2010-01-26 19:43:54 +03:00
/*
Unix SMB / CIFS implementation .
PAC Glue between Samba and the KDC
Copyright ( C ) Andrew Bartlett < abartlet @ samba . org > 2005 - 2009
Copyright ( C ) Simo Sorce < idra @ samba . org > 2010
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 3 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
2023-05-08 04:30:40 +03:00
# include "system/kerberos.h"
# include "auth/kerberos/kerberos.h"
# include <krb5/krb5.h>
# include "lib/util/data_blob.h"
# include "lib/util/time.h"
# include "libcli/util/ntstatus.h"
# include "libcli/util/werror.h"
2022-09-27 04:51:54 +03:00
# include "librpc/gen_ndr/auth.h"
2023-05-08 04:30:40 +03:00
# include "kdc/samba_kdc.h"
2022-09-27 04:51:54 +03:00
2021-10-11 15:47:25 +03:00
enum samba_asserted_identity {
SAMBA_ASSERTED_IDENTITY_IGNORE = 0 ,
SAMBA_ASSERTED_IDENTITY_SERVICE ,
SAMBA_ASSERTED_IDENTITY_AUTHENTICATION_AUTHORITY ,
} ;
2023-03-20 06:58:47 +03:00
enum samba_claims_valid {
SAMBA_CLAIMS_VALID_EXCLUDE = 0 ,
SAMBA_CLAIMS_VALID_INCLUDE ,
} ;
enum samba_compounded_auth {
SAMBA_COMPOUNDED_AUTH_EXCLUDE = 0 ,
SAMBA_COMPOUNDED_AUTH_INCLUDE ,
} ;
2022-03-07 12:24:14 +03:00
enum {
SAMBA_KDC_FLAG_PROTOCOL_TRANSITION = 0x00000001 ,
SAMBA_KDC_FLAG_CONSTRAINED_DELEGATION = 0x00000002 ,
SAMBA_KDC_FLAG_KRBTGT_IN_DB = 0x00000004 ,
2023-03-16 04:29:15 +03:00
SAMBA_KDC_FLAG_KRBTGT_IS_TRUSTED = 0x00000008 ,
2022-03-07 12:24:14 +03:00
SAMBA_KDC_FLAG_SKIP_PAC_BUFFER = 0x00000010 ,
2023-03-29 00:56:22 +03:00
SAMBA_KDC_FLAG_DEVICE_KRBTGT_IS_TRUSTED = 0x00000020 ,
2023-06-16 05:24:50 +03:00
SAMBA_KDC_FLAG_DELEGATED_PROXY_IS_TRUSTED = 0x00000040 ,
2022-03-07 12:24:14 +03:00
} ;
2016-05-13 00:20:39 +03:00
krb5_error_code samba_kdc_encrypt_pac_credentials ( krb5_context context ,
const krb5_keyblock * pkreplykey ,
const DATA_BLOB * cred_ndr_blob ,
TALLOC_CTX * mem_ctx ,
DATA_BLOB * cred_info_blob ) ;
2010-01-26 19:43:54 +03:00
krb5_error_code samba_make_krb5_pac ( krb5_context context ,
2016-05-13 00:20:39 +03:00
const DATA_BLOB * logon_blob ,
const DATA_BLOB * cred_blob ,
2016-05-13 01:13:33 +03:00
const DATA_BLOB * upn_blob ,
2021-10-26 10:41:31 +03:00
const DATA_BLOB * pac_attrs_blob ,
2021-10-26 10:42:41 +03:00
const DATA_BLOB * requester_sid_blob ,
2016-05-13 00:20:39 +03:00
const DATA_BLOB * deleg_blob ,
2022-02-25 01:57:31 +03:00
const DATA_BLOB * client_claims_blob ,
const DATA_BLOB * device_info_blob ,
const DATA_BLOB * device_claims_blob ,
2021-10-07 16:12:35 +03:00
krb5_pac pac ) ;
2010-01-26 19:43:54 +03:00
2023-03-16 22:07:52 +03:00
bool samba_princ_needs_pac ( const struct samba_kdc_entry * skdc_entry ) ;
2010-01-26 19:43:54 +03:00
2021-10-26 10:41:31 +03:00
int samba_client_requested_pac ( krb5_context context ,
2023-03-16 22:07:52 +03:00
krb5_const_pac pac ,
2021-10-26 10:41:31 +03:00
TALLOC_CTX * mem_ctx ,
bool * requested_pac ) ;
2014-05-10 02:49:44 +04:00
int samba_krbtgt_is_in_db ( struct samba_kdc_entry * skdc_entry ,
bool * is_in_db ,
2023-03-16 04:29:15 +03:00
bool * is_trusted ) ;
2010-09-28 06:53:06 +04:00
2023-04-04 03:54:08 +03:00
NTSTATUS samba_kdc_get_user_info_from_db ( struct samba_kdc_entry * skdc_entry ,
2022-11-07 04:14:18 +03:00
const struct ldb_message * msg ,
2023-03-20 05:02:53 +03:00
const struct auth_user_info_dc * * user_info_dc ) ;
2022-03-18 01:13:40 +03:00
2023-03-20 05:16:21 +03:00
NTSTATUS samba_kdc_get_user_info_dc ( TALLOC_CTX * mem_ctx ,
struct samba_kdc_entry * skdc_entry ,
enum samba_asserted_identity asserted_identity ,
2023-03-20 06:58:47 +03:00
enum samba_claims_valid claims_valid ,
enum samba_compounded_auth compounded_auth ,
2023-05-10 05:54:21 +03:00
struct auth_user_info_dc * * user_info_dc_out ) ;
2023-03-20 05:16:21 +03:00
2010-01-31 20:49:07 +03:00
krb5_error_code samba_kdc_map_policy_err ( NTSTATUS nt_status ) ;
NTSTATUS samba_kdc_check_client_access ( struct samba_kdc_entry * kdc_entry ,
const char * client_name ,
const char * workstation ,
bool password_change ) ;
2021-08-09 18:19:45 +03:00
krb5_error_code samba_kdc_validate_pac_blob (
krb5_context context ,
2022-02-25 02:19:06 +03:00
const struct samba_kdc_entry * client_skdc_entry ,
2023-03-16 22:07:52 +03:00
krb5_const_pac pac ) ;
2021-10-01 06:14:37 +03:00
/*
* In the RODC case , to confirm that the returned user is permitted to
* be replicated to the KDC ( krbgtgt_xxx user ) represented by * rodc
*/
2023-05-08 04:30:40 +03:00
struct dom_sid ;
2021-10-01 06:14:37 +03:00
WERROR samba_rodc_confirm_user_is_allowed ( uint32_t num_sids ,
2022-11-07 04:14:18 +03:00
const struct dom_sid * object_sids ,
const struct samba_kdc_entry * rodc ,
const struct samba_kdc_entry * object ) ;
2022-03-07 12:24:14 +03:00
2023-03-20 04:51:53 +03:00
krb5_error_code samba_kdc_verify_pac ( TALLOC_CTX * mem_ctx ,
krb5_context context ,
uint32_t flags ,
struct samba_kdc_entry * client ,
const struct samba_kdc_entry * krbtgt ,
const struct samba_kdc_entry * device ,
const krb5_const_pac * device_pac ,
krb5_const_pac pac ) ;
2023-06-16 02:20:04 +03:00
struct authn_audit_info ;
2022-03-07 12:24:14 +03:00
krb5_error_code samba_kdc_update_pac ( TALLOC_CTX * mem_ctx ,
krb5_context context ,
struct ldb_context * samdb ,
2023-06-16 05:24:50 +03:00
struct loadparm_context * lp_ctx ,
2022-03-07 12:24:14 +03:00
uint32_t flags ,
struct samba_kdc_entry * client ,
2023-06-16 03:17:50 +03:00
const krb5_const_principal server_principal ,
2023-03-16 22:07:52 +03:00
const struct samba_kdc_entry * server ,
2023-06-16 03:17:50 +03:00
const krb5_const_principal delegated_proxy_principal ,
2023-06-16 05:24:50 +03:00
struct samba_kdc_entry * delegated_proxy ,
const krb5_const_pac delegated_proxy_pac ,
2023-03-20 04:51:53 +03:00
struct samba_kdc_entry * device ,
2023-06-26 02:03:14 +03:00
const krb5_const_pac device_pac ,
const krb5_const_pac old_pac ,
2023-06-16 05:49:11 +03:00
krb5_pac new_pac ,
struct authn_audit_info * * server_audit_info_out ,
NTSTATUS * status_out ) ;
2023-03-20 05:16:21 +03:00
NTSTATUS samba_kdc_get_logon_info_blob ( TALLOC_CTX * mem_ctx ,
const struct auth_user_info_dc * user_info_dc ,
enum auth_group_inclusion group_inclusion ,
DATA_BLOB * * _logon_info_blob ) ;
NTSTATUS samba_kdc_get_cred_ndr_blob ( TALLOC_CTX * mem_ctx ,
const struct samba_kdc_entry * p ,
DATA_BLOB * * _cred_ndr_blob ) ;
NTSTATUS samba_kdc_get_upn_info_blob ( TALLOC_CTX * mem_ctx ,
const struct auth_user_info_dc * user_info_dc ,
DATA_BLOB * * _upn_info_blob ) ;
NTSTATUS samba_kdc_get_pac_attrs_blob ( TALLOC_CTX * mem_ctx ,
uint64_t pac_attributes ,
DATA_BLOB * * _pac_attrs_blob ) ;
NTSTATUS samba_kdc_get_requester_sid_blob ( TALLOC_CTX * mem_ctx ,
const struct auth_user_info_dc * user_info_dc ,
DATA_BLOB * * _requester_sid_blob ) ;
NTSTATUS samba_kdc_get_claims_blob ( TALLOC_CTX * mem_ctx ,
const struct samba_kdc_entry * p ,
DATA_BLOB * * _claims_blob ) ;
2023-06-16 02:20:04 +03:00
krb5_error_code samba_kdc_allowed_to_authenticate_to ( TALLOC_CTX * mem_ctx ,
struct ldb_context * samdb ,
struct loadparm_context * lp_ctx ,
const struct samba_kdc_entry * client ,
const struct auth_user_info_dc * client_info ,
const struct samba_kdc_entry * server ,
struct authn_audit_info * * server_audit_info_out ,
NTSTATUS * status_out ) ;
2023-06-16 02:22:28 +03:00
krb5_error_code samba_kdc_check_device ( TALLOC_CTX * mem_ctx ,
krb5_context context ,
struct ldb_context * samdb ,
struct loadparm_context * lp_ctx ,
struct samba_kdc_entry * device ,
krb5_const_pac device_pac ,
bool device_pac_is_trusted ,
const struct authn_kerberos_client_policy * client_policy ,
struct authn_audit_info * * client_audit_info_out ,
NTSTATUS * status_out ) ;