diff options
author | Andrew Bartlett <abartlet@samba.org> | 2005-06-03 14:32:10 +0000 |
---|---|---|
committer | Gerald (Jerry) Carter <jerry@samba.org> | 2007-10-10 13:17:30 -0500 |
commit | 089b5381630f015cf2e81e8509fa7025eadb4060 (patch) | |
tree | bcd836749833d88dbda666cde7f906b226cbd6a2 /source4 | |
parent | 752ffdf49c37a9396ae22cbd9661bf87fe599250 (diff) | |
download | samba-089b5381630f015cf2e81e8509fa7025eadb4060.tar.gz samba-089b5381630f015cf2e81e8509fa7025eadb4060.tar.bz2 samba-089b5381630f015cf2e81e8509fa7025eadb4060.zip |
r7241: The KDC almost links...
Using current lorikeet/heimdal, and with the KDC module enabled (it is
disabled by default), I almost get the KDC to link.
(To enable the KDC for testing, comment out the only line in
smbd/config.m4, and add 'kdc' to the 'server services' line in
smb.conf).
(This used to be commit 26cd4b4f68a370390e08263067402c6c70e49ec8)
Diffstat (limited to 'source4')
-rw-r--r-- | source4/auth/kerberos/config.m4 | 5 | ||||
-rw-r--r-- | source4/kdc/config.mk | 3 | ||||
-rw-r--r-- | source4/kdc/hdb-ldb.c | 1066 | ||||
-rw-r--r-- | source4/kdc/kdc.c | 66 | ||||
-rw-r--r-- | source4/kdc/kdc.h | 3 |
5 files changed, 1137 insertions, 6 deletions
diff --git a/source4/auth/kerberos/config.m4 b/source4/auth/kerberos/config.m4 index 67921e9717..e638ccfa2c 100644 --- a/source4/auth/kerberos/config.m4 +++ b/source4/auth/kerberos/config.m4 @@ -176,6 +176,8 @@ if test x$with_krb5_support != x"no"; then with_krb5_support="no" fi + AC_CHECK_HEADERS(kdc.h) + CFLAGS=$ac_save_CFLAGS CPPFLAGS=$ac_save_CPPFLAGS LDFLAGS=$ac_save_LDFLAGS @@ -202,6 +204,8 @@ if test x"$with_krb5_support" != x"no"; then AC_CHECK_LIB_EXT(com_err, KRB5_LIBS, _et_list) AC_CHECK_LIB_EXT(k5crypto, KRB5_LIBS, krb5_encrypt_data) + AC_CHECK_LIB_EXT(kdc, KRB5_LIBS, krb5_kdc_default_config) + # Heimdal checks. # But only if we didn't have a krb5-config to tell us this already if test x"$FOUND_KRB5_VIA_CONFIG" != x"yes"; then @@ -493,3 +497,4 @@ fi SMB_EXT_LIB(KRB5,[${KRB5_LIBS}],[${KRB5_CFLAGS}],[${KRB5_CPPFLAGS}],[${KRB5_LDFLAGS}]) + diff --git a/source4/kdc/config.mk b/source4/kdc/config.mk index b9313b2544..c6c4f4c5c1 100644 --- a/source4/kdc/config.mk +++ b/source4/kdc/config.mk @@ -4,7 +4,8 @@ # Start SUBSYSTEM CLDAPD [SUBSYSTEM::KDC] INIT_OBJ_FILES = \ - kdc/kdc.o + kdc/kdc.o \ + kdc/hdb-ldb.o REQUIRED_SUBSYSTEMS = \ SOCKET # End SUBSYSTEM CLDAPD diff --git a/source4/kdc/hdb-ldb.c b/source4/kdc/hdb-ldb.c new file mode 100644 index 0000000000..601821fc42 --- /dev/null +++ b/source4/kdc/hdb-ldb.c @@ -0,0 +1,1066 @@ +/* + * Copyright (c) 1999-2001, 2003, PADL Software Pty Ltd. + * Copyright (c) 2004, Andrew Bartlett <abartlet@samba.org>. + * Copyright (c) 2004, Stefan Metzmacher <metze@samba.org> + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * 3. Neither the name of PADL Software nor the names of its contributors + * may be used to endorse or promote products derived from this software + * without specific prior written permission. + * + * THIS SOFTWARE IS PROVIDED BY PADL SOFTWARE AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL PADL SOFTWARE OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + */ + +#include "includes.h" +#include "kdc.h" +#include "ads.h" +#include <hdb.h> +#include <unistd.h> +#include <stdint.h> +#include <stdio.h> +#include <stdarg.h> + +#include <ldb.h> +#include <talloc.h> + +#include <ctype.h> + + +static const char * const krb5_attrs[] = { + "objectClass", + "cn", + "name", + "sAMAccountName", + + "userPrincipalName", + "servicePrincipalName", + + "userAccountControl", + "sAMAccountType", + + "objectSid", + "primaryGroupID", + "memberOf", + + "unicodePWD", + "lmPwdHash", + "ntPwdHash", + + "badPwdCount", + "badPasswordTime", + "lastLogoff", + "lastLogon", + "pwdLastSet", + "accountExpires", + "logonCount", + + "objectGUID", + "whenCreated", + "whenChanged", + "uSNCreated", + "uSNChanged", + "msDS-KeyVersionNumber", + NULL +}; + +static KerberosTime ldb_msg_find_krb5time_ldap_time(struct ldb_message *msg, const char *attr, KerberosTime default_val) +{ + const char *tmp; + const char *gentime; + struct tm tm; + + gentime = ldb_msg_find_string(msg, attr, NULL); + if (!gentime) + return default_val; + + tmp = strptime(gentime, "%Y%m%d%H%M%SZ", &tm); + if (tmp == NULL) { + return default_val; + } + + return timegm(&tm); +} + +static HDBFlags uf2HDBFlags(krb5_context context, int userAccountControl, enum hdb_ent_type ent_type) +{ + HDBFlags flags = int2HDBFlags(0); + + krb5_warnx(context, "uf2HDBFlags: userAccountControl: %08x\n", userAccountControl); + + /* we don't allow kadmin deletes */ + flags.immutable = 1; + + /* mark the principal as invalid to start with */ + flags.invalid = 1; + + /* Account types - clear the invalid bit if it turns out to be valid */ + if (userAccountControl & UF_NORMAL_ACCOUNT) { + if (ent_type == HDB_ENT_TYPE_CLIENT || ent_type == HDB_ENT_TYPE_ENUM) { + flags.client = 1; + } + flags.invalid = 0; + } + + if (userAccountControl & UF_INTERDOMAIN_TRUST_ACCOUNT) { + if (ent_type == HDB_ENT_TYPE_CLIENT || ent_type == HDB_ENT_TYPE_ENUM) { + flags.client = 1; + } + flags.invalid = 0; + } + if (userAccountControl & UF_WORKSTATION_TRUST_ACCOUNT) { + if (ent_type == HDB_ENT_TYPE_CLIENT || ent_type == HDB_ENT_TYPE_ENUM) { + flags.client = 1; + } + if (ent_type == HDB_ENT_TYPE_SERVER || ent_type == HDB_ENT_TYPE_ENUM) { + flags.server = 1; + } + flags.invalid = 0; + } + if (userAccountControl & UF_SERVER_TRUST_ACCOUNT) { + if (ent_type == HDB_ENT_TYPE_CLIENT || ent_type == HDB_ENT_TYPE_ENUM) { + flags.client = 1; + } + if (ent_type == HDB_ENT_TYPE_SERVER || ent_type == HDB_ENT_TYPE_ENUM) { + flags.server = 1; + } + flags.invalid = 0; + } + + if (userAccountControl & UF_ACCOUNTDISABLE) { + flags.invalid = 1; + } + if (userAccountControl & UF_LOCKOUT) { + flags.invalid = 1; + } +/* + if (userAccountControl & UF_PASSWORD_NOTREQD) { + flags.invalid = 1; + } +*/ +/* + if (userAccountControl & UF_PASSWORD_CANT_CHANGE) { + flags.invalid = 1; + } +*/ +/* + if (userAccountControl & UF_ENCRYPTED_TEXT_PASSWORD_ALLOWED) { + flags.invalid = 1; + } +*/ + if (userAccountControl & UF_TEMP_DUPLICATE_ACCOUNT) { + flags.invalid = 1; + } + +/* UF_DONT_EXPIRE_PASSWD handled in LDB_message2entry() */ + +/* + if (userAccountControl & UF_MNS_LOGON_ACCOUNT) { + flags.invalid = 1; + } +*/ + if (userAccountControl & UF_SMARTCARD_REQUIRED) { + flags.require_hwauth = 1; + } + if (flags.server && (userAccountControl & UF_TRUSTED_FOR_DELEGATION)) { + flags.forwardable = 1; + flags.proxiable = 1; + } else if (flags.client && (userAccountControl & UF_NOT_DELEGATED)) { + flags.forwardable = 0; + flags.proxiable = 0; + } else { + flags.forwardable = 1; + flags.proxiable = 1; + } + +/* + if (userAccountControl & UF_SMARTCARD_USE_DES_KEY_ONLY) { + flags.invalid = 1; + } +*/ + if (userAccountControl & UF_DONT_REQUIRE_PREAUTH) { + flags.require_preauth = 0; + } else { + flags.require_preauth = 1; + + } + + krb5_warnx(context, "uf2HDBFlags: HDBFlags: %08x\n", HDBFlags2int(flags)); + + return flags; +} + +/* + * Construct an hdb_entry from a directory entry. + */ +static krb5_error_code LDB_message2entry(krb5_context context, HDB *db, + TALLOC_CTX *mem_ctx, krb5_const_principal principal, + enum hdb_ent_type ent_type, struct ldb_message *realm_msg, + struct ldb_message *msg, + hdb_entry *ent) +{ + const char *unicodePwd; + int userAccountControl; + int i; + krb5_error_code ret = 0; + const char *dnsdomain = ldb_msg_find_string(realm_msg, "dnsDomain", NULL); + char *realm = talloc_strdup(mem_ctx, dnsdomain); + + if (!realm) { + krb5_set_error_string(context, "talloc_strdup: out of memory"); + ret = ENOMEM; + goto out; + } + + /* TODO: Use Samba charset functions */ + for (i=0; i< strlen(realm); i++) { + realm[i] = toupper(realm[i]); + } + + krb5_warnx(context, "LDB_message2entry:\n"); + + memset(ent, 0, sizeof(*ent)); + + userAccountControl = ldb_msg_find_int(msg, "userAccountControl", 0); + + ent->principal = malloc(sizeof(*(ent->principal))); + if (ent_type == HDB_ENT_TYPE_ENUM && principal == NULL) { + const char *samAccountName = ldb_msg_find_string(msg, "samAccountName", NULL); + if (!samAccountName) { + krb5_set_error_string(context, "LDB_message2entry: no samAccountName present"); + ret = ENOENT; + goto out; + } + samAccountName = ldb_msg_find_string(msg, "samAccountName", NULL); + krb5_make_principal(context, &ent->principal, realm, samAccountName, NULL); + } else { + char *strdup_realm; + ret = copy_Principal(principal, ent->principal); + if (ret) { + krb5_clear_error_string(context); + goto out; + } + + /* While we have copied the client principal, tests + * show that Win2k3 returns the 'corrected' realm, not + * the client-specified realm. This code attempts to + * replace the client principal's realm with the one + * we determine from our records */ + + /* don't leak */ + free(*krb5_princ_realm(context, ent->principal)); + + /* this has to be with malloc() */ + strdup_realm = strdup(realm); + if (!strdup_realm) { + ret = ENOMEM; + krb5_clear_error_string(context); + goto out; + } + krb5_princ_set_realm(context, ent->principal, &strdup_realm); + } + + ent->kvno = ldb_msg_find_int(msg, "msDS-KeyVersionNumber", 0); + + ent->flags = uf2HDBFlags(context, userAccountControl, ent_type); + + if (ent_type == HDB_ENT_TYPE_KRBTGT) { + ent->flags.invalid = 0; + ent->flags.server = 1; + } + + /* use 'whenCreated' */ + ent->created_by.time = ldb_msg_find_krb5time_ldap_time(msg, "whenCreated", 0); + /* use '???' */ + ent->created_by.principal = NULL; + + ent->modified_by = (Event *) malloc(sizeof(Event)); + if (ent->modified_by == NULL) { + krb5_set_error_string(context, "malloc: out of memory"); + ret = ENOMEM; + goto out; + } + + /* use 'whenChanged' */ + ent->modified_by->time = ldb_msg_find_krb5time_ldap_time(msg, "whenChanged", 0); + /* use '???' */ + ent->modified_by->principal = NULL; + + ent->valid_start = NULL; + + ent->valid_end = NULL; + ent->pw_end = NULL; + + ent->max_life = NULL; + + ent->max_renew = NULL; + + ent->generation = NULL; + + /* create the keys and enctypes */ + unicodePwd = ldb_msg_find_string(msg, "unicodePwd", NULL); + if (unicodePwd) { + /* Many, many thanks to lukeh@padl.com for this + * algorithm, described in his Nov 10 2004 mail to + * samba-technical@samba.org */ + + Principal *salt_principal; + const char *user_principal_name = ldb_msg_find_string(msg, "userPrincipalName", NULL); + struct ldb_message_element *objectclasses; + struct ldb_val computer_val; + computer_val.data = "computer"; + computer_val.length = strlen(computer_val.data); + + objectclasses = ldb_msg_find_element(msg, "objectClass"); + + if (objectclasses && ldb_msg_find_val(objectclasses, &computer_val)) { + /* Determine a salting principal */ + char *samAccountName = talloc_strdup(mem_ctx, ldb_msg_find_string(msg, "samAccountName", NULL)); + char *saltbody; + if (!samAccountName) { + krb5_set_error_string(context, "LDB_message2entry: no samAccountName present"); + ret = ENOENT; + goto out; + } + if (samAccountName[strlen(samAccountName)-1] == '$') { + samAccountName[strlen(samAccountName)-1] = '\0'; + } + saltbody = talloc_asprintf(mem_ctx, "%s.%s", samAccountName, dnsdomain); + + ret = krb5_make_principal(context, &salt_principal, realm, "host", saltbody, NULL); + } else if (user_principal_name) { + char *p; + user_principal_name = talloc_strdup(mem_ctx, user_principal_name); + if (!user_principal_name) { + ret = ENOMEM; + goto out; + } else { + p = strchr(user_principal_name, '@'); + if (p) { + p[0] = '\0'; + } + ret = krb5_make_principal(context, &salt_principal, realm, user_principal_name, NULL); + } + } else { + const char *samAccountName = ldb_msg_find_string(msg, "samAccountName", NULL); + ret = krb5_make_principal(context, &salt_principal, realm, samAccountName, NULL); + } + + if (ret == 0) { + /* + * create keys from unicodePwd + */ + ret = hdb_generate_key_set_password(context, salt_principal, + unicodePwd, + &ent->keys.val, &ent->keys.len); + krb5_free_principal(context, salt_principal); + } + + if (ret != 0) { + krb5_warnx(context, "could not generate keys from unicodePwd\n"); + ent->keys.val = NULL; + ent->keys.len = 0; + goto out; + } + } else { + const struct ldb_val *val; + krb5_data keyvalue; + + val = ldb_msg_find_ldb_val(msg, "ntPwdHash"); + if (!val) { + krb5_warnx(context, "neither type of key available for this account\n"); + ent->keys.val = NULL; + ent->keys.len = 0; + } else if (val->length < 16) { + ent->keys.val = NULL; + ent->keys.len = 0; + krb5_warnx(context, "ntPwdHash has invalid length: %d\n",val->length); + } else { + ret = krb5_data_alloc (&keyvalue, 16); + if (ret) { + krb5_set_error_string(context, "malloc: out of memory"); + ret = ENOMEM; + goto out; + } + + memcpy(keyvalue.data, val->data, 16); + + ent->keys.val = malloc(sizeof(ent->keys.val[0])); + if (ent->keys.val == NULL) { + krb5_data_free(&keyvalue); + krb5_set_error_string(context, "malloc: out of memory"); + ret = ENOMEM; + goto out; + } + + memset(&ent->keys.val[0], 0, sizeof(Key)); + ent->keys.val[0].key.keytype = ETYPE_ARCFOUR_HMAC_MD5; + ent->keys.val[0].key.keyvalue = keyvalue; + + ent->keys.len = 1; + } + } + + + ent->etypes = malloc(sizeof(*(ent->etypes))); + if (ent->etypes == NULL) { + krb5_set_error_string(context, "malloc: out of memory"); + ret = ENOMEM; + goto out; + } + ent->etypes->len = ent->keys.len; + ent->etypes->val = calloc(ent->etypes->len, sizeof(int)); + if (ent->etypes->val == NULL) { + krb5_set_error_string(context, "malloc: out of memory"); + ret = ENOMEM; + goto out; + } + for (i=0; i < ent->etypes->len; i++) { + ent->etypes->val[i] = ent->keys.val[i].key.keytype; + } + +out: + if (ret != 0) { + /* I don't think this frees ent itself. */ + hdb_free_entry(context, ent); + } + + return ret; +} + +static krb5_error_code LDB_lookup_principal(krb5_context context, struct ldb_context *ldb_ctx, + TALLOC_CTX *mem_ctx, + krb5_const_principal principal, + enum hdb_ent_type ent_type, + const char *realm_dn, + struct ldb_message ***pmsg) +{ + krb5_error_code ret; + int count; + char *filter = NULL; + const char * const *princ_attrs = krb5_attrs; + char *p; + + char *princ_str; + char *princ_str_talloc; + char *short_princ; + + struct ldb_message **msg; + + ret = krb5_unparse_name(context, principal, &princ_str); + + if (ret != 0) { + krb5_set_error_string(context, "LDB_lookup_principal: could not parse principal"); + krb5_warnx(context, "LDB_lookup_principal: could not parse principal"); + return ret; + } + + princ_str_talloc = talloc_strdup(mem_ctx, princ_str); + short_princ = talloc_strdup(mem_ctx, princ_str); + free(princ_str); + if (!short_princ || !princ_str_talloc) { + krb5_set_error_string(context, "LDB_lookup_principal: talloc_strdup() failed!"); + return ENOMEM; + } + + p = strchr(short_princ, '@'); + if (p) { + p[0] = '\0'; + } + + + switch (ent_type) { + case HDB_ENT_TYPE_KRBTGT: + filter = talloc_asprintf(mem_ctx, "(&(objectClass=user)(samAccountName=%s))", + KRB5_TGS_NAME); + break; + case HDB_ENT_TYPE_CLIENT: + filter = talloc_asprintf(mem_ctx, "(&(objectClass=user)(|(samAccountName=%s)(userPrincipalName=%s)))", + short_princ, princ_str_talloc); + break; + case HDB_ENT_TYPE_SERVER: + filter = talloc_asprintf(mem_ctx, "(&(objectClass=user)(|(samAccountName=%s)(servicePrincipalName=%s)))", + short_princ, short_princ); + break; + case HDB_ENT_TYPE_ENUM: + filter = talloc_asprintf(mem_ctx, "(&(objectClass=user)(|(|(samAccountName=%s)(servicePrincipalName=%s))(userPrincipalName=%s)))", + short_princ, short_princ, princ_str_talloc); + break; + } + + if (!filter) { + krb5_set_error_string(context, "talloc_asprintf: out of memory"); + return ENOMEM; + } + + count = ldb_search(ldb_ctx, realm_dn, LDB_SCOPE_SUBTREE, filter, + princ_attrs, &msg); + + *pmsg = talloc_steal(mem_ctx, msg); + if (count < 1) { + krb5_warnx(context, "ldb_search: basedn: '%s' filter: '%s' failed: %d", + realm_dn, filter, count); + krb5_set_error_string(context, "ldb_search: basedn: '%s' filter: '%s' failed: %d", + realm_dn, filter, count); + return HDB_ERR_NOENTRY; + } else if (count > 1) { + krb5_warnx(context, "ldb_search: basedn: '%s' filter: '%s' more than 1 entry: %d", + realm_dn, filter, count); + krb5_set_error_string(context, "ldb_search: basedn: '%s' filter: '%s' more than 1 entry: %d", + realm_dn, filter, count); + return HDB_ERR_NOENTRY; + } + return 0; +} + +static krb5_error_code LDB_lookup_realm(krb5_context context, struct ldb_context *ldb_ctx, + TALLOC_CTX *mem_ctx, + const char *realm, + struct ldb_message ***pmsg) +{ + int count; + const char *realm_dn; + char *cross_ref_filter; + struct ldb_message **cross_ref_msg; + struct ldb_message **msg; + + const char *cross_ref_attrs[] = { + "nCName", + NULL + }; + + const char *realm_attrs[] = { + "dnsDomain", + "maxPwdAge", + NULL + }; + + cross_ref_filter = talloc_asprintf(mem_ctx, + "(&(&(|(&(dnsRoot=%s)(nETBIOSName=*))(nETBIOSName=%s))(objectclass=crossRef))(ncName=*))", + realm, realm); + if (!cross_ref_filter) { + krb5_set_error_string(context, "asprintf: out of memory"); + return ENOMEM; + } + + count = ldb_search(ldb_ctx, NULL, LDB_SCOPE_SUBTREE, cross_ref_filter, + cross_ref_attrs, &cross_ref_msg); + + if (count < 1) { + krb5_warnx(context, "ldb_search: filter: '%s' failed: %d", cross_ref_filter, count); + krb5_set_error_string(context, "ldb_search: filter: '%s' failed: %d", cross_ref_filter, count); + + talloc_free(cross_ref_msg); + return HDB_ERR_NOENTRY; + } else if (count > 1) { + krb5_warnx(context, "ldb_search: filter: '%s' more than 1 entry: %d", cross_ref_filter, count); + krb5_set_error_string(context, "ldb_search: filter: '%s' more than 1 entry: %d", cross_ref_filter, count); + + talloc_free(cross_ref_msg); + return HDB_ERR_NOENTRY; + } + + realm_dn = ldb_msg_find_string(cross_ref_msg[0], "nCName", NULL); + + count = ldb_search(ldb_ctx, realm_dn, LDB_SCOPE_BASE, "(objectClass=domain)", + realm_attrs, &msg); + if (pmsg) { + *pmsg = talloc_steal(mem_ctx, msg); + } else { + talloc_free(msg); + } + + if (count < 1) { + krb5_warnx(context, "ldb_search: dn: %s not found: %d", realm_dn, count); + krb5_set_error_string(context, "ldb_search: dn: %s not found: %d", realm_dn, count); + return HDB_ERR_NOENTRY; + } else if (count > 1) { + krb5_warnx(context, "ldb_search: dn: '%s' more than 1 entry: %d", realm_dn, count); + krb5_set_error_string(context, "ldb_search: dn: %s more than 1 entry: %d", realm_dn, count); + return HDB_ERR_NOENTRY; + } + + return 0; +} + +static krb5_error_code LDB_lookup_spn_alias(krb5_context context, struct ldb_context *ldb_ctx, + TALLOC_CTX *mem_ctx, + const char *realm_dn, + const char *alias_from, + char **alias_to) +{ + int i; + int count; + struct ldb_message **msg; + struct ldb_message_element *spnmappings; + char *service_dn = talloc_asprintf(mem_ctx, + "CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration,%s", + realm_dn); + const char *directory_attrs[] = { + "sPNMappings", + NULL + }; + + count = ldb_search(ldb_ctx, service_dn, LDB_SCOPE_BASE, "(objectClass=nTDSService)", + directory_attrs, &msg); + talloc_steal(mem_ctx, msg); + + if (count < 1) { + krb5_warnx(context, "ldb_search: dn: %s not found: %d", service_dn, count); + krb5_set_error_string(context, "ldb_search: dn: %s not found: %d", service_dn, count); + return HDB_ERR_NOENTRY; + } else if (count > 1) { + krb5_warnx(context, "ldb_search: dn: %s found %d times!", service_dn, count); + krb5_set_error_string(context, "ldb_search: dn: %s found %d times!", service_dn, count); + return HDB_ERR_NOENTRY; + } + + spnmappings = ldb_msg_find_element(msg[0], "sPNMappings"); + if (!spnmappings || spnmappings->num_values == 0) { + krb5_warnx(context, "ldb_search: dn: %s no sPNMappings attribute", service_dn); + krb5_set_error_string(context, "ldb_search: dn: %s no sPNMappings attribute", service_dn); + } + + for (i = 0; i < spnmappings->num_values; i++) { + char *mapping, *p, *str; + mapping = talloc_strdup(mem_ctx, + spnmappings->values[i].data); + if (!mapping) { + krb5_warnx(context, "LDB_lookup_spn_alias: ldb_search: dn: %s did not have an sPNMapping", service_dn); + krb5_set_error_string(context, "LDB_lookup_spn_alias: ldb_search: dn: %s did not have an sPNMapping", service_dn); + return HDB_ERR_NOENTRY; + } + + /* C string manipulation sucks */ + + p = strchr(mapping, '='); + if (!p) { + krb5_warnx(context, "ldb_search: dn: %s sPNMapping malformed: %s", + service_dn, mapping); + krb5_set_error_string(context, "ldb_search: dn: %s sPNMapping malformed: %s", + service_dn, mapping); + } + p[0] = '\0'; + p++; + do { + str = p; + p = strchr(p, ','); + if (p) { + p[0] = '\0'; + p++; + } + if (strcasecmp(str, alias_from) == 0) { + krb5_warnx(context, "LDB_lookup_spn_alias: got alias %s for service %s", + mapping, alias_from); + *alias_to = mapping; + return 0; + } + } while (p); + } + krb5_warnx(context, "LDB_lookup_spn_alias: no alias for service %s applicable", alias_from); + return HDB_ERR_NOENTRY; +} + +static krb5_error_code LDB_open(krb5_context context, HDB *db, int flags, mode_t mode) +{ + struct ldb_context *sam_db; + + if (db->hdb_master_key_set) { + krb5_warnx(context, "LDB_open: use of a master key incompatible with LDB\n"); + krb5_set_error_string(context, "LDB_open: use of a master key incompatible with LDB\n"); + return HDB_ERR_NOENTRY; + } + + /* in future, we could cache the connect here, but for now KISS */ + + sam_db = ldb_connect(db->hdb_name, 0, NULL); + if (sam_db == NULL) { + krb5_warnx(context, "LDB_open: hdb_name '%s' failed\n",db->hdb_name); + krb5_set_error_string(context, "ldb_connect(%s, 0, NULL) failed!", db->hdb_name); + return HDB_ERR_NOENTRY; + } + + db->hdb_db = talloc_steal(db, sam_db); + + krb5_warnx(context, "LDB_open: hdb_name '%s' ok\n",db->hdb_name); + + return 0; +} + +static krb5_error_code LDB_close(krb5_context context, HDB *db) +{ + talloc_free(db->hdb_db); + db->hdb_db = NULL; + return 0; +} + +static krb5_error_code LDB_lock(krb5_context context, HDB *db, int operation) +{ + return 0; +} + +static krb5_error_code LDB_unlock(krb5_context context, HDB *db) +{ + return 0; +} + +static krb5_error_code LDB_rename(krb5_context context, HDB *db, const char *new_name) +{ + return HDB_ERR_DB_INUSE; +} + +static krb5_error_code LDB_fetch(krb5_context context, HDB *db, unsigned flags, + krb5_const_principal principal, + enum hdb_ent_type ent_type, + hdb_entry *entry) +{ + struct ldb_message **msg = NULL; + struct ldb_message **realm_msg = NULL; + krb5_error_code ret; + + const char *realm; + const char *realm_dn; + TALLOC_CTX *mem_ctx = talloc_named(NULL, 0, "LDB_fetch context\n"); + + if (!mem_ctx) { + krb5_set_error_string(context, "LDB_fetch: talloc_named() failed!"); + return ENOMEM; + } + + realm = krb5_principal_get_realm(context, principal); + + ret = LDB_lookup_realm(context, (struct ldb_context *)db->hdb_db, + mem_ctx, realm, &realm_msg); + if (ret != 0) { + krb5_warnx(context, "LDB_fetch: could not find realm\n"); + talloc_free(mem_ctx); + return HDB_ERR_NOENTRY; + } + + realm_dn = realm_msg[0]->dn; + + /* Cludge, cludge cludge. If the realm part of krbtgt/realm, + * is in our db, then direct the caller at our primary + * krgtgt */ + if (ent_type != HDB_ENT_TYPE_KRBTGT + && principal->name.name_string.len == 2 + && (strcmp(principal->name.name_string.val[0], KRB5_TGS_NAME) == 0) + && (LDB_lookup_realm(context, (struct ldb_context *)db->hdb_db, + mem_ctx, principal->name.name_string.val[1], NULL) == 0)) { + ent_type = HDB_ENT_TYPE_KRBTGT; + } + + ret = LDB_lookup_principal(context, (struct ldb_context *)db->hdb_db, + mem_ctx, + principal, ent_type, realm_dn, &msg); + + if (ret != 0) { + char *alias_from = principal->name.name_string.val[0]; + char *alias_to; + Principal alias_principal; + + /* Try again with a servicePrincipal alias */ + if (ent_type != HDB_ENT_TYPE_SERVER && ent_type != HDB_ENT_TYPE_ENUM) { + talloc_free(mem_ctx); + return ret; + } + if (principal->name.name_string.len < 2) { + krb5_warnx(context, "LDB_fetch: could not find principal in DB, alias not applicable"); + krb5_set_error_string(context, "LDB_fetch: could not find principal in DB, alias not applicable"); + talloc_free(mem_ctx); + return ret; + } + + /* Look for the list of aliases */ + ret = LDB_lookup_spn_alias(context, + (struct ldb_context *)db->hdb_db, mem_ctx, + realm_dn, alias_from, + &alias_to); + if (ret != 0) { + talloc_free(mem_ctx); + return ret; + } + + ret = copy_Principal(principal, &alias_principal); + if (ret != 0) { + krb5_warnx(context, "LDB_fetch: could not copy principal"); + krb5_set_error_string(context, "LDB_fetch: could not copy principal"); + talloc_free(mem_ctx); + return ret; + } + + /* ooh, very nasty playing around in the Principal... */ + free(alias_principal.name.name_string.val[0]); + alias_principal.name.name_string.val[0] = strdup(alias_to); + if (!alias_principal.name.name_string.val[0]) { + krb5_warnx(context, "LDB_fetch: strdup() failed"); + krb5_set_error_string(context, "LDB_fetch: strdup() failed"); + ret = ENOMEM; + talloc_free(mem_ctx); + return ret; + } + + ret = LDB_lookup_principal(context, (struct ldb_context *)db->hdb_db, + mem_ctx, + &alias_principal, ent_type, realm_dn, &msg); + if (ret != 0) { + krb5_warnx(context, "LDB_fetch: could not find alias principal in DB"); + krb5_set_error_string(context, "LDB_fetch: could not find alias principal in DB"); + talloc_free(mem_ctx); + return ret; + } + + } + if (ret == 0) { + ret = LDB_message2entry(context, db, mem_ctx, + principal, ent_type, + realm_msg[0], msg[0], entry); + if (ret != 0) { + krb5_warnx(context, "LDB_fetch: message2entry failed\n"); +#if 0 /* master key support removed */ + } else { + if (db->hdb_master_key_set && (!(flags & HDB_F_DECRYPT))) { + ret = hdb_seal_keys(context, db, entry); + } +#endif + } + } + + talloc_free(mem_ctx); + return ret; +} + +static krb5_error_code LDB_store(krb5_context context, HDB *db, unsigned flags, hdb_entry *entry) +{ + return HDB_ERR_DB_INUSE; +} + +static krb5_error_code LDB_remove(krb5_context context, HDB *db, hdb_entry *entry) +{ + return HDB_ERR_DB_INUSE; +} + +struct hdb_ldb_seq { + struct ldb_context *ctx; + int index; + int count; + struct ldb_message **msgs; + struct ldb_message **realm_msgs; +}; + +static krb5_error_code LDB_seq(krb5_context context, HDB *db, unsigned flags, hdb_entry *entry) +{ + krb5_error_code ret; + struct hdb_ldb_seq *priv = (struct hdb_ldb_seq *)db->hdb_openp; + TALLOC_CTX *mem_ctx; + if (!priv) { + return HDB_ERR_NOENTRY; + } + + mem_ctx = talloc_named(priv, 0, "LDB_seq context"); + + if (!mem_ctx) { + krb5_set_error_string(context, "LDB_seq: talloc_named() failed!"); + return ENOMEM; + } + + if (priv->index < priv->count) { + ret = LDB_message2entry(context, db, mem_ctx, + NULL, HDB_ENT_TYPE_ENUM, + priv->realm_msgs[0], priv->msgs[priv->index++], entry); + } else { + ret = HDB_ERR_NOENTRY; + } + + if (ret != 0) { + talloc_free(priv); + db->hdb_openp = NULL; +#if 0 /* master key support removed */ + } else { + if (db->hdb_master_key_set && (flags & HDB_F_DECRYPT)) { + ret = hdb_unseal_keys(context, db, entry); + if (ret != 0) { + hdb_free_entry(context,entry); + } + } +#endif + } else { + talloc_free(mem_ctx); + } + + return ret; +} + +static krb5_error_code LDB_firstkey(krb5_context context, HDB *db, unsigned flags, + hdb_entry *entry) +{ + struct ldb_context *ldb_ctx = (struct ldb_context *)db->hdb_db; + struct hdb_ldb_seq *priv = (struct hdb_ldb_seq *)db->hdb_openp; + char *realm; + char *realm_dn = NULL; + struct ldb_message **msgs = NULL; + struct ldb_message **realm_msgs = NULL; + krb5_error_code ret; + TALLOC_CTX *mem_ctx; + + if (priv) { + talloc_free(priv); + db->hdb_openp = 0; + } + + priv = (struct hdb_ldb_seq *) talloc(db, struct hdb_ldb_seq); + if (!priv) { + krb5_set_error_string(context, "talloc: out of memory"); + return ENOMEM; + } + + priv->ctx = ldb_ctx; + priv->index = 0; + priv->msgs = NULL; + priv->realm_msgs = NULL; + priv->count = 0; + + mem_ctx = talloc_named(priv, 0, "LDB_firstkey context"); + + if (!mem_ctx) { + krb5_set_error_string(context, "LDB_firstkey: talloc_named() failed!"); + return ENOMEM; + } + + ret = krb5_get_default_realm(context, &realm); + if (ret != 0) { + talloc_free(priv); + return ret; + } + + ret = LDB_lookup_realm(context, (struct ldb_context *)db->hdb_db, + mem_ctx, realm, &realm_msgs); + + free(realm); + + if (ret != 0) { + talloc_free(priv); + krb5_warnx(context, "LDB_fetch: could not find realm\n"); + return HDB_ERR_NOENTRY; + } + + realm_dn = realm_msgs[0]->dn; + + priv->realm_msgs = talloc_steal(priv, realm_msgs); + + krb5_warnx(context, "LDB_lookup_principal: realm ok\n"); + + priv->count = ldb_search(ldb_ctx, realm_dn, + LDB_SCOPE_SUBTREE, "(objectClass=user)", + krb5_attrs, &msgs); + + priv->msgs = talloc_steal(priv, msgs); + + if (priv->count <= 0) { + talloc_free(priv); + return HDB_ERR_NOENTRY; + } + + db->hdb_openp = priv; + + ret = LDB_seq(context, db, flags, entry); + + if (ret != 0) { + talloc_free(priv); + db->hdb_openp = NULL; + } else { + talloc_free(mem_ctx); + } + return ret; +} + +static krb5_error_code LDB_nextkey(krb5_context context, HDB *db, unsigned flags, + hdb_entry *entry) +{ + return LDB_seq(context, db, flags, entry); +} + +#if 0 /* no way to easily get context here, and we don't want to use master keys anyway */ +static int LDB_db_destructor(void *ptr) +{ + HDB *db = talloc_get_type(ptr, HDB); + hdb_clear_master_key(context, db); + return 0; +} +#endif + +static krb5_error_code LDB_destroy(krb5_context context, HDB *db) +{ + talloc_free(db); + return 0; +} + +krb5_error_code hdb_ldb_create(krb5_context context, struct HDB **db, const char *arg) +{ + *db = talloc(NULL, HDB); + if (!*db) { + krb5_set_error_string(context, "malloc: out of memory"); + return ENOMEM; + } + + (*db)->hdb_master_key_set = 0; + (*db)->hdb_db = NULL; +#if 0 + talloc_set_destructor(*db, LDB_db_destructor); +#endif + if (!arg || arg[0] == '\0') { + talloc_free(*db); + krb5_set_error_string(context, "hdb_ldb_create: no db name specified"); + return EINVAL; + } else { + (*db)->hdb_name = talloc_strdup(*db, arg); + if ((*db)->hdb_name == NULL) { + krb5_set_error_string(context, "strdup: out of memory"); + talloc_free(*db); + *db = NULL; + return ENOMEM; + } + } + + krb5_warnx(context, "hdb_ldb_create: hdb_name '%s'\n", (*db)->hdb_name); + + (*db)->hdb_openp = 0; + (*db)->hdb_open = LDB_open; + (*db)->hdb_close = LDB_close; + (*db)->hdb_fetch = LDB_fetch; + (*db)->hdb_store = LDB_store; + (*db)->hdb_remove = LDB_remove; + (*db)->hdb_firstkey = LDB_firstkey; + (*db)->hdb_nextkey = LDB_nextkey; + (*db)->hdb_lock = LDB_lock; + (*db)->hdb_unlock = LDB_unlock; + (*db)->hdb_rename = LDB_rename; + /* we don't implement these, as we are not a lockable database */ + (*db)->hdb__get = NULL; + (*db)->hdb__put = NULL; + /* kadmin should not be used for deletes - use other tools instead */ + (*db)->hdb__del = NULL; + (*db)->hdb_destroy = LDB_destroy; + + return 0; +} diff --git a/source4/kdc/kdc.c b/source4/kdc/kdc.c index ae8605467a..8f87852aa7 100644 --- a/source4/kdc/kdc.c +++ b/source4/kdc/kdc.c @@ -26,10 +26,10 @@ #include "lib/events/events.h" #include "lib/socket/socket.h" #include "kdc/kdc.h" - +#include "system/network.h" /* - handle fd events on a cldap_socket + handle fd events on a KDC socket */ static void kdc_socket_handler(struct event_context *ev, struct fd_event *fde, uint16_t flags, void *private) @@ -37,15 +37,17 @@ static void kdc_socket_handler(struct event_context *ev, struct fd_event *fde, NTSTATUS status; struct kdc_socket *kdc_socket = talloc_get_type(private, struct kdc_socket); if (flags & EVENT_FD_WRITE) { - /* this should not happen */ + /* not sure on write events yet */ } else if (flags & EVENT_FD_READ) { TALLOC_CTX *tmp_ctx = talloc_new(kdc_socket); DATA_BLOB blob = data_blob_talloc(tmp_ctx, NULL, 64 * 1024); + krb5_data reply; size_t nread; const char *src_addr; int src_port; + struct sockaddr_in src_sock_addr; + struct ipv4_addr addr; - DEBUG(0, ("incoming!\n")); status = socket_recvfrom(kdc_socket->sock, blob.data, blob.length, &nread, 0, &src_addr, &src_port); @@ -58,8 +60,33 @@ static void kdc_socket_handler(struct event_context *ev, struct fd_event *fde, DEBUG(2,("Received krb5 packet of length %d from %s:%d\n", blob.length, src_addr, src_port)); - + /* TODO: This really should be in a utility function somewhere */ + ZERO_STRUCT(src_sock_addr); +#ifdef HAVE_SOCK_SIN_LEN + src_sock_addr.sin_len = sizeof(src_sock_addr); +#endif + addr = interpret_addr2(src_addr); + src_sock_addr.sin_addr.s_addr = addr.addr; + src_sock_addr.sin_port = htons(src_port); + src_sock_addr.sin_family = PF_INET; + + /* Call krb5 */ + if (krb5_kdc_process_krb5_request(kdc_socket->kdc->krb5_context, + kdc_socket->kdc->config, + blob.data, blob.length, + &reply, + src_addr, + &src_sock_addr) != -1) { + size_t sendlen = reply.length; + DATA_BLOB reply_blob; + reply_blob.data = reply.data; + reply_blob.length = reply.length; + socket_sendto(kdc_socket->sock, &reply_blob, &sendlen, 0, + src_addr, src_port); + krb5_data_free(&reply); + } + talloc_free(tmp_ctx); } } @@ -88,6 +115,8 @@ static NTSTATUS kdc_add_socket(struct kdc_server *kdc, const char *address) socket_get_fd(kdc_socket->sock), 0, kdc_socket_handler, kdc_socket); + EVENT_FD_READABLE(kdc_socket->fde); + status = socket_listen(kdc_socket->sock, address, lp_krb5_port(), 0, 0); if (!NT_STATUS_IS_OK(status)) { DEBUG(0,("Failed to bind to %s:%d - %s\n", @@ -136,6 +165,7 @@ static void kdc_task_init(struct task_server *task) { struct kdc_server *kdc; NTSTATUS status; + krb5_error_code ret; if (iface_count() == 0) { task_terminate(task, "kdc: no network interfaces configured"); @@ -158,7 +188,33 @@ static void kdc_task_init(struct task_server *task) } krb5_kdc_default_config(kdc->config); + initialize_krb5_error_table(); + + ret = krb5_init_context(&kdc->krb5_context); + if (ret) { + DEBUG(1,("kdc_task_init: krb5_init_context failed (%s)\n", + error_message(ret))); + task_terminate(task, "kdc: krb5_init_context failed"); + return; + } + /* TODO: Fill in the hdb and logging details */ + kdc_openlog(kdc->krb5_context, kdc->config); + + kdc->config->db = talloc(kdc->config, struct HDB *); + if (!kdc->config->db) { + task_terminate(task, "kdc: out of memory"); + return; + } + kdc->config->num_db = 1; + + ret = hdb_ldb_create(kdc->krb5_context, &kdc->config->db[0], lp_sam_url()); + if (ret != 0) { + DEBUG(1, ("kdc_task_init: hdb_ldb_create fails: %s\n", + smb_get_krb5_error_message(kdc->krb5_context, ret, kdc))); + task_terminate(task, "kdc: hdb_ldb_create failed"); + return; + } /* start listening on the configured network interfaces */ status = kdc_startup_interfaces(kdc); diff --git a/source4/kdc/kdc.h b/source4/kdc/kdc.h index 25b8745bce..2289b504cc 100644 --- a/source4/kdc/kdc.h +++ b/source4/kdc/kdc.h @@ -22,8 +22,10 @@ */ #include "system/kerberos.h" +#include "auth/kerberos/kerberos.h" #include <kdc.h> +krb5_error_code hdb_ldb_create(krb5_context context, struct HDB **db, const char *arg); /* top level context structure for the cldap server @@ -31,6 +33,7 @@ struct kdc_server { struct task_server *task; struct krb5_kdc_configuration *config; + krb5_context krb5_context; }; struct kdc_socket { |