NFD: Named Data Networking Forwarding Daemon 24.07-28-gdcc0e6e0
Loading...
Searching...
No Matches
command-authenticator.cpp
Go to the documentation of this file.
1/* -*- Mode:C++; c-file-style:"gnu"; indent-tabs-mode:nil; -*- */
2/*
3 * Copyright (c) 2014-2025, Regents of the University of California,
4 * Arizona Board of Regents,
5 * Colorado State University,
6 * University Pierre & Marie Curie, Sorbonne University,
7 * Washington University in St. Louis,
8 * Beijing Institute of Technology,
9 * The University of Memphis.
10 *
11 * This file is part of NFD (Named Data Networking Forwarding Daemon).
12 * See AUTHORS.md for complete list of NFD authors and contributors.
13 *
14 * NFD is free software: you can redistribute it and/or modify it under the terms
15 * of the GNU General Public License as published by the Free Software Foundation,
16 * either version 3 of the License, or (at your option) any later version.
17 *
18 * NFD is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY;
19 * without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR
20 * PURPOSE. See the GNU General Public License for more details.
21 *
22 * You should have received a copy of the GNU General Public License along with
23 * NFD, e.g., in COPYING.md file. If not, see <http://www.gnu.org/licenses/>.
24 */
25
27#include "common/logger.hpp"
28
29#include <ndn-cxx/security/certificate-fetcher-offline.hpp>
30#include <ndn-cxx/security/certificate-request.hpp>
31#include <ndn-cxx/security/validation-policy.hpp>
32#include <ndn-cxx/security/validation-policy-accept-all.hpp>
33#include <ndn-cxx/security/validation-policy-command-interest.hpp>
34#include <ndn-cxx/tag.hpp>
35#include <ndn-cxx/util/io.hpp>
36
37#include <filesystem>
38
39namespace security = ndn::security;
40
41namespace nfd {
42
43NFD_LOG_INIT(CommandAuthenticator);
44// INFO: configuration change, etc
45// DEBUG: per authentication request result
46
50using SignerTag = ndn::SimpleTag<Name, 20>;
51
55static std::optional<std::string>
56getSignerFromTag(const Interest& interest)
57{
58 auto signerTag = interest.getTag<SignerTag>();
59 if (signerTag == nullptr) {
60 return std::nullopt;
61 }
62 else {
63 return signerTag->get().toUri();
64 }
65}
66
70class CommandAuthenticatorValidationPolicy final : public security::ValidationPolicy
71{
72public:
73 void
74 checkPolicy(const Interest& interest, const shared_ptr<security::ValidationState>& state,
75 const ValidationContinuation& continueValidation) final
76 {
77 auto sigInfo = getSignatureInfo(interest, *state);
78 if (!state->getOutcome()) { // already failed
79 return;
80 }
81 Name klName = getKeyLocatorName(sigInfo, *state);
82 if (!state->getOutcome()) { // already failed
83 return;
84 }
85
86 // SignerTag must be placed on the 'original Interest' in ValidationState to be available for
87 // InterestValidationSuccessCallback. The 'interest' parameter refers to a different instance
88 // which is copied into 'original Interest'.
89 auto state1 = std::dynamic_pointer_cast<security::InterestValidationState>(state);
90 state1->getOriginalInterest().setTag(make_shared<SignerTag>(klName));
91
92 continueValidation(make_shared<security::CertificateRequest>(klName), state);
93 }
94
95 void
96 checkPolicy(const Data&, const shared_ptr<security::ValidationState>&,
97 const ValidationContinuation&) final
98 {
99 // Non-certificate Data are not handled by CommandAuthenticator.
100 // Non-anchor certificates cannot be retrieved by offline fetcher.
101 BOOST_ASSERT_MSG(false, "Data should not be passed to this policy");
102 }
103};
104
105shared_ptr<CommandAuthenticator>
107{
108 return shared_ptr<CommandAuthenticator>(new CommandAuthenticator);
109}
110
111CommandAuthenticator::CommandAuthenticator() = default;
112
113void
115{
116 configFile.addSectionHandler("authorizations", [this] (auto&&... args) {
117 processConfig(std::forward<decltype(args)>(args)...);
118 });
119}
120
121void
122CommandAuthenticator::processConfig(const ConfigSection& section, bool isDryRun, const std::string& filename)
123{
124 if (!isDryRun) {
125 NFD_LOG_DEBUG("resetting authorizations");
126 for (auto& kv : m_validators) {
127 kv.second = make_shared<security::Validator>(
128 make_unique<security::ValidationPolicyCommandInterest>(make_unique<CommandAuthenticatorValidationPolicy>()),
129 make_unique<security::CertificateFetcherOffline>());
130 }
131 }
132
133 if (section.empty()) {
134 NDN_THROW(ConfigFile::Error("'authorize' is missing under 'authorizations'"));
135 }
136
137 int authSectionIndex = 0;
138 for (const auto& [sectionName, authSection] : section) {
139 if (sectionName != "authorize") {
140 NDN_THROW(ConfigFile::Error("'" + sectionName + "' section is not permitted under 'authorizations'"));
141 }
142
143 std::string certfile;
144 try {
145 certfile = authSection.get<std::string>("certfile");
146 }
147 catch (const boost::property_tree::ptree_error&) {
148 NDN_THROW(ConfigFile::Error("'certfile' is missing under authorize[" +
149 std::to_string(authSectionIndex) + "]"));
150 }
151
152 bool isAny = false;
153 shared_ptr<security::Certificate> cert;
154 if (certfile == "any") {
155 isAny = true;
156 NFD_LOG_WARN("'certfile any' is intended for demo purposes only and "
157 "SHOULD NOT be used in production environments");
158 }
159 else {
160 auto certfilePath = std::filesystem::absolute(filename).parent_path() / certfile;
161 certfilePath = certfilePath.lexically_normal();
162 cert = ndn::io::load<security::Certificate>(certfilePath);
163 if (cert == nullptr) {
164 NDN_THROW(ConfigFile::Error("cannot load certfile '" + certfilePath.native() +
165 "' for authorize[" + std::to_string(authSectionIndex) + "]"));
166 }
167 }
168
169 const ConfigSection* privSection = nullptr;
170 try {
171 privSection = &authSection.get_child("privileges");
172 }
173 catch (const boost::property_tree::ptree_error&) {
174 NDN_THROW(ConfigFile::Error("'privileges' is missing under authorize[" +
175 std::to_string(authSectionIndex) + "]"));
176 }
177
178 if (privSection->empty()) {
179 NFD_LOG_WARN("No privileges granted to certificate " << certfile);
180 }
181 for (const auto& kv : *privSection) {
182 const std::string& module = kv.first;
183 auto found = m_validators.find(module);
184 if (found == m_validators.end()) {
185 NDN_THROW(ConfigFile::Error("unknown module '" + module +
186 "' under authorize[" + std::to_string(authSectionIndex) + "]"));
187 }
188
189 if (isDryRun) {
190 continue;
191 }
192
193 if (isAny) {
194 found->second = make_shared<security::Validator>(make_unique<security::ValidationPolicyAcceptAll>(),
195 make_unique<security::CertificateFetcherOffline>());
196 NFD_LOG_INFO("authorize module=" << module << " signer=any");
197 }
198 else {
199 const Name& keyName = cert->getKeyName();
200 security::Certificate certCopy = *cert;
201 found->second->loadAnchor(certfile, std::move(certCopy));
202 NFD_LOG_INFO("authorize module=" << module << " signer=" << keyName << " certfile=" << certfile);
203 }
204 }
205
206 ++authSectionIndex;
207 }
208}
209
210ndn::mgmt::Authorization
211CommandAuthenticator::makeAuthorization(const std::string& module, const std::string& verb)
212{
213 m_validators[module]; // declares module, so that privilege is recognized
214
215 return [module, self = shared_from_this()] (const Name&, const Interest& interest,
216 const ndn::mgmt::ControlParametersBase*,
217 const ndn::mgmt::AcceptContinuation& accept,
218 const ndn::mgmt::RejectContinuation& reject) {
219 auto validator = self->m_validators.at(module);
220
221 auto successCb = [accept, validator] (const Interest& interest1) {
222 auto signer1 = getSignerFromTag(interest1);
223 BOOST_ASSERT(signer1 || // signer must be available unless 'certfile any'
224 dynamic_cast<security::ValidationPolicyAcceptAll*>(&validator->getPolicy()) != nullptr);
225 std::string signer = signer1.value_or("*");
226 NFD_LOG_DEBUG("accept " << interest1.getName() << " signer=" << signer);
227 accept(signer);
228 };
229
230 using ndn::security::ValidationError;
231 auto failureCb = [reject] (const Interest& interest1, const ValidationError& err) {
232 auto reply = ndn::mgmt::RejectReply::STATUS403;
233 if (err.getCode() == ValidationError::MALFORMED_SIGNATURE ||
234 err.getCode() == ValidationError::INVALID_KEY_LOCATOR) {
235 // do not waste cycles signing and sending a reply if the command is clearly malformed
236 reply = ndn::mgmt::RejectReply::SILENT;
237 }
238 NFD_LOG_DEBUG("reject " << interest1.getName() << " signer=" <<
239 getSignerFromTag(interest1).value_or("?") << " reason=" << err);
240 reject(reply);
241 };
242
243 if (validator) {
244 validator->validate(interest, successCb, failureCb);
245 }
246 else {
247 NFD_LOG_DEBUG("reject " << interest.getName() << " signer=" <<
248 getSignerFromTag(interest).value_or("?") << " reason=Unauthorized");
249 reject(ndn::mgmt::RejectReply::STATUS403);
250 }
251 };
252}
253
254} // namespace nfd
Provides ControlCommand authorization according to NFD's configuration file.
ndn::mgmt::Authorization makeAuthorization(const std::string &module, const std::string &verb)
Returns an Authorization function for module/verb command.
void setConfigFile(ConfigFile &configFile)
static shared_ptr< CommandAuthenticator > create()
Configuration file parsing utility.
void addSectionHandler(const std::string &sectionName, ConfigSectionHandler subscriber)
Setup notification of configuration file sections.
#define NFD_LOG_INFO
Definition logger.hpp:39
#define NFD_LOG_INIT(name)
Definition logger.hpp:31
#define NFD_LOG_WARN
Definition logger.hpp:40
#define NFD_LOG_DEBUG
Definition logger.hpp:38
Definition common.hpp:71
ndn::SimpleTag< Name, 20 > SignerTag
An Interest tag to store the command signer.
boost::property_tree::ptree ConfigSection
A configuration file section.
static std::optional< std::string > getSignerFromTag(const Interest &interest)
Obtain signer from a SignerTag attached to interest, if available.