mirror of
https://github.com/samba-team/samba.git
synced 2024-12-25 23:21:54 +03:00
1bc2f28b94
With this new interface, external applications that have authenticated to an ADS can pass the PAC from the Kerberos ticket to wbcAuthenticateUserEx. winbindd decodes and extracts the info3 information for the external application. If winbindd can verify the PAC signature, the info3 from the PACis also added to the netsamlogon_cache. The info3 data can be used by the external application to get the uid and primary gid. The data in netsamlogon_cache allows to retrieve the complete group list through the NSS function getgrouplist. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
145 lines
4.1 KiB
C
145 lines
4.1 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
async implementation of WINBINDD_PAM_AUTH_CRAP
|
|
Copyright (C) Volker Lendecke 2010
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "winbindd.h"
|
|
|
|
struct winbindd_pam_auth_crap_state {
|
|
struct winbindd_response *response;
|
|
struct netr_SamInfo3 *info3;
|
|
uint32_t flags;
|
|
};
|
|
|
|
static void winbindd_pam_auth_crap_done(struct tevent_req *subreq);
|
|
|
|
struct tevent_req *winbindd_pam_auth_crap_send(
|
|
TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct winbindd_cli_state *cli,
|
|
struct winbindd_request *request)
|
|
{
|
|
struct tevent_req *req, *subreq;
|
|
struct winbindd_pam_auth_crap_state *state;
|
|
struct winbindd_domain *domain;
|
|
|
|
req = tevent_req_create(mem_ctx, &state,
|
|
struct winbindd_pam_auth_crap_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
if (request->flags & WBFLAG_PAM_AUTH_PAC) {
|
|
NTSTATUS status;
|
|
|
|
state->flags = request->flags;
|
|
status = winbindd_pam_auth_pac_send(cli, &state->info3);
|
|
if (NT_STATUS_IS_OK(status)) {
|
|
/* Defer filling out response to recv */
|
|
tevent_req_done(req);
|
|
} else {
|
|
tevent_req_nterror(req, status);
|
|
}
|
|
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
/* Ensure null termination */
|
|
request->data.auth_crap.user[
|
|
sizeof(request->data.auth_crap.user)-1] = '\0';
|
|
request->data.auth_crap.domain[
|
|
sizeof(request->data.auth_crap.domain)-1] = '\0';
|
|
request->data.auth_crap.workstation[
|
|
sizeof(request->data.auth_crap.workstation)-1] = '\0';
|
|
|
|
DEBUG(3, ("[%5lu]: pam auth crap domain: [%s] user: %s\n",
|
|
(unsigned long)cli->pid,
|
|
request->data.auth_crap.domain,
|
|
request->data.auth_crap.user));
|
|
|
|
if (!check_request_flags(request->flags)) {
|
|
tevent_req_nterror(req, NT_STATUS_INVALID_PARAMETER_MIX);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if ((request->data.auth_crap.domain[0] == '\0')
|
|
&& lp_winbind_use_default_domain()) {
|
|
fstrcpy(request->data.auth_crap.domain,
|
|
lp_workgroup());
|
|
}
|
|
|
|
domain = find_auth_domain(
|
|
request->flags, request->data.auth_crap.domain);
|
|
if (domain == NULL) {
|
|
tevent_req_nterror(req, NT_STATUS_NO_SUCH_USER);
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
if (request->data.auth_crap.workstation[0] == '\0') {
|
|
fstrcpy(request->data.auth_crap.workstation, lp_netbios_name());
|
|
}
|
|
|
|
subreq = wb_domain_request_send(state, winbind_event_context(), domain,
|
|
request);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, winbindd_pam_auth_crap_done, req);
|
|
return req;
|
|
}
|
|
|
|
static void winbindd_pam_auth_crap_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req = tevent_req_callback_data(
|
|
subreq, struct tevent_req);
|
|
struct winbindd_pam_auth_crap_state *state = tevent_req_data(
|
|
req, struct winbindd_pam_auth_crap_state);
|
|
int res, err;
|
|
|
|
res = wb_domain_request_recv(subreq, state, &state->response, &err);
|
|
TALLOC_FREE(subreq);
|
|
if (res == -1) {
|
|
tevent_req_nterror(req, map_nt_error_from_unix(err));
|
|
return;
|
|
}
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
NTSTATUS winbindd_pam_auth_crap_recv(struct tevent_req *req,
|
|
struct winbindd_response *response)
|
|
{
|
|
struct winbindd_pam_auth_crap_state *state = tevent_req_data(
|
|
req, struct winbindd_pam_auth_crap_state);
|
|
NTSTATUS status;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
set_auth_errors(response, status);
|
|
return status;
|
|
}
|
|
|
|
if (state->flags & WBFLAG_PAM_AUTH_PAC) {
|
|
return append_auth_data(response, response, state->flags,
|
|
state->info3, NULL, NULL);
|
|
}
|
|
|
|
*response = *state->response;
|
|
response->result = WINBINDD_PENDING;
|
|
state->response = talloc_move(response, &state->response);
|
|
return NT_STATUS(response->data.auth.nt_status);
|
|
}
|