2012-01-05 20:15:14 +04:00
/*
NLTMSSP wrappers
Copyright ( C ) Andrew Tridgell 2001
Copyright ( C ) Andrew Bartlett 2001 - 2003 , 2011
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 3 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
# include "includes.h"
# include "auth/ntlmssp/ntlmssp.h"
# include "auth_generic.h"
# include "auth/gensec/gensec.h"
# include "auth/credentials/credentials.h"
# include "librpc/rpc/dcerpc.h"
# include "lib/param/param.h"
2012-01-02 13:22:38 +04:00
# include "librpc/crypto/gse.h"
2012-01-05 20:15:14 +04:00
NTSTATUS auth_generic_set_username ( struct auth_generic_state * ans ,
const char * user )
{
cli_credentials_set_username ( ans - > credentials , user , CRED_SPECIFIED ) ;
return NT_STATUS_OK ;
}
NTSTATUS auth_generic_set_domain ( struct auth_generic_state * ans ,
const char * domain )
{
cli_credentials_set_domain ( ans - > credentials , domain , CRED_SPECIFIED ) ;
return NT_STATUS_OK ;
}
NTSTATUS auth_generic_set_password ( struct auth_generic_state * ans ,
const char * password )
{
cli_credentials_set_password ( ans - > credentials , password , CRED_SPECIFIED ) ;
return NT_STATUS_OK ;
}
2014-09-23 20:12:20 +04:00
NTSTATUS auth_generic_set_creds ( struct auth_generic_state * ans ,
struct cli_credentials * creds )
{
talloc_unlink ( ans - > credentials , creds ) ;
ans - > credentials = creds ;
return NT_STATUS_OK ;
}
2012-01-05 20:15:14 +04:00
NTSTATUS auth_generic_client_prepare ( TALLOC_CTX * mem_ctx , struct auth_generic_state * * auth_generic_state )
{
struct auth_generic_state * ans ;
NTSTATUS nt_status ;
2012-01-12 19:12:02 +04:00
size_t idx = 0 ;
2012-01-05 20:15:14 +04:00
struct gensec_settings * gensec_settings ;
2013-08-05 13:20:21 +04:00
const struct gensec_security_ops * * backends = NULL ;
2012-01-05 20:15:14 +04:00
struct loadparm_context * lp_ctx ;
2021-06-22 10:35:47 +03:00
bool ok ;
2012-01-05 20:15:14 +04:00
ans = talloc_zero ( mem_ctx , struct auth_generic_state ) ;
if ( ! ans ) {
DEBUG ( 0 , ( " auth_generic_start: talloc failed! \n " ) ) ;
return NT_STATUS_NO_MEMORY ;
}
2012-06-27 17:24:39 +04:00
lp_ctx = loadparm_init_s3 ( ans , loadparm_s3_helpers ( ) ) ;
2012-01-05 20:15:14 +04:00
if ( lp_ctx = = NULL ) {
DEBUG ( 10 , ( " loadparm_init_s3 failed \n " ) ) ;
TALLOC_FREE ( ans ) ;
return NT_STATUS_INVALID_SERVER_STATE ;
}
gensec_settings = lpcfg_gensec_settings ( ans , lp_ctx ) ;
if ( lp_ctx = = NULL ) {
DEBUG ( 10 , ( " lpcfg_gensec_settings failed \n " ) ) ;
TALLOC_FREE ( ans ) ;
return NT_STATUS_NO_MEMORY ;
}
2013-08-05 13:20:21 +04:00
backends = talloc_zero_array ( gensec_settings ,
2015-12-10 17:42:51 +03:00
const struct gensec_security_ops * , 7 ) ;
2013-08-05 13:20:21 +04:00
if ( backends = = NULL ) {
2012-01-05 20:15:14 +04:00
TALLOC_FREE ( ans ) ;
return NT_STATUS_NO_MEMORY ;
}
2013-08-05 13:20:21 +04:00
gensec_settings - > backends = backends ;
2012-01-05 20:15:14 +04:00
2012-03-11 00:04:38 +04:00
gensec_init ( ) ;
2012-01-05 20:15:14 +04:00
2012-03-11 00:04:38 +04:00
/* These need to be in priority order, krb5 before NTLMSSP */
2012-03-10 23:44:17 +04:00
# if defined(HAVE_KRB5)
2013-08-05 13:20:21 +04:00
backends [ idx + + ] = & gensec_gse_krb5_security_ops ;
2012-01-02 13:22:38 +04:00
# endif
2015-11-26 13:45:33 +03:00
backends [ idx + + ] = gensec_security_by_oid ( NULL , GENSEC_OID_NTLMSSP ) ;
2015-12-10 17:42:51 +03:00
backends [ idx + + ] = gensec_security_by_name ( NULL , " ntlmssp_resume_ccache " ) ;
2012-03-11 00:04:38 +04:00
2013-08-05 13:20:21 +04:00
backends [ idx + + ] = gensec_security_by_oid ( NULL , GENSEC_OID_SPNEGO ) ;
2013-09-18 19:27:28 +04:00
backends [ idx + + ] = gensec_security_by_auth_type ( NULL , DCERPC_AUTH_TYPE_SCHANNEL ) ;
2014-04-17 14:02:45 +04:00
backends [ idx + + ] = gensec_security_by_auth_type ( NULL , DCERPC_AUTH_TYPE_NCALRPC_AS_SYSTEM ) ;
2012-01-12 19:12:02 +04:00
2012-01-05 20:15:14 +04:00
nt_status = gensec_client_start ( ans , & ans - > gensec_security , gensec_settings ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
TALLOC_FREE ( ans ) ;
return nt_status ;
}
ans - > credentials = cli_credentials_init ( ans ) ;
if ( ! ans - > credentials ) {
TALLOC_FREE ( ans ) ;
return NT_STATUS_NO_MEMORY ;
}
2021-06-22 10:35:47 +03:00
ok = cli_credentials_guess ( ans - > credentials , lp_ctx ) ;
if ( ! ok ) {
TALLOC_FREE ( ans ) ;
return NT_STATUS_INTERNAL_ERROR ;
}
2012-01-05 20:15:14 +04:00
talloc_unlink ( ans , lp_ctx ) ;
talloc_unlink ( ans , gensec_settings ) ;
* auth_generic_state = ans ;
return NT_STATUS_OK ;
}
NTSTATUS auth_generic_client_start ( struct auth_generic_state * ans , const char * oid )
{
NTSTATUS status ;
/* Transfer the credentials to gensec */
status = gensec_set_credentials ( ans - > gensec_security , ans - > credentials ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 1 , ( " Failed to set GENSEC credentials: %s \n " ,
nt_errstr ( status ) ) ) ;
return status ;
}
talloc_unlink ( ans , ans - > credentials ) ;
ans - > credentials = NULL ;
status = gensec_start_mech_by_oid ( ans - > gensec_security ,
oid ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
return NT_STATUS_OK ;
}
2015-11-26 13:44:02 +03:00
NTSTATUS auth_generic_client_start_by_name ( struct auth_generic_state * ans ,
const char * name )
{
NTSTATUS status ;
/* Transfer the credentials to gensec */
status = gensec_set_credentials ( ans - > gensec_security , ans - > credentials ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 1 , ( " Failed to set GENSEC credentials: %s \n " ,
nt_errstr ( status ) ) ) ;
return status ;
}
talloc_unlink ( ans , ans - > credentials ) ;
ans - > credentials = NULL ;
status = gensec_start_mech_by_name ( ans - > gensec_security , name ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
return NT_STATUS_OK ;
}
2012-01-05 20:15:14 +04:00
NTSTATUS auth_generic_client_start_by_authtype ( struct auth_generic_state * ans ,
uint8_t auth_type ,
uint8_t auth_level )
{
NTSTATUS status ;
/* Transfer the credentials to gensec */
status = gensec_set_credentials ( ans - > gensec_security , ans - > credentials ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 1 , ( " Failed to set GENSEC credentials: %s \n " ,
nt_errstr ( status ) ) ) ;
return status ;
}
talloc_unlink ( ans , ans - > credentials ) ;
ans - > credentials = NULL ;
status = gensec_start_mech_by_authtype ( ans - > gensec_security ,
auth_type , auth_level ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
return NT_STATUS_OK ;
}
2016-03-01 21:39:04 +03:00
NTSTATUS auth_generic_client_start_by_sasl ( struct auth_generic_state * ans ,
const char * * sasl_list )
{
NTSTATUS status ;
/* Transfer the credentials to gensec */
status = gensec_set_credentials ( ans - > gensec_security , ans - > credentials ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 1 , ( " Failed to set GENSEC credentials: %s \n " ,
nt_errstr ( status ) ) ) ;
return status ;
}
talloc_unlink ( ans , ans - > credentials ) ;
ans - > credentials = NULL ;
status = gensec_start_mech_by_sasl_list ( ans - > gensec_security , sasl_list ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
}
return NT_STATUS_OK ;
}