2 Unix SMB/CIFS implementation.
4 Connect GENSEC to an external SASL lib
6 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2006
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
24 #include "auth/auth.h"
25 #include "lib/socket/socket.h"
26 #include <sasl/sasl.h>
28 struct gensec_sasl_state {
33 static NTSTATUS sasl_nt_status(int sasl_ret)
37 return NT_STATUS_MORE_PROCESSING_REQUIRED;
39 return NT_STATUS_NO_MEMORY;
42 return NT_STATUS_INVALID_PARAMETER;
44 return NT_STATUS_ACCESS_DENIED;
48 return NT_STATUS_UNSUCCESSFUL;
52 static int gensec_sasl_get_user(void *context, int id,
53 const char **result, unsigned *len)
55 struct gensec_security *gensec_security = talloc_get_type(context, struct gensec_security);
56 const char *username = cli_credentials_get_username(gensec_get_credentials(gensec_security));
57 if (id != SASL_CB_USER && id != SASL_CB_AUTHNAME) {
65 static int gensec_sasl_get_realm(void *context, int id,
66 const char **availrealms,
69 struct gensec_security *gensec_security = talloc_get_type(context, struct gensec_security);
70 const char *realm = cli_credentials_get_realm(gensec_get_credentials(gensec_security));
72 if (id != SASL_CB_GETREALM) {
76 for (i=0; availrealms && availrealms[i]; i++) {
77 if (strcasecmp_m(realm, availrealms[i]) == 0) {
78 result[i] = availrealms[i];
82 /* None of the realms match, so lets not specify one */
87 static int gensec_sasl_get_password(sasl_conn_t *conn, void *context, int id,
88 sasl_secret_t **psecret)
90 struct gensec_security *gensec_security = talloc_get_type(context, struct gensec_security);
91 const char *password = cli_credentials_get_password(gensec_get_credentials(gensec_security));
93 sasl_secret_t *secret;
98 secret = talloc_size(gensec_security, sizeof(sasl_secret_t)+strlen(password));
102 secret->len = strlen(password);
103 safe_strcpy(secret->data, password, secret->len+1);
108 static int gensec_sasl_dispose(struct gensec_sasl_state *gensec_sasl_state)
110 sasl_dispose(&gensec_sasl_state->conn);
114 static NTSTATUS gensec_sasl_client_start(struct gensec_security *gensec_security)
116 struct gensec_sasl_state *gensec_sasl_state;
117 const char *service = gensec_get_target_service(gensec_security);
118 const char *target_name = gensec_get_target_hostname(gensec_security);
119 struct socket_address *local_socket_addr = gensec_get_my_addr(gensec_security);
120 struct socket_address *remote_socket_addr = gensec_get_peer_addr(gensec_security);
121 char *local_addr = NULL;
122 char *remote_addr = NULL;
125 sasl_callback_t *callbacks;
127 gensec_sasl_state = talloc(gensec_security, struct gensec_sasl_state);
128 if (!gensec_sasl_state) {
129 return NT_STATUS_NO_MEMORY;
132 callbacks = talloc_array(gensec_sasl_state, sasl_callback_t, 5);
133 callbacks[0].id = SASL_CB_USER;
134 callbacks[0].proc = gensec_sasl_get_user;
135 callbacks[0].context = gensec_security;
137 callbacks[1].id = SASL_CB_AUTHNAME;
138 callbacks[1].proc = gensec_sasl_get_user;
139 callbacks[1].context = gensec_security;
141 callbacks[2].id = SASL_CB_GETREALM;
142 callbacks[2].proc = gensec_sasl_get_realm;
143 callbacks[2].context = gensec_security;
145 callbacks[3].id = SASL_CB_PASS;
146 callbacks[3].proc = gensec_sasl_get_password;
147 callbacks[3].context = gensec_security;
149 callbacks[4].id = SASL_CB_LIST_END;
150 callbacks[4].proc = NULL;
151 callbacks[4].context = NULL;
153 gensec_security->private_data = gensec_sasl_state;
155 if (local_socket_addr) {
156 local_addr = talloc_asprintf(gensec_sasl_state,
158 local_socket_addr->addr,
159 local_socket_addr->port);
162 if (remote_socket_addr) {
163 remote_addr = talloc_asprintf(gensec_sasl_state,
165 remote_socket_addr->addr,
166 remote_socket_addr->port);
168 gensec_sasl_state->step = 0;
170 sasl_ret = sasl_client_new(service,
172 local_addr, remote_addr, callbacks, 0,
173 &gensec_sasl_state->conn);
175 if (sasl_ret == SASL_OK || sasl_ret == SASL_CONTINUE) {
176 sasl_security_properties_t props;
177 talloc_set_destructor(gensec_sasl_state, gensec_sasl_dispose);
180 if (gensec_security->want_features & GENSEC_FEATURE_SIGN) {
183 if (gensec_security->want_features & GENSEC_FEATURE_SEAL) {
187 props.max_ssf = UINT_MAX;
188 props.maxbufsize = 65536;
189 sasl_ret = sasl_setprop(gensec_sasl_state->conn, SASL_SEC_PROPS, &props);
190 if (sasl_ret != SASL_OK) {
191 return sasl_nt_status(sasl_ret);
195 DEBUG(1, ("GENSEC SASL: client_new failed: %s\n", sasl_errdetail(gensec_sasl_state->conn)));
197 return sasl_nt_status(sasl_ret);
200 static NTSTATUS gensec_sasl_update(struct gensec_security *gensec_security,
201 TALLOC_CTX *out_mem_ctx,
202 const DATA_BLOB in, DATA_BLOB *out)
204 struct gensec_sasl_state *gensec_sasl_state = talloc_get_type(gensec_security->private_data,
205 struct gensec_sasl_state);
207 const char *out_data;
208 unsigned int out_len;
210 if (gensec_sasl_state->step == 0) {
212 sasl_ret = sasl_client_start(gensec_sasl_state->conn, gensec_security->ops->sasl_name,
213 NULL, &out_data, &out_len, &mech);
215 sasl_ret = sasl_client_step(gensec_sasl_state->conn,
216 in.data, in.length, NULL, &out_data, &out_len);
218 if (sasl_ret == SASL_OK || sasl_ret == SASL_CONTINUE) {
219 *out = data_blob_talloc(out_mem_ctx, out_data, out_len);
221 DEBUG(1, ("GENSEC SASL: step %d update failed: %s\n", gensec_sasl_state->step,
222 sasl_errdetail(gensec_sasl_state->conn)));
224 gensec_sasl_state->step++;
225 return sasl_nt_status(sasl_ret);
228 static NTSTATUS gensec_sasl_unwrap_packets(struct gensec_security *gensec_security,
229 TALLOC_CTX *out_mem_ctx,
232 size_t *len_processed)
234 struct gensec_sasl_state *gensec_sasl_state = talloc_get_type(gensec_security->private_data,
235 struct gensec_sasl_state);
236 const char *out_data;
237 unsigned int out_len;
239 int sasl_ret = sasl_decode(gensec_sasl_state->conn,
240 in->data, in->length, &out_data, &out_len);
241 if (sasl_ret == SASL_OK) {
242 *out = data_blob_talloc(out_mem_ctx, out_data, out_len);
243 *len_processed = in->length;
245 DEBUG(1, ("GENSEC SASL: unwrap failed: %s\n", sasl_errdetail(gensec_sasl_state->conn)));
247 return sasl_nt_status(sasl_ret);
250 static NTSTATUS gensec_sasl_wrap_packets(struct gensec_security *gensec_security,
251 TALLOC_CTX *out_mem_ctx,
254 size_t *len_processed)
256 struct gensec_sasl_state *gensec_sasl_state = talloc_get_type(gensec_security->private_data,
257 struct gensec_sasl_state);
258 const char *out_data;
259 unsigned int out_len;
261 int sasl_ret = sasl_encode(gensec_sasl_state->conn,
262 in->data, in->length, &out_data, &out_len);
263 if (sasl_ret == SASL_OK) {
264 *out = data_blob_talloc(out_mem_ctx, out_data, out_len);
265 *len_processed = in->length;
267 DEBUG(1, ("GENSEC SASL: wrap failed: %s\n", sasl_errdetail(gensec_sasl_state->conn)));
269 return sasl_nt_status(sasl_ret);
272 /* Try to figure out what features we actually got on the connection */
273 static BOOL gensec_sasl_have_feature(struct gensec_security *gensec_security,
276 struct gensec_sasl_state *gensec_sasl_state = talloc_get_type(gensec_security->private_data,
277 struct gensec_sasl_state);
279 int sasl_ret = sasl_getprop(gensec_sasl_state->conn, SASL_SSF, &ssf);
280 if (sasl_ret != SASL_OK) {
283 if (feature & GENSEC_FEATURE_SIGN) {
291 if (feature & GENSEC_FEATURE_SEAL) {
302 /* This could in theory work with any SASL mech */
303 static const struct gensec_security_ops gensec_sasl_security_ops = {
304 .name = "sasl-DIGEST-MD5",
305 .sasl_name = "DIGEST-MD5",
306 .client_start = gensec_sasl_client_start,
307 .update = gensec_sasl_update,
308 .wrap_packets = gensec_sasl_wrap_packets,
309 .unwrap_packets = gensec_sasl_unwrap_packets,
310 .have_feature = gensec_sasl_have_feature,
312 .priority = GENSEC_SASL
315 int gensec_sasl_log(void *context,
320 switch (sasl_log_level) {
351 DEBUG(debug_level, ("gensec_sasl: %s\n", message));
356 NTSTATUS gensec_sasl_init(void)
360 const char **sasl_mechs;
362 static const sasl_callback_t callbacks[] = {
365 .proc = gensec_sasl_log,
369 .id = SASL_CB_LIST_END,
370 .proc = gensec_sasl_log,
374 sasl_ret = sasl_client_init(callbacks);
376 if (sasl_ret == SASL_NOMECH) {
377 /* Nothing to do here */
381 if (sasl_ret != SASL_OK) {
382 return sasl_nt_status(sasl_ret);
385 /* For now, we just register DIGEST-MD5 */
387 ret = gensec_register(&gensec_sasl_security_ops);
388 if (!NT_STATUS_IS_OK(ret)) {
389 DEBUG(0,("Failed to register '%s' gensec backend!\n",
390 gensec_sasl_security_ops.name));
394 sasl_mechs = sasl_global_listmech();
395 for (i = 0; sasl_mechs && sasl_mechs[i]; i++) {
396 const struct gensec_security_ops *oldmech;
397 struct gensec_security_ops *newmech;
398 oldmech = gensec_security_by_sasl_name(NULL, sasl_mechs[i]);
402 newmech = talloc(talloc_autofree_context(), struct gensec_security_ops);
404 return NT_STATUS_NO_MEMORY;
406 *newmech = gensec_sasl_security_ops;
407 newmech->sasl_name = talloc_strdup(newmech, sasl_mechs[i]);
408 newmech->name = talloc_asprintf(newmech, "sasl-%s", sasl_mechs[i]);
409 if (!newmech->sasl_name || !newmech->name) {
410 return NT_STATUS_NO_MEMORY;
413 ret = gensec_register(newmech);
414 if (!NT_STATUS_IS_OK(ret)) {
415 DEBUG(0,("Failed to register '%s' gensec backend!\n",
416 gensec_sasl_security_ops.name));