10 int havenvram, havekeyfs;
12 uchar keyfskey[AESKEYLEN];
21 fd = open("#c/hostowner", OREAD);
22 if(fd < 0) sysfatal("open: %r");
23 memset(eve, 0, sizeof(eve));
24 if(read(fd, eve, sizeof(eve)-1) < 0) sysfatal("read: %r");
26 if(strcmp(getuser(), eve) != 0) print("hostowner is %#q, but running as %#q\n", eve, getuser());
34 print("ndbopen: %r\n");
44 if(readnvram(&nvr, 0) < 0){
45 print("readnvram: %r\n");
49 print("GOOD: found nvram key for user '%s@%s'\n", nvr.authid, nvr.authdom);
50 if(strcmp(eve, nvr.authid) != 0) print("BAD: nvram authid doesn't match hostowner %#q\n", eve);
52 auth = ndbgetvalue(db, nil, "authdom", nvr.authdom, "auth", nil);
53 if(auth == nil) print("BAD: authdom %#q not found in ndb\n", nvr.authdom);
55 print("ndb says authdom %#q corresponds to auth server %#q\n", nvr.authdom, auth);
68 if(!havenvram) return;
69 if(access("/adm/keys", AREAD) < 0){
70 print("no access to /adm/keys\n");
73 print("starting keyfs\n");
79 if(execl("/bin/auth/keyfs", "auth/keyfs", "-r", nil) < 0)
80 sysfatal("execl: %r");
83 buf = smprint("/mnt/keys/%s/aeskey", nvr.authid);
84 fd = open(buf, OREAD);
86 print("BAD: can't get key from keyfs: %r\n");
89 werrstr("short read");
90 if(read(fd, aes, sizeof(aes)) < sizeof(aes)){
96 memmove(keyfskey, aes, AESKEYLEN);
97 if(memcmp(nvr.aesmachkey, aes, AESKEYLEN) != 0)
98 print("BAD: key in keyfs does not match nvram\n");
100 print("GOOD: key in keyfs matches nvram\n");
110 int proto, dom, user;
112 bp = Bopen("/mnt/factotum/ctl", OREAD);
114 print("can't open /mnt/factotum/ctl: %r\n");
117 proto = dom = user = 0;
118 while(l = Brdstr(bp, '\n', 1), l != nil){
119 if(strncmp(l, "key ", 4) != 0) continue;
120 at = _parseattr(l + 4);
122 proto = dom = user = 0;
123 for(ap = at; ap != nil; ap = ap->next){
124 if(strcmp(ap->name, "proto") == 0 && strcmp(ap->val, "dp9ik") == 0)
126 if(strcmp(ap->name, "dom") == 0 && strcmp(ap->val, nvr.authdom) == 0)
128 if(strcmp(ap->name, "user") == 0 && strcmp(ap->val, nvr.authid) == 0)
130 if(strcmp(ap->name, "disabled") == 0){
131 proto = dom = user = 0;
136 if(proto && dom && user)
140 if(!proto || !dom || !user){
141 print("can't test factotum key: no key for '%s@%s' in factotum\n", nvr.authdom, nvr.authid);
158 uchar chal[CHALLEN], paky[PAKYLEN];
159 char tick[MAXTICKETLEN+MAXAUTHENTLEN];
163 source = keyfs ? "keyfs" : "nvram";
164 fd = open("/mnt/factotum/rpc", ORDWR);
165 if(fd < 0){ print("open: %r\n"); return -1; }
166 print("trying %s key for %s@%s with factotum\n", source, nvr.authdom, nvr.authid);
167 rpc = auth_allocrpc(fd);
168 if(rpc == nil){ print("auth_allocrpc: %r\n"); return -1; }
170 s = smprint("proto=dp9ik dom=%q user=%q role=server", nvr.authdom, nvr.authid);
171 if(auth_rpc(rpc, "start", s, strlen(s)) != ARok){ print("auth_rpc start: %r\n"); goto err; }
174 genrandom(chal, CHALLEN);
175 if(auth_rpc(rpc, "write", chal, CHALLEN) != ARok){ print("BAD: auth_rpc write challenge: %r\n"); goto err; }
177 if(auth_rpc(rpc, "read", nil, 0) != ARok){ print("BAD: auth_rpc read ticket request: %r\n"); goto err; }
178 rc = convM2TR(rpc->arg, rpc->narg, &tr);
179 memset(&ak, 0, sizeof(ak));
180 memmove(ak.aes, nvr.aesmachkey, AESKEYLEN);
182 authpak_hash(&ak, nvr.authid);
183 authpak_new(&pr, &ak, paky, 0);
184 authpak_finish(&pr, &ak, (uchar *)rpc->arg + rc);
185 if(auth_rpc(rpc, "write", paky, PAKYLEN) != ARok){ print("BAD: auth_rpc write public key: %r\n"); goto err; }
188 memmove(t.chal, tr.chal, CHALLEN);
189 strcpy(t.cuid, nvr.authid);
190 strcpy(t.suid, nvr.authid);
191 genrandom(t.key, sizeof(t.key));
193 rc = convT2M(&t, tick, MAXTICKETLEN, &ak);
196 memmove(a.chal, tr.chal, CHALLEN);
197 genrandom(a.rand, NONCELEN);
198 rc += convA2M(&a, tick+rc, MAXAUTHENTLEN, &t);
199 if(auth_rpc(rpc, "write", tick, rc) != ARok){
200 rerrstr(errbuf, sizeof(errbuf));
201 if(strcmp(errbuf, "auth server protocol botch") == 0)
202 print("BAD: factotum key doesn't seem to match %s (auth_rpc write ticket+authenticator: %r)\n", source);
204 print("BAD: auth_rpc write ticket+authenticator: %r\n");
208 if(auth_rpc(rpc, "read", nil, 0) != ARok){ print("BAD: auth_rpc read authenticator: %r\n"); goto err; }
209 if(convM2A(rpc->arg, rpc->narg, &a, &t) <= 0) goto botch;
210 if(a.num != AuthAs || memcmp(a.chal, chal, CHALLEN) != 0) goto botch;
211 print("GOOD: key in factotum matches %s\n", source);
216 print("BAD: factotum: protocol botch\n");
226 if(!havenvram || !checkkey()) return;
227 if(trykey(0) < 0 && havekeyfs && memcmp(keyfskey, nvr.aesmachkey, AESKEYLEN) != 0)