diff options
author | Jakub Hrozek <jhrozek@redhat.com> | 2012-05-18 18:57:08 +0200 |
---|---|---|
committer | Stephen Gallagher <sgallagh@redhat.com> | 2012-06-14 15:52:28 -0400 |
commit | 3ca7450bc821ac37851e92a256d0a2b89f4f2032 (patch) | |
tree | 7292cab8b821b46e6c42417179c1c0ddb1fb8122 | |
parent | 727937fb86cfb042063f02fa2a229d236d7f105f (diff) | |
download | sssd-3ca7450bc821ac37851e92a256d0a2b89f4f2032.tar.gz sssd-3ca7450bc821ac37851e92a256d0a2b89f4f2032.tar.bz2 sssd-3ca7450bc821ac37851e92a256d0a2b89f4f2032.zip |
Provide more debugging in krb5_child and ldap_child
https://fedorahosted.org/sssd/ticket/1225
-rw-r--r-- | src/providers/krb5/krb5_child.c | 78 | ||||
-rw-r--r-- | src/providers/ldap/ldap_child.c | 9 |
2 files changed, 73 insertions, 14 deletions
diff --git a/src/providers/krb5/krb5_child.c b/src/providers/krb5/krb5_child.c index 1a9d6552..195c431a 100644 --- a/src/providers/krb5/krb5_child.c +++ b/src/providers/krb5/krb5_child.c @@ -163,7 +163,7 @@ static krb5_error_code sss_krb5_prompter(krb5_context context, void *data, return EOK; } - DEBUG(9, ("Prompter called with [%s].\n", banner)); + DEBUG(SSSDBG_FUNC_DATA, ("Prompter called with [%s].\n", banner)); ret = pam_add_response(kr->pd, SSS_PAM_TEXT_MSG, strlen(banner)+1, (const uint8_t *) banner); @@ -236,6 +236,8 @@ static krb5_error_code create_ccache_file(krb5_context ctx, TALLOC_CTX *tmp_ctx = NULL; mode_t old_umask; + DEBUG(SSSDBG_FUNC_DATA, ("Creating ccache at [%s]\n", ccname)); + if (strncmp(ccname, "FILE:", 5) == 0) { cc_file_name = ccname + 5; } else { @@ -333,7 +335,7 @@ static krb5_error_code create_ccache_file(krb5_context ctx, DEBUG(1, ("rename failed [%d][%s].\n", kerr, strerror(kerr))); } - DEBUG(SSSDBG_TRACE_LIBS, ("Created ccache file: [%s]\n", cc_file_name)); + DEBUG(SSSDBG_TRACE_LIBS, ("Created ccache file: [%s]\n", ccname)); done: if (fd != -1) { @@ -412,6 +414,8 @@ static struct response *prepare_response_message(struct krb5_req *kr, return NULL; } + DEBUG(SSSDBG_TRACE_FUNC, ("Building response for result [%d]\n", kerr)); + if (kerr == 0) { if (kr->pd->cmd == SSS_PAM_CHAUTHTOK_PRELIM) { pam_status = PAM_SUCCESS; @@ -543,7 +547,8 @@ static krb5_error_code validate_tgt(struct krb5_req *kr) memset(&entry, 0, sizeof(entry)); while ((kt_err = krb5_kt_next_entry(kr->ctx, keytab, &entry, &cursor)) == 0) { if (krb5_realm_compare(kr->ctx, entry.principal, kr->princ)) { - DEBUG(9, ("Found keytab entry with the realm of the credential.\n")); + DEBUG(SSSDBG_TRACE_INTERNAL, + ("Found keytab entry with the realm of the credential.\n")); break; } @@ -615,6 +620,8 @@ static void krb5_set_canonicalize(krb5_get_init_creds_opt *opts) if (tmp_str != NULL && strcasecmp(tmp_str, "true") == 0) { canonicalize = 1; } + DEBUG(SSSDBG_CONF_SETTINGS, ("%s is set to [%s]\n", + SSSD_KRB5_CANONICALIZE, tmp_str ? tmp_str : "not set")); sss_krb5_get_init_creds_opt_set_canonicalize(opts, canonicalize); } @@ -707,7 +714,7 @@ static krb5_error_code get_and_save_tgt(struct krb5_req *kr, } } else { - DEBUG(9, ("TGT validation is disabled.\n")); + DEBUG(SSSDBG_CONF_SETTINGS, ("TGT validation is disabled.\n")); } if (kr->validate || kr->fast_ccname != NULL) { @@ -760,6 +767,8 @@ static errno_t changepw_child(int fd, struct krb5_req *kr) char *changepw_princ = NULL; krb5_prompter_fct prompter = sss_krb5_prompter; + DEBUG(SSSDBG_TRACE_LIBS, ("Password change operation\n")); + if (kr->pd->authtok_type != SSS_AUTHTOK_TYPE_PASSWORD) { pam_status = PAM_CRED_INSUFFICIENT; kerr = KRB5KRB_ERR_GENERIC; @@ -781,6 +790,8 @@ static errno_t changepw_child(int fd, struct krb5_req *kr) kerr = KRB5KRB_ERR_GENERIC; goto sendresponse; } + DEBUG(SSSDBG_FUNC_DATA, + ("Created a changepw principal [%s]\n", changepw_princ)); if (kr->pd->cmd == SSS_PAM_CHAUTHTOK_PRELIM) { /* We do not need a password expiration warning here. */ @@ -804,8 +815,9 @@ static errno_t changepw_child(int fd, struct krb5_req *kr) memset(kr->pd->authtok, 0, kr->pd->authtok_size); if (kr->pd->cmd == SSS_PAM_CHAUTHTOK_PRELIM) { - DEBUG(9, ("Initial authentication for change password operation " - "successfull.\n")); + DEBUG(SSSDBG_TRACE_LIBS, + ("Initial authentication for change password operation " + "successful.\n")); krb5_free_cred_contents(kr->ctx, kr->creds); pam_status = PAM_SUCCESS; goto sendresponse; @@ -906,7 +918,10 @@ static errno_t tgt_req_child(int fd, struct krb5_req *kr) char *changepw_princ = NULL; int pam_status = PAM_SYSTEM_ERR; + DEBUG(SSSDBG_TRACE_LIBS, ("Attempting to get a TGT\n")); + if (kr->pd->authtok_type != SSS_AUTHTOK_TYPE_PASSWORD) { + DEBUG(SSSDBG_OP_FAILURE, ("Unknown authtok type\n")); pam_status = PAM_CRED_INSUFFICIENT; kerr = KRB5KRB_ERR_GENERIC; goto sendresponse; @@ -927,6 +942,8 @@ static errno_t tgt_req_child(int fd, struct krb5_req *kr) kerr = KRB5KRB_ERR_GENERIC; goto sendresponse; } + DEBUG(SSSDBG_FUNC_DATA, + ("Created a changepw principal [%s]\n", changepw_princ)); kerr = get_and_save_tgt(kr, pass_str); @@ -935,6 +952,7 @@ static errno_t tgt_req_child(int fd, struct krb5_req *kr) not. In general the password can still be used to get a changepw ticket. So we validate the password by trying to get a changepw ticket. */ if (kerr == KRB5KDC_ERR_KEY_EXP) { + DEBUG(SSSDBG_TRACE_LIBS, ("Password was expired\n")); kerr = sss_krb5_get_init_creds_opt_set_expire_callback(kr->ctx, kr->options, NULL, NULL); @@ -989,6 +1007,8 @@ static errno_t kuserok_child(int fd, struct krb5_req *kr) int ret; krb5_error_code kerr; + DEBUG(SSSDBG_TRACE_LIBS, ("Verifying if principal can log in as user\n")); + /* krb5_kuserok tries to verify that kr->pd->user is a locally known * account, so we have to unset _SSS_LOOPS to make getpwnam() work. */ ret = unsetenv("_SSS_LOOPS"); @@ -1004,6 +1024,8 @@ static errno_t kuserok_child(int fd, struct krb5_req *kr) } access_allowed = krb5_kuserok(kr->ctx, kr->princ, kr->pd->user); + DEBUG(SSSDBG_TRACE_LIBS, + ("Access was %s\n", access_allowed ? "allowed" : "denied")); status = access_allowed ? 0 : 1; @@ -1023,6 +1045,8 @@ static errno_t renew_tgt_child(int fd, struct krb5_req *kr) char *ccname; krb5_ccache ccache = NULL; + DEBUG(SSSDBG_TRACE_LIBS, ("Renewing a ticket\n")); + if (kr->pd->authtok_type != SSS_AUTHTOK_TYPE_CCFILE) { DEBUG(1, ("Unsupported authtok type for TGT renewal [%d].\n", kr->pd->authtok_type)); @@ -1061,7 +1085,7 @@ static errno_t renew_tgt_child(int fd, struct krb5_req *kr) } } else { - DEBUG(9, ("TGT validation is disabled.\n")); + DEBUG(SSSDBG_CONF_SETTINGS, ("TGT validation is disabled.\n")); } if (kr->validate || kr->fast_ccname != NULL) { @@ -1116,6 +1140,8 @@ static errno_t create_empty_ccache(int fd, struct krb5_req *kr) int ret; int pam_status = PAM_SUCCESS; + DEBUG(SSSDBG_TRACE_LIBS, ("Creating empty ccache\n")); + ret = create_ccache_file(kr->ctx, kr->princ, kr->ccname, NULL); if (ret != 0) { KRB5_DEBUG(1, ret); @@ -1146,6 +1172,12 @@ static errno_t unpack_buffer(uint8_t *buf, size_t size, struct pam_data *pd, kr->validate = (validate == 0) ? false : true; SAFEALIGN_COPY_UINT32_CHECK(offline, buf + p, size, &p); + DEBUG(SSSDBG_CONF_SETTINGS, + ("cmd [%d] uid [%llu] gid [%llu] validate [%s] offline [%s] " + "UPN [%s]\n", pd->cmd, kr->uid, kr->gid, + kr->validate ? "true" : "false", offline ? "true" : "false", + kr->upn ? kr->upn : "none")); + SAFEALIGN_COPY_UINT32_CHECK(&len, buf + p, size, &p); if ((p + len ) > size) return EINVAL; kr->upn = talloc_strndup(pd, (char *)(buf + p), len); @@ -1174,6 +1206,9 @@ static errno_t unpack_buffer(uint8_t *buf, size_t size, struct pam_data *pd, if (pd->authtok == NULL) return ENOMEM; pd->authtok_size = len + 1; p += len; + + DEBUG(SSSDBG_CONF_SETTINGS, ("ccname: [%s] keytab: [%s]\n", + kr->ccname, kr->keytab)); } else { kr->ccname = NULL; kr->keytab = NULL; @@ -1201,6 +1236,7 @@ static errno_t unpack_buffer(uint8_t *buf, size_t size, struct pam_data *pd, pd->user = talloc_strndup(pd, (char *)(buf + p), len); if (pd->user == NULL) return ENOMEM; p += len; + DEBUG(SSSDBG_CONF_SETTINGS, ("user: [%s]\n", pd->user)); } else { pd->user = NULL; } @@ -1403,27 +1439,33 @@ static int krb5_child_setup(struct krb5_req *kr, uint32_t offline) kr->krb5_ctx->realm = getenv(SSSD_KRB5_REALM); if (kr->krb5_ctx->realm == NULL) { - DEBUG(2, ("Cannot read [%s] from environment.\n", SSSD_KRB5_REALM)); + DEBUG(SSSDBG_MINOR_FAILURE, + ("Cannot read [%s] from environment.\n", SSSD_KRB5_REALM)); } switch(kr->pd->cmd) { case SSS_PAM_AUTHENTICATE: /* If we are offline, we need to create an empty ccache file */ if (offline) { + DEBUG(SSSDBG_TRACE_FUNC, ("Will perform offline auth\n")); kr->child_req = create_empty_ccache; } else { + DEBUG(SSSDBG_TRACE_FUNC, ("Will perform online auth\n")); kr->child_req = tgt_req_child; } break; case SSS_PAM_CHAUTHTOK: case SSS_PAM_CHAUTHTOK_PRELIM: + DEBUG(SSSDBG_TRACE_FUNC, ("Will perform password change\n")); kr->child_req = changepw_child; break; case SSS_PAM_ACCT_MGMT: + DEBUG(SSSDBG_TRACE_FUNC, ("Will perform account management\n")); kr->child_req = kuserok_child; break; case SSS_CMD_RENEW: if (!offline) { + DEBUG(SSSDBG_TRACE_FUNC, ("Will perform ticket renewal\n")); kr->child_req = renew_tgt_child; } else { DEBUG(1, ("Cannot renew TGT while offline.\n")); @@ -1481,8 +1523,8 @@ static int krb5_child_setup(struct krb5_req *kr, uint32_t offline) lifetime_str = getenv(SSSD_KRB5_RENEWABLE_LIFETIME); if (lifetime_str == NULL) { - DEBUG(7, ("Cannot read [%s] from environment.\n", - SSSD_KRB5_RENEWABLE_LIFETIME)); + DEBUG(SSSDBG_CONF_SETTINGS, ("Cannot read [%s] from environment.\n", + SSSD_KRB5_RENEWABLE_LIFETIME)); } else { kerr = krb5_string_to_deltat(lifetime_str, &lifetime); if (kerr != 0) { @@ -1491,13 +1533,15 @@ static int krb5_child_setup(struct krb5_req *kr, uint32_t offline) KRB5_DEBUG(1, kerr); goto failed; } + DEBUG(SSSDBG_CONF_SETTINGS, ("%s is set to [%s]\n", + SSSD_KRB5_RENEWABLE_LIFETIME, lifetime_str)); krb5_get_init_creds_opt_set_renew_life(kr->options, lifetime); } lifetime_str = getenv(SSSD_KRB5_LIFETIME); if (lifetime_str == NULL) { - DEBUG(7, ("Cannot read [%s] from environment.\n", - SSSD_KRB5_LIFETIME)); + DEBUG(SSSDBG_CONF_SETTINGS, ("Cannot read [%s] from environment.\n", + SSSD_KRB5_LIFETIME)); } else { kerr = krb5_string_to_deltat(lifetime_str, &lifetime); if (kerr != 0) { @@ -1506,6 +1550,8 @@ static int krb5_child_setup(struct krb5_req *kr, uint32_t offline) KRB5_DEBUG(1, kerr); goto failed; } + DEBUG(SSSDBG_CONF_SETTINGS, + ("%s is set to [%s]\n", SSSD_KRB5_LIFETIME, lifetime_str)); krb5_get_init_creds_opt_set_tkt_life(kr->options, lifetime); } @@ -1514,15 +1560,19 @@ static int krb5_child_setup(struct krb5_req *kr, uint32_t offline) use_fast_str = getenv(SSSD_KRB5_USE_FAST); if (use_fast_str == NULL || strcasecmp(use_fast_str, "never") == 0) { - DEBUG(9, ("Not using FAST.\n")); + DEBUG(SSSDBG_CONF_SETTINGS, ("Not using FAST.\n")); } else if (strcasecmp(use_fast_str, "try") == 0 || strcasecmp(use_fast_str, "demand") == 0) { + DEBUG(SSSDBG_CONF_SETTINGS, ("%s is set to [%s]\n", + SSSD_KRB5_LIFETIME, lifetime_str)); tmp_str = getenv(SSSD_KRB5_FAST_PRINCIPAL); if (!tmp_str) { fast_principal = NULL; fast_principal_realm = kr->krb5_ctx->realm; } else { + DEBUG(SSSDBG_CONF_SETTINGS, ("%s is set to [%s]\n", + SSSD_KRB5_FAST_PRINCIPAL, lifetime_str)); kerr = krb5_parse_name(kr->ctx, tmp_str, &fast_princ_struct); if (kerr) { DEBUG(1, ("krb5_parse_name failed.\n")); @@ -1712,12 +1762,14 @@ int main(int argc, const char *argv[]) goto fail; } + DEBUG(SSSDBG_TRACE_FUNC, ("krb5_child completed successfully\n")); close(STDOUT_FILENO); talloc_free(pd); return 0; fail: + DEBUG(SSSDBG_CRIT_FAILURE, ("krb5_child failed!\n")); close(STDOUT_FILENO); talloc_free(pd); exit(-1); diff --git a/src/providers/ldap/ldap_child.c b/src/providers/ldap/ldap_child.c index 13e12e93..83ce468f 100644 --- a/src/providers/ldap/ldap_child.c +++ b/src/providers/ldap/ldap_child.c @@ -118,6 +118,10 @@ static int pack_buffer(struct response *r, int result, krb5_error_code krberr, return ENOMEM; } + DEBUG(SSSDBG_TRACE_LIBS, + ("result [%d] krberr [%d] msgsize [%d] msg [%s]\n", + result, krberr, len, msg)); + /* result */ SAFEALIGN_SET_UINT32(&r->buf[p], result, &p); @@ -183,7 +187,6 @@ static krb5_error_code ldap_child_get_tgt_sync(TALLOC_CTX *memctx, krberr = KRB5KRB_ERR_GENERIC; goto done; } - } else { realm_name = talloc_strdup(memctx, realm_str); if (!realm_name) { @@ -235,6 +238,7 @@ static krb5_error_code ldap_child_get_tgt_sync(TALLOC_CTX *memctx, } else { krberr = krb5_kt_default(context, &keytab); } + DEBUG(SSSDBG_CONF_SETTINGS, ("Using keytab [%s]\n", KEYTAB_CLEAN_NAME)); if (krberr) { DEBUG(SSSDBG_FATAL_FAILURE, ("Failed to read keytab file [%s]: %s\n", @@ -275,6 +279,7 @@ static krb5_error_code ldap_child_get_tgt_sync(TALLOC_CTX *memctx, tmp_str = getenv("KRB5_CANONICALIZE"); if (tmp_str != NULL && strcasecmp(tmp_str, "true") == 0) { + DEBUG(SSSDBG_CONF_SETTINGS, ("Will canonicalize principals\n")); canonicalize = 1; } sss_krb5_get_init_creds_opt_set_canonicalize(&options, canonicalize); @@ -514,11 +519,13 @@ int main(int argc, const char *argv[]) goto fail; } + DEBUG(SSSDBG_TRACE_FUNC, ("ldap_child completed successfully\n")); close(STDOUT_FILENO); talloc_free(main_ctx); _exit(0); fail: + DEBUG(SSSDBG_CRIT_FAILURE, ("ldap_child failed!\n")); close(STDOUT_FILENO); talloc_free(main_ctx); _exit(-1); |