/*********************************************************************** module: rpa.c program: fetchmail programmer: Michael J. Palmer <106177.1156@compuserve.com> date: 29 August 1997 compiler: GCC 2.7.2 environment: RedHat 4.0 Linux 2.0.18 description: RPA authorisation code for POP3 client The sole entry point is POP3_auth_rpa() For license terms, see the file COPYING in this directory. ***********************************************************************/ #include "config.h" #if defined(POP3_ENABLE) && defined(RPA_ENABLE) #include #include #include #include #include #include #include "socket.h" #include "fetchmail.h" #include "fm_md5.h" #include "i18n.h" #ifdef TESTMODE extern unsigned char line1[]; extern unsigned char line2[]; extern unsigned char line3[]; extern int linecount; #endif #ifndef NO_PROTO /* prototypes for internal functions */ static int POP3_rpa_resp(char* argbuf, int socket ); static void LenAppend(char** pptr, int len); static int LenSkip(char** pptr, int rxlen); static int DecBase64(char* bufp); static void EncBase64(char* bufp, int len); static void ToUnicode(char** pptr, char delim, unsigned char* buf, int* plen, int conv); static int SetRealmService(char* bufp); static void GenChallenge(unsigned char* buf, int len); static int DigestPassphrase(char* passphrase, unsigned char* rbuf, int unicodeit); static void CompUserResp(void); static int CheckUserAuth(void); static void md5(const void* in, int len, unsigned char* out); #endif /* RPA protocol definitions */ #define EARLYVER "\x01\x00" /* Earliest supp version */ #define LATEVER "\x03\x00" /* Latest supp version */ #define HDR 0x60 /* ASN.1 SEQUENCE */ #define MECH "\x06\x09\x60\x86\x48\x01\x86\xF8\x73\x01\x01" #define FLAGS "\x00\x01" /* Mutual authentication */ #define STRMAX 128 /* Bytes in Unicode */ #define Tsl 14 /* Timestamp bytelen */ #define Pul 16 /* Passphrase digest len */ #define Cul 16 /* Usr challenge bytelen */ #define Rul 16 /* Usr response bytelen */ #define Aul 16 /* User auth bytelen */ #define Kusl 16 /* Session key bytelen */ #define UNIPASS 1 /* 1=Unicode 0=iso8859 */ #define PS_RPA 42 /* Return code */ /* RPA authentication items */ unsigned char Cs[256]; /* Service challenge */ int Csl; /* Length of " " */ unsigned char Ts[Tsl+1]; /* Timestamp incl \0 */ unsigned char Nu[STRMAX]; /* Username in Unicode */ int Nul; /* Length of " in bytes */ unsigned char Ns[STRMAX]; /* Service in Unicode */ int Nsl; /* Length of " in bytes */ unsigned char Nr[STRMAX]; /* Realm in Unicode */ int Nrl; /* Length of " in bytes */ unsigned char Pu[Pul]; /* Passphrase after MD5 */ unsigned char Cu[Cul]; /* User challenge */ unsigned char Ru[Rul]; /* User response */ unsigned char Au[Aul]; /* User auth from Deity */ unsigned char Kusu[Kusl]; /* Obscured Session key */ unsigned char Kus[Kusl]; /* Session key */ /********************************************************************* function: POP3_auth_rpa description: send the AUTH RPA commands to the server, and get the server's response. Then progress through the RPA challenge/response protocol until we are (hopefully) granted authorisation. arguments: userid user's id@realm e.g. myuserid@csi.com passphrase user's passphrase (upper lower or mixed case as the realm has chosen. spec allows various options :-( ) socket socket to which the server is connected. return value: zero if success, else non-zero. calls: SockPrintf, POP3_rpa_resp, EncBase64, DecBase64, LenAppend, GenChallenge globals: read outlevel. *********************************************************************/ int POP3_auth_rpa (char *userid, char *passphrase, int socket) { int ok,rxlen,verh,verl,i,rll; char buf [POPBUFSIZE]; char *bufp; int status,aulin,kuslin; const cha
#!/usr/bin/expect -f

# MySQL database connection settings
set CRDB_host     localhost
set CRDB_DB       test
set CRDB_username root
set CRDB_password root

# set eiter one to 1 for verbose output
log_user 0
set comments 0

package require mysqltcl

# connect to MySQL database
set handle [::mysql::connect -host $CRDB_host -user $CRDB_username -password $CRDB_password]

# get server/usernames to clean up
set userlist [::mysql::sel $handle "SELECT UserID, server, username, password, retaindays from $CRDB_DB.fetchmail_user" -flatlist]

# loop through all users in database
foreach {userid server username password days} $userlist {
  if {$comments==1} { send_user "\r\nWorking on accound #$userid\r\n*******************************\r\n" }
  eval spawn telnet -l fetchmail_cleanup $server 110
  expect "ready"
  send "USER $username\r"
  expect "password"
  send "PASS $password\r"
  expect "OK"
  send "STAT\r"
  expect "+OK "
  expect -re "\[0-9]* "
  set anz $expect_out(0,string)
  if {$comments==1} { send_user "message count: $anz \r\n" }
  set i 0
  while { $i < $anz } {
    incr i
    send "UIDL $i\r"
    expect -re "\\\+OK $i \(.*\)\r"
    set uid $expect_out(1,string)
    ::mysql::exec $handle "insert ignore into $CRDB_DB.fetchmail values ($userid,'$uid',now());"
    set age [::mysql::sel $handle "SELECT DATEDIFF(now(),Fetchdate) from $CRDB_DB.fetchmail where UserID=$userid and UID='$uid'" -list]
    if {$comments==1} { send_user "Message #$i: UID: $uid , age: $age \r\n" }
    if {$age > $days} {
      send "DELE $i\r"
      expect "deleted"
      if {$comments==1} { send_user "Message $i deleted.\r\n" }
    }
  }
  send "quit\r"
  expect "signing off"
  ::mysql::exec $handle "delete from $CRDB_DB.fetchmail where DATEDIFF(now(),Fetchdate)>($days*2) and UserID=$userid;"
}
::mysql::close $handle
exit
rn value: none calls: MD5 globals: reads authentication items listed above. writes Ru. *********************************************************************/ static void CompUserResp(void) { unsigned char workarea[Pul+48+STRMAX*5+Tsl+Pul]; unsigned char* p; p = workarea; memcpy(p , Pu, Pul); p += Pul; memset(p , '\0', 48); p += 48; memcpy(p , Nu, Nul); p += Nul; memcpy(p , Ns, Nsl); p += Nsl; memcpy(p , Nr, Nrl); p += Nrl; memcpy(p , Cu, Cul); p += Cul; memcpy(p , Cs, Csl); p += Csl; memcpy(p , Ts, Tsl); p += Tsl; memcpy(p , Pu, Pul); p += Pul; md5(workarea,p-workarea,Ru); } /********************************************************************* function: CheckUserAuth description: Use MD5 to verify Authentication Response to User (Au) using Pu Z(48) Ns Nu Nr Kusu Cs Cu Ts Kus Pu Also creates unobscured session key Kus from obscured one Kusu arguments: none return value: 0 if ok, PS_RPA if mismatch calls: MD5 globals: reads authentication items listed above. writes Ru. *********************************************************************/ static int CheckUserAuth(void) { unsigned char workarea[Pul+48+STRMAX*7+Tsl+Pul]; unsigned char* p; unsigned char md5ans[16]; int i; /* Create unobscured Kusu */ p = workarea; memcpy(p , Pu, Pul); p += Pul; memset(p , '\0', 48); p += 48; memcpy(p , Ns, Nsl); p += Nsl; memcpy(p , Nu, Nul); p += Nul; memcpy(p , Nr, Nrl); p += Nrl; memcpy(p , Cs, Csl); p += Csl; memcpy(p , Cu, Cul); p += Cul; memcpy(p , Ts, Tsl); p += Tsl; memcpy(p , Pu, Pul); p += Pul; md5(workarea,p-workarea,md5ans); for (i=0; i<16; i++) Kus[i] = Kusu[i] ^ md5ans[i]; /* Compute Au from our information */ p = workarea; memcpy(p , Pu, Pul); p += Pul; memset(p , '\0', 48); p += 48; memcpy(p , Ns, Nsl); p += Nsl; memcpy(p , Nu, Nul); p += Nul; memcpy(p , Nr, Nrl); p += Nrl; memcpy(p , Kusu,Kusl);p += Kusl; memcpy(p , Cs, Csl); p += Csl; memcpy(p , Cu, Cul); p += Cul; memcpy(p , Ts, Tsl); p += Tsl; memcpy(p , Kus, Kusl);p += Kusl; memcpy(p , Pu, Pul); p += Pul; md5(workarea,p-workarea,md5ans); /* Compare the two */ for (i=0; i<16; i++) if (Au[i] != md5ans[i]) return(PS_RPA); return(0); } /********************************************************************* function: md5 description: Apply MD5 arguments: in input byte stream len length in bytes out 128 bit result buffer return value: none calls: MD5 primitives globals: reads outlevel *********************************************************************/ static void md5(const void *in_,int len,unsigned char *out) { int i; MD5_CTX md5context; const unsigned char *in = (const unsigned char *)in_; if (outlevel >= O_DEBUG) { report(stdout, GT_("MD5 being applied to data block:\n")); for (i=0; i= O_DEBUG) { report(stdout, GT_("MD5 result is:\n")); for (i=0; i<16; i++) { report_build(stdout, "%02X ",out[i]); } report_complete(stdout, "\n"); } } #endif /* POP3_ENABLE && RPA_ENABLE */ /* rpa.c ends here */