/* Unix SMB/CIFS implementation. PAC Glue between Samba and the KDC Copyright (C) Andrew Bartlett 2005-2009 Copyright (C) Simo Sorce 2010 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #include "lib/replace/replace.h" #include "lib/replace/system/kerberos.h" #include "lib/replace/system/filesys.h" #include "lib/util/debug.h" #include "lib/util/samba_util.h" #include "lib/util/talloc_stack.h" #include "auth/auth_sam_reply.h" #include "auth/kerberos/kerberos.h" #include "auth/kerberos/pac_utils.h" #include "auth/authn_policy.h" #include "libcli/security/security.h" #include "libds/common/flags.h" #include "librpc/gen_ndr/ndr_krb5pac.h" #include "param/param.h" #include "source4/auth/auth.h" #include "source4/dsdb/common/util.h" #include "source4/dsdb/samdb/samdb.h" #include "source4/kdc/authn_policy_util.h" #include "source4/kdc/samba_kdc.h" #include "source4/kdc/pac-glue.h" #include "source4/kdc/ad_claims.h" #include "source4/kdc/pac-blobs.h" #include #undef DBGC_CLASS #define DBGC_CLASS DBGC_KERBEROS static NTSTATUS samba_get_logon_info_pac_blob(TALLOC_CTX *mem_ctx, const struct auth_user_info_dc *info, const struct PAC_DOMAIN_GROUP_MEMBERSHIP *override_resource_groups, const enum auth_group_inclusion group_inclusion, DATA_BLOB *pac_data) { TALLOC_CTX *tmp_ctx = NULL; struct netr_SamInfo3 *info3 = NULL; struct PAC_DOMAIN_GROUP_MEMBERSHIP *_resource_groups = NULL; struct PAC_DOMAIN_GROUP_MEMBERSHIP **resource_groups = NULL; union PAC_INFO pac_info = {}; enum ndr_err_code ndr_err; NTSTATUS nt_status = NT_STATUS_OK; *pac_data = data_blob_null; tmp_ctx = talloc_new(mem_ctx); if (tmp_ctx == NULL) { return NT_STATUS_NO_MEMORY; } if (override_resource_groups == NULL) { resource_groups = &_resource_groups; } else if (group_inclusion != AUTH_EXCLUDE_RESOURCE_GROUPS) { /* * It doesn't make sense to override resource groups if we claim * to want resource groups from user_info_dc. */ DBG_ERR("supplied resource groups with invalid group inclusion parameter: %u\n", group_inclusion); nt_status = NT_STATUS_INVALID_PARAMETER; goto out; } nt_status = auth_convert_user_info_dc_saminfo3(tmp_ctx, info, group_inclusion, &info3, resource_groups); if (!NT_STATUS_IS_OK(nt_status)) { DBG_WARNING("Getting Samba info failed: %s\n", nt_errstr(nt_status)); goto out; } pac_info.logon_info.info = talloc_zero(tmp_ctx, struct PAC_LOGON_INFO); if (!pac_info.logon_info.info) { nt_status = NT_STATUS_NO_MEMORY; goto out; } pac_info.logon_info.info->info3 = *info3; if (_resource_groups != NULL) { pac_info.logon_info.info->resource_groups = *_resource_groups; } if (override_resource_groups != NULL) { pac_info.logon_info.info->resource_groups = *override_resource_groups; } if (group_inclusion != AUTH_EXCLUDE_RESOURCE_GROUPS) { /* * Set the resource groups flag based on whether any groups are * present. Otherwise, the flag is propagated from the * originating PAC. */ if (pac_info.logon_info.info->resource_groups.groups.count > 0) { pac_info.logon_info.info->info3.base.user_flags |= NETLOGON_RESOURCE_GROUPS; } else { pac_info.logon_info.info->info3.base.user_flags &= ~NETLOGON_RESOURCE_GROUPS; } } ndr_err = ndr_push_union_blob(pac_data, mem_ctx, &pac_info, PAC_TYPE_LOGON_INFO, (ndr_push_flags_fn_t)ndr_push_PAC_INFO); if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { nt_status = ndr_map_error2ntstatus(ndr_err); DBG_WARNING("PAC_LOGON_INFO (presig) push failed: %s\n", nt_errstr(nt_status)); goto out; } out: talloc_free(tmp_ctx); return nt_status; } static NTSTATUS samba_get_upn_info_pac_blob(TALLOC_CTX *mem_ctx, const struct auth_user_info_dc *info, DATA_BLOB *upn_data) { TALLOC_CTX *tmp_ctx = NULL; union PAC_INFO pac_upn = {}; enum ndr_err_code ndr_err; NTSTATUS nt_status = NT_STATUS_OK; bool ok; *upn_data = data_blob_null; tmp_ctx = talloc_new(mem_ctx); if (tmp_ctx == NULL) { return NT_STATUS_NO_MEMORY; } pac_upn.upn_dns_info.upn_name = info->info->user_principal_name; pac_upn.upn_dns_info.dns_domain_name = strupper_talloc(tmp_ctx, info->info->dns_domain_name); if (pac_upn.upn_dns_info.dns_domain_name == NULL) { nt_status = NT_STATUS_NO_MEMORY; goto out; } if (info->info->user_principal_constructed) { pac_upn.upn_dns_info.flags |= PAC_UPN_DNS_FLAG_CONSTRUCTED; } pac_upn.upn_dns_info.flags |= PAC_UPN_DNS_FLAG_HAS_SAM_NAME_AND_SID; pac_upn.upn_dns_info.ex.sam_name_and_sid.samaccountname = info->info->account_name; pac_upn.upn_dns_info.ex.sam_name_and_sid.objectsid = &info->sids[PRIMARY_USER_SID_INDEX].sid; ndr_err = ndr_push_union_blob(upn_data, mem_ctx, &pac_upn, PAC_TYPE_UPN_DNS_INFO, (ndr_push_flags_fn_t)ndr_push_PAC_INFO); if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { nt_status = ndr_map_error2ntstatus(ndr_err); DBG_WARNING("PAC UPN_DNS_INFO (presig) push failed: %s\n", nt_errstr(nt_status)); goto out; } ok = data_blob_pad(mem_ctx, upn_data, 8); if (!ok) { talloc_free(upn_data); nt_status = NT_STATUS_NO_MEMORY; goto out; } out: talloc_free(tmp_ctx); return nt_status; } static NTSTATUS samba_get_cred_info_ndr_blob(TALLOC_CTX *mem_ctx, const struct ldb_message *msg, DATA_BLOB *cred_blob) { enum ndr_err_code ndr_err; NTSTATUS nt_status; struct samr_Password *lm_hash = NULL; struct samr_Password *nt_hash = NULL; struct PAC_CREDENTIAL_NTLM_SECPKG ntlm_secpkg = { .version = 0, }; DATA_BLOB ntlm_blob = data_blob_null; struct PAC_CREDENTIAL_SUPPLEMENTAL_SECPKG secpkgs[1] = {{ .credential_size = 0, }}; struct PAC_CREDENTIAL_DATA cred_data = { .credential_count = 0, }; struct PAC_CREDENTIAL_DATA_NDR cred_ndr = {}; *cred_blob = data_blob_null; lm_hash = samdb_result_hash(mem_ctx, msg, "dBCSPwd"); if (lm_hash != NULL) { bool zero = all_zero(lm_hash->hash, 16); if (zero) { lm_hash = NULL; } } if (lm_hash != NULL) { DBG_INFO("Passing LM password hash through credentials set\n"); ntlm_secpkg.flags |= PAC_CREDENTIAL_NTLM_HAS_LM_HASH; ntlm_secpkg.lm_password = *lm_hash; ZERO_STRUCTP(lm_hash); TALLOC_FREE(lm_hash); } nt_hash = samdb_result_hash(mem_ctx, msg, "unicodePwd"); if (nt_hash != NULL) { bool zero = all_zero(nt_hash->hash, 16); if (zero) { nt_hash = NULL; } } if (nt_hash != NULL) { DBG_INFO("Passing NT password hash through credentials set\n"); ntlm_secpkg.flags |= PAC_CREDENTIAL_NTLM_HAS_NT_HASH; ntlm_secpkg.nt_password = *nt_hash; ZERO_STRUCTP(nt_hash); TALLOC_FREE(nt_hash); } if (ntlm_secpkg.flags == 0) { return NT_STATUS_OK; } #ifdef DEBUG_PASSWORD if (DEBUGLVL(11)) { NDR_PRINT_DEBUG(PAC_CREDENTIAL_NTLM_SECPKG, &ntlm_secpkg); } #endif ndr_err = ndr_push_struct_blob(&ntlm_blob, mem_ctx, &ntlm_secpkg, (ndr_push_flags_fn_t)ndr_push_PAC_CREDENTIAL_NTLM_SECPKG); ZERO_STRUCT(ntlm_secpkg); if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { nt_status = ndr_map_error2ntstatus(ndr_err); DBG_WARNING("PAC_CREDENTIAL_NTLM_SECPKG (presig) push failed: %s\n", nt_errstr(nt_status)); return nt_status; } DBG_DEBUG("NTLM credential BLOB (len %zu) for user\n", ntlm_blob.length); dump_data_pw("PAC_CREDENTIAL_NTLM_SECPKG", ntlm_blob.data, ntlm_blob.length); secpkgs[0].package_name.string = discard_const_p(char, "NTLM"); secpkgs[0].credential_size = ntlm_blob.length; secpkgs[0].credential = ntlm_blob.data; cred_data.credential_count = ARRAY_SIZE(secpkgs); cred_data.credentials = secpkgs; #ifdef DEBUG_PASSWORD if (DEBUGLVL(11)) { NDR_PRINT_DEBUG(PAC_CREDENTIAL_DATA, &cred_data); } #endif cred_ndr.ctr.data = &cred_data; #ifdef DEBUG_PASSWORD if (DEBUGLVL(11)) { NDR_PRINT_DEBUG(PAC_CREDENTIAL_DATA_NDR, &cred_ndr); } #endif ndr_err = ndr_push_struct_blob(cred_blob, mem_ctx, &cred_ndr, (ndr_push_flags_fn_t)ndr_push_PAC_CREDENTIAL_DATA_NDR); data_blob_clear(&ntlm_blob); if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { nt_status = ndr_map_error2ntstatus(ndr_err); DBG_WARNING("PAC_CREDENTIAL_DATA_NDR (presig) push failed: %s\n", nt_errstr(nt_status)); return nt_status; } DBG_DEBUG("Created credential BLOB (len %zu) for user\n", cred_blob->length); dump_data_pw("PAC_CREDENTIAL_DATA_NDR", cred_blob->data, cred_blob->length); return NT_STATUS_OK; } krb5_error_code samba_kdc_encrypt_pac_credentials(krb5_context context, const krb5_keyblock *pkreplykey, const DATA_BLOB *cred_ndr_blob, TALLOC_CTX *mem_ctx, DATA_BLOB *cred_info_blob) { #ifdef SAMBA4_USES_HEIMDAL krb5_crypto cred_crypto; krb5_enctype cred_enctype; krb5_data cred_ndr_crypt; struct PAC_CREDENTIAL_INFO pac_cred_info = { .version = 0, }; krb5_error_code ret; const char *krb5err; enum ndr_err_code ndr_err; NTSTATUS nt_status; *cred_info_blob = data_blob_null; ret = krb5_crypto_init(context, pkreplykey, ETYPE_NULL, &cred_crypto); if (ret != 0) { krb5err = krb5_get_error_message(context, ret); DBG_WARNING("Failed initializing cred data crypto: %s\n", krb5err); krb5_free_error_message(context, krb5err); return ret; } ret = krb5_crypto_getenctype(context, cred_crypto, &cred_enctype); if (ret != 0) { DBG_WARNING("Failed getting crypto type for key\n"); krb5_crypto_destroy(context, cred_crypto); return ret; } DBG_DEBUG("Plain cred_ndr_blob (len %zu)\n", cred_ndr_blob->length); dump_data_pw("PAC_CREDENTIAL_DATA_NDR", cred_ndr_blob->data, cred_ndr_blob->length); ret = krb5_encrypt(context, cred_crypto, KRB5_KU_OTHER_ENCRYPTED, cred_ndr_blob->data, cred_ndr_blob->length, &cred_ndr_crypt); krb5_crypto_destroy(context, cred_crypto); if (ret != 0) { krb5err = krb5_get_error_message(context, ret); DBG_WARNING("Failed crypt of cred data: %s\n", krb5err); krb5_free_error_message(context, krb5err); return ret; } pac_cred_info.encryption_type = cred_enctype; pac_cred_info.encrypted_data.length = cred_ndr_crypt.length; pac_cred_info.encrypted_data.data = (uint8_t *)cred_ndr_crypt.data; if (DEBUGLVL(10)) { NDR_PRINT_DEBUG(PAC_CREDENTIAL_INFO, &pac_cred_info); } ndr_err = ndr_push_struct_blob(cred_info_blob, mem_ctx, &pac_cred_info, (ndr_push_flags_fn_t)ndr_push_PAC_CREDENTIAL_INFO); krb5_data_free(&cred_ndr_crypt); if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { nt_status = ndr_map_error2ntstatus(ndr_err); DBG_WARNING("PAC_CREDENTIAL_INFO (presig) push failed: %s\n", nt_errstr(nt_status)); return KRB5KDC_ERR_SVC_UNAVAILABLE; } DBG_DEBUG("Encrypted credential BLOB (len %zu) with alg %"PRId32"\n", cred_info_blob->length, pac_cred_info.encryption_type); dump_data_pw("PAC_CREDENTIAL_INFO", cred_info_blob->data, cred_info_blob->length); return 0; #else /* SAMBA4_USES_HEIMDAL */ TALLOC_CTX *tmp_ctx = NULL; krb5_key cred_key; krb5_enctype cred_enctype; struct PAC_CREDENTIAL_INFO pac_cred_info = { .version = 0, }; krb5_error_code code = 0; const char *krb5err; enum ndr_err_code ndr_err; NTSTATUS nt_status; krb5_data cred_ndr_data; krb5_enc_data cred_ndr_crypt; size_t enc_len = 0; *cred_info_blob = data_blob_null; tmp_ctx = talloc_new(mem_ctx); if (tmp_ctx == NULL) { return ENOMEM; } code = krb5_k_create_key(context, pkreplykey, &cred_key); if (code != 0) { krb5err = krb5_get_error_message(context, code); DBG_WARNING("Failed initializing cred data crypto: %s\n", krb5err); krb5_free_error_message(context, krb5err); goto out; } cred_enctype = krb5_k_key_enctype(context, cred_key); DBG_DEBUG("Plain cred_ndr_blob (len %zu)\n", cred_ndr_blob->length); dump_data_pw("PAC_CREDENTIAL_DATA_NDR", cred_ndr_blob->data, cred_ndr_blob->length); pac_cred_info.encryption_type = cred_enctype; cred_ndr_data = smb_krb5_data_from_blob(*cred_ndr_blob); code = krb5_c_encrypt_length(context, cred_enctype, cred_ndr_data.length, &enc_len); if (code != 0) { krb5err = krb5_get_error_message(context, code); DBG_WARNING("Failed initializing cred data crypto: %s\n", krb5err); krb5_free_error_message(context, krb5err); goto out; } pac_cred_info.encrypted_data = data_blob_talloc_zero(tmp_ctx, enc_len); if (pac_cred_info.encrypted_data.data == NULL) { DBG_ERR("Out of memory\n"); code = ENOMEM; goto out; } cred_ndr_crypt.ciphertext = smb_krb5_data_from_blob(pac_cred_info.encrypted_data); code = krb5_k_encrypt(context, cred_key, KRB5_KU_OTHER_ENCRYPTED, NULL, &cred_ndr_data, &cred_ndr_crypt); krb5_k_free_key(context, cred_key); if (code != 0) { krb5err = krb5_get_error_message(context, code); DBG_WARNING("Failed crypt of cred data: %s\n", krb5err); krb5_free_error_message(context, krb5err); goto out; } if (DEBUGLVL(10)) { NDR_PRINT_DEBUG(PAC_CREDENTIAL_INFO, &pac_cred_info); } ndr_err = ndr_push_struct_blob(cred_info_blob, mem_ctx, &pac_cred_info, (ndr_push_flags_fn_t)ndr_push_PAC_CREDENTIAL_INFO); TALLOC_FREE(pac_cred_info.encrypted_data.data); if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { nt_status = ndr_map_error2ntstatus(ndr_err); DBG_WARNING("PAC_CREDENTIAL_INFO (presig) push failed: %s\n", nt_errstr(nt_status)); code = KRB5KDC_ERR_SVC_UNAVAILABLE; goto out; } DBG_DEBUG("Encrypted credential BLOB (len %zu) with alg %"PRId32"\n", cred_info_blob->length, pac_cred_info.encryption_type); dump_data_pw("PAC_CREDENTIAL_INFO", cred_info_blob->data, cred_info_blob->length); out: talloc_free(tmp_ctx); return code; #endif /* SAMBA4_USES_HEIMDAL */ } /** * @brief Create a PAC with the given blobs (logon, credentials, upn and * delegation). * * @param[in] context The KRB5 context to use. * * @param[in] logon_blob Fill the logon info PAC buffer with the given blob, * use NULL to ignore it. * * @param[in] cred_blob Fill the credentials info PAC buffer with the given * blob, use NULL to ignore it. * * @param[in] upn_blob Fill the UPN info PAC buffer with the given blob, use * NULL to ignore it. * * @param[in] deleg_blob Fill the delegation info PAC buffer with the given * blob, use NULL to ignore it. * * @param[in] client_claims_blob Fill the client claims info PAC buffer with the * given blob, use NULL to ignore it. * * @param[in] device_info_blob Fill the device info PAC buffer with the given * blob, use NULL to ignore it. * * @param[in] device_claims_blob Fill the device claims info PAC buffer with the given * blob, use NULL to ignore it. * * @param[in] pac The pac buffer to fill. This should be allocated with * krb5_pac_init() already. * * @returns 0 on success or a corresponding KRB5 error. */ krb5_error_code samba_make_krb5_pac(krb5_context context, const DATA_BLOB *logon_blob, const DATA_BLOB *cred_blob, const DATA_BLOB *upn_blob, const DATA_BLOB *pac_attrs_blob, const DATA_BLOB *requester_sid_blob, const DATA_BLOB *deleg_blob, const DATA_BLOB *client_claims_blob, const DATA_BLOB *device_info_blob, const DATA_BLOB *device_claims_blob, krb5_pac pac) { krb5_data logon_data; krb5_error_code ret; char null_byte = '\0'; krb5_data null_data = smb_krb5_make_data(&null_byte, 0); /* The user account may be set not to want the PAC */ if (logon_blob == NULL) { return 0; } logon_data = smb_krb5_data_from_blob(*logon_blob); ret = krb5_pac_add_buffer(context, pac, PAC_TYPE_LOGON_INFO, &logon_data); if (ret != 0) { return ret; } if (device_info_blob != NULL) { krb5_data device_info_data = smb_krb5_data_from_blob(*device_info_blob); ret = krb5_pac_add_buffer(context, pac, PAC_TYPE_DEVICE_INFO, &device_info_data); if (ret != 0) { return ret; } } if (client_claims_blob != NULL) { krb5_data client_claims_data; krb5_data *data = NULL; if (client_claims_blob->length != 0) { client_claims_data = smb_krb5_data_from_blob(*client_claims_blob); data = &client_claims_data; } else { data = &null_data; } ret = krb5_pac_add_buffer(context, pac, PAC_TYPE_CLIENT_CLAIMS_INFO, data); if (ret != 0) { return ret; } } if (device_claims_blob != NULL) { krb5_data device_claims_data = smb_krb5_data_from_blob(*device_claims_blob); ret = krb5_pac_add_buffer(context, pac, PAC_TYPE_DEVICE_CLAIMS_INFO, &device_claims_data); if (ret != 0) { return ret; } } if (cred_blob != NULL) { krb5_data cred_data = smb_krb5_data_from_blob(*cred_blob); ret = krb5_pac_add_buffer(context, pac, PAC_TYPE_CREDENTIAL_INFO, &cred_data); if (ret != 0) { return ret; } } #ifdef SAMBA4_USES_HEIMDAL /* * null_data will be filled by the generic KDC code in the caller * here we just add it in order to have it before * PAC_TYPE_UPN_DNS_INFO * * Not needed with MIT Kerberos - asn */ ret = krb5_pac_add_buffer(context, pac, PAC_TYPE_LOGON_NAME, &null_data); if (ret != 0) { return ret; } #endif if (upn_blob != NULL) { krb5_data upn_data = smb_krb5_data_from_blob(*upn_blob); ret = krb5_pac_add_buffer(context, pac, PAC_TYPE_UPN_DNS_INFO, &upn_data); if (ret != 0) { return ret; } } if (pac_attrs_blob != NULL) { krb5_data pac_attrs_data = smb_krb5_data_from_blob(*pac_attrs_blob); ret = krb5_pac_add_buffer(context, pac, PAC_TYPE_ATTRIBUTES_INFO, &pac_attrs_data); if (ret != 0) { return ret; } } if (requester_sid_blob != NULL) { krb5_data requester_sid_data = smb_krb5_data_from_blob(*requester_sid_blob); ret = krb5_pac_add_buffer(context, pac, PAC_TYPE_REQUESTER_SID, &requester_sid_data); if (ret != 0) { return ret; } } if (deleg_blob != NULL) { krb5_data deleg_data = smb_krb5_data_from_blob(*deleg_blob); ret = krb5_pac_add_buffer(context, pac, PAC_TYPE_CONSTRAINED_DELEGATION, &deleg_data); if (ret != 0) { return ret; } } return ret; } bool samba_princ_needs_pac(const struct samba_kdc_entry *skdc_entry) { uint32_t userAccountControl; /* The service account may be set not to want the PAC */ userAccountControl = ldb_msg_find_attr_as_uint(skdc_entry->msg, "userAccountControl", 0); if (userAccountControl & UF_NO_AUTH_DATA_REQUIRED) { return false; } return true; } static krb5_error_code samba_client_requested_pac(krb5_context context, const krb5_const_pac pac, TALLOC_CTX *mem_ctx, bool *requested_pac) { enum ndr_err_code ndr_err; krb5_data k5pac_attrs_in; DATA_BLOB pac_attrs_in; union PAC_INFO pac_attrs; krb5_error_code ret; *requested_pac = true; ret = krb5_pac_get_buffer(context, pac, PAC_TYPE_ATTRIBUTES_INFO, &k5pac_attrs_in); if (ret != 0) { return ret == ENOENT ? 0 : ret; } pac_attrs_in = data_blob_const(k5pac_attrs_in.data, k5pac_attrs_in.length); ndr_err = ndr_pull_union_blob(&pac_attrs_in, mem_ctx, &pac_attrs, PAC_TYPE_ATTRIBUTES_INFO, (ndr_pull_flags_fn_t)ndr_pull_PAC_INFO); smb_krb5_free_data_contents(context, &k5pac_attrs_in); if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err); DBG_ERR("can't parse the PAC ATTRIBUTES_INFO: %s\n", nt_errstr(nt_status)); return map_errno_from_nt_status(nt_status); } if (pac_attrs.attributes_info.flags & (PAC_ATTRIBUTE_FLAG_PAC_WAS_GIVEN_IMPLICITLY | PAC_ATTRIBUTE_FLAG_PAC_WAS_REQUESTED)) { *requested_pac = true; } else { *requested_pac = false; } return 0; } /* Was the krbtgt in this DB (ie, should we check the incoming signature) and was it an RODC */ int samba_krbtgt_is_in_db(struct samba_kdc_entry *p, bool *is_in_db, bool *is_trusted) { NTSTATUS status; krb5_error_code ret; int rodc_krbtgt_number, trust_direction; struct dom_sid sid; uint32_t rid; trust_direction = ldb_msg_find_attr_as_int(p->msg, "trustDirection", 0); if (trust_direction != 0) { /* Domain trust - we cannot check the sig, but we trust it for a correct PAC This is exactly where we should flag for SID validation when we do inter-forest trusts */ *is_trusted = true; *is_in_db = false; return 0; } /* The lack of password controls etc applies to krbtgt by * virtue of being that particular RID */ ret = samdb_result_dom_sid_buf(p->msg, "objectSid", &sid); if (ret) { return ret; } status = dom_sid_split_rid(NULL, &sid, NULL, &rid); if (!NT_STATUS_IS_OK(status)) { return map_errno_from_nt_status(status); } rodc_krbtgt_number = ldb_msg_find_attr_as_int(p->msg, "msDS-SecondaryKrbTgtNumber", -1); if (p->kdc_db_ctx->my_krbtgt_number == 0) { if (rid == DOMAIN_RID_KRBTGT) { *is_trusted = true; *is_in_db = true; return 0; } else if (rodc_krbtgt_number != -1) { *is_in_db = true; *is_trusted = false; return 0; } } else if ((rid != DOMAIN_RID_KRBTGT) && (rodc_krbtgt_number == p->kdc_db_ctx->my_krbtgt_number)) { *is_trusted = true; *is_in_db = true; return 0; } else if (rid == DOMAIN_RID_KRBTGT) { /* krbtgt viewed from an RODC */ *is_trusted = true; *is_in_db = false; return 0; } /* Another RODC */ *is_trusted = false; *is_in_db = false; return 0; } /* * Because the KDC does not limit protocol transition, two new well-known SIDs * were introduced to give this control to the resource administrator. These * SIDs identify whether protocol transition has occurred, and can be used with * standard access control lists to grant or limit access as needed. * * https://docs.microsoft.com/en-us/windows-server/security/kerberos/kerberos-constrained-delegation-overview */ NTSTATUS samba_kdc_add_asserted_identity(enum samba_asserted_identity ai, struct auth_user_info_dc *user_info_dc) { struct dom_sid ai_sid; const char *sid_str = NULL; switch (ai) { case SAMBA_ASSERTED_IDENTITY_SERVICE: sid_str = SID_SERVICE_ASSERTED_IDENTITY; break; case SAMBA_ASSERTED_IDENTITY_AUTHENTICATION_AUTHORITY: sid_str = SID_AUTHENTICATION_AUTHORITY_ASSERTED_IDENTITY; break; case SAMBA_ASSERTED_IDENTITY_IGNORE: return NT_STATUS_OK; default: return NT_STATUS_INVALID_PARAMETER; } if (!dom_sid_parse(sid_str, &ai_sid)) { return NT_STATUS_UNSUCCESSFUL; } return add_sid_to_array_attrs_unique( user_info_dc, &ai_sid, SE_GROUP_DEFAULT_FLAGS, &user_info_dc->sids, &user_info_dc->num_sids); } NTSTATUS samba_kdc_add_claims_valid(enum samba_claims_valid claims_valid, struct auth_user_info_dc *user_info_dc) { switch (claims_valid) { case SAMBA_CLAIMS_VALID_EXCLUDE: return NT_STATUS_OK; case SAMBA_CLAIMS_VALID_INCLUDE: { struct dom_sid claims_valid_sid; if (!dom_sid_parse(SID_CLAIMS_VALID, &claims_valid_sid)) { return NT_STATUS_UNSUCCESSFUL; } return add_sid_to_array_attrs_unique( user_info_dc, &claims_valid_sid, SE_GROUP_DEFAULT_FLAGS, &user_info_dc->sids, &user_info_dc->num_sids); } } return NT_STATUS_INVALID_PARAMETER; } NTSTATUS samba_kdc_add_compounded_auth(enum samba_compounded_auth compounded_auth, struct auth_user_info_dc *user_info_dc) { switch (compounded_auth) { case SAMBA_COMPOUNDED_AUTH_EXCLUDE: return NT_STATUS_OK; case SAMBA_COMPOUNDED_AUTH_INCLUDE: { struct dom_sid compounded_auth_sid; if (!dom_sid_parse(SID_COMPOUNDED_AUTHENTICATION, &compounded_auth_sid)) { return NT_STATUS_UNSUCCESSFUL; } return add_sid_to_array_attrs_unique( user_info_dc, &compounded_auth_sid, SE_GROUP_DEFAULT_FLAGS, &user_info_dc->sids, &user_info_dc->num_sids); } } return NT_STATUS_INVALID_PARAMETER; } /* * Look up the user's info in the database and create a auth_user_info_dc * structure. If the resulting structure is not talloc_free()d, it will be * reused on future calls to this function. */ NTSTATUS samba_kdc_get_user_info_from_db(struct samba_kdc_entry *skdc_entry, const struct ldb_message *msg, const struct auth_user_info_dc **user_info_dc) { if (skdc_entry->user_info_dc == NULL) { NTSTATUS nt_status; struct loadparm_context *lp_ctx = skdc_entry->kdc_db_ctx->lp_ctx; nt_status = authsam_make_user_info_dc(skdc_entry, skdc_entry->kdc_db_ctx->samdb, lpcfg_netbios_name(lp_ctx), lpcfg_sam_name(lp_ctx), lpcfg_sam_dnsname(lp_ctx), skdc_entry->realm_dn, msg, data_blob_null, data_blob_null, &skdc_entry->user_info_dc); if (!NT_STATUS_IS_OK(nt_status)) { return nt_status; } } *user_info_dc = skdc_entry->user_info_dc; return NT_STATUS_OK; } NTSTATUS samba_kdc_get_logon_info_blob(TALLOC_CTX *mem_ctx, const struct auth_user_info_dc *user_info_dc, const enum auth_group_inclusion group_inclusion, DATA_BLOB **_logon_info_blob) { DATA_BLOB *logon_blob = NULL; NTSTATUS nt_status; *_logon_info_blob = NULL; logon_blob = talloc_zero(mem_ctx, DATA_BLOB); if (logon_blob == NULL) { return NT_STATUS_NO_MEMORY; } nt_status = samba_get_logon_info_pac_blob(logon_blob, user_info_dc, NULL, group_inclusion, logon_blob); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("Building PAC LOGON INFO failed: %s\n", nt_errstr(nt_status)); talloc_free(logon_blob); return nt_status; } *_logon_info_blob = logon_blob; return NT_STATUS_OK; } NTSTATUS samba_kdc_get_cred_ndr_blob(TALLOC_CTX *mem_ctx, const struct samba_kdc_entry *p, DATA_BLOB **_cred_ndr_blob) { DATA_BLOB *cred_blob = NULL; NTSTATUS nt_status; SMB_ASSERT(_cred_ndr_blob != NULL); *_cred_ndr_blob = NULL; cred_blob = talloc_zero(mem_ctx, DATA_BLOB); if (cred_blob == NULL) { return NT_STATUS_NO_MEMORY; } nt_status = samba_get_cred_info_ndr_blob(cred_blob, p->msg, cred_blob); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("Building PAC CRED INFO failed: %s\n", nt_errstr(nt_status)); talloc_free(cred_blob); return nt_status; } *_cred_ndr_blob = cred_blob; return NT_STATUS_OK; } NTSTATUS samba_kdc_get_upn_info_blob(TALLOC_CTX *mem_ctx, const struct auth_user_info_dc *user_info_dc, DATA_BLOB **_upn_info_blob) { DATA_BLOB *upn_blob = NULL; NTSTATUS nt_status; *_upn_info_blob = NULL; upn_blob = talloc_zero(mem_ctx, DATA_BLOB); if (upn_blob == NULL) { return NT_STATUS_NO_MEMORY; } nt_status = samba_get_upn_info_pac_blob(upn_blob, user_info_dc, upn_blob); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("Building PAC UPN INFO failed: %s\n", nt_errstr(nt_status)); talloc_free(upn_blob); return nt_status; } *_upn_info_blob = upn_blob; return NT_STATUS_OK; } NTSTATUS samba_kdc_get_pac_attrs_blob(TALLOC_CTX *mem_ctx, uint64_t pac_attributes, DATA_BLOB **_pac_attrs_blob) { DATA_BLOB *pac_attrs_blob = NULL; union PAC_INFO pac_attrs = {}; enum ndr_err_code ndr_err; NTSTATUS nt_status; SMB_ASSERT(_pac_attrs_blob != NULL); *_pac_attrs_blob = NULL; pac_attrs_blob = talloc_zero(mem_ctx, DATA_BLOB); if (pac_attrs_blob == NULL) { return NT_STATUS_NO_MEMORY; } /* Set the length of the flags in bits. */ pac_attrs.attributes_info.flags_length = 2; pac_attrs.attributes_info.flags = pac_attributes; ndr_err = ndr_push_union_blob(pac_attrs_blob, pac_attrs_blob, &pac_attrs, PAC_TYPE_ATTRIBUTES_INFO, (ndr_push_flags_fn_t)ndr_push_PAC_INFO); if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { nt_status = ndr_map_error2ntstatus(ndr_err); DBG_WARNING("PAC ATTRIBUTES_INFO (presig) push failed: %s\n", nt_errstr(nt_status)); DBG_ERR("Building PAC ATTRIBUTES failed: %s\n", nt_errstr(nt_status)); talloc_free(pac_attrs_blob); return nt_status; } *_pac_attrs_blob = pac_attrs_blob; return NT_STATUS_OK; } NTSTATUS samba_kdc_get_requester_sid_blob(TALLOC_CTX *mem_ctx, const struct auth_user_info_dc *user_info_dc, DATA_BLOB **_requester_sid_blob) { DATA_BLOB *requester_sid_blob = NULL; NTSTATUS nt_status; SMB_ASSERT(_requester_sid_blob != NULL); *_requester_sid_blob = NULL; requester_sid_blob = talloc_zero(mem_ctx, DATA_BLOB); if (requester_sid_blob == NULL) { return NT_STATUS_NO_MEMORY; } if (user_info_dc->num_sids > 0) { union PAC_INFO pac_requester_sid = {}; enum ndr_err_code ndr_err; pac_requester_sid.requester_sid.sid = user_info_dc->sids[PRIMARY_USER_SID_INDEX].sid; ndr_err = ndr_push_union_blob(requester_sid_blob, requester_sid_blob, &pac_requester_sid, PAC_TYPE_REQUESTER_SID, (ndr_push_flags_fn_t)ndr_push_PAC_INFO); if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { nt_status = ndr_map_error2ntstatus(ndr_err); DBG_WARNING("PAC_REQUESTER_SID (presig) push failed: %s\n", nt_errstr(nt_status)); DBG_ERR("Building PAC REQUESTER SID failed: %s\n", nt_errstr(nt_status)); talloc_free(requester_sid_blob); return nt_status; } } *_requester_sid_blob = requester_sid_blob; return NT_STATUS_OK; } NTSTATUS samba_kdc_get_claims_blob(TALLOC_CTX *mem_ctx, const struct samba_kdc_entry *p, const DATA_BLOB **_claims_blob) { DATA_BLOB *claims_blob = NULL; NTSTATUS nt_status; int ret; SMB_ASSERT(_claims_blob != NULL); *_claims_blob = NULL; claims_blob = talloc_zero(mem_ctx, DATA_BLOB); if (claims_blob == NULL) { return NT_STATUS_NO_MEMORY; } ret = get_claims_blob_for_principal(p->kdc_db_ctx->samdb, claims_blob, p->msg, claims_blob); if (ret != LDB_SUCCESS) { nt_status = dsdb_ldb_err_to_ntstatus(ret); DBG_ERR("Building claims failed: %s\n", nt_errstr(nt_status)); talloc_free(claims_blob); return nt_status; } *_claims_blob = claims_blob; return NT_STATUS_OK; } NTSTATUS samba_kdc_get_user_info_dc(TALLOC_CTX *mem_ctx, struct samba_kdc_entry *skdc_entry, enum samba_asserted_identity asserted_identity, enum samba_claims_valid claims_valid, enum samba_compounded_auth compounded_auth, struct auth_user_info_dc **user_info_dc_out) { NTSTATUS nt_status; const struct auth_user_info_dc *user_info_dc_from_db = NULL; struct auth_user_info_dc *user_info_dc = NULL; nt_status = samba_kdc_get_user_info_from_db(skdc_entry, skdc_entry->msg, &user_info_dc_from_db); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("Getting user info for PAC failed: %s\n", nt_errstr(nt_status)); return nt_status; } /* Make a shallow copy of the user_info_dc structure. */ nt_status = authsam_shallow_copy_user_info_dc(mem_ctx, user_info_dc_from_db, &user_info_dc); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("Failed to allocate user_info_dc SIDs: %s\n", nt_errstr(nt_status)); return nt_status; } /* Here we modify the SIDs to add the Asserted Identity SID. */ nt_status = samba_kdc_add_asserted_identity(asserted_identity, user_info_dc); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("Failed to add asserted identity: %s\n", nt_errstr(nt_status)); return nt_status; } nt_status = samba_kdc_add_claims_valid(claims_valid, user_info_dc); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("Failed to add Claims Valid: %s\n", nt_errstr(nt_status)); return nt_status; } nt_status = samba_kdc_add_compounded_auth(compounded_auth, user_info_dc); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("Failed to add Compounded Authentication: %s\n", nt_errstr(nt_status)); return nt_status; } *user_info_dc_out = user_info_dc; return NT_STATUS_OK; } static krb5_error_code samba_kdc_obtain_user_info_dc(TALLOC_CTX *mem_ctx, krb5_context context, struct ldb_context *samdb, const enum auth_group_inclusion group_inclusion, struct samba_kdc_entry *skdc_entry, const krb5_const_pac pac, const bool pac_is_trusted, struct auth_user_info_dc **user_info_dc_out, struct PAC_DOMAIN_GROUP_MEMBERSHIP **resource_groups_out) { struct auth_user_info_dc *user_info_dc = NULL; krb5_error_code ret = 0; NTSTATUS nt_status; *user_info_dc_out = NULL; if (resource_groups_out != NULL) { *resource_groups_out = NULL; } if (pac != NULL && pac_is_trusted) { struct PAC_DOMAIN_GROUP_MEMBERSHIP **resource_groups = NULL; if (group_inclusion == AUTH_EXCLUDE_RESOURCE_GROUPS) { /* * Since we are creating a TGT, resource groups from our domain * are not to be put into the PAC. Instead, we take the resource * groups directly from the original PAC and copy them * unmodified into the new one. */ resource_groups = resource_groups_out; } ret = kerberos_pac_to_user_info_dc(mem_ctx, pac, context, &user_info_dc, AUTH_EXCLUDE_RESOURCE_GROUPS, NULL, NULL, resource_groups); if (ret) { const char *krb5err = krb5_get_error_message(context, ret); DBG_ERR("kerberos_pac_to_user_info_dc failed: %s\n", krb5err != NULL ? krb5err : "?"); krb5_free_error_message(context, krb5err); goto out; } /* * We need to expand group memberships within our local domain, * as the token might be generated by a trusted domain. */ nt_status = authsam_update_user_info_dc(mem_ctx, samdb, user_info_dc); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("authsam_update_user_info_dc failed: %s\n", nt_errstr(nt_status)); ret = map_errno_from_nt_status(nt_status); goto out; } } else { if (skdc_entry == NULL) { ret = KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN; goto out; } /* * In this case the RWDC discards the PAC an RODC generated. * Windows adds the asserted_identity in this case too. * * Note that SAMBA_KDC_FLAG_CONSTRAINED_DELEGATION * generates KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN. * So we can always use * SAMBA_ASSERTED_IDENTITY_AUTHENTICATION_AUTHORITY * here. */ nt_status = samba_kdc_get_user_info_dc(mem_ctx, skdc_entry, SAMBA_ASSERTED_IDENTITY_AUTHENTICATION_AUTHORITY, SAMBA_CLAIMS_VALID_EXCLUDE, SAMBA_COMPOUNDED_AUTH_EXCLUDE, &user_info_dc); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("samba_kdc_get_user_info_dc failed: %s\n", nt_errstr(nt_status)); ret = KRB5KDC_ERR_TGT_REVOKED; goto out; } } *user_info_dc_out = user_info_dc; user_info_dc = NULL; out: TALLOC_FREE(user_info_dc); return ret; } static NTSTATUS samba_kdc_update_delegation_info_blob(TALLOC_CTX *mem_ctx, krb5_context context, const krb5_const_pac pac, const krb5_const_principal server_principal, const krb5_const_principal proxy_principal, DATA_BLOB *new_blob) { krb5_data old_data = {}; DATA_BLOB old_blob; krb5_error_code ret; NTSTATUS nt_status = NT_STATUS_OK; enum ndr_err_code ndr_err; union PAC_INFO info = {}; struct PAC_CONSTRAINED_DELEGATION _d = {}; struct PAC_CONSTRAINED_DELEGATION *d = NULL; char *server = NULL; char *proxy = NULL; uint32_t i; TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx); if (tmp_ctx == NULL) { nt_status = NT_STATUS_NO_MEMORY; goto out; } ret = krb5_pac_get_buffer(context, pac, PAC_TYPE_CONSTRAINED_DELEGATION, &old_data); if (ret == ENOENT) { /* OK. */ } else if (ret) { nt_status = NT_STATUS_UNSUCCESSFUL; goto out; } old_blob.length = old_data.length; old_blob.data = (uint8_t *)old_data.data; if (old_blob.length > 0) { ndr_err = ndr_pull_union_blob(&old_blob, tmp_ctx, &info, PAC_TYPE_CONSTRAINED_DELEGATION, (ndr_pull_flags_fn_t)ndr_pull_PAC_INFO); if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { smb_krb5_free_data_contents(context, &old_data); nt_status = ndr_map_error2ntstatus(ndr_err); DBG_ERR("can't parse the PAC LOGON_INFO: %s\n", nt_errstr(nt_status)); goto out; } } else { info.constrained_delegation.info = &_d; } smb_krb5_free_data_contents(context, &old_data); ret = krb5_unparse_name_flags(context, server_principal, KRB5_PRINCIPAL_UNPARSE_NO_REALM, &server); if (ret) { nt_status = NT_STATUS_INTERNAL_ERROR; goto out; } ret = krb5_unparse_name(context, proxy_principal, &proxy); if (ret) { SAFE_FREE(server); nt_status = NT_STATUS_INTERNAL_ERROR; goto out; } d = info.constrained_delegation.info; i = d->num_transited_services; d->proxy_target.string = server; d->transited_services = talloc_realloc(mem_ctx, d->transited_services, struct lsa_String, i + 1); if (d->transited_services == NULL) { SAFE_FREE(server); SAFE_FREE(proxy); nt_status = NT_STATUS_INTERNAL_ERROR; goto out; } d->transited_services[i].string = proxy; d->num_transited_services = i + 1; ndr_err = ndr_push_union_blob(new_blob, mem_ctx, &info, PAC_TYPE_CONSTRAINED_DELEGATION, (ndr_push_flags_fn_t)ndr_push_PAC_INFO); SAFE_FREE(server); SAFE_FREE(proxy); if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { smb_krb5_free_data_contents(context, &old_data); nt_status = ndr_map_error2ntstatus(ndr_err); DBG_ERR("can't parse the PAC LOGON_INFO: %s\n", nt_errstr(nt_status)); goto out; } out: talloc_free(tmp_ctx); return nt_status; } /* function to map policy errors */ krb5_error_code samba_kdc_map_policy_err(NTSTATUS nt_status) { krb5_error_code ret; if (NT_STATUS_EQUAL(nt_status, NT_STATUS_PASSWORD_MUST_CHANGE)) ret = KRB5KDC_ERR_KEY_EXP; else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_PASSWORD_EXPIRED)) ret = KRB5KDC_ERR_KEY_EXP; else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_EXPIRED)) ret = KRB5KDC_ERR_CLIENT_REVOKED; else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_DISABLED)) ret = KRB5KDC_ERR_CLIENT_REVOKED; else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_LOGON_HOURS)) ret = KRB5KDC_ERR_CLIENT_REVOKED; else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCOUNT_LOCKED_OUT)) ret = KRB5KDC_ERR_CLIENT_REVOKED; else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_INVALID_WORKSTATION)) ret = KRB5KDC_ERR_POLICY; else ret = KRB5KDC_ERR_POLICY; return ret; } /* Given a kdc entry, consult the account_ok routine in auth/auth_sam.c * for consistency */ NTSTATUS samba_kdc_check_client_access(struct samba_kdc_entry *kdc_entry, const char *client_name, const char *workstation, bool password_change) { TALLOC_CTX *tmp_ctx; NTSTATUS nt_status; tmp_ctx = talloc_named(NULL, 0, "samba_kdc_check_client_access"); if (!tmp_ctx) { return NT_STATUS_NO_MEMORY; } /* we allow all kinds of trusts here */ nt_status = authsam_account_ok(tmp_ctx, kdc_entry->kdc_db_ctx->samdb, MSV1_0_ALLOW_SERVER_TRUST_ACCOUNT | MSV1_0_ALLOW_WORKSTATION_TRUST_ACCOUNT, kdc_entry->realm_dn, kdc_entry->msg, workstation, client_name, true, password_change); kdc_entry->reject_status = nt_status; talloc_free(tmp_ctx); return nt_status; } static krb5_error_code samba_get_requester_sid(TALLOC_CTX *mem_ctx, krb5_const_pac pac, krb5_context context, struct dom_sid *sid) { NTSTATUS nt_status; enum ndr_err_code ndr_err; krb5_error_code ret = 0; DATA_BLOB pac_requester_sid_in; krb5_data k5pac_requester_sid_in; union PAC_INFO info; TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx); if (tmp_ctx == NULL) { ret = ENOMEM; goto out; } ret = krb5_pac_get_buffer(context, pac, PAC_TYPE_REQUESTER_SID, &k5pac_requester_sid_in); if (ret != 0) { goto out; } pac_requester_sid_in = data_blob_const(k5pac_requester_sid_in.data, k5pac_requester_sid_in.length); ndr_err = ndr_pull_union_blob(&pac_requester_sid_in, tmp_ctx, &info, PAC_TYPE_REQUESTER_SID, (ndr_pull_flags_fn_t)ndr_pull_PAC_INFO); smb_krb5_free_data_contents(context, &k5pac_requester_sid_in); if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { nt_status = ndr_map_error2ntstatus(ndr_err); DBG_ERR("can't parse the PAC REQUESTER_SID: %s\n", nt_errstr(nt_status)); ret = map_errno_from_nt_status(nt_status); goto out; } *sid = info.requester_sid.sid; out: talloc_free(tmp_ctx); return ret; } /* Does a parse and SID check, but no crypto. */ static krb5_error_code samba_kdc_validate_pac_blob( krb5_context context, const struct samba_kdc_entry *client_skdc_entry, const krb5_const_pac pac) { TALLOC_CTX *frame = talloc_stackframe(); struct auth_user_info_dc *pac_user_info = NULL; struct dom_sid client_sid; struct dom_sid pac_sid; krb5_error_code code; bool ok; /* * First, try to get the SID from the requester SID buffer in the PAC. */ code = samba_get_requester_sid(frame, pac, context, &pac_sid); if (code == ENOENT) { /* * If the requester SID buffer isn't present, fall back to the * SID in the LOGON_INFO PAC buffer. */ code = kerberos_pac_to_user_info_dc(frame, pac, context, &pac_user_info, AUTH_EXCLUDE_RESOURCE_GROUPS, NULL, NULL, NULL); if (code != 0) { goto out; } if (pac_user_info->num_sids == 0) { code = EINVAL; goto out; } pac_sid = pac_user_info->sids[PRIMARY_USER_SID_INDEX].sid; } else if (code != 0) { goto out; } code = samdb_result_dom_sid_buf(client_skdc_entry->msg, "objectSid", &client_sid); if (code) { goto out; } ok = dom_sid_equal(&pac_sid, &client_sid); if (!ok) { struct dom_sid_buf buf1; struct dom_sid_buf buf2; DBG_ERR("SID mismatch between PAC and looked up client: " "PAC[%s] != CLI[%s]\n", dom_sid_str_buf(&pac_sid, &buf1), dom_sid_str_buf(&client_sid, &buf2)); code = KRB5KDC_ERR_TGT_REVOKED; goto out; } code = 0; out: TALLOC_FREE(frame); return code; } /* * In the RODC case, to confirm that the returned user is permitted to * be replicated to the KDC (krbgtgt_xxx user) represented by *rodc */ static WERROR samba_rodc_confirm_user_is_allowed(uint32_t num_object_sids, const struct dom_sid *object_sids, const struct samba_kdc_entry *rodc, const struct samba_kdc_entry *object) { int ret; WERROR werr; TALLOC_CTX *frame = talloc_stackframe(); const char *rodc_attrs[] = { "msDS-KrbTgtLink", "msDS-NeverRevealGroup", "msDS-RevealOnDemandGroup", "userAccountControl", "objectSid", NULL }; struct ldb_result *rodc_machine_account = NULL; struct ldb_dn *rodc_machine_account_dn = samdb_result_dn(rodc->kdc_db_ctx->samdb, frame, rodc->msg, "msDS-KrbTgtLinkBL", NULL); const struct dom_sid *rodc_machine_account_sid = NULL; if (rodc_machine_account_dn == NULL) { DBG_ERR("krbtgt account %s has no msDS-KrbTgtLinkBL to find RODC machine account for allow/deny list\n", ldb_dn_get_linearized(rodc->msg->dn)); TALLOC_FREE(frame); return WERR_DOMAIN_CONTROLLER_NOT_FOUND; } /* * Follow the link and get the RODC account (the krbtgt * account is the krbtgt_XXX account, but the * msDS-NeverRevealGroup and msDS-RevealOnDemandGroup is on * the RODC$ account) * * We need DSDB_SEARCH_SHOW_EXTENDED_DN as we get a SID lists * out of the extended DNs */ ret = dsdb_search_dn(rodc->kdc_db_ctx->samdb, frame, &rodc_machine_account, rodc_machine_account_dn, rodc_attrs, DSDB_SEARCH_SHOW_EXTENDED_DN); if (ret != LDB_SUCCESS) { DBG_ERR("Failed to fetch RODC machine account %s pointed to by %s to check allow/deny list: %s\n", ldb_dn_get_linearized(rodc_machine_account_dn), ldb_dn_get_linearized(rodc->msg->dn), ldb_errstring(rodc->kdc_db_ctx->samdb)); TALLOC_FREE(frame); return WERR_DOMAIN_CONTROLLER_NOT_FOUND; } if (rodc_machine_account->count != 1) { DBG_ERR("Failed to fetch RODC machine account %s pointed to by %s to check allow/deny list: (%d)\n", ldb_dn_get_linearized(rodc_machine_account_dn), ldb_dn_get_linearized(rodc->msg->dn), rodc_machine_account->count); TALLOC_FREE(frame); return WERR_DS_DRA_BAD_DN; } /* if the object SID is equal to the user_sid, allow */ rodc_machine_account_sid = samdb_result_dom_sid(frame, rodc_machine_account->msgs[0], "objectSid"); if (rodc_machine_account_sid == NULL) { TALLOC_FREE(frame); return WERR_DS_DRA_BAD_DN; } werr = samdb_confirm_rodc_allowed_to_repl_to_sid_list(rodc->kdc_db_ctx->samdb, rodc_machine_account_sid, rodc_machine_account->msgs[0], object->msg, num_object_sids, object_sids); TALLOC_FREE(frame); return werr; } /* * Perform an access check for the client attempting to authenticate to the * server. ‘client_info’ must be talloc-allocated so that we can make a * reference to it. */ krb5_error_code samba_kdc_allowed_to_authenticate_to(TALLOC_CTX *mem_ctx, struct ldb_context *samdb, struct loadparm_context *lp_ctx, const struct samba_kdc_entry *client, const struct auth_user_info_dc *client_info, const struct samba_kdc_entry *server, struct authn_audit_info **server_audit_info_out, NTSTATUS *status_out) { krb5_error_code ret = 0; NTSTATUS status; _UNUSED_ NTSTATUS _status; struct dom_sid server_sid = {}; const struct authn_server_policy *server_policy = server->server_policy; if (status_out != NULL) { *status_out = NT_STATUS_OK; } ret = samdb_result_dom_sid_buf(server->msg, "objectSid", &server_sid); if (ret) { /* * Ignore the return status — we are already in an error path, * and overwriting the real error code with the audit info * status is unhelpful. */ _status = authn_server_policy_audit_info(mem_ctx, server_policy, client_info, AUTHN_AUDIT_EVENT_OTHER_ERROR, AUTHN_AUDIT_REASON_NONE, dsdb_ldb_err_to_ntstatus(ret), server_audit_info_out); goto out; } if (dom_sid_equal(&client_info->sids[PRIMARY_USER_SID_INDEX].sid, &server_sid)) { /* Authenticating to ourselves is always allowed. */ status = authn_server_policy_audit_info(mem_ctx, server_policy, client_info, AUTHN_AUDIT_EVENT_OK, AUTHN_AUDIT_REASON_NONE, NT_STATUS_OK, server_audit_info_out); if (!NT_STATUS_IS_OK(status)) { ret = KRB5KRB_ERR_GENERIC; } goto out; } status = authn_policy_authenticate_to_service(mem_ctx, samdb, lp_ctx, AUTHN_POLICY_AUTH_TYPE_KERBEROS, client_info, server_policy, server_audit_info_out); if (!NT_STATUS_IS_OK(status)) { if (status_out != NULL) { *status_out = status; } if (NT_STATUS_EQUAL(status, NT_STATUS_AUTHENTICATION_FIREWALL_FAILED)) { ret = KRB5KDC_ERR_POLICY; } else if (NT_STATUS_EQUAL(status, NT_STATUS_INVALID_PARAMETER)) { ret = KRB5KDC_ERR_POLICY; } else { ret = KRB5KRB_ERR_GENERIC; } } out: return ret; } static krb5_error_code samba_kdc_add_domain_group_sid(struct PAC_DEVICE_INFO *info, const struct netr_SidAttr *sid) { uint32_t i; uint32_t rid; NTSTATUS status; uint32_t domain_group_count = info->domain_group_count; struct PAC_DOMAIN_GROUP_MEMBERSHIP *domain_group = NULL; struct samr_RidWithAttribute *rids = NULL; for (i = 0; i < domain_group_count; ++i) { struct PAC_DOMAIN_GROUP_MEMBERSHIP *this_domain_group = &info->domain_groups[i]; if (dom_sid_in_domain(this_domain_group->domain_sid, sid->sid)) { domain_group = this_domain_group; break; } } if (domain_group == NULL) { struct PAC_DOMAIN_GROUP_MEMBERSHIP *domain_groups = NULL; if (domain_group_count == UINT32_MAX) { return EINVAL; } domain_groups = talloc_realloc( info, info->domain_groups, struct PAC_DOMAIN_GROUP_MEMBERSHIP, domain_group_count + 1); if (domain_groups == NULL) { return ENOMEM; } info->domain_groups = domain_groups; domain_group = &info->domain_groups[domain_group_count++]; *domain_group = (struct PAC_DOMAIN_GROUP_MEMBERSHIP) {}; status = dom_sid_split_rid(info->domain_groups, sid->sid, &domain_group->domain_sid, &rid); if (!NT_STATUS_IS_OK(status)) { return map_errno_from_nt_status(status); } } else { status = dom_sid_split_rid(NULL, sid->sid, NULL, &rid); if (!NT_STATUS_IS_OK(status)) { return map_errno_from_nt_status(status); } } if (domain_group->groups.count == UINT32_MAX) { return EINVAL; } rids = talloc_realloc(info->domain_groups, domain_group->groups.rids, struct samr_RidWithAttribute, domain_group->groups.count + 1); if (rids == NULL) { return ENOMEM; } domain_group->groups.rids = rids; domain_group->groups.rids[domain_group->groups.count] = (struct samr_RidWithAttribute) { .rid = rid, .attributes = sid->attributes, }; ++domain_group->groups.count; info->domain_group_count = domain_group_count; return 0; } static krb5_error_code samba_kdc_make_device_info(TALLOC_CTX *mem_ctx, const struct netr_SamInfo3 *info3, struct PAC_DOMAIN_GROUP_MEMBERSHIP *resource_groups, union PAC_INFO *info) { struct PAC_DEVICE_INFO *device_info = NULL; uint32_t i; krb5_error_code ret = 0; *info = (union PAC_INFO) {}; info->device_info.info = NULL; device_info = talloc(mem_ctx, struct PAC_DEVICE_INFO); if (device_info == NULL) { ret = ENOMEM; goto out; } device_info->rid = info3->base.rid; device_info->primary_gid = info3->base.primary_gid; device_info->domain_sid = info3->base.domain_sid; device_info->groups = info3->base.groups; device_info->sid_count = 0; device_info->sids = NULL; if (resource_groups != NULL) { /* * The account's resource groups all belong to the same domain, * so we can add them all in one go. */ device_info->domain_group_count = 1; device_info->domain_groups = talloc_move(mem_ctx, &resource_groups); } else { device_info->domain_group_count = 0; device_info->domain_groups = NULL; } for (i = 0; i < info3->sidcount; ++i) { const struct netr_SidAttr *device_sid = &info3->sids[i]; if (dom_sid_has_account_domain(device_sid->sid)) { ret = samba_kdc_add_domain_group_sid(device_info, device_sid); if (ret != 0) { goto out; } } else { device_info->sids = talloc_realloc(mem_ctx, device_info->sids, struct netr_SidAttr, device_info->sid_count + 1); if (device_info->sids == NULL) { ret = ENOMEM; goto out; } device_info->sids[device_info->sid_count].sid = dom_sid_dup(device_info->sids, device_sid->sid); if (device_info->sids[device_info->sid_count].sid == NULL) { ret = ENOMEM; goto out; } device_info->sids[device_info->sid_count].attributes = device_sid->attributes; ++device_info->sid_count; } } info->device_info.info = device_info; out: return ret; } static krb5_error_code samba_kdc_update_device_info(TALLOC_CTX *mem_ctx, struct ldb_context *samdb, const union PAC_INFO *logon_info, struct PAC_DEVICE_INFO *device_info) { NTSTATUS nt_status; struct auth_user_info_dc *device_info_dc = NULL; union netr_Validation validation; uint32_t i; uint32_t num_existing_sids; /* * This does a bit of unnecessary work, setting up fields we don't care * about -- we only want the SIDs. */ validation.sam3 = &logon_info->logon_info.info->info3; nt_status = make_user_info_dc_netlogon_validation(mem_ctx, "", 3, &validation, true, /* This user was authenticated */ &device_info_dc); if (!NT_STATUS_IS_OK(nt_status)) { return map_errno_from_nt_status(nt_status); } num_existing_sids = device_info_dc->num_sids; /* * We need to expand group memberships within our local domain, * as the token might be generated by a trusted domain. */ nt_status = authsam_update_user_info_dc(mem_ctx, samdb, device_info_dc); if (!NT_STATUS_IS_OK(nt_status)) { return map_errno_from_nt_status(nt_status); } for (i = num_existing_sids; i < device_info_dc->num_sids; ++i) { struct auth_SidAttr *device_sid = &device_info_dc->sids[i]; const struct netr_SidAttr sid = (struct netr_SidAttr) { .sid = &device_sid->sid, .attributes = device_sid->attrs, }; krb5_error_code ret = samba_kdc_add_domain_group_sid(device_info, &sid); if (ret != 0) { return ret; } } return 0; } static krb5_error_code samba_kdc_get_device_info_pac_blob(TALLOC_CTX *mem_ctx, union PAC_INFO *info, DATA_BLOB **_device_info_blob) { DATA_BLOB *device_info_blob = NULL; enum ndr_err_code ndr_err; *_device_info_blob = NULL; device_info_blob = talloc_zero(mem_ctx, DATA_BLOB); if (device_info_blob == NULL) { DBG_ERR("Out of memory\n"); return ENOMEM; } ndr_err = ndr_push_union_blob(device_info_blob, device_info_blob, info, PAC_TYPE_DEVICE_INFO, (ndr_push_flags_fn_t)ndr_push_PAC_INFO); if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { NTSTATUS nt_status = ndr_map_error2ntstatus(ndr_err); DBG_WARNING("PAC_DEVICE_INFO (presig) push failed: %s\n", nt_errstr(nt_status)); talloc_free(device_info_blob); return map_errno_from_nt_status(nt_status); } *_device_info_blob = device_info_blob; return 0; } static krb5_error_code samba_kdc_create_device_info_blob(TALLOC_CTX *mem_ctx, krb5_context context, struct ldb_context *samdb, const krb5_const_pac device_pac, DATA_BLOB **device_info_blob) { TALLOC_CTX *frame = NULL; krb5_data device_logon_info; krb5_error_code code = EINVAL; NTSTATUS nt_status; union PAC_INFO info; enum ndr_err_code ndr_err; DATA_BLOB device_logon_info_blob; union PAC_INFO logon_info; code = krb5_pac_get_buffer(context, device_pac, PAC_TYPE_LOGON_INFO, &device_logon_info); if (code != 0) { if (code == ENOENT) { DBG_ERR("Device PAC is missing LOGON_INFO\n"); } else { DBG_ERR("Error getting LOGON_INFO from device PAC\n"); } return code; } frame = talloc_stackframe(); device_logon_info_blob = data_blob_const(device_logon_info.data, device_logon_info.length); ndr_err = ndr_pull_union_blob(&device_logon_info_blob, frame, &logon_info, PAC_TYPE_LOGON_INFO, (ndr_pull_flags_fn_t)ndr_pull_PAC_INFO); smb_krb5_free_data_contents(context, &device_logon_info); if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { nt_status = ndr_map_error2ntstatus(ndr_err); DBG_ERR("can't parse device PAC LOGON_INFO: %s\n", nt_errstr(nt_status)); talloc_free(frame); return map_errno_from_nt_status(nt_status); } /* * When creating the device info structure, existing resource groups are * discarded. */ code = samba_kdc_make_device_info(frame, &logon_info.logon_info.info->info3, NULL, /* resource_groups */ &info); if (code != 0) { talloc_free(frame); return code; } code = samba_kdc_update_device_info(frame, samdb, &logon_info, info.device_info.info); if (code != 0) { talloc_free(frame); return code; } code = samba_kdc_get_device_info_pac_blob(mem_ctx, &info, device_info_blob); talloc_free(frame); return code; } static krb5_error_code samba_kdc_get_device_info_blob(TALLOC_CTX *mem_ctx, struct samba_kdc_entry *device, DATA_BLOB **device_info_blob) { TALLOC_CTX *frame = NULL; krb5_error_code code = EINVAL; NTSTATUS nt_status; struct auth_user_info_dc *device_info_dc = NULL; struct netr_SamInfo3 *info3 = NULL; struct PAC_DOMAIN_GROUP_MEMBERSHIP *resource_groups = NULL; union PAC_INFO info; frame = talloc_stackframe(); nt_status = samba_kdc_get_user_info_dc(frame, device, SAMBA_ASSERTED_IDENTITY_AUTHENTICATION_AUTHORITY, SAMBA_CLAIMS_VALID_INCLUDE, SAMBA_COMPOUNDED_AUTH_EXCLUDE, &device_info_dc); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("samba_kdc_get_user_info_dc failed: %s\n", nt_errstr(nt_status)); talloc_free(frame); return KRB5KDC_ERR_TGT_REVOKED; } nt_status = auth_convert_user_info_dc_saminfo3(frame, device_info_dc, AUTH_INCLUDE_RESOURCE_GROUPS_COMPRESSED, &info3, &resource_groups); if (!NT_STATUS_IS_OK(nt_status)) { DBG_WARNING("Getting Samba info failed: %s\n", nt_errstr(nt_status)); talloc_free(frame); return nt_status_to_krb5(nt_status); } code = samba_kdc_make_device_info(frame, info3, resource_groups, &info); if (code != 0) { talloc_free(frame); return code; } code = samba_kdc_get_device_info_pac_blob(mem_ctx, &info, device_info_blob); talloc_free(frame); return code; } /** * @brief Verify a PAC * * @param mem_ctx A talloc memory context * * @param context A krb5 context * * @param flags Bitwise OR'ed flags * * @param client The client samba kdc entry. * @param krbtgt The krbtgt samba kdc entry. * * @param device The computer's samba kdc entry; used for compound * authentication. * @param device_pac The PAC from the computer's TGT; used * for compound authentication. * @param pac The PAC * @return A Kerberos error code. */ krb5_error_code samba_kdc_verify_pac(TALLOC_CTX *mem_ctx, krb5_context context, uint32_t flags, struct samba_kdc_entry *client, const struct samba_kdc_entry *krbtgt, const struct samba_kdc_entry *device, const krb5_const_pac *device_pac, const krb5_const_pac pac) { krb5_error_code code = EINVAL; NTSTATUS nt_status; bool is_trusted = flags & SAMBA_KDC_FLAG_KRBTGT_IS_TRUSTED; struct pac_blobs pac_blobs; pac_blobs_init(&pac_blobs); if (client != NULL) { /* * Check the objectSID of the client and pac data are the same. * Does a parse and SID check, but no crypto. */ code = samba_kdc_validate_pac_blob(context, client, pac); if (code != 0) { goto done; } } if (device != NULL) { SMB_ASSERT(*device_pac != NULL); /* * Check the objectSID of the device and pac data are the same. * Does a parse and SID check, but no crypto. */ code = samba_kdc_validate_pac_blob(context, device, *device_pac); if (code != 0) { goto done; } } if (!is_trusted) { const struct auth_user_info_dc *user_info_dc = NULL; WERROR werr; struct dom_sid *object_sids = NULL; uint32_t j; if (client == NULL) { code = KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN; goto done; } nt_status = samba_kdc_get_user_info_from_db(client, client->msg, &user_info_dc); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("Getting user info for PAC failed: %s\n", nt_errstr(nt_status)); code = KRB5KDC_ERR_TGT_REVOKED; goto done; } /* * Check if the SID list in the user_info_dc intersects * correctly with the RODC allow/deny lists. */ object_sids = talloc_array(mem_ctx, struct dom_sid, user_info_dc->num_sids); if (object_sids == NULL) { code = ENOMEM; goto done; } for (j = 0; j < user_info_dc->num_sids; ++j) { object_sids[j] = user_info_dc->sids[j].sid; } werr = samba_rodc_confirm_user_is_allowed(user_info_dc->num_sids, object_sids, krbtgt, client); TALLOC_FREE(object_sids); if (!W_ERROR_IS_OK(werr)) { code = KRB5KDC_ERR_TGT_REVOKED; if (W_ERROR_EQUAL(werr, WERR_DOMAIN_CONTROLLER_NOT_FOUND)) { code = KRB5KDC_ERR_POLICY; } goto done; } /* * The RODC PAC data isn't trusted for authorization as it may * be stale. The only thing meaningful we can do with an RODC * account on a full DC is exchange the RODC TGT for a 'real' * TGT. * * So we match Windows (at least server 2022) and * don't allow S4U2Self. * * https://lists.samba.org/archive/cifs-protocol/2022-April/003673.html */ if (flags & SAMBA_KDC_FLAG_PROTOCOL_TRANSITION) { code = KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN; goto done; } } /* Check the types of the given PAC */ code = pac_blobs_from_krb5_pac(&pac_blobs, mem_ctx, context, pac); if (code != 0) { goto done; } code = pac_blobs_ensure_exists(&pac_blobs, PAC_TYPE_LOGON_INFO); if (code != 0) { goto done; } code = pac_blobs_ensure_exists(&pac_blobs, PAC_TYPE_LOGON_NAME); if (code != 0) { goto done; } code = pac_blobs_ensure_exists(&pac_blobs, PAC_TYPE_SRV_CHECKSUM); if (code != 0) { goto done; } code = pac_blobs_ensure_exists(&pac_blobs, PAC_TYPE_KDC_CHECKSUM); if (code != 0) { goto done; } if (!(flags & SAMBA_KDC_FLAG_CONSTRAINED_DELEGATION)) { code = pac_blobs_ensure_exists(&pac_blobs, PAC_TYPE_REQUESTER_SID); if (code != 0) { code = KRB5KDC_ERR_TGT_REVOKED; goto done; } } code = 0; done: pac_blobs_destroy(&pac_blobs); return code; } /** * @brief Update a PAC * * @param mem_ctx A talloc memory context * * @param context A krb5 context * * @param samdb An open samdb connection. * * @param lp_ctx A loadparm context. * * @param flags Bitwise OR'ed flags * * @param device_pac_is_trusted Whether the device's PAC was issued by a trusted server, * as opposed to an RODC. * * @param client The client samba kdc entry. * * @param client_krbtgt The krbtgt samba kdc entry that verified the client * * @param server_principal The server principal * * @param server The server samba kdc entry. * * @param delegated_proxy_principal The delegated proxy principal used for * updating the constrained delegation PAC * buffer. * * @param delegated_proxy The delegated proxy kdc entry. * * @param delegated_proxy_pac The PAC from the primary TGT (i.e., that of * the delegating service) during a constrained * delegation request. * * @param device The computer's samba kdc entry; used for compound * authentication. * * @param device_krbtgt The krbtgt samba kdc entry that verified the device * * @param device_pac The PAC from the computer's TGT; used * for compound authentication. * * @param old_pac The old PAC * * @param new_pac The new already allocated PAC * * @return A Kerberos error code. If no PAC should be returned, the code will be * ENOATTR! */ krb5_error_code samba_kdc_update_pac(TALLOC_CTX *mem_ctx, krb5_context context, struct ldb_context *samdb, struct loadparm_context *lp_ctx, uint32_t flags, const struct samba_kdc_entry *client_krbtgt, struct samba_kdc_entry *client, const krb5_const_principal server_principal, const struct samba_kdc_entry *server, const krb5_const_principal delegated_proxy_principal, struct samba_kdc_entry *delegated_proxy, const krb5_const_pac delegated_proxy_pac, const struct samba_kdc_entry *device_krbtgt, struct samba_kdc_entry *device, const krb5_const_pac device_pac, const krb5_const_pac old_pac, krb5_pac new_pac, struct authn_audit_info **server_audit_info_out, NTSTATUS *status_out) { krb5_error_code code = EINVAL; NTSTATUS nt_status; DATA_BLOB *pac_blob = NULL; DATA_BLOB *upn_blob = NULL; DATA_BLOB *deleg_blob = NULL; DATA_BLOB *requester_sid_blob = NULL; const DATA_BLOB *client_claims_blob = NULL; bool client_pac_is_trusted = flags & SAMBA_KDC_FLAG_KRBTGT_IS_TRUSTED; bool device_pac_is_trusted = flags & SAMBA_KDC_FLAG_DEVICE_KRBTGT_IS_TRUSTED; bool delegated_proxy_pac_is_trusted = flags & SAMBA_KDC_FLAG_DELEGATED_PROXY_IS_TRUSTED; const DATA_BLOB *device_claims_blob = NULL; DATA_BLOB *device_info_blob = NULL; bool is_tgs = false; struct auth_user_info_dc *user_info_dc = NULL; struct PAC_DOMAIN_GROUP_MEMBERSHIP *_resource_groups = NULL; enum auth_group_inclusion group_inclusion; enum samba_compounded_auth compounded_auth; size_t i = 0; struct pac_blobs pac_blobs; pac_blobs_init(&pac_blobs); if (server_audit_info_out != NULL) { *server_audit_info_out = NULL; } if (status_out != NULL) { *status_out = NT_STATUS_OK; } { int result = smb_krb5_principal_is_tgs(context, server_principal); if (result == -1) { code = ENOMEM; goto done; } is_tgs = result; } /* Only include resource groups in a service ticket. */ if (is_tgs) { group_inclusion = AUTH_EXCLUDE_RESOURCE_GROUPS; } else if (server->supported_enctypes & KERB_ENCTYPE_RESOURCE_SID_COMPRESSION_DISABLED) { group_inclusion = AUTH_INCLUDE_RESOURCE_GROUPS; } else { group_inclusion = AUTH_INCLUDE_RESOURCE_GROUPS_COMPRESSED; } if (device != NULL && !is_tgs) { compounded_auth = SAMBA_COMPOUNDED_AUTH_INCLUDE; } else { compounded_auth = SAMBA_COMPOUNDED_AUTH_EXCLUDE; } if (device != NULL && !is_tgs) { SMB_ASSERT(device_pac != NULL); if (device_pac_is_trusted) { krb5_data device_claims_data; /* * [MS-KILE] 3.3.5.7.4 Compound Identity: the client * claims from the device PAC become the device claims * in the new PAC. */ code = krb5_pac_get_buffer(context, device_pac, PAC_TYPE_CLIENT_CLAIMS_INFO, &device_claims_data); if (code == ENOENT) { /* no-op */ } else if (code != 0) { goto done; } else if (device_krbtgt->is_trust) { /* * TODO: we need claim translation over trusts, * for now we just clear them... */ device_claims_blob = &data_blob_null; } else { DATA_BLOB *device_claims = NULL; device_claims = talloc_zero(mem_ctx, DATA_BLOB); if (device_claims == NULL) { smb_krb5_free_data_contents(context, &device_claims_data); code = ENOMEM; goto done; } *device_claims = data_blob_talloc(mem_ctx, device_claims_data.data, device_claims_data.length); if (device_claims->data == NULL && device_claims_data.length != 0) { smb_krb5_free_data_contents(context, &device_claims_data); code = ENOMEM; goto done; } smb_krb5_free_data_contents(context, &device_claims_data); device_claims_blob = device_claims; } code = samba_kdc_create_device_info_blob(mem_ctx, context, samdb, device_pac, &device_info_blob); if (code != 0) { goto done; } } else { /* Don't trust RODC-issued claims. Regenerate them. */ nt_status = samba_kdc_get_claims_blob(mem_ctx, device, &device_claims_blob); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("samba_kdc_get_claims_blob failed: %s\n", nt_errstr(nt_status)); code = map_errno_from_nt_status(nt_status); goto done; } /* Also regenerate device info. */ code = samba_kdc_get_device_info_blob(mem_ctx, device, &device_info_blob); if (code != 0) { goto done; } } } if (delegated_proxy_principal != NULL) { deleg_blob = talloc_zero(mem_ctx, DATA_BLOB); if (deleg_blob == NULL) { code = ENOMEM; goto done; } nt_status = samba_kdc_update_delegation_info_blob( deleg_blob, context, old_pac, server_principal, delegated_proxy_principal, deleg_blob); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("update delegation info blob failed: %s\n", nt_errstr(nt_status)); code = map_errno_from_nt_status(nt_status); goto done; } } code = samba_kdc_obtain_user_info_dc(mem_ctx, context, samdb, group_inclusion, client, old_pac, client_pac_is_trusted, &user_info_dc, &_resource_groups); if (code != 0) { const char *err_str = krb5_get_error_message(context, code); DBG_ERR("samba_kdc_obtain_user_info_dc failed: %s\n", err_str != NULL ? err_str : ""); krb5_free_error_message(context, err_str); goto done; } /* * Enforce the AllowedToAuthenticateTo part of an authentication policy, * if one is present. */ if (!is_tgs && authn_policy_restrictions_present(server->server_policy)) { const struct samba_kdc_entry *auth_entry = NULL; struct auth_user_info_dc *auth_user_info_dc = NULL; if (delegated_proxy != NULL) { auth_entry = delegated_proxy; code = samba_kdc_obtain_user_info_dc(mem_ctx, context, samdb, AUTH_INCLUDE_RESOURCE_GROUPS, delegated_proxy, delegated_proxy_pac, delegated_proxy_pac_is_trusted, &auth_user_info_dc, NULL); if (code) { goto done; } } else { auth_entry = client; auth_user_info_dc = user_info_dc; } code = samba_kdc_allowed_to_authenticate_to(mem_ctx, samdb, lp_ctx, auth_entry, auth_user_info_dc, server, server_audit_info_out, status_out); if (auth_user_info_dc != user_info_dc) { talloc_unlink(mem_ctx, auth_user_info_dc); } if (code) { goto done; } } nt_status = samba_kdc_add_compounded_auth(compounded_auth, user_info_dc); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("Failed to add Compounded Authentication: %s\n", nt_errstr(nt_status)); code = KRB5KDC_ERR_TGT_REVOKED; goto done; } if (client_pac_is_trusted) { pac_blob = talloc_zero(mem_ctx, DATA_BLOB); if (pac_blob == NULL) { code = ENOMEM; goto done; } nt_status = samba_get_logon_info_pac_blob(mem_ctx, user_info_dc, _resource_groups, group_inclusion, pac_blob); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("samba_get_logon_info_pac_blob failed: %s\n", nt_errstr(nt_status)); code = map_errno_from_nt_status(nt_status); goto done; } /* * TODO: we need claim translation over trusts, * for now we just clear them... */ if (client_krbtgt->is_trust) { client_claims_blob = &data_blob_null; } } else { nt_status = samba_kdc_get_logon_info_blob(mem_ctx, user_info_dc, group_inclusion, &pac_blob); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("samba_kdc_get_logon_info_blob failed: %s\n", nt_errstr(nt_status)); code = KRB5KDC_ERR_TGT_REVOKED; goto done; } nt_status = samba_kdc_get_upn_info_blob(mem_ctx, user_info_dc, &upn_blob); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("samba_kdc_get_upn_info_blob failed: %s\n", nt_errstr(nt_status)); code = KRB5KDC_ERR_TGT_REVOKED; goto done; } nt_status = samba_kdc_get_requester_sid_blob(mem_ctx, user_info_dc, &requester_sid_blob); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("samba_kdc_get_requester_sid_blob failed: %s\n", nt_errstr(nt_status)); code = KRB5KDC_ERR_TGT_REVOKED; goto done; } /* Don't trust RODC-issued claims. Regenerate them. */ nt_status = samba_kdc_get_claims_blob(mem_ctx, client, &client_claims_blob); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("samba_kdc_get_claims_blob failed: %s\n", nt_errstr(nt_status)); code = map_errno_from_nt_status(nt_status); goto done; } } /* Check the types of the given PAC */ code = pac_blobs_from_krb5_pac(&pac_blobs, mem_ctx, context, old_pac); if (code != 0) { goto done; } code = pac_blobs_replace_existing(&pac_blobs, PAC_TYPE_LOGON_INFO, pac_blob); if (code != 0) { goto done; } #ifdef SAMBA4_USES_HEIMDAL /* Not needed with MIT Kerberos */ code = pac_blobs_replace_existing(&pac_blobs, PAC_TYPE_LOGON_NAME, &data_blob_null); if (code != 0) { goto done; } code = pac_blobs_replace_existing(&pac_blobs, PAC_TYPE_SRV_CHECKSUM, &data_blob_null); if (code != 0) { goto done; } code = pac_blobs_replace_existing(&pac_blobs, PAC_TYPE_KDC_CHECKSUM, &data_blob_null); if (code != 0) { goto done; } #endif code = pac_blobs_add_blob(&pac_blobs, mem_ctx, PAC_TYPE_CONSTRAINED_DELEGATION, deleg_blob); if (code != 0) { goto done; } code = pac_blobs_add_blob(&pac_blobs, mem_ctx, PAC_TYPE_UPN_DNS_INFO, upn_blob); if (code != 0) { goto done; } code = pac_blobs_add_blob(&pac_blobs, mem_ctx, PAC_TYPE_CLIENT_CLAIMS_INFO, client_claims_blob); if (code != 0) { goto done; } code = pac_blobs_add_blob(&pac_blobs, mem_ctx, PAC_TYPE_DEVICE_INFO, device_info_blob); if (code != 0) { goto done; } code = pac_blobs_add_blob(&pac_blobs, mem_ctx, PAC_TYPE_DEVICE_CLAIMS_INFO, device_claims_blob); if (code != 0) { goto done; } if (!client_pac_is_trusted || !is_tgs) { code = pac_blobs_remove_blob(&pac_blobs, mem_ctx, PAC_TYPE_ATTRIBUTES_INFO); if (code != 0) { goto done; } } if (!is_tgs) { code = pac_blobs_remove_blob(&pac_blobs, mem_ctx, PAC_TYPE_REQUESTER_SID); if (code != 0) { goto done; } } else { code = pac_blobs_add_blob(&pac_blobs, mem_ctx, PAC_TYPE_REQUESTER_SID, requester_sid_blob); if (code != 0) { goto done; } } /* * The server account may be set not to want the PAC. * * While this is wasteful if the above calculations were done * and now thrown away, this is cleaner as we do any ticket * signature checking etc always. * * UF_NO_AUTH_DATA_REQUIRED is the rare case and most of the * time (eg not accepting a ticket from the RODC) we do not * need to re-generate anything anyway. */ if (!samba_princ_needs_pac(server)) { code = ENOATTR; goto done; } if (client_pac_is_trusted && !is_tgs) { /* * The client may have requested no PAC when obtaining the * TGT. */ bool requested_pac = false; code = samba_client_requested_pac(context, old_pac, mem_ctx, &requested_pac); if (code != 0 || !requested_pac) { if (!requested_pac) { code = ENOATTR; } goto done; } } for (i = 0; i < pac_blobs.num_types; ++i) { krb5_data type_data; const DATA_BLOB *type_blob = pac_blobs.type_blobs[i].data; uint32_t type = pac_blobs.type_blobs[i].type; static char null_byte = '\0'; const krb5_data null_data = smb_krb5_make_data(&null_byte, 0); #ifndef SAMBA4_USES_HEIMDAL /* Not needed with MIT Kerberos */ switch(type) { case PAC_TYPE_LOGON_NAME: case PAC_TYPE_SRV_CHECKSUM: case PAC_TYPE_KDC_CHECKSUM: case PAC_TYPE_FULL_CHECKSUM: continue; default: break; } #endif if (type_blob != NULL) { type_data = smb_krb5_data_from_blob(*type_blob); /* * Passing a NULL pointer into krb5_pac_add_buffer() is * not allowed, so pass null_data instead if needed. */ code = krb5_pac_add_buffer(context, new_pac, type, (type_data.data != NULL) ? &type_data : &null_data); } else { code = krb5_pac_get_buffer(context, old_pac, type, &type_data); if (code != 0) { goto done; } /* * Passing a NULL pointer into krb5_pac_add_buffer() is * not allowed, so pass null_data instead if needed. */ code = krb5_pac_add_buffer(context, new_pac, type, (type_data.data != NULL) ? &type_data : &null_data); smb_krb5_free_data_contents(context, &type_data); } if (code != 0) { goto done; } } code = 0; done: pac_blobs_destroy(&pac_blobs); TALLOC_FREE(pac_blob); TALLOC_FREE(upn_blob); TALLOC_FREE(deleg_blob); /* * Release our handle to user_info_dc. ‘server_audit_info_out’, if * non-NULL, becomes the new parent. */ talloc_unlink(mem_ctx, user_info_dc); return code; } krb5_error_code samba_kdc_check_device(TALLOC_CTX *mem_ctx, krb5_context context, struct ldb_context *samdb, struct loadparm_context *lp_ctx, struct samba_kdc_entry *device, const krb5_const_pac device_pac, const bool device_pac_is_trusted, const struct authn_kerberos_client_policy *client_policy, struct authn_audit_info **client_audit_info_out, NTSTATUS *status_out) { TALLOC_CTX *frame = NULL; krb5_error_code code = 0; NTSTATUS nt_status; struct auth_user_info_dc *device_info = NULL; struct authn_audit_info *client_audit_info = NULL; if (status_out != NULL) { *status_out = NT_STATUS_OK; } if (!authn_policy_device_restrictions_present(client_policy)) { return 0; } if (device == NULL || device_pac == NULL) { NTSTATUS out_status = NT_STATUS_INVALID_WORKSTATION; nt_status = authn_kerberos_client_policy_audit_info(mem_ctx, client_policy, NULL /* client_info */, AUTHN_AUDIT_EVENT_KERBEROS_DEVICE_RESTRICTION, AUTHN_AUDIT_REASON_FAST_REQUIRED, out_status, client_audit_info_out); if (!NT_STATUS_IS_OK(nt_status)) { code = KRB5KRB_ERR_GENERIC; } else if (authn_kerberos_client_policy_is_enforced(client_policy)) { code = KRB5KDC_ERR_POLICY; if (status_out != NULL) { *status_out = out_status; } } else { /* OK. */ code = 0; } goto out; } frame = talloc_stackframe(); if (device_pac_is_trusted) { krb5_data device_logon_info; enum ndr_err_code ndr_err; DATA_BLOB device_logon_info_blob; union PAC_INFO pac_logon_info; union netr_Validation validation; code = krb5_pac_get_buffer(context, device_pac, PAC_TYPE_LOGON_INFO, &device_logon_info); if (code != 0) { if (code == ENOENT) { DBG_ERR("Device PAC is missing LOGON_INFO\n"); } else { DBG_ERR("Error getting LOGON_INFO from device PAC\n"); } goto out; } device_logon_info_blob = data_blob_const(device_logon_info.data, device_logon_info.length); ndr_err = ndr_pull_union_blob(&device_logon_info_blob, frame, &pac_logon_info, PAC_TYPE_LOGON_INFO, (ndr_pull_flags_fn_t)ndr_pull_PAC_INFO); smb_krb5_free_data_contents(context, &device_logon_info); if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) { nt_status = ndr_map_error2ntstatus(ndr_err); DBG_ERR("can't parse device PAC LOGON_INFO: %s\n", nt_errstr(nt_status)); code = ndr_map_error2errno(ndr_err); goto out; } /* * This does a bit of unnecessary work, setting up fields we * don’t care about — we only want the SIDs. */ validation.sam3 = &pac_logon_info.logon_info.info->info3; nt_status = make_user_info_dc_netlogon_validation(frame, "", 3, &validation, true, /* This user was authenticated */ &device_info); if (!NT_STATUS_IS_OK(nt_status)) { code = map_errno_from_nt_status(nt_status); goto out; } /* * We need to expand group memberships within our local domain, * as the token might be generated by a trusted domain. */ nt_status = authsam_update_user_info_dc(frame, samdb, device_info); if (!NT_STATUS_IS_OK(nt_status)) { code = map_errno_from_nt_status(nt_status); goto out; } } else { nt_status = samba_kdc_get_user_info_dc(frame, device, SAMBA_ASSERTED_IDENTITY_AUTHENTICATION_AUTHORITY, SAMBA_CLAIMS_VALID_INCLUDE, SAMBA_COMPOUNDED_AUTH_EXCLUDE, &device_info); if (!NT_STATUS_IS_OK(nt_status)) { DBG_ERR("samba_kdc_get_user_info_dc failed: %s\n", nt_errstr(nt_status)); code = KRB5KDC_ERR_TGT_REVOKED; goto out; } } nt_status = authn_policy_authenticate_from_device(frame, samdb, lp_ctx, device_info, client_policy, &client_audit_info); if (client_audit_info != NULL) { *client_audit_info_out = talloc_move(mem_ctx, &client_audit_info); } if (!NT_STATUS_IS_OK(nt_status)) { if (NT_STATUS_EQUAL(nt_status, NT_STATUS_AUTHENTICATION_FIREWALL_FAILED)) { code = KRB5KDC_ERR_POLICY; } else { code = KRB5KRB_ERR_GENERIC; } goto out; } out: talloc_free(frame); return code; }