2 Unix SMB/CIFS implementation.
4 PAC Glue between Samba and the KDC
6 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2005-2009
7 Copyright (C) Simo Sorce <idra@samba.org> 2010
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>.
25 #include "../libds/common/flags.h"
27 #include "auth/auth.h"
28 #include "auth/auth_sam_reply.h"
29 #include "system/kerberos.h"
30 #include "auth/kerberos/kerberos.h"
32 #include "kdc/samba_kdc.h"
33 #include "kdc/pac-glue.h"
34 #include "param/param.h"
35 #include "librpc/gen_ndr/ndr_krb5pac.h"
36 #include "libcli/security/security.h"
37 #include "dsdb/samdb/samdb.h"
38 #include "auth/kerberos/pac_utils.h"
41 NTSTATUS samba_get_logon_info_pac_blob(TALLOC_CTX *mem_ctx,
42 struct auth_user_info_dc *info,
45 struct netr_SamInfo3 *info3;
46 union PAC_INFO pac_info;
47 enum ndr_err_code ndr_err;
50 ZERO_STRUCT(pac_info);
52 nt_status = auth_convert_user_info_dc_saminfo3(mem_ctx, info, &info3);
53 if (!NT_STATUS_IS_OK(nt_status)) {
54 DEBUG(1, ("Getting Samba info failed: %s\n",
55 nt_errstr(nt_status)));
59 pac_info.logon_info.info = talloc_zero(mem_ctx, struct PAC_LOGON_INFO);
60 if (!pac_info.logon_info.info) {
61 return NT_STATUS_NO_MEMORY;
64 pac_info.logon_info.info->info3 = *info3;
66 ndr_err = ndr_push_union_blob(pac_data, mem_ctx, &pac_info,
68 (ndr_push_flags_fn_t)ndr_push_PAC_INFO);
69 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
70 nt_status = ndr_map_error2ntstatus(ndr_err);
71 DEBUG(1, ("PAC (presig) push failed: %s\n",
72 nt_errstr(nt_status)));
79 krb5_error_code samba_make_krb5_pac(krb5_context context,
81 DATA_BLOB *deleg_blob,
88 /* The user account may be set not to want the PAC */
93 ret = krb5_copy_data_contents(&pac_data,
100 ZERO_STRUCT(deleg_data);
102 ret = krb5_copy_data_contents(&deleg_data,
106 kerberos_free_data_contents(context, &pac_data);
111 ret = krb5_pac_init(context, pac);
113 kerberos_free_data_contents(context, &pac_data);
114 kerberos_free_data_contents(context, &deleg_data);
118 ret = krb5_pac_add_buffer(context, *pac, PAC_TYPE_LOGON_INFO, &pac_data);
119 kerberos_free_data_contents(context, &pac_data);
121 kerberos_free_data_contents(context, &deleg_data);
126 ret = krb5_pac_add_buffer(context, *pac,
127 PAC_TYPE_CONSTRAINED_DELEGATION,
129 kerberos_free_data_contents(context, &deleg_data);
138 bool samba_princ_needs_pac(struct samba_kdc_entry *skdc_entry)
141 uint32_t userAccountControl;
143 /* The service account may be set not to want the PAC */
144 userAccountControl = ldb_msg_find_attr_as_uint(skdc_entry->msg, "userAccountControl", 0);
145 if (userAccountControl & UF_NO_AUTH_DATA_REQUIRED) {
152 /* Was the krbtgt in this DB (ie, should we check the incoming signature) and was it an RODC */
153 int samba_krbtgt_is_in_db(struct samba_kdc_entry *p,
158 int rodc_krbtgt_number, trust_direction;
161 TALLOC_CTX *mem_ctx = talloc_new(NULL);
166 trust_direction = ldb_msg_find_attr_as_int(p->msg, "trustDirection", 0);
168 if (trust_direction != 0) {
169 /* Domain trust - we cannot check the sig, but we trust it for a correct PAC
171 This is exactly where we should flag for SID
172 validation when we do inter-foreest trusts
174 talloc_free(mem_ctx);
175 *is_untrusted = false;
180 /* The lack of password controls etc applies to krbtgt by
181 * virtue of being that particular RID */
182 status = dom_sid_split_rid(NULL, samdb_result_dom_sid(mem_ctx, p->msg, "objectSid"), NULL, &rid);
184 if (!NT_STATUS_IS_OK(status)) {
185 talloc_free(mem_ctx);
189 rodc_krbtgt_number = ldb_msg_find_attr_as_int(p->msg, "msDS-SecondaryKrbTgtNumber", -1);
191 if (p->kdc_db_ctx->my_krbtgt_number == 0) {
192 if (rid == DOMAIN_RID_KRBTGT) {
193 *is_untrusted = false;
195 talloc_free(mem_ctx);
197 } else if (rodc_krbtgt_number != -1) {
199 *is_untrusted = true;
200 talloc_free(mem_ctx);
203 } else if ((rid != DOMAIN_RID_KRBTGT) && (rodc_krbtgt_number == p->kdc_db_ctx->my_krbtgt_number)) {
204 talloc_free(mem_ctx);
205 *is_untrusted = false;
208 } else if (rid == DOMAIN_RID_KRBTGT) {
209 /* krbtgt viewed from an RODC */
210 talloc_free(mem_ctx);
211 *is_untrusted = false;
217 talloc_free(mem_ctx);
218 *is_untrusted = true;
223 NTSTATUS samba_kdc_get_pac_blob(TALLOC_CTX *mem_ctx,
224 struct samba_kdc_entry *p,
225 DATA_BLOB **_pac_blob)
227 struct auth_user_info_dc *user_info_dc;
231 /* The user account may be set not to want the PAC */
232 if ( ! samba_princ_needs_pac(p)) {
237 pac_blob = talloc_zero(mem_ctx, DATA_BLOB);
239 return NT_STATUS_NO_MEMORY;
242 nt_status = authsam_make_user_info_dc(mem_ctx, p->kdc_db_ctx->samdb,
243 lpcfg_netbios_name(p->kdc_db_ctx->lp_ctx),
244 lpcfg_sam_name(p->kdc_db_ctx->lp_ctx),
250 if (!NT_STATUS_IS_OK(nt_status)) {
251 DEBUG(0, ("Getting user info for PAC failed: %s\n",
252 nt_errstr(nt_status)));
256 nt_status = samba_get_logon_info_pac_blob(mem_ctx, user_info_dc, pac_blob);
257 if (!NT_STATUS_IS_OK(nt_status)) {
258 DEBUG(0, ("Building PAC failed: %s\n",
259 nt_errstr(nt_status)));
263 *_pac_blob = pac_blob;
267 NTSTATUS samba_kdc_update_pac_blob(TALLOC_CTX *mem_ctx,
268 krb5_context context,
269 const krb5_pac pac, DATA_BLOB *pac_blob,
270 struct PAC_SIGNATURE_DATA *pac_srv_sig,
271 struct PAC_SIGNATURE_DATA *pac_kdc_sig)
273 struct auth_user_info_dc *user_info_dc;
277 ret = kerberos_pac_to_user_info_dc(mem_ctx, pac,
278 context, &user_info_dc, pac_srv_sig, pac_kdc_sig);
280 return NT_STATUS_UNSUCCESSFUL;
283 nt_status = samba_get_logon_info_pac_blob(mem_ctx,
284 user_info_dc, pac_blob);
289 NTSTATUS samba_kdc_update_delegation_info_blob(TALLOC_CTX *mem_ctx,
290 krb5_context context,
292 const krb5_principal server_principal,
293 const krb5_principal proxy_principal,
300 enum ndr_err_code ndr_err;
302 struct PAC_CONSTRAINED_DELEGATION _d;
303 struct PAC_CONSTRAINED_DELEGATION *d = NULL;
307 TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
309 if (tmp_ctx == NULL) {
310 return NT_STATUS_NO_MEMORY;
313 ret = krb5_pac_get_buffer(context, pac, PAC_TYPE_CONSTRAINED_DELEGATION, &old_data);
315 ZERO_STRUCT(old_data);
317 talloc_free(tmp_ctx);
318 return NT_STATUS_UNSUCCESSFUL;
321 old_blob.length = old_data.length;
322 old_blob.data = (uint8_t *)old_data.data;
325 if (old_blob.length > 0) {
326 ndr_err = ndr_pull_union_blob(&old_blob, mem_ctx,
327 &info, PAC_TYPE_CONSTRAINED_DELEGATION,
328 (ndr_pull_flags_fn_t)ndr_pull_PAC_INFO);
329 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
330 kerberos_free_data_contents(context, &old_data);
331 nt_status = ndr_map_error2ntstatus(ndr_err);
332 DEBUG(0,("can't parse the PAC LOGON_INFO: %s\n", nt_errstr(nt_status)));
333 talloc_free(tmp_ctx);
338 info.constrained_delegation.info = &_d;
340 kerberos_free_data_contents(context, &old_data);
342 ret = krb5_unparse_name(context, server_principal, &server);
344 talloc_free(tmp_ctx);
345 return NT_STATUS_INTERNAL_ERROR;
348 ret = krb5_unparse_name_flags(context, proxy_principal,
349 KRB5_PRINCIPAL_UNPARSE_NO_REALM, &proxy);
352 talloc_free(tmp_ctx);
353 return NT_STATUS_INTERNAL_ERROR;
356 d = info.constrained_delegation.info;
357 i = d->num_transited_services;
358 d->proxy_target.string = server;
359 d->transited_services = talloc_realloc(mem_ctx, d->transited_services,
360 struct lsa_String, i + 1);
361 d->transited_services[i].string = proxy;
362 d->num_transited_services = i + 1;
364 ndr_err = ndr_push_union_blob(new_blob, mem_ctx,
365 &info, PAC_TYPE_CONSTRAINED_DELEGATION,
366 (ndr_push_flags_fn_t)ndr_push_PAC_INFO);
369 if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
370 kerberos_free_data_contents(context, &old_data);
371 nt_status = ndr_map_error2ntstatus(ndr_err);
372 DEBUG(0,("can't parse the PAC LOGON_INFO: %s\n", nt_errstr(nt_status)));
373 talloc_free(tmp_ctx);
377 talloc_free(tmp_ctx);
381 /* function to map policy errors */
382 krb5_error_code samba_kdc_map_policy_err(NTSTATUS nt_status)
386 if (NT_STATUS_EQUAL(nt_status, NT_STATUS_PASSWORD_MUST_CHANGE))
387 ret = KRB5KDC_ERR_KEY_EXP;
388 else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_PASSWORD_EXPIRED))
389 ret = KRB5KDC_ERR_KEY_EXP;
390 else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_EXPIRED))
391 ret = KRB5KDC_ERR_CLIENT_REVOKED;
392 else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_DISABLED))
393 ret = KRB5KDC_ERR_CLIENT_REVOKED;
394 else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_LOGON_HOURS))
395 ret = KRB5KDC_ERR_CLIENT_REVOKED;
396 else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_LOCKED_OUT))
397 ret = KRB5KDC_ERR_CLIENT_REVOKED;
398 else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_WORKSTATION))
399 ret = KRB5KDC_ERR_POLICY;
401 ret = KRB5KDC_ERR_POLICY;
406 /* Given a kdc entry, consult the account_ok routine in auth/auth_sam.c
408 NTSTATUS samba_kdc_check_client_access(struct samba_kdc_entry *kdc_entry,
409 const char *client_name,
410 const char *workstation,
411 bool password_change)
416 tmp_ctx = talloc_named(NULL, 0, "samba_kdc_check_client_access");
418 return NT_STATUS_NO_MEMORY;
421 /* we allow all kinds of trusts here */
422 nt_status = authsam_account_ok(tmp_ctx,
423 kdc_entry->kdc_db_ctx->samdb,
424 MSV1_0_ALLOW_SERVER_TRUST_ACCOUNT |
425 MSV1_0_ALLOW_WORKSTATION_TRUST_ACCOUNT,
426 kdc_entry->realm_dn, kdc_entry->msg,
427 workstation, client_name,
428 true, password_change);
430 talloc_free(tmp_ctx);
434 int kdc_check_pac(krb5_context context,
436 struct PAC_SIGNATURE_DATA *kdc_sig,
441 krb5_keyblock keyblock;
443 if (kdc_sig->type == CKSUMTYPE_HMAC_MD5) {
444 etype = ENCTYPE_ARCFOUR_HMAC;
446 ret = krb5_cksumtype_to_enctype(context,
454 #if HDB_ENCTYPE2KEY_TAKES_KEYSET
455 ret = hdb_enctype2key(context, &ent->entry, NULL, etype, &key);
457 ret = hdb_enctype2key(context, &ent->entry, etype, &key);
466 return check_pac_checksum(srv_sig, kdc_sig,