summaryrefslogtreecommitdiffstats
path: root/usr.sbin/tokeninit
diff options
context:
space:
mode:
authormillert <millert@openbsd.org>2000-12-20 02:08:08 +0000
committermillert <millert@openbsd.org>2000-12-20 02:08:08 +0000
commit851d2d47772925eece4bb308e32e33de50191bed (patch)
tree33c5130389e34d3c3f67e3bbcc9297c987fb5285 /usr.sbin/tokeninit
parentFix a warning. (diff)
downloadwireguard-openbsd-851d2d47772925eece4bb308e32e33de50191bed.tar.xz
wireguard-openbsd-851d2d47772925eece4bb308e32e33de50191bed.zip
Commands for manipulating the token database (ActivCard, CRYPTOCard, or SNK-004)
from BSDi. Will be enabled when BSD authentication is turned on (login_token).
Diffstat (limited to 'usr.sbin/tokeninit')
-rw-r--r--usr.sbin/tokeninit/Makefile27
-rw-r--r--usr.sbin/tokeninit/tokeninit.8219
-rw-r--r--usr.sbin/tokeninit/tokeninit.c238
3 files changed, 484 insertions, 0 deletions
diff --git a/usr.sbin/tokeninit/Makefile b/usr.sbin/tokeninit/Makefile
new file mode 100644
index 00000000000..431e9a9bf52
--- /dev/null
+++ b/usr.sbin/tokeninit/Makefile
@@ -0,0 +1,27 @@
+# $OpenBSD: Makefile,v 1.1 2000/12/20 02:08:09 millert Exp $
+
+PROG= tokeninit
+SRCS= tokeninit.c init.c token.c tokendb.c
+MAN= tokeninit.8
+LDADD+= -ldes
+DPADD= ${LIBDES}
+
+CFLAGS+=-I${.CURDIR}/../../libexec/login_token
+.PATH: ${.CURDIR}/../../libexec/login_token
+
+TOKENS= activ crypto snk
+
+MLINKS= tokeninit.8 activinit.8
+MLINKS+=tokeninit.8 cryptoinit.8
+MLINKS+=tokeninit.8 snkinit.8
+
+BINMODE=500
+
+afterinstall:
+ for i in ${TOKENS} ; do \
+ cd ${DESTDIR}/${BINDIR} && \
+ rm -f $${i}init && \
+ ln ${PROG} $${i}init ; \
+ done
+
+.include <bsd.prog.mk>
diff --git a/usr.sbin/tokeninit/tokeninit.8 b/usr.sbin/tokeninit/tokeninit.8
new file mode 100644
index 00000000000..9d18dd0ee59
--- /dev/null
+++ b/usr.sbin/tokeninit/tokeninit.8
@@ -0,0 +1,219 @@
+.\" $OpenBSD: tokeninit.8,v 1.1 2000/12/20 02:08:09 millert Exp $
+.\"
+.\" Copyright (c) 1995 Migration Associates Corporation. All rights reserved.
+.\"
+.\" Redistribution and use in source and binary forms, with or without
+.\" modification, are permitted provided that the following conditions
+.\" are met:
+.\" 1. Redistributions of source code must retain the above copyright
+.\" notice, this list of conditions and the following disclaimer.
+.\" 2. Redistributions in binary form must reproduce the above copyright
+.\" notice, this list of conditions and the following disclaimer in the
+.\" documentation and/or other materials provided with the distribution.
+.\" 3. All advertising materials mentioning features or use of this software
+.\" must display the following acknowledgement:
+.\" This product includes software developed by Berkeley Software Design,
+.\" Inc.
+.\" 4. The name of Berkeley Software Design, Inc. may not be used to endorse
+.\" or promote products derived from this software without specific prior
+.\" written permission.
+.\"
+.\" THIS SOFTWARE IS PROVIDED BY BERKELEY SOFTWARE DESIGN, INC. ``AS IS'' AND
+.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+.\" ARE DISCLAIMED. IN NO EVENT SHALL BERKELEY SOFTWARE DESIGN, INC. BE LIABLE
+.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+.\" SUCH DAMAGE.
+.\"
+.\" BSDI $From: tokeninit.8,v 1.3 1997/01/16 03:23:11 bostic Exp $
+.\"
+.Dd September 26, 1995
+.Dt TOKENINIT 8
+.Os
+.Sh NAME
+.Nm activinit , cryptoinit , snkinit
+.Nd Modify or add user in ActivCard, CRYPTOCard, or SNK-004 authentication system.
+.Sh SYNOPSIS
+.Nm tokeninit
+.Op Fl f
+.Op Fl h
+.Op Fl m Ar mode
+.Op Fl s
+.Op Fl v
+.Ar user_ID
+.Op Ar user_ID ...
+.Sh DESCRIPTION
+.Pp
+The
+.Nm tokeninit
+utility may also be invoked by one of the names:
+.Nm activinit , cryptoinit ,
+or
+.Nm snkinit .
+Depending on the name it was invoked under, it will
+initialize the system information to allow one to use the
+ActivCard, CRYPTOCard or SNK-004 digital encryption token to login.
+The
+.Nm tokeninit
+utility is intended for use by the system administrator.
+.Pp
+Token cards system provides strong user authentication by combining a user's
+unique knowledge (a Personal Identification Number) and a physical object
+(the token) which the user must have in their possession to login.
+The system administrator programs the token with a secret encryption key
+which is also stored in the database. The user programs the token with
+a PIN. To discourage exhaustive attempts to guess the PIN,
+configuration options permit the token to be programmed
+to erase knowledge of the shared secret should the user enter
+an excessive number of incorrect PIN entries.
+.Pp
+The user activates the token by entering their PIN into the token.
+After activating the token, the user enters a random number challenge
+presented by the host computer into the token. The challenge is encrypted by
+the token and a response displayed. The user then enters the
+response at the host computer's prompt, where it is compared with the
+anticipated response.
+.Pp
+Token cards typically support multiple unique encryption keys.
+This facility allows a single token to be used for multiple computer
+systems, or multiple user instances on the same system.
+.Sh OPTIONS
+.Bl -hang
+.It Fl f
+Force reinitialization of an existing account.
+The current shared secret stored in the database will be replaced a new
+shared secret.
+The new shared secret must be entered into the token,
+replacing the current one.
+.It Fl h
+Read the shared secret as a 16 digit hexadecimal integer rather than
+a sequence of 8 octets.
+This is not supported when invoked as
+.Nm snkinit .
+.It Fl m
+Specify the input modes allowed for this user. Possible modes are
+decimal (dec), hexadecimal (hex), phonebook (phone) and reduced-input (rim).
+Not all modes are available for all types of cards. Multiple
+.Fl m
+options may be specified to enable multiple modes.
+By default only the hexadecimal mode is enabled, except for the SNK-004
+token, which by default only enables the decimal mode.
+If an attempt is made to initialize a card with only reduced-input, the
+default mode for the card is silently included.
+.It Fl s
+By default,
+.Nm tokeninit
+prompts for a shared secret to enter into the authentication database.
+The
+.Fl s
+option generates a 64 bit cryptographically strong key for use in the token.
+This shared secret will be saved
+in the database for the user ID specified on the command line.
+After entering the shared secret into the token,
+determine that the checksum computed
+by the token matches the one displayed by
+.Nm tokeninit .
+.It Fl v
+Enable verbose mode.
+.Nm tokeninit
+will emit messages on the status of each user ID processed.
+.El
+.Sh REDUCED-INPUT MODE
+Reduced-input mode allows the token to predict the next challenge,
+given the current challenge. This may be used to eliminate the need
+to enter the challenge to the token or may also be used with a paper list.
+Using a program such as
+.Xr x99token 1
+many challenges could be precomputed and printed. This list should be
+kept secret. This list can then take the place of an actual token until
+the system has issued all the challenges printed.
+Challenges are predicted by the following algorithm:
+.nf
+.sp
+* Encrypt the last challenge with the shared secret key
+
+* AND each byte of the response with 0x0f
+
+* Modulo each byte by 10 (0x0a)
+
+* ADD 0x30 (ASCII value of '0') to each byte
+.fi
+.sp
+The resulting 8 bytes are all ASCII decimal digits and are the next challenge.
+.Sh DIAGNOSTICS
+Diagnostic messages are logged via syslog(3) with the LOG_AUTH facility.
+.Sh FILES
+.Bl -tag -width xetcxcrypto.db
+.It Pa /etc/activ.db
+data base of information for ActivCard system
+.It Pa /etc/crypto.db
+data base of information for CRYPTOCard system
+.It Pa /etc/snk.db
+data base of information for SNK-004 system
+.El
+.Sh COMMENTS
+A supplier for
+ActivCard tokens may be obtained by contacting:
+.Pp
+.Bl -inset -offset indent
+.It ActivCard, Inc.
+.br
+303 Twin Dolphin Dr., Ste 420
+.br
+Redwood City, CA 94065
+.br
+Tel: (415) 654-1700
+.br
+Fax: (415) 654-1701
+.El
+.Pp
+CRYPTOCard tokens may be obtained by contacting:
+.Pp
+.Bl -inset -offset indent
+.It CRYPTOCard Incorporated
+.br
+Attn: Wade Clark
+.br
+1649 Barclay Blvd.
+.br
+Buffalo Grove, Illinois 60089
+.br
+Tel: (800) 307-7042 / (708) 459-6500
+.br
+Fax: (708) 459-6599
+.br
+<token@cryptocard.com>
+.El
+.Pp
+SNK-004 tokens may be obtained by contacting:
+.Bl -inset -offset indent
+.It Digital Pathways, Inc.
+.br
+Attn: Paul Kamian
+.br
+201 Ravendale Drive
+.br
+Mountain View, CA 94043-5216
+.br
+Tel: (415) 964-0707
+.br
+Fax: (415) 961-7487
+.br
+<paul@digpath.com>
+.El
+.Sh BUGS
+Not all modes of all cards are supported.
+.Pp
+.Sh SEE ALSO
+.Xr x99token 1 ,
+.Xr syslog 3 ,
+.Xr tokenadm 8 ,
+.Xr tokenls 8 ,
+.Xr login_token 8
+.Sh AUTHOR
+Jack Flory <jpf@mig.com>
diff --git a/usr.sbin/tokeninit/tokeninit.c b/usr.sbin/tokeninit/tokeninit.c
new file mode 100644
index 00000000000..69cd2f61488
--- /dev/null
+++ b/usr.sbin/tokeninit/tokeninit.c
@@ -0,0 +1,238 @@
+/* $OpenBSD: tokeninit.c,v 1.1 2000/12/20 02:08:09 millert Exp $ */
+
+/*-
+ * Copyright (c) 1995 Migration Associates Corp. All Rights Reserved
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ * 3. All advertising materials mentioning features or use of this software
+ * must display the following acknowledgement:
+ * This product includes software developed by Berkeley Software Design,
+ * Inc.
+ * 4. The name of Berkeley Software Design, Inc. may not be used to endorse
+ * or promote products derived from this software without specific prior
+ * written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY BERKELEY SOFTWARE DESIGN, INC. ``AS IS'' AND
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
+ * ARE DISCLAIMED. IN NO EVENT SHALL BERKELEY SOFTWARE DESIGN, INC. BE LIABLE
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
+ * SUCH DAMAGE.
+ *
+ * BSDI $From: tokeninit.c,v 1.1 1996/08/26 20:27:28 prb Exp
+ */
+
+#include <sys/param.h>
+#include <sys/resource.h>
+#include <sys/time.h>
+
+#include <err.h>
+#include <stdio.h>
+#include <syslog.h>
+#include <stdlib.h>
+#include <unistd.h>
+#include <string.h>
+
+#include "token.h"
+#include "tokendb.h"
+
+static void strip_crlf(char *);
+static void prompt_for_secret(int, char*);
+static int parse_secret(int, char *, unsigned char *);
+
+int
+main(int argc, char **argv)
+{
+ unsigned cmd = TOKEN_INITUSER;
+ int c;
+ int errors = 0;
+ int verbose = 0;
+ int hexformat = 0;
+ int modes = 0;
+ char seed[80];
+ unsigned char secret[9];
+ char *optstr;
+
+ struct rlimit cds;
+
+ (void)signal(SIGQUIT, SIG_IGN);
+ (void)signal(SIGINT, SIG_IGN);
+ (void)setpriority(PRIO_PROCESS, 0, 0);
+
+ openlog(NULL, LOG_ODELAY, LOG_AUTH);
+
+ cds.rlim_cur = 0;
+ cds.rlim_max = 0;
+ if (setrlimit(RLIMIT_CORE, &cds) < 0)
+ syslog(LOG_ERR, "couldn't set core dump size to 0: %m");
+
+ if (token_init(argv[0]) < 0) {
+ syslog(LOG_ERR, "unknown token type");
+ errx(1, "unknown token type");
+ }
+
+ if (tt->options & TOKEN_HEXINIT)
+ optstr = "fhm:sv";
+ else
+ optstr = "fm:sv";
+
+ while ((c = getopt(argc, argv, optstr)) != EOF)
+ switch (c) {
+ case 'f': /* force initialize existing user account */
+ cmd |= TOKEN_FORCEINIT;
+ break;
+
+ case 'h':
+ hexformat++;
+ break;
+
+ case 'm':
+ if ((c = token_mode(optarg)))
+ modes |= c;
+ else
+ errx(1, "unknown mode");
+ break;
+
+ case 's': /* generate seed during initialization */
+ cmd |= TOKEN_GENSECRET;
+ break;
+
+ case 'v': /* verbose */
+ verbose++;
+ break;
+ default:
+ fprintf(stderr,
+ "Usage: %sinit [-f%ssv] username [ username ... ]\n",
+ tt->name, (tt->options & TOKEN_HEXINIT) ? "h" : "");
+ exit(1);
+ }
+
+ if ((modes & ~TOKEN_RIM) == 0)
+ modes |= tt->defmode;
+
+ argc -= optind;
+ argv = &argv[optind];
+
+ while (argc--) {
+ if (verbose) {
+ printf("Adding %s to %s database\n", *argv, tt->proper);
+ fflush(stdout);
+ }
+ if (!(cmd & TOKEN_GENSECRET)) {
+ prompt_for_secret(hexformat, *argv);
+
+ if (fgets(seed, sizeof(seed), stdin) == NULL) {
+ fprintf(stderr,
+ "%sinit: No seed supplied for token.\n",
+ tt->name);
+ exit(1);
+ }
+ strip_crlf(seed);
+ if (strlen(seed) == 0) {
+ fprintf(stderr,
+ "%sinit: No seed supplied for token.\n",
+ tt->name);
+ exit(1);
+ }
+ memset(secret, 0, sizeof(secret));
+ if (parse_secret(hexformat, seed, secret)) {
+ fprintf(stderr,
+ "%sinit: Invalid secret entered.\n",
+ tt->name);
+ exit(1);
+ }
+ }
+ switch (tokenuserinit(cmd, *argv, secret, modes)) {
+ case 0:
+ syslog(LOG_INFO, "User %s initialized in %s database",
+ *argv, tt->proper);
+ break;
+ case 1:
+ warnx("%s already exists in %s database!\n",
+ *argv, tt->proper);
+ syslog(LOG_INFO, "%s already exists in %s database",
+ *argv, tt->proper);
+ errors++;
+ break;
+ case -1:
+ warnx("Error initializing user %s in %s database.\n",
+ *argv, tt->proper);
+ syslog(LOG_INFO,
+ "Error initializing user %s in %s database: %m",
+ *argv, tt->proper);
+ errors++;
+ }
+ argv++;
+ }
+ exit(errors);
+}
+
+/*
+ * Strip trailing cr/lf from a line of text
+ */
+
+void
+strip_crlf(char *buf)
+{
+ char *cp;
+
+ if((cp = strchr(buf,'\r')) != NULL)
+ *cp = '\0';
+
+ if((cp = strchr(buf,'\n')) != NULL)
+ *cp = '\0';
+}
+
+/*
+ * Parse the 8 octal numbers or a 16 digit hex string into a token secret
+ */
+
+static int
+parse_secret(int hexformat, char *seed, unsigned char *secret)
+{
+ int i;
+ unsigned tmp[8];
+
+ if (hexformat) {
+ if ((i = sscanf(seed, "%02x %02x %02x %02x %02x %02x %02x %02x",
+ &tmp[0], &tmp[1], &tmp[2], &tmp[3],
+ &tmp[4], &tmp[5], &tmp[6], &tmp[7])) != 8)
+ return (-1);
+ } else {
+ if ((i = sscanf(seed, "%o %o %o %o %o %o %o %o",
+ &tmp[0], &tmp[1], &tmp[2], &tmp[3],
+ &tmp[4], &tmp[5], &tmp[6], &tmp[7])) != 8)
+ return (-1);
+ }
+ for (i=0; i < 8; i++)
+ secret[i] = tmp[i] & 0xff;
+
+ return (0);
+}
+
+/*
+ * Prompt user for seed for token
+ */
+
+static void
+prompt_for_secret(int hexformat, char* username)
+{
+ if (hexformat)
+ printf("Enter a 16 digit hexidecimal number "
+ "as a seed for %s\'s token:\n", username);
+ else
+ printf("Enter a series of 8 3-digit octal numbers "
+ "as a seed for %s\'s token:\n", username);
+}