summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2012-06-03 10:56:46 +1000
committerAndrew Bartlett <abartlet@samba.org>2012-06-16 10:13:20 +0200
commit4edd8b891a90a89a84fbfa3636cc568d247b04b2 (patch)
treefaed14f166f307a30ab24f63099d2560499affd5
parent9c715da1cbc256b9ae9298618c92807592607c9b (diff)
downloadsamba-4edd8b891a90a89a84fbfa3636cc568d247b04b2.tar.gz
samba-4edd8b891a90a89a84fbfa3636cc568d247b04b2.tar.bz2
samba-4edd8b891a90a89a84fbfa3636cc568d247b04b2.zip
s3-auth: Remove auth_netlogond
auth_netlogond was an important module in the development of the combined Samba 4.0, and was the first module to link smbd with the AD authentication store, showing that it was possible for NTLM authentication to be offloaded to the AD server components. We now have auth_samba4, which provides the full GENSEC stack to smbd, which also matches exactly the group membership and privileges assignment and which is supported and tested as part of the official Samba 4.0 release configuration. Andrew Bartlett Autobuild-User(master): Andrew Bartlett <abartlet@samba.org> Autobuild-Date(master): Sat Jun 16 10:13:20 CEST 2012 on sn-devel-104
-rw-r--r--source3/Makefile.in5
-rw-r--r--source3/auth/auth_netlogond.c448
-rw-r--r--source3/auth/proto.h2
-rw-r--r--source3/auth/wscript_build9
-rw-r--r--source3/configure.in2
-rwxr-xr-xsource3/wscript2
6 files changed, 1 insertions, 467 deletions
diff --git a/source3/Makefile.in b/source3/Makefile.in
index 054d17b780..e7a0a7d149 100644
--- a/source3/Makefile.in
+++ b/source3/Makefile.in
@@ -906,7 +906,6 @@ AUTH_UNIX_OBJ = auth/auth_unix.o
AUTH_WINBIND_OBJ = auth/auth_winbind.o
AUTH_WBC_OBJ = auth/auth_wbc.o
AUTH_SCRIPT_OBJ = auth/auth_script.o
-AUTH_NETLOGOND_OBJ = auth/auth_netlogond.o
AUTH_OBJ = auth/auth.o @AUTH_STATIC@ auth/auth_util.o auth/token_util.o \
auth/server_info.o \
@@ -2656,10 +2655,6 @@ bin/script.@SHLIBEXT@: $(BINARY_PREREQS) $(AUTH_SCRIPT_OBJ)
@echo "Building plugin $@"
@$(SHLD_MODULE) $(AUTH_SCRIPT_OBJ)
-bin/netlogond.@SHLIBEXT@: $(BINARY_PREREQS) $(AUTH_NETLOGOND_OBJ)
- @echo "Building plugin $@"
- @$(SHLD_MODULE) $(AUTH_NETLOGOND_OBJ)
-
bin/winbind.@SHLIBEXT@: $(BINARY_PREREQS) $(AUTH_WINBIND_OBJ)
@echo "Building plugin $@"
@$(SHLD_MODULE) $(AUTH_WINBIND_OBJ)
diff --git a/source3/auth/auth_netlogond.c b/source3/auth/auth_netlogond.c
deleted file mode 100644
index 7fb037457e..0000000000
--- a/source3/auth/auth_netlogond.c
+++ /dev/null
@@ -1,448 +0,0 @@
-/*
- Unix SMB/CIFS implementation.
- Authenticate against a netlogon pipe listening on a unix domain socket
- Copyright (C) Volker Lendecke 2008
-
- This program is free software; you can redistribute it and/or modify
- it under the terms of the GNU General Public License as published by
- the Free Software Foundation; either version 3 of the License, or
- (at your option) any later version.
-
- This program is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- GNU General Public License for more details.
-
- You should have received a copy of the GNU General Public License
- along with this program. If not, see <http://www.gnu.org/licenses/>.
-*/
-
-#include "includes.h"
-#include "auth.h"
-#include "../libcli/auth/libcli_auth.h"
-#include "../librpc/gen_ndr/ndr_netlogon.h"
-#include "librpc/gen_ndr/ndr_schannel.h"
-#include "rpc_client/cli_pipe.h"
-#include "rpc_client/cli_netlogon.h"
-#include "secrets.h"
-#include "tldap.h"
-#include "tldap_util.h"
-
-#undef DBGC_CLASS
-#define DBGC_CLASS DBGC_AUTH
-
-static bool secrets_store_local_schannel_creds(
- const struct netlogon_creds_CredentialState *creds)
-{
- DATA_BLOB blob;
- enum ndr_err_code ndr_err;
- bool ret;
-
- ndr_err = ndr_push_struct_blob(
- &blob, talloc_tos(), creds,
- (ndr_push_flags_fn_t)ndr_push_netlogon_creds_CredentialState);
- if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
- DEBUG(10, ("ndr_push_netlogon_creds_CredentialState failed: "
- "%s\n", ndr_errstr(ndr_err)));
- return false;
- }
- ret = secrets_store(SECRETS_LOCAL_SCHANNEL_KEY,
- blob.data, blob.length);
- data_blob_free(&blob);
- return ret;
-}
-
-static struct netlogon_creds_CredentialState *
-secrets_fetch_local_schannel_creds(TALLOC_CTX *mem_ctx)
-{
- struct netlogon_creds_CredentialState *creds;
- enum ndr_err_code ndr_err;
- DATA_BLOB blob;
-
- blob.data = (uint8_t *)secrets_fetch(SECRETS_LOCAL_SCHANNEL_KEY,
- &blob.length);
- if (blob.data == NULL) {
- DEBUG(10, ("secrets_fetch failed\n"));
- return NULL;
- }
-
- creds = talloc(mem_ctx, struct netlogon_creds_CredentialState);
- if (creds == NULL) {
- DEBUG(10, ("talloc failed\n"));
- SAFE_FREE(blob.data);
- return NULL;
- }
- ndr_err = ndr_pull_struct_blob(
- &blob, creds, creds,
- (ndr_pull_flags_fn_t)ndr_pull_netlogon_creds_CredentialState);
- SAFE_FREE(blob.data);
- if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
- DEBUG(10, ("ndr_pull_netlogon_creds_CredentialState failed: "
- "%s\n", ndr_errstr(ndr_err)));
- TALLOC_FREE(creds);
- return NULL;
- }
-
- return creds;
-}
-
-static NTSTATUS netlogond_validate(TALLOC_CTX *mem_ctx,
- const struct auth_context *auth_context,
- const char *ncalrpc_sockname,
- struct netlogon_creds_CredentialState *creds,
- const struct auth_usersupplied_info *user_info,
- struct netr_SamInfo3 **pinfo3,
- NTSTATUS *schannel_bind_result)
-{
- struct rpc_pipe_client *p = NULL;
- struct pipe_auth_data *auth = NULL;
- struct netr_SamInfo3 *info3 = NULL;
- NTSTATUS status;
-
- *schannel_bind_result = NT_STATUS_OK;
-
- status = rpc_pipe_open_ncalrpc(talloc_tos(), ncalrpc_sockname,
- &ndr_table_netlogon.syntax_id, &p);
- if (!NT_STATUS_IS_OK(status)) {
- DEBUG(10, ("rpc_pipe_open_ncalrpc failed: %s\n",
- nt_errstr(status)));
- return status;
- }
-
- p->dc = creds;
-
- status = rpccli_schannel_bind_data(p, lp_workgroup(),
- DCERPC_AUTH_LEVEL_PRIVACY,
- p->dc, &auth);
- if (!NT_STATUS_IS_OK(status)) {
- DEBUG(10, ("rpccli_schannel_bind_data failed: %s\n",
- nt_errstr(status)));
- TALLOC_FREE(p);
- return status;
- }
-
- status = rpc_pipe_bind(p, auth);
- if (!NT_STATUS_IS_OK(status)) {
- DEBUG(10, ("rpc_pipe_bind failed: %s\n", nt_errstr(status)));
- TALLOC_FREE(p);
- *schannel_bind_result = status;
- return status;
- }
-
- status = rpccli_netlogon_sam_network_logon_ex(
- p, p,
- user_info->logon_parameters, /* flags such as 'allow
- * workstation logon' */
- lp_netbios_name(), /* server name */
- user_info->client.account_name, /* user name logging on. */
- user_info->client.domain_name, /* domain name */
- user_info->workstation_name, /* workstation name */
- (uchar *)auth_context->challenge.data, /* 8 byte challenge. */
- 3, /* validation level */
- user_info->password.response.lanman, /* lanman 24 byte response */
- user_info->password.response.nt, /* nt 24 byte response */
- &info3); /* info3 out */
-
- DEBUG(10, ("rpccli_netlogon_sam_network_logon_ex returned %s\n",
- nt_errstr(status)));
-
- if (!NT_STATUS_IS_OK(status)) {
- TALLOC_FREE(p);
- return status;
- }
-
- *pinfo3 = talloc_move(mem_ctx, &info3);
-
- TALLOC_FREE(p);
- return NT_STATUS_OK;
-}
-
-static NTSTATUS get_ldapi_ctx(TALLOC_CTX *mem_ctx, struct tldap_context **pld)
-{
- struct tldap_context *ld;
- struct sockaddr_un addr;
- char *sockaddr;
- int fd;
- NTSTATUS status;
- int res;
-
- sockaddr = talloc_asprintf(talloc_tos(), "/%s/ldap_priv/ldapi",
- lp_private_dir());
- if (sockaddr == NULL) {
- DEBUG(10, ("talloc failed\n"));
- return NT_STATUS_NO_MEMORY;
- }
-
- ZERO_STRUCT(addr);
- addr.sun_family = AF_UNIX;
- strncpy(addr.sun_path, sockaddr, sizeof(addr.sun_path));
- TALLOC_FREE(sockaddr);
-
- status = open_socket_out((struct sockaddr_storage *)(void *)&addr,
- 0, 0, &fd);
- if (!NT_STATUS_IS_OK(status)) {
- DEBUG(10, ("Could not connect to %s: %s\n", addr.sun_path,
- nt_errstr(status)));
- return status;
- }
- set_blocking(fd, false);
-
- ld = tldap_context_create(mem_ctx, fd);
- if (ld == NULL) {
- close(fd);
- return NT_STATUS_NO_MEMORY;
- }
- res = tldap_fetch_rootdse(ld);
- if (res != TLDAP_SUCCESS) {
- DEBUG(10, ("tldap_fetch_rootdse failed: %s\n",
- tldap_errstr(talloc_tos(), ld, res)));
- TALLOC_FREE(ld);
- return NT_STATUS_LDAP(res);
- }
- *pld = ld;
- return NT_STATUS_OK;;
-}
-
-static NTSTATUS mymachinepw(uint8_t pwd[16])
-{
- TALLOC_CTX *frame = talloc_stackframe();
- struct tldap_context *ld = NULL;
- struct tldap_message *rootdse, **msg;
- const char *attrs[1] = { "unicodePwd" };
- char *default_nc, *myname;
- int rc, num_msg;
- DATA_BLOB pwdblob;
- NTSTATUS status;
-
- status = get_ldapi_ctx(talloc_tos(), &ld);
- if (!NT_STATUS_IS_OK(status)) {
- goto fail;
- }
- rootdse = tldap_rootdse(ld);
- if (rootdse == NULL) {
- DEBUG(10, ("Could not get rootdse\n"));
- status = NT_STATUS_INTERNAL_ERROR;
- goto fail;
- }
- default_nc = tldap_talloc_single_attribute(
- rootdse, "defaultNamingContext", talloc_tos());
- if (default_nc == NULL) {
- DEBUG(10, ("Could not get defaultNamingContext\n"));
- status = NT_STATUS_NO_MEMORY;
- goto fail;
- }
- DEBUG(10, ("default_nc = %s\n", default_nc));
-
- myname = talloc_asprintf_strupper_m(talloc_tos(), "%s$",
- lp_netbios_name());
- if (myname == NULL) {
- DEBUG(10, ("talloc failed\n"));
- status = NT_STATUS_NO_MEMORY;
- goto fail;
- }
-
- rc = tldap_search_fmt(
- ld, default_nc, TLDAP_SCOPE_SUB, attrs, ARRAY_SIZE(attrs), 0,
- talloc_tos(), &msg,
- "(&(sAMAccountName=%s)(objectClass=computer))", myname);
- if (rc != TLDAP_SUCCESS) {
- DEBUG(10, ("Could not retrieve our account: %s\n",
- tldap_errstr(talloc_tos(), ld, rc)));
- status = NT_STATUS_LDAP(rc);
- goto fail;
- }
- num_msg = talloc_array_length(msg);
- if (num_msg != 1) {
- DEBUG(10, ("Got %d accounts, expected one\n", num_msg));
- status = NT_STATUS_INTERNAL_DB_CORRUPTION;
- goto fail;
- }
- if (!tldap_get_single_valueblob(msg[0], "unicodePwd", &pwdblob)) {
- char *dn = NULL;
- tldap_entry_dn(msg[0], &dn);
- DEBUG(10, ("No unicodePwd attribute in %s\n",
- dn ? dn : "<unknown DN>"));
- status = NT_STATUS_INTERNAL_DB_CORRUPTION;
- goto fail;
- }
- if (pwdblob.length != 16) {
- DEBUG(10, ("Password hash hash has length %d, expected 16\n",
- (int)pwdblob.length));
- status = NT_STATUS_INTERNAL_DB_CORRUPTION;
- goto fail;
- }
- memcpy(pwd, pwdblob.data, 16);
-
-fail:
- TALLOC_FREE(frame);
- return status;
-}
-
-static NTSTATUS check_netlogond_security(const struct auth_context *auth_context,
- void *my_private_data,
- TALLOC_CTX *mem_ctx,
- const struct auth_usersupplied_info *user_info,
- struct auth_serversupplied_info **server_info)
-{
- TALLOC_CTX *frame = talloc_stackframe();
- struct netr_SamInfo3 *info3 = NULL;
- struct rpc_pipe_client *p = NULL;
- struct pipe_auth_data *auth = NULL;
- uint32_t neg_flags = NETLOGON_NEG_AUTH2_ADS_FLAGS;
- uint8_t machine_password[16];
- struct netlogon_creds_CredentialState *creds;
- NTSTATUS schannel_bind_result, status;
- struct named_mutex *mutex = NULL;
- const char *ncalrpcsock;
-
- DEBUG(10, ("Check auth for: [%s]\n", user_info->mapped.account_name));
-
- ncalrpcsock = lp_parm_const_string(
- GLOBAL_SECTION_SNUM, "auth_netlogond", "socket", NULL);
-
- if (ncalrpcsock == NULL) {
- ncalrpcsock = talloc_asprintf(talloc_tos(), "%s/%s",
- get_dyn_NCALRPCDIR(), "DEFAULT");
- }
-
- if (ncalrpcsock == NULL) {
- status = NT_STATUS_NO_MEMORY;
- goto done;
- }
-
- creds = secrets_fetch_local_schannel_creds(talloc_tos());
- if (creds == NULL) {
- goto new_key;
- }
-
- status = netlogond_validate(talloc_tos(), auth_context, ncalrpcsock,
- creds, user_info, &info3,
- &schannel_bind_result);
-
- DEBUG(10, ("netlogond_validate returned %s\n", nt_errstr(status)));
-
- if (NT_STATUS_IS_OK(status)) {
- goto okay;
- }
-
- if (NT_STATUS_IS_OK(schannel_bind_result)) {
- /*
- * This is a real failure from the DC
- */
- goto done;
- }
-
- new_key:
-
- mutex = grab_named_mutex(talloc_tos(), "LOCAL_SCHANNEL_KEY", 60);
- if (mutex == NULL) {
- DEBUG(10, ("Could not get mutex LOCAL_SCHANNEL_KEY\n"));
- status = NT_STATUS_ACCESS_DENIED;
- goto done;
- }
-
- DEBUG(10, ("schannel bind failed, setting up new key\n"));
-
- status = rpc_pipe_open_ncalrpc(talloc_tos(), ncalrpcsock,
- &ndr_table_netlogon.syntax_id, &p);
-
- if (!NT_STATUS_IS_OK(status)) {
- DEBUG(10, ("rpc_pipe_open_ncalrpc failed: %s\n",
- nt_errstr(status)));
- goto done;
- }
-
- status = rpccli_anon_bind_data(p, &auth);
- if (!NT_STATUS_IS_OK(status)) {
- DEBUG(10, ("rpccli_anon_bind_data failed: %s\n",
- nt_errstr(status)));
- goto done;
- }
-
- status = rpc_pipe_bind(p, auth);
- if (!NT_STATUS_IS_OK(status)) {
- DEBUG(10, ("rpc_pipe_bind failed: %s\n", nt_errstr(status)));
- goto done;
- }
-
- status = mymachinepw(machine_password);
- if (!NT_STATUS_IS_OK(status)) {
- DEBUG(10, ("mymachinepw failed: %s\n", nt_errstr(status)));
- goto done;
- }
-
- DEBUG(10, ("machinepw "));
- dump_data(10, machine_password, 16);
-
- status = rpccli_netlogon_setup_creds(
- p, lp_netbios_name(), lp_workgroup(), lp_netbios_name(),
- lp_netbios_name(), machine_password, SEC_CHAN_BDC, &neg_flags);
-
- if (!NT_STATUS_IS_OK(status)) {
- DEBUG(10, ("rpccli_netlogon_setup_creds failed: %s\n",
- nt_errstr(status)));
- goto done;
- }
-
- secrets_store_local_schannel_creds(p->dc);
-
- /*
- * Retry the authentication with the mutex held. This way nobody else
- * can step on our toes.
- */
-
- status = netlogond_validate(talloc_tos(), auth_context, ncalrpcsock,
- p->dc, user_info, &info3,
- &schannel_bind_result);
-
- TALLOC_FREE(p);
-
- DEBUG(10, ("netlogond_validate returned %s\n", nt_errstr(status)));
-
- if (!NT_STATUS_IS_OK(status)) {
- goto done;
- }
-
- okay:
-
- status = make_server_info_info3(mem_ctx, user_info->client.account_name,
- user_info->mapped.domain_name, server_info,
- info3);
- if (!NT_STATUS_IS_OK(status)) {
- DEBUG(10, ("make_server_info_info3 failed: %s\n",
- nt_errstr(status)));
- TALLOC_FREE(frame);
- return status;
- }
-
- status = NT_STATUS_OK;
-
- done:
- TALLOC_FREE(frame);
- return status;
-}
-
-/* module initialisation */
-static NTSTATUS auth_init_netlogond(struct auth_context *auth_context,
- const char *param,
- auth_methods **auth_method)
-{
- struct auth_methods *result;
-
- result = talloc_zero(auth_context, struct auth_methods);
- if (result == NULL) {
- return NT_STATUS_NO_MEMORY;
- }
- result->name = "netlogond";
- result->auth = check_netlogond_security;
-
- *auth_method = result;
- return NT_STATUS_OK;
-}
-
-NTSTATUS auth_netlogond_init(void)
-{
- smb_register_auth(AUTH_INTERFACE_VERSION, "netlogond",
- auth_init_netlogond);
- return NT_STATUS_OK;
-}
diff --git a/source3/auth/proto.h b/source3/auth/proto.h
index a35a804d35..e2f5a5787a 100644
--- a/source3/auth/proto.h
+++ b/source3/auth/proto.h
@@ -93,8 +93,6 @@ NTSTATUS auth_builtin_init(void);
void attempt_machine_password_change(void);
NTSTATUS auth_domain_init(void);
-NTSTATUS auth_netlogond_init(void);
-
/* The following definitions come from auth/auth_generic.c */
NTSTATUS make_auth4_context(TALLOC_CTX *mem_ctx, struct auth4_context **auth4_context_out);
diff --git a/source3/auth/wscript_build b/source3/auth/wscript_build
index 47dbea0a48..8a535cbcbf 100644
--- a/source3/auth/wscript_build
+++ b/source3/auth/wscript_build
@@ -7,7 +7,6 @@ AUTH_UNIX_SRC = 'auth_unix.c'
AUTH_WINBIND_SRC = 'auth_winbind.c'
AUTH_WBC_SRC = 'auth_wbc.c'
AUTH_SCRIPT_SRC = 'auth_script.c'
-AUTH_NETLOGOND_SRC = 'auth_netlogond.c'
AUTH_SRC = '''auth.c
user_krb5.c
@@ -84,14 +83,6 @@ bld.SAMBA3_MODULE('auth_builtin',
internal_module=bld.SAMBA3_IS_STATIC_MODULE('auth_builtin'),
enabled=bld.SAMBA3_IS_ENABLED_MODULE('auth_builtin'))
-bld.SAMBA3_MODULE('auth_netlogond',
- subsystem='auth',
- source=AUTH_NETLOGOND_SRC,
- deps='TLDAP',
- init_function='',
- internal_module=bld.SAMBA3_IS_STATIC_MODULE('auth_netlogond'),
- enabled=bld.SAMBA3_IS_ENABLED_MODULE('auth_netlogond'))
-
bld.SAMBA3_MODULE('auth_script',
subsystem='auth',
source=AUTH_SCRIPT_SRC,
diff --git a/source3/configure.in b/source3/configure.in
index 0690f3337b..b6143f4041 100644
--- a/source3/configure.in
+++ b/source3/configure.in
@@ -468,7 +468,6 @@ default_shared_modules="$default_shared_modules vfs_time_audit"
default_shared_modules="$default_shared_modules idmap_autorid"
if test "x$developer" = xyes; then
- default_static_modules="$default_static_modules auth_netlogond"
default_shared_modules="$default_shared_modules perfcount_test"
fi
@@ -6349,7 +6348,6 @@ SMB_MODULE(auth_wbc, \$(AUTH_WBC_OBJ), "bin/wbc.$SHLIBEXT", AUTH)
SMB_MODULE(auth_domain, \$(AUTH_DOMAIN_OBJ), "bin/domain.$SHLIBEXT", AUTH)
SMB_MODULE(auth_builtin, \$(AUTH_BUILTIN_OBJ), "bin/builtin.$SHLIBEXT", AUTH)
SMB_MODULE(auth_script, \$(AUTH_SCRIPT_OBJ), "bin/script.$SHLIBEXT", AUTH)
-SMB_MODULE(auth_netlogond, \$(AUTH_NETLOGOND_OBJ), "bin/netlogond.$SHLIBEXT", AUTH)
SMB_SUBSYSTEM(AUTH,auth/auth.o)
SMB_MODULE(vfs_default, \$(VFS_DEFAULT_OBJ), "bin/default.$SHLIBEXT", VFS)
diff --git a/source3/wscript b/source3/wscript
index b0a4b6794f..5a8a6f0baa 100755
--- a/source3/wscript
+++ b/source3/wscript
@@ -1370,7 +1370,7 @@ main() {
vfs_time_audit idmap_autorid''')
if Options.options.developer:
- default_static_modules.extend(TO_LIST('auth_netlogond charset_weird'))
+ default_static_modules.extend(TO_LIST('charset_weird'))
default_shared_modules.extend(TO_LIST('perfcount_test'))
default_shared_modules.extend(TO_LIST('vfs_skel_opaque vfs_skel_transparent vfs_shadow_copy_test'))
default_shared_modules.extend(TO_LIST('auth_skel pdb_test'))