mirror of
https://github.com/samba-team/samba.git
synced 2024-12-23 17:34:34 +03:00
0487ef0a70
This will allow it to replace functions in source3 that use debug classes. Andrew Bartlett
219 lines
7.5 KiB
C
219 lines
7.5 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
Authentication utility functions
|
|
Copyright (C) Andrew Tridgell 1992-1998
|
|
Copyright (C) Andrew Bartlett 2001-2010
|
|
Copyright (C) Jeremy Allison 2000-2001
|
|
Copyright (C) Rafal Szczesniak 2002
|
|
Copyright (C) Stefan Metzmacher 2005
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "auth/auth.h"
|
|
#include "libcli/security/security.h"
|
|
#include "libcli/auth/libcli_auth.h"
|
|
#include "dsdb/samdb/samdb.h"
|
|
#include "auth/session_proto.h"
|
|
|
|
_PUBLIC_ struct auth_session_info *anonymous_session(TALLOC_CTX *mem_ctx,
|
|
struct loadparm_context *lp_ctx)
|
|
{
|
|
NTSTATUS nt_status;
|
|
struct auth_session_info *session_info = NULL;
|
|
nt_status = auth_anonymous_session_info(mem_ctx, lp_ctx, &session_info);
|
|
if (!NT_STATUS_IS_OK(nt_status)) {
|
|
return NULL;
|
|
}
|
|
return session_info;
|
|
}
|
|
|
|
_PUBLIC_ NTSTATUS auth_generate_session_info(TALLOC_CTX *mem_ctx,
|
|
struct auth_context *auth_context, /* Optional if the domain SID is in the NT AUTHORITY domain */
|
|
struct auth_serversupplied_info *server_info,
|
|
uint32_t session_info_flags,
|
|
struct auth_session_info **_session_info)
|
|
{
|
|
struct auth_session_info *session_info;
|
|
NTSTATUS nt_status;
|
|
unsigned int i, num_groupSIDs = 0;
|
|
const char *account_sid_string;
|
|
const char *account_sid_dn;
|
|
DATA_BLOB account_sid_blob;
|
|
const char *primary_group_string;
|
|
const char *primary_group_dn;
|
|
DATA_BLOB primary_group_blob;
|
|
|
|
const char *filter;
|
|
|
|
struct dom_sid **groupSIDs = NULL;
|
|
const struct dom_sid *anonymous_sid, *system_sid;
|
|
|
|
TALLOC_CTX *tmp_ctx = talloc_new(mem_ctx);
|
|
NT_STATUS_HAVE_NO_MEMORY(tmp_ctx);
|
|
|
|
/* For now, we don't have trusted domains, so we do a very
|
|
* simple check to see that the user's SID is in *this*
|
|
* domain, and then trust the user account control. When we
|
|
* get trusted domains, we should check it's a trusted domain
|
|
* in this forest. This elaborate check is to try and avoid a
|
|
* nasty security bug if we forget about this later... */
|
|
|
|
session_info = talloc(tmp_ctx, struct auth_session_info);
|
|
NT_STATUS_HAVE_NO_MEMORY_AND_FREE(session_info, tmp_ctx);
|
|
|
|
session_info->server_info = talloc_reference(session_info, server_info);
|
|
|
|
/* unless set otherwise, the session key is the user session
|
|
* key from the auth subsystem */
|
|
session_info->session_key = server_info->user_session_key;
|
|
|
|
anonymous_sid = dom_sid_parse_talloc(tmp_ctx, SID_NT_ANONYMOUS);
|
|
NT_STATUS_HAVE_NO_MEMORY_AND_FREE(anonymous_sid, tmp_ctx);
|
|
|
|
system_sid = dom_sid_parse_talloc(tmp_ctx, SID_NT_SYSTEM);
|
|
NT_STATUS_HAVE_NO_MEMORY_AND_FREE(system_sid, tmp_ctx);
|
|
|
|
if (dom_sid_equal(anonymous_sid, server_info->account_sid)) {
|
|
/* Don't expand nested groups of system, anonymous etc*/
|
|
} else if (dom_sid_equal(system_sid, server_info->account_sid)) {
|
|
/* Don't expand nested groups of system, anonymous etc*/
|
|
} else if (auth_context) {
|
|
groupSIDs = talloc_array(tmp_ctx, struct dom_sid *, server_info->n_domain_groups);
|
|
NT_STATUS_HAVE_NO_MEMORY_AND_FREE(groupSIDs, tmp_ctx);
|
|
if (!groupSIDs) {
|
|
talloc_free(tmp_ctx);
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
num_groupSIDs = server_info->n_domain_groups;
|
|
|
|
for (i=0; i < server_info->n_domain_groups; i++) {
|
|
groupSIDs[i] = server_info->domain_groups[i];
|
|
}
|
|
|
|
filter = talloc_asprintf(tmp_ctx, "(&(objectClass=group)(groupType:1.2.840.113556.1.4.803:=%u))",
|
|
GROUP_TYPE_BUILTIN_LOCAL_GROUP);
|
|
|
|
/* Search for each group in the token */
|
|
|
|
/* Expands the account SID - this function takes in
|
|
* memberOf-like values, so we fake one up with the
|
|
* <SID=S-...> format of DN and then let it expand
|
|
* them, as long as they meet the filter - so only
|
|
* builtin groups
|
|
*
|
|
* We already have the primary group in the token, so set
|
|
* 'only childs' flag to true
|
|
*/
|
|
account_sid_string = dom_sid_string(tmp_ctx, server_info->account_sid);
|
|
NT_STATUS_HAVE_NO_MEMORY_AND_FREE(account_sid_string, server_info);
|
|
|
|
account_sid_dn = talloc_asprintf(tmp_ctx, "<SID=%s>", account_sid_string);
|
|
NT_STATUS_HAVE_NO_MEMORY_AND_FREE(account_sid_dn, server_info);
|
|
|
|
account_sid_blob = data_blob_string_const(account_sid_dn);
|
|
|
|
nt_status = authsam_expand_nested_groups(auth_context->sam_ctx, &account_sid_blob, true, filter,
|
|
tmp_ctx, &groupSIDs, &num_groupSIDs);
|
|
if (!NT_STATUS_IS_OK(nt_status)) {
|
|
talloc_free(tmp_ctx);
|
|
return nt_status;
|
|
}
|
|
|
|
/* Expands the primary group - this function takes in
|
|
* memberOf-like values, so we fake one up with the
|
|
* <SID=S-...> format of DN and then let it expand
|
|
* them, as long as they meet the filter - so only
|
|
* builtin groups
|
|
*
|
|
* We already have the primary group in the token, so set
|
|
* 'only childs' flag to true
|
|
*/
|
|
primary_group_string = dom_sid_string(tmp_ctx, server_info->primary_group_sid);
|
|
NT_STATUS_HAVE_NO_MEMORY_AND_FREE(primary_group_string, server_info);
|
|
|
|
primary_group_dn = talloc_asprintf(tmp_ctx, "<SID=%s>", primary_group_string);
|
|
NT_STATUS_HAVE_NO_MEMORY_AND_FREE(primary_group_dn, server_info);
|
|
|
|
primary_group_blob = data_blob_string_const(primary_group_dn);
|
|
|
|
nt_status = authsam_expand_nested_groups(auth_context->sam_ctx, &primary_group_blob, true, filter,
|
|
tmp_ctx, &groupSIDs, &num_groupSIDs);
|
|
if (!NT_STATUS_IS_OK(nt_status)) {
|
|
talloc_free(tmp_ctx);
|
|
return nt_status;
|
|
}
|
|
|
|
for (i = 0; i < server_info->n_domain_groups; i++) {
|
|
char *group_string;
|
|
const char *group_dn;
|
|
DATA_BLOB group_blob;
|
|
|
|
group_string = dom_sid_string(tmp_ctx,
|
|
server_info->domain_groups[i]);
|
|
NT_STATUS_HAVE_NO_MEMORY_AND_FREE(group_string, server_info);
|
|
|
|
group_dn = talloc_asprintf(tmp_ctx, "<SID=%s>", group_string);
|
|
talloc_free(group_string);
|
|
NT_STATUS_HAVE_NO_MEMORY_AND_FREE(group_dn, server_info);
|
|
group_blob = data_blob_string_const(group_dn);
|
|
|
|
/* This function takes in memberOf values and expands
|
|
* them, as long as they meet the filter - so only
|
|
* builtin groups */
|
|
nt_status = authsam_expand_nested_groups(auth_context->sam_ctx, &group_blob, true, filter,
|
|
tmp_ctx, &groupSIDs, &num_groupSIDs);
|
|
if (!NT_STATUS_IS_OK(nt_status)) {
|
|
talloc_free(tmp_ctx);
|
|
return nt_status;
|
|
}
|
|
}
|
|
}
|
|
|
|
nt_status = security_token_create(session_info,
|
|
auth_context ? auth_context->event_ctx : NULL,
|
|
auth_context ? auth_context->lp_ctx : NULL,
|
|
server_info->account_sid,
|
|
server_info->primary_group_sid,
|
|
num_groupSIDs,
|
|
groupSIDs,
|
|
session_info_flags,
|
|
&session_info->security_token);
|
|
NT_STATUS_NOT_OK_RETURN_AND_FREE(nt_status, tmp_ctx);
|
|
|
|
session_info->credentials = NULL;
|
|
|
|
talloc_steal(mem_ctx, session_info);
|
|
*_session_info = session_info;
|
|
talloc_free(tmp_ctx);
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/**
|
|
* prints a struct auth_session_info security token to debug output.
|
|
*/
|
|
void auth_session_info_debug(int dbg_lev,
|
|
const struct auth_session_info *session_info)
|
|
{
|
|
if (!session_info) {
|
|
DEBUG(dbg_lev, ("Session Info: (NULL)\n"));
|
|
return;
|
|
}
|
|
|
|
security_token_debug(0, dbg_lev, session_info->security_token);
|
|
}
|
|
|