command-authenticator.cpp
Go to the documentation of this file.
1 /* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
2 /*
3  * Copyright (c) 2014-2022, Regents of the University of California,
4  * Arizona Board of Regents,
5  * Colorado State University,
6  * University Pierre & Marie Curie, Sorbonne University,
7  * Washington University in St. Louis,
8  * Beijing Institute of Technology,
9  * The University of Memphis.
10  *
11  * This file is part of NFD (Named Data Networking Forwarding Daemon).
12  * See AUTHORS.md for complete list of NFD authors and contributors.
13  *
14  * NFD is free software: you can redistribute it and/or modify it under the terms
15  * of the GNU General Public License as published by the Free Software Foundation,
16  * either version 3 of the License, or (at your option) any later version.
17  *
18  * NFD is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
19  * without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
20  * PURPOSE. See the GNU General Public License for more details.
21  *
22  * You should have received a copy of the GNU General Public License along with
23  * NFD, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
24  */
25 
27 #include "common/logger.hpp"
28 
29 #include <ndn-cxx/tag.hpp>
30 #include <ndn-cxx/security/certificate-fetcher-offline.hpp>
31 #include <ndn-cxx/security/certificate-request.hpp>
32 #include <ndn-cxx/security/validation-policy.hpp>
33 #include <ndn-cxx/security/validation-policy-accept-all.hpp>
34 #include <ndn-cxx/security/validation-policy-command-interest.hpp>
35 #include <ndn-cxx/util/io.hpp>
36 
37 #include <boost/filesystem.hpp>
38 
39 namespace security = ndn::security;
40 
41 namespace nfd {
42 
43 NFD_LOG_INIT(CommandAuthenticator);
44 // INFO: configuration change, etc
45 // DEBUG: per authentication request result
46 
50 using SignerTag = ndn::SimpleTag<Name, 20>;
51 
55 static std::optional<std::string>
56 getSignerFromTag(const Interest& interest)
57 {
58  auto signerTag = interest.getTag<SignerTag>();
59  if (signerTag == nullptr) {
60  return std::nullopt;
61  }
62  else {
63  return signerTag->get().toUri();
64  }
65 }
66 
70 class CommandAuthenticatorValidationPolicy final : public security::ValidationPolicy
71 {
72 public:
73  void
74  checkPolicy(const Interest& interest, const shared_ptr<security::ValidationState>& state,
75  const ValidationContinuation& continueValidation) final
76  {
77  auto sigInfo = getSignatureInfo(interest, *state);
78  if (!state->getOutcome()) { // already failed
79  return;
80  }
81  Name klName = getKeyLocatorName(sigInfo, *state);
82  if (!state->getOutcome()) { // already failed
83  return;
84  }
85 
86  // SignerTag must be placed on the 'original Interest' in ValidationState to be available for
87  // InterestValidationSuccessCallback. The 'interest' parameter refers to a different instance
88  // which is copied into 'original Interest'.
89  auto state1 = dynamic_pointer_cast<security::InterestValidationState>(state);
90  state1->getOriginalInterest().setTag(make_shared<SignerTag>(klName));
91 
92  continueValidation(make_shared<security::CertificateRequest>(klName), state);
93  }
94 
95  void
96  checkPolicy(const Data&, const shared_ptr<security::ValidationState>&,
97  const ValidationContinuation&) final
98  {
99  // Non-certificate Data are not handled by CommandAuthenticator.
100  // Non-anchor certificates cannot be retrieved by offline fetcher.
101  BOOST_ASSERT_MSG(false, "Data should not be passed to this policy");
102  }
103 };
104 
105 shared_ptr<CommandAuthenticator>
107 {
108  return shared_ptr<CommandAuthenticator>(new CommandAuthenticator);
109 }
110 
111 CommandAuthenticator::CommandAuthenticator() = default;
112 
113 void
115 {
116  configFile.addSectionHandler("authorizations", [this] (auto&&... args) {
117  processConfig(std::forward<decltype(args)>(args)...);
118  });
119 }
120 
121 void
122 CommandAuthenticator::processConfig(const ConfigSection& section, bool isDryRun, const std::string& filename)
123 {
124  if (!isDryRun) {
125  NFD_LOG_DEBUG("resetting authorizations");
126  for (auto& kv : m_validators) {
127  kv.second = make_shared<security::Validator>(
128  make_unique<security::ValidationPolicyCommandInterest>(make_unique<CommandAuthenticatorValidationPolicy>()),
129  make_unique<security::CertificateFetcherOffline>());
130  }
131  }
132 
133  if (section.empty()) {
134  NDN_THROW(ConfigFile::Error("'authorize' is missing under 'authorizations'"));
135  }
136 
137  int authSectionIndex = 0;
138  for (const auto& [sectionName, authSection] : section) {
139  if (sectionName != "authorize") {
140  NDN_THROW(ConfigFile::Error("'" + sectionName + "' section is not permitted under 'authorizations'"));
141  }
142 
143  std::string certfile;
144  try {
145  certfile = authSection.get<std::string>("certfile");
146  }
147  catch (const boost::property_tree::ptree_error&) {
148  NDN_THROW(ConfigFile::Error("'certfile' is missing under authorize[" +
149  to_string(authSectionIndex) + "]"));
150  }
151 
152  bool isAny = false;
153  shared_ptr<security::Certificate> cert;
154  if (certfile == "any") {
155  isAny = true;
156  NFD_LOG_WARN("'certfile any' is intended for demo purposes only and "
157  "SHOULD NOT be used in production environments");
158  }
159  else {
160  using namespace boost::filesystem;
161  path certfilePath = absolute(certfile, path(filename).parent_path());
162  cert = ndn::io::load<security::Certificate>(certfilePath.string());
163  if (cert == nullptr) {
164  NDN_THROW(ConfigFile::Error("cannot load certfile " + certfilePath.string() +
165  " for authorize[" + to_string(authSectionIndex) + "]"));
166  }
167  }
168 
169  const ConfigSection* privSection = nullptr;
170  try {
171  privSection = &authSection.get_child("privileges");
172  }
173  catch (const boost::property_tree::ptree_error&) {
174  NDN_THROW(ConfigFile::Error("'privileges' is missing under authorize[" +
175  to_string(authSectionIndex) + "]"));
176  }
177 
178  if (privSection->empty()) {
179  NFD_LOG_WARN("No privileges granted to certificate " << certfile);
180  }
181  for (const auto& kv : *privSection) {
182  const std::string& module = kv.first;
183  auto found = m_validators.find(module);
184  if (found == m_validators.end()) {
185  NDN_THROW(ConfigFile::Error("unknown module '" + module +
186  "' under authorize[" + to_string(authSectionIndex) + "]"));
187  }
188 
189  if (isDryRun) {
190  continue;
191  }
192 
193  if (isAny) {
194  found->second = make_shared<security::Validator>(make_unique<security::ValidationPolicyAcceptAll>(),
195  make_unique<security::CertificateFetcherOffline>());
196  NFD_LOG_INFO("authorize module=" << module << " signer=any");
197  }
198  else {
199  const Name& keyName = cert->getKeyName();
200  security::Certificate certCopy = *cert;
201  found->second->loadAnchor(certfile, std::move(certCopy));
202  NFD_LOG_INFO("authorize module=" << module << " signer=" << keyName << " certfile=" << certfile);
203  }
204  }
205 
206  ++authSectionIndex;
207  }
208 }
209 
210 ndn::mgmt::Authorization
211 CommandAuthenticator::makeAuthorization(const std::string& module, const std::string& verb)
212 {
213  m_validators[module]; // declares module, so that privilege is recognized
214 
215  return [module, self = shared_from_this()] (const Name&, const Interest& interest,
216  const ndn::mgmt::ControlParameters*,
217  const ndn::mgmt::AcceptContinuation& accept,
218  const ndn::mgmt::RejectContinuation& reject) {
219  auto validator = self->m_validators.at(module);
220 
221  auto successCb = [accept, validator] (const Interest& interest1) {
222  auto signer1 = getSignerFromTag(interest1);
223  BOOST_ASSERT(signer1 || // signer must be available unless 'certfile any'
224  dynamic_cast<security::ValidationPolicyAcceptAll*>(&validator->getPolicy()) != nullptr);
225  std::string signer = signer1.value_or("*");
226  NFD_LOG_DEBUG("accept " << interest1.getName() << " signer=" << signer);
227  accept(signer);
228  };
229 
230  using ndn::security::ValidationError;
231  auto failureCb = [reject] (const Interest& interest1, const ValidationError& err) {
232  auto reply = ndn::mgmt::RejectReply::STATUS403;
233  if (err.getCode() == ValidationError::MALFORMED_SIGNATURE ||
234  err.getCode() == ValidationError::INVALID_KEY_LOCATOR) {
235  // do not waste cycles signing and sending a reply if the command is clearly malformed
236  reply = ndn::mgmt::RejectReply::SILENT;
237  }
238  NFD_LOG_DEBUG("reject " << interest1.getName() << " signer=" <<
239  getSignerFromTag(interest1).value_or("?") << " reason=" << err);
240  reject(reply);
241  };
242 
243  if (validator) {
244  validator->validate(interest, successCb, failureCb);
245  }
246  else {
247  NFD_LOG_DEBUG("reject " << interest.getName() << " signer=" <<
248  getSignerFromTag(interest).value_or("?") << " reason=Unauthorized");
249  reject(ndn::mgmt::RejectReply::STATUS403);
250  }
251  };
252 }
253 
254 } // namespace nfd
Provides ControlCommand authorization according to NFD's configuration file.
ndn::mgmt::Authorization makeAuthorization(const std::string &module, const std::string &verb)
Returns an Authorization function for module/verb command.
void setConfigFile(ConfigFile &configFile)
static shared_ptr< CommandAuthenticator > create()
Configuration file parsing utility.
Definition: config-file.hpp:63
void addSectionHandler(const std::string &sectionName, ConfigSectionHandler subscriber)
Setup notification of configuration file sections.
Definition: config-file.cpp:77
#define NFD_LOG_INFO
Definition: logger.hpp:39
#define NFD_LOG_INIT(name)
Definition: logger.hpp:31
#define NFD_LOG_WARN
Definition: logger.hpp:40
#define NFD_LOG_DEBUG
Definition: logger.hpp:38
Definition: common.hpp:77
ndn::SimpleTag< Name, 20 > SignerTag
An Interest tag to store the command signer.
boost::property_tree::ptree ConfigSection
A configuration file section.
Definition: config-file.hpp:38
static std::optional< std::string > getSignerFromTag(const Interest &interest)
Obtain signer from a SignerTag attached to interest, if available.