2010-01-26 19:43:54 +03:00
/*
Unix SMB / CIFS implementation .
PAC Glue between Samba and the KDC
Copyright ( C ) Andrew Bartlett < abartlet @ samba . org > 2005 - 2009
Copyright ( C ) Simo Sorce < idra @ samba . org > 2010
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 3 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
2022-09-27 04:51:54 +03:00
# include "librpc/gen_ndr/auth.h"
2021-10-11 15:47:25 +03:00
enum samba_asserted_identity {
SAMBA_ASSERTED_IDENTITY_IGNORE = 0 ,
SAMBA_ASSERTED_IDENTITY_SERVICE ,
SAMBA_ASSERTED_IDENTITY_AUTHENTICATION_AUTHORITY ,
} ;
2022-03-07 12:24:14 +03:00
enum {
SAMBA_KDC_FLAG_PROTOCOL_TRANSITION = 0x00000001 ,
SAMBA_KDC_FLAG_CONSTRAINED_DELEGATION = 0x00000002 ,
SAMBA_KDC_FLAG_KRBTGT_IN_DB = 0x00000004 ,
2023-03-16 04:29:15 +03:00
SAMBA_KDC_FLAG_KRBTGT_IS_TRUSTED = 0x00000008 ,
2022-03-07 12:24:14 +03:00
SAMBA_KDC_FLAG_SKIP_PAC_BUFFER = 0x00000010 ,
} ;
2016-05-13 00:20:39 +03:00
krb5_error_code samba_kdc_encrypt_pac_credentials ( krb5_context context ,
const krb5_keyblock * pkreplykey ,
const DATA_BLOB * cred_ndr_blob ,
TALLOC_CTX * mem_ctx ,
DATA_BLOB * cred_info_blob ) ;
2010-01-26 19:43:54 +03:00
krb5_error_code samba_make_krb5_pac ( krb5_context context ,
2016-05-13 00:20:39 +03:00
const DATA_BLOB * logon_blob ,
const DATA_BLOB * cred_blob ,
2016-05-13 01:13:33 +03:00
const DATA_BLOB * upn_blob ,
2021-10-26 10:41:31 +03:00
const DATA_BLOB * pac_attrs_blob ,
2021-10-26 10:42:41 +03:00
const DATA_BLOB * requester_sid_blob ,
2016-05-13 00:20:39 +03:00
const DATA_BLOB * deleg_blob ,
2022-02-25 01:57:31 +03:00
const DATA_BLOB * client_claims_blob ,
const DATA_BLOB * device_info_blob ,
const DATA_BLOB * device_claims_blob ,
2021-10-07 16:12:35 +03:00
krb5_pac pac ) ;
2010-01-26 19:43:54 +03:00
2023-03-16 22:07:52 +03:00
bool samba_princ_needs_pac ( const struct samba_kdc_entry * skdc_entry ) ;
2010-01-26 19:43:54 +03:00
2021-10-26 10:41:31 +03:00
int samba_client_requested_pac ( krb5_context context ,
2023-03-16 22:07:52 +03:00
krb5_const_pac pac ,
2021-10-26 10:41:31 +03:00
TALLOC_CTX * mem_ctx ,
bool * requested_pac ) ;
2014-05-10 02:49:44 +04:00
int samba_krbtgt_is_in_db ( struct samba_kdc_entry * skdc_entry ,
bool * is_in_db ,
2023-03-16 04:29:15 +03:00
bool * is_trusted ) ;
2010-09-28 06:53:06 +04:00
2022-03-18 01:13:40 +03:00
NTSTATUS samba_kdc_get_user_info_from_db ( struct samba_kdc_entry * skdc_entry ,
2022-11-07 04:14:18 +03:00
const struct ldb_message * msg ,
2022-03-18 01:13:40 +03:00
struct auth_user_info_dc * * user_info_dc ) ;
2016-05-13 00:20:39 +03:00
NTSTATUS samba_kdc_get_pac_blobs ( TALLOC_CTX * mem_ctx ,
struct samba_kdc_entry * skdc_entry ,
2021-10-11 15:47:25 +03:00
enum samba_asserted_identity asserted_identity ,
2022-09-27 04:51:54 +03:00
enum auth_group_inclusion group_inclusion ,
2016-05-13 00:20:39 +03:00
DATA_BLOB * * _logon_info_blob ,
2016-05-13 01:13:33 +03:00
DATA_BLOB * * _cred_ndr_blob ,
2021-10-26 10:41:31 +03:00
DATA_BLOB * * _upn_info_blob ,
DATA_BLOB * * _pac_attrs_blob ,
2021-12-22 07:08:43 +03:00
uint64_t pac_attributes ,
2022-02-25 02:19:06 +03:00
DATA_BLOB * * _requester_sid_blob ,
DATA_BLOB * * _client_claims_blob ) ;
2010-01-26 19:43:54 +03:00
NTSTATUS samba_kdc_update_pac_blob ( TALLOC_CTX * mem_ctx ,
krb5_context context ,
2021-10-08 06:06:58 +03:00
struct ldb_context * samdb ,
2022-09-27 04:51:54 +03:00
enum auth_group_inclusion group_inclusion ,
2012-01-11 11:06:55 +04:00
const krb5_pac pac , DATA_BLOB * pac_blob ,
struct PAC_SIGNATURE_DATA * pac_srv_sig ,
struct PAC_SIGNATURE_DATA * pac_kdc_sig ) ;
2011-06-28 16:46:49 +04:00
NTSTATUS samba_kdc_update_delegation_info_blob ( TALLOC_CTX * mem_ctx ,
krb5_context context ,
2023-03-16 22:07:52 +03:00
krb5_const_pac pac ,
krb5_principal server_principal ,
krb5_principal proxy_principal ,
2011-06-28 16:46:49 +04:00
DATA_BLOB * pac_blob ) ;
2010-01-26 19:43:54 +03:00
2010-01-31 20:49:07 +03:00
krb5_error_code samba_kdc_map_policy_err ( NTSTATUS nt_status ) ;
NTSTATUS samba_kdc_check_client_access ( struct samba_kdc_entry * kdc_entry ,
const char * client_name ,
const char * workstation ,
bool password_change ) ;
2021-08-09 18:19:45 +03:00
krb5_error_code samba_kdc_validate_pac_blob (
krb5_context context ,
2022-02-25 02:19:06 +03:00
const struct samba_kdc_entry * client_skdc_entry ,
2023-03-16 22:07:52 +03:00
krb5_const_pac pac ) ;
2021-10-01 06:14:37 +03:00
/*
* In the RODC case , to confirm that the returned user is permitted to
* be replicated to the KDC ( krbgtgt_xxx user ) represented by * rodc
*/
WERROR samba_rodc_confirm_user_is_allowed ( uint32_t num_sids ,
2022-11-07 04:14:18 +03:00
const struct dom_sid * object_sids ,
const struct samba_kdc_entry * rodc ,
const struct samba_kdc_entry * object ) ;
2022-03-07 12:24:14 +03:00
krb5_error_code samba_kdc_update_pac ( TALLOC_CTX * mem_ctx ,
krb5_context context ,
struct ldb_context * samdb ,
uint32_t flags ,
struct samba_kdc_entry * client ,
2023-03-16 22:07:52 +03:00
krb5_principal server_principal ,
const struct samba_kdc_entry * server ,
const struct samba_kdc_entry * krbtgt ,
krb5_principal delegated_proxy_principal ,
krb5_pac old_pac ,
2022-03-07 12:24:14 +03:00
krb5_pac new_pac ) ;