/**
* Copyright (C) 2017 MongoDB Inc.
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License, version 3,
* as published by the Free Software Foundation.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see .
*
* As a special exception, the copyright holders give permission to link the
* code of portions of this program with the OpenSSL library under certain
* conditions as described in each individual source file and distribute
* linked combinations including the program with the OpenSSL library. You
* must comply with the GNU Affero General Public License in all respects for
* all of the code used other than as permitted herein. If you modify file(s)
* with this exception, you may extend this exception to your version of the
* file(s), but you are not obligated to do so. If you do not wish to do so,
* delete this exception statement from your version. If you delete this
* exception statement from all source files in the program, then also delete
* it in the license file.
*/
#pragma once
#include
#include
#include "mongo/crypto/mechanism_scram.h"
#include "mongo/stdx/mutex.h"
#include "mongo/stdx/unordered_map.h"
#include "mongo/util/net/hostandport.h"
namespace mongo {
/**
* A cache for the intermediate steps of the SCRAM-SHA-1 computation.
*
* Clients wishing to authenticate to a server using SCRAM-SHA-1
* must produce a set of credential objects from their password,
* a salt, and an iteration count. The computation to generate these
* is very expensive, proportional to the iteration count. The high
* cost of this computation prevents brute force attacks on
* intercepted SCRAM authentication data, or a stolen password
* database. The inputs to the function are unlikely to frequently
* change. Caching the relationship between the inputs and the
* resulting output should make repeated authentication attempts
* to a single server much faster.
*
* This is explicitly permitted by RFC5802, section 5.1:
*
* "Note that a client implementation MAY cache
* ClientKey&ServerKey (or just SaltedPassword) for later
* reauthentication to the same service, as it is likely that the
* server is going to advertise the same salt value upon
* reauthentication. This might be useful for mobile clients where
* CPU usage is a concern."
*/
class SCRAMSHA1ClientCache {
public:
/**
* Returns precomputed SCRAMSecrets, if one has already been
* stored for the specified hostname and the provided presecrets
* match those recorded for the hostname. Otherwise, no secrets
* are returned.
*/
scram::SCRAMSecrets getCachedSecrets(const HostAndPort& target,
const scram::SCRAMPresecrets& presecrets) const;
/**
* Records a set of precomputed SCRAMSecrets for the specified
* host, along with the presecrets used to generate them.
*/
void setCachedSecrets(HostAndPort target,
scram::SCRAMPresecrets presecrets,
scram::SCRAMSecrets secrets);
private:
mutable stdx::mutex _hostToSecretsMutex;
stdx::unordered_map>
_hostToSecrets;
};
} // namespace mongo