summaryrefslogtreecommitdiff
path: root/source3/include/auth.h
blob: 69a91d29aa3de2a0c901460efffefa801350019e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
#ifndef _SMBAUTH_H_
#define _SMBAUTH_H_
/* 
   Unix SMB/CIFS implementation.
   Standardised Authentication types
   Copyright (C) Andrew Bartlett 2001

   This program is free software; you can redistribute it and/or modify
   it under the terms of the GNU General Public License as published by
   the Free Software Foundation; either version 3 of the License, or
   (at your option) any later version.

   This program is distributed in the hope that it will be useful,
   but WITHOUT ANY WARRANTY; without even the implied warranty of
   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
   GNU General Public License for more details.

   You should have received a copy of the GNU General Public License
   along with this program.  If not, see <http://www.gnu.org/licenses/>.
*/

struct auth_usersupplied_info {
 	DATA_BLOB lm_resp;
	DATA_BLOB nt_resp;
 	DATA_BLOB lm_interactive_pwd;
	DATA_BLOB nt_interactive_pwd;
 	DATA_BLOB plaintext_password;

	bool encrypted;

	bool was_mapped;	      /* Did the username map actually match? */
	char *client_domain;          /* domain name string */
	char *domain;                 /* domain name after mapping */
	char *internal_username;      /* username after mapping */
	char *smb_name;               /* username before mapping */
	char *wksta_name;             /* workstation name (netbios calling
				       * name) unicode string */

	uint32 logon_parameters;

};

struct auth_serversupplied_info {
	bool guest;
	bool system;

	struct dom_sid *sids; 	/* These SIDs are preliminary between
			   check_ntlm_password and the token creation. */
	size_t num_sids;

	struct unix_user_token utok;

	/* NT group information taken from the info3 structure */

	NT_USER_TOKEN *ptok;

	/* This is the final session key, as used by SMB signing, and
	 * (truncated to 16 bytes) encryption on the SAMR and LSA pipes
	 * when over ncacn_np.
	 * It is calculated by NTLMSSP from the session key in the info3,
	 * and is  set from the Kerberos session key using
	 * krb5_auth_con_getremotesubkey().
	 *
	 * Bootom line, it is not the same as the session keys in info3.
	 */

	DATA_BLOB user_session_key;
	DATA_BLOB lm_session_key;

	struct netr_SamInfo3 *info3;

	void *pam_handle;

	/*
	 * This is a token from /etc/passwd and /etc/group
	 */
	bool nss_token;

	char *unix_name;

	/*
	 * For performance reasons we keep an alpha_strcpy-sanitized version
	 * of the username around as long as the global variable current_user
	 * still exists. If we did not do keep this, we'd have to call
	 * alpha_strcpy whenever we do a become_user(), potentially on every
	 * smb request. See set_current_user_info.
	 */
	char *sanitized_username;
};

struct auth_context {
	DATA_BLOB challenge; 

	/* Who set this up in the first place? */ 
	const char *challenge_set_by; 

	bool challenge_may_be_modified;

	struct auth_methods *challenge_set_method; 
	/* What order are the various methods in?   Try to stop it changing under us */ 
	struct auth_methods *auth_method_list;	

	NTSTATUS (*get_ntlm_challenge)(struct auth_context *auth_context,
				       uint8_t chal[8]);
	NTSTATUS (*check_ntlm_password)(const struct auth_context *auth_context,
					const struct auth_usersupplied_info *user_info, 
					struct auth_serversupplied_info **server_info);
	NTSTATUS (*nt_status_squash)(NTSTATUS nt_status);
	void (*free)(struct auth_context **auth_context);
};

typedef struct auth_methods
{
	struct auth_methods *prev, *next;
	const char *name; /* What name got this module */

	NTSTATUS (*auth)(const struct auth_context *auth_context,
			 void *my_private_data, 
			 TALLOC_CTX *mem_ctx,
			 const struct auth_usersupplied_info *user_info, 
			 struct auth_serversupplied_info **server_info);

	/* If you are using this interface, then you are probably
	 * getting something wrong.  This interface is only for
	 * security=server, and makes a number of compromises to allow
	 * that.  It is not compatible with being a PDC.  */
	DATA_BLOB (*get_chal)(const struct auth_context *auth_context,
			      void **my_private_data, 
			      TALLOC_CTX *mem_ctx);

	/* Used to keep tabs on things like the cli for SMB server authentication */
	void *private_data;

} auth_methods;

typedef NTSTATUS (*auth_init_function)(struct auth_context *, const char *, struct auth_methods **);

struct auth_init_function_entry {
	const char *name;
	/* Function to create a member of the authmethods list */

	auth_init_function init;

	struct auth_init_function_entry *prev, *next;
};

struct auth_ntlmssp_state;

/* Changed from 1 -> 2 to add the logon_parameters field. */
#define AUTH_INTERFACE_VERSION 2

#endif /* _SMBAUTH_H_ */