On 8. 7. 25 22:22, Dirk-Willem van Gulik wrote:
On 8 Jul 2025, at 17:26, Branko Čibej<br...@apache.org>  wrote:
On 26. 6. 25 08:16, Branko Čibej wrote:
On 24. 6. 25 07:52, Branko Čibej wrote:
On 14. 6. 25 21:23, Branko Čibej wrote:
Hi all,

I've been digging into Serf's support for various authentication schemes and I 
notices something that looks like a bit of a limitation.

Unless I'm much mistaken, there's space for only one authentication baton in 
Serf's context. It would seem that this is rather a blocker for implementing 
multi-factor authentication flows, for example, Basic + OTP, where the server 
would first require basic credentials and then, if those were correct, go on to 
issue an OTP challenge.

It seems to me that a simple solution for that would be to store an authn baton 
per scheme, but I know on the close order of nothing about the possible side 
effects.

Yeah, I'm starting small, I have no wish to implement OAuth2 flow any time 
soon. Still, a bit of insight from the knowledgeable would be welcome.

With r1926674, I think the user-defined-authn branch is ready for review. 
Here's a short summary of the changes on the branch:

  * The (private) struct serf__authn_scheme_t, defined in auth/auth.h,
    grew a number of new members to support user-defined schemes, among
    them five new user-visible callback functions. These, along with
    their interactions, are described in serf.h. The built-in
    authentication schemes don't need or use these new members.

  * The (private) table serf_authn_schemes, defined in auth/auth.c, has
    been extended to have room for as many schemes as there are bits in
    serf__authn_scheme_t::type. Locking was added to serialize access,
    because new schemes can be registered at runtime.

  * Private callbacks were added to implement the user-visible
    authentication flow.

  * Two new public APIs take care of registering and unregistering
    authentication schemes. The latter is tricky because we don't track
    references to the schemes in contexts and connections, only in the
    serf_authn_schemes table; this issue is documented.

  * A number of tests were added for all this new stuff.


Please take a look if you have time.

    svn diff --internal-diff \
https://svn.apache.org/repos/asf/serf/trunk   \
https://svn.apache.org/repos/asf/serf/branches/user-defined-authn  \
         | colordiff --color=always \
         | less -R

There are a couple more changes on that branch now:

  * The parameters in the authentication challenge (headers
    WWW-Authenticate and Proxy-Authenticate) are now parsed into a
    dictionary, using the rules described in RFC 9110.

  * The Authentication-Info and Proxy-Authentication-Info response
    headers are now handled and their values parsed as above.

These two changes should make life much easier for authn scheme implementers. I 
decided to add this once I saw how many times we have copy-pasted 
not-quite-compliant parsers throughout the auth code...

(Note that these changes do not stop implementers from doing whatever 
wrong-headed, non-compliant horror they can think of, as all the raw 
information and headers are still available in the callbacks.)
Any takers? It's been a couple of weeks now. I'd sure like to get another pair 
of eyes on these changes before merging them to trunk, but I'd rather not have 
the branch fall victim to bitrot, either.
I'll bite - so I've tried it against  some auth testing code we privately 
maintain for legacy hardware keys - and it certainly gets rid of a lot of the 
boilerplate/header parse code - without loss of functionality.  And oddly it 
passes now an EAGAIN/EINTR edge case that always broke our tests.

Improvement overall.


Thanks for testing! This is encouraging.

-- Brane

Reply via email to