2004-02-01 14:26:25 +03:00
/*
Unix SMB / CIFS implementation .
header for ads ( active directory ) library routines
basically this is a wrapper around ldap
Copyright ( C ) Andrew Tridgell 2001 - 2003
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
2003-08-13 05:53:07 +04:00
*/
2004-02-01 14:26:25 +03:00
# ifndef _ADS_H
# define _ADS_H
2003-08-13 05:53:07 +04:00
typedef struct {
void * ld ; /* the active ldap structure */
struct in_addr ldap_ip ; /* the ip of the active connection, if any */
time_t last_attempt ; /* last attempt to reconnect */
int ldap_port ;
/* info needed to find the server */
struct {
char * realm ;
char * workgroup ;
char * ldap_server ;
char * ldap_uri ;
int foreign ; /* set to 1 if connecting to a foreign realm */
} server ;
/* info needed to authenticate */
struct {
char * realm ;
char * password ;
char * user_name ;
char * kdc_server ;
2004-06-01 14:12:52 +04:00
uint_t flags ;
2003-08-13 05:53:07 +04:00
int time_offset ;
} auth ;
/* info derived from the servers config */
struct {
char * realm ;
char * bind_path ;
char * ldap_server_name ;
time_t current_time ;
} config ;
} ADS_STRUCT ;
2004-02-01 14:26:25 +03:00
/* there are 5 possible types of errors the ads subsystem can produce */
enum ads_error_type { ENUM_ADS_ERROR_KRB5 , ENUM_ADS_ERROR_GSS ,
ENUM_ADS_ERROR_LDAP , ENUM_ADS_ERROR_SYSTEM , ENUM_ADS_ERROR_NT } ;
2003-08-13 05:53:07 +04:00
typedef struct {
enum ads_error_type error_type ;
union err_state {
int rc ;
NTSTATUS nt_status ;
} err ;
2004-02-01 14:26:25 +03:00
/* For error_type = ENUM_ADS_ERROR_GSS minor_status describe GSS API error */
2003-08-13 05:53:07 +04:00
/* Where rc represents major_status of GSS API error */
int minor_status ;
} ADS_STATUS ;
# ifdef HAVE_ADS
typedef LDAPMod * * ADS_MODLIST ;
# else
typedef void * * ADS_MODLIST ;
# endif
/* macros to simplify error returning */
# define ADS_ERROR(rc) ADS_ERROR_LDAP(rc)
2004-02-01 14:26:25 +03:00
# define ADS_ERROR_LDAP(rc) ads_build_error(ENUM_ADS_ERROR_LDAP, rc, 0)
# define ADS_ERROR_SYSTEM(rc) ads_build_error(ENUM_ADS_ERROR_SYSTEM, rc?rc:EINVAL, 0)
# define ADS_ERROR_KRB5(rc) ads_build_error(ENUM_ADS_ERROR_KRB5, rc, 0)
# define ADS_ERROR_GSS(rc, minor) ads_build_error(ENUM_ADS_ERROR_GSS, rc, minor)
# define ADS_ERROR_NT(rc) ads_build_nt_error(ENUM_ADS_ERROR_NT,rc)
2003-08-13 05:53:07 +04:00
2004-02-01 14:26:25 +03:00
# define ADS_ERR_OK(status) ((status.error_type == ENUM_ADS_ERROR_NT) ? NT_STATUS_IS_OK(status.err.nt_status):(status.err.rc == 0))
2003-08-13 05:53:07 +04:00
# define ADS_SUCCESS ADS_ERROR(0)
/* time between reconnect attempts */
# define ADS_RECONNECT_TIME 5
/* timeout on searches */
# define ADS_SEARCH_TIMEOUT 10
/* ldap control oids */
# define ADS_PAGE_CTL_OID "1.2.840.113556.1.4.319"
# define ADS_NO_REFERRALS_OID "1.2.840.113556.1.4.1339"
# define ADS_SERVER_SORT_OID "1.2.840.113556.1.4.473"
# define ADS_PERMIT_MODIFY_OID "1.2.840.113556.1.4.1413"
/* UserFlags for userAccountControl */
# define UF_SCRIPT 0x00000001
# define UF_ACCOUNTDISABLE 0x00000002
# define UF_UNUSED_1 0x00000004
# define UF_HOMEDIR_REQUIRED 0x00000008
# define UF_LOCKOUT 0x00000010
# define UF_PASSWD_NOTREQD 0x00000020
# define UF_PASSWD_CANT_CHANGE 0x00000040
# define UF_ENCRYPTED_TEXT_PASSWORD_ALLOWED 0x00000080
# define UF_TEMP_DUPLICATE_ACCOUNT 0x00000100
# define UF_NORMAL_ACCOUNT 0x00000200
# define UF_UNUSED_2 0x00000400
# define UF_INTERDOMAIN_TRUST_ACCOUNT 0x00000800
# define UF_WORKSTATION_TRUST_ACCOUNT 0x00001000
# define UF_SERVER_TRUST_ACCOUNT 0x00002000
# define UF_UNUSED_3 0x00004000
# define UF_UNUSED_4 0x00008000
# define UF_DONT_EXPIRE_PASSWD 0x00010000
# define UF_MNS_LOGON_ACCOUNT 0x00020000
# define UF_SMARTCARD_REQUIRED 0x00040000
# define UF_TRUSTED_FOR_DELEGATION 0x00080000
# define UF_NOT_DELEGATED 0x00100000
# define UF_USE_DES_KEY_ONLY 0x00200000
# define UF_DONT_REQUIRE_PREAUTH 0x00400000
# define UF_UNUSED_5 0x00800000
# define UF_UNUSED_6 0x01000000
# define UF_UNUSED_7 0x02000000
# define UF_UNUSED_8 0x04000000
# define UF_UNUSED_9 0x08000000
# define UF_UNUSED_10 0x10000000
# define UF_UNUSED_11 0x20000000
# define UF_UNUSED_12 0x40000000
# define UF_UNUSED_13 0x80000000
# define UF_MACHINE_ACCOUNT_MASK (\
UF_INTERDOMAIN_TRUST_ACCOUNT | \
UF_WORKSTATION_TRUST_ACCOUNT | \
UF_SERVER_TRUST_ACCOUNT \
)
# define UF_ACCOUNT_TYPE_MASK (\
UF_TEMP_DUPLICATE_ACCOUNT | \
UF_NORMAL_ACCOUNT | \
UF_INTERDOMAIN_TRUST_ACCOUNT | \
UF_WORKSTATION_TRUST_ACCOUNT | \
UF_SERVER_TRUST_ACCOUNT \
)
# define UF_SETTABLE_BITS (\
UF_SCRIPT | \
UF_ACCOUNTDISABLE | \
UF_HOMEDIR_REQUIRED | \
UF_LOCKOUT | \
UF_PASSWD_NOTREQD | \
UF_PASSWD_CANT_CHANGE | \
UF_ACCOUNT_TYPE_MASK | \
UF_DONT_EXPIRE_PASSWD | \
UF_MNS_LOGON_ACCOUNT | \
UF_ENCRYPTED_TEXT_PASSWORD_ALLOWED | \
UF_SMARTCARD_REQUIRED | \
UF_TRUSTED_FOR_DELEGATION | \
UF_NOT_DELEGATED | \
UF_USE_DES_KEY_ONLY | \
UF_DONT_REQUIRE_PREAUTH \
)
/* sAMAccountType */
# define ATYPE_NORMAL_ACCOUNT 0x30000000 /* 805306368 */
# define ATYPE_WORKSTATION_TRUST 0x30000001 /* 805306369 */
# define ATYPE_INTERDOMAIN_TRUST 0x30000002 /* 805306370 */
# define ATYPE_SECURITY_GLOBAL_GROUP 0x10000000 /* 268435456 */
# define ATYPE_DISTRIBUTION_GLOBAL_GROUP 0x10000001 /* 268435457 */
# define ATYPE_DISTRIBUTION_UNIVERSAL_GROUP ATYPE_DISTRIBUTION_GLOBAL_GROUP
# define ATYPE_SECURITY_LOCAL_GROUP 0x20000000 /* 536870912 */
# define ATYPE_DISTRIBUTION_LOCAL_GROUP 0x20000001 /* 536870913 */
# define ATYPE_ACCOUNT ATYPE_NORMAL_ACCOUNT /* 0x30000000 805306368 */
# define ATYPE_GLOBAL_GROUP ATYPE_SECURITY_GLOBAL_GROUP /* 0x10000000 268435456 */
# define ATYPE_LOCAL_GROUP ATYPE_SECURITY_LOCAL_GROUP /* 0x20000000 536870912 */
/* groupType */
# define GTYPE_SECURITY_BUILTIN_LOCAL_GROUP 0x80000005 /* -2147483643 */
# define GTYPE_SECURITY_DOMAIN_LOCAL_GROUP 0x80000004 /* -2147483644 */
# define GTYPE_SECURITY_GLOBAL_GROUP 0x80000002 /* -2147483646 */
# define GTYPE_DISTRIBUTION_GLOBAL_GROUP 0x00000002 /* 2 */
# define GTYPE_DISTRIBUTION_DOMAIN_LOCAL_GROUP 0x00000004 /* 4 */
# define GTYPE_DISTRIBUTION_UNIVERSAL_GROUP 0x00000008 /* 8 */
/* Mailslot or cldap getdcname response flags */
# define ADS_PDC 0x00000001 /* DC is PDC */
# define ADS_GC 0x00000004 /* DC is a GC of forest */
# define ADS_LDAP 0x00000008 /* DC is an LDAP server */
# define ADS_DS 0x00000010 /* DC supports DS */
# define ADS_KDC 0x00000020 /* DC is running KDC */
# define ADS_TIMESERV 0x00000040 /* DC is running time services */
# define ADS_CLOSEST 0x00000080 /* DC is closest to client */
# define ADS_WRITABLE 0x00000100 /* DC has writable DS */
# define ADS_GOOD_TIMESERV 0x00000200 / * DC has hardware clock
( and running time ) */
# define ADS_NDNC 0x00000400 / * DomainName is non-domain NC serviced
by LDAP server */
# define ADS_PINGS 0x0000FFFF /* Ping response */
# define ADS_DNS_CONTROLLER 0x20000000 /* DomainControllerName is a DNS name*/
# define ADS_DNS_DOMAIN 0x40000000 /* DomainName is a DNS name */
# define ADS_DNS_FOREST 0x80000000 /* DnsForestName is a DNS name */
/* DomainCntrollerAddressType */
# define ADS_INET_ADDRESS 0x00000001
# define ADS_NETBIOS_ADDRESS 0x00000002
/* ads auth control flags */
# define ADS_AUTH_DISABLE_KERBEROS 0x01
# define ADS_AUTH_NO_BIND 0x02
# define ADS_AUTH_ANON_BIND 0x04
# define ADS_AUTH_SIMPLE_BIND 0x08
2004-02-01 14:26:25 +03:00
# define ADS_AUTH_ALLOW_NTLMSSP 0x10
2003-08-13 05:53:07 +04:00
2004-02-01 14:26:25 +03:00
/***************************************
Some krb5 compat stuff
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-08-13 05:53:07 +04:00
/* Kerberos environment variable names */
# define KRB5_ENV_CCNAME "KRB5CCNAME"
/* Heimdal uses a slightly different name */
# if defined(HAVE_ENCTYPE_ARCFOUR_HMAC_MD5)
# define ENCTYPE_ARCFOUR_HMAC ENCTYPE_ARCFOUR_HMAC_MD5
# endif
2004-02-01 14:26:25 +03:00
/* The older versions of heimdal that don't have this
define don ' t seem to use it anyway . I ' m told they
always use a subkey */
# ifndef HAVE_AP_OPTS_USE_SUBKEY
# define AP_OPTS_USE_SUBKEY 0
# endif
# if defined(HAVE_KRB5)
# ifndef HAVE_KRB5_SET_REAL_TIME
krb5_error_code krb5_set_real_time ( krb5_context context , int32_t seconds , int32_t microseconds ) ;
# endif
# ifndef HAVE_KRB5_SET_DEFAULT_TGS_KTYPES
krb5_error_code krb5_set_default_tgs_ktypes ( krb5_context ctx , const krb5_enctype * enc ) ;
# endif
# if defined(HAVE_KRB5_AUTH_CON_SETKEY) && !defined(HAVE_KRB5_AUTH_CON_SETUSERUSERKEY)
krb5_error_code krb5_auth_con_setuseruserkey ( krb5_context context , krb5_auth_context auth_context , krb5_keyblock * keyblock ) ;
# endif
/* Samba wrapper function for krb5 functionality. */
void setup_kaddr ( krb5_address * pkaddr , struct sockaddr * paddr ) ;
int create_kerberos_key_from_string ( krb5_context context , krb5_principal host_princ , krb5_data * password , krb5_keyblock * key , krb5_enctype enctype ) ;
void get_auth_data_from_tkt ( DATA_BLOB * auth_data , krb5_ticket * tkt ) ;
krb5_const_principal get_principal_from_tkt ( krb5_ticket * tkt ) ;
krb5_error_code krb5_locate_kdc ( krb5_context ctx , const krb5_data * realm , struct sockaddr * * addr_pp , int * naddrs , int get_masters ) ;
krb5_error_code get_kerberos_allowed_etypes ( krb5_context context , krb5_enctype * * enctypes ) ;
void free_kerberos_etypes ( krb5_context context , krb5_enctype * enctypes ) ;
BOOL get_krb5_smb_session_key ( krb5_context context , krb5_auth_context auth_context , DATA_BLOB * session_key , BOOL remote ) ;
# endif /* HAVE_KRB5 */
# endif /* _ADS_H */