import base64 import binascii import hashlib import hmac import logging import os import time import socket import struct import sys from urllib.parse import quote import gssapi import ldap from flask import Flask, request, redirect, url_for, Response from gssapi.exceptions import GSSError, GeneralError app = Flask(__name__) app.logger.setLevel(logging.INFO) timestamp = struct.Struct('!q') hmac_digest = hashlib.sha512 digest_size = hmac_digest().digest_size HMAC_KEY = os.environ['KRBAUTH_HMAC_KEY'].encode('utf-8') DURATION = int(os.environ.get('KRBAUTH_KEY_DURATION', 3600)) RANDOM_SIZE = int(os.environ.get('KRBAUTH_RANDOM_SIZE', 32)) LDAP_SERVER = os.environ['KRBAUTH_LDAP_SERVER'] LDAP_BIND_DN = os.environ.get('KRBAUTH_LDAP_BIND_DN') LDAP_BIND_AUTHTOK = os.environ.get('KRBAUTH_LDAP_BIND_AUTHTOK') LDAP_SEARCH_BASE = os.environ['KRBAUTH_LDAP_SEARCH_BASE'] GSSAPI_NAME = os.environ.get('KRBAUTH_GSSAPI_NAME') if GSSAPI_NAME: gssapi_name = gssapi.Name(GSSAPI_NAME, gssapi.NameType.hostbased_service) gssapi_creds = gssapi.Credentials(name=gssapi_name, usage='accept') else: gssapi_creds = None COOKIE_SECURE = os.environ.get('KRBAUTH_SECURE_COOKIE', '1').lower() not in ('0', 'no') class Context: def __init__(self, ldap_group): self.ldap_group = ldap_group @classmethod def from_request(cls): return cls(ldap_group=request.environ.get('KRBAUTH_LDAP_GROUP')) def bytes(self): return ''.join([self.ldap_group]).encode('utf-8') def make_cookie(context): message = timestamp.pack(int(time.time()) + DURATION) + os.urandom(RANDOM_SIZE) + context.bytes() signature = hmac.new(HMAC_KEY, message, hmac_digest).digest() return base64.b64encode(signature + message) def verify_cookie(cookie, context): if not cookie: return False try: data = base64.b64decode(cookie) signature = data[:digest_size] message = data[digest_size:] ts = timestamp.unpack(message[:timestamp.size])[0] except (struct.error, binascii.Error): return False if ts < time.time(): return False if not hmac.compare_digest(message[timestamp.size + RANDOM_SIZE:], context.bytes()): return False expected = hmac.new(HMAC_KEY, message, hashlib.sha512).digest() return hmac.compare_digest(expected, signature) def make_401(reason, context, auth='Negotiate', krb5_name=None): app.logger.info('Returning unauthorized: %s (krb5_name=%s, ldap_group=%s)', reason, krb5_name, context.ldap_group) return Response('''\