diff options
author | Gerald Carter <jerry@samba.org> | 2007-01-25 00:47:27 +0000 |
---|---|---|
committer | Gerald (Jerry) Carter <jerry@samba.org> | 2007-10-10 12:17:26 -0500 |
commit | df1e2693dce2da22a40ae0d0e75d2d3f35bf852f (patch) | |
tree | 2b6362baf9576e606567aeddd5712f1dec31c589 /source3 | |
parent | d070271a15d7d084b894e9713c18de7b04730752 (diff) | |
download | samba-df1e2693dce2da22a40ae0d0e75d2d3f35bf852f.tar.gz samba-df1e2693dce2da22a40ae0d0e75d2d3f35bf852f.tar.bz2 samba-df1e2693dce2da22a40ae0d0e75d2d3f35bf852f.zip |
r21009: Patch from Danilo Almeida @ Centeris (via me).
Patch details:
Support most options in pam_winbind.conf; support comma-separated names in
require-membership-of. Details below:
1) Provides support for almost all config options in pam_winbind.conf
(all except for use_first_pass, use_authtok, and unknown_ok).
- That allows us to work well when invoked via call_modules from
pam_unix2.conf as well as allowing use of spaces in names used
w/require_membership_of.
2) Support for comma-separated list of names or SID strings in
require_membership_of/require-membership-of.
- Increased require_membership_of field in winbind request from fstring
(256) to pstring (1024).
- In PAM side, parse out multiple names or SID strings and convert
all of them to SID strings.
- In Winbind side, support membership check against multiple SID strings.
(This used to be commit 4aca9864896b3e0890ffc9a6980d7ef1311138f7)
Diffstat (limited to 'source3')
-rw-r--r-- | source3/nsswitch/pam_winbind.c | 209 | ||||
-rw-r--r-- | source3/nsswitch/winbindd_nss.h | 2 | ||||
-rw-r--r-- | source3/nsswitch/winbindd_pam.c | 74 |
3 files changed, 236 insertions, 49 deletions
diff --git a/source3/nsswitch/pam_winbind.c b/source3/nsswitch/pam_winbind.c index f0a60233c5..8984b92df8 100644 --- a/source3/nsswitch/pam_winbind.c +++ b/source3/nsswitch/pam_winbind.c @@ -91,21 +91,18 @@ static void _pam_log_debug(const pam_handle_t *pamh, int ctrl, int err, const ch va_end(args); } -static int _pam_parse(const pam_handle_t *pamh, int flags, int argc, const char **argv, dictionary **d) +static int _pam_parse(const pam_handle_t *pamh, int flags, int argc, const char **argv, dictionary **result_d) { int ctrl = 0; const char *config_file = NULL; int i; const char **v; + dictionary *d = NULL; if (flags & PAM_SILENT) { ctrl |= WINBIND_SILENT; } - if (d == NULL) { - goto config_from_pam; - } - for (i=argc,v=argv; i-- > 0; ++v) { if (!strncasecmp(*v, "config", strlen("config"))) { ctrl |= WINBIND_CONFIG_FILE; @@ -118,36 +115,40 @@ static int _pam_parse(const pam_handle_t *pamh, int flags, int argc, const char config_file = PAM_WINBIND_CONFIG_FILE; } - *d = iniparser_load(config_file); - if (*d == NULL) { + d = iniparser_load(config_file); + if (d == NULL) { goto config_from_pam; } - if (iniparser_getboolean(*d, "global:debug", False)) { + if (iniparser_getboolean(d, "global:debug", False)) { ctrl |= WINBIND_DEBUG_ARG; } - if (iniparser_getboolean(*d, "global:cached_login", False)) { + if (iniparser_getboolean(d, "global:cached_login", False)) { ctrl |= WINBIND_CACHED_LOGIN; } - if (iniparser_getboolean(*d, "global:krb5_auth", False)) { + if (iniparser_getboolean(d, "global:krb5_auth", False)) { ctrl |= WINBIND_KRB5_AUTH; } - if (iniparser_getboolean(*d, "global:silent", False)) { + if (iniparser_getboolean(d, "global:silent", False)) { ctrl |= WINBIND_SILENT; } - if (iniparser_getstr(*d, "global:krb5_ccache_type") != NULL) { + if (iniparser_getstr(d, "global:krb5_ccache_type") != NULL) { ctrl |= WINBIND_KRB5_CCACHE_TYPE; } - if ((iniparser_getstr(*d, "global:require-membership-of") != NULL) || - (iniparser_getstr(*d, "global:require_membership_of") != NULL)) { + if ((iniparser_getstr(d, "global:require-membership-of") != NULL) || + (iniparser_getstr(d, "global:require_membership_of") != NULL)) { ctrl |= WINBIND_REQUIRED_MEMBERSHIP; } + if (iniparser_getboolean(d, "global:try_first_pass", False)) { + ctrl |= WINBIND_TRY_FIRST_PASS_ARG; + } + config_from_pam: /* step through arguments */ for (i=argc,v=argv; i-- > 0; ++v) { @@ -179,6 +180,15 @@ config_from_pam: } } + + if (result_d) { + *result_d = d; + } else { + if (d) { + iniparser_freedict(d); + } + } + return ctrl; }; @@ -447,6 +457,147 @@ static void _pam_warn_password_expires_in_future(pam_handle_t *pamh, struct winb /* no warning sent */ } +#define IS_SID_STRING(name) (strncmp("S-", name, 2) == 0) + +int safe_append_string(char *dest, + const char *src, + int dest_buffer_size) +/** + * Append a string, making sure not to overflow and to always return a NULL-terminated + * string. + * + * @param dest Destination string buffer (must already be NULL-terminated). + * @param src Source string buffer. + * @param dest_buffer_size Size of dest buffer in bytes. + * + * @return 0 if dest buffer is not big enough (no bytes copied), non-zero on success. + */ +{ + int dest_length = strlen(dest); + int src_length = strlen(src); + + if ( dest_length + src_length + 1 > dest_buffer_size ) { + return 0; + } + + memcpy(dest + dest_length, src, src_length + 1); + return 1; +} + +static int winbind_name_to_sid_string(pam_handle_t *pamh, + int ctrl, + const char *user, + const char *name, + char *sid_list_buffer, + int sid_list_buffer_size) +/** + * Convert a names into a SID string, appending it to a buffer. + * + * @param pamh PAM handle + * @param ctrl PAM winbind options. + * @param user User in PAM request. + * @param name Name to convert. + * @param sid_list_buffer Where to append the string sid. + * @param sid_list_buffer Size of sid_list_buffer (in bytes). + * + * @return 0 on failure, non-zero on success. + */ +{ + const char* sid_string; + struct winbindd_response sid_response; + + /* lookup name? */ + if (IS_SID_STRING(name)) { + sid_string = name; + } else { + struct winbindd_request sid_request; + + ZERO_STRUCT(sid_request); + ZERO_STRUCT(sid_response); + + _pam_log_debug(pamh, ctrl, LOG_DEBUG, "no sid given, looking up: %s\n", name); + + /* fortunatly winbindd can handle non-separated names */ + strncpy(sid_request.data.name.name, name, + sizeof(sid_request.data.name.name) - 1); + + if (pam_winbind_request_log(pamh, ctrl, WINBINDD_LOOKUPNAME, &sid_request, &sid_response, user)) { + _pam_log(pamh, ctrl, LOG_INFO, "could not lookup name: %s\n", name); + return 0; + } + + sid_string = sid_response.data.sid.sid; + } + + if (!safe_append_string(sid_list_buffer, sid_string, sid_list_buffer_size)) { + return 0; + } + + return 1; +} + +static int winbind_name_list_to_sid_string_list(pam_handle_t *pamh, + int ctrl, + const char *user, + const char *name_list, + char *sid_list_buffer, + int sid_list_buffer_size) +/** + * Convert a list of names into a list of sids. + * + * @param pamh PAM handle + * @param ctrl PAM winbind options. + * @param user User in PAM request. + * @param name_list List of names or string sids, separated by commas. + * @param sid_list_buffer Where to put the list of string sids. + * @param sid_list_buffer Size of sid_list_buffer (in bytes). + * + * @return 0 on failure, non-zero on success. + */ +{ + int result = 0; + char *current_name = NULL; + const char *search_location; + const char *comma; + + if ( sid_list_buffer_size > 0 ) { + sid_list_buffer[0] = 0; + } + + search_location = name_list; + while ( (comma = strstr(search_location, ",")) != NULL ) { + current_name = strndup(search_location, comma - search_location); + if (NULL == current_name) { + goto out; + } + + if (!winbind_name_to_sid_string(pamh, ctrl, user, current_name, sid_list_buffer, sid_list_buffer_size)) { + goto out; + } + + free(current_name); + current_name = NULL; + + if (!safe_append_string(sid_list_buffer, ",", sid_list_buffer_size)) { + goto out; + } + + search_location = comma + 1; + } + + if (!winbind_name_to_sid_string(pamh, ctrl, user, search_location, sid_list_buffer, sid_list_buffer_size)) { + goto out; + } + + result = 1; + +out: + if (current_name != NULL) { + free(current_name); + } + return result; +} + /* talk to winbindd */ static int winbind_auth_request(pam_handle_t * pamh, int ctrl, @@ -514,36 +665,16 @@ static int winbind_auth_request(pam_handle_t * pamh, request.data.auth.require_membership_of_sid[0] = '\0'; if (member != NULL) { - strncpy(request.data.auth.require_membership_of_sid, member, - sizeof(request.data.auth.require_membership_of_sid)-1); - } - /* lookup name? */ - if ( (member != NULL) && (strncmp("S-", member, 2) != 0) ) { - - struct winbindd_request sid_request; - struct winbindd_response sid_response; + if (!winbind_name_list_to_sid_string_list(pamh, ctrl, user, member, + request.data.auth.require_membership_of_sid, + sizeof(request.data.auth.require_membership_of_sid))) { - ZERO_STRUCT(sid_request); - ZERO_STRUCT(sid_response); - - _pam_log_debug(pamh, ctrl, LOG_DEBUG, "no sid given, looking up: %s\n", member); - - /* fortunatly winbindd can handle non-separated names */ - strncpy(sid_request.data.name.name, member, - sizeof(sid_request.data.name.name) - 1); - - if (pam_winbind_request_log(pamh, ctrl, WINBINDD_LOOKUPNAME, &sid_request, &sid_response, user)) { - _pam_log(pamh, ctrl, LOG_INFO, "could not lookup name: %s\n", member); + _pam_log_debug(pamh, ctrl, LOG_ERR, "failed to serialize membership of sid \"%s\"\n", member); return PAM_AUTH_ERR; } - - member = sid_response.data.sid.sid; - - strncpy(request.data.auth.require_membership_of_sid, member, - sizeof(request.data.auth.require_membership_of_sid)-1); } - + ret = pam_winbind_request_log(pamh, ctrl, WINBINDD_PAM_AUTH, &request, &response, user); if (pwd_last_set) { diff --git a/source3/nsswitch/winbindd_nss.h b/source3/nsswitch/winbindd_nss.h index 95992181f5..b6c262e466 100644 --- a/source3/nsswitch/winbindd_nss.h +++ b/source3/nsswitch/winbindd_nss.h @@ -239,7 +239,7 @@ struct winbindd_request { character is. */ fstring user; fstring pass; - fstring require_membership_of_sid; + pstring require_membership_of_sid; fstring krb5_cc_type; uid_t uid; } auth; /* pam_winbind auth module */ diff --git a/source3/nsswitch/winbindd_pam.c b/source3/nsswitch/winbindd_pam.c index b383ec663a..fcaad1fb1f 100644 --- a/source3/nsswitch/winbindd_pam.c +++ b/source3/nsswitch/winbindd_pam.c @@ -113,11 +113,27 @@ static NTSTATUS append_info3_as_ndr(TALLOC_CTX *mem_ctx, static NTSTATUS check_info3_in_group(TALLOC_CTX *mem_ctx, NET_USER_INFO_3 *info3, const char *group_sid) +/** + * Check whether a user belongs to a group or list of groups. + * + * @param mem_ctx talloc memory context. + * @param info3 user information, including group membership info. + * @param group_sid One or more groups , separated by commas. + * + * @return NT_STATUS_OK on success, + * NT_STATUS_LOGON_FAILURE if the user does not belong, + * or other NT_STATUS_IS_ERR(status) for other kinds of failure. + */ { - DOM_SID require_membership_of_sid; + DOM_SID *require_membership_of_sid; + size_t num_require_membership_of_sid; DOM_SID *all_sids; size_t num_all_sids = (2 + info3->num_groups2 + info3->num_other_sids); - size_t i, j = 0; + size_t i, j = 0, k; + size_t group_sid_length; + const char *search_location; + char *single_group_sid; + const char *comma; /* Parse the 'required group' SID */ @@ -125,10 +141,48 @@ static NTSTATUS check_info3_in_group(TALLOC_CTX *mem_ctx, /* NO sid supplied, all users may access */ return NT_STATUS_OK; } - - if (!string_to_sid(&require_membership_of_sid, group_sid)) { + + num_require_membership_of_sid = 1; + group_sid_length = strlen(group_sid); + for (i = 0; i < group_sid_length; i++) { + if (',' == group_sid[i]) { + num_require_membership_of_sid++; + } + } + + require_membership_of_sid = TALLOC_ARRAY(mem_ctx, DOM_SID, num_require_membership_of_sid); + if (!require_membership_of_sid) + return NT_STATUS_NO_MEMORY; + + i = 0; + search_location = group_sid; + + if (num_require_membership_of_sid > 1) { + + /* Allocate the maximum possible size */ + single_group_sid = TALLOC(mem_ctx, group_sid_length); + if (!single_group_sid) + return NT_STATUS_NO_MEMORY; + + while ( (comma = strstr(search_location, ",")) != NULL ) { + + strncpy(single_group_sid, search_location, comma - search_location); + single_group_sid[comma - search_location] = 0; + + if (!string_to_sid(&require_membership_of_sid[i++], single_group_sid)) { + DEBUG(0, ("check_info3_in_group: could not parse %s as a SID!", + single_group_sid)); + + return NT_STATUS_INVALID_PARAMETER; + } + + search_location = comma + 1; + } + } + + if (!string_to_sid(&require_membership_of_sid[i++], search_location)) { DEBUG(0, ("check_info3_in_group: could not parse %s as a SID!", - group_sid)); + search_location)); return NT_STATUS_INVALID_PARAMETER; } @@ -188,10 +242,12 @@ static NTSTATUS check_info3_in_group(TALLOC_CTX *mem_ctx, fstring sid1, sid2; DEBUG(10, ("User has SID: %s\n", sid_to_string(sid1, &all_sids[i]))); - if (sid_equal(&require_membership_of_sid, &all_sids[i])) { - DEBUG(10, ("SID %s matches %s - user permitted to authenticate!\n", - sid_to_string(sid1, &require_membership_of_sid), sid_to_string(sid2, &all_sids[i]))); - return NT_STATUS_OK; + for (k = 0; k < num_require_membership_of_sid; k++) { + if (sid_equal(&require_membership_of_sid[k], &all_sids[i])) { + DEBUG(10, ("SID %s matches %s - user permitted to authenticate!\n", + sid_to_string(sid1, &require_membership_of_sid[k]), sid_to_string(sid2, &all_sids[i]))); + return NT_STATUS_OK; + } } } |