2003-08-13 01:53:07 +00:00
/*
Unix SMB / CIFS implementation .
Winbind authentication mechnism
Copyright ( C ) Tim Potter 2000
Copyright ( C ) Andrew Bartlett 2001 - 2002
2005-01-09 12:55:25 +00:00
Copyright ( C ) Stefan Metzmacher 2005
2003-08-13 01:53:07 +00:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-10 02:07:03 +00:00
the Free Software Foundation ; either version 3 of the License , or
2003-08-13 01:53:07 +00:00
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
2007-07-10 02:07:03 +00:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2003-08-13 01:53:07 +00:00
*/
# include "includes.h"
2004-11-02 02:57:18 +00:00
# include "auth/auth.h"
2008-05-05 19:28:38 +10:00
# include "auth/ntlm/auth_proto.h"
2010-09-03 16:59:05 +02:00
# include "librpc/gen_ndr/ndr_winbind_c.h"
2006-07-31 15:42:27 +00:00
# include "lib/messaging/irpc.h"
2008-01-01 22:05:13 -06:00
# include "param/param.h"
2009-06-25 19:16:02 +02:00
# include "nsswitch/libwbclient/wbclient.h"
2014-03-28 10:56:02 +13:00
# include "auth/auth_sam_reply.h"
2010-09-20 17:42:13 +10:00
# include "libcli/security/security.h"
2017-03-23 11:57:49 +01:00
# include "dsdb/samdb/samdb.h"
2017-04-03 15:26:12 +12:00
# include "auth/auth_sam.h"
2003-08-13 01:53:07 +00:00
2017-04-20 12:24:43 -07:00
_PUBLIC_ NTSTATUS auth4_winbind_init ( TALLOC_CTX * ) ;
2011-03-19 00:44:28 +01:00
2006-07-27 11:24:18 +00:00
static NTSTATUS winbind_want_check ( struct auth_method_context * ctx ,
TALLOC_CTX * mem_ctx ,
const struct auth_usersupplied_info * user_info )
{
if ( ! user_info - > mapped . account_name | | ! * user_info - > mapped . account_name ) {
return NT_STATUS_NOT_IMPLEMENTED ;
}
/* TODO: maybe limit the user scope to remote users only */
return NT_STATUS_OK ;
}
2017-03-23 11:57:49 +01:00
static NTSTATUS winbind_rodc_want_check ( struct auth_method_context * ctx ,
TALLOC_CTX * mem_ctx ,
const struct auth_usersupplied_info * user_info )
{
int ret ;
bool am_rodc ;
if ( ! user_info - > mapped . account_name | | ! * user_info - > mapped . account_name ) {
return NT_STATUS_NOT_IMPLEMENTED ;
}
if ( ctx - > auth_ctx - > sam_ctx = = NULL ) {
DBG_ERR ( " ctx->auth_ctx->sam_ctx == NULL, don't check. \n " ) ;
return NT_STATUS_NOT_IMPLEMENTED ;
}
ret = samdb_rodc ( ctx - > auth_ctx - > sam_ctx , & am_rodc ) ;
if ( ret ! = LDB_SUCCESS ) {
DBG_ERR ( " samdb_rodc() failed %d %s, don't check. \n " ,
ret , ldb_errstring ( ctx - > auth_ctx - > sam_ctx ) ) ;
return NT_STATUS_NOT_IMPLEMENTED ;
}
if ( ! am_rodc ) {
/*
* We don ' t support trusts yet and we
* don ' t want to add them using the
* semi - async irpc call that uses
* a nested event loop .
*/
return NT_STATUS_NOT_IMPLEMENTED ;
}
/*
* We ' re a RODC , so we forward the request to our winbind .
* As the RODC is not yet production ready anyway , we keep
* the semi - async behavior with nested event loops in order
* to keep autobuild happy .
*/
return NT_STATUS_OK ;
}
2006-07-31 15:42:27 +00:00
struct winbind_check_password_state {
struct winbind_SamLogon req ;
} ;
/*
Authenticate a user with a challenge / response
using IRPC to the winbind task
*/
static NTSTATUS winbind_check_password ( struct auth_method_context * ctx ,
TALLOC_CTX * mem_ctx ,
const struct auth_usersupplied_info * user_info ,
2017-04-03 15:21:29 +12:00
struct auth_user_info_dc * * user_info_dc ,
bool * authoritative )
2006-07-31 15:42:27 +00:00
{
NTSTATUS status ;
2010-09-03 16:59:05 +02:00
struct dcerpc_binding_handle * irpc_handle ;
2006-07-31 15:42:27 +00:00
struct winbind_check_password_state * s ;
const struct auth_usersupplied_info * user_info_new ;
struct netr_IdentityInfo * identity_info ;
2017-04-03 15:26:12 +12:00
struct ldb_dn * domain_dn ;
struct ldb_message * msg ;
2017-06-27 12:09:41 +02:00
const char * account_name = user_info - > mapped . account_name ;
const char * p = NULL ;
2006-07-31 15:42:27 +00:00
2010-04-19 15:43:33 +10:00
if ( ! ctx - > auth_ctx - > msg_ctx ) {
DEBUG ( 0 , ( " winbind_check_password: auth_context_create was called with out messaging context \n " ) ) ;
return NT_STATUS_INTERNAL_ERROR ;
}
2007-05-07 15:19:53 +00:00
s = talloc ( mem_ctx , struct winbind_check_password_state ) ;
NT_STATUS_HAVE_NO_MEMORY ( s ) ;
2010-09-03 16:59:05 +02:00
irpc_handle = irpc_binding_handle_by_name ( s , ctx - > auth_ctx - > msg_ctx ,
" winbind_server " ,
& ndr_table_winbind ) ;
if ( irpc_handle = = NULL ) {
2006-07-31 15:42:27 +00:00
DEBUG ( 0 , ( " Winbind authentication for [%s] \\ [%s] failed, "
" no winbind_server running! \n " ,
user_info - > client . domain_name , user_info - > client . account_name ) ) ;
return NT_STATUS_NO_LOGON_SERVERS ;
}
if ( user_info - > flags & USER_INFO_INTERACTIVE_LOGON ) {
struct netr_PasswordInfo * password_info ;
status = encrypt_user_info ( s , ctx - > auth_ctx , AUTH_PASSWORD_HASH ,
user_info , & user_info_new ) ;
NT_STATUS_NOT_OK_RETURN ( status ) ;
user_info = user_info_new ;
password_info = talloc ( s , struct netr_PasswordInfo ) ;
NT_STATUS_HAVE_NO_MEMORY ( password_info ) ;
password_info - > lmpassword = * user_info - > password . hash . lanman ;
password_info - > ntpassword = * user_info - > password . hash . nt ;
identity_info = & password_info - > identity_info ;
s - > req . in . logon_level = 1 ;
s - > req . in . logon . password = password_info ;
} else {
struct netr_NetworkInfo * network_info ;
2009-12-14 20:32:47 +11:00
uint8_t chal [ 8 ] ;
2006-07-31 15:42:27 +00:00
status = encrypt_user_info ( s , ctx - > auth_ctx , AUTH_PASSWORD_RESPONSE ,
user_info , & user_info_new ) ;
NT_STATUS_NOT_OK_RETURN ( status ) ;
user_info = user_info_new ;
network_info = talloc ( s , struct netr_NetworkInfo ) ;
NT_STATUS_HAVE_NO_MEMORY ( network_info ) ;
2009-12-14 20:32:47 +11:00
status = auth_get_challenge ( ctx - > auth_ctx , chal ) ;
2006-07-31 15:42:27 +00:00
NT_STATUS_NOT_OK_RETURN ( status ) ;
2009-12-14 20:32:47 +11:00
memcpy ( network_info - > challenge , chal , sizeof ( network_info - > challenge ) ) ;
2006-07-31 15:42:27 +00:00
network_info - > nt . length = user_info - > password . response . nt . length ;
network_info - > nt . data = user_info - > password . response . nt . data ;
2007-04-29 21:40:48 +00:00
network_info - > lm . length = user_info - > password . response . lanman . length ;
network_info - > lm . data = user_info - > password . response . lanman . data ;
2006-07-31 15:42:27 +00:00
identity_info = & network_info - > identity_info ;
s - > req . in . logon_level = 2 ;
s - > req . in . logon . network = network_info ;
}
identity_info - > domain_name . string = user_info - > client . domain_name ;
identity_info - > parameter_control = user_info - > logon_parameters ; /* see MSV1_0_* */
identity_info - > logon_id_low = 0 ;
identity_info - > logon_id_high = 0 ;
identity_info - > account_name . string = user_info - > client . account_name ;
identity_info - > workstation . string = user_info - > workstation_name ;
s - > req . in . validation_level = 3 ;
2007-04-29 21:40:48 +00:00
2014-05-05 16:27:59 +12:00
/* Note: this makes use of nested event loops... */
dcerpc_binding_handle_set_sync_ev ( irpc_handle , ctx - > auth_ctx - > event_ctx ) ;
2010-09-03 16:59:05 +02:00
status = dcerpc_winbind_SamLogon_r ( irpc_handle , s , & s - > req ) ;
2006-07-31 15:42:27 +00:00
NT_STATUS_NOT_OK_RETURN ( status ) ;
2017-06-17 00:26:18 +02:00
if ( ! NT_STATUS_IS_OK ( s - > req . out . result ) ) {
if ( ! s - > req . out . authoritative ) {
* authoritative = false ;
}
return s - > req . out . result ;
2017-02-25 09:55:28 +00:00
}
2017-04-03 15:26:12 +12:00
/*
* At best , reset the badPwdCount to 0 if the account exists .
* This means that lockouts happen at a badPwdCount earlier than
* normal , but makes it more fault tolerant .
*/
2017-06-27 12:09:41 +02:00
p = strchr_m ( account_name , ' @ ' ) ;
if ( p ! = NULL ) {
const char * nt4_domain = NULL ;
const char * nt4_account = NULL ;
status = crack_name_to_nt4_name ( mem_ctx ,
ctx - > auth_ctx - > sam_ctx ,
DRSUAPI_DS_NAME_FORMAT_USER_PRINCIPAL ,
account_name ,
& nt4_domain , & nt4_account ) ;
if ( NT_STATUS_IS_OK ( status ) & &
lpcfg_is_mydomain ( ctx - > auth_ctx - > lp_ctx , nt4_domain ) )
{
account_name = nt4_account ;
2017-04-03 15:26:12 +12:00
}
2017-06-27 12:09:41 +02:00
}
2017-04-03 15:26:12 +12:00
2017-06-27 12:09:41 +02:00
domain_dn = ldb_get_default_basedn ( ctx - > auth_ctx - > sam_ctx ) ;
if ( domain_dn ! = NULL ) {
status = authsam_search_account ( mem_ctx , ctx - > auth_ctx - > sam_ctx ,
account_name , domain_dn , & msg ) ;
if ( NT_STATUS_IS_OK ( status ) ) {
authsam_logon_success_accounting (
ctx - > auth_ctx - > sam_ctx , msg ,
domain_dn ,
user_info - > flags & USER_INFO_INTERACTIVE_LOGON ,
NULL ) ;
2017-04-03 15:26:12 +12:00
}
}
2011-02-08 16:53:13 +11:00
status = make_user_info_dc_netlogon_validation ( mem_ctx ,
2006-07-31 15:42:27 +00:00
user_info - > client . account_name ,
s - > req . in . validation_level ,
& s - > req . out . validation ,
2011-07-18 13:55:20 +10:00
true , /* This user was authenticated */
2011-02-08 16:53:13 +11:00
user_info_dc ) ;
2006-07-31 15:42:27 +00:00
NT_STATUS_NOT_OK_RETURN ( status ) ;
return NT_STATUS_OK ;
}
2009-06-25 19:16:02 +02:00
/*
Authenticate a user with a challenge / response
using the samba3 winbind protocol via libwbclient
*/
static NTSTATUS winbind_check_password_wbclient ( struct auth_method_context * ctx ,
TALLOC_CTX * mem_ctx ,
const struct auth_usersupplied_info * user_info ,
2017-04-03 15:21:29 +12:00
struct auth_user_info_dc * * user_info_dc ,
bool * authoritative )
2009-06-25 19:16:02 +02:00
{
struct wbcAuthUserParams params ;
struct wbcAuthUserInfo * info = NULL ;
struct wbcAuthErrorInfo * err = NULL ;
wbcErr wbc_status ;
NTSTATUS nt_status ;
2016-01-07 15:10:26 +01:00
struct netr_SamInfo6 * info6 = NULL ;
2009-06-25 19:16:02 +02:00
union netr_Validation validation ;
/* Send off request */
const struct auth_usersupplied_info * user_info_temp ;
nt_status = encrypt_user_info ( mem_ctx , ctx - > auth_ctx ,
AUTH_PASSWORD_RESPONSE ,
user_info , & user_info_temp ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
return nt_status ;
}
user_info = user_info_temp ;
ZERO_STRUCT ( params ) ;
2016-01-07 15:10:26 +01:00
ZERO_STRUCT ( validation ) ;
2009-06-25 19:16:02 +02:00
/*params.flags = WBFLAG_PAM_INFO3_NDR;*/
params . parameter_control = user_info - > logon_parameters ;
params . parameter_control | = WBC_MSV1_0_ALLOW_WORKSTATION_TRUST_ACCOUNT |
WBC_MSV1_0_ALLOW_SERVER_TRUST_ACCOUNT ;
params . level = WBC_AUTH_USER_LEVEL_RESPONSE ;
params . account_name = user_info - > client . account_name ;
params . domain_name = user_info - > client . domain_name ;
params . workstation_name = user_info - > workstation_name ;
2015-09-24 20:45:04 +02:00
DEBUG ( 5 , ( " looking up %s@%s logging in from %s \n " ,
2009-06-25 19:16:02 +02:00
params . account_name , params . domain_name ,
2015-09-24 20:45:04 +02:00
params . workstation_name ) ) ;
2009-06-25 19:16:02 +02:00
memcpy ( params . password . response . challenge ,
ctx - > auth_ctx - > challenge . data . data ,
sizeof ( params . password . response . challenge ) ) ;
params . password . response . lm_length =
user_info - > password . response . lanman . length ;
params . password . response . nt_length =
user_info - > password . response . nt . length ;
params . password . response . lm_data =
user_info - > password . response . lanman . data ;
params . password . response . nt_data =
user_info - > password . response . nt . data ;
wbc_status = wbcAuthenticateUserEx ( & params , & info , & err ) ;
2010-09-03 16:15:27 +02:00
if ( wbc_status = = WBC_ERR_AUTH_ERROR ) {
2015-09-24 20:45:04 +02:00
if ( err ) {
DEBUG ( 1 , ( " error was %s (0x%08x) \n error message was '%s' \n " ,
err - > nt_string , err - > nt_status , err - > display_string ) ) ;
2016-06-22 15:53:59 +02:00
nt_status = NT_STATUS ( err - > nt_status ) ;
wbcFreeMemory ( err ) ;
} else {
nt_status = NT_STATUS_LOGON_FAILURE ;
2015-09-24 20:45:04 +02:00
}
2009-06-25 19:16:02 +02:00
NT_STATUS_NOT_OK_RETURN ( nt_status ) ;
2010-09-03 16:15:27 +02:00
} else if ( ! WBC_ERROR_IS_OK ( wbc_status ) ) {
DEBUG ( 1 , ( " wbcAuthenticateUserEx: failed with %u - %s \n " ,
wbc_status , wbcErrorString ( wbc_status ) ) ) ;
2015-09-24 20:45:04 +02:00
if ( err ) {
DEBUG ( 1 , ( " error was %s (0x%08x) \n error message was '%s' \n " ,
err - > nt_string , err - > nt_status , err - > display_string ) ) ;
}
2010-09-03 16:15:27 +02:00
return NT_STATUS_LOGON_FAILURE ;
2009-06-25 19:16:02 +02:00
}
2016-01-07 15:10:26 +01:00
info6 = wbcAuthUserInfo_to_netr_SamInfo6 ( mem_ctx , info ) ;
2009-06-25 19:16:02 +02:00
wbcFreeMemory ( info ) ;
2016-01-07 15:10:26 +01:00
if ( ! info6 ) {
DEBUG ( 1 , ( " wbcAuthUserInfo_to_netr_SamInfo6 failed \n " ) ) ;
2014-03-28 10:56:02 +13:00
return NT_STATUS_NO_MEMORY ;
}
2009-06-25 19:16:02 +02:00
2016-01-07 15:10:26 +01:00
validation . sam6 = info6 ;
2011-02-08 16:53:13 +11:00
nt_status = make_user_info_dc_netlogon_validation ( mem_ctx ,
2011-07-18 13:55:20 +10:00
user_info - > client . account_name ,
2016-01-07 15:10:26 +01:00
6 , & validation ,
2011-07-18 13:55:20 +10:00
true , /* This user was authenticated */
user_info_dc ) ;
2009-06-25 19:16:02 +02:00
return nt_status ;
}
2005-01-09 12:55:25 +00:00
static const struct auth_operations winbind_ops = {
. name = " winbind " ,
2006-07-27 11:24:18 +00:00
. want_check = winbind_want_check ,
2005-01-09 12:55:25 +00:00
. check_password = winbind_check_password
} ;
2004-10-24 23:54:00 +00:00
2017-03-23 11:57:49 +01:00
static const struct auth_operations winbind_rodc_ops = {
. name = " winbind_rodc " ,
. want_check = winbind_rodc_want_check ,
. check_password = winbind_check_password
} ;
2009-06-25 19:16:02 +02:00
static const struct auth_operations winbind_wbclient_ops = {
. name = " winbind_wbclient " ,
. want_check = winbind_want_check ,
. check_password = winbind_check_password_wbclient
} ;
2017-04-20 12:24:43 -07:00
_PUBLIC_ NTSTATUS auth4_winbind_init ( TALLOC_CTX * ctx )
2004-10-24 23:54:00 +00:00
{
NTSTATUS ret ;
2017-05-09 12:39:14 -07:00
ret = auth_register ( ctx , & winbind_ops ) ;
2004-10-24 23:54:00 +00:00
if ( ! NT_STATUS_IS_OK ( ret ) ) {
2005-01-09 12:55:25 +00:00
DEBUG ( 0 , ( " Failed to register 'winbind' auth backend! \n " ) ) ;
return ret ;
2004-10-24 23:54:00 +00:00
}
2006-07-31 15:42:27 +00:00
2017-05-09 12:39:14 -07:00
ret = auth_register ( ctx , & winbind_rodc_ops ) ;
2017-03-23 11:57:49 +01:00
if ( ! NT_STATUS_IS_OK ( ret ) ) {
DEBUG ( 0 , ( " Failed to register 'winbind_rodc' auth backend! \n " ) ) ;
return ret ;
}
2017-05-09 12:39:14 -07:00
ret = auth_register ( ctx , & winbind_wbclient_ops ) ;
2009-06-25 19:16:02 +02:00
if ( ! NT_STATUS_IS_OK ( ret ) ) {
DEBUG ( 0 , ( " Failed to register 'winbind_wbclient' auth backend! \n " ) ) ;
return ret ;
}
2006-07-31 15:42:27 +00:00
return NT_STATUS_OK ;
2004-10-24 23:54:00 +00:00
}