2 Unix SMB/CIFS implementation.
4 Samba KDB plugin for MIT Kerberos
6 Copyright (c) 2010 Simo Sorce <idra@samba.org>.
7 Copyright (c) 2014 Andreas Schneider <asn@samba.org>
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
25 #include "system/kerberos.h"
30 #include "kdc/mit_samba.h"
31 #include "kdb_samba.h"
33 /* FIXME: This is a krb5 function which is exported, but in no header */
34 extern krb5_error_code decode_krb5_padata_sequence(const krb5_data *output,
37 static krb5_error_code ks_get_netbios_name(krb5_address **addrs, char **name)
42 for (i = 0; addrs[i]; i++) {
43 if (addrs[i]->addrtype != ADDRTYPE_NETBIOS) {
46 len = MIN(addrs[i]->length, 15);
47 nb_name = strndup((const char *)addrs[i]->contents, len);
55 /* Strip space padding */
56 i = strlen(nb_name) - 1;
57 for (i = strlen(nb_name) - 1;
58 i > 0 && nb_name[i] == ' ';
69 krb5_error_code kdb_samba_db_check_policy_as(krb5_context context,
71 krb5_db_entry *client,
72 krb5_db_entry *server,
73 krb5_timestamp kdc_time,
75 krb5_pa_data ***e_data_out)
77 struct mit_samba_context *mit_ctx;
79 char *client_name = NULL;
80 char *server_name = NULL;
81 char *netbios_name = NULL;
83 bool password_change = false;
84 DATA_BLOB int_data = { NULL, 0 };
86 krb5_pa_data **e_data;
88 mit_ctx = ks_get_context(context);
89 if (mit_ctx == NULL) {
90 return KRB5_KDB_DBNOTINITED;
93 if (krb5_princ_size(context, kdcreq->server) == 2 &&
94 ks_is_kadmin_changepw(context, kdcreq->server)) {
95 code = krb5_get_default_realm(context, &realm);
100 if (ks_data_eq_string(kdcreq->server->realm, realm)) {
101 password_change = true;
105 code = krb5_unparse_name(context, kdcreq->server, &server_name);
110 code = krb5_unparse_name(context, kdcreq->client, &client_name);
115 if (kdcreq->addresses) {
116 code = ks_get_netbios_name(kdcreq->addresses, &netbios_name);
122 code = mit_samba_check_client_access(mit_ctx,
131 if (int_data.length && int_data.data) {
133 /* make sure the mapped return code is returned - gd */
136 d = ks_make_data(int_data.data, int_data.length);
138 code_tmp = decode_krb5_padata_sequence(&d, &e_data);
140 *e_data_out = e_data;
152 static krb5_error_code ks_get_pac(krb5_context context,
153 krb5_db_entry *client,
156 struct mit_samba_context *mit_ctx;
159 krb5_error_code code;
161 mit_ctx = ks_get_context(context);
162 if (mit_ctx == NULL) {
163 return KRB5_KDB_DBNOTINITED;
166 code = mit_samba_get_pac_data(mit_ctx,
173 code = krb5_pac_init(context, pac);
178 data = ks_make_data(pac_data.data, pac_data.length);
180 code = krb5_pac_add_buffer(context, *pac, PAC_LOGON_INFO, &data);
190 static krb5_error_code ks_verify_pac(krb5_context context,
192 krb5_const_principal client_princ,
193 krb5_db_entry *client,
194 krb5_keyblock *server_key,
195 krb5_keyblock *krbtgt_key,
196 krb5_timestamp authtime,
197 krb5_authdata **tgt_auth_data,
200 struct mit_samba_context *mit_ctx;
201 krb5_authdata **authdata = NULL;
202 krb5_pac ipac = NULL;
203 DATA_BLOB pac_data = { NULL, 0 };
204 DATA_BLOB logon_data = { NULL, 0 };
206 krb5_error_code code;
208 mit_ctx = ks_get_context(context);
209 if (mit_ctx == NULL) {
210 return KRB5_KDB_DBNOTINITED;
213 /* find the existing PAC, if present */
214 code = krb5_find_authdata(context,
217 KRB5_AUTHDATA_WIN2K_PAC,
224 if (authdata == NULL) {
228 SMB_ASSERT(authdata[0] != NULL);
230 if (authdata[1] != NULL) {
231 code = KRB5KDC_ERR_BADOPTION; /* XXX */
235 code = krb5_pac_parse(context,
236 authdata[0]->contents,
243 /* TODO: verify this is correct
245 * In the constrained delegation case, the PAC is from a service
246 * ticket rather than a TGT; we must verify the server and KDC
247 * signatures to assert that the server did not forge the PAC.
249 if (flags & KRB5_KDB_FLAG_CONSTRAINED_DELEGATION) {
250 code = krb5_pac_verify(context,
257 code = krb5_pac_verify(context,
268 /* check and update PAC */
269 pac_data.data = authdata[0]->contents;
270 pac_data.length = authdata[0]->length;
272 code = mit_samba_update_pac_data(mit_ctx,
280 code = krb5_pac_init(context, pac);
285 data = ks_make_data(logon_data.data, logon_data.length);
287 code = krb5_pac_add_buffer(context, *pac, PAC_LOGON_INFO, &data);
293 krb5_free_authdata(context, authdata);
294 krb5_pac_free(context, ipac);
295 free(logon_data.data);
300 krb5_error_code kdb_samba_db_sign_auth_data(krb5_context context,
302 krb5_const_principal client_princ,
303 krb5_db_entry *client,
304 krb5_db_entry *server,
305 krb5_db_entry *krbtgt,
306 krb5_keyblock *client_key,
307 krb5_keyblock *server_key,
308 krb5_keyblock *krbtgt_key,
309 krb5_keyblock *session_key,
310 krb5_timestamp authtime,
311 krb5_authdata **tgt_auth_data,
312 krb5_authdata ***signed_auth_data)
314 krb5_const_principal ks_client_princ;
315 krb5_authdata **authdata = NULL;
316 krb5_boolean is_as_req;
317 krb5_error_code code;
321 /* Prefer canonicalised name from client entry */
322 if (client != NULL) {
323 ks_client_princ = client->princ;
325 ks_client_princ = client_princ;
328 is_as_req = ((flags & KRB5_KDB_FLAG_CLIENT_REFERRALS_ONLY) != 0);
330 if (is_as_req && (flags & KRB5_KDB_FLAG_INCLUDE_PAC)) {
332 code = ks_get_pac(context, client, &pac);
339 code = ks_verify_pac(context, flags, ks_client_princ, client,
340 server_key, krbtgt_key, authtime,
341 tgt_auth_data, &pac);
347 if (pac == NULL && client != NULL) {
349 code = ks_get_pac(context, client, &pac);
356 code = KRB5_KDB_DBTYPE_NOSUP;
360 code = krb5_pac_sign(context, pac, authtime, ks_client_princ,
361 server_key, krbtgt_key, &pac_data);
366 authdata = malloc(2 * sizeof(krb5_authdata *));
367 if (authdata == NULL) {
371 authdata[0] = malloc(sizeof(krb5_authdata));
372 if (authdata[0] == NULL) {
376 /* put in signed data */
377 authdata[0]->magic = KV5M_AUTHDATA;
378 authdata[0]->ad_type = KRB5_AUTHDATA_WIN2K_PAC;
379 authdata[0]->contents = (krb5_octet *)pac_data.data;
380 authdata[0]->length = pac_data.length;
382 code = krb5_encode_authdata_container(context,
383 KRB5_AUTHDATA_IF_RELEVANT,
393 krb5_pac_free(context, pac);
394 krb5_free_authdata(context, authdata);
399 krb5_error_code kdb_samba_db_check_allowed_to_delegate(krb5_context context,
400 krb5_const_principal client,
401 const krb5_db_entry *server,
402 krb5_const_principal proxy)
404 struct mit_samba_context *mit_ctx;
407 * Names are quite odd and confusing in the current implementation.
408 * The following mappings should help understanding what is what.
409 * client -> client to impersonate
410 * server; -> delegating service
411 * proxy; -> target principal
413 krb5_db_entry *delegating_service = discard_const_p(krb5_db_entry, server);
415 char *target_name = NULL;
417 krb5_error_code code;
419 mit_ctx = ks_get_context(context);
420 if (mit_ctx == NULL) {
421 return KRB5_KDB_DBNOTINITED;
424 code = krb5_unparse_name(context, proxy, &target_name);
429 is_enterprise = (proxy->type == KRB5_NT_ENTERPRISE_PRINCIPAL);
431 code = mit_samba_check_s4u2proxy(mit_ctx,