mirror of
https://github.com/samba-team/samba.git
synced 2025-11-11 00:23:51 +03:00
672 lines
15 KiB
C
672 lines
15 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
LDAP server
|
|
Copyright (C) Volker Lendecke 2004
|
|
Copyright (C) Stefan Metzmacher 2004
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
/*
|
|
close the socket and shutdown a server_context
|
|
*/
|
|
static void ldapsrv_terminate_connection(struct ldapsrv_connection *ldap_conn, const char *reason)
|
|
{
|
|
server_terminate_connection(ldap_conn->connection, reason);
|
|
}
|
|
|
|
/*
|
|
add a socket address to the list of events, one event per port
|
|
*/
|
|
static void add_socket(struct server_service *service,
|
|
const struct model_ops *model_ops,
|
|
struct in_addr *ifip)
|
|
{
|
|
uint16_t port = 389;
|
|
char *ip_str = talloc_strdup(service->mem_ctx, inet_ntoa(*ifip));
|
|
|
|
service_setup_socket(service, model_ops, ip_str, &port);
|
|
|
|
talloc_free(ip_str);
|
|
}
|
|
|
|
/****************************************************************************
|
|
Open the socket communication.
|
|
****************************************************************************/
|
|
static void ldapsrv_init(struct server_service *service,
|
|
const struct model_ops *model_ops)
|
|
{
|
|
DEBUG(1,("ldapsrv_init\n"));
|
|
|
|
if (lp_interfaces() && lp_bind_interfaces_only()) {
|
|
int num_interfaces = iface_count();
|
|
int i;
|
|
|
|
/* We have been given an interfaces line, and been
|
|
told to only bind to those interfaces. Create a
|
|
socket per interface and bind to only these.
|
|
*/
|
|
for(i = 0; i < num_interfaces; i++) {
|
|
struct in_addr *ifip = iface_n_ip(i);
|
|
|
|
if (ifip == NULL) {
|
|
DEBUG(0,("ldapsrv_init: interface %d has NULL "
|
|
"IP address !\n", i));
|
|
continue;
|
|
}
|
|
|
|
add_socket(service, model_ops, ifip);
|
|
}
|
|
} else {
|
|
struct in_addr *ifip;
|
|
TALLOC_CTX *mem_ctx = talloc_init("ldapsrv_init");
|
|
|
|
if (!mem_ctx) {
|
|
smb_panic("No memory");
|
|
}
|
|
|
|
/* Just bind to lp_socket_address() (usually 0.0.0.0) */
|
|
ifip = interpret_addr2(mem_ctx, lp_socket_address());
|
|
add_socket(service, model_ops, ifip);
|
|
|
|
talloc_destroy(mem_ctx);
|
|
}
|
|
}
|
|
|
|
/* This rw-buf api is made to avoid memcpy. For now do that like mad... The
|
|
idea is to write into a circular list of buffers where the ideal case is
|
|
that a read(2) holds a complete request that is then thrown away
|
|
completely. */
|
|
|
|
static BOOL append_to_buf(struct rw_buffer *buf, uint8_t *data, size_t length)
|
|
{
|
|
buf->data = realloc(buf->data, buf->length+length);
|
|
|
|
if (buf->data == NULL)
|
|
return False;
|
|
|
|
memcpy(buf->data+buf->length, data, length);
|
|
|
|
buf->length += length;
|
|
return True;
|
|
}
|
|
|
|
static BOOL read_into_buf(struct socket_context *sock, struct rw_buffer *buf)
|
|
{
|
|
NTSTATUS status;
|
|
DATA_BLOB tmp_blob;
|
|
BOOL ret;
|
|
|
|
status = socket_recv(sock, sock, &tmp_blob, 1024, 0);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
DEBUG(0,("socket_recv: %s\n",nt_errstr(status)));
|
|
return False;
|
|
}
|
|
|
|
ret = append_to_buf(buf, tmp_blob.data, tmp_blob.length);
|
|
|
|
talloc_free(tmp_blob.data);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static BOOL write_from_buf(struct socket_context *sock, struct rw_buffer *buf)
|
|
{
|
|
NTSTATUS status;
|
|
DATA_BLOB tmp_blob;
|
|
size_t sendlen;
|
|
|
|
tmp_blob.data = buf->data;
|
|
tmp_blob.length = buf->length;
|
|
|
|
status = socket_send(sock, sock, &tmp_blob, &sendlen, 0);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return False;
|
|
}
|
|
|
|
if (buf->length != sendlen) {
|
|
return False;
|
|
}
|
|
|
|
return True;
|
|
}
|
|
|
|
static void peek_into_read_buf(struct rw_buffer *buf, uint8_t **out,
|
|
size_t *out_length)
|
|
{
|
|
*out = buf->data;
|
|
*out_length = buf->length;
|
|
}
|
|
|
|
static void consumed_from_read_buf(struct rw_buffer *buf,
|
|
size_t length)
|
|
{
|
|
memcpy(buf->data, buf->data+length, buf->length-length);
|
|
buf->length -= length;
|
|
}
|
|
|
|
static BOOL ldap_append_to_buf(struct ldap_message *msg, struct rw_buffer *buf)
|
|
{
|
|
DATA_BLOB blob;
|
|
BOOL res;
|
|
|
|
if (!ldap_encode(msg, &blob))
|
|
return False;
|
|
|
|
res = append_to_buf(buf, blob.data, blob.length);
|
|
|
|
data_blob_free(&blob);
|
|
return res;
|
|
}
|
|
|
|
static void reply_unwilling(struct ldapsrv_connection *ldap_conn, int error)
|
|
{
|
|
struct ldap_message *msg;
|
|
struct ldap_ExtendedResponse *r;
|
|
|
|
msg = new_ldap_message();
|
|
|
|
if (msg == NULL) {
|
|
ldapsrv_terminate_connection(ldap_conn, "new_ldap_message() failed");
|
|
return;
|
|
}
|
|
|
|
msg->messageid = 0;
|
|
r = &msg->r.ExtendedResponse;
|
|
|
|
/* When completely freaking out, OpenLDAP responds with an ExtResp */
|
|
msg->type = LDAP_TAG_ExtendedResponse;
|
|
r->response.resultcode = error;
|
|
r->response.dn = NULL;
|
|
r->response.errormessage = NULL;
|
|
r->response.referral = NULL;
|
|
r->name = NULL;
|
|
r->value.data = NULL;
|
|
r->value.length = 0;
|
|
|
|
ldap_append_to_buf(msg, &ldap_conn->out_buffer);
|
|
|
|
talloc_destroy(msg->mem_ctx);
|
|
}
|
|
|
|
static void ldap_reply_BindRequest(struct ldapsrv_connection *conn,
|
|
struct ldap_message *request)
|
|
{
|
|
struct ldap_BindRequest *req = &request->r.BindRequest;
|
|
|
|
struct ldap_message *msg;
|
|
struct ldap_BindResponse *resp;
|
|
|
|
DEBUG(5, ("Binding as %s with pw %s\n",
|
|
req->dn, req->creds.password));
|
|
|
|
msg = new_ldap_message();
|
|
|
|
if (msg == NULL) {
|
|
ldapsrv_terminate_connection(conn, "new_ldap_message() failed");
|
|
return;
|
|
}
|
|
|
|
resp = &msg->r.BindResponse;
|
|
|
|
msg->messageid = request->messageid;
|
|
msg->type = LDAP_TAG_BindResponse;
|
|
resp->response.resultcode = 0;
|
|
resp->response.dn = NULL;
|
|
resp->response.errormessage = NULL;
|
|
resp->response.referral = NULL;
|
|
resp->SASL.secblob = data_blob(NULL, 0);
|
|
|
|
ldap_append_to_buf(msg, &conn->out_buffer);
|
|
talloc_destroy(msg->mem_ctx);
|
|
}
|
|
|
|
static void ldap_reply_SearchRequest(struct ldapsrv_connection *conn,
|
|
struct ldap_message *request)
|
|
{
|
|
struct ldap_SearchRequest *req = &request->r.SearchRequest;
|
|
|
|
struct ldap_message *msg;
|
|
struct ldap_Result *resp;
|
|
|
|
DEBUG(10, ("Search filter: %s\n", req->filter));
|
|
|
|
msg = new_ldap_message();
|
|
|
|
if (msg == NULL) {
|
|
ldapsrv_terminate_connection(conn, "new_ldap_message() failed");
|
|
return;
|
|
}
|
|
|
|
msg->messageid = request->messageid;
|
|
resp = &msg->r.SearchResultDone;
|
|
|
|
/* Is this a rootdse request? */
|
|
if ((strlen(req->basedn) == 0) &&
|
|
(req->scope == LDAP_SEARCH_SCOPE_BASE) &&
|
|
strequal(req->filter, "(objectclass=*)")) {
|
|
|
|
#define ATTR_BLOB_CONST(val) data_blob(val, sizeof(val)-1)
|
|
#define ATTR_CONST_SINGLE(attr, blob, nam, val) do { \
|
|
attr.name = nam; \
|
|
attr.num_values = ARRAY_SIZE(blob); \
|
|
attr.values = blob; \
|
|
blob[0] = ATTR_BLOB_CONST(val); \
|
|
} while(0)
|
|
#define ATTR_CONST_SINGLE_NOVAL(attr, blob, nam) do { \
|
|
attr.name = nam;\
|
|
attr.num_values = ARRAY_SIZE(blob); \
|
|
attr.values = blob;\
|
|
} while(0)
|
|
TALLOC_CTX *mem_ctx;
|
|
struct ldap_attribute attrs[3];
|
|
DATA_BLOB currentTime[1];
|
|
DATA_BLOB supportedLDAPVersion[2];
|
|
DATA_BLOB dnsHostName[1];
|
|
|
|
mem_ctx = talloc_init("rootDSE");
|
|
if (!mem_ctx) {
|
|
ldapsrv_terminate_connection(conn, "no memory");
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* currentTime
|
|
* 20040918090350.0Z
|
|
*/
|
|
ATTR_CONST_SINGLE_NOVAL(attrs[0], currentTime, "currentTime");
|
|
{
|
|
char *str = ldap_timestring(mem_ctx, time(NULL));
|
|
if (!str) {
|
|
ldapsrv_terminate_connection(conn, "no memory");
|
|
return;
|
|
}
|
|
currentTime[0] = data_blob(str, strlen(str));
|
|
talloc_free(str);
|
|
}
|
|
|
|
/*
|
|
* subschemaSubentry
|
|
* CN=Aggregate,CN=Schema,CN=Configuration,DC=DOM,DC=TLD
|
|
*/
|
|
|
|
/*
|
|
* dsServiceName
|
|
* CN=NTDS Settings,CN=NETBIOSNAME,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=DOM,DC=TLD
|
|
*/
|
|
|
|
/*
|
|
* namingContexts
|
|
* DC=DOM,DC=TLD
|
|
* CN=Configuration,DC=DOM,DC=TLD
|
|
* CN=Schema,CN=Configuration,DC=DOM,DC=TLD
|
|
* DC=DomainDnsZones,DC=DOM,DC=TLD
|
|
* DC=ForestDnsZones,DC=DOM,DC=TLD
|
|
*/
|
|
|
|
/*
|
|
* defaultNamingContext
|
|
* DC=DOM,DC=TLD
|
|
*/
|
|
|
|
/*
|
|
* schemaNamingContext
|
|
* CN=Schema,CN=Configuration,DC=DOM,DC=TLD
|
|
*/
|
|
|
|
/*
|
|
* configurationNamingContext
|
|
* CN=Configuration,DC=DOM,DC=TLD
|
|
*/
|
|
|
|
/*
|
|
* rootDomainNamingContext
|
|
* DC=DOM,DC=TLD
|
|
*/
|
|
|
|
/*
|
|
* supportedControl
|
|
* 1.2.840.113556.1.4.319
|
|
* 1.2.840.113556.1.4.801
|
|
* 1.2.840.113556.1.4.473
|
|
* 1.2.840.113556.1.4.528
|
|
* 1.2.840.113556.1.4.417
|
|
* 1.2.840.113556.1.4.619
|
|
* 1.2.840.113556.1.4.841
|
|
* 1.2.840.113556.1.4.529
|
|
* 1.2.840.113556.1.4.805
|
|
* 1.2.840.113556.1.4.521
|
|
* 1.2.840.113556.1.4.970
|
|
* 1.2.840.113556.1.4.1338
|
|
* 1.2.840.113556.1.4.474
|
|
* 1.2.840.113556.1.4.1339
|
|
* 1.2.840.113556.1.4.1340
|
|
* 1.2.840.113556.1.4.1413
|
|
* 2.16.840.1.113730.3.4.9
|
|
* 2.16.840.1.113730.3.4.10
|
|
* 1.2.840.113556.1.4.1504
|
|
* 1.2.840.113556.1.4.1852
|
|
* 1.2.840.113556.1.4.802
|
|
*/
|
|
|
|
/*
|
|
* supportedLDAPVersion
|
|
* 3
|
|
* 2
|
|
*/
|
|
ATTR_CONST_SINGLE_NOVAL(attrs[1], supportedLDAPVersion, "supportedLDAPVersion");
|
|
supportedLDAPVersion[0] = ATTR_BLOB_CONST("3");
|
|
supportedLDAPVersion[1] = ATTR_BLOB_CONST("2");
|
|
|
|
/*
|
|
* supportedLDAPPolicies
|
|
* MaxPoolThreads
|
|
* MaxDatagramRecv
|
|
* MaxReceiveBuffer
|
|
* InitRecvTimeout
|
|
* MaxConnections
|
|
* MaxConnIdleTime
|
|
* MaxPageSize
|
|
* MaxQueryDuration
|
|
* MaxTempTableSize
|
|
* MaxResultSetSize
|
|
* MaxNotificationPerConn
|
|
* MaxValRange
|
|
*/
|
|
|
|
/*
|
|
* highestCommittedUSN
|
|
* 4555
|
|
*/
|
|
|
|
/*
|
|
* supportedSASLMechanisms
|
|
* GSSAPI
|
|
* GSS-SPNEGO
|
|
* EXTERNAL
|
|
* DIGEST-MD5
|
|
*/
|
|
|
|
/*
|
|
* dnsHostName
|
|
* netbiosname.dom.tld
|
|
*/
|
|
ATTR_CONST_SINGLE_NOVAL(attrs[2], dnsHostName, "dnsHostName");
|
|
dnsHostName[0] = data_blob(lp_netbios_name(),strlen(lp_netbios_name()));
|
|
|
|
/*
|
|
* ldapServiceName
|
|
* dom.tld:netbiosname$@DOM.TLD
|
|
*/
|
|
|
|
/*
|
|
* serverName:
|
|
* CN=NETBIOSNAME,CN=Servers,CN=Default-First-Site,CN=Sites,CN=Configuration,DC=DOM,DC=TLD
|
|
*/
|
|
|
|
/*
|
|
* supportedCapabilities
|
|
* 1.2.840.113556.1.4.800
|
|
* 1.2.840.113556.1.4.1670
|
|
* 1.2.840.113556.1.4.1791
|
|
*/
|
|
|
|
/*
|
|
* isSynchronized:
|
|
* TRUE/FALSE
|
|
*/
|
|
|
|
/*
|
|
* isGlobalCatalogReady
|
|
* TRUE/FALSE
|
|
*/
|
|
|
|
/*
|
|
* domainFunctionality
|
|
* 0
|
|
*/
|
|
|
|
/*
|
|
* forestFunctionality
|
|
* 0
|
|
*/
|
|
|
|
/*
|
|
* domainControllerFunctionality
|
|
* 2
|
|
*/
|
|
|
|
msg->type = LDAP_TAG_SearchResultEntry;
|
|
msg->r.SearchResultEntry.dn = "";
|
|
msg->r.SearchResultEntry.num_attributes = ARRAY_SIZE(attrs);
|
|
msg->r.SearchResultEntry.attributes = attrs;
|
|
|
|
ldap_append_to_buf(msg, &conn->out_buffer);
|
|
talloc_free(mem_ctx);
|
|
}
|
|
|
|
msg->type = LDAP_TAG_SearchResultDone;
|
|
resp->resultcode = 0;
|
|
resp->dn = NULL;
|
|
resp->errormessage = NULL;
|
|
resp->referral = NULL;
|
|
|
|
ldap_append_to_buf(msg, &conn->out_buffer);
|
|
talloc_destroy(msg->mem_ctx);
|
|
}
|
|
|
|
static void switch_ldap_message(struct ldapsrv_connection *conn,
|
|
struct ldap_message *msg)
|
|
{
|
|
switch(msg->type) {
|
|
case LDAP_TAG_BindRequest:
|
|
ldap_reply_BindRequest(conn, msg);
|
|
break;
|
|
case LDAP_TAG_SearchRequest:
|
|
ldap_reply_SearchRequest(conn, msg);
|
|
break;
|
|
default:
|
|
reply_unwilling(conn, 2);
|
|
break;
|
|
}
|
|
}
|
|
|
|
static void ldap_queue_run(struct server_connection *conn)
|
|
{
|
|
struct ldapsrv_connection *ldap_conn = conn->private_data;
|
|
|
|
while (ldap_conn->in_queue) {
|
|
struct ldap_message_queue *req = ldap_conn->in_queue;
|
|
DLIST_REMOVE(ldap_conn->in_queue, req);
|
|
|
|
switch_ldap_message(ldap_conn, req->msg);
|
|
talloc_destroy(req->msg->mem_ctx);
|
|
}
|
|
}
|
|
|
|
/*
|
|
called when a LDAP socket becomes readable
|
|
*/
|
|
static void ldapsrv_recv(struct server_connection *conn, time_t t,
|
|
uint16_t flags)
|
|
{
|
|
struct ldapsrv_connection *ldap_conn = conn->private_data;
|
|
uint8_t *buf;
|
|
int buf_length, msg_length;
|
|
DATA_BLOB blob;
|
|
ASN1_DATA data;
|
|
struct ldap_message *msg;
|
|
struct ldap_message_queue *queue_entry;
|
|
|
|
DEBUG(10,("ldapsrv_recv\n"));
|
|
|
|
if (!read_into_buf(conn->socket, &ldap_conn->in_buffer)) {
|
|
ldapsrv_terminate_connection(ldap_conn, "read_into_buf() failed");
|
|
return;
|
|
}
|
|
|
|
peek_into_read_buf(&ldap_conn->in_buffer, &buf, &buf_length);
|
|
|
|
while (buf_length > 0) {
|
|
|
|
/* LDAP Messages are always SEQUENCES */
|
|
|
|
if (!asn1_object_length(buf, buf_length, ASN1_SEQUENCE(0),
|
|
&msg_length)) {
|
|
ldapsrv_terminate_connection(ldap_conn, "asn1_object_length() failed");
|
|
return;
|
|
}
|
|
|
|
if (buf_length < msg_length) {
|
|
/* Not enough yet */
|
|
break;
|
|
}
|
|
|
|
/* We've got a complete LDAP request in the in-buffer, convert
|
|
* that to a ldap_message and put it into the incoming
|
|
* queue. */
|
|
|
|
blob.data = buf;
|
|
blob.length = msg_length;
|
|
|
|
if (!asn1_load(&data, blob)) {
|
|
ldapsrv_terminate_connection(ldap_conn, "asn1_load() failed");
|
|
return;
|
|
}
|
|
|
|
msg = new_ldap_message();
|
|
|
|
if ((msg == NULL) || !ldap_decode(&data, msg)) {
|
|
ldapsrv_terminate_connection(ldap_conn, "ldap_decode() failed");
|
|
return;
|
|
}
|
|
|
|
queue_entry = talloc_p(msg->mem_ctx, struct ldap_message_queue);
|
|
|
|
if (queue_entry == NULL) {
|
|
ldapsrv_terminate_connection(ldap_conn, "alloc_p(msg->mem_ctx, struct ldap_message_queue) failed");
|
|
return;
|
|
}
|
|
|
|
queue_entry->msg = msg;
|
|
|
|
DLIST_ADD_END(ldap_conn->in_queue, queue_entry,
|
|
struct ldap_message_queue *);
|
|
|
|
consumed_from_read_buf(&ldap_conn->in_buffer, msg_length);
|
|
|
|
peek_into_read_buf(&ldap_conn->in_buffer, &buf, &buf_length);
|
|
}
|
|
|
|
ldap_queue_run(conn);
|
|
|
|
conn->event.fde->flags |= EVENT_FD_WRITE;
|
|
|
|
return;
|
|
}
|
|
|
|
/*
|
|
called when a LDAP socket becomes writable
|
|
*/
|
|
static void ldapsrv_send(struct server_connection *conn, time_t t,
|
|
uint16_t flags)
|
|
{
|
|
struct ldapsrv_connection *ldap_conn = conn->private_data;
|
|
|
|
DEBUG(10,("ldapsrv_send\n"));
|
|
|
|
if (!write_from_buf(conn->socket, &ldap_conn->out_buffer)) {
|
|
ldapsrv_terminate_connection(ldap_conn, "write_from_buf() failed");
|
|
return;
|
|
}
|
|
|
|
conn->event.fde->flags &= ~EVENT_FD_WRITE;
|
|
|
|
return;
|
|
}
|
|
|
|
/*
|
|
called when connection is idle
|
|
*/
|
|
static void ldapsrv_idle(struct server_connection *conn, time_t t)
|
|
{
|
|
DEBUG(10,("ldapsrv_idle: not implemented!\n"));
|
|
return;
|
|
}
|
|
|
|
static void ldapsrv_close(struct server_connection *conn, const char *reason)
|
|
{
|
|
struct ldapsrv_connection *ldap_conn = conn->private_data;
|
|
|
|
talloc_free(ldap_conn);
|
|
|
|
return;
|
|
}
|
|
|
|
/*
|
|
initialise a server_context from a open socket and register a event handler
|
|
for reading from that socket
|
|
*/
|
|
static void ldapsrv_accept(struct server_connection *conn)
|
|
{
|
|
struct ldapsrv_connection *ldap_conn;
|
|
|
|
DEBUG(5, ("ldapsrv_accept\n"));
|
|
|
|
ldap_conn = talloc_p(NULL, struct ldapsrv_connection);
|
|
|
|
if (ldap_conn == NULL)
|
|
return;
|
|
|
|
ZERO_STRUCTP(ldap_conn);
|
|
ldap_conn->connection = conn;
|
|
|
|
conn->private_data = ldap_conn;
|
|
|
|
return;
|
|
}
|
|
|
|
/*
|
|
called on a fatal error that should cause this server to terminate
|
|
*/
|
|
static void ldapsrv_exit(struct server_service *service, const char *reason)
|
|
{
|
|
DEBUG(1,("ldapsrv_exit\n"));
|
|
return;
|
|
}
|
|
|
|
static const struct server_service_ops ldap_server_ops = {
|
|
.name = "ldap",
|
|
.service_init = ldapsrv_init,
|
|
.accept_connection = ldapsrv_accept,
|
|
.recv_handler = ldapsrv_recv,
|
|
.send_handler = ldapsrv_send,
|
|
.idle_handler = ldapsrv_idle,
|
|
.close_connection = ldapsrv_close,
|
|
.service_exit = ldapsrv_exit,
|
|
};
|
|
|
|
const struct server_service_ops *ldapsrv_get_ops(void)
|
|
{
|
|
return &ldap_server_ops;
|
|
}
|
|
|
|
NTSTATUS server_service_ldap_init(void)
|
|
{
|
|
return NT_STATUS_OK;
|
|
}
|