File: sasl.man

package info (click to toggle)
tcllib 1.8-1
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 13,628 kB
  • ctags: 4,897
  • sloc: tcl: 88,012; sh: 7,856; ansic: 4,174; xml: 1,765; yacc: 753; perl: 84; f90: 84; makefile: 60; python: 33; ruby: 13; php: 11
file content (291 lines) | stat: -rw-r--r-- 9,448 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
[comment {-*- tcl -*- doctools manpage}]
[manpage_begin SASL n 1.0.0]
[copyright {2005, Pat Thoyts <patthoyts@users.sourceforge.net>}]
[moddesc {Simple Authentication and Security Layer (SASL)}]
[titledesc {Implementation of SASL mechanisms for Tcl}]
[require Tcl 8.2]
[require SASL [opt 1.0]]
[description]
[para]

The Simple Authentication and Security Layer (SASL) is a framework
for providing authentication and authorization to comunications
protocols. The SASL framework is structured to permit negotiation
among a number of authentication mechanisms. SASL may be used in
SMTP, IMAP and HTTP authentication. It is also in use in XMPP, LDAP
and BEEP. See [sectref MECHANISMS] for the set of available SASL
mechanisms provided with tcllib.

[para]

The SASL framework operates using a simple multi-step challenge
response mechanism. All the mechanisms work the same way although the
number of steps may vary. In this implementation a callback procedure
must be provided from which the SASL framework will obtain users
details. See [sectref "CALLBACK PROCEDURE"] for details of this
procedure.

[section {COMMANDS}]

[list_begin definitions]

[call [cmd "::SASL::new"] [arg "option value [opt ...]"]]

Contruct a new SASL context. See [sectref OPTIONS] for details of the
possible options to this command. A context token is required for most
of the SASL procedures.

[call [cmd "::SASL::configure"] [arg "option value"] [opt [arg "..."]]]

Modify and inspect the SASL context option. See [sectref OPTIONS] for
further details.

[call [cmd "::SASL::step"] [arg "context"] [arg "challenge"] [opt [arg "..."]]]

This is the core procedure for useing the SASL framework. The 
[cmd step] procedure should be called until it returns 0. Each step takes a
server challenge string and the response is calculated and stored in
the context. Each mechanism may require one or more steps. For some
steps there may be no server challenge required in which case an empty
string should be provided for this parameter.

[call [cmd "::SASL::response"] [arg "context"]]

Returns the next response string that should be sent to the server.

[call [cmd "::SASL::reset"] [arg "context"]]

Re-initialize the SASL context. Discards any internal state and
permits the token to be reused.

[call [cmd "::SASL::cleanup"] [arg "context"]]

Release all resources associated with the SASL context. The context
token may not be used again after this procedure has been called.

[call [cmd "::SASL::mechanisms"]]

Returns a list of all the available SASL mechanisms. The list is
sorted by the mechanism preference value (see [cmd register]) with the
preferred mechanisms and the head of the list.

[call [cmd "::SASL::register"] [arg "mechanism"] [arg "preference"] \
  [arg "clientproc"] [opt [arg "serverproc"]]]

New mechanisms can be added to the package by registering the
mechanism name and the implementing procedures. The server procedure
is optional. The preference value is an integer that is used to order
the list returned by the [cmd mechanisms] command. Higher values
indicate a preferred mechanism.

[list_end]



[section "OPTIONS"]

[list_begin definitions]

[lst_item [option "-callback"]]

Specify a command to be evaluated when the SASL mechanism requires
information about the user. The command is called with the current
SASL context and a name specifying the information desired. See
[sectref EXAMPLES].

[lst_item [option "-mechanism"]]

Set the SASL mechanism to be used. See [cmd mechanisms] for a list of
supported authentication mechanisms.

[lst_item [option "-service"]]

Set the service type for this context. Some mechanisms may make use of
this parameter (eg DIGEST-MD5, GSSAPI and Kerberos). If not set it
defaults to an empty string. If the [option -type] is set to 'server'
then this option should be set to a valid service identity. Some
examples of valid service names are smtp, ldap, beep and xmpp.

[lst_item [option "-server"]]

This option is used to set the server name used in SASL challenges
when operating as a SASL server.

[lst_item [option "-type"]]

The context type may be one of 'client' or 'server'. The default is to
operate as a client application and respond to server
challenges. Mechanisms may be written to support server-side SASL and
setting this option will cause each [cmd step] to issue the next
challenge. A new context must be created for each incoming client
connection when in server mode.

[list_end]



[section "CALLBACK PROCEDURE"]

When the SASL framework requires any user details it will call the
procedure provided when the context was created with an argument that
specfies the item of information required.
[para]
In all cases a single response string should be returned.

[list_begin definitions]

[lst_item "login"]

The callback procedure should return the users authorization identity.
Return an empty string unless this is to be different to the authentication
identity. Read [lb]1[rb] for a discussion about the specific meaning of
authorization and authentication identities within SASL.

[lst_item "username"]

The callback procedure should return the users authentication identity.
Read [lb]1[rb] for a discussion about the specific meaning of
authorization and authentication identities within SASL.

[lst_item "password"]

The callback procedure should return the password that matches the
authentication identity as used within the current realm.

[lst_item "realm"]

Some SASL mechanisms use realms to partition authentication identities.
The realm string is protocol dependent and is often the current DNS
domain or in NTLM the Windows domain name.

[lst_item "hostname"]

Returns the client host name - typically [lb]info host[rb].

[list_end]



[section "MECHANISMS"]

[list_begin definitions]

[lst_item "ANONYMOUS"]

As used in FTP this mechanism only passes an email address for
authentication. The ANONYMOUS mechanism is specified in [lb]2[rb].

[lst_item "PLAIN"]

This is the simplest mechanism. The users authentication details are
transmitted in plain text. This mechanism should not be provided
unless an encrypted link is in use - typically after SSL or TLS has
been negotiated.

[lst_item "LOGIN"]

The LOGIN [lb]1[rb] mechanism transmits the users details with base64
encoding. This is no more secure than PLAIN and likewise should not be
used without a secure link.

[lst_item "CRAM-MD5"]

This mechanism avoids sending the users password over the network in
plain text by hashing the password with a server provided random value
(known as a nonce). A disadvantage of this mechanism is that the
server must maintain a database of plaintext passwords for
comparison. CRAM-MD5 was defined in [lb]4[rb].

[lst_item "DIGEST-MD5"]

This mechanism improves upon the CRAM-MD5 mechanism by avoiding the
need for the server to store plaintext passwords. With digest
authentication the server needs to store the MD5 digest of the users
password which helps to make the system more secure. As in CRAM-MD5
the password is hashed with a server nonce and other data before being
transmitted across the network. Specified in [lb]3[rb].

[lst_item "NTLM"]

This is a proprietary protocol developed by Microsoft [lb]5[rb] and is
in common use for authenticating users in a Windows network
environment. NTLM uses DES encryption and MD4 digests of the users
password to authenticate a connection. Certain weaknesses have been
found in NTLM and thus there are a number of versions of the protocol.

[list_end]



[section "EXAMPLES"]

See the examples subdirectory for more complete samples using SASL
with network protocols. The following should give an idea how the SASL
commands are to be used. In reality this should be event
driven. Each time the [cmd step] command is called, the last server
response should be provided as the command argument so that the SASL
mechanism can take approriate action.

[example {
proc Callback {context command args} {
    switch -exact -- $command {
        login    { return "" }
        username { return $::tcl_platform(user) }
        password { return "SecRet" }
        realm    { return "" }
        hostname { return [info host] }
        default  { return -code error unxpected }
    }
}

proc Demo {{mech PLAIN}} {
    set ctx [SASL::new -mechanism $mech -callback Callback]
    set challenge ""
    while {1} {
        set more_steps [SASL::step $ctx challenge]
        puts "Send '[SASL::response $ctx]'"
        puts "Read server response into challenge var"
        if {!$more_steps} {break}
    }
    SASL::cleanup $ctx
}
}]

[section "REFERENCES"]

[list_begin enum]

[enum]
    Myers, J. "Simple Authentication and Security Layer (SASL)",
    RFC 2222, October 1997.
    ([uri http://www.ietf.org/rfc/rfc2222.txt])

[enum]
    Newman, C. "Anonymous SASL Mechanism",
    RFC 2245, November 1997.
    ([uri http://www.ietf.org/rfc/rfc2245.txt])

[enum]
    Leach, P., Newman, C. "Using Digest Authentication as a SASL
    Mechanism", RFC 2831, May 2000,
    ([uri http://www.ietf.org/rfc/rfc2831.txt])

[enum]
    Klensin, J., Catoe, R. and Krumviede, P.,
    "IMAP/POP AUTHorize Extension for Simple Challenge/Response"
    RFC 2195, September 1997.
    ([uri http://www.ietf.org/rfc/rfc2195.txt])

[enum]
    No official specification is available. However,
    [uri http://davenport.sourceforge.net/ntlm.html] provides a good
    description.

[list_end]

[section AUTHORS]
Pat Thoyts

[keywords SASL authentication]
[manpage_end]