2 Unix SMB/CIFS implementation.
4 Copyright (C) Volker Lendecke 2004
5 Copyright (C) Stefan Metzmacher 2004
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 2 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the Free Software
19 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
24 #include "auth/auth.h"
25 #include "dlinklist.h"
27 #include "ldap_server/ldap_server.h"
30 close the socket and shutdown a server_context
32 static void ldapsrv_terminate_connection(struct ldapsrv_connection *ldap_conn, const char *reason)
34 server_terminate_connection(ldap_conn->connection, reason);
38 add a socket address to the list of events, one event per port
40 static void add_socket(struct server_service *service,
41 const struct model_ops *model_ops,
42 struct ipv4_addr *ifip)
44 struct server_socket *srv_sock;
46 char *ip_str = talloc_strdup(service, sys_inet_ntoa(*ifip));
48 srv_sock = service_setup_socket(service, model_ops, "ipv4", ip_str, &port);
51 srv_sock = service_setup_socket(service, model_ops, "ipv4", ip_str, &port);
56 /****************************************************************************
57 Open the socket communication.
58 ****************************************************************************/
59 static void ldapsrv_init(struct server_service *service,
60 const struct model_ops *model_ops)
62 struct ldapsrv_service *ldap_service;
63 struct ldapsrv_partition *part;
65 DEBUG(10,("ldapsrv_init\n"));
67 ldap_service = talloc_p(service, struct ldapsrv_service);
69 DEBUG(0,("talloc_p(service, struct ldapsrv_service) failed\n"));
72 ZERO_STRUCTP(ldap_service);
74 part = talloc_p(ldap_service, struct ldapsrv_partition);
76 DEBUG(0,("talloc_p(ldap_service, struct ldapsrv_partition) failed\n"));
79 part->base_dn = ""; /* RootDSE */
80 part->ops = ldapsrv_get_rootdse_partition_ops();
82 ldap_service->rootDSE = part;
83 DLIST_ADD_END(ldap_service->partitions, part, struct ldapsrv_partition *);
85 part = talloc_p(ldap_service, struct ldapsrv_partition);
87 DEBUG(0,("talloc_p(ldap_service, struct ldapsrv_partition) failed\n"));
90 part->base_dn = "*"; /* default partition */
91 part->ops = ldapsrv_get_sldb_partition_ops();
93 ldap_service->default_partition = part;
94 DLIST_ADD_END(ldap_service->partitions, part, struct ldapsrv_partition *);
96 service->private_data = ldap_service;
98 if (lp_interfaces() && lp_bind_interfaces_only()) {
99 int num_interfaces = iface_count();
102 /* We have been given an interfaces line, and been
103 told to only bind to those interfaces. Create a
104 socket per interface and bind to only these.
106 for(i = 0; i < num_interfaces; i++) {
107 struct ipv4_addr *ifip = iface_n_ip(i);
110 DEBUG(0,("ldapsrv_init: interface %d has NULL "
111 "IP address !\n", i));
115 add_socket(service, model_ops, ifip);
118 struct ipv4_addr ifip;
120 /* Just bind to lp_socket_address() (usually 0.0.0.0) */
121 ifip = interpret_addr2(lp_socket_address());
122 add_socket(service, model_ops, &ifip);
126 /* This rw-buf api is made to avoid memcpy. For now do that like mad... The
127 idea is to write into a circular list of buffers where the ideal case is
128 that a read(2) holds a complete request that is then thrown away
131 void ldapsrv_consumed_from_buf(struct rw_buffer *buf,
134 memcpy(buf->data, buf->data+length, buf->length-length);
135 buf->length -= length;
138 static void peek_into_read_buf(struct rw_buffer *buf, uint8_t **out,
142 *out_length = buf->length;
145 BOOL ldapsrv_append_to_buf(struct rw_buffer *buf, uint8_t *data, size_t length)
147 buf->data = realloc(buf->data, buf->length+length);
149 if (buf->data == NULL)
152 memcpy(buf->data+buf->length, data, length);
154 buf->length += length;
158 static BOOL read_into_buf(struct socket_context *sock, struct rw_buffer *buf)
165 tmp_blob = data_blob_talloc(sock, NULL, 1024);
166 if (tmp_blob.data == NULL) {
170 status = socket_recv(sock, tmp_blob.data, tmp_blob.length, &nread, 0);
171 if (NT_STATUS_IS_ERR(status)) {
172 DEBUG(10,("socket_recv: %s\n",nt_errstr(status)));
173 talloc_free(tmp_blob.data);
176 tmp_blob.length = nread;
178 ret = ldapsrv_append_to_buf(buf, tmp_blob.data, tmp_blob.length);
180 talloc_free(tmp_blob.data);
185 static BOOL ldapsrv_read_buf(struct ldapsrv_connection *conn)
192 size_t buf_length, sasl_length;
193 struct socket_context *sock = conn->connection->socket;
197 if (!conn->gensec || !conn->session_info ||
198 !(gensec_have_feature(conn->gensec, GENSEC_WANT_SIGN) &&
199 gensec_have_feature(conn->gensec, GENSEC_WANT_SEAL))) {
200 return read_into_buf(sock, &conn->in_buffer);
203 mem_ctx = talloc(conn, 0);
205 DEBUG(0,("no memory\n"));
209 tmp_blob = data_blob_talloc(mem_ctx, NULL, 1024);
210 if (tmp_blob.data == NULL) {
211 talloc_free(mem_ctx);
215 status = socket_recv(sock, tmp_blob.data, tmp_blob.length, &nread, 0);
216 if (NT_STATUS_IS_ERR(status)) {
217 DEBUG(10,("socket_recv: %s\n",nt_errstr(status)));
218 talloc_free(mem_ctx);
221 tmp_blob.length = nread;
223 ret = ldapsrv_append_to_buf(&conn->sasl_in_buffer, tmp_blob.data, tmp_blob.length);
225 talloc_free(mem_ctx);
229 peek_into_read_buf(&conn->sasl_in_buffer, &buf, &buf_length);
231 if (buf_length < 4) {
233 talloc_free(mem_ctx);
237 sasl_length = RIVAL(buf, 0);
239 if (buf_length < (4 + sasl_length)) {
241 talloc_free(mem_ctx);
245 creds.data = buf + 4;
246 creds.length = gensec_sig_size(conn->gensec);
248 if (creds.length > sasl_length) {
249 /* invalid packet? */
250 talloc_free(mem_ctx);
254 tmp_blob.data = buf + (4 + creds.length);
255 tmp_blob.length = (4 + sasl_length) - (4 + creds.length);
257 if (gensec_have_feature(conn->gensec, GENSEC_WANT_SEAL)) {
258 status = gensec_unseal_packet(conn->gensec, mem_ctx,
259 tmp_blob.data, tmp_blob.length,
260 tmp_blob.data, tmp_blob.length,
262 if (!NT_STATUS_IS_OK(status)) {
263 DEBUG(0,("gensec_unseal_packet: %s\n",nt_errstr(status)));
264 talloc_free(mem_ctx);
268 status = gensec_check_packet(conn->gensec, mem_ctx,
269 tmp_blob.data, tmp_blob.length,
270 tmp_blob.data, tmp_blob.length,
272 if (!NT_STATUS_IS_OK(status)) {
273 DEBUG(0,("gensec_check_packet: %s\n",nt_errstr(status)));
274 talloc_free(mem_ctx);
279 ret = ldapsrv_append_to_buf(&conn->in_buffer, tmp_blob.data, tmp_blob.length);
281 talloc_free(mem_ctx);
285 ldapsrv_consumed_from_buf(&conn->sasl_in_buffer, 4 + sasl_length);
287 talloc_free(mem_ctx);
291 static BOOL write_from_buf(struct socket_context *sock, struct rw_buffer *buf)
297 tmp_blob.data = buf->data;
298 tmp_blob.length = buf->length;
300 status = socket_send(sock, &tmp_blob, &sendlen, 0);
301 if (!NT_STATUS_IS_OK(status)) {
302 DEBUG(10,("socket_send() %s\n",nt_errstr(status)));
306 ldapsrv_consumed_from_buf(buf, sendlen);
311 static BOOL ldapsrv_write_buf(struct ldapsrv_connection *conn)
319 struct socket_context *sock = conn->connection->socket;
322 if (!conn->gensec || !conn->session_info ||
323 !(gensec_have_feature(conn->gensec, GENSEC_WANT_SIGN) &&
324 gensec_have_feature(conn->gensec, GENSEC_WANT_SEAL))) {
325 return write_from_buf(sock, &conn->out_buffer);
328 mem_ctx = talloc(conn, 0);
330 DEBUG(0,("no memory\n"));
334 tmp_blob.data = conn->out_buffer.data;
335 tmp_blob.length = conn->out_buffer.length;
337 if (tmp_blob.length == 0) {
341 if (gensec_have_feature(conn->gensec, GENSEC_WANT_SEAL)) {
342 status = gensec_seal_packet(conn->gensec, mem_ctx,
343 tmp_blob.data, tmp_blob.length,
344 tmp_blob.data, tmp_blob.length,
346 if (!NT_STATUS_IS_OK(status)) {
347 DEBUG(0,("gensec_seal_packet: %s\n",nt_errstr(status)));
348 talloc_free(mem_ctx);
352 status = gensec_sign_packet(conn->gensec, mem_ctx,
353 tmp_blob.data, tmp_blob.length,
354 tmp_blob.data, tmp_blob.length,
356 if (!NT_STATUS_IS_OK(status)) {
357 DEBUG(0,("gensec_sign_packet: %s\n",nt_errstr(status)));
358 talloc_free(mem_ctx);
363 sasl = data_blob_talloc(mem_ctx, NULL, 4 + creds.length + tmp_blob.length);
365 DEBUG(0,("no memory\n"));
366 talloc_free(mem_ctx);
370 RSIVAL(sasl.data, 0, creds.length + tmp_blob.length);
371 memcpy(sasl.data + 4, creds.data, creds.length);
372 memcpy(sasl.data + 4 + creds.length, tmp_blob.data, tmp_blob.length);
374 ret = ldapsrv_append_to_buf(&conn->sasl_out_buffer, sasl.data, sasl.length);
376 talloc_free(mem_ctx);
379 ldapsrv_consumed_from_buf(&conn->out_buffer, tmp_blob.length);
381 tmp_blob.data = conn->sasl_out_buffer.data;
382 tmp_blob.length = conn->sasl_out_buffer.length;
384 status = socket_send(sock, &tmp_blob, &sendlen, 0);
385 if (!NT_STATUS_IS_OK(status)) {
386 DEBUG(10,("socket_send() %s\n",nt_errstr(status)));
387 talloc_free(mem_ctx);
391 ldapsrv_consumed_from_buf(&conn->sasl_out_buffer, sendlen);
393 talloc_free(mem_ctx);
398 static BOOL ldap_encode_to_buf(struct ldap_message *msg, struct rw_buffer *buf)
403 if (!ldap_encode(msg, &blob))
406 res = ldapsrv_append_to_buf(buf, blob.data, blob.length);
408 data_blob_free(&blob);
412 NTSTATUS ldapsrv_do_responses(struct ldapsrv_connection *conn)
414 struct ldapsrv_call *call, *next_call = NULL;
415 struct ldapsrv_reply *reply, *next_reply = NULL;
417 for (call=conn->calls; call; call=next_call) {
418 for (reply=call->replies; reply; reply=next_reply) {
419 if (!ldap_encode_to_buf(&reply->msg, &conn->out_buffer)) {
420 return NT_STATUS_FOOBAR;
422 next_reply = reply->next;
423 DLIST_REMOVE(call->replies, reply);
424 reply->state = LDAPSRV_REPLY_STATE_SEND;
427 next_call = call->next;
428 DLIST_REMOVE(conn->calls, call);
429 call->state = LDAPSRV_CALL_STATE_COMPLETE;
436 NTSTATUS ldapsrv_flush_responses(struct ldapsrv_connection *conn)
442 called when a LDAP socket becomes readable
444 static void ldapsrv_recv(struct server_connection *conn, struct timeval t,
447 struct ldapsrv_connection *ldap_conn = conn->private_data;
449 size_t buf_length, msg_length;
451 struct asn1_data data;
452 struct ldapsrv_call *call;
455 DEBUG(10,("ldapsrv_recv\n"));
457 if (!ldapsrv_read_buf(ldap_conn)) {
458 ldapsrv_terminate_connection(ldap_conn, "ldapsrv_read_buf() failed");
462 peek_into_read_buf(&ldap_conn->in_buffer, &buf, &buf_length);
464 while (buf_length > 0) {
465 /* LDAP Messages are always SEQUENCES */
467 if (!asn1_object_length(buf, buf_length, ASN1_SEQUENCE(0),
469 ldapsrv_terminate_connection(ldap_conn, "asn1_object_length() failed");
473 if (buf_length < msg_length) {
478 /* We've got a complete LDAP request in the in-buffer, convert
479 * that to a ldap_message and put it into the incoming
483 blob.length = msg_length;
485 if (!asn1_load(&data, blob)) {
486 ldapsrv_terminate_connection(ldap_conn, "asn1_load() failed");
490 call = talloc_p(ldap_conn, struct ldapsrv_call);
492 ldapsrv_terminate_connection(ldap_conn, "no memory");
497 call->state = LDAPSRV_CALL_STATE_NEW;
498 call->conn = ldap_conn;
499 call->request.mem_ctx = call;
501 if (!ldap_decode(&data, &call->request)) {
502 dump_data(0,buf, msg_length);
504 ldapsrv_terminate_connection(ldap_conn, "ldap_decode() failed");
510 DLIST_ADD_END(ldap_conn->calls, call,
511 struct ldapsrv_call *);
513 ldapsrv_consumed_from_buf(&ldap_conn->in_buffer, msg_length);
515 status = ldapsrv_do_call(call);
516 if (!NT_STATUS_IS_OK(status)) {
517 ldapsrv_terminate_connection(ldap_conn, "ldapsrv_do_call() failed");
521 peek_into_read_buf(&ldap_conn->in_buffer, &buf, &buf_length);
524 status = ldapsrv_do_responses(ldap_conn);
525 if (!NT_STATUS_IS_OK(status)) {
526 ldapsrv_terminate_connection(ldap_conn, "ldapsrv_do_responses() failed");
530 if ((ldap_conn->out_buffer.length > 0)||(ldap_conn->sasl_out_buffer.length > 0)) {
531 conn->event.fde->flags |= EVENT_FD_WRITE;
538 called when a LDAP socket becomes writable
540 static void ldapsrv_send(struct server_connection *conn, struct timeval t,
543 struct ldapsrv_connection *ldap_conn = conn->private_data;
545 DEBUG(10,("ldapsrv_send\n"));
547 if (!ldapsrv_write_buf(ldap_conn)) {
548 ldapsrv_terminate_connection(ldap_conn, "ldapsrv_write_buf() failed");
552 if (ldap_conn->out_buffer.length == 0 && ldap_conn->sasl_out_buffer.length == 0) {
553 conn->event.fde->flags &= ~EVENT_FD_WRITE;
560 called when connection is idle
562 static void ldapsrv_idle(struct server_connection *conn, struct timeval t)
564 DEBUG(10,("ldapsrv_idle: not implemented!\n"));
568 static void ldapsrv_close(struct server_connection *conn, const char *reason)
574 initialise a server_context from a open socket and register a event handler
575 for reading from that socket
577 static void ldapsrv_accept(struct server_connection *conn)
579 struct ldapsrv_connection *ldap_conn;
581 DEBUG(10, ("ldapsrv_accept\n"));
583 ldap_conn = talloc_p(conn, struct ldapsrv_connection);
585 if (ldap_conn == NULL)
588 ZERO_STRUCTP(ldap_conn);
589 ldap_conn->connection = conn;
590 ldap_conn->service = talloc_reference(ldap_conn, conn->service->private_data);
592 conn->private_data = ldap_conn;
598 called on a fatal error that should cause this server to terminate
600 static void ldapsrv_exit(struct server_service *service, const char *reason)
602 DEBUG(10,("ldapsrv_exit\n"));
606 static const struct server_service_ops ldap_server_ops = {
608 .service_init = ldapsrv_init,
609 .accept_connection = ldapsrv_accept,
610 .recv_handler = ldapsrv_recv,
611 .send_handler = ldapsrv_send,
612 .idle_handler = ldapsrv_idle,
613 .close_connection = ldapsrv_close,
614 .service_exit = ldapsrv_exit,
617 const struct server_service_ops *ldapsrv_get_ops(void)
619 return &ldap_server_ops;
622 NTSTATUS server_service_ldap_init(void)