123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276 |
- "use strict";
- Object.defineProperty(exports, "__esModule", { value: true });
- exports.ScramSHA256 = exports.ScramSHA1 = void 0;
- const crypto = require("crypto");
- const bson_1 = require("../../bson");
- const deps_1 = require("../../deps");
- const error_1 = require("../../error");
- const utils_1 = require("../../utils");
- const auth_provider_1 = require("./auth_provider");
- const providers_1 = require("./providers");
- class ScramSHA extends auth_provider_1.AuthProvider {
- constructor(cryptoMethod) {
- super();
- this.cryptoMethod = cryptoMethod || 'sha1';
- }
- prepare(handshakeDoc, authContext, callback) {
- const cryptoMethod = this.cryptoMethod;
- const credentials = authContext.credentials;
- if (!credentials) {
- return callback(new error_1.MongoMissingCredentialsError('AuthContext must provide credentials.'));
- }
- if (cryptoMethod === 'sha256' && deps_1.saslprep == null) {
- (0, utils_1.emitWarning)('Warning: no saslprep library specified. Passwords will not be sanitized');
- }
- crypto.randomBytes(24, (err, nonce) => {
- if (err) {
- return callback(err);
- }
- // store the nonce for later use
- Object.assign(authContext, { nonce });
- const request = Object.assign({}, handshakeDoc, {
- speculativeAuthenticate: Object.assign(makeFirstMessage(cryptoMethod, credentials, nonce), {
- db: credentials.source
- })
- });
- callback(undefined, request);
- });
- }
- auth(authContext, callback) {
- const response = authContext.response;
- if (response && response.speculativeAuthenticate) {
- continueScramConversation(this.cryptoMethod, response.speculativeAuthenticate, authContext, callback);
- return;
- }
- executeScram(this.cryptoMethod, authContext, callback);
- }
- }
- function cleanUsername(username) {
- return username.replace('=', '=3D').replace(',', '=2C');
- }
- function clientFirstMessageBare(username, nonce) {
- // NOTE: This is done b/c Javascript uses UTF-16, but the server is hashing in UTF-8.
- // Since the username is not sasl-prep-d, we need to do this here.
- return Buffer.concat([
- Buffer.from('n=', 'utf8'),
- Buffer.from(username, 'utf8'),
- Buffer.from(',r=', 'utf8'),
- Buffer.from(nonce.toString('base64'), 'utf8')
- ]);
- }
- function makeFirstMessage(cryptoMethod, credentials, nonce) {
- const username = cleanUsername(credentials.username);
- const mechanism = cryptoMethod === 'sha1' ? providers_1.AuthMechanism.MONGODB_SCRAM_SHA1 : providers_1.AuthMechanism.MONGODB_SCRAM_SHA256;
- // NOTE: This is done b/c Javascript uses UTF-16, but the server is hashing in UTF-8.
- // Since the username is not sasl-prep-d, we need to do this here.
- return {
- saslStart: 1,
- mechanism,
- payload: new bson_1.Binary(Buffer.concat([Buffer.from('n,,', 'utf8'), clientFirstMessageBare(username, nonce)])),
- autoAuthorize: 1,
- options: { skipEmptyExchange: true }
- };
- }
- function executeScram(cryptoMethod, authContext, callback) {
- const { connection, credentials } = authContext;
- if (!credentials) {
- return callback(new error_1.MongoMissingCredentialsError('AuthContext must provide credentials.'));
- }
- if (!authContext.nonce) {
- return callback(new error_1.MongoInvalidArgumentError('AuthContext must contain a valid nonce property'));
- }
- const nonce = authContext.nonce;
- const db = credentials.source;
- const saslStartCmd = makeFirstMessage(cryptoMethod, credentials, nonce);
- connection.command((0, utils_1.ns)(`${db}.$cmd`), saslStartCmd, undefined, (_err, result) => {
- const err = resolveError(_err, result);
- if (err) {
- return callback(err);
- }
- continueScramConversation(cryptoMethod, result, authContext, callback);
- });
- }
- function continueScramConversation(cryptoMethod, response, authContext, callback) {
- const connection = authContext.connection;
- const credentials = authContext.credentials;
- if (!credentials) {
- return callback(new error_1.MongoMissingCredentialsError('AuthContext must provide credentials.'));
- }
- if (!authContext.nonce) {
- return callback(new error_1.MongoInvalidArgumentError('Unable to continue SCRAM without valid nonce'));
- }
- const nonce = authContext.nonce;
- const db = credentials.source;
- const username = cleanUsername(credentials.username);
- const password = credentials.password;
- let processedPassword;
- if (cryptoMethod === 'sha256') {
- processedPassword = 'kModuleError' in deps_1.saslprep ? password : (0, deps_1.saslprep)(password);
- }
- else {
- try {
- processedPassword = passwordDigest(username, password);
- }
- catch (e) {
- return callback(e);
- }
- }
- const payload = Buffer.isBuffer(response.payload)
- ? new bson_1.Binary(response.payload)
- : response.payload;
- const dict = parsePayload(payload.value());
- const iterations = parseInt(dict.i, 10);
- if (iterations && iterations < 4096) {
- callback(
- // TODO(NODE-3483)
- new error_1.MongoRuntimeError(`Server returned an invalid iteration count ${iterations}`), false);
- return;
- }
- const salt = dict.s;
- const rnonce = dict.r;
- if (rnonce.startsWith('nonce')) {
- // TODO(NODE-3483)
- callback(new error_1.MongoRuntimeError(`Server returned an invalid nonce: ${rnonce}`), false);
- return;
- }
- // Set up start of proof
- const withoutProof = `c=biws,r=${rnonce}`;
- const saltedPassword = HI(processedPassword, Buffer.from(salt, 'base64'), iterations, cryptoMethod);
- const clientKey = HMAC(cryptoMethod, saltedPassword, 'Client Key');
- const serverKey = HMAC(cryptoMethod, saltedPassword, 'Server Key');
- const storedKey = H(cryptoMethod, clientKey);
- const authMessage = [clientFirstMessageBare(username, nonce), payload.value(), withoutProof].join(',');
- const clientSignature = HMAC(cryptoMethod, storedKey, authMessage);
- const clientProof = `p=${xor(clientKey, clientSignature)}`;
- const clientFinal = [withoutProof, clientProof].join(',');
- const serverSignature = HMAC(cryptoMethod, serverKey, authMessage);
- const saslContinueCmd = {
- saslContinue: 1,
- conversationId: response.conversationId,
- payload: new bson_1.Binary(Buffer.from(clientFinal))
- };
- connection.command((0, utils_1.ns)(`${db}.$cmd`), saslContinueCmd, undefined, (_err, r) => {
- const err = resolveError(_err, r);
- if (err) {
- return callback(err);
- }
- const parsedResponse = parsePayload(r.payload.value());
- if (!compareDigest(Buffer.from(parsedResponse.v, 'base64'), serverSignature)) {
- callback(new error_1.MongoRuntimeError('Server returned an invalid signature'));
- return;
- }
- if (!r || r.done !== false) {
- return callback(err, r);
- }
- const retrySaslContinueCmd = {
- saslContinue: 1,
- conversationId: r.conversationId,
- payload: Buffer.alloc(0)
- };
- connection.command((0, utils_1.ns)(`${db}.$cmd`), retrySaslContinueCmd, undefined, callback);
- });
- }
- function parsePayload(payload) {
- const dict = {};
- const parts = payload.split(',');
- for (let i = 0; i < parts.length; i++) {
- const valueParts = parts[i].split('=');
- dict[valueParts[0]] = valueParts[1];
- }
- return dict;
- }
- function passwordDigest(username, password) {
- if (typeof username !== 'string') {
- throw new error_1.MongoInvalidArgumentError('Username must be a string');
- }
- if (typeof password !== 'string') {
- throw new error_1.MongoInvalidArgumentError('Password must be a string');
- }
- if (password.length === 0) {
- throw new error_1.MongoInvalidArgumentError('Password cannot be empty');
- }
- const md5 = crypto.createHash('md5');
- md5.update(`${username}:mongo:${password}`, 'utf8');
- return md5.digest('hex');
- }
- // XOR two buffers
- function xor(a, b) {
- if (!Buffer.isBuffer(a)) {
- a = Buffer.from(a);
- }
- if (!Buffer.isBuffer(b)) {
- b = Buffer.from(b);
- }
- const length = Math.max(a.length, b.length);
- const res = [];
- for (let i = 0; i < length; i += 1) {
- res.push(a[i] ^ b[i]);
- }
- return Buffer.from(res).toString('base64');
- }
- function H(method, text) {
- return crypto.createHash(method).update(text).digest();
- }
- function HMAC(method, key, text) {
- return crypto.createHmac(method, key).update(text).digest();
- }
- let _hiCache = {};
- let _hiCacheCount = 0;
- function _hiCachePurge() {
- _hiCache = {};
- _hiCacheCount = 0;
- }
- const hiLengthMap = {
- sha256: 32,
- sha1: 20
- };
- function HI(data, salt, iterations, cryptoMethod) {
- // omit the work if already generated
- const key = [data, salt.toString('base64'), iterations].join('_');
- if (_hiCache[key] != null) {
- return _hiCache[key];
- }
- // generate the salt
- const saltedData = crypto.pbkdf2Sync(data, salt, iterations, hiLengthMap[cryptoMethod], cryptoMethod);
- // cache a copy to speed up the next lookup, but prevent unbounded cache growth
- if (_hiCacheCount >= 200) {
- _hiCachePurge();
- }
- _hiCache[key] = saltedData;
- _hiCacheCount += 1;
- return saltedData;
- }
- function compareDigest(lhs, rhs) {
- if (lhs.length !== rhs.length) {
- return false;
- }
- if (typeof crypto.timingSafeEqual === 'function') {
- return crypto.timingSafeEqual(lhs, rhs);
- }
- let result = 0;
- for (let i = 0; i < lhs.length; i++) {
- result |= lhs[i] ^ rhs[i];
- }
- return result === 0;
- }
- function resolveError(err, result) {
- if (err)
- return err;
- if (result) {
- if (result.$err || result.errmsg)
- return new error_1.MongoServerError(result);
- }
- }
- class ScramSHA1 extends ScramSHA {
- constructor() {
- super('sha1');
- }
- }
- exports.ScramSHA1 = ScramSHA1;
- class ScramSHA256 extends ScramSHA {
- constructor() {
- super('sha256');
- }
- }
- exports.ScramSHA256 = ScramSHA256;
- //# sourceMappingURL=scram.js.map
|