2007-11-26 04:25:20 +03:00
/*
Unix SMB / CIFS implementation .
Authentication utility functions
Copyright ( C ) Andrew Tridgell 1992 - 1998
Copyright ( C ) Andrew Bartlett 2001
Copyright ( C ) Jeremy Allison 2000 - 2001
Copyright ( C ) Rafal Szczesniak 2002
Copyright ( C ) Stefan Metzmacher 2005
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 3 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program . If not , see < http : //www.gnu.org/licenses/>.
*/
# include "includes.h"
# include "auth/auth.h"
# include "libcli/security/security.h"
# include "libcli/auth/libcli_auth.h"
# include "dsdb/samdb/samdb.h"
# include "auth/credentials/credentials.h"
# include "param/param.h"
2008-04-02 06:53:27 +04:00
# include "auth/session_proto.h"
2007-11-26 04:25:20 +03:00
2008-04-02 06:53:27 +04:00
_PUBLIC_ struct auth_session_info * anonymous_session ( TALLOC_CTX * mem_ctx ,
2008-04-17 14:23:44 +04:00
struct event_context * event_ctx ,
2007-12-03 19:41:50 +03:00
struct loadparm_context * lp_ctx )
2007-11-26 04:25:20 +03:00
{
NTSTATUS nt_status ;
struct auth_session_info * session_info = NULL ;
2008-04-17 14:23:44 +04:00
nt_status = auth_anonymous_session_info ( mem_ctx , event_ctx , lp_ctx , & session_info ) ;
2007-11-26 04:25:20 +03:00
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
return NULL ;
}
return session_info ;
}
2008-04-02 06:53:27 +04:00
_PUBLIC_ NTSTATUS auth_anonymous_session_info ( TALLOC_CTX * parent_ctx ,
2008-04-17 14:23:44 +04:00
struct event_context * event_ctx ,
2007-12-03 17:53:17 +03:00
struct loadparm_context * lp_ctx ,
2007-11-26 04:25:20 +03:00
struct auth_session_info * * _session_info )
{
NTSTATUS nt_status ;
struct auth_serversupplied_info * server_info = NULL ;
struct auth_session_info * session_info = NULL ;
TALLOC_CTX * mem_ctx = talloc_new ( parent_ctx ) ;
nt_status = auth_anonymous_server_info ( mem_ctx ,
2007-12-03 17:53:17 +03:00
lp_netbios_name ( lp_ctx ) ,
2007-11-26 04:25:20 +03:00
& server_info ) ;
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
talloc_free ( mem_ctx ) ;
return nt_status ;
}
/* references the server_info into the session_info */
2008-04-17 14:23:44 +04:00
nt_status = auth_generate_session_info ( parent_ctx , event_ctx , lp_ctx , server_info , & session_info ) ;
2007-11-26 04:25:20 +03:00
talloc_free ( mem_ctx ) ;
NT_STATUS_NOT_OK_RETURN ( nt_status ) ;
session_info - > credentials = cli_credentials_init ( session_info ) ;
if ( ! session_info - > credentials ) {
return NT_STATUS_NO_MEMORY ;
}
2007-12-03 17:53:17 +03:00
cli_credentials_set_conf ( session_info - > credentials , lp_ctx ) ;
2007-11-26 04:25:20 +03:00
cli_credentials_set_anonymous ( session_info - > credentials ) ;
* _session_info = session_info ;
return NT_STATUS_OK ;
}
2008-04-02 06:53:27 +04:00
_PUBLIC_ NTSTATUS auth_anonymous_server_info ( TALLOC_CTX * mem_ctx ,
2007-12-03 17:53:17 +03:00
const char * netbios_name ,
struct auth_serversupplied_info * * _server_info )
2007-11-26 04:25:20 +03:00
{
struct auth_serversupplied_info * server_info ;
server_info = talloc ( mem_ctx , struct auth_serversupplied_info ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info ) ;
server_info - > account_sid = dom_sid_parse_talloc ( server_info , SID_NT_ANONYMOUS ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > account_sid ) ;
/* is this correct? */
server_info - > primary_group_sid = dom_sid_parse_talloc ( server_info , SID_BUILTIN_GUESTS ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > primary_group_sid ) ;
server_info - > n_domain_groups = 0 ;
server_info - > domain_groups = NULL ;
2008-08-08 08:04:08 +04:00
/* annoying, but the Anonymous really does have a session key... */
2007-11-26 04:25:20 +03:00
server_info - > user_session_key = data_blob_talloc ( server_info , NULL , 16 ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > user_session_key . data ) ;
server_info - > lm_session_key = data_blob_talloc ( server_info , NULL , 16 ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > lm_session_key . data ) ;
2008-08-08 08:04:08 +04:00
/* and it is all zeros! */
2007-11-26 04:25:20 +03:00
data_blob_clear ( & server_info - > user_session_key ) ;
data_blob_clear ( & server_info - > lm_session_key ) ;
server_info - > account_name = talloc_strdup ( server_info , " ANONYMOUS LOGON " ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > account_name ) ;
server_info - > domain_name = talloc_strdup ( server_info , " NT AUTHORITY " ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > domain_name ) ;
server_info - > full_name = talloc_strdup ( server_info , " Anonymous Logon " ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > full_name ) ;
server_info - > logon_script = talloc_strdup ( server_info , " " ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > logon_script ) ;
server_info - > profile_path = talloc_strdup ( server_info , " " ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > profile_path ) ;
server_info - > home_directory = talloc_strdup ( server_info , " " ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > home_directory ) ;
server_info - > home_drive = talloc_strdup ( server_info , " " ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > home_drive ) ;
2007-12-03 17:53:17 +03:00
server_info - > logon_server = talloc_strdup ( server_info , netbios_name ) ;
2007-11-26 04:25:20 +03:00
NT_STATUS_HAVE_NO_MEMORY ( server_info - > logon_server ) ;
server_info - > last_logon = 0 ;
server_info - > last_logoff = 0 ;
server_info - > acct_expiry = 0 ;
server_info - > last_password_change = 0 ;
server_info - > allow_password_change = 0 ;
server_info - > force_password_change = 0 ;
server_info - > logon_count = 0 ;
server_info - > bad_password_count = 0 ;
server_info - > acct_flags = ACB_NORMAL ;
server_info - > authenticated = false ;
* _server_info = server_info ;
return NT_STATUS_OK ;
}
2008-04-02 06:53:27 +04:00
_PUBLIC_ NTSTATUS auth_generate_session_info ( TALLOC_CTX * mem_ctx ,
2008-04-17 14:23:44 +04:00
struct event_context * event_ctx ,
2007-12-03 20:47:35 +03:00
struct loadparm_context * lp_ctx ,
2007-11-26 04:25:20 +03:00
struct auth_serversupplied_info * server_info ,
struct auth_session_info * * _session_info )
{
struct auth_session_info * session_info ;
NTSTATUS nt_status ;
session_info = talloc ( mem_ctx , struct auth_session_info ) ;
NT_STATUS_HAVE_NO_MEMORY ( session_info ) ;
session_info - > server_info = talloc_reference ( session_info , server_info ) ;
/* unless set otherwise, the session key is the user session
* key from the auth subsystem */
session_info - > session_key = server_info - > user_session_key ;
nt_status = security_token_create ( session_info ,
2008-04-17 14:23:44 +04:00
event_ctx ,
2007-12-03 20:47:35 +03:00
lp_ctx ,
2007-11-26 04:25:20 +03:00
server_info - > account_sid ,
server_info - > primary_group_sid ,
server_info - > n_domain_groups ,
server_info - > domain_groups ,
server_info - > authenticated ,
& session_info - > security_token ) ;
NT_STATUS_NOT_OK_RETURN ( nt_status ) ;
session_info - > credentials = NULL ;
* _session_info = session_info ;
return NT_STATUS_OK ;
}
/**
* prints a struct auth_session_info security token to debug output .
*/
void auth_session_info_debug ( int dbg_lev ,
const struct auth_session_info * session_info )
{
if ( ! session_info ) {
DEBUG ( dbg_lev , ( " Session Info: (NULL) \n " ) ) ;
return ;
}
security_token_debug ( dbg_lev , session_info - > security_token ) ;
}
/**
* Make a server_info struct from the info3 returned by a domain logon
*/
2008-04-02 06:53:27 +04:00
_PUBLIC_ NTSTATUS make_server_info_netlogon_validation ( TALLOC_CTX * mem_ctx ,
2007-11-26 04:25:20 +03:00
const char * account_name ,
uint16_t validation_level ,
union netr_Validation * validation ,
struct auth_serversupplied_info * * _server_info )
{
struct auth_serversupplied_info * server_info ;
struct netr_SamBaseInfo * base = NULL ;
int i ;
switch ( validation_level ) {
case 2 :
if ( ! validation | | ! validation - > sam2 ) {
return NT_STATUS_INVALID_PARAMETER ;
}
base = & validation - > sam2 - > base ;
break ;
case 3 :
if ( ! validation | | ! validation - > sam3 ) {
return NT_STATUS_INVALID_PARAMETER ;
}
base = & validation - > sam3 - > base ;
break ;
case 6 :
if ( ! validation | | ! validation - > sam6 ) {
return NT_STATUS_INVALID_PARAMETER ;
}
base = & validation - > sam6 - > base ;
break ;
default :
return NT_STATUS_INVALID_LEVEL ;
}
server_info = talloc ( mem_ctx , struct auth_serversupplied_info ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info ) ;
/*
Here is where we should check the list of
trusted domains , and verify that the SID
matches .
*/
server_info - > account_sid = dom_sid_add_rid ( server_info , base - > domain_sid , base - > rid ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > account_sid ) ;
server_info - > primary_group_sid = dom_sid_add_rid ( server_info , base - > domain_sid , base - > primary_gid ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > primary_group_sid ) ;
server_info - > n_domain_groups = base - > groups . count ;
if ( base - > groups . count ) {
server_info - > domain_groups = talloc_array ( server_info , struct dom_sid * , base - > groups . count ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > domain_groups ) ;
} else {
server_info - > domain_groups = NULL ;
}
for ( i = 0 ; i < base - > groups . count ; i + + ) {
server_info - > domain_groups [ i ] = dom_sid_add_rid ( server_info , base - > domain_sid , base - > groups . rids [ i ] . rid ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > domain_groups [ i ] ) ;
}
/* Copy 'other' sids. We need to do sid filtering here to
prevent possible elevation of privileges . See :
http : //www.microsoft.com/windows2000/techinfo/administration/security/sidfilter.asp
*/
if ( validation_level = = 3 ) {
struct dom_sid * * dgrps = server_info - > domain_groups ;
size_t sidcount = server_info - > n_domain_groups + validation - > sam3 - > sidcount ;
size_t n_dgrps = server_info - > n_domain_groups ;
if ( validation - > sam3 - > sidcount > 0 ) {
dgrps = talloc_realloc ( server_info , dgrps , struct dom_sid * , sidcount ) ;
NT_STATUS_HAVE_NO_MEMORY ( dgrps ) ;
for ( i = 0 ; i < validation - > sam3 - > sidcount ; i + + ) {
dgrps [ n_dgrps + i ] = talloc_reference ( dgrps , validation - > sam3 - > sids [ i ] . sid ) ;
}
}
server_info - > n_domain_groups = sidcount ;
server_info - > domain_groups = dgrps ;
/* Where are the 'global' sids?... */
}
if ( base - > account_name . string ) {
server_info - > account_name = talloc_reference ( server_info , base - > account_name . string ) ;
} else {
server_info - > account_name = talloc_strdup ( server_info , account_name ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > account_name ) ;
}
server_info - > domain_name = talloc_reference ( server_info , base - > domain . string ) ;
server_info - > full_name = talloc_reference ( server_info , base - > full_name . string ) ;
server_info - > logon_script = talloc_reference ( server_info , base - > logon_script . string ) ;
server_info - > profile_path = talloc_reference ( server_info , base - > profile_path . string ) ;
server_info - > home_directory = talloc_reference ( server_info , base - > home_directory . string ) ;
server_info - > home_drive = talloc_reference ( server_info , base - > home_drive . string ) ;
server_info - > logon_server = talloc_reference ( server_info , base - > logon_server . string ) ;
server_info - > last_logon = base - > last_logon ;
server_info - > last_logoff = base - > last_logoff ;
server_info - > acct_expiry = base - > acct_expiry ;
server_info - > last_password_change = base - > last_password_change ;
server_info - > allow_password_change = base - > allow_password_change ;
server_info - > force_password_change = base - > force_password_change ;
server_info - > logon_count = base - > logon_count ;
server_info - > bad_password_count = base - > bad_password_count ;
server_info - > acct_flags = base - > acct_flags ;
server_info - > authenticated = true ;
/* ensure we are never given NULL session keys */
if ( all_zero ( base - > key . key , sizeof ( base - > key . key ) ) ) {
server_info - > user_session_key = data_blob ( NULL , 0 ) ;
} else {
server_info - > user_session_key = data_blob_talloc ( server_info , base - > key . key , sizeof ( base - > key . key ) ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > user_session_key . data ) ;
}
if ( all_zero ( base - > LMSessKey . key , sizeof ( base - > LMSessKey . key ) ) ) {
server_info - > lm_session_key = data_blob ( NULL , 0 ) ;
} else {
server_info - > lm_session_key = data_blob_talloc ( server_info , base - > LMSessKey . key , sizeof ( base - > LMSessKey . key ) ) ;
NT_STATUS_HAVE_NO_MEMORY ( server_info - > lm_session_key . data ) ;
}
2008-08-28 10:28:47 +04:00
ZERO_STRUCT ( server_info - > pac_srv_sig ) ;
ZERO_STRUCT ( server_info - > pac_kdc_sig ) ;
2007-11-26 04:25:20 +03:00
* _server_info = server_info ;
return NT_STATUS_OK ;
}