2009-12-23 23:17:16 +03:00
/*
2005-06-29 17:55:09 +04:00
Unix SMB / CIFS implementation .
PAC Glue between Samba and the KDC
2009-12-23 23:17:16 +03:00
2009-05-26 06:31:39 +04:00
Copyright ( C ) Andrew Bartlett < abartlet @ samba . org > 2005 - 2009
2010-01-26 19:06:00 +03:00
Copyright ( C ) Simo Sorce < idra @ samba . org > 2010
2005-06-29 17:55:09 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-10 06:07:03 +04:00
the Free Software Foundation ; either version 3 of the License , or
2005-06-29 17:55:09 +04:00
( at your option ) any later version .
2009-12-23 23:17:16 +03:00
2005-06-29 17:55:09 +04:00
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
2009-12-23 23:17:16 +03:00
2005-06-29 17:55:09 +04:00
You should have received a copy of the GNU General Public License
2007-07-10 06:07:03 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2005-06-29 17:55:09 +04:00
*/
2022-03-07 09:45:03 +03:00
# include "lib/replace/replace.h"
# include "lib/replace/system/kerberos.h"
2023-01-18 13:49:00 +03:00
# include "lib/replace/system/filesys.h"
2022-03-07 09:45:03 +03:00
# include "lib/util/debug.h"
# include "lib/util/samba_util.h"
# include "lib/util/talloc_stack.h"
2007-12-10 06:33:29 +03:00
# include "auth/auth_sam_reply.h"
2014-05-08 17:49:17 +04:00
# include "auth/kerberos/kerberos.h"
2012-04-01 06:09:22 +04:00
# include "auth/kerberos/pac_utils.h"
2023-06-16 02:20:04 +03:00
# include "auth/authn_policy.h"
2022-03-07 09:45:03 +03:00
# include "libcli/security/security.h"
# include "libds/common/flags.h"
# include "librpc/gen_ndr/ndr_krb5pac.h"
# include "param/param.h"
# include "source4/auth/auth.h"
2021-10-01 06:14:37 +03:00
# include "source4/dsdb/common/util.h"
2022-03-07 09:45:03 +03:00
# include "source4/dsdb/samdb/samdb.h"
2023-06-16 02:20:04 +03:00
# include "source4/kdc/authn_policy_util.h"
2022-03-07 09:45:03 +03:00
# include "source4/kdc/samba_kdc.h"
# include "source4/kdc/pac-glue.h"
2023-03-20 06:58:47 +03:00
# include "source4/kdc/ad_claims.h"
2023-05-09 02:57:09 +03:00
# include "source4/kdc/pac-blobs.h"
2022-03-07 09:45:03 +03:00
# include <ldb.h>
2005-11-07 05:29:37 +03:00
2022-03-23 19:25:09 +03:00
# undef DBGC_CLASS
# define DBGC_CLASS DBGC_KERBEROS
2010-02-14 02:30:36 +03:00
static
2010-01-26 19:43:54 +03:00
NTSTATUS samba_get_logon_info_pac_blob ( TALLOC_CTX * mem_ctx ,
2016-05-13 15:20:07 +03:00
const struct auth_user_info_dc * info ,
2022-12-02 00:49:20 +03:00
const struct PAC_DOMAIN_GROUP_MEMBERSHIP * override_resource_groups ,
const enum auth_group_inclusion group_inclusion ,
2023-03-20 05:16:21 +03:00
DATA_BLOB * pac_data )
2007-01-10 04:51:35 +03:00
{
2022-12-02 00:49:20 +03:00
struct netr_SamInfo3 * info3 = NULL ;
struct PAC_DOMAIN_GROUP_MEMBERSHIP * _resource_groups = NULL ;
struct PAC_DOMAIN_GROUP_MEMBERSHIP * * resource_groups = NULL ;
2023-09-07 07:35:39 +03:00
union PAC_INFO pac_info = { } ;
2007-11-09 21:24:51 +03:00
enum ndr_err_code ndr_err ;
2010-01-26 19:06:00 +03:00
NTSTATUS nt_status ;
2005-11-07 05:29:37 +03:00
2016-05-13 00:20:39 +03:00
* pac_data = data_blob_null ;
2022-12-02 00:49:20 +03:00
if ( override_resource_groups = = NULL ) {
resource_groups = & _resource_groups ;
} else if ( group_inclusion ! = AUTH_EXCLUDE_RESOURCE_GROUPS ) {
/*
* It doesn ' t make sense to override resource groups if we claim
* to want resource groups from user_info_dc .
*/
DBG_ERR ( " supplied resource groups with invalid group inclusion parameter: %u \n " ,
group_inclusion ) ;
return NT_STATUS_INVALID_PARAMETER ;
}
2022-09-27 04:51:54 +03:00
nt_status = auth_convert_user_info_dc_saminfo3 ( mem_ctx , info ,
group_inclusion ,
2022-12-02 00:49:20 +03:00
& info3 ,
resource_groups ) ;
2007-01-10 04:51:35 +03:00
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
2023-07-21 02:44:05 +03:00
DBG_WARNING ( " Getting Samba info failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2010-01-26 19:06:00 +03:00
return nt_status ;
2007-01-10 04:51:35 +03:00
}
2010-01-26 19:06:00 +03:00
pac_info . logon_info . info = talloc_zero ( mem_ctx , struct PAC_LOGON_INFO ) ;
2011-10-11 01:48:02 +04:00
if ( ! pac_info . logon_info . info ) {
2010-01-26 19:06:00 +03:00
return NT_STATUS_NO_MEMORY ;
2005-06-29 17:55:09 +04:00
}
2010-01-26 19:06:00 +03:00
pac_info . logon_info . info - > info3 = * info3 ;
2022-12-02 00:49:20 +03:00
if ( _resource_groups ! = NULL ) {
pac_info . logon_info . info - > resource_groups = * _resource_groups ;
}
if ( override_resource_groups ! = NULL ) {
pac_info . logon_info . info - > resource_groups = * override_resource_groups ;
}
if ( group_inclusion ! = AUTH_EXCLUDE_RESOURCE_GROUPS ) {
/*
* Set the resource groups flag based on whether any groups are
* present . Otherwise , the flag is propagated from the
* originating PAC .
*/
if ( pac_info . logon_info . info - > resource_groups . groups . count > 0 ) {
pac_info . logon_info . info - > info3 . base . user_flags | = NETLOGON_RESOURCE_GROUPS ;
} else {
pac_info . logon_info . info - > info3 . base . user_flags & = ~ NETLOGON_RESOURCE_GROUPS ;
}
}
2007-01-10 04:51:35 +03:00
2010-05-09 19:20:01 +04:00
ndr_err = ndr_push_union_blob ( pac_data , mem_ctx , & pac_info ,
2008-08-19 15:23:09 +04:00
PAC_TYPE_LOGON_INFO ,
( ndr_push_flags_fn_t ) ndr_push_PAC_INFO ) ;
2007-11-09 21:24:51 +03:00
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
nt_status = ndr_map_error2ntstatus ( ndr_err ) ;
2023-07-21 02:44:05 +03:00
DBG_WARNING ( " PAC_LOGON_INFO (presig) push failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2010-01-26 19:06:00 +03:00
return nt_status ;
}
2023-03-20 05:16:21 +03:00
return NT_STATUS_OK ;
}
2016-05-13 01:13:33 +03:00
static
NTSTATUS samba_get_upn_info_pac_blob ( TALLOC_CTX * mem_ctx ,
const struct auth_user_info_dc * info ,
DATA_BLOB * upn_data )
{
2023-09-07 07:35:39 +03:00
union PAC_INFO pac_upn = { } ;
2016-05-13 01:13:33 +03:00
enum ndr_err_code ndr_err ;
NTSTATUS nt_status ;
2021-12-10 04:59:22 +03:00
bool ok ;
2016-05-13 01:13:33 +03:00
* upn_data = data_blob_null ;
pac_upn . upn_dns_info . upn_name = info - > info - > user_principal_name ;
pac_upn . upn_dns_info . dns_domain_name = strupper_talloc ( mem_ctx ,
info - > info - > dns_domain_name ) ;
if ( pac_upn . upn_dns_info . dns_domain_name = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
if ( info - > info - > user_principal_constructed ) {
pac_upn . upn_dns_info . flags | = PAC_UPN_DNS_FLAG_CONSTRUCTED ;
}
2021-09-27 02:10:02 +03:00
pac_upn . upn_dns_info . flags | = PAC_UPN_DNS_FLAG_HAS_SAM_NAME_AND_SID ;
pac_upn . upn_dns_info . ex . sam_name_and_sid . samaccountname
= info - > info - > account_name ;
pac_upn . upn_dns_info . ex . sam_name_and_sid . objectsid
2022-12-16 02:08:41 +03:00
= & info - > sids [ PRIMARY_USER_SID_INDEX ] . sid ;
2021-09-27 02:10:02 +03:00
2016-05-13 01:13:33 +03:00
ndr_err = ndr_push_union_blob ( upn_data , mem_ctx , & pac_upn ,
PAC_TYPE_UPN_DNS_INFO ,
( ndr_push_flags_fn_t ) ndr_push_PAC_INFO ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
nt_status = ndr_map_error2ntstatus ( ndr_err ) ;
2023-07-21 02:44:05 +03:00
DBG_WARNING ( " PAC UPN_DNS_INFO (presig) push failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2016-05-13 01:13:33 +03:00
return nt_status ;
}
2021-12-10 04:59:22 +03:00
ok = data_blob_pad ( mem_ctx , upn_data , 8 ) ;
if ( ! ok ) {
return NT_STATUS_NO_MEMORY ;
}
2016-05-13 01:13:33 +03:00
return NT_STATUS_OK ;
}
2021-10-26 10:41:31 +03:00
static
NTSTATUS samba_get_pac_attrs_blob ( TALLOC_CTX * mem_ctx ,
2021-12-22 07:08:43 +03:00
uint64_t pac_attributes ,
2021-10-26 10:41:31 +03:00
DATA_BLOB * pac_attrs_data )
{
2023-09-07 07:35:39 +03:00
union PAC_INFO pac_attrs = { } ;
2021-10-26 10:41:31 +03:00
enum ndr_err_code ndr_err ;
NTSTATUS nt_status ;
* pac_attrs_data = data_blob_null ;
/* Set the length of the flags in bits. */
pac_attrs . attributes_info . flags_length = 2 ;
2021-12-22 07:08:43 +03:00
pac_attrs . attributes_info . flags = pac_attributes ;
2021-10-26 10:41:31 +03:00
ndr_err = ndr_push_union_blob ( pac_attrs_data , mem_ctx , & pac_attrs ,
PAC_TYPE_ATTRIBUTES_INFO ,
( ndr_push_flags_fn_t ) ndr_push_PAC_INFO ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
nt_status = ndr_map_error2ntstatus ( ndr_err ) ;
2023-07-21 02:44:05 +03:00
DBG_WARNING ( " PAC ATTRIBUTES_INFO (presig) push failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2021-10-26 10:41:31 +03:00
return nt_status ;
}
return NT_STATUS_OK ;
}
2016-05-13 00:20:39 +03:00
static
NTSTATUS samba_get_cred_info_ndr_blob ( TALLOC_CTX * mem_ctx ,
const struct ldb_message * msg ,
DATA_BLOB * cred_blob )
{
enum ndr_err_code ndr_err ;
NTSTATUS nt_status ;
struct samr_Password * lm_hash = NULL ;
struct samr_Password * nt_hash = NULL ;
struct PAC_CREDENTIAL_NTLM_SECPKG ntlm_secpkg = {
. version = 0 ,
} ;
DATA_BLOB ntlm_blob = data_blob_null ;
struct PAC_CREDENTIAL_SUPPLEMENTAL_SECPKG secpkgs [ 1 ] = { {
. credential_size = 0 ,
} } ;
struct PAC_CREDENTIAL_DATA cred_data = {
. credential_count = 0 ,
} ;
2023-09-07 07:35:39 +03:00
struct PAC_CREDENTIAL_DATA_NDR cred_ndr = { } ;
2016-05-13 00:20:39 +03:00
* cred_blob = data_blob_null ;
lm_hash = samdb_result_hash ( mem_ctx , msg , " dBCSPwd " ) ;
if ( lm_hash ! = NULL ) {
2016-12-31 15:45:51 +03:00
bool zero = all_zero ( lm_hash - > hash , 16 ) ;
if ( zero ) {
2016-05-13 00:20:39 +03:00
lm_hash = NULL ;
}
}
if ( lm_hash ! = NULL ) {
2023-07-21 02:44:05 +03:00
DBG_INFO ( " Passing LM password hash through credentials set \n " ) ;
2016-05-13 00:20:39 +03:00
ntlm_secpkg . flags | = PAC_CREDENTIAL_NTLM_HAS_LM_HASH ;
ntlm_secpkg . lm_password = * lm_hash ;
ZERO_STRUCTP ( lm_hash ) ;
TALLOC_FREE ( lm_hash ) ;
}
nt_hash = samdb_result_hash ( mem_ctx , msg , " unicodePwd " ) ;
if ( nt_hash ! = NULL ) {
2016-12-31 15:45:51 +03:00
bool zero = all_zero ( nt_hash - > hash , 16 ) ;
if ( zero ) {
2016-05-13 00:20:39 +03:00
nt_hash = NULL ;
}
}
if ( nt_hash ! = NULL ) {
2023-07-21 02:44:05 +03:00
DBG_INFO ( " Passing NT password hash through credentials set \n " ) ;
2016-05-13 00:20:39 +03:00
ntlm_secpkg . flags | = PAC_CREDENTIAL_NTLM_HAS_NT_HASH ;
ntlm_secpkg . nt_password = * nt_hash ;
ZERO_STRUCTP ( nt_hash ) ;
TALLOC_FREE ( nt_hash ) ;
}
if ( ntlm_secpkg . flags = = 0 ) {
return NT_STATUS_OK ;
}
# ifdef DEBUG_PASSWORD
if ( DEBUGLVL ( 11 ) ) {
NDR_PRINT_DEBUG ( PAC_CREDENTIAL_NTLM_SECPKG , & ntlm_secpkg ) ;
}
# endif
ndr_err = ndr_push_struct_blob ( & ntlm_blob , mem_ctx , & ntlm_secpkg ,
( ndr_push_flags_fn_t ) ndr_push_PAC_CREDENTIAL_NTLM_SECPKG ) ;
ZERO_STRUCT ( ntlm_secpkg ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
nt_status = ndr_map_error2ntstatus ( ndr_err ) ;
2023-07-21 02:44:05 +03:00
DBG_WARNING ( " PAC_CREDENTIAL_NTLM_SECPKG (presig) push failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2016-05-13 00:20:39 +03:00
return nt_status ;
}
2023-07-21 02:44:05 +03:00
DBG_DEBUG ( " NTLM credential BLOB (len %zu) for user \n " ,
ntlm_blob . length ) ;
2016-05-13 00:20:39 +03:00
dump_data_pw ( " PAC_CREDENTIAL_NTLM_SECPKG " ,
ntlm_blob . data , ntlm_blob . length ) ;
secpkgs [ 0 ] . package_name . string = discard_const_p ( char , " NTLM " ) ;
secpkgs [ 0 ] . credential_size = ntlm_blob . length ;
secpkgs [ 0 ] . credential = ntlm_blob . data ;
cred_data . credential_count = ARRAY_SIZE ( secpkgs ) ;
cred_data . credentials = secpkgs ;
# ifdef DEBUG_PASSWORD
if ( DEBUGLVL ( 11 ) ) {
NDR_PRINT_DEBUG ( PAC_CREDENTIAL_DATA , & cred_data ) ;
}
# endif
cred_ndr . ctr . data = & cred_data ;
# ifdef DEBUG_PASSWORD
if ( DEBUGLVL ( 11 ) ) {
NDR_PRINT_DEBUG ( PAC_CREDENTIAL_DATA_NDR , & cred_ndr ) ;
}
# endif
ndr_err = ndr_push_struct_blob ( cred_blob , mem_ctx , & cred_ndr ,
( ndr_push_flags_fn_t ) ndr_push_PAC_CREDENTIAL_DATA_NDR ) ;
data_blob_clear ( & ntlm_blob ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
nt_status = ndr_map_error2ntstatus ( ndr_err ) ;
2023-07-21 02:44:05 +03:00
DBG_WARNING ( " PAC_CREDENTIAL_DATA_NDR (presig) push failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2016-05-13 00:20:39 +03:00
return nt_status ;
}
2023-07-21 02:44:05 +03:00
DBG_DEBUG ( " Created credential BLOB (len %zu) for user \n " ,
cred_blob - > length ) ;
2016-05-13 00:20:39 +03:00
dump_data_pw ( " PAC_CREDENTIAL_DATA_NDR " ,
cred_blob - > data , cred_blob - > length ) ;
return NT_STATUS_OK ;
}
krb5_error_code samba_kdc_encrypt_pac_credentials ( krb5_context context ,
const krb5_keyblock * pkreplykey ,
const DATA_BLOB * cred_ndr_blob ,
TALLOC_CTX * mem_ctx ,
DATA_BLOB * cred_info_blob )
{
2023-08-18 06:00:04 +03:00
# ifdef SAMBA4_USES_HEIMDAL
2016-05-13 00:20:39 +03:00
krb5_crypto cred_crypto ;
krb5_enctype cred_enctype ;
krb5_data cred_ndr_crypt ;
struct PAC_CREDENTIAL_INFO pac_cred_info = { . version = 0 , } ;
krb5_error_code ret ;
const char * krb5err ;
enum ndr_err_code ndr_err ;
NTSTATUS nt_status ;
* cred_info_blob = data_blob_null ;
ret = krb5_crypto_init ( context , pkreplykey , ETYPE_NULL ,
& cred_crypto ) ;
if ( ret ! = 0 ) {
krb5err = krb5_get_error_message ( context , ret ) ;
2023-07-21 02:44:05 +03:00
DBG_WARNING ( " Failed initializing cred data crypto: %s \n " , krb5err ) ;
2016-05-13 00:20:39 +03:00
krb5_free_error_message ( context , krb5err ) ;
return ret ;
}
ret = krb5_crypto_getenctype ( context , cred_crypto , & cred_enctype ) ;
if ( ret ! = 0 ) {
2023-07-21 02:44:05 +03:00
DBG_WARNING ( " Failed getting crypto type for key \n " ) ;
2016-05-13 00:20:39 +03:00
krb5_crypto_destroy ( context , cred_crypto ) ;
return ret ;
}
2023-07-21 02:44:05 +03:00
DBG_DEBUG ( " Plain cred_ndr_blob (len %zu) \n " ,
cred_ndr_blob - > length ) ;
2016-05-13 00:20:39 +03:00
dump_data_pw ( " PAC_CREDENTIAL_DATA_NDR " ,
cred_ndr_blob - > data , cred_ndr_blob - > length ) ;
ret = krb5_encrypt ( context , cred_crypto ,
KRB5_KU_OTHER_ENCRYPTED ,
cred_ndr_blob - > data , cred_ndr_blob - > length ,
& cred_ndr_crypt ) ;
krb5_crypto_destroy ( context , cred_crypto ) ;
if ( ret ! = 0 ) {
krb5err = krb5_get_error_message ( context , ret ) ;
2023-07-21 02:44:05 +03:00
DBG_WARNING ( " Failed crypt of cred data: %s \n " , krb5err ) ;
2016-05-13 00:20:39 +03:00
krb5_free_error_message ( context , krb5err ) ;
return ret ;
}
pac_cred_info . encryption_type = cred_enctype ;
pac_cred_info . encrypted_data . length = cred_ndr_crypt . length ;
pac_cred_info . encrypted_data . data = ( uint8_t * ) cred_ndr_crypt . data ;
if ( DEBUGLVL ( 10 ) ) {
NDR_PRINT_DEBUG ( PAC_CREDENTIAL_INFO , & pac_cred_info ) ;
}
ndr_err = ndr_push_struct_blob ( cred_info_blob , mem_ctx , & pac_cred_info ,
( ndr_push_flags_fn_t ) ndr_push_PAC_CREDENTIAL_INFO ) ;
krb5_data_free ( & cred_ndr_crypt ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
nt_status = ndr_map_error2ntstatus ( ndr_err ) ;
2023-07-21 02:44:05 +03:00
DBG_WARNING ( " PAC_CREDENTIAL_INFO (presig) push failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2016-05-13 00:20:39 +03:00
return KRB5KDC_ERR_SVC_UNAVAILABLE ;
}
2023-07-21 02:44:05 +03:00
DBG_DEBUG ( " Encrypted credential BLOB (len %zu) with alg % " PRId32 " \n " ,
cred_info_blob - > length , pac_cred_info . encryption_type ) ;
2016-05-13 00:20:39 +03:00
dump_data_pw ( " PAC_CREDENTIAL_INFO " ,
cred_info_blob - > data , cred_info_blob - > length ) ;
return 0 ;
2016-08-10 16:57:05 +03:00
# else /* SAMBA4_USES_HEIMDAL */
krb5_key cred_key ;
krb5_enctype cred_enctype ;
struct PAC_CREDENTIAL_INFO pac_cred_info = { . version = 0 , } ;
krb5_error_code code ;
const char * krb5err ;
enum ndr_err_code ndr_err ;
NTSTATUS nt_status ;
krb5_data cred_ndr_data ;
krb5_enc_data cred_ndr_crypt ;
size_t enc_len = 0 ;
* cred_info_blob = data_blob_null ;
code = krb5_k_create_key ( context ,
pkreplykey ,
& cred_key ) ;
if ( code ! = 0 ) {
krb5err = krb5_get_error_message ( context , code ) ;
2023-07-21 02:44:05 +03:00
DBG_WARNING ( " Failed initializing cred data crypto: %s \n " , krb5err ) ;
2016-08-10 16:57:05 +03:00
krb5_free_error_message ( context , krb5err ) ;
return code ;
}
cred_enctype = krb5_k_key_enctype ( context , cred_key ) ;
2023-07-21 02:44:05 +03:00
DBG_DEBUG ( " Plain cred_ndr_blob (len %zu) \n " ,
cred_ndr_blob - > length ) ;
2016-08-10 16:57:05 +03:00
dump_data_pw ( " PAC_CREDENTIAL_DATA_NDR " ,
cred_ndr_blob - > data , cred_ndr_blob - > length ) ;
pac_cred_info . encryption_type = cred_enctype ;
2023-08-18 06:00:20 +03:00
cred_ndr_data = smb_krb5_data_from_blob ( * cred_ndr_blob ) ;
2016-08-10 16:57:05 +03:00
code = krb5_c_encrypt_length ( context ,
cred_enctype ,
cred_ndr_data . length ,
& enc_len ) ;
if ( code ! = 0 ) {
krb5err = krb5_get_error_message ( context , code ) ;
2023-07-21 02:44:05 +03:00
DBG_WARNING ( " Failed initializing cred data crypto: %s \n " , krb5err ) ;
2016-08-10 16:57:05 +03:00
krb5_free_error_message ( context , krb5err ) ;
return code ;
}
pac_cred_info . encrypted_data = data_blob_talloc_zero ( mem_ctx , enc_len ) ;
if ( pac_cred_info . encrypted_data . data = = NULL ) {
DBG_ERR ( " Out of memory \n " ) ;
return ENOMEM ;
}
2023-08-18 06:00:20 +03:00
cred_ndr_crypt . ciphertext = smb_krb5_data_from_blob ( pac_cred_info . encrypted_data ) ;
2016-08-10 16:57:05 +03:00
code = krb5_k_encrypt ( context ,
cred_key ,
KRB5_KU_OTHER_ENCRYPTED ,
NULL ,
& cred_ndr_data ,
& cred_ndr_crypt ) ;
krb5_k_free_key ( context , cred_key ) ;
if ( code ! = 0 ) {
krb5err = krb5_get_error_message ( context , code ) ;
2023-07-21 02:44:05 +03:00
DBG_WARNING ( " Failed crypt of cred data: %s \n " , krb5err ) ;
2016-08-10 16:57:05 +03:00
krb5_free_error_message ( context , krb5err ) ;
return code ;
}
if ( DEBUGLVL ( 10 ) ) {
NDR_PRINT_DEBUG ( PAC_CREDENTIAL_INFO , & pac_cred_info ) ;
}
ndr_err = ndr_push_struct_blob ( cred_info_blob , mem_ctx , & pac_cred_info ,
( ndr_push_flags_fn_t ) ndr_push_PAC_CREDENTIAL_INFO ) ;
TALLOC_FREE ( pac_cred_info . encrypted_data . data ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
nt_status = ndr_map_error2ntstatus ( ndr_err ) ;
2023-07-21 02:44:05 +03:00
DBG_WARNING ( " PAC_CREDENTIAL_INFO (presig) push failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2016-08-10 16:57:05 +03:00
return KRB5KDC_ERR_SVC_UNAVAILABLE ;
}
2023-07-21 02:44:05 +03:00
DBG_DEBUG ( " Encrypted credential BLOB (len %zu) with alg % " PRId32 " \n " ,
cred_info_blob - > length , pac_cred_info . encryption_type ) ;
2016-08-10 16:57:05 +03:00
dump_data_pw ( " PAC_CREDENTIAL_INFO " ,
cred_info_blob - > data , cred_info_blob - > length ) ;
return 0 ;
# endif /* SAMBA4_USES_HEIMDAL */
2023-08-18 06:00:04 +03:00
}
2016-08-10 16:57:05 +03:00
2016-05-13 00:20:39 +03:00
2021-10-07 16:12:35 +03:00
/**
* @ brief Create a PAC with the given blobs ( logon , credentials , upn and
* delegation ) .
*
* @ param [ in ] context The KRB5 context to use .
*
* @ param [ in ] logon_blob Fill the logon info PAC buffer with the given blob ,
* use NULL to ignore it .
*
* @ param [ in ] cred_blob Fill the credentials info PAC buffer with the given
* blob , use NULL to ignore it .
*
* @ param [ in ] upn_blob Fill the UPN info PAC buffer with the given blob , use
* NULL to ignore it .
*
* @ param [ in ] deleg_blob Fill the delegation info PAC buffer with the given
* blob , use NULL to ignore it .
*
2022-02-25 01:57:31 +03:00
* @ param [ in ] client_claims_blob Fill the client claims info PAC buffer with the
* given blob , use NULL to ignore it .
*
* @ param [ in ] device_info_blob Fill the device info PAC buffer with the given
* blob , use NULL to ignore it .
*
* @ param [ in ] device_claims_blob Fill the device claims info PAC buffer with the given
* blob , use NULL to ignore it .
*
2021-10-07 16:12:35 +03:00
* @ param [ in ] pac The pac buffer to fill . This should be allocated with
* krb5_pac_init ( ) already .
*
* @ returns 0 on success or a corresponding KRB5 error .
*/
2010-01-26 19:43:54 +03:00
krb5_error_code samba_make_krb5_pac ( krb5_context context ,
2016-05-13 00:20:39 +03:00
const DATA_BLOB * logon_blob ,
const DATA_BLOB * cred_blob ,
2016-05-13 01:13:33 +03:00
const DATA_BLOB * upn_blob ,
2021-10-26 10:41:31 +03:00
const DATA_BLOB * pac_attrs_blob ,
2021-10-26 10:42:41 +03:00
const DATA_BLOB * requester_sid_blob ,
2016-05-13 00:20:39 +03:00
const DATA_BLOB * deleg_blob ,
2022-02-25 01:57:31 +03:00
const DATA_BLOB * client_claims_blob ,
const DATA_BLOB * device_info_blob ,
const DATA_BLOB * device_claims_blob ,
2021-10-07 16:12:35 +03:00
krb5_pac pac )
2010-01-26 19:06:00 +03:00
{
2016-05-13 00:20:39 +03:00
krb5_data logon_data ;
2010-01-26 19:06:00 +03:00
krb5_error_code ret ;
2022-02-24 05:30:17 +03:00
char null_byte = ' \0 ' ;
2022-09-24 03:25:10 +03:00
krb5_data null_data = smb_krb5_make_data ( & null_byte , 0 ) ;
2016-05-13 00:20:39 +03:00
/* The user account may be set not to want the PAC */
if ( logon_blob = = NULL ) {
2010-04-22 16:29:52 +04:00
return 0 ;
}
2022-09-21 01:26:38 +03:00
logon_data = smb_krb5_data_from_blob ( * logon_blob ) ;
2021-10-07 16:12:35 +03:00
ret = krb5_pac_add_buffer ( context , pac , PAC_TYPE_LOGON_INFO , & logon_data ) ;
2007-01-10 04:51:35 +03:00
if ( ret ! = 0 ) {
2005-11-07 05:29:37 +03:00
return ret ;
}
2022-02-25 01:57:31 +03:00
if ( device_info_blob ! = NULL ) {
krb5_data device_info_data = smb_krb5_data_from_blob ( * device_info_blob ) ;
ret = krb5_pac_add_buffer ( context , pac ,
PAC_TYPE_DEVICE_INFO ,
& device_info_data ) ;
if ( ret ! = 0 ) {
return ret ;
}
}
if ( client_claims_blob ! = NULL ) {
2023-03-17 01:07:11 +03:00
krb5_data client_claims_data ;
krb5_data * data = NULL ;
if ( client_claims_blob - > length ! = 0 ) {
client_claims_data = smb_krb5_data_from_blob ( * client_claims_blob ) ;
data = & client_claims_data ;
} else {
data = & null_data ;
}
2022-02-25 01:57:31 +03:00
ret = krb5_pac_add_buffer ( context , pac ,
PAC_TYPE_CLIENT_CLAIMS_INFO ,
2023-03-17 01:07:11 +03:00
data ) ;
2022-02-25 01:57:31 +03:00
if ( ret ! = 0 ) {
return ret ;
}
}
if ( device_claims_blob ! = NULL ) {
krb5_data device_claims_data = smb_krb5_data_from_blob ( * device_claims_blob ) ;
ret = krb5_pac_add_buffer ( context , pac ,
PAC_TYPE_DEVICE_CLAIMS_INFO ,
& device_claims_data ) ;
if ( ret ! = 0 ) {
return ret ;
}
}
2016-05-13 00:20:39 +03:00
if ( cred_blob ! = NULL ) {
2022-09-21 01:26:38 +03:00
krb5_data cred_data = smb_krb5_data_from_blob ( * cred_blob ) ;
2021-10-07 16:12:35 +03:00
ret = krb5_pac_add_buffer ( context , pac ,
2016-05-13 00:20:39 +03:00
PAC_TYPE_CREDENTIAL_INFO ,
& cred_data ) ;
2016-05-13 01:13:33 +03:00
if ( ret ! = 0 ) {
return ret ;
}
}
2016-09-29 09:38:58 +03:00
# ifdef SAMBA4_USES_HEIMDAL
2016-05-13 01:13:33 +03:00
/*
* null_data will be filled by the generic KDC code in the caller
* here we just add it in order to have it before
* PAC_TYPE_UPN_DNS_INFO
2016-09-29 09:38:58 +03:00
*
* Not needed with MIT Kerberos - asn
2016-05-13 01:13:33 +03:00
*/
2021-10-07 16:12:35 +03:00
ret = krb5_pac_add_buffer ( context , pac ,
2016-05-13 01:13:33 +03:00
PAC_TYPE_LOGON_NAME ,
& null_data ) ;
if ( ret ! = 0 ) {
return ret ;
}
2016-09-29 09:38:58 +03:00
# endif
2016-05-13 01:13:33 +03:00
if ( upn_blob ! = NULL ) {
2022-09-21 01:26:38 +03:00
krb5_data upn_data = smb_krb5_data_from_blob ( * upn_blob ) ;
2021-10-07 16:12:35 +03:00
ret = krb5_pac_add_buffer ( context , pac ,
2016-05-13 01:13:33 +03:00
PAC_TYPE_UPN_DNS_INFO ,
& upn_data ) ;
2021-10-26 10:41:31 +03:00
if ( ret ! = 0 ) {
return ret ;
}
}
if ( pac_attrs_blob ! = NULL ) {
2022-09-21 01:26:38 +03:00
krb5_data pac_attrs_data = smb_krb5_data_from_blob ( * pac_attrs_blob ) ;
2021-10-07 16:12:35 +03:00
ret = krb5_pac_add_buffer ( context , pac ,
2021-10-26 10:41:31 +03:00
PAC_TYPE_ATTRIBUTES_INFO ,
& pac_attrs_data ) ;
2021-10-26 10:42:41 +03:00
if ( ret ! = 0 ) {
return ret ;
}
}
if ( requester_sid_blob ! = NULL ) {
2022-09-21 01:26:38 +03:00
krb5_data requester_sid_data = smb_krb5_data_from_blob ( * requester_sid_blob ) ;
2021-10-07 16:12:35 +03:00
ret = krb5_pac_add_buffer ( context , pac ,
2021-10-26 10:42:41 +03:00
PAC_TYPE_REQUESTER_SID ,
& requester_sid_data ) ;
2016-05-13 00:20:39 +03:00
if ( ret ! = 0 ) {
return ret ;
}
}
if ( deleg_blob ! = NULL ) {
2022-09-21 01:26:38 +03:00
krb5_data deleg_data = smb_krb5_data_from_blob ( * deleg_blob ) ;
2021-10-07 16:12:35 +03:00
ret = krb5_pac_add_buffer ( context , pac ,
2011-06-28 16:46:49 +04:00
PAC_TYPE_CONSTRAINED_DELEGATION ,
& deleg_data ) ;
if ( ret ! = 0 ) {
return ret ;
}
}
2007-01-10 04:51:35 +03:00
return ret ;
2005-11-07 05:29:37 +03:00
}
2023-03-16 22:07:52 +03:00
bool samba_princ_needs_pac ( const struct samba_kdc_entry * skdc_entry )
2005-11-07 05:29:37 +03:00
{
2010-01-26 19:09:32 +03:00
2010-10-05 11:27:36 +04:00
uint32_t userAccountControl ;
2007-01-10 04:51:35 +03:00
2010-01-26 19:09:32 +03:00
/* The service account may be set not to want the PAC */
2014-05-10 01:26:42 +04:00
userAccountControl = ldb_msg_find_attr_as_uint ( skdc_entry - > msg , " userAccountControl " , 0 ) ;
2005-11-07 05:29:37 +03:00
if ( userAccountControl & UF_NO_AUTH_DATA_REQUIRED ) {
2010-01-26 19:09:32 +03:00
return false ;
}
return true ;
}
2023-08-11 01:08:57 +03:00
static krb5_error_code samba_client_requested_pac ( krb5_context context ,
const krb5_const_pac pac ,
TALLOC_CTX * mem_ctx ,
bool * requested_pac )
2021-10-26 10:41:31 +03:00
{
enum ndr_err_code ndr_err ;
krb5_data k5pac_attrs_in ;
DATA_BLOB pac_attrs_in ;
union PAC_INFO pac_attrs ;
2023-08-11 01:08:57 +03:00
krb5_error_code ret ;
2021-10-26 10:41:31 +03:00
* requested_pac = true ;
2023-03-16 22:07:52 +03:00
ret = krb5_pac_get_buffer ( context , pac , PAC_TYPE_ATTRIBUTES_INFO ,
2021-10-26 10:41:31 +03:00
& k5pac_attrs_in ) ;
if ( ret ! = 0 ) {
return ret = = ENOENT ? 0 : ret ;
}
pac_attrs_in = data_blob_const ( k5pac_attrs_in . data ,
k5pac_attrs_in . length ) ;
ndr_err = ndr_pull_union_blob ( & pac_attrs_in , mem_ctx , & pac_attrs ,
PAC_TYPE_ATTRIBUTES_INFO ,
( ndr_pull_flags_fn_t ) ndr_pull_PAC_INFO ) ;
smb_krb5_free_data_contents ( context , & k5pac_attrs_in ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
NTSTATUS nt_status = ndr_map_error2ntstatus ( ndr_err ) ;
2023-07-21 02:44:05 +03:00
DBG_ERR ( " can't parse the PAC ATTRIBUTES_INFO: %s \n " , nt_errstr ( nt_status ) ) ;
2023-08-11 01:02:28 +03:00
return map_errno_from_nt_status ( nt_status ) ;
2021-10-26 10:41:31 +03:00
}
if ( pac_attrs . attributes_info . flags & ( PAC_ATTRIBUTE_FLAG_PAC_WAS_GIVEN_IMPLICITLY
| PAC_ATTRIBUTE_FLAG_PAC_WAS_REQUESTED ) ) {
* requested_pac = true ;
} else {
* requested_pac = false ;
}
return 0 ;
}
2012-01-11 11:06:55 +04:00
/* Was the krbtgt in this DB (ie, should we check the incoming signature) and was it an RODC */
2014-05-10 02:49:44 +04:00
int samba_krbtgt_is_in_db ( struct samba_kdc_entry * p ,
bool * is_in_db ,
2023-03-16 04:29:15 +03:00
bool * is_trusted )
2010-09-28 06:53:06 +04:00
{
2012-01-11 11:06:55 +04:00
NTSTATUS status ;
2023-08-25 02:17:24 +03:00
krb5_error_code ret ;
2012-01-11 11:06:55 +04:00
int rodc_krbtgt_number , trust_direction ;
2023-08-25 02:17:24 +03:00
struct dom_sid sid ;
2012-01-11 11:06:55 +04:00
uint32_t rid ;
trust_direction = ldb_msg_find_attr_as_int ( p - > msg , " trustDirection " , 0 ) ;
if ( trust_direction ! = 0 ) {
/* Domain trust - we cannot check the sig, but we trust it for a correct PAC
2021-08-06 13:03:49 +03:00
2012-01-11 11:06:55 +04:00
This is exactly where we should flag for SID
2023-07-11 07:52:25 +03:00
validation when we do inter - forest trusts
2012-01-11 11:06:55 +04:00
*/
2023-03-16 04:29:15 +03:00
* is_trusted = true ;
2012-01-11 11:06:55 +04:00
* is_in_db = false ;
return 0 ;
}
/* The lack of password controls etc applies to krbtgt by
* virtue of being that particular RID */
2023-08-25 02:17:24 +03:00
ret = samdb_result_dom_sid_buf ( p - > msg , " objectSid " , & sid ) ;
if ( ret ) {
return ret ;
}
2012-01-11 11:06:55 +04:00
2023-08-25 02:17:24 +03:00
status = dom_sid_split_rid ( NULL , & sid , NULL , & rid ) ;
2012-01-11 11:06:55 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2023-08-11 01:02:28 +03:00
return map_errno_from_nt_status ( status ) ;
2012-01-11 11:06:55 +04:00
}
2010-09-28 06:53:06 +04:00
rodc_krbtgt_number = ldb_msg_find_attr_as_int ( p - > msg , " msDS-SecondaryKrbTgtNumber " , - 1 ) ;
2012-01-11 11:06:55 +04:00
if ( p - > kdc_db_ctx - > my_krbtgt_number = = 0 ) {
if ( rid = = DOMAIN_RID_KRBTGT ) {
2023-03-16 04:29:15 +03:00
* is_trusted = true ;
2012-01-11 11:06:55 +04:00
* is_in_db = true ;
return 0 ;
} else if ( rodc_krbtgt_number ! = - 1 ) {
* is_in_db = true ;
2023-03-16 04:29:15 +03:00
* is_trusted = false ;
2012-01-11 11:06:55 +04:00
return 0 ;
}
} else if ( ( rid ! = DOMAIN_RID_KRBTGT ) & & ( rodc_krbtgt_number = = p - > kdc_db_ctx - > my_krbtgt_number ) ) {
2023-03-16 04:29:15 +03:00
* is_trusted = true ;
2012-01-11 11:06:55 +04:00
* is_in_db = true ;
return 0 ;
} else if ( rid = = DOMAIN_RID_KRBTGT ) {
/* krbtgt viewed from an RODC */
2023-03-16 04:29:15 +03:00
* is_trusted = true ;
2012-01-11 11:06:55 +04:00
* is_in_db = false ;
return 0 ;
2010-09-28 06:53:06 +04:00
}
2012-01-11 11:06:55 +04:00
/* Another RODC */
2023-03-16 04:29:15 +03:00
* is_trusted = false ;
2012-01-11 11:06:55 +04:00
* is_in_db = false ;
return 0 ;
2010-09-28 06:53:06 +04:00
}
2021-10-11 15:47:25 +03:00
/*
* Because the KDC does not limit protocol transition , two new well - known SIDs
* were introduced to give this control to the resource administrator . These
* SIDs identify whether protocol transition has occurred , and can be used with
* standard access control lists to grant or limit access as needed .
*
* https : //docs.microsoft.com/en-us/windows-server/security/kerberos/kerberos-constrained-delegation-overview
*/
2023-08-21 04:55:27 +03:00
NTSTATUS samba_kdc_add_asserted_identity ( enum samba_asserted_identity ai ,
struct auth_user_info_dc * user_info_dc )
2021-10-11 15:47:25 +03:00
{
struct dom_sid ai_sid ;
const char * sid_str = NULL ;
switch ( ai ) {
case SAMBA_ASSERTED_IDENTITY_SERVICE :
sid_str = SID_SERVICE_ASSERTED_IDENTITY ;
break ;
case SAMBA_ASSERTED_IDENTITY_AUTHENTICATION_AUTHORITY :
sid_str = SID_AUTHENTICATION_AUTHORITY_ASSERTED_IDENTITY ;
break ;
case SAMBA_ASSERTED_IDENTITY_IGNORE :
return NT_STATUS_OK ;
2023-08-21 04:51:27 +03:00
default :
return NT_STATUS_INVALID_PARAMETER ;
2021-10-11 15:47:25 +03:00
}
2023-08-21 04:49:38 +03:00
if ( ! dom_sid_parse ( sid_str , & ai_sid ) ) {
return NT_STATUS_UNSUCCESSFUL ;
}
2021-10-11 15:47:25 +03:00
2022-09-27 05:13:12 +03:00
return add_sid_to_array_attrs_unique (
2023-05-23 00:21:17 +03:00
user_info_dc ,
2022-09-27 05:13:12 +03:00
& ai_sid ,
2022-12-15 01:58:11 +03:00
SE_GROUP_DEFAULT_FLAGS ,
2023-05-23 00:21:17 +03:00
& user_info_dc - > sids ,
& user_info_dc - > num_sids ) ;
2021-10-11 15:47:25 +03:00
}
2023-08-21 04:55:27 +03:00
NTSTATUS samba_kdc_add_claims_valid ( enum samba_claims_valid claims_valid ,
struct auth_user_info_dc * user_info_dc )
2023-03-20 06:58:47 +03:00
{
switch ( claims_valid ) {
case SAMBA_CLAIMS_VALID_EXCLUDE :
return NT_STATUS_OK ;
case SAMBA_CLAIMS_VALID_INCLUDE :
{
struct dom_sid claims_valid_sid ;
if ( ! dom_sid_parse ( SID_CLAIMS_VALID , & claims_valid_sid ) ) {
return NT_STATUS_UNSUCCESSFUL ;
}
return add_sid_to_array_attrs_unique (
2023-05-23 00:21:17 +03:00
user_info_dc ,
2023-03-20 06:58:47 +03:00
& claims_valid_sid ,
SE_GROUP_DEFAULT_FLAGS ,
& user_info_dc - > sids ,
& user_info_dc - > num_sids ) ;
}
}
return NT_STATUS_INVALID_PARAMETER ;
}
2023-08-21 04:55:27 +03:00
NTSTATUS samba_kdc_add_compounded_auth ( enum samba_compounded_auth compounded_auth ,
struct auth_user_info_dc * user_info_dc )
2023-03-20 06:58:47 +03:00
{
switch ( compounded_auth ) {
case SAMBA_COMPOUNDED_AUTH_EXCLUDE :
return NT_STATUS_OK ;
case SAMBA_COMPOUNDED_AUTH_INCLUDE :
{
struct dom_sid compounded_auth_sid ;
if ( ! dom_sid_parse ( SID_COMPOUNDED_AUTHENTICATION , & compounded_auth_sid ) ) {
return NT_STATUS_UNSUCCESSFUL ;
}
return add_sid_to_array_attrs_unique (
2023-05-23 00:21:17 +03:00
user_info_dc ,
2023-03-20 06:58:47 +03:00
& compounded_auth_sid ,
SE_GROUP_DEFAULT_FLAGS ,
& user_info_dc - > sids ,
& user_info_dc - > num_sids ) ;
}
}
return NT_STATUS_INVALID_PARAMETER ;
}
2021-10-01 06:14:37 +03:00
/*
2022-03-18 01:13:40 +03:00
* Look up the user ' s info in the database and create a auth_user_info_dc
* structure . If the resulting structure is not talloc_free ( ) d , it will be
* reused on future calls to this function .
2021-10-01 06:14:37 +03:00
*/
2023-04-04 03:54:08 +03:00
NTSTATUS samba_kdc_get_user_info_from_db ( struct samba_kdc_entry * skdc_entry ,
2022-11-07 04:14:18 +03:00
const struct ldb_message * msg ,
2023-03-20 05:02:53 +03:00
const struct auth_user_info_dc * * user_info_dc )
2022-03-18 01:13:40 +03:00
{
if ( skdc_entry - > user_info_dc = = NULL ) {
NTSTATUS nt_status ;
struct loadparm_context * lp_ctx = skdc_entry - > kdc_db_ctx - > lp_ctx ;
nt_status = authsam_make_user_info_dc ( skdc_entry ,
skdc_entry - > kdc_db_ctx - > samdb ,
lpcfg_netbios_name ( lp_ctx ) ,
lpcfg_sam_name ( lp_ctx ) ,
lpcfg_sam_dnsname ( lp_ctx ) ,
skdc_entry - > realm_dn ,
msg ,
data_blob_null ,
data_blob_null ,
& skdc_entry - > user_info_dc ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
return nt_status ;
}
}
* user_info_dc = skdc_entry - > user_info_dc ;
return NT_STATUS_OK ;
}
2023-03-20 05:16:21 +03:00
NTSTATUS samba_kdc_get_logon_info_blob ( TALLOC_CTX * mem_ctx ,
const struct auth_user_info_dc * user_info_dc ,
const enum auth_group_inclusion group_inclusion ,
DATA_BLOB * * _logon_info_blob )
2010-01-26 19:09:32 +03:00
{
2016-05-13 00:20:39 +03:00
DATA_BLOB * logon_blob = NULL ;
2010-01-26 19:09:32 +03:00
NTSTATUS nt_status ;
2016-05-13 00:20:39 +03:00
* _logon_info_blob = NULL ;
logon_blob = talloc_zero ( mem_ctx , DATA_BLOB ) ;
if ( logon_blob = = NULL ) {
2010-01-26 19:09:32 +03:00
return NT_STATUS_NO_MEMORY ;
2005-11-07 05:29:37 +03:00
}
2023-03-20 05:16:21 +03:00
nt_status = samba_get_logon_info_pac_blob ( logon_blob ,
user_info_dc ,
NULL ,
group_inclusion ,
logon_blob ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " Building PAC LOGON INFO failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
return nt_status ;
}
* _logon_info_blob = logon_blob ;
return NT_STATUS_OK ;
}
NTSTATUS samba_kdc_get_cred_ndr_blob ( TALLOC_CTX * mem_ctx ,
const struct samba_kdc_entry * p ,
DATA_BLOB * * _cred_ndr_blob )
{
DATA_BLOB * cred_blob = NULL ;
NTSTATUS nt_status ;
SMB_ASSERT ( _cred_ndr_blob ! = NULL ) ;
* _cred_ndr_blob = NULL ;
cred_blob = talloc_zero ( mem_ctx , DATA_BLOB ) ;
if ( cred_blob = = NULL ) {
return NT_STATUS_NO_MEMORY ;
2016-05-13 00:20:39 +03:00
}
2023-03-20 05:16:21 +03:00
nt_status = samba_get_cred_info_ndr_blob ( cred_blob ,
p - > msg ,
cred_blob ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " Building PAC CRED INFO failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
return nt_status ;
}
* _cred_ndr_blob = cred_blob ;
return NT_STATUS_OK ;
}
NTSTATUS samba_kdc_get_upn_info_blob ( TALLOC_CTX * mem_ctx ,
const struct auth_user_info_dc * user_info_dc ,
DATA_BLOB * * _upn_info_blob )
{
DATA_BLOB * upn_blob = NULL ;
NTSTATUS nt_status ;
* _upn_info_blob = NULL ;
2016-05-13 01:13:33 +03:00
upn_blob = talloc_zero ( mem_ctx , DATA_BLOB ) ;
if ( upn_blob = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
2023-03-20 05:16:21 +03:00
nt_status = samba_get_upn_info_pac_blob ( upn_blob ,
user_info_dc ,
upn_blob ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
2023-07-21 02:44:05 +03:00
DBG_ERR ( " Building PAC UPN INFO failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2023-03-20 05:16:21 +03:00
return nt_status ;
2021-10-26 10:41:31 +03:00
}
2023-03-20 05:16:21 +03:00
* _upn_info_blob = upn_blob ;
return NT_STATUS_OK ;
}
NTSTATUS samba_kdc_get_pac_attrs_blob ( TALLOC_CTX * mem_ctx ,
uint64_t pac_attributes ,
DATA_BLOB * * _pac_attrs_blob )
{
DATA_BLOB * pac_attrs_blob = NULL ;
NTSTATUS nt_status ;
SMB_ASSERT ( _pac_attrs_blob ! = NULL ) ;
* _pac_attrs_blob = NULL ;
pac_attrs_blob = talloc_zero ( mem_ctx , DATA_BLOB ) ;
if ( pac_attrs_blob = = NULL ) {
return NT_STATUS_NO_MEMORY ;
2021-10-26 10:42:41 +03:00
}
2023-03-20 05:16:21 +03:00
nt_status = samba_get_pac_attrs_blob ( pac_attrs_blob ,
pac_attributes ,
pac_attrs_blob ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " Building PAC ATTRIBUTES failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
return nt_status ;
2022-02-25 02:19:06 +03:00
}
2023-03-20 05:16:21 +03:00
* _pac_attrs_blob = pac_attrs_blob ;
return NT_STATUS_OK ;
}
NTSTATUS samba_kdc_get_requester_sid_blob ( TALLOC_CTX * mem_ctx ,
const struct auth_user_info_dc * user_info_dc ,
DATA_BLOB * * _requester_sid_blob )
{
DATA_BLOB * requester_sid_blob = NULL ;
NTSTATUS nt_status ;
SMB_ASSERT ( _requester_sid_blob ! = NULL ) ;
* _requester_sid_blob = NULL ;
requester_sid_blob = talloc_zero ( mem_ctx , DATA_BLOB ) ;
if ( requester_sid_blob = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
2023-08-25 02:35:12 +03:00
if ( user_info_dc - > num_sids > 0 ) {
union PAC_INFO pac_requester_sid = { } ;
enum ndr_err_code ndr_err ;
pac_requester_sid . requester_sid . sid = user_info_dc - > sids [ PRIMARY_USER_SID_INDEX ] . sid ;
2023-08-25 02:41:39 +03:00
ndr_err = ndr_push_union_blob ( requester_sid_blob , requester_sid_blob ,
2023-08-25 02:35:12 +03:00
& pac_requester_sid ,
PAC_TYPE_REQUESTER_SID ,
( ndr_push_flags_fn_t ) ndr_push_PAC_INFO ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
nt_status = ndr_map_error2ntstatus ( ndr_err ) ;
DBG_WARNING ( " PAC_REQUESTER_SID (presig) push failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
DBG_ERR ( " Building PAC REQUESTER SID failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
return nt_status ;
}
2023-03-20 05:16:21 +03:00
}
* _requester_sid_blob = requester_sid_blob ;
return NT_STATUS_OK ;
}
NTSTATUS samba_kdc_get_claims_blob ( TALLOC_CTX * mem_ctx ,
const struct samba_kdc_entry * p ,
2023-06-26 02:10:51 +03:00
const DATA_BLOB * * _claims_blob )
2023-03-20 05:16:21 +03:00
{
DATA_BLOB * claims_blob = NULL ;
2023-03-20 06:58:47 +03:00
NTSTATUS nt_status ;
2023-08-11 01:21:07 +03:00
int ret ;
2023-03-20 05:16:21 +03:00
SMB_ASSERT ( _claims_blob ! = NULL ) ;
* _claims_blob = NULL ;
claims_blob = talloc_zero ( mem_ctx , DATA_BLOB ) ;
if ( claims_blob = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
2023-08-11 03:20:09 +03:00
ret = get_claims_blob_for_principal ( p - > kdc_db_ctx - > samdb ,
2023-08-25 02:41:39 +03:00
claims_blob ,
2023-08-11 03:20:09 +03:00
p - > msg ,
claims_blob ) ;
2023-08-11 01:21:07 +03:00
if ( ret ! = LDB_SUCCESS ) {
nt_status = dsdb_ldb_err_to_ntstatus ( ret ) ;
2023-03-20 06:58:47 +03:00
DBG_ERR ( " Building claims failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
return nt_status ;
}
2023-03-20 05:16:21 +03:00
* _claims_blob = claims_blob ;
return NT_STATUS_OK ;
}
NTSTATUS samba_kdc_get_user_info_dc ( TALLOC_CTX * mem_ctx ,
struct samba_kdc_entry * skdc_entry ,
enum samba_asserted_identity asserted_identity ,
2023-03-20 06:58:47 +03:00
enum samba_claims_valid claims_valid ,
enum samba_compounded_auth compounded_auth ,
2023-05-10 05:54:21 +03:00
struct auth_user_info_dc * * user_info_dc_out )
2023-03-20 05:16:21 +03:00
{
NTSTATUS nt_status ;
2023-05-10 05:54:21 +03:00
const struct auth_user_info_dc * user_info_dc_from_db = NULL ;
struct auth_user_info_dc * user_info_dc = NULL ;
2023-03-20 05:16:21 +03:00
2023-05-10 05:54:21 +03:00
nt_status = samba_kdc_get_user_info_from_db ( skdc_entry , skdc_entry - > msg , & user_info_dc_from_db ) ;
2023-03-20 05:16:21 +03:00
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " Getting user info for PAC failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2010-01-26 19:09:32 +03:00
return nt_status ;
}
2023-03-20 05:02:53 +03:00
/* Make a shallow copy of the user_info_dc structure. */
2023-05-10 05:54:21 +03:00
nt_status = authsam_shallow_copy_user_info_dc ( mem_ctx , user_info_dc_from_db , & user_info_dc ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " Failed to allocate user_info_dc SIDs: %s \n " ,
nt_errstr ( nt_status ) ) ;
return nt_status ;
2023-03-20 05:02:53 +03:00
}
/* Here we modify the SIDs to add the Asserted Identity SID. */
2023-08-21 04:55:27 +03:00
nt_status = samba_kdc_add_asserted_identity ( asserted_identity ,
user_info_dc ) ;
2021-10-11 15:47:25 +03:00
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
2023-05-16 02:00:24 +03:00
DBG_ERR ( " Failed to add asserted identity: %s \n " ,
nt_errstr ( nt_status ) ) ;
2010-01-26 19:09:32 +03:00
return nt_status ;
}
2023-08-21 04:55:27 +03:00
nt_status = samba_kdc_add_claims_valid ( claims_valid ,
user_info_dc ) ;
2023-03-20 06:58:47 +03:00
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
2023-05-16 02:00:24 +03:00
DBG_ERR ( " Failed to add Claims Valid: %s \n " ,
nt_errstr ( nt_status ) ) ;
2023-03-20 06:58:47 +03:00
return nt_status ;
}
2023-08-21 04:55:27 +03:00
nt_status = samba_kdc_add_compounded_auth ( compounded_auth ,
user_info_dc ) ;
2023-03-20 06:58:47 +03:00
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
2023-05-16 02:00:24 +03:00
DBG_ERR ( " Failed to add Compounded Authentication: %s \n " ,
nt_errstr ( nt_status ) ) ;
2023-03-20 06:58:47 +03:00
return nt_status ;
}
2023-05-10 05:54:21 +03:00
* user_info_dc_out = user_info_dc ;
2016-05-13 00:20:39 +03:00
return NT_STATUS_OK ;
}
2023-06-16 04:13:58 +03:00
static krb5_error_code samba_kdc_obtain_user_info_dc ( TALLOC_CTX * mem_ctx ,
krb5_context context ,
struct ldb_context * samdb ,
const enum auth_group_inclusion group_inclusion ,
2023-06-16 05:04:43 +03:00
struct samba_kdc_entry * skdc_entry ,
2023-06-16 04:13:58 +03:00
const krb5_const_pac pac ,
2023-06-16 05:04:43 +03:00
const bool pac_is_trusted ,
2023-06-16 04:13:58 +03:00
struct auth_user_info_dc * * user_info_dc_out ,
struct PAC_DOMAIN_GROUP_MEMBERSHIP * * resource_groups_out )
2010-01-26 19:09:32 +03:00
{
2023-06-16 03:53:07 +03:00
struct auth_user_info_dc * user_info_dc = NULL ;
2023-06-16 03:57:38 +03:00
krb5_error_code ret = 0 ;
2010-01-26 19:09:32 +03:00
NTSTATUS nt_status ;
2023-06-16 04:13:58 +03:00
* user_info_dc_out = NULL ;
if ( resource_groups_out ! = NULL ) {
* resource_groups_out = NULL ;
}
2023-06-16 05:04:43 +03:00
if ( pac ! = NULL & & pac_is_trusted ) {
struct PAC_DOMAIN_GROUP_MEMBERSHIP * * resource_groups = NULL ;
if ( group_inclusion = = AUTH_EXCLUDE_RESOURCE_GROUPS ) {
/*
* Since we are creating a TGT , resource groups from our domain
* are not to be put into the PAC . Instead , we take the resource
* groups directly from the original PAC and copy them
* unmodified into the new one .
*/
resource_groups = resource_groups_out ;
}
ret = kerberos_pac_to_user_info_dc ( mem_ctx ,
pac ,
context ,
& user_info_dc ,
AUTH_EXCLUDE_RESOURCE_GROUPS ,
NULL ,
NULL ,
resource_groups ) ;
if ( ret ) {
const char * krb5err = krb5_get_error_message ( context , ret ) ;
DBG_ERR ( " kerberos_pac_to_user_info_dc failed: %s \n " ,
krb5err ! = NULL ? krb5err : " ? " ) ;
krb5_free_error_message ( context , krb5err ) ;
goto out ;
}
2022-12-02 00:49:20 +03:00
/*
2023-06-16 05:04:43 +03:00
* We need to expand group memberships within our local domain ,
* as the token might be generated by a trusted domain .
2022-12-02 00:49:20 +03:00
*/
2023-06-16 05:04:43 +03:00
nt_status = authsam_update_user_info_dc ( mem_ctx ,
samdb ,
user_info_dc ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " authsam_update_user_info_dc failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2023-06-16 04:04:17 +03:00
2023-08-11 01:02:28 +03:00
ret = map_errno_from_nt_status ( nt_status ) ;
2023-06-16 05:04:43 +03:00
goto out ;
}
} else {
2023-07-21 02:49:18 +03:00
if ( skdc_entry = = NULL ) {
ret = KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN ;
goto out ;
}
2023-06-16 05:04:43 +03:00
/*
* In this case the RWDC discards the PAC an RODC generated .
* Windows adds the asserted_identity in this case too .
*
* Note that SAMBA_KDC_FLAG_CONSTRAINED_DELEGATION
* generates KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN .
* So we can always use
* SAMBA_ASSERTED_IDENTITY_AUTHENTICATION_AUTHORITY
* here .
*/
nt_status = samba_kdc_get_user_info_dc ( mem_ctx ,
skdc_entry ,
2023-07-21 02:49:18 +03:00
SAMBA_ASSERTED_IDENTITY_AUTHENTICATION_AUTHORITY ,
SAMBA_CLAIMS_VALID_EXCLUDE ,
SAMBA_COMPOUNDED_AUTH_EXCLUDE ,
2023-06-16 05:04:43 +03:00
& user_info_dc ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " samba_kdc_get_user_info_dc failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
ret = KRB5KDC_ERR_TGT_REVOKED ;
goto out ;
}
2018-02-01 20:40:58 +03:00
}
2023-06-16 04:13:58 +03:00
* user_info_dc_out = user_info_dc ;
user_info_dc = NULL ;
2023-02-08 00:59:56 +03:00
2023-06-16 03:53:07 +03:00
out :
2023-02-08 00:59:56 +03:00
TALLOC_FREE ( user_info_dc ) ;
2023-06-16 03:57:38 +03:00
return ret ;
2010-01-26 19:09:32 +03:00
}
2023-05-23 00:59:33 +03:00
static NTSTATUS samba_kdc_update_delegation_info_blob ( TALLOC_CTX * mem_ctx ,
krb5_context context ,
const krb5_const_pac pac ,
2023-05-23 01:01:27 +03:00
const krb5_const_principal server_principal ,
const krb5_const_principal proxy_principal ,
2023-05-23 00:59:33 +03:00
DATA_BLOB * new_blob )
2011-06-28 16:46:49 +04:00
{
2023-09-07 07:35:39 +03:00
krb5_data old_data = { } ;
2011-06-28 16:46:49 +04:00
DATA_BLOB old_blob ;
krb5_error_code ret ;
NTSTATUS nt_status ;
enum ndr_err_code ndr_err ;
2023-09-07 07:35:39 +03:00
union PAC_INFO info = { } ;
struct PAC_CONSTRAINED_DELEGATION _d = { } ;
2011-06-28 16:46:49 +04:00
struct PAC_CONSTRAINED_DELEGATION * d = NULL ;
char * server = NULL ;
char * proxy = NULL ;
uint32_t i ;
TALLOC_CTX * tmp_ctx = talloc_new ( mem_ctx ) ;
if ( tmp_ctx = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
ret = krb5_pac_get_buffer ( context , pac , PAC_TYPE_CONSTRAINED_DELEGATION , & old_data ) ;
if ( ret = = ENOENT ) {
2023-09-07 07:35:39 +03:00
/* OK. */
2011-06-28 16:46:49 +04:00
} else if ( ret ) {
talloc_free ( tmp_ctx ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
old_blob . length = old_data . length ;
old_blob . data = ( uint8_t * ) old_data . data ;
if ( old_blob . length > 0 ) {
ndr_err = ndr_pull_union_blob ( & old_blob , mem_ctx ,
& info , PAC_TYPE_CONSTRAINED_DELEGATION ,
( ndr_pull_flags_fn_t ) ndr_pull_PAC_INFO ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
2016-08-26 12:51:52 +03:00
smb_krb5_free_data_contents ( context , & old_data ) ;
2011-06-28 16:46:49 +04:00
nt_status = ndr_map_error2ntstatus ( ndr_err ) ;
2023-07-21 02:44:05 +03:00
DBG_ERR ( " can't parse the PAC LOGON_INFO: %s \n " , nt_errstr ( nt_status ) ) ;
2011-06-28 16:46:49 +04:00
talloc_free ( tmp_ctx ) ;
return nt_status ;
}
} else {
info . constrained_delegation . info = & _d ;
}
2016-08-26 12:51:52 +03:00
smb_krb5_free_data_contents ( context , & old_data ) ;
2011-06-28 16:46:49 +04:00
2017-09-28 15:51:43 +03:00
ret = krb5_unparse_name_flags ( context , server_principal ,
KRB5_PRINCIPAL_UNPARSE_NO_REALM , & server ) ;
2011-06-28 16:46:49 +04:00
if ( ret ) {
talloc_free ( tmp_ctx ) ;
return NT_STATUS_INTERNAL_ERROR ;
}
2017-09-28 15:51:43 +03:00
ret = krb5_unparse_name ( context , proxy_principal , & proxy ) ;
2011-06-28 16:46:49 +04:00
if ( ret ) {
SAFE_FREE ( server ) ;
talloc_free ( tmp_ctx ) ;
return NT_STATUS_INTERNAL_ERROR ;
}
d = info . constrained_delegation . info ;
i = d - > num_transited_services ;
d - > proxy_target . string = server ;
d - > transited_services = talloc_realloc ( mem_ctx , d - > transited_services ,
struct lsa_String , i + 1 ) ;
2023-08-21 04:52:14 +03:00
if ( d - > transited_services = = NULL ) {
SAFE_FREE ( server ) ;
SAFE_FREE ( proxy ) ;
talloc_free ( tmp_ctx ) ;
return NT_STATUS_INTERNAL_ERROR ;
}
2011-06-28 16:46:49 +04:00
d - > transited_services [ i ] . string = proxy ;
d - > num_transited_services = i + 1 ;
ndr_err = ndr_push_union_blob ( new_blob , mem_ctx ,
& info , PAC_TYPE_CONSTRAINED_DELEGATION ,
( ndr_push_flags_fn_t ) ndr_push_PAC_INFO ) ;
SAFE_FREE ( server ) ;
SAFE_FREE ( proxy ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
2016-08-26 12:51:52 +03:00
smb_krb5_free_data_contents ( context , & old_data ) ;
2011-06-28 16:46:49 +04:00
nt_status = ndr_map_error2ntstatus ( ndr_err ) ;
2023-07-21 02:44:05 +03:00
DBG_ERR ( " can't parse the PAC LOGON_INFO: %s \n " , nt_errstr ( nt_status ) ) ;
2011-06-28 16:46:49 +04:00
talloc_free ( tmp_ctx ) ;
return nt_status ;
}
talloc_free ( tmp_ctx ) ;
return NT_STATUS_OK ;
}
2010-01-31 20:49:07 +03:00
/* function to map policy errors */
krb5_error_code samba_kdc_map_policy_err ( NTSTATUS nt_status )
{
krb5_error_code ret ;
if ( NT_STATUS_EQUAL ( nt_status , NT_STATUS_PASSWORD_MUST_CHANGE ) )
2014-05-08 16:47:05 +04:00
ret = KRB5KDC_ERR_KEY_EXP ;
2010-01-31 20:49:07 +03:00
else if ( NT_STATUS_EQUAL ( nt_status , NT_STATUS_PASSWORD_EXPIRED ) )
2014-05-08 16:47:05 +04:00
ret = KRB5KDC_ERR_KEY_EXP ;
2010-01-31 20:49:07 +03:00
else if ( NT_STATUS_EQUAL ( nt_status , NT_STATUS_ACCOUNT_EXPIRED ) )
ret = KRB5KDC_ERR_CLIENT_REVOKED ;
else if ( NT_STATUS_EQUAL ( nt_status , NT_STATUS_ACCOUNT_DISABLED ) )
ret = KRB5KDC_ERR_CLIENT_REVOKED ;
else if ( NT_STATUS_EQUAL ( nt_status , NT_STATUS_INVALID_LOGON_HOURS ) )
ret = KRB5KDC_ERR_CLIENT_REVOKED ;
else if ( NT_STATUS_EQUAL ( nt_status , NT_STATUS_ACCOUNT_LOCKED_OUT ) )
ret = KRB5KDC_ERR_CLIENT_REVOKED ;
else if ( NT_STATUS_EQUAL ( nt_status , NT_STATUS_INVALID_WORKSTATION ) )
ret = KRB5KDC_ERR_POLICY ;
else
ret = KRB5KDC_ERR_POLICY ;
return ret ;
}
/* Given a kdc entry, consult the account_ok routine in auth/auth_sam.c
* for consistency */
NTSTATUS samba_kdc_check_client_access ( struct samba_kdc_entry * kdc_entry ,
const char * client_name ,
const char * workstation ,
bool password_change )
{
TALLOC_CTX * tmp_ctx ;
NTSTATUS nt_status ;
tmp_ctx = talloc_named ( NULL , 0 , " samba_kdc_check_client_access " ) ;
if ( ! tmp_ctx ) {
return NT_STATUS_NO_MEMORY ;
}
/* we allow all kinds of trusts here */
nt_status = authsam_account_ok ( tmp_ctx ,
kdc_entry - > kdc_db_ctx - > samdb ,
MSV1_0_ALLOW_SERVER_TRUST_ACCOUNT |
MSV1_0_ALLOW_WORKSTATION_TRUST_ACCOUNT ,
kdc_entry - > realm_dn , kdc_entry - > msg ,
workstation , client_name ,
true , password_change ) ;
2022-03-16 11:21:03 +03:00
kdc_entry - > reject_status = nt_status ;
2010-01-31 20:49:07 +03:00
talloc_free ( tmp_ctx ) ;
return nt_status ;
}
2021-08-09 18:19:45 +03:00
2021-10-26 10:42:41 +03:00
static krb5_error_code samba_get_requester_sid ( TALLOC_CTX * mem_ctx ,
2022-02-25 02:19:06 +03:00
krb5_const_pac pac ,
2021-10-26 10:42:41 +03:00
krb5_context context ,
struct dom_sid * sid )
{
NTSTATUS nt_status ;
enum ndr_err_code ndr_err ;
krb5_error_code ret ;
DATA_BLOB pac_requester_sid_in ;
krb5_data k5pac_requester_sid_in ;
union PAC_INFO info ;
TALLOC_CTX * tmp_ctx = talloc_new ( mem_ctx ) ;
if ( tmp_ctx = = NULL ) {
return ENOMEM ;
}
ret = krb5_pac_get_buffer ( context , pac , PAC_TYPE_REQUESTER_SID ,
& k5pac_requester_sid_in ) ;
if ( ret ! = 0 ) {
talloc_free ( tmp_ctx ) ;
return ret ;
}
pac_requester_sid_in = data_blob_const ( k5pac_requester_sid_in . data ,
k5pac_requester_sid_in . length ) ;
ndr_err = ndr_pull_union_blob ( & pac_requester_sid_in , tmp_ctx , & info ,
PAC_TYPE_REQUESTER_SID ,
( ndr_pull_flags_fn_t ) ndr_pull_PAC_INFO ) ;
smb_krb5_free_data_contents ( context , & k5pac_requester_sid_in ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
nt_status = ndr_map_error2ntstatus ( ndr_err ) ;
2023-07-21 02:44:05 +03:00
DBG_ERR ( " can't parse the PAC REQUESTER_SID: %s \n " , nt_errstr ( nt_status ) ) ;
2021-10-26 10:42:41 +03:00
talloc_free ( tmp_ctx ) ;
2023-08-11 01:02:28 +03:00
return map_errno_from_nt_status ( nt_status ) ;
2021-10-26 10:42:41 +03:00
}
* sid = info . requester_sid . sid ;
talloc_free ( tmp_ctx ) ;
return 0 ;
}
2021-08-09 18:19:45 +03:00
/* Does a parse and SID check, but no crypto. */
2023-08-11 01:07:55 +03:00
static krb5_error_code samba_kdc_validate_pac_blob (
2021-08-09 18:19:45 +03:00
krb5_context context ,
2022-02-25 02:19:06 +03:00
const struct samba_kdc_entry * client_skdc_entry ,
const krb5_const_pac pac )
2021-08-09 18:19:45 +03:00
{
TALLOC_CTX * frame = talloc_stackframe ( ) ;
struct auth_user_info_dc * pac_user_info = NULL ;
2023-08-11 01:13:38 +03:00
struct dom_sid client_sid ;
2021-08-09 18:19:45 +03:00
struct dom_sid pac_sid ;
krb5_error_code code ;
bool ok ;
2021-10-26 10:42:41 +03:00
/*
* First , try to get the SID from the requester SID buffer in the PAC .
*/
code = samba_get_requester_sid ( frame , pac , context , & pac_sid ) ;
if ( code = = ENOENT ) {
/*
* If the requester SID buffer isn ' t present , fall back to the
* SID in the LOGON_INFO PAC buffer .
*/
code = kerberos_pac_to_user_info_dc ( frame ,
pac ,
context ,
& pac_user_info ,
2022-12-02 00:49:20 +03:00
AUTH_EXCLUDE_RESOURCE_GROUPS ,
NULL ,
2021-10-26 10:42:41 +03:00
NULL ,
NULL ) ;
if ( code ! = 0 ) {
goto out ;
}
if ( pac_user_info - > num_sids = = 0 ) {
code = EINVAL ;
goto out ;
}
2021-08-09 18:19:45 +03:00
2022-12-16 02:08:41 +03:00
pac_sid = pac_user_info - > sids [ PRIMARY_USER_SID_INDEX ] . sid ;
2021-10-26 10:42:41 +03:00
} else if ( code ! = 0 ) {
2021-08-09 18:19:45 +03:00
goto out ;
}
2023-08-11 01:13:38 +03:00
code = samdb_result_dom_sid_buf ( client_skdc_entry - > msg ,
" objectSid " ,
& client_sid ) ;
if ( code ) {
goto out ;
}
2021-08-09 18:19:45 +03:00
2023-08-11 01:13:38 +03:00
ok = dom_sid_equal ( & pac_sid , & client_sid ) ;
2021-08-09 18:19:45 +03:00
if ( ! ok ) {
struct dom_sid_buf buf1 ;
struct dom_sid_buf buf2 ;
DBG_ERR ( " SID mismatch between PAC and looked up client: "
" PAC[%s] != CLI[%s] \n " ,
dom_sid_str_buf ( & pac_sid , & buf1 ) ,
2023-08-11 01:13:38 +03:00
dom_sid_str_buf ( & client_sid , & buf2 ) ) ;
2021-11-24 10:41:45 +03:00
code = KRB5KDC_ERR_TGT_REVOKED ;
2021-08-09 18:19:45 +03:00
goto out ;
}
code = 0 ;
out :
TALLOC_FREE ( frame ) ;
return code ;
}
2021-10-01 06:14:37 +03:00
/*
* In the RODC case , to confirm that the returned user is permitted to
* be replicated to the KDC ( krbgtgt_xxx user ) represented by * rodc
*/
2023-08-11 01:07:55 +03:00
static WERROR samba_rodc_confirm_user_is_allowed ( uint32_t num_object_sids ,
const struct dom_sid * object_sids ,
const struct samba_kdc_entry * rodc ,
const struct samba_kdc_entry * object )
2021-10-01 06:14:37 +03:00
{
int ret ;
WERROR werr ;
TALLOC_CTX * frame = talloc_stackframe ( ) ;
const char * rodc_attrs [ ] = { " msDS-KrbTgtLink " ,
" msDS-NeverRevealGroup " ,
" msDS-RevealOnDemandGroup " ,
" userAccountControl " ,
" objectSid " ,
NULL } ;
struct ldb_result * rodc_machine_account = NULL ;
struct ldb_dn * rodc_machine_account_dn = samdb_result_dn ( rodc - > kdc_db_ctx - > samdb ,
frame ,
rodc - > msg ,
" msDS-KrbTgtLinkBL " ,
NULL ) ;
const struct dom_sid * rodc_machine_account_sid = NULL ;
if ( rodc_machine_account_dn = = NULL ) {
DBG_ERR ( " krbtgt account %s has no msDS-KrbTgtLinkBL to find RODC machine account for allow/deny list \n " ,
ldb_dn_get_linearized ( rodc - > msg - > dn ) ) ;
TALLOC_FREE ( frame ) ;
2021-10-04 02:43:13 +03:00
return WERR_DOMAIN_CONTROLLER_NOT_FOUND ;
2021-10-01 06:14:37 +03:00
}
/*
* Follow the link and get the RODC account ( the krbtgt
* account is the krbtgt_XXX account , but the
* msDS - NeverRevealGroup and msDS - RevealOnDemandGroup is on
* the RODC $ account )
*
* We need DSDB_SEARCH_SHOW_EXTENDED_DN as we get a SID lists
* out of the extended DNs
*/
ret = dsdb_search_dn ( rodc - > kdc_db_ctx - > samdb ,
frame ,
& rodc_machine_account ,
rodc_machine_account_dn ,
rodc_attrs ,
DSDB_SEARCH_SHOW_EXTENDED_DN ) ;
if ( ret ! = LDB_SUCCESS ) {
DBG_ERR ( " Failed to fetch RODC machine account %s pointed to by %s to check allow/deny list: %s \n " ,
ldb_dn_get_linearized ( rodc_machine_account_dn ) ,
ldb_dn_get_linearized ( rodc - > msg - > dn ) ,
ldb_errstring ( rodc - > kdc_db_ctx - > samdb ) ) ;
TALLOC_FREE ( frame ) ;
2021-10-04 02:43:13 +03:00
return WERR_DOMAIN_CONTROLLER_NOT_FOUND ;
2021-10-01 06:14:37 +03:00
}
if ( rodc_machine_account - > count ! = 1 ) {
DBG_ERR ( " Failed to fetch RODC machine account %s pointed to by %s to check allow/deny list: (%d) \n " ,
ldb_dn_get_linearized ( rodc_machine_account_dn ) ,
ldb_dn_get_linearized ( rodc - > msg - > dn ) ,
rodc_machine_account - > count ) ;
TALLOC_FREE ( frame ) ;
return WERR_DS_DRA_BAD_DN ;
}
/* if the object SID is equal to the user_sid, allow */
rodc_machine_account_sid = samdb_result_dom_sid ( frame ,
rodc_machine_account - > msgs [ 0 ] ,
" objectSid " ) ;
if ( rodc_machine_account_sid = = NULL ) {
2023-03-20 05:11:54 +03:00
TALLOC_FREE ( frame ) ;
2021-10-01 06:14:37 +03:00
return WERR_DS_DRA_BAD_DN ;
}
werr = samdb_confirm_rodc_allowed_to_repl_to_sid_list ( rodc - > kdc_db_ctx - > samdb ,
rodc_machine_account_sid ,
rodc_machine_account - > msgs [ 0 ] ,
object - > msg ,
num_object_sids ,
object_sids ) ;
TALLOC_FREE ( frame ) ;
return werr ;
}
2022-03-07 12:24:14 +03:00
2023-06-16 02:20:04 +03:00
/*
* Perform an access check for the client attempting to authenticate to the
* server . ‘ client_info ’ must be talloc - allocated so that we can make a
* reference to it .
*/
krb5_error_code samba_kdc_allowed_to_authenticate_to ( TALLOC_CTX * mem_ctx ,
struct ldb_context * samdb ,
struct loadparm_context * lp_ctx ,
const struct samba_kdc_entry * client ,
const struct auth_user_info_dc * client_info ,
const struct samba_kdc_entry * server ,
struct authn_audit_info * * server_audit_info_out ,
NTSTATUS * status_out )
{
krb5_error_code ret = 0 ;
NTSTATUS status ;
_UNUSED_ NTSTATUS _status ;
struct dom_sid server_sid = { } ;
const struct authn_server_policy * server_policy = server - > server_policy ;
if ( status_out ! = NULL ) {
* status_out = NT_STATUS_OK ;
}
ret = samdb_result_dom_sid_buf ( server - > msg , " objectSid " , & server_sid ) ;
if ( ret ) {
/*
* Ignore the return status — we are already in an error path ,
* and overwriting the real error code with the audit info
* status is unhelpful .
*/
_status = authn_server_policy_audit_info ( mem_ctx ,
server_policy ,
client_info ,
AUTHN_AUDIT_EVENT_OTHER_ERROR ,
AUTHN_AUDIT_REASON_NONE ,
dsdb_ldb_err_to_ntstatus ( ret ) ,
server_audit_info_out ) ;
goto out ;
}
if ( dom_sid_equal ( & client_info - > sids [ PRIMARY_USER_SID_INDEX ] . sid , & server_sid ) ) {
/* Authenticating to ourselves is always allowed. */
status = authn_server_policy_audit_info ( mem_ctx ,
server_policy ,
client_info ,
AUTHN_AUDIT_EVENT_OK ,
AUTHN_AUDIT_REASON_NONE ,
NT_STATUS_OK ,
server_audit_info_out ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
ret = KRB5KRB_ERR_GENERIC ;
}
goto out ;
}
status = authn_policy_authenticate_to_service ( mem_ctx ,
samdb ,
lp_ctx ,
AUTHN_POLICY_AUTH_TYPE_KERBEROS ,
client_info ,
server_policy ,
server_audit_info_out ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
if ( status_out ! = NULL ) {
* status_out = status ;
}
if ( NT_STATUS_EQUAL ( status , NT_STATUS_AUTHENTICATION_FIREWALL_FAILED ) ) {
ret = KRB5KDC_ERR_POLICY ;
} else if ( NT_STATUS_EQUAL ( status , NT_STATUS_INVALID_PARAMETER ) ) {
ret = KRB5KDC_ERR_POLICY ;
} else {
ret = KRB5KRB_ERR_GENERIC ;
}
}
out :
return ret ;
}
2023-03-29 00:56:22 +03:00
static krb5_error_code samba_kdc_add_domain_group_sid ( TALLOC_CTX * mem_ctx ,
struct PAC_DEVICE_INFO * info ,
const struct netr_SidAttr * sid )
{
uint32_t i ;
uint32_t rid ;
NTSTATUS status ;
struct PAC_DOMAIN_GROUP_MEMBERSHIP * domain_group = NULL ;
for ( i = 0 ; i < info - > domain_group_count ; + + i ) {
struct PAC_DOMAIN_GROUP_MEMBERSHIP * this_domain_group
= & info - > domain_groups [ i ] ;
if ( dom_sid_in_domain ( this_domain_group - > domain_sid , sid - > sid ) ) {
domain_group = this_domain_group ;
break ;
}
}
if ( domain_group = = NULL ) {
info - > domain_groups = talloc_realloc (
mem_ctx ,
info - > domain_groups ,
struct PAC_DOMAIN_GROUP_MEMBERSHIP ,
info - > domain_group_count + 1 ) ;
if ( info - > domain_groups = = NULL ) {
return ENOMEM ;
}
domain_group = & info - > domain_groups [
info - > domain_group_count + + ] ;
domain_group - > domain_sid = NULL ;
domain_group - > groups . count = 0 ;
domain_group - > groups . rids = NULL ;
status = dom_sid_split_rid ( info - > domain_groups ,
sid - > sid ,
& domain_group - > domain_sid ,
& rid ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2023-08-11 01:02:28 +03:00
return map_errno_from_nt_status ( status ) ;
2023-03-29 00:56:22 +03:00
}
} else {
status = dom_sid_split_rid ( NULL ,
sid - > sid ,
NULL ,
& rid ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2023-08-11 01:02:28 +03:00
return map_errno_from_nt_status ( status ) ;
2023-03-29 00:56:22 +03:00
}
}
domain_group - > groups . rids = talloc_realloc ( info - > domain_groups ,
domain_group - > groups . rids ,
struct samr_RidWithAttribute ,
domain_group - > groups . count + 1 ) ;
if ( domain_group - > groups . rids = = NULL ) {
return ENOMEM ;
}
domain_group - > groups . rids [ domain_group - > groups . count ] . rid = rid ;
domain_group - > groups . rids [ domain_group - > groups . count ] . attributes = sid - > attributes ;
+ + domain_group - > groups . count ;
return 0 ;
}
static krb5_error_code samba_kdc_make_device_info ( TALLOC_CTX * mem_ctx ,
const struct netr_SamInfo3 * info3 ,
struct PAC_DOMAIN_GROUP_MEMBERSHIP * resource_groups ,
union PAC_INFO * info )
{
struct PAC_DEVICE_INFO * device_info = NULL ;
uint32_t i ;
2023-09-07 07:35:39 +03:00
* info = ( union PAC_INFO ) { } ;
2023-03-29 00:56:22 +03:00
info - > device_info . info = NULL ;
device_info = talloc ( mem_ctx , struct PAC_DEVICE_INFO ) ;
if ( device_info = = NULL ) {
return ENOMEM ;
}
device_info - > rid = info3 - > base . rid ;
device_info - > primary_gid = info3 - > base . primary_gid ;
device_info - > domain_sid = info3 - > base . domain_sid ;
device_info - > groups = info3 - > base . groups ;
device_info - > sid_count = 0 ;
device_info - > sids = NULL ;
if ( resource_groups ! = NULL ) {
/*
* The account ' s resource groups all belong to the same domain ,
* so we can add them all in one go .
*/
device_info - > domain_group_count = 1 ;
device_info - > domain_groups = talloc_move ( mem_ctx , & resource_groups ) ;
} else {
device_info - > domain_group_count = 0 ;
device_info - > domain_groups = NULL ;
}
for ( i = 0 ; i < info3 - > sidcount ; + + i ) {
const struct netr_SidAttr * device_sid = & info3 - > sids [ i ] ;
if ( dom_sid_has_account_domain ( device_sid - > sid ) ) {
krb5_error_code ret = samba_kdc_add_domain_group_sid ( mem_ctx , device_info , device_sid ) ;
if ( ret ! = 0 ) {
return ret ;
}
} else {
device_info - > sids = talloc_realloc ( mem_ctx , device_info - > sids ,
struct netr_SidAttr ,
device_info - > sid_count + 1 ) ;
if ( device_info - > sids = = NULL ) {
return ENOMEM ;
}
device_info - > sids [ device_info - > sid_count ] . sid = dom_sid_dup ( device_info - > sids , device_sid - > sid ) ;
if ( device_info - > sids [ device_info - > sid_count ] . sid = = NULL ) {
return ENOMEM ;
}
device_info - > sids [ device_info - > sid_count ] . attributes = device_sid - > attributes ;
+ + device_info - > sid_count ;
}
}
info - > device_info . info = device_info ;
return 0 ;
}
static krb5_error_code samba_kdc_update_device_info ( TALLOC_CTX * mem_ctx ,
struct ldb_context * samdb ,
const union PAC_INFO * logon_info ,
struct PAC_DEVICE_INFO * device_info )
{
NTSTATUS nt_status ;
struct auth_user_info_dc * device_info_dc = NULL ;
union netr_Validation validation ;
uint32_t i ;
uint32_t num_existing_sids ;
/*
* This does a bit of unnecessary work , setting up fields we don ' t care
* about - - we only want the SIDs .
*/
validation . sam3 = & logon_info - > logon_info . info - > info3 ;
nt_status = make_user_info_dc_netlogon_validation ( mem_ctx , " " , 3 , & validation ,
true , /* This user was authenticated */
& device_info_dc ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
2023-08-11 01:02:28 +03:00
return map_errno_from_nt_status ( nt_status ) ;
2023-03-29 00:56:22 +03:00
}
num_existing_sids = device_info_dc - > num_sids ;
/*
* We need to expand group memberships within our local domain ,
* as the token might be generated by a trusted domain .
*/
nt_status = authsam_update_user_info_dc ( mem_ctx ,
samdb ,
device_info_dc ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
2023-08-11 01:02:28 +03:00
return map_errno_from_nt_status ( nt_status ) ;
2023-03-29 00:56:22 +03:00
}
for ( i = num_existing_sids ; i < device_info_dc - > num_sids ; + + i ) {
struct auth_SidAttr * device_sid = & device_info_dc - > sids [ i ] ;
const struct netr_SidAttr sid = ( struct netr_SidAttr ) {
. sid = & device_sid - > sid ,
. attributes = device_sid - > attrs ,
} ;
krb5_error_code ret = samba_kdc_add_domain_group_sid ( mem_ctx , device_info , & sid ) ;
if ( ret ! = 0 ) {
return ret ;
}
}
return 0 ;
}
static krb5_error_code samba_kdc_get_device_info_pac_blob ( TALLOC_CTX * mem_ctx ,
union PAC_INFO * info ,
DATA_BLOB * * device_info_blob )
{
enum ndr_err_code ndr_err ;
* device_info_blob = talloc_zero ( mem_ctx , DATA_BLOB ) ;
if ( * device_info_blob = = NULL ) {
DBG_ERR ( " Out of memory \n " ) ;
return ENOMEM ;
}
2023-08-25 02:41:39 +03:00
ndr_err = ndr_push_union_blob ( * device_info_blob , * device_info_blob ,
2023-03-29 00:56:22 +03:00
info , PAC_TYPE_DEVICE_INFO ,
( ndr_push_flags_fn_t ) ndr_push_PAC_INFO ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
NTSTATUS nt_status = ndr_map_error2ntstatus ( ndr_err ) ;
DBG_WARNING ( " PAC_DEVICE_INFO (presig) push failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2023-08-11 01:02:28 +03:00
return map_errno_from_nt_status ( nt_status ) ;
2023-03-29 00:56:22 +03:00
}
return 0 ;
}
static krb5_error_code samba_kdc_create_device_info_blob ( TALLOC_CTX * mem_ctx ,
krb5_context context ,
struct ldb_context * samdb ,
const krb5_const_pac device_pac ,
DATA_BLOB * * device_info_blob )
{
2023-04-04 03:51:19 +03:00
TALLOC_CTX * frame = NULL ;
2023-03-29 00:56:22 +03:00
krb5_data device_logon_info ;
krb5_error_code code = EINVAL ;
NTSTATUS nt_status ;
union PAC_INFO info ;
enum ndr_err_code ndr_err ;
DATA_BLOB device_logon_info_blob ;
union PAC_INFO logon_info ;
code = krb5_pac_get_buffer ( context , device_pac ,
PAC_TYPE_LOGON_INFO ,
& device_logon_info ) ;
if ( code ! = 0 ) {
if ( code = = ENOENT ) {
DBG_ERR ( " Device PAC is missing LOGON_INFO \n " ) ;
} else {
DBG_ERR ( " Error getting LOGON_INFO from device PAC \n " ) ;
}
return code ;
}
2023-04-04 03:51:19 +03:00
frame = talloc_stackframe ( ) ;
2023-03-29 00:56:22 +03:00
device_logon_info_blob = data_blob_const ( device_logon_info . data ,
device_logon_info . length ) ;
2023-04-04 03:51:19 +03:00
ndr_err = ndr_pull_union_blob ( & device_logon_info_blob , frame , & logon_info ,
2023-03-29 00:56:22 +03:00
PAC_TYPE_LOGON_INFO ,
( ndr_pull_flags_fn_t ) ndr_pull_PAC_INFO ) ;
smb_krb5_free_data_contents ( context , & device_logon_info ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
nt_status = ndr_map_error2ntstatus ( ndr_err ) ;
DBG_ERR ( " can't parse device PAC LOGON_INFO: %s \n " ,
nt_errstr ( nt_status ) ) ;
2023-04-04 03:51:19 +03:00
talloc_free ( frame ) ;
2023-08-11 01:02:28 +03:00
return map_errno_from_nt_status ( nt_status ) ;
2023-03-29 00:56:22 +03:00
}
/*
* When creating the device info structure , existing resource groups are
* discarded .
*/
2023-04-04 03:51:19 +03:00
code = samba_kdc_make_device_info ( frame ,
2023-03-29 00:56:22 +03:00
& logon_info . logon_info . info - > info3 ,
NULL , /* resource_groups */
& info ) ;
if ( code ! = 0 ) {
2023-04-04 03:51:19 +03:00
talloc_free ( frame ) ;
2023-03-29 00:56:22 +03:00
return code ;
}
2023-04-04 03:51:19 +03:00
code = samba_kdc_update_device_info ( frame ,
2023-03-29 00:56:22 +03:00
samdb ,
& logon_info ,
info . device_info . info ) ;
if ( code ! = 0 ) {
2023-04-04 03:51:19 +03:00
talloc_free ( frame ) ;
2023-03-29 00:56:22 +03:00
return code ;
}
2023-04-04 03:51:19 +03:00
code = samba_kdc_get_device_info_pac_blob ( mem_ctx ,
2023-03-29 00:56:22 +03:00
& info ,
device_info_blob ) ;
2023-04-04 03:51:19 +03:00
talloc_free ( frame ) ;
return code ;
2023-03-29 00:56:22 +03:00
}
static krb5_error_code samba_kdc_get_device_info_blob ( TALLOC_CTX * mem_ctx ,
struct samba_kdc_entry * device ,
DATA_BLOB * * device_info_blob )
{
2023-04-04 03:51:19 +03:00
TALLOC_CTX * frame = NULL ;
2023-03-29 00:56:22 +03:00
krb5_error_code code = EINVAL ;
NTSTATUS nt_status ;
2023-05-10 05:54:21 +03:00
struct auth_user_info_dc * device_info_dc = NULL ;
2023-03-29 00:56:22 +03:00
struct netr_SamInfo3 * info3 = NULL ;
struct PAC_DOMAIN_GROUP_MEMBERSHIP * resource_groups = NULL ;
union PAC_INFO info ;
2023-04-04 03:51:19 +03:00
frame = talloc_stackframe ( ) ;
nt_status = samba_kdc_get_user_info_dc ( frame ,
2023-03-29 00:56:22 +03:00
device ,
2023-07-21 02:49:18 +03:00
SAMBA_ASSERTED_IDENTITY_AUTHENTICATION_AUTHORITY ,
SAMBA_CLAIMS_VALID_INCLUDE ,
SAMBA_COMPOUNDED_AUTH_EXCLUDE ,
2023-03-29 00:56:22 +03:00
& device_info_dc ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " samba_kdc_get_user_info_dc failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2023-04-04 03:51:19 +03:00
talloc_free ( frame ) ;
2023-03-29 00:56:22 +03:00
return KRB5KDC_ERR_TGT_REVOKED ;
}
2023-05-10 05:54:21 +03:00
nt_status = auth_convert_user_info_dc_saminfo3 ( frame , device_info_dc ,
2023-03-29 00:56:22 +03:00
AUTH_INCLUDE_RESOURCE_GROUPS_COMPRESSED ,
& info3 ,
& resource_groups ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
2023-07-21 02:44:05 +03:00
DBG_WARNING ( " Getting Samba info failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2023-04-04 03:51:19 +03:00
talloc_free ( frame ) ;
2023-03-29 00:56:22 +03:00
return nt_status_to_krb5 ( nt_status ) ;
}
2023-04-04 03:51:19 +03:00
code = samba_kdc_make_device_info ( frame ,
2023-03-29 00:56:22 +03:00
info3 ,
resource_groups ,
& info ) ;
if ( code ! = 0 ) {
2023-04-04 03:51:19 +03:00
talloc_free ( frame ) ;
2023-03-29 00:56:22 +03:00
return code ;
}
2023-04-04 03:51:19 +03:00
code = samba_kdc_get_device_info_pac_blob ( mem_ctx ,
2023-03-29 00:56:22 +03:00
& info ,
device_info_blob ) ;
2023-04-04 03:51:19 +03:00
talloc_free ( frame ) ;
return code ;
2023-03-29 00:56:22 +03:00
}
2023-03-20 04:51:53 +03:00
/**
* @ brief Verify a PAC
*
* @ param mem_ctx A talloc memory context
*
* @ param context A krb5 context
*
* @ param flags Bitwise OR ' ed flags
*
* @ param client The client samba kdc entry .
* @ param krbtgt The krbtgt samba kdc entry .
*
* @ param device The computer ' s samba kdc entry ; used for compound
* authentication .
* @ param device_pac The PAC from the computer ' s TGT ; used
* for compound authentication .
* @ param pac The PAC
* @ return A Kerberos error code .
*/
krb5_error_code samba_kdc_verify_pac ( TALLOC_CTX * mem_ctx ,
krb5_context context ,
uint32_t flags ,
struct samba_kdc_entry * client ,
const struct samba_kdc_entry * krbtgt ,
const struct samba_kdc_entry * device ,
const krb5_const_pac * device_pac ,
const krb5_const_pac pac )
{
krb5_error_code code = EINVAL ;
NTSTATUS nt_status ;
bool is_trusted = flags & SAMBA_KDC_FLAG_KRBTGT_IS_TRUSTED ;
struct pac_blobs pac_blobs ;
pac_blobs_init ( & pac_blobs ) ;
if ( client ! = NULL ) {
/*
* Check the objectSID of the client and pac data are the same .
* Does a parse and SID check , but no crypto .
*/
code = samba_kdc_validate_pac_blob ( context ,
client ,
pac ) ;
if ( code ! = 0 ) {
goto done ;
}
}
if ( device ! = NULL ) {
SMB_ASSERT ( * device_pac ! = NULL ) ;
/*
* Check the objectSID of the device and pac data are the same .
* Does a parse and SID check , but no crypto .
*/
code = samba_kdc_validate_pac_blob ( context ,
device ,
* device_pac ) ;
if ( code ! = 0 ) {
goto done ;
}
}
if ( ! is_trusted ) {
const struct auth_user_info_dc * user_info_dc = NULL ;
WERROR werr ;
struct dom_sid * object_sids = NULL ;
uint32_t j ;
if ( client = = NULL ) {
code = KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN ;
goto done ;
}
2023-04-04 03:54:08 +03:00
nt_status = samba_kdc_get_user_info_from_db ( client , client - > msg , & user_info_dc ) ;
2023-03-20 04:51:53 +03:00
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " Getting user info for PAC failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
code = KRB5KDC_ERR_TGT_REVOKED ;
goto done ;
}
/*
* Check if the SID list in the user_info_dc intersects
* correctly with the RODC allow / deny lists .
*/
object_sids = talloc_array ( mem_ctx , struct dom_sid , user_info_dc - > num_sids ) ;
if ( object_sids = = NULL ) {
code = ENOMEM ;
goto done ;
}
for ( j = 0 ; j < user_info_dc - > num_sids ; + + j ) {
object_sids [ j ] = user_info_dc - > sids [ j ] . sid ;
}
werr = samba_rodc_confirm_user_is_allowed ( user_info_dc - > num_sids ,
object_sids ,
krbtgt ,
client ) ;
TALLOC_FREE ( object_sids ) ;
if ( ! W_ERROR_IS_OK ( werr ) ) {
code = KRB5KDC_ERR_TGT_REVOKED ;
if ( W_ERROR_EQUAL ( werr ,
WERR_DOMAIN_CONTROLLER_NOT_FOUND ) ) {
code = KRB5KDC_ERR_POLICY ;
}
goto done ;
}
/*
* The RODC PAC data isn ' t trusted for authorization as it may
* be stale . The only thing meaningful we can do with an RODC
* account on a full DC is exchange the RODC TGT for a ' real '
* TGT .
*
* So we match Windows ( at least server 2022 ) and
* don ' t allow S4U2Self .
*
* https : //lists.samba.org/archive/cifs-protocol/2022-April/003673.html
*/
if ( flags & SAMBA_KDC_FLAG_PROTOCOL_TRANSITION ) {
code = KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN ;
goto done ;
}
}
/* Check the types of the given PAC */
code = pac_blobs_from_krb5_pac ( & pac_blobs ,
mem_ctx ,
context ,
pac ) ;
if ( code ! = 0 ) {
goto done ;
}
code = pac_blobs_ensure_exists ( & pac_blobs ,
PAC_TYPE_LOGON_INFO ) ;
if ( code ! = 0 ) {
goto done ;
}
code = pac_blobs_ensure_exists ( & pac_blobs ,
PAC_TYPE_LOGON_NAME ) ;
if ( code ! = 0 ) {
goto done ;
}
code = pac_blobs_ensure_exists ( & pac_blobs ,
PAC_TYPE_SRV_CHECKSUM ) ;
if ( code ! = 0 ) {
goto done ;
}
code = pac_blobs_ensure_exists ( & pac_blobs ,
PAC_TYPE_KDC_CHECKSUM ) ;
if ( code ! = 0 ) {
goto done ;
}
if ( ! ( flags & SAMBA_KDC_FLAG_CONSTRAINED_DELEGATION ) ) {
code = pac_blobs_ensure_exists ( & pac_blobs ,
PAC_TYPE_REQUESTER_SID ) ;
if ( code ! = 0 ) {
code = KRB5KDC_ERR_TGT_REVOKED ;
goto done ;
}
}
code = 0 ;
done :
pac_blobs_destroy ( & pac_blobs ) ;
return code ;
}
2022-03-07 12:24:14 +03:00
/**
* @ brief Update a PAC
*
* @ param mem_ctx A talloc memory context
*
* @ param context A krb5 context
*
* @ param samdb An open samdb connection .
*
2023-06-16 05:24:50 +03:00
* @ param lp_ctx A loadparm context .
*
2022-03-07 12:24:14 +03:00
* @ param flags Bitwise OR ' ed flags
*
2023-03-29 00:56:22 +03:00
* @ param device_pac_is_trusted Whether the device ' s PAC was issued by a trusted server ,
* as opposed to an RODC .
*
2022-03-07 12:24:14 +03:00
* @ param client The client samba kdc entry .
2023-06-23 02:20:59 +03:00
*
2023-06-22 10:18:51 +03:00
* @ param client_krbtgt The krbtgt samba kdc entry that verified the client
*
2022-03-07 12:24:14 +03:00
* @ param server_principal The server principal
2023-06-23 02:20:59 +03:00
*
2022-03-07 12:24:14 +03:00
* @ param server The server samba kdc entry .
2023-06-23 02:20:59 +03:00
*
2022-03-07 12:24:14 +03:00
* @ param delegated_proxy_principal The delegated proxy principal used for
* updating the constrained delegation PAC
* buffer .
2023-06-23 02:20:59 +03:00
*
2023-06-16 05:24:50 +03:00
* @ param delegated_proxy The delegated proxy kdc entry .
2023-06-23 02:20:59 +03:00
*
2023-06-16 05:24:50 +03:00
* @ param delegated_proxy_pac The PAC from the primary TGT ( i . e . , that of
* the delegating service ) during a constrained
* delegation request .
2023-06-23 02:20:59 +03:00
*
2023-03-17 01:14:15 +03:00
* @ param device The computer ' s samba kdc entry ; used for compound
* authentication .
2023-06-23 02:20:59 +03:00
*
2023-06-22 10:18:51 +03:00
* @ param device_krbtgt The krbtgt samba kdc entry that verified the device
*
2023-03-17 01:14:15 +03:00
* @ param device_pac The PAC from the computer ' s TGT ; used
* for compound authentication .
2023-06-23 02:20:59 +03:00
*
2022-03-07 12:24:14 +03:00
* @ param old_pac The old PAC
2023-06-23 02:20:59 +03:00
*
2022-03-07 12:24:14 +03:00
* @ param new_pac The new already allocated PAC
2023-06-23 02:20:59 +03:00
*
2022-03-07 12:24:14 +03:00
* @ return A Kerberos error code . If no PAC should be returned , the code will be
2023-01-18 13:49:00 +03:00
* ENOATTR !
2022-03-07 12:24:14 +03:00
*/
krb5_error_code samba_kdc_update_pac ( TALLOC_CTX * mem_ctx ,
krb5_context context ,
struct ldb_context * samdb ,
2023-06-16 05:24:50 +03:00
struct loadparm_context * lp_ctx ,
2022-03-07 12:24:14 +03:00
uint32_t flags ,
2023-06-22 10:18:51 +03:00
const struct samba_kdc_entry * client_krbtgt ,
2022-03-07 12:24:14 +03:00
struct samba_kdc_entry * client ,
2023-06-16 03:17:50 +03:00
const krb5_const_principal server_principal ,
2023-03-16 22:07:52 +03:00
const struct samba_kdc_entry * server ,
2023-06-16 03:17:50 +03:00
const krb5_const_principal delegated_proxy_principal ,
2023-06-16 05:24:50 +03:00
struct samba_kdc_entry * delegated_proxy ,
const krb5_const_pac delegated_proxy_pac ,
2023-06-22 10:18:51 +03:00
const struct samba_kdc_entry * device_krbtgt ,
2023-03-20 04:51:53 +03:00
struct samba_kdc_entry * device ,
const krb5_const_pac device_pac ,
const krb5_const_pac old_pac ,
2023-06-16 05:49:11 +03:00
krb5_pac new_pac ,
struct authn_audit_info * * server_audit_info_out ,
NTSTATUS * status_out )
2022-03-07 12:24:14 +03:00
{
krb5_error_code code = EINVAL ;
NTSTATUS nt_status ;
DATA_BLOB * pac_blob = NULL ;
DATA_BLOB * upn_blob = NULL ;
DATA_BLOB * deleg_blob = NULL ;
DATA_BLOB * requester_sid_blob = NULL ;
2023-06-26 02:10:51 +03:00
const DATA_BLOB * client_claims_blob = NULL ;
2023-03-29 00:56:22 +03:00
bool client_pac_is_trusted = flags & SAMBA_KDC_FLAG_KRBTGT_IS_TRUSTED ;
bool device_pac_is_trusted = flags & SAMBA_KDC_FLAG_DEVICE_KRBTGT_IS_TRUSTED ;
2023-06-16 05:24:50 +03:00
bool delegated_proxy_pac_is_trusted = flags & SAMBA_KDC_FLAG_DELEGATED_PROXY_IS_TRUSTED ;
2023-06-26 02:10:51 +03:00
const DATA_BLOB * device_claims_blob = NULL ;
2023-03-29 00:56:22 +03:00
DATA_BLOB * device_info_blob = NULL ;
2023-08-11 00:28:31 +03:00
bool is_tgs = false ;
2023-05-10 05:54:21 +03:00
struct auth_user_info_dc * user_info_dc = NULL ;
2023-06-16 04:13:58 +03:00
struct PAC_DOMAIN_GROUP_MEMBERSHIP * _resource_groups = NULL ;
2022-09-27 04:51:54 +03:00
enum auth_group_inclusion group_inclusion ;
2023-06-16 05:30:00 +03:00
enum samba_compounded_auth compounded_auth ;
2022-03-07 12:24:14 +03:00
size_t i = 0 ;
2023-03-16 22:02:24 +03:00
struct pac_blobs pac_blobs ;
pac_blobs_init ( & pac_blobs ) ;
2022-03-07 12:24:14 +03:00
2023-06-16 05:49:11 +03:00
if ( server_audit_info_out ! = NULL ) {
* server_audit_info_out = NULL ;
}
if ( status_out ! = NULL ) {
* status_out = NT_STATUS_OK ;
}
2023-08-11 00:28:31 +03:00
{
int result = smb_krb5_principal_is_tgs ( context , server_principal ) ;
if ( result = = - 1 ) {
code = ENOMEM ;
goto done ;
}
is_tgs = result ;
2022-09-27 04:51:54 +03:00
}
/* Only include resource groups in a service ticket. */
2022-12-02 00:49:20 +03:00
if ( is_tgs ) {
group_inclusion = AUTH_EXCLUDE_RESOURCE_GROUPS ;
} else if ( server - > supported_enctypes & KERB_ENCTYPE_RESOURCE_SID_COMPRESSION_DISABLED ) {
group_inclusion = AUTH_INCLUDE_RESOURCE_GROUPS ;
} else {
group_inclusion = AUTH_INCLUDE_RESOURCE_GROUPS_COMPRESSED ;
}
2022-09-27 04:51:54 +03:00
2023-06-16 05:30:00 +03:00
if ( device ! = NULL & & ! is_tgs ) {
compounded_auth = SAMBA_COMPOUNDED_AUTH_INCLUDE ;
} else {
compounded_auth = SAMBA_COMPOUNDED_AUTH_EXCLUDE ;
}
2023-03-29 00:56:22 +03:00
if ( device ! = NULL & & ! is_tgs ) {
SMB_ASSERT ( device_pac ! = NULL ) ;
if ( device_pac_is_trusted ) {
krb5_data device_claims_data ;
2023-06-23 02:55:24 +03:00
/*
* [ MS - KILE ] 3.3 .5 .7 .4 Compound Identity : the client
* claims from the device PAC become the device claims
* in the new PAC .
*/
2023-03-29 00:56:22 +03:00
code = krb5_pac_get_buffer ( context , device_pac ,
PAC_TYPE_CLIENT_CLAIMS_INFO ,
& device_claims_data ) ;
if ( code = = ENOENT ) {
/* no-op */
} else if ( code ! = 0 ) {
goto done ;
2023-06-22 10:08:53 +03:00
} else if ( device_krbtgt - > is_trust ) {
/*
* TODO : we need claim translation over trusts ,
* for now we just clear them . . .
*/
device_claims_blob = & data_blob_null ;
2023-03-29 00:56:22 +03:00
} else {
2023-06-26 02:10:51 +03:00
DATA_BLOB * device_claims = NULL ;
device_claims = talloc_zero ( mem_ctx , DATA_BLOB ) ;
if ( device_claims = = NULL ) {
2023-03-29 00:56:22 +03:00
smb_krb5_free_data_contents ( context , & device_claims_data ) ;
code = ENOMEM ;
goto done ;
}
2023-06-26 02:10:51 +03:00
* device_claims = data_blob_talloc ( mem_ctx ,
device_claims_data . data ,
device_claims_data . length ) ;
if ( device_claims - > data = = NULL & & device_claims_data . length ! = 0 ) {
2023-03-29 00:56:22 +03:00
smb_krb5_free_data_contents ( context , & device_claims_data ) ;
code = ENOMEM ;
goto done ;
}
smb_krb5_free_data_contents ( context , & device_claims_data ) ;
2023-06-26 02:10:51 +03:00
device_claims_blob = device_claims ;
2023-03-29 00:56:22 +03:00
}
code = samba_kdc_create_device_info_blob ( mem_ctx ,
context ,
samdb ,
device_pac ,
& device_info_blob ) ;
if ( code ! = 0 ) {
goto done ;
}
} else {
/* Don't trust RODC-issued claims. Regenerate them. */
nt_status = samba_kdc_get_claims_blob ( mem_ctx ,
device ,
& device_claims_blob ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " samba_kdc_get_claims_blob failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2023-08-11 01:02:28 +03:00
code = map_errno_from_nt_status ( nt_status ) ;
2023-03-29 00:56:22 +03:00
goto done ;
}
/* Also regenerate device info. */
code = samba_kdc_get_device_info_blob ( mem_ctx ,
device ,
& device_info_blob ) ;
if ( code ! = 0 ) {
goto done ;
}
}
}
2022-03-07 12:24:14 +03:00
if ( delegated_proxy_principal ! = NULL ) {
deleg_blob = talloc_zero ( mem_ctx , DATA_BLOB ) ;
if ( deleg_blob = = NULL ) {
code = ENOMEM ;
goto done ;
}
nt_status = samba_kdc_update_delegation_info_blob (
2023-08-25 02:41:39 +03:00
deleg_blob ,
2022-03-07 12:24:14 +03:00
context ,
old_pac ,
server_principal ,
delegated_proxy_principal ,
deleg_blob ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " update delegation info blob failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2023-08-11 01:02:28 +03:00
code = map_errno_from_nt_status ( nt_status ) ;
2022-03-07 12:24:14 +03:00
goto done ;
}
}
2023-06-16 05:30:00 +03:00
code = samba_kdc_obtain_user_info_dc ( mem_ctx ,
context ,
samdb ,
group_inclusion ,
client ,
old_pac ,
client_pac_is_trusted ,
& user_info_dc ,
& _resource_groups ) ;
if ( code ! = 0 ) {
const char * err_str = krb5_get_error_message ( context , code ) ;
DBG_ERR ( " samba_kdc_obtain_user_info_dc failed: %s \n " ,
err_str ! = NULL ? err_str : " <unknown> " ) ;
krb5_free_error_message ( context , err_str ) ;
2023-06-16 05:04:43 +03:00
2023-06-16 05:30:00 +03:00
goto done ;
}
2023-06-16 05:04:43 +03:00
2023-06-16 05:24:50 +03:00
/*
* Enforce the AllowedToAuthenticateTo part of an authentication policy ,
* if one is present .
*/
2023-08-11 01:15:56 +03:00
if ( ! is_tgs & & authn_policy_restrictions_present ( server - > server_policy ) ) {
2023-06-16 05:24:50 +03:00
const struct samba_kdc_entry * auth_entry = NULL ;
struct auth_user_info_dc * auth_user_info_dc = NULL ;
if ( delegated_proxy ! = NULL ) {
auth_entry = delegated_proxy ;
code = samba_kdc_obtain_user_info_dc ( mem_ctx ,
context ,
samdb ,
AUTH_INCLUDE_RESOURCE_GROUPS ,
delegated_proxy ,
delegated_proxy_pac ,
delegated_proxy_pac_is_trusted ,
& auth_user_info_dc ,
NULL ) ;
if ( code ) {
goto done ;
}
} else {
auth_entry = client ;
auth_user_info_dc = user_info_dc ;
}
code = samba_kdc_allowed_to_authenticate_to ( mem_ctx ,
samdb ,
lp_ctx ,
auth_entry ,
auth_user_info_dc ,
server ,
server_audit_info_out ,
status_out ) ;
if ( auth_user_info_dc ! = user_info_dc ) {
talloc_unlink ( mem_ctx , auth_user_info_dc ) ;
}
if ( code ) {
goto done ;
}
}
2023-08-21 04:55:27 +03:00
nt_status = samba_kdc_add_compounded_auth ( compounded_auth ,
user_info_dc ) ;
2023-06-16 05:30:00 +03:00
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " Failed to add Compounded Authentication: %s \n " ,
nt_errstr ( nt_status ) ) ;
2023-06-16 05:04:43 +03:00
2023-06-16 05:30:00 +03:00
code = KRB5KDC_ERR_TGT_REVOKED ;
goto done ;
}
2023-03-20 05:16:21 +03:00
2023-06-16 05:32:09 +03:00
if ( client_pac_is_trusted ) {
pac_blob = talloc_zero ( mem_ctx , DATA_BLOB ) ;
if ( pac_blob = = NULL ) {
code = ENOMEM ;
goto done ;
}
nt_status = samba_get_logon_info_pac_blob ( mem_ctx ,
user_info_dc ,
_resource_groups ,
group_inclusion ,
pac_blob ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " samba_get_logon_info_pac_blob failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2023-08-11 01:02:28 +03:00
code = map_errno_from_nt_status ( nt_status ) ;
2023-06-16 05:32:09 +03:00
goto done ;
}
2023-06-22 10:08:53 +03:00
/*
* TODO : we need claim translation over trusts ,
* for now we just clear them . . .
*/
if ( client_krbtgt - > is_trust ) {
client_claims_blob = & data_blob_null ;
}
2023-06-16 05:32:09 +03:00
} else {
2023-03-20 05:16:21 +03:00
nt_status = samba_kdc_get_logon_info_blob ( mem_ctx ,
2023-05-10 05:54:21 +03:00
user_info_dc ,
2023-03-20 05:16:21 +03:00
group_inclusion ,
& pac_blob ) ;
2022-03-07 12:24:14 +03:00
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
2023-03-20 05:16:21 +03:00
DBG_ERR ( " samba_kdc_get_logon_info_blob failed: %s \n " ,
2022-03-07 12:24:14 +03:00
nt_errstr ( nt_status ) ) ;
code = KRB5KDC_ERR_TGT_REVOKED ;
goto done ;
}
2023-03-20 05:16:21 +03:00
nt_status = samba_kdc_get_upn_info_blob ( mem_ctx ,
2023-05-10 05:54:21 +03:00
user_info_dc ,
2023-03-20 05:16:21 +03:00
& upn_blob ) ;
2022-03-18 01:13:40 +03:00
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
2023-03-20 05:16:21 +03:00
DBG_ERR ( " samba_kdc_get_upn_info_blob failed: %s \n " ,
2022-03-18 01:13:40 +03:00
nt_errstr ( nt_status ) ) ;
code = KRB5KDC_ERR_TGT_REVOKED ;
goto done ;
}
2023-03-20 05:16:21 +03:00
nt_status = samba_kdc_get_requester_sid_blob ( mem_ctx ,
2023-05-10 05:54:21 +03:00
user_info_dc ,
2023-03-20 05:16:21 +03:00
& requester_sid_blob ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " samba_kdc_get_requester_sid_blob failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
code = KRB5KDC_ERR_TGT_REVOKED ;
goto done ;
}
/* Don't trust RODC-issued claims. Regenerate them. */
nt_status = samba_kdc_get_claims_blob ( mem_ctx ,
client ,
& client_claims_blob ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " samba_kdc_get_claims_blob failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
2023-08-11 01:02:28 +03:00
code = map_errno_from_nt_status ( nt_status ) ;
2023-03-20 05:16:21 +03:00
goto done ;
}
2022-03-07 12:24:14 +03:00
}
/* Check the types of the given PAC */
2023-03-16 22:02:24 +03:00
code = pac_blobs_from_krb5_pac ( & pac_blobs ,
mem_ctx ,
context ,
old_pac ) ;
2022-03-07 12:24:14 +03:00
if ( code ! = 0 ) {
goto done ;
}
2023-03-16 22:02:24 +03:00
code = pac_blobs_replace_existing ( & pac_blobs ,
PAC_TYPE_LOGON_INFO ,
pac_blob ) ;
if ( code ! = 0 ) {
goto done ;
2022-03-07 12:24:14 +03:00
}
2023-03-16 22:02:24 +03:00
# ifdef SAMBA4_USES_HEIMDAL
/* Not needed with MIT Kerberos */
code = pac_blobs_replace_existing ( & pac_blobs ,
PAC_TYPE_LOGON_NAME ,
& data_blob_null ) ;
if ( code ! = 0 ) {
2022-03-07 12:24:14 +03:00
goto done ;
}
2023-03-16 22:02:24 +03:00
code = pac_blobs_replace_existing ( & pac_blobs ,
PAC_TYPE_SRV_CHECKSUM ,
& data_blob_null ) ;
if ( code ! = 0 ) {
2022-03-07 12:24:14 +03:00
goto done ;
}
2023-03-16 22:02:24 +03:00
code = pac_blobs_replace_existing ( & pac_blobs ,
PAC_TYPE_KDC_CHECKSUM ,
& data_blob_null ) ;
if ( code ! = 0 ) {
2022-03-07 12:24:14 +03:00
goto done ;
}
2023-03-16 22:02:24 +03:00
# endif
code = pac_blobs_add_blob ( & pac_blobs ,
mem_ctx ,
PAC_TYPE_CONSTRAINED_DELEGATION ,
deleg_blob ) ;
if ( code ! = 0 ) {
2022-03-07 12:24:14 +03:00
goto done ;
}
2023-03-16 22:02:24 +03:00
code = pac_blobs_add_blob ( & pac_blobs ,
mem_ctx ,
PAC_TYPE_UPN_DNS_INFO ,
upn_blob ) ;
if ( code ! = 0 ) {
2022-03-07 12:24:14 +03:00
goto done ;
}
2023-03-16 23:04:51 +03:00
code = pac_blobs_add_blob ( & pac_blobs ,
mem_ctx ,
PAC_TYPE_CLIENT_CLAIMS_INFO ,
client_claims_blob ) ;
if ( code ! = 0 ) {
goto done ;
}
2023-03-29 00:56:22 +03:00
code = pac_blobs_add_blob ( & pac_blobs ,
mem_ctx ,
PAC_TYPE_DEVICE_INFO ,
device_info_blob ) ;
if ( code ! = 0 ) {
goto done ;
}
2023-06-26 02:11:19 +03:00
code = pac_blobs_add_blob ( & pac_blobs ,
mem_ctx ,
PAC_TYPE_DEVICE_CLAIMS_INFO ,
device_claims_blob ) ;
if ( code ! = 0 ) {
goto done ;
2023-03-29 00:56:22 +03:00
}
if ( ! client_pac_is_trusted | | ! is_tgs ) {
2023-03-16 22:02:24 +03:00
code = pac_blobs_remove_blob ( & pac_blobs ,
mem_ctx ,
PAC_TYPE_ATTRIBUTES_INFO ) ;
if ( code ! = 0 ) {
goto done ;
}
}
if ( ! is_tgs ) {
code = pac_blobs_remove_blob ( & pac_blobs ,
mem_ctx ,
PAC_TYPE_REQUESTER_SID ) ;
if ( code ! = 0 ) {
goto done ;
}
} else {
code = pac_blobs_add_blob ( & pac_blobs ,
mem_ctx ,
PAC_TYPE_REQUESTER_SID ,
requester_sid_blob ) ;
if ( code ! = 0 ) {
goto done ;
}
}
2022-03-07 12:24:14 +03:00
/*
* The server account may be set not to want the PAC .
*
2023-05-09 03:07:35 +03:00
* While this is wasteful if the above calculations were done
2022-03-07 12:24:14 +03:00
* and now thrown away , this is cleaner as we do any ticket
* signature checking etc always .
*
* UF_NO_AUTH_DATA_REQUIRED is the rare case and most of the
* time ( eg not accepting a ticket from the RODC ) we do not
* need to re - generate anything anyway .
*/
if ( ! samba_princ_needs_pac ( server ) ) {
2023-01-18 13:49:00 +03:00
code = ENOATTR ;
2022-03-07 12:24:14 +03:00
goto done ;
}
2023-03-29 00:56:22 +03:00
if ( client_pac_is_trusted & & ! is_tgs ) {
2022-03-07 12:24:14 +03:00
/*
* The client may have requested no PAC when obtaining the
* TGT .
*/
bool requested_pac = false ;
code = samba_client_requested_pac ( context ,
2023-03-16 22:07:52 +03:00
old_pac ,
2022-03-07 12:24:14 +03:00
mem_ctx ,
& requested_pac ) ;
if ( code ! = 0 | | ! requested_pac ) {
if ( ! requested_pac ) {
2023-01-18 13:49:00 +03:00
code = ENOATTR ;
2022-03-07 12:24:14 +03:00
}
goto done ;
}
}
2023-03-16 22:02:24 +03:00
for ( i = 0 ; i < pac_blobs . num_types ; + + i ) {
2022-03-07 12:24:14 +03:00
krb5_data type_data ;
2023-03-16 22:02:24 +03:00
const DATA_BLOB * type_blob = pac_blobs . type_blobs [ i ] . data ;
uint32_t type = pac_blobs . type_blobs [ i ] . type ;
2022-03-07 12:24:14 +03:00
2023-03-16 23:25:52 +03:00
static char null_byte = ' \0 ' ;
const krb5_data null_data = smb_krb5_make_data ( & null_byte , 0 ) ;
2023-03-16 22:02:24 +03:00
# ifndef SAMBA4_USES_HEIMDAL
/* Not needed with MIT Kerberos */
switch ( type ) {
2022-03-07 12:24:14 +03:00
case PAC_TYPE_LOGON_NAME :
case PAC_TYPE_SRV_CHECKSUM :
case PAC_TYPE_KDC_CHECKSUM :
2022-11-09 03:45:13 +03:00
case PAC_TYPE_FULL_CHECKSUM :
2023-03-16 22:02:24 +03:00
continue ;
2022-03-07 12:24:14 +03:00
default :
break ;
}
2023-03-16 22:02:24 +03:00
# endif
2022-03-07 12:24:14 +03:00
2023-03-16 22:02:24 +03:00
if ( type_blob ! = NULL ) {
type_data = smb_krb5_data_from_blob ( * type_blob ) ;
/*
* Passing a NULL pointer into krb5_pac_add_buffer ( ) is
* not allowed , so pass null_data instead if needed .
*/
code = krb5_pac_add_buffer ( context ,
new_pac ,
type ,
( type_data . data ! = NULL ) ? & type_data : & null_data ) ;
2022-03-07 12:24:14 +03:00
} else {
code = krb5_pac_get_buffer ( context ,
old_pac ,
type ,
& type_data ) ;
if ( code ! = 0 ) {
goto done ;
}
2023-03-16 23:16:17 +03:00
/*
* Passing a NULL pointer into krb5_pac_add_buffer ( ) is
* not allowed , so pass null_data instead if needed .
*/
code = krb5_pac_add_buffer ( context ,
new_pac ,
type ,
( type_data . data ! = NULL ) ? & type_data : & null_data ) ;
smb_krb5_free_data_contents ( context , & type_data ) ;
2022-03-07 12:24:14 +03:00
}
if ( code ! = 0 ) {
goto done ;
}
}
code = 0 ;
done :
2023-03-16 22:02:24 +03:00
pac_blobs_destroy ( & pac_blobs ) ;
2022-03-07 12:24:14 +03:00
TALLOC_FREE ( pac_blob ) ;
TALLOC_FREE ( upn_blob ) ;
TALLOC_FREE ( deleg_blob ) ;
2023-06-16 05:24:50 +03:00
/*
* Release our handle to user_info_dc . ‘ server_audit_info_out ’ , if
* non - NULL , becomes the new parent .
*/
2023-05-10 05:54:21 +03:00
talloc_unlink ( mem_ctx , user_info_dc ) ;
2022-03-07 12:24:14 +03:00
return code ;
}
2023-06-16 02:22:28 +03:00
krb5_error_code samba_kdc_check_device ( TALLOC_CTX * mem_ctx ,
krb5_context context ,
struct ldb_context * samdb ,
struct loadparm_context * lp_ctx ,
struct samba_kdc_entry * device ,
const krb5_const_pac device_pac ,
const bool device_pac_is_trusted ,
const struct authn_kerberos_client_policy * client_policy ,
struct authn_audit_info * * client_audit_info_out ,
NTSTATUS * status_out )
{
TALLOC_CTX * frame = NULL ;
krb5_error_code code = 0 ;
NTSTATUS nt_status ;
struct auth_user_info_dc * device_info = NULL ;
struct authn_audit_info * client_audit_info = NULL ;
if ( status_out ! = NULL ) {
* status_out = NT_STATUS_OK ;
}
if ( ! authn_policy_device_restrictions_present ( client_policy ) ) {
return 0 ;
}
if ( device = = NULL | | device_pac = = NULL ) {
NTSTATUS out_status = NT_STATUS_INVALID_WORKSTATION ;
nt_status = authn_kerberos_client_policy_audit_info ( mem_ctx ,
client_policy ,
NULL /* client_info */ ,
AUTHN_AUDIT_EVENT_KERBEROS_DEVICE_RESTRICTION ,
AUTHN_AUDIT_REASON_FAST_REQUIRED ,
out_status ,
client_audit_info_out ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
code = KRB5KRB_ERR_GENERIC ;
} else if ( authn_kerberos_client_policy_is_enforced ( client_policy ) ) {
code = KRB5KDC_ERR_POLICY ;
if ( status_out ! = NULL ) {
* status_out = out_status ;
}
} else {
/* OK. */
code = 0 ;
}
goto out ;
}
frame = talloc_stackframe ( ) ;
if ( device_pac_is_trusted ) {
krb5_data device_logon_info ;
enum ndr_err_code ndr_err ;
DATA_BLOB device_logon_info_blob ;
union PAC_INFO pac_logon_info ;
union netr_Validation validation ;
code = krb5_pac_get_buffer ( context , device_pac ,
PAC_TYPE_LOGON_INFO ,
& device_logon_info ) ;
if ( code ! = 0 ) {
if ( code = = ENOENT ) {
DBG_ERR ( " Device PAC is missing LOGON_INFO \n " ) ;
} else {
DBG_ERR ( " Error getting LOGON_INFO from device PAC \n " ) ;
}
goto out ;
}
device_logon_info_blob = data_blob_const ( device_logon_info . data ,
device_logon_info . length ) ;
ndr_err = ndr_pull_union_blob ( & device_logon_info_blob , frame , & pac_logon_info ,
PAC_TYPE_LOGON_INFO ,
( ndr_pull_flags_fn_t ) ndr_pull_PAC_INFO ) ;
smb_krb5_free_data_contents ( context , & device_logon_info ) ;
if ( ! NDR_ERR_CODE_IS_SUCCESS ( ndr_err ) ) {
nt_status = ndr_map_error2ntstatus ( ndr_err ) ;
DBG_ERR ( " can't parse device PAC LOGON_INFO: %s \n " ,
nt_errstr ( nt_status ) ) ;
code = ndr_map_error2errno ( ndr_err ) ;
goto out ;
}
/*
* This does a bit of unnecessary work , setting up fields we
* don ’ t care about — we only want the SIDs .
*/
validation . sam3 = & pac_logon_info . logon_info . info - > info3 ;
nt_status = make_user_info_dc_netlogon_validation ( frame , " " , 3 , & validation ,
true , /* This user was authenticated */
& device_info ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
2023-08-11 01:02:28 +03:00
code = map_errno_from_nt_status ( nt_status ) ;
2023-06-16 02:22:28 +03:00
goto out ;
}
/*
* We need to expand group memberships within our local domain ,
* as the token might be generated by a trusted domain .
*/
nt_status = authsam_update_user_info_dc ( frame ,
samdb ,
device_info ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
2023-08-11 01:02:28 +03:00
code = map_errno_from_nt_status ( nt_status ) ;
2023-06-16 02:22:28 +03:00
goto out ;
}
} else {
nt_status = samba_kdc_get_user_info_dc ( frame ,
device ,
SAMBA_ASSERTED_IDENTITY_AUTHENTICATION_AUTHORITY ,
SAMBA_CLAIMS_VALID_INCLUDE ,
SAMBA_COMPOUNDED_AUTH_EXCLUDE ,
& device_info ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
DBG_ERR ( " samba_kdc_get_user_info_dc failed: %s \n " ,
nt_errstr ( nt_status ) ) ;
code = KRB5KDC_ERR_TGT_REVOKED ;
goto out ;
}
}
nt_status = authn_policy_authenticate_from_device ( frame ,
samdb ,
lp_ctx ,
device_info ,
client_policy ,
& client_audit_info ) ;
if ( client_audit_info ! = NULL ) {
* client_audit_info_out = talloc_move ( mem_ctx , & client_audit_info ) ;
}
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
if ( NT_STATUS_EQUAL ( nt_status , NT_STATUS_AUTHENTICATION_FIREWALL_FAILED ) ) {
code = KRB5KDC_ERR_POLICY ;
} else {
code = KRB5KRB_ERR_GENERIC ;
}
goto out ;
}
out :
talloc_free ( frame ) ;
return code ;
}