self.target_name = target_name
self.delegate = delegate
self.opportunistic_auth = opportunistic_auth
self.creds = creds
self.mech = mech if mech else SPNEGO
self.sanitize_mutual_error_response = sanitize_mutual_error_response
self._dns_canonicalize_hostname = False
self._use_reverse_dns = False
def dns_canonicalize_hostname(self, value=None):
"""
Enables canonical hostname resolution via CNAME records.
>>> import requests
>>> from requests_gssapi import HTTPSPNEGOAuth
>>> gssapi_auth = HTTPSPNEGOAuth()
>>> gssapi_auth.dns_canonicalize_hostname(True)
>>> gssapi_auth.use_reverse_dns(True)
>>> r = requests.get("http://example.org", auth=gssapi_auth)
.. warning:::
Using an insecure DNS queries for principal name
canonicalization can result in risc of a man-in-the-middle
attack. Strictly speaking such queries are in violation of
RFC 4120. Alas misconfigured realms exist and client libraries
like MIT Kerberos provide means to canonicalize principal
names via DNS queries. Be very careful when using thi option.
.. seealso:::
`RFC 4120 <https://datatracker.ietf.org/doc/html/rfc4120>`
`RFC 6808 <https://datatracker.ietf.org/doc/html/rfc6806>`
"""
if isinstance(value, bool):
self._dns_canonicalize_hostname = value
return self._dns_canonicalize_hostname
def use_reverse_dns(self, value=None):
"""
Use rev-DNS query to resolve canonical host name when DNS
canonicalization is enabled.
.. seealso::
See `dns_canonicalize_hostname` for further details and warnings.
"""
if isinstance(value, bool):
self._use_reverse_dns = value
return self._use_reverse_dns
def generate_request_header(self, response, host, is_preemptive=False):
"""
Generates the GSSAPI authentication token
If any GSSAPI step fails, raise SPNEGOExchangeError
with failure detail.
"""
gssflags = []
if self.delegate:
gssflags.append(gssapi.RequirementFlag.delegate_to_peer)
if self.mutual_authentication != DISABLED:
gssflags.append(gssapi.RequirementFlag.mutual_authentication)
canonhost = host
if self._dns_canonicalize_hostname and type(self.target_name) != gssapi.Name:
try:
ai = socket.getaddrinfo(host, 0, flags=socket.AI_CANONNAME)
canonhost = ai[0][3]
if self._use_reverse_dns:
ni = socket.getnameinfo(ai[0][4], socket.NI_NAMEREQD)
canonhost = ni[0]
except socket.gaierror as e:
if e.errno == socket.EAI_MEMORY:
raise e
try:
gss_stage = "initiating context"
name = self.target_name
if type(name) != gssapi.Name:
if "@" not in name:
name = "%s@%s" % (name, canonhost)
name = gssapi.Name(name, gssapi.NameType.hostbased_service)
self.context[host] = gssapi.SecurityContext(
usage="initiate", flags=gssflags, name=name, creds=self.creds, mech=self.mech
)
gss_stage = "stepping context"
if is_preemptive:
gss_response = self.context[host].step()
else:
gss_response = self.context[host].step(_negotiate_value(response))
return "Negotiate {0}".format(b64encode(gss_response).decode())
except gssapi.exceptions.GSSError as error:
msg = error.gen_message()
log.exception("generate_request_header(): {0} failed:".format(gss_stage))
log.exception(msg)
raise SPNEGOExchangeError("%s failed: %s" % (gss_stage, msg))
def authenticate_user(self, response, **kwargs):
"""Handles user authentication with GSSAPI"""
host = urlparse(response.url).hostname
try:
auth_header = self.generate_request_header(response, host)
except SPNEGOExchangeError:
# GSS Failure, return existing response
return response
log.debug("authenticate_user(): Authorization header: {0}".format(auth_header))
response.request.headers["Authorization"] = auth_header
# Consume the content so we can reuse the connection for the next
# request.
response.content
response.raw.release_conn()
_r = response.connection.send(response.request, **kwargs)
_r.history.append(response)
log.debug("authenticate_user(): returning {0}".format(_r))
return _r
def handle_401(self, response, **kwargs):
"""Handles 401's, attempts to use GSSAPI authentication"""
log.debug("handle_401(): Handling: 401")
if _negotiate_value(response) is not None:
_r = self.authenticate_user(response, **kwargs)
log.debug("handle_401(): returning {0}".format(_r))
return _r
else:
log.debug("handle_401(): GSSAPI is not supported")
log.debug("handle_401(): returning {0}".format(response))
return response
def handle_other(self, response):
"""Handles all responses with the exception of 401s.
This is necessary so that we can authenticate responses if requested"""
log.debug("handle_other(): Handling: %d" % response.status_code)
if self.mutual_authentication not in (REQUIRED, OPTIONAL):
log.debug("handle_other(): returning {0}".format(response))
return response
is_http_error = response.status_code >= 400
if _negotiate_value(response) is not None:
log.debug("handle_other(): Authenticating the server")
if not self.authenticate_server(response):
# Mutual authentication failure when mutual auth is wanted,
# raise an exception so the user doesn't use an untrusted
# response.
log.error("handle_other(): Mutual authentication failed")
raise MutualAuthenticationError("Unable to authenticate {0}".format(response))
# Authentication successful
log.debug("handle_other(): returning {0}".format(response))
return response
elif is_http_error or self.mutual_authentication == OPTIONAL:
if not response.ok:
log.error(
"handle_other(): Mutual authentication unavailable on" " {0} response".format(response.status_code)
)
if self.mutual_authentication == REQUIRED and self.sanitize_mutual_error_response:
return SanitizedResponse(response)
return response
else:
# Unable to attempt mutual authentication when mutual auth is
# required, raise an exception so the user doesn't use an
# untrusted response.
log.error("handle_other(): Mutual authentication failed")
raise MutualAuthenticationError("Unable to authenticate {0}".format(response))
def authenticate_server(self, response):
"""
Uses GSSAPI to authenticate the server.
Returns True on success, False on failure.
"""
log.debug("authenticate_server(): Authenticate header: {0}".format(_negotiate_value(response)))
host = urlparse(response.url).hostname
try:
# If the handshake isn't complete here, nothing we can do
self.context[host].step(_negotiate_value(response))
except gssapi.exceptions.GSSError as error:
log.exception("authenticate_server(): context stepping failed:")
log.exception(error.gen_message())
return False
log.debug("authenticate_server(): returning {0}".format(response))
return True
def handle_response(self, response, **kwargs):
"""Takes the given response and tries GSSAPI auth, as needed."""
num_401s = kwargs.pop("num_401s", 0)
if self.pos is not None:
# Rewind the file position indicator of the body to where
# it was to resend the request.
response.request.body.seek(self.pos)
if response.status_code == 401 and num_401s < 2:
# 401 Unauthorized. Handle it, and if it still comes back as 401,
# that means authentication failed.
_r = self.handle_401(response, **kwargs)
log.debug("handle_response(): returning %s", _r)
log.debug("handle_response() has seen %d 401 responses", num_401s)
num_401s += 1
return self.handle_response(_r, num_401s=num_401s, **kwargs)
elif response.status_code == 401 and num_401s >= 2:
# Still receiving 401 responses after attempting to handle them.
# Authentication has failed. Return the 401 response.
log.debug("handle_response(): returning 401 %s", response)
return response
_r = self.handle_other(response)
log.debug("handle_response(): returning %s", _r)
return _r
def deregister(self, response):
"""Deregisters the response handler"""
response.request.deregister_hook("response", self.handle_response)
def __call__(self, request):
if self.opportunistic_auth:
# add Authorization header before we receive a 401
# by the 401 handler
host = urlparse(request.url).hostname
try:
auth_header = self.generate_request_header(None, host, is_preemptive=True)
log.debug("HTTPSPNEGOAuth: Preemptive Authorization header: {0}".format(auth_header))
except SPNEGOExchangeError as exc:
log.warning(
"HTTPSPNEGOAuth: Opportunistic auth failed with %s ->"
" sending request without adding Authorization header."
" Will try again if it results in a 401.",
exc,
)
else:
log.debug("HTTPSPNEGOAuth: Added opportunistic auth header")
request.headers["Authorization"] = auth_header
request.register_hook("response", self.handle_response)
try:
self.pos = request.body.tell()
except AttributeError:
# In the case of HTTPSPNEGOAuth being reused and the body
# of the previous request was a file-like object, pos has
# the file position of the previous body. Ensure it's set to
# None.
self.pos = None
return request