Blame SOURCES/In-FIPS-mode-add-plaintext-fallback-for-RC4-usages-a.patch

d738b9
From c1f14d371be42cbe851c573d26e425ebecc2ea35 Mon Sep 17 00:00:00 2001
d738b9
From: Robbie Harwood <rharwood@redhat.com>
d738b9
Date: Tue, 31 Jul 2018 13:47:26 -0400
d738b9
Subject: [PATCH] In FIPS mode, add plaintext fallback for RC4 usages and taint
d738b9
d738b9
---
d738b9
 src/lib/krad/attr.c      | 38 ++++++++++++++++++++++++++++----------
d738b9
 src/lib/krad/attrset.c   |  5 +++--
d738b9
 src/lib/krad/internal.h  | 13 +++++++++++--
d738b9
 src/lib/krad/packet.c    | 18 +++++++++---------
d738b9
 src/lib/krad/remote.c    | 10 ++++++++--
d738b9
 src/lib/krad/t_attr.c    |  3 ++-
d738b9
 src/lib/krad/t_attrset.c |  4 +++-
d738b9
 7 files changed, 64 insertions(+), 27 deletions(-)
d738b9
d738b9
diff --git a/src/lib/krad/attr.c b/src/lib/krad/attr.c
d738b9
index 9c13d9d75..f96153e2e 100644
d738b9
--- a/src/lib/krad/attr.c
d738b9
+++ b/src/lib/krad/attr.c
d738b9
@@ -38,7 +38,8 @@
d738b9
 typedef krb5_error_code
d738b9
 (*attribute_transform_fn)(krb5_context ctx, const char *secret,
d738b9
                           const unsigned char *auth, const krb5_data *in,
d738b9
-                          unsigned char outbuf[MAX_ATTRSIZE], size_t *outlen);
d738b9
+                          unsigned char outbuf[MAX_ATTRSIZE], size_t *outlen,
d738b9
+                          krb5_boolean *is_fips);
d738b9
 
d738b9
 typedef struct {
d738b9
     const char *name;
d738b9
@@ -51,12 +52,14 @@ typedef struct {
d738b9
 static krb5_error_code
d738b9
 user_password_encode(krb5_context ctx, const char *secret,
d738b9
                      const unsigned char *auth, const krb5_data *in,
d738b9
-                     unsigned char outbuf[MAX_ATTRSIZE], size_t *outlen);
d738b9
+                     unsigned char outbuf[MAX_ATTRSIZE], size_t *outlen,
d738b9
+                     krb5_boolean *is_fips);
d738b9
 
d738b9
 static krb5_error_code
d738b9
 user_password_decode(krb5_context ctx, const char *secret,
d738b9
                      const unsigned char *auth, const krb5_data *in,
d738b9
-                     unsigned char outbuf[MAX_ATTRSIZE], size_t *outlen);
d738b9
+                     unsigned char outbuf[MAX_ATTRSIZE], size_t *outlen,
d738b9
+                     krb5_boolean *ignored);
d738b9
 
d738b9
 static const attribute_record attributes[UCHAR_MAX] = {
d738b9
     {"User-Name", 1, MAX_ATTRSIZE, NULL, NULL},
d738b9
@@ -128,7 +131,8 @@ static const attribute_record attributes[UCHAR_MAX] = {
d738b9
 static krb5_error_code
d738b9
 user_password_encode(krb5_context ctx, const char *secret,
d738b9
                      const unsigned char *auth, const krb5_data *in,
d738b9
-                     unsigned char outbuf[MAX_ATTRSIZE], size_t *outlen)
d738b9
+                     unsigned char outbuf[MAX_ATTRSIZE], size_t *outlen,
d738b9
+                     krb5_boolean *is_fips)
d738b9
 {
d738b9
     const unsigned char *indx;
d738b9
     krb5_error_code retval;
d738b9
@@ -156,7 +160,12 @@ user_password_encode(krb5_context ctx, const char *secret,
d738b9
 
d738b9
         retval = krb5_c_make_checksum(ctx, CKSUMTYPE_RSA_MD5, NULL, 0, &tmp,
d738b9
                                       &sum);
d738b9
-        if (retval != 0) {
d738b9
+        if (retval == ENOMEM) {
d738b9
+            /* I'm Linux, so we know this is a FIPS failure.  RSA_MD5 doesn't
d738b9
+             * provide security so let's move on. */
d738b9
+            *is_fips = TRUE;
d738b9
+            sum.contents = calloc(1, BLOCKSIZE);
d738b9
+        } else if (retval != 0) {
d738b9
             zap(tmp.data, tmp.length);
d738b9
             zap(outbuf, len);
d738b9
             krb5_free_data_contents(ctx, &tmp);
d738b9
@@ -180,7 +189,8 @@ user_password_encode(krb5_context ctx, const char *secret,
d738b9
 static krb5_error_code
d738b9
 user_password_decode(krb5_context ctx, const char *secret,
d738b9
                      const unsigned char *auth, const krb5_data *in,
d738b9
-                     unsigned char outbuf[MAX_ATTRSIZE], size_t *outlen)
d738b9
+                     unsigned char outbuf[MAX_ATTRSIZE], size_t *outlen,
d738b9
+                     krb5_boolean *is_fips)
d738b9
 {
d738b9
     const unsigned char *indx;
d738b9
     krb5_error_code retval;
d738b9
@@ -206,7 +216,12 @@ user_password_decode(krb5_context ctx, const char *secret,
d738b9
 
d738b9
         retval = krb5_c_make_checksum(ctx, CKSUMTYPE_RSA_MD5, NULL, 0,
d738b9
                                       &tmp, &sum);
d738b9
-        if (retval != 0) {
d738b9
+        if (retval == ENOMEM) {
d738b9
+            /* I'm Linux, so we know this is a FIPS failure.  Assume the
d738b9
+             * other side is running locally and move on. */
d738b9
+            *is_fips = TRUE;
d738b9
+            sum.contents = calloc(1, BLOCKSIZE);
d738b9
+        } else if (retval != 0) {
d738b9
             zap(tmp.data, tmp.length);
d738b9
             zap(outbuf, in->length);
d738b9
             krb5_free_data_contents(ctx, &tmp);
d738b9
@@ -248,7 +263,7 @@ krb5_error_code
d738b9
 kr_attr_encode(krb5_context ctx, const char *secret,
d738b9
                const unsigned char *auth, krad_attr type,
d738b9
                const krb5_data *in, unsigned char outbuf[MAX_ATTRSIZE],
d738b9
-               size_t *outlen)
d738b9
+               size_t *outlen, krb5_boolean *is_fips)
d738b9
 {
d738b9
     krb5_error_code retval;
d738b9
 
d738b9
@@ -265,7 +280,8 @@ kr_attr_encode(krb5_context ctx, const char *secret,
d738b9
         return 0;
d738b9
     }
d738b9
 
d738b9
-    return attributes[type - 1].encode(ctx, secret, auth, in, outbuf, outlen);
d738b9
+    return attributes[type - 1].encode(ctx, secret, auth, in, outbuf, outlen,
d738b9
+                                       is_fips);
d738b9
 }
d738b9
 
d738b9
 krb5_error_code
d738b9
@@ -274,6 +290,7 @@ kr_attr_decode(krb5_context ctx, const char *secret, const unsigned char *auth,
d738b9
                unsigned char outbuf[MAX_ATTRSIZE], size_t *outlen)
d738b9
 {
d738b9
     krb5_error_code retval;
d738b9
+    krb5_boolean ignored;
d738b9
 
d738b9
     retval = kr_attr_valid(type, in);
d738b9
     if (retval != 0)
d738b9
@@ -288,7 +305,8 @@ kr_attr_decode(krb5_context ctx, const char *secret, const unsigned char *auth,
d738b9
         return 0;
d738b9
     }
d738b9
 
d738b9
-    return attributes[type - 1].decode(ctx, secret, auth, in, outbuf, outlen);
d738b9
+    return attributes[type - 1].decode(ctx, secret, auth, in, outbuf, outlen,
d738b9
+                                       &ignored);
d738b9
 }
d738b9
 
d738b9
 krad_attr
d738b9
diff --git a/src/lib/krad/attrset.c b/src/lib/krad/attrset.c
d738b9
index 03c613716..d89982a13 100644
d738b9
--- a/src/lib/krad/attrset.c
d738b9
+++ b/src/lib/krad/attrset.c
d738b9
@@ -167,7 +167,8 @@ krad_attrset_copy(const krad_attrset *set, krad_attrset **copy)
d738b9
 krb5_error_code
d738b9
 kr_attrset_encode(const krad_attrset *set, const char *secret,
d738b9
                   const unsigned char *auth,
d738b9
-                  unsigned char outbuf[MAX_ATTRSETSIZE], size_t *outlen)
d738b9
+                  unsigned char outbuf[MAX_ATTRSETSIZE], size_t *outlen,
d738b9
+                  krb5_boolean *is_fips)
d738b9
 {
d738b9
     unsigned char buffer[MAX_ATTRSIZE];
d738b9
     krb5_error_code retval;
d738b9
@@ -181,7 +182,7 @@ kr_attrset_encode(const krad_attrset *set, const char *secret,
d738b9
 
d738b9
     K5_TAILQ_FOREACH(a, &set->list, list) {
d738b9
         retval = kr_attr_encode(set->ctx, secret, auth, a->type, &a->attr,
d738b9
-                                buffer, &attrlen);
d738b9
+                                buffer, &attrlen, is_fips);
d738b9
         if (retval != 0)
d738b9
             return retval;
d738b9
 
d738b9
diff --git a/src/lib/krad/internal.h b/src/lib/krad/internal.h
d738b9
index 996a89372..a53ce31ce 100644
d738b9
--- a/src/lib/krad/internal.h
d738b9
+++ b/src/lib/krad/internal.h
d738b9
@@ -49,6 +49,13 @@
d738b9
 
d738b9
 typedef struct krad_remote_st krad_remote;
d738b9
 
d738b9
+struct krad_packet_st {
d738b9
+    char buffer[KRAD_PACKET_SIZE_MAX];
d738b9
+    krad_attrset *attrset;
d738b9
+    krb5_data pkt;
d738b9
+    krb5_boolean is_fips;
d738b9
+};
d738b9
+
d738b9
 /* Validate constraints of an attribute. */
d738b9
 krb5_error_code
d738b9
 kr_attr_valid(krad_attr type, const krb5_data *data);
d738b9
@@ -57,7 +64,8 @@ kr_attr_valid(krad_attr type, const krb5_data *data);
d738b9
 krb5_error_code
d738b9
 kr_attr_encode(krb5_context ctx, const char *secret, const unsigned char *auth,
d738b9
                krad_attr type, const krb5_data *in,
d738b9
-               unsigned char outbuf[MAX_ATTRSIZE], size_t *outlen);
d738b9
+               unsigned char outbuf[MAX_ATTRSIZE], size_t *outlen,
d738b9
+               krb5_boolean *is_fips);
d738b9
 
d738b9
 /* Decode an attribute. */
d738b9
 krb5_error_code
d738b9
@@ -69,7 +77,8 @@ kr_attr_decode(krb5_context ctx, const char *secret, const unsigned char *auth,
d738b9
 krb5_error_code
d738b9
 kr_attrset_encode(const krad_attrset *set, const char *secret,
d738b9
                   const unsigned char *auth,
d738b9
-                  unsigned char outbuf[MAX_ATTRSETSIZE], size_t *outlen);
d738b9
+                  unsigned char outbuf[MAX_ATTRSETSIZE], size_t *outlen,
d738b9
+                  krb5_boolean *is_fips);
d738b9
 
d738b9
 /* Decode attributes from a buffer. */
d738b9
 krb5_error_code
d738b9
diff --git a/src/lib/krad/packet.c b/src/lib/krad/packet.c
d738b9
index c597174b6..2fbf0ee1e 100644
d738b9
--- a/src/lib/krad/packet.c
d738b9
+++ b/src/lib/krad/packet.c
d738b9
@@ -53,12 +53,6 @@ typedef unsigned char uchar;
d738b9
 #define pkt_auth(p) ((uchar *)offset(&(p)->pkt, OFFSET_AUTH))
d738b9
 #define pkt_attr(p) ((unsigned char *)offset(&(p)->pkt, OFFSET_ATTR))
d738b9
 
d738b9
-struct krad_packet_st {
d738b9
-    char buffer[KRAD_PACKET_SIZE_MAX];
d738b9
-    krad_attrset *attrset;
d738b9
-    krb5_data pkt;
d738b9
-};
d738b9
-
d738b9
 typedef struct {
d738b9
     uchar x[(UCHAR_MAX + 1) / 8];
d738b9
 } idmap;
d738b9
@@ -190,7 +184,11 @@ auth_generate_response(krb5_context ctx, const char *secret,
d738b9
     retval = krb5_c_make_checksum(ctx, CKSUMTYPE_RSA_MD5, NULL, 0, &data,
d738b9
                                   &hash);
d738b9
     free(data.data);
d738b9
-    if (retval != 0)
d738b9
+    if (retval == ENOMEM) {
d738b9
+        /* We're on Linux, so this is a FIPS failure, and this checksum
d738b9
+         * does very little security-wise anyway, so don't taint. */
d738b9
+        hash.contents = calloc(1, AUTH_FIELD_SIZE);
d738b9
+    } else if (retval != 0)
d738b9
         return retval;
d738b9
 
d738b9
     memcpy(rauth, hash.contents, AUTH_FIELD_SIZE);
d738b9
@@ -276,7 +274,7 @@ krad_packet_new_request(krb5_context ctx, const char *secret, krad_code code,
d738b9
 
d738b9
     /* Encode the attributes. */
d738b9
     retval = kr_attrset_encode(set, secret, pkt_auth(pkt), pkt_attr(pkt),
d738b9
-                               &attrset_len);
d738b9
+                               &attrset_len, &pkt->is_fips);
d738b9
     if (retval != 0)
d738b9
         goto error;
d738b9
 
d738b9
@@ -314,7 +312,7 @@ krad_packet_new_response(krb5_context ctx, const char *secret, krad_code code,
d738b9
 
d738b9
     /* Encode the attributes. */
d738b9
     retval = kr_attrset_encode(set, secret, pkt_auth(request), pkt_attr(pkt),
d738b9
-                               &attrset_len);
d738b9
+                               &attrset_len, &pkt->is_fips);
d738b9
     if (retval != 0)
d738b9
         goto error;
d738b9
 
d738b9
@@ -451,6 +449,8 @@ krad_packet_decode_response(krb5_context ctx, const char *secret,
d738b9
 const krb5_data *
d738b9
 krad_packet_encode(const krad_packet *pkt)
d738b9
 {
d738b9
+    if (pkt->is_fips)
d738b9
+        return NULL;
d738b9
     return &pkt->pkt;
d738b9
 }
d738b9
 
d738b9
diff --git a/src/lib/krad/remote.c b/src/lib/krad/remote.c
d738b9
index 437f7e91a..0f90443ce 100644
d738b9
--- a/src/lib/krad/remote.c
d738b9
+++ b/src/lib/krad/remote.c
d738b9
@@ -263,7 +263,7 @@ on_io_write(krad_remote *rr)
d738b9
     request *r;
d738b9
 
d738b9
     K5_TAILQ_FOREACH(r, &rr->list, list) {
d738b9
-        tmp = krad_packet_encode(r->request);
d738b9
+        tmp = &r->request->pkt;
d738b9
 
d738b9
         /* If the packet has already been sent, do nothing. */
d738b9
         if (r->sent == tmp->length)
d738b9
@@ -359,7 +359,7 @@ on_io_read(krad_remote *rr)
d738b9
     if (req != NULL) {
d738b9
         K5_TAILQ_FOREACH(r, &rr->list, list) {
d738b9
             if (r->request == req &&
d738b9
-                r->sent == krad_packet_encode(req)->length) {
d738b9
+                r->sent == req->pkt.length) {
d738b9
                 request_finish(r, 0, rsp);
d738b9
                 break;
d738b9
             }
d738b9
@@ -455,6 +455,12 @@ kr_remote_send(krad_remote *rr, krad_code code, krad_attrset *attrs,
d738b9
                                      (krad_packet_iter_cb)iterator, &r, &tmp);
d738b9
     if (retval != 0)
d738b9
         goto error;
d738b9
+    else if (tmp->is_fips && rr->info->ai_family != AF_LOCAL &&
d738b9
+        rr->info->ai_family != AF_UNIX) {
d738b9
+        /* This would expose cleartext passwords, so abort. */
d738b9
+        retval = ESOCKTNOSUPPORT;
d738b9
+        goto error;
d738b9
+    }
d738b9
 
d738b9
     K5_TAILQ_FOREACH(r, &rr->list, list) {
d738b9
         if (r->request == tmp) {
d738b9
diff --git a/src/lib/krad/t_attr.c b/src/lib/krad/t_attr.c
d738b9
index eb2a780c8..4d285ad9d 100644
d738b9
--- a/src/lib/krad/t_attr.c
d738b9
+++ b/src/lib/krad/t_attr.c
d738b9
@@ -50,6 +50,7 @@ main()
d738b9
     const char *tmp;
d738b9
     krb5_data in;
d738b9
     size_t len;
d738b9
+    krb5_boolean is_fips = FALSE;
d738b9
 
d738b9
     noerror(krb5_init_context(&ctx));
d738b9
 
d738b9
@@ -73,7 +74,7 @@ main()
d738b9
     in = string2data((char *)decoded);
d738b9
     retval = kr_attr_encode(ctx, secret, auth,
d738b9
                             krad_attr_name2num("User-Password"),
d738b9
-                            &in, outbuf, &len;;
d738b9
+                            &in, outbuf, &len, &is_fips);
d738b9
     insist(retval == 0);
d738b9
     insist(len == sizeof(encoded));
d738b9
     insist(memcmp(outbuf, encoded, len) == 0);
d738b9
diff --git a/src/lib/krad/t_attrset.c b/src/lib/krad/t_attrset.c
d738b9
index 7928335ca..0f9576253 100644
d738b9
--- a/src/lib/krad/t_attrset.c
d738b9
+++ b/src/lib/krad/t_attrset.c
d738b9
@@ -49,6 +49,7 @@ main()
d738b9
     krb5_context ctx;
d738b9
     size_t len = 0, encode_len;
d738b9
     krb5_data tmp;
d738b9
+    krb5_boolean is_fips = FALSE;
d738b9
 
d738b9
     noerror(krb5_init_context(&ctx));
d738b9
     noerror(krad_attrset_new(ctx, &set);;
d738b9
@@ -62,7 +63,8 @@ main()
d738b9
     noerror(krad_attrset_add(set, krad_attr_name2num("User-Password"), &tmp));
d738b9
 
d738b9
     /* Encode attrset. */
d738b9
-    noerror(kr_attrset_encode(set, "foo", auth, buffer, &encode_len));
d738b9
+    noerror(kr_attrset_encode(set, "foo", auth, buffer, &encode_len,
d738b9
+                              &is_fips));
d738b9
     krad_attrset_free(set);
d738b9
 
d738b9
     /* Manually encode User-Name. */