mirror of
https://github.com/samba-team/samba.git
synced 2025-10-29 04:23:51 +03:00
There is now a new --debug-stderr option to enable debug to STDERR. popt isn't perfect, but the callbacks are used in all the main Samba binaries, and should be used in the rest. This avoids duplicated code, and ensures every binary is setup correctly. This also ensures the setup happens early enough to have -s function, and have a correct impact on the credentials code. (Fixing a bug that frustrated tridge earlier today). The only 'subtle' aspect of all this is that I'm pretty sure that the SAMBA_COMMON popt code must be above the CREDENTIALS code, in the popt tables. Andrew Bartlett
948 lines
25 KiB
C
948 lines
25 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
Winbind status program.
|
|
|
|
Copyright (C) Tim Potter 2000-2003
|
|
Copyright (C) Andrew Bartlett <abartlet@samba.org> 2003-2004
|
|
Copyright (C) Francesco Chemolli <kinkie@kame.usr.dsi.unimi.it> 2000
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include "dynconfig.h"
|
|
#include "system/filesys.h"
|
|
#include "system/passwd.h"
|
|
#include "lib/cmdline/popt_common.h"
|
|
#include "auth/auth.h"
|
|
#include "libcli/security/security.h"
|
|
|
|
#undef DBGC_CLASS
|
|
#define DBGC_CLASS DBGC_WINBIND
|
|
|
|
#define SQUID_BUFFER_SIZE 2010
|
|
|
|
enum stdio_helper_mode {
|
|
SQUID_2_4_BASIC,
|
|
SQUID_2_5_BASIC,
|
|
SQUID_2_5_NTLMSSP,
|
|
NTLMSSP_CLIENT_1,
|
|
GSS_SPNEGO_CLIENT,
|
|
GSS_SPNEGO_SERVER,
|
|
NTLM_SERVER_1,
|
|
NUM_HELPER_MODES
|
|
};
|
|
|
|
#define NTLM_AUTH_FLAG_USER_SESSION_KEY 0x0004
|
|
#define NTLM_AUTH_FLAG_LMKEY 0x0008
|
|
|
|
|
|
typedef void (*stdio_helper_function)(enum stdio_helper_mode stdio_helper_mode,
|
|
char *buf, int length, void **private,
|
|
unsigned int mux_id, void **private2);
|
|
|
|
static void manage_squid_basic_request (enum stdio_helper_mode stdio_helper_mode,
|
|
char *buf, int length, void **private,
|
|
unsigned int mux_id, void **private2);
|
|
|
|
static void manage_gensec_request (enum stdio_helper_mode stdio_helper_mode,
|
|
char *buf, int length, void **private,
|
|
unsigned int mux_id, void **private2);
|
|
|
|
static void manage_ntlm_server_1_request (enum stdio_helper_mode stdio_helper_mode,
|
|
char *buf, int length, void **private,
|
|
unsigned int mux_id, void **private2);
|
|
|
|
static void manage_squid_request(enum stdio_helper_mode helper_mode,
|
|
stdio_helper_function fn, void **private2);
|
|
|
|
static const struct {
|
|
enum stdio_helper_mode mode;
|
|
const char *name;
|
|
stdio_helper_function fn;
|
|
} stdio_helper_protocols[] = {
|
|
{ SQUID_2_4_BASIC, "squid-2.4-basic", manage_squid_basic_request},
|
|
{ SQUID_2_5_BASIC, "squid-2.5-basic", manage_squid_basic_request},
|
|
{ SQUID_2_5_NTLMSSP, "squid-2.5-ntlmssp", manage_gensec_request},
|
|
{ GSS_SPNEGO_CLIENT, "gss-spnego-client", manage_gensec_request},
|
|
{ GSS_SPNEGO_SERVER, "gss-spnego", manage_gensec_request},
|
|
{ NTLMSSP_CLIENT_1, "ntlmssp-client-1", manage_gensec_request},
|
|
{ NTLM_SERVER_1, "ntlm-server-1", manage_ntlm_server_1_request},
|
|
{ NUM_HELPER_MODES, NULL, NULL}
|
|
};
|
|
|
|
extern int winbindd_fd;
|
|
|
|
static const char *opt_username;
|
|
static const char *opt_domain;
|
|
static const char *opt_workstation;
|
|
static const char *opt_password;
|
|
static int opt_multiplex;
|
|
|
|
|
|
static void mux_printf(unsigned int mux_id, const char *format, ...) PRINTF_ATTRIBUTE(2, 3);
|
|
|
|
static void mux_printf(unsigned int mux_id, const char *format, ...)
|
|
{
|
|
va_list ap;
|
|
|
|
if (opt_multiplex) {
|
|
x_fprintf(x_stdout, "%d ", mux_id);
|
|
}
|
|
|
|
va_start(ap, format);
|
|
x_vfprintf(x_stdout, format, ap);
|
|
va_end(ap);
|
|
}
|
|
|
|
|
|
|
|
/* Copy of parse_domain_user from winbindd_util.c. Parse a string of the
|
|
form DOMAIN/user into a domain and a user */
|
|
|
|
static BOOL parse_ntlm_auth_domain_user(const char *domuser, fstring domain,
|
|
fstring user)
|
|
{
|
|
|
|
char *p = strchr(domuser,*lp_winbind_separator());
|
|
|
|
if (!p) {
|
|
return False;
|
|
}
|
|
|
|
fstrcpy(user, p+1);
|
|
fstrcpy(domain, domuser);
|
|
domain[PTR_DIFF(p, domuser)] = 0;
|
|
|
|
return True;
|
|
}
|
|
|
|
/* Authenticate a user with a plaintext password */
|
|
|
|
static BOOL check_plaintext_auth(const char *user, const char *pass,
|
|
BOOL stdout_diagnostics)
|
|
{
|
|
return (strcmp(pass, opt_password) == 0);
|
|
}
|
|
|
|
/* authenticate a user with an encrypted username/password */
|
|
|
|
static NTSTATUS local_pw_check_specified(const char *username,
|
|
const char *domain,
|
|
const char *workstation,
|
|
const DATA_BLOB *challenge,
|
|
const DATA_BLOB *lm_response,
|
|
const DATA_BLOB *nt_response,
|
|
uint32_t flags,
|
|
DATA_BLOB *lm_session_key,
|
|
DATA_BLOB *user_session_key,
|
|
char **error_string,
|
|
char **unix_name)
|
|
{
|
|
NTSTATUS nt_status;
|
|
uint8_t lm_pw[16], nt_pw[16];
|
|
uint8_t *lm_pwd, *nt_pwd;
|
|
TALLOC_CTX *mem_ctx = talloc_init("local_pw_check_specified");
|
|
if (!mem_ctx) {
|
|
nt_status = NT_STATUS_NO_MEMORY;
|
|
} else {
|
|
|
|
E_md4hash(opt_password, nt_pw);
|
|
if (E_deshash(opt_password, lm_pw)) {
|
|
lm_pwd = lm_pw;
|
|
} else {
|
|
lm_pwd = NULL;
|
|
}
|
|
nt_pwd = nt_pw;
|
|
|
|
|
|
nt_status = ntlm_password_check(mem_ctx,
|
|
challenge,
|
|
lm_response,
|
|
nt_response,
|
|
NULL, NULL,
|
|
username,
|
|
username,
|
|
domain,
|
|
lm_pwd, nt_pwd, user_session_key, lm_session_key);
|
|
|
|
if (NT_STATUS_IS_OK(nt_status)) {
|
|
if (unix_name) {
|
|
asprintf(unix_name,
|
|
"%s%c%s", domain,
|
|
*lp_winbind_separator(),
|
|
username);
|
|
}
|
|
} else {
|
|
DEBUG(3, ("Login for user [%s]\\[%s]@[%s] failed due to [%s]\n",
|
|
domain, username, workstation,
|
|
nt_errstr(nt_status)));
|
|
}
|
|
talloc_free(mem_ctx);
|
|
}
|
|
if (error_string) {
|
|
*error_string = strdup(nt_errstr(nt_status));
|
|
}
|
|
return nt_status;
|
|
|
|
|
|
}
|
|
|
|
static void manage_squid_basic_request(enum stdio_helper_mode stdio_helper_mode,
|
|
char *buf, int length, void **private,
|
|
unsigned int mux_id, void **private2)
|
|
{
|
|
char *user, *pass;
|
|
user=buf;
|
|
|
|
pass=memchr(buf,' ',length);
|
|
if (!pass) {
|
|
DEBUG(2, ("Password not found. Denying access\n"));
|
|
mux_printf(mux_id, "ERR\n");
|
|
return;
|
|
}
|
|
*pass='\0';
|
|
pass++;
|
|
|
|
if (stdio_helper_mode == SQUID_2_5_BASIC) {
|
|
rfc1738_unescape(user);
|
|
rfc1738_unescape(pass);
|
|
}
|
|
|
|
if (check_plaintext_auth(user, pass, False)) {
|
|
mux_printf(mux_id, "OK\n");
|
|
} else {
|
|
mux_printf(mux_id, "ERR\n");
|
|
}
|
|
}
|
|
|
|
/* This is a bit hairy, but the basic idea is to do a password callback
|
|
to the calling application. The callback comes from within gensec */
|
|
|
|
static void manage_gensec_get_pw_request(enum stdio_helper_mode stdio_helper_mode,
|
|
char *buf, int length, void **private,
|
|
unsigned int mux_id, void **password)
|
|
{
|
|
DATA_BLOB in;
|
|
if (strlen(buf) < 2) {
|
|
DEBUG(1, ("query [%s] invalid", buf));
|
|
mux_printf(mux_id, "BH\n");
|
|
return;
|
|
}
|
|
|
|
if (strlen(buf) > 3) {
|
|
in = base64_decode_data_blob(buf + 3);
|
|
} else {
|
|
in = data_blob(NULL, 0);
|
|
}
|
|
|
|
if (strncmp(buf, "PW ", 3) == 0) {
|
|
|
|
*password = talloc_strndup(*private /* hopefully the right gensec context, useful to use for talloc */,
|
|
(const char *)in.data, in.length);
|
|
|
|
if (*password == NULL) {
|
|
DEBUG(1, ("Out of memory\n"));
|
|
mux_printf(mux_id, "BH\n");
|
|
data_blob_free(&in);
|
|
return;
|
|
}
|
|
|
|
mux_printf(mux_id, "OK\n");
|
|
data_blob_free(&in);
|
|
return;
|
|
}
|
|
DEBUG(1, ("Asked for (and expected) a password\n"));
|
|
mux_printf(mux_id, "BH\n");
|
|
data_blob_free(&in);
|
|
}
|
|
|
|
/**
|
|
* Callback for password credentails. This is not async, and when
|
|
* GENSEC and the credentails code is made async, it will look rather
|
|
* different.
|
|
*/
|
|
|
|
static const char *get_password(struct cli_credentials *credentials)
|
|
{
|
|
char *password = NULL;
|
|
|
|
/* Ask for a password */
|
|
mux_printf((unsigned int)credentials->priv_data, "PW\n");
|
|
credentials->priv_data = NULL;
|
|
|
|
manage_squid_request(NUM_HELPER_MODES /* bogus */, manage_gensec_get_pw_request, (void **)&password);
|
|
return password;
|
|
}
|
|
|
|
static void manage_gensec_request(enum stdio_helper_mode stdio_helper_mode,
|
|
char *buf, int length, void **private,
|
|
unsigned int mux_id, void **private2)
|
|
{
|
|
DATA_BLOB in;
|
|
DATA_BLOB out = data_blob(NULL, 0);
|
|
char *out_base64 = NULL;
|
|
const char *reply_arg = NULL;
|
|
struct gensec_security **gensec_state = (struct gensec_security **)private;
|
|
NTSTATUS nt_status;
|
|
BOOL first = False;
|
|
const char *reply_code;
|
|
struct cli_credentials *creds;
|
|
|
|
if (strlen(buf) < 2) {
|
|
DEBUG(1, ("query [%s] invalid", buf));
|
|
mux_printf(mux_id, "BH\n");
|
|
return;
|
|
}
|
|
|
|
if (strlen(buf) > 3) {
|
|
in = base64_decode_data_blob(buf + 3);
|
|
} else {
|
|
in = data_blob(NULL, 0);
|
|
}
|
|
|
|
if (strncmp(buf, "YR", 2) == 0) {
|
|
if (gensec_state && *gensec_state) {
|
|
talloc_free(*gensec_state);
|
|
*gensec_state = NULL;
|
|
}
|
|
} else if ( (strncmp(buf, "OK", 2) == 0)) {
|
|
/* do nothing */
|
|
data_blob_free(&in);
|
|
return;
|
|
} else if ( (strncmp(buf, "TT ", 3) != 0) &&
|
|
(strncmp(buf, "KK ", 3) != 0) &&
|
|
(strncmp(buf, "AF ", 3) != 0) &&
|
|
(strncmp(buf, "NA ", 3) != 0) &&
|
|
(strncmp(buf, "UG", 2) != 0) &&
|
|
(strncmp(buf, "PW ", 3) != 0)) {
|
|
DEBUG(1, ("SPNEGO request [%s] invalid\n", buf));
|
|
mux_printf(mux_id, "BH\n");
|
|
data_blob_free(&in);
|
|
return;
|
|
}
|
|
|
|
/* setup gensec */
|
|
if (!(gensec_state && *gensec_state)) {
|
|
switch (stdio_helper_mode) {
|
|
case GSS_SPNEGO_CLIENT:
|
|
case NTLMSSP_CLIENT_1:
|
|
/* setup the client side */
|
|
|
|
if (!NT_STATUS_IS_OK(gensec_client_start(NULL, gensec_state))) {
|
|
exit(1);
|
|
}
|
|
|
|
creds = cli_credentials_init(*gensec_state);
|
|
cli_credentials_set_conf(creds);
|
|
if (opt_username) {
|
|
cli_credentials_set_username(creds, opt_username, CRED_SPECIFIED);
|
|
}
|
|
if (opt_domain) {
|
|
cli_credentials_set_domain(creds, opt_domain, CRED_SPECIFIED);
|
|
}
|
|
if (opt_password) {
|
|
cli_credentials_set_password(creds, opt_password, CRED_SPECIFIED);
|
|
} else {
|
|
creds->password_obtained = CRED_CALLBACK;
|
|
creds->password_cb = get_password;
|
|
creds->priv_data = (void*)mux_id;
|
|
}
|
|
|
|
gensec_set_credentials(*gensec_state, creds);
|
|
|
|
break;
|
|
case GSS_SPNEGO_SERVER:
|
|
case SQUID_2_5_NTLMSSP:
|
|
if (!NT_STATUS_IS_OK(gensec_server_start(NULL, gensec_state))) {
|
|
exit(1);
|
|
}
|
|
break;
|
|
default:
|
|
abort();
|
|
}
|
|
|
|
switch (stdio_helper_mode) {
|
|
case GSS_SPNEGO_CLIENT:
|
|
case GSS_SPNEGO_SERVER:
|
|
nt_status = gensec_start_mech_by_oid(*gensec_state, GENSEC_OID_SPNEGO);
|
|
if (!in.length) {
|
|
first = True;
|
|
}
|
|
break;
|
|
case NTLMSSP_CLIENT_1:
|
|
if (!in.length) {
|
|
first = True;
|
|
}
|
|
case SQUID_2_5_NTLMSSP:
|
|
nt_status = gensec_start_mech_by_oid(*gensec_state, GENSEC_OID_NTLMSSP);
|
|
break;
|
|
default:
|
|
abort();
|
|
}
|
|
|
|
if (!NT_STATUS_IS_OK(nt_status)) {
|
|
DEBUG(1, ("GENSEC mech failed to start: %s\n", nt_errstr(nt_status)));
|
|
mux_printf(mux_id, "BH\n");
|
|
return;
|
|
}
|
|
}
|
|
|
|
if (strncmp(buf, "PW ", 3) == 0) {
|
|
|
|
cli_credentials_set_password((*gensec_state)->credentials,
|
|
talloc_strndup((*gensec_state),
|
|
(const char *)in.data,
|
|
in.length),
|
|
CRED_SPECIFIED);
|
|
mux_printf(mux_id, "OK\n");
|
|
data_blob_free(&in);
|
|
return;
|
|
}
|
|
|
|
if (strncmp(buf, "UG", 2) == 0) {
|
|
int i;
|
|
char *grouplist = NULL;
|
|
struct auth_session_info *session_info;
|
|
|
|
if (!NT_STATUS_IS_OK(gensec_session_info(*gensec_state, &session_info))) {
|
|
DEBUG(1, ("gensec_session_info failed: %s\n", nt_errstr(nt_status)));
|
|
mux_printf(mux_id, "BH %s\n", nt_errstr(nt_status));
|
|
data_blob_free(&in);
|
|
return;
|
|
}
|
|
|
|
/* get the string onto the context */
|
|
grouplist = talloc_strdup(session_info, "");
|
|
|
|
for (i=0; i<session_info->security_token->num_sids; i++) {
|
|
struct security_token *token = session_info->security_token;
|
|
const char *sidstr = dom_sid_string(session_info,
|
|
token->sids[i]);
|
|
grouplist = talloc_asprintf_append(grouplist, "%s,", sidstr);
|
|
}
|
|
|
|
mux_printf(mux_id, "GL %s\n", grouplist);
|
|
talloc_free(session_info);
|
|
data_blob_free(&in);
|
|
return;
|
|
}
|
|
|
|
/* update */
|
|
|
|
nt_status = gensec_update(*gensec_state, NULL, in, &out);
|
|
|
|
/* don't leak 'bad password'/'no such user' info to the network client */
|
|
nt_status = auth_nt_status_squash(nt_status);
|
|
|
|
if (out.length) {
|
|
out_base64 = base64_encode_data_blob(out);
|
|
} else {
|
|
out_base64 = NULL;
|
|
}
|
|
if (NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
|
|
reply_arg = "*";
|
|
if (first) {
|
|
reply_code = "YR";
|
|
} else if ((*gensec_state)->gensec_role == GENSEC_CLIENT) {
|
|
reply_code = "KK";
|
|
} else if ((*gensec_state)->gensec_role == GENSEC_SERVER) {
|
|
reply_code = "TT";
|
|
} else {
|
|
abort();
|
|
}
|
|
|
|
|
|
} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_ACCESS_DENIED)) {
|
|
reply_code = "BH";
|
|
reply_arg = nt_errstr(nt_status);
|
|
DEBUG(1, ("GENSEC login failed: %s\n", nt_errstr(nt_status)));
|
|
} else if (NT_STATUS_EQUAL(nt_status, NT_STATUS_UNSUCCESSFUL)) {
|
|
reply_code = "BH";
|
|
reply_arg = nt_errstr(nt_status);
|
|
DEBUG(1, ("GENSEC login failed: %s\n", nt_errstr(nt_status)));
|
|
} else if (!NT_STATUS_IS_OK(nt_status)) {
|
|
reply_code = "NA";
|
|
reply_arg = nt_errstr(nt_status);
|
|
DEBUG(1, ("GENSEC login failed: %s\n", nt_errstr(nt_status)));
|
|
} else if /* OK */ ((*gensec_state)->gensec_role == GENSEC_SERVER) {
|
|
struct auth_session_info *session_info;
|
|
|
|
nt_status = gensec_session_info(*gensec_state, &session_info);
|
|
if (!NT_STATUS_IS_OK(nt_status)) {
|
|
reply_code = "BH";
|
|
reply_arg = nt_errstr(nt_status);
|
|
DEBUG(1, ("GENSEC failed to retreive the session info: %s\n", nt_errstr(nt_status)));
|
|
} else {
|
|
|
|
reply_code = "AF";
|
|
reply_arg = talloc_asprintf(*gensec_state,
|
|
"%s%s%s", session_info->server_info->domain_name,
|
|
lp_winbind_separator(), session_info->server_info->account_name);
|
|
talloc_free(session_info);
|
|
}
|
|
} else if ((*gensec_state)->gensec_role == GENSEC_CLIENT) {
|
|
reply_code = "AF";
|
|
reply_arg = NULL;
|
|
} else {
|
|
abort();
|
|
}
|
|
|
|
switch (stdio_helper_mode) {
|
|
case GSS_SPNEGO_SERVER:
|
|
mux_printf(mux_id, "%s %s %s\n", reply_code,
|
|
out_base64 ? out_base64 : "*",
|
|
reply_arg ? reply_arg : "*");
|
|
break;
|
|
default:
|
|
if (out_base64) {
|
|
mux_printf(mux_id, "%s %s\n", reply_code, out_base64);
|
|
} else if (reply_arg) {
|
|
mux_printf(mux_id, "%s %s\n", reply_code, reply_arg);
|
|
} else {
|
|
mux_printf(mux_id, "%s\n", reply_code);
|
|
}
|
|
}
|
|
|
|
SAFE_FREE(out_base64);
|
|
return;
|
|
}
|
|
|
|
static void manage_ntlm_server_1_request(enum stdio_helper_mode stdio_helper_mode,
|
|
char *buf, int length, void **private,
|
|
unsigned int mux_id, void **private2)
|
|
{
|
|
char *request, *parameter;
|
|
static DATA_BLOB challenge;
|
|
static DATA_BLOB lm_response;
|
|
static DATA_BLOB nt_response;
|
|
static char *full_username;
|
|
static char *username;
|
|
static char *domain;
|
|
static char *plaintext_password;
|
|
static BOOL ntlm_server_1_user_session_key;
|
|
static BOOL ntlm_server_1_lm_session_key;
|
|
|
|
if (strequal(buf, ".")) {
|
|
if (!full_username && !username) {
|
|
mux_printf(mux_id, "Error: No username supplied!\n");
|
|
} else if (plaintext_password) {
|
|
/* handle this request as plaintext */
|
|
if (!full_username) {
|
|
if (asprintf(&full_username, "%s%c%s", domain, *lp_winbind_separator(), username) == -1) {
|
|
mux_printf(mux_id, "Error: Out of memory in asprintf!\n.\n");
|
|
return;
|
|
}
|
|
}
|
|
if (check_plaintext_auth(full_username, plaintext_password, False)) {
|
|
mux_printf(mux_id, "Authenticated: Yes\n");
|
|
} else {
|
|
mux_printf(mux_id, "Authenticated: No\n");
|
|
}
|
|
} else if (!lm_response.data && !nt_response.data) {
|
|
mux_printf(mux_id, "Error: No password supplied!\n");
|
|
} else if (!challenge.data) {
|
|
mux_printf(mux_id, "Error: No lanman-challenge supplied!\n");
|
|
} else {
|
|
char *error_string = NULL;
|
|
DATA_BLOB lm_key;
|
|
DATA_BLOB user_session_key;
|
|
uint32_t flags = 0;
|
|
|
|
if (full_username && !username) {
|
|
fstring fstr_user;
|
|
fstring fstr_domain;
|
|
|
|
if (!parse_ntlm_auth_domain_user(full_username, fstr_user, fstr_domain)) {
|
|
/* username might be 'tainted', don't print into our new-line deleimianted stream */
|
|
mux_printf(mux_id, "Error: Could not parse into domain and username\n");
|
|
}
|
|
SAFE_FREE(username);
|
|
SAFE_FREE(domain);
|
|
username = smb_xstrdup(fstr_user);
|
|
domain = smb_xstrdup(fstr_domain);
|
|
}
|
|
|
|
if (!domain) {
|
|
domain = smb_xstrdup(lp_workgroup());
|
|
}
|
|
|
|
if (ntlm_server_1_lm_session_key)
|
|
flags |= NTLM_AUTH_FLAG_LMKEY;
|
|
|
|
if (ntlm_server_1_user_session_key)
|
|
flags |= NTLM_AUTH_FLAG_USER_SESSION_KEY;
|
|
|
|
if (!NT_STATUS_IS_OK(
|
|
local_pw_check_specified(username,
|
|
domain,
|
|
lp_netbios_name(),
|
|
&challenge,
|
|
&lm_response,
|
|
&nt_response,
|
|
flags,
|
|
&lm_key,
|
|
&user_session_key,
|
|
&error_string,
|
|
NULL))) {
|
|
|
|
mux_printf(mux_id, "Authenticated: No\n");
|
|
mux_printf(mux_id, "Authentication-Error: %s\n.\n", error_string);
|
|
SAFE_FREE(error_string);
|
|
} else {
|
|
static char zeros[16];
|
|
char *hex_lm_key;
|
|
char *hex_user_session_key;
|
|
|
|
mux_printf(mux_id, "Authenticated: Yes\n");
|
|
|
|
if (ntlm_server_1_lm_session_key
|
|
&& lm_key.length
|
|
&& (memcmp(zeros, lm_key.data,
|
|
lm_key.length) != 0)) {
|
|
hex_encode(lm_key.data,
|
|
lm_key.length,
|
|
&hex_lm_key);
|
|
mux_printf(mux_id, "LANMAN-Session-Key: %s\n", hex_lm_key);
|
|
SAFE_FREE(hex_lm_key);
|
|
}
|
|
|
|
if (ntlm_server_1_user_session_key
|
|
&& user_session_key.length
|
|
&& (memcmp(zeros, user_session_key.data,
|
|
user_session_key.length) != 0)) {
|
|
hex_encode(user_session_key.data,
|
|
user_session_key.length,
|
|
&hex_user_session_key);
|
|
mux_printf(mux_id, "User-Session-Key: %s\n", hex_user_session_key);
|
|
SAFE_FREE(hex_user_session_key);
|
|
}
|
|
}
|
|
}
|
|
/* clear out the state */
|
|
challenge = data_blob(NULL, 0);
|
|
nt_response = data_blob(NULL, 0);
|
|
lm_response = data_blob(NULL, 0);
|
|
SAFE_FREE(full_username);
|
|
SAFE_FREE(username);
|
|
SAFE_FREE(domain);
|
|
SAFE_FREE(plaintext_password);
|
|
ntlm_server_1_user_session_key = False;
|
|
ntlm_server_1_lm_session_key = False;
|
|
mux_printf(mux_id, ".\n");
|
|
|
|
return;
|
|
}
|
|
|
|
request = buf;
|
|
|
|
/* Indicates a base64 encoded structure */
|
|
parameter = strstr(request, ":: ");
|
|
if (!parameter) {
|
|
parameter = strstr(request, ": ");
|
|
|
|
if (!parameter) {
|
|
DEBUG(0, ("Parameter not found!\n"));
|
|
mux_printf(mux_id, "Error: Parameter not found!\n.\n");
|
|
return;
|
|
}
|
|
|
|
parameter[0] ='\0';
|
|
parameter++;
|
|
parameter[0] ='\0';
|
|
parameter++;
|
|
|
|
} else {
|
|
parameter[0] ='\0';
|
|
parameter++;
|
|
parameter[0] ='\0';
|
|
parameter++;
|
|
parameter[0] ='\0';
|
|
parameter++;
|
|
|
|
base64_decode_inplace(parameter);
|
|
}
|
|
|
|
if (strequal(request, "LANMAN-Challenge")) {
|
|
challenge = strhex_to_data_blob(parameter);
|
|
if (challenge.length != 8) {
|
|
mux_printf(mux_id, "Error: hex decode of %s failed! (got %d bytes, expected 8)\n.\n",
|
|
parameter,
|
|
(int)challenge.length);
|
|
challenge = data_blob(NULL, 0);
|
|
}
|
|
} else if (strequal(request, "NT-Response")) {
|
|
nt_response = strhex_to_data_blob(parameter);
|
|
if (nt_response.length < 24) {
|
|
mux_printf(mux_id, "Error: hex decode of %s failed! (only got %d bytes, needed at least 24)\n.\n",
|
|
parameter,
|
|
(int)nt_response.length);
|
|
nt_response = data_blob(NULL, 0);
|
|
}
|
|
} else if (strequal(request, "LANMAN-Response")) {
|
|
lm_response = strhex_to_data_blob(parameter);
|
|
if (lm_response.length != 24) {
|
|
mux_printf(mux_id, "Error: hex decode of %s failed! (got %d bytes, expected 24)\n.\n",
|
|
parameter,
|
|
(int)lm_response.length);
|
|
lm_response = data_blob(NULL, 0);
|
|
}
|
|
} else if (strequal(request, "Password")) {
|
|
plaintext_password = smb_xstrdup(parameter);
|
|
} else if (strequal(request, "NT-Domain")) {
|
|
domain = smb_xstrdup(parameter);
|
|
} else if (strequal(request, "Username")) {
|
|
username = smb_xstrdup(parameter);
|
|
} else if (strequal(request, "Full-Username")) {
|
|
full_username = smb_xstrdup(parameter);
|
|
} else if (strequal(request, "Request-User-Session-Key")) {
|
|
ntlm_server_1_user_session_key = strequal(parameter, "Yes");
|
|
} else if (strequal(request, "Request-LanMan-Session-Key")) {
|
|
ntlm_server_1_lm_session_key = strequal(parameter, "Yes");
|
|
} else {
|
|
mux_printf(mux_id, "Error: Unknown request %s\n.\n", request);
|
|
}
|
|
}
|
|
|
|
static void manage_squid_request(enum stdio_helper_mode helper_mode,
|
|
stdio_helper_function fn, void **private2)
|
|
{
|
|
char buf[SQUID_BUFFER_SIZE+1];
|
|
unsigned int mux_id;
|
|
int length;
|
|
char *c;
|
|
static BOOL err;
|
|
struct mux_private {
|
|
unsigned int max_mux;
|
|
void **private_pointers;
|
|
};
|
|
|
|
static struct mux_private *mux_private;
|
|
static void *normal_private;
|
|
void **private;
|
|
|
|
/* this is not a typo - x_fgets doesn't work too well under squid */
|
|
if (fgets(buf, sizeof(buf)-1, stdin) == NULL) {
|
|
if (ferror(stdin)) {
|
|
DEBUG(1, ("fgets() failed! dying..... errno=%d (%s)\n", ferror(stdin),
|
|
strerror(ferror(stdin))));
|
|
|
|
exit(1); /* BIIG buffer */
|
|
}
|
|
exit(0);
|
|
}
|
|
|
|
c=memchr(buf,'\n',sizeof(buf)-1);
|
|
if (c) {
|
|
*c = '\0';
|
|
length = c-buf;
|
|
} else {
|
|
err = 1;
|
|
return;
|
|
}
|
|
if (err) {
|
|
DEBUG(0, ("Oversized message\n"));
|
|
x_fprintf(x_stdout, "ERR\n");
|
|
err = 0;
|
|
return;
|
|
}
|
|
|
|
DEBUG(10, ("Got '%s' from squid (length: %d).\n",buf,length));
|
|
|
|
if (buf[0] == '\0') {
|
|
DEBUG(0, ("Invalid Request (empty)\n"));
|
|
x_fprintf(x_stdout, "ERR\n");
|
|
return;
|
|
}
|
|
|
|
if (opt_multiplex) {
|
|
if (sscanf(buf, "%u ", &mux_id) != 1) {
|
|
DEBUG(0, ("Invalid Request - no multiplex id\n"));
|
|
x_fprintf(x_stdout, "ERR\n");
|
|
return;
|
|
}
|
|
if (!mux_private) {
|
|
mux_private = talloc(NULL, struct mux_private);
|
|
mux_private->max_mux = 0;
|
|
mux_private->private_pointers = NULL;
|
|
}
|
|
|
|
c=strchr(buf,' ');
|
|
if (!c) {
|
|
DEBUG(0, ("Invalid Request - no data after multiplex id\n"));
|
|
x_fprintf(x_stdout, "ERR\n");
|
|
return;
|
|
}
|
|
c++;
|
|
if (mux_id >= mux_private->max_mux) {
|
|
unsigned int prev_max = mux_private->max_mux;
|
|
mux_private->max_mux = mux_id + 1;
|
|
mux_private->private_pointers
|
|
= talloc_realloc(mux_private,
|
|
mux_private->private_pointers,
|
|
void *, mux_private->max_mux);
|
|
memset(&mux_private->private_pointers[prev_max], '\0',
|
|
(sizeof(*mux_private->private_pointers) * (mux_private->max_mux - prev_max)));
|
|
};
|
|
|
|
private = &mux_private->private_pointers[mux_id];
|
|
} else {
|
|
c = buf;
|
|
private = &normal_private;
|
|
}
|
|
|
|
fn(helper_mode, c, length, private, mux_id, private2);
|
|
}
|
|
|
|
static void squid_stream(enum stdio_helper_mode stdio_mode,
|
|
stdio_helper_function fn) {
|
|
/* initialize FDescs */
|
|
x_setbuf(x_stdout, NULL);
|
|
x_setbuf(x_stderr, NULL);
|
|
while(1) {
|
|
manage_squid_request(stdio_mode, fn, NULL);
|
|
}
|
|
}
|
|
|
|
|
|
/* Main program */
|
|
|
|
enum {
|
|
OPT_USERNAME = 1000,
|
|
OPT_DOMAIN,
|
|
OPT_WORKSTATION,
|
|
OPT_CHALLENGE,
|
|
OPT_RESPONSE,
|
|
OPT_LM,
|
|
OPT_NT,
|
|
OPT_PASSWORD,
|
|
OPT_LM_KEY,
|
|
OPT_USER_SESSION_KEY,
|
|
OPT_DIAGNOSTICS,
|
|
OPT_REQUIRE_MEMBERSHIP,
|
|
OPT_MULTIPLEX,
|
|
};
|
|
|
|
int main(int argc, const char **argv)
|
|
{
|
|
static const char *helper_protocol;
|
|
int opt;
|
|
|
|
poptContext pc;
|
|
|
|
/* NOTE: DO NOT change this interface without considering the implications!
|
|
This is an external interface, which other programs will use to interact
|
|
with this helper.
|
|
*/
|
|
|
|
/* We do not use single-letter command abbreviations, because they harm future
|
|
interface stability. */
|
|
|
|
struct poptOption long_options[] = {
|
|
POPT_AUTOHELP
|
|
{ "helper-protocol", 0, POPT_ARG_STRING, &helper_protocol, OPT_DOMAIN, "operate as a stdio-based helper", "helper protocol to use"},
|
|
{ "domain", 0, POPT_ARG_STRING, &opt_domain, OPT_DOMAIN, "domain name"},
|
|
{ "workstation", 0, POPT_ARG_STRING, &opt_workstation, OPT_WORKSTATION, "workstation"},
|
|
{ "username", 0, POPT_ARG_STRING, &opt_username, OPT_PASSWORD, "Username"},
|
|
{ "password", 0, POPT_ARG_STRING, &opt_password, OPT_PASSWORD, "User's plaintext password"},
|
|
{ "multiplex", 0, POPT_ARG_NONE, &opt_multiplex, OPT_MULTIPLEX, "Multiplex Mode"},
|
|
POPT_COMMON_SAMBA
|
|
POPT_TABLEEND
|
|
};
|
|
|
|
/* Samba client initialisation */
|
|
|
|
setup_logging(NULL, DEBUG_STDERR);
|
|
|
|
/* Parse options */
|
|
|
|
pc = poptGetContext("ntlm_auth", argc, argv, long_options, 0);
|
|
|
|
/* Parse command line options */
|
|
|
|
if (argc == 1) {
|
|
poptPrintHelp(pc, stderr, 0);
|
|
return 1;
|
|
}
|
|
|
|
pc = poptGetContext(NULL, argc, (const char **)argv, long_options,
|
|
POPT_CONTEXT_KEEP_FIRST);
|
|
|
|
while((opt = poptGetNextOpt(pc)) != -1) {
|
|
if (opt < -1) {
|
|
break;
|
|
}
|
|
}
|
|
if (opt < -1) {
|
|
fprintf(stderr, "%s: %s\n",
|
|
poptBadOption(pc, POPT_BADOPTION_NOALIAS),
|
|
poptStrerror(opt));
|
|
return 1;
|
|
}
|
|
|
|
ntlm_auth_init_subsystems;
|
|
|
|
|
|
if (opt_domain == NULL) {
|
|
opt_domain = lp_workgroup();
|
|
}
|
|
|
|
if (helper_protocol) {
|
|
int i;
|
|
for (i=0; i<NUM_HELPER_MODES; i++) {
|
|
if (strcmp(helper_protocol, stdio_helper_protocols[i].name) == 0) {
|
|
squid_stream(stdio_helper_protocols[i].mode, stdio_helper_protocols[i].fn);
|
|
exit(0);
|
|
}
|
|
}
|
|
x_fprintf(x_stderr, "unknown helper protocol [%s]\n\nValid helper protools:\n\n", helper_protocol);
|
|
|
|
for (i=0; i<NUM_HELPER_MODES; i++) {
|
|
x_fprintf(x_stderr, "%s\n", stdio_helper_protocols[i].name);
|
|
}
|
|
|
|
exit(1);
|
|
}
|
|
|
|
if (!opt_username) {
|
|
x_fprintf(x_stderr, "username must be specified!\n\n");
|
|
poptPrintHelp(pc, stderr, 0);
|
|
exit(1);
|
|
}
|
|
|
|
if (opt_workstation == NULL) {
|
|
opt_workstation = lp_netbios_name();
|
|
}
|
|
|
|
if (!opt_password) {
|
|
opt_password = getpass("password: ");
|
|
}
|
|
|
|
{
|
|
char *user;
|
|
|
|
asprintf(&user, "%s%c%s", opt_domain, *lp_winbind_separator(), opt_username);
|
|
if (!check_plaintext_auth(user, opt_password, True)) {
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
/* Exit code */
|
|
|
|
poptFreeContext(pc);
|
|
return 0;
|
|
}
|