s4-kdc: Remove unused etypes from sdb structure
[sfrench/samba-autobuild/.git] / source4 / kdc / kpasswd-helper.c
1 /*
2    Unix SMB/CIFS implementation.
3
4    Samba kpasswd implementation
5
6    Copyright (c) 2005      Andrew Bartlett <abartlet@samba.org>
7    Copyright (c) 2016      Andreas Schneider <asn@samba.org>
8
9    This program is free software; you can redistribute it and/or modify
10    it under the terms of the GNU General Public License as published by
11    the Free Software Foundation; either version 3 of the License, or
12    (at your option) any later version.
13
14    This program is distributed in the hope that it will be useful,
15    but WITHOUT ANY WARRANTY; without even the implied warranty of
16    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
17    GNU General Public License for more details.
18
19    You should have received a copy of the GNU General Public License
20    along with this program.  If not, see <http://www.gnu.org/licenses/>.
21 */
22
23 #include "includes.h"
24 #include "system/kerberos.h"
25 #include "librpc/gen_ndr/samr.h"
26 #include "dsdb/samdb/samdb.h"
27 #include "auth/auth.h"
28 #include "kdc/kpasswd-helper.h"
29
30 bool kpasswd_make_error_reply(TALLOC_CTX *mem_ctx,
31                               krb5_error_code error_code,
32                               const char *error_string,
33                               DATA_BLOB *error_data)
34 {
35         bool ok;
36         char *s;
37         size_t slen;
38
39         if (error_code == 0) {
40                 DBG_DEBUG("kpasswd reply - %s\n", error_string);
41         } else {
42                 DBG_INFO("kpasswd reply - %s\n", error_string);
43         }
44
45         ok = push_utf8_talloc(mem_ctx, &s, error_string, &slen);
46         if (!ok) {
47                 return false;
48         }
49
50         /*
51          * The string 's' has two terminating nul-bytes which are also
52          * reflected by 'slen'. Normally Kerberos doesn't expect that strings
53          * are nul-terminated, but Heimdal does!
54          */
55 #ifndef SAMBA4_USES_HEIMDAL
56         if (slen < 2) {
57                 talloc_free(s);
58                 return false;
59         }
60         slen -= 2;
61 #endif
62         if (2 + slen < slen) {
63                 talloc_free(s);
64                 return false;
65         }
66         error_data->length = 2 + slen;
67         error_data->data = talloc_size(mem_ctx, error_data->length);
68         if (error_data->data == NULL) {
69                 talloc_free(s);
70                 return false;
71         }
72
73         RSSVAL(error_data->data, 0, error_code);
74         memcpy(error_data->data + 2, s, slen);
75
76         talloc_free(s);
77
78         return true;
79 }
80
81 bool kpasswd_make_pwchange_reply(TALLOC_CTX *mem_ctx,
82                                  NTSTATUS status,
83                                  enum samPwdChangeReason reject_reason,
84                                  struct samr_DomInfo1 *dominfo,
85                                  DATA_BLOB *error_blob)
86 {
87         const char *reject_string = NULL;
88
89         if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_USER)) {
90                 return kpasswd_make_error_reply(mem_ctx,
91                                                 KRB5_KPASSWD_ACCESSDENIED,
92                                                 "No such user when changing password",
93                                                 error_blob);
94         } else if (NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED)) {
95                 return kpasswd_make_error_reply(mem_ctx,
96                                                 KRB5_KPASSWD_ACCESSDENIED,
97                                                 "Not permitted to change password",
98                                                 error_blob);
99         }
100         if (dominfo != NULL &&
101             NT_STATUS_EQUAL(status, NT_STATUS_PASSWORD_RESTRICTION)) {
102                 switch (reject_reason) {
103                 case SAM_PWD_CHANGE_PASSWORD_TOO_SHORT:
104                         reject_string =
105                                 talloc_asprintf(mem_ctx,
106                                                 "Password too short, password "
107                                                 "must be at least %d characters "
108                                                 "long.",
109                                                 dominfo->min_password_length);
110                         if (reject_string == NULL) {
111                                 reject_string = "Password too short";
112                         }
113                         break;
114                 case SAM_PWD_CHANGE_NOT_COMPLEX:
115                         reject_string = "Password does not meet complexity "
116                                         "requirements";
117                         break;
118                 case SAM_PWD_CHANGE_PWD_IN_HISTORY:
119                         reject_string =
120                                 talloc_asprintf(mem_ctx,
121                                                 "Password is already in password "
122                                                 "history. New password must not "
123                                                 "match any of your %d previous "
124                                                 "passwords.",
125                                                 dominfo->password_history_length);
126                         if (reject_string == NULL) {
127                                 reject_string = "Password is already in password "
128                                                 "history";
129                         }
130                         break;
131                 default:
132                         reject_string = "Password change rejected, password "
133                                         "changes may not be permitted on this "
134                                         "account, or the minimum password age "
135                                         "may not have elapsed.";
136                         break;
137                 }
138
139                 return kpasswd_make_error_reply(mem_ctx,
140                                                 KRB5_KPASSWD_SOFTERROR,
141                                                 reject_string,
142                                                 error_blob);
143         }
144
145         if (!NT_STATUS_IS_OK(status)) {
146                 reject_string = talloc_asprintf(mem_ctx,
147                                                 "Failed to set password: %s",
148                                                 nt_errstr(status));
149                 if (reject_string == NULL) {
150                         reject_string = "Failed to set password";
151                 }
152                 return kpasswd_make_error_reply(mem_ctx,
153                                                 KRB5_KPASSWD_HARDERROR,
154                                                 reject_string,
155                                                 error_blob);
156         }
157
158         return kpasswd_make_error_reply(mem_ctx,
159                                         KRB5_KPASSWD_SUCCESS,
160                                         "Password changed",
161                                         error_blob);
162 }
163
164 NTSTATUS kpasswd_samdb_set_password(TALLOC_CTX *mem_ctx,
165                                     struct tevent_context *event_ctx,
166                                     struct loadparm_context *lp_ctx,
167                                     struct auth_session_info *session_info,
168                                     bool is_service_principal,
169                                     const char *target_principal_name,
170                                     DATA_BLOB *password,
171                                     enum samPwdChangeReason *reject_reason,
172                                     struct samr_DomInfo1 **dominfo)
173 {
174         NTSTATUS status;
175         struct ldb_context *samdb;
176         struct ldb_dn *target_dn = NULL;
177         int rc;
178
179         samdb = samdb_connect(mem_ctx,
180                               event_ctx,
181                               lp_ctx,
182                               session_info,
183                               0);
184         if (samdb == NULL) {
185                 return NT_STATUS_INTERNAL_DB_CORRUPTION;
186         }
187
188         DBG_INFO("%s\\%s (%s) is changing password of %s\n",
189                  session_info->info->domain_name,
190                  session_info->info->account_name,
191                  dom_sid_string(mem_ctx,
192                                 &session_info->security_token->sids[PRIMARY_USER_SID_INDEX]),
193                  target_principal_name);
194
195         rc = ldb_transaction_start(samdb);
196         if (rc != LDB_SUCCESS) {
197                 return NT_STATUS_TRANSACTION_ABORTED;
198         }
199
200         if (is_service_principal) {
201                 status = crack_service_principal_name(samdb,
202                                                       mem_ctx,
203                                                       target_principal_name,
204                                                       &target_dn,
205                                                       NULL);
206         } else {
207                 status = crack_user_principal_name(samdb,
208                                                    mem_ctx,
209                                                    target_principal_name,
210                                                    &target_dn,
211                                                    NULL);
212         }
213         if (!NT_STATUS_IS_OK(status)) {
214                 ldb_transaction_cancel(samdb);
215                 return status;
216         }
217
218         status = samdb_set_password(samdb,
219                                     mem_ctx,
220                                     target_dn,
221                                     NULL, /* domain_dn */
222                                     password,
223                                     NULL, /* lmNewHash */
224                                     NULL, /* ntNewHash */
225                                     NULL, /* lmOldHash */
226                                     NULL, /* ntOldHash */
227                                     reject_reason,
228                                     dominfo);
229         if (NT_STATUS_IS_OK(status)) {
230                 rc = ldb_transaction_commit(samdb);
231                 if (rc != LDB_SUCCESS) {
232                         DBG_WARNING("Failed to commit transaction to "
233                                     "set password on %s: %s\n",
234                                     ldb_dn_get_linearized(target_dn),
235                                     ldb_errstring(samdb));
236                         return NT_STATUS_TRANSACTION_ABORTED;
237                 }
238         } else {
239                 ldb_transaction_cancel(samdb);
240         }
241
242         return status;
243 }