1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-23 17:34:34 +03:00
samba-mirror/source4/ntp_signd/ntp_signd.c
Ralph Boehme 4142bde7e5 s4: rename source4/smbd/ to source4/samba/
Signed-off-by: Ralph Boehme <slow@samba.org>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>

Autobuild-User(master): Ralph Böhme <slow@samba.org>
Autobuild-Date(master): Fri Nov 27 10:07:18 UTC 2020 on sn-devel-184
2020-11-27 10:07:18 +00:00

591 lines
16 KiB
C

/*
Unix SMB/CIFS implementation.
NTP packet signing server
Copyright (C) Andrew Bartlett <abartlet@samba.org> 2005
Copyright (C) Andrew Tridgell 2005
Copyright (C) Stefan Metzmacher 2005
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
#include "includes.h"
#include "samba/service_task.h"
#include "samba/service.h"
#include "samba/service_stream.h"
#include "samba/process_model.h"
#include "lib/stream/packet.h"
#include "lib/tsocket/tsocket.h"
#include "libcli/util/tstream.h"
#include "librpc/gen_ndr/ndr_ntp_signd.h"
#include "param/param.h"
#include "dsdb/samdb/samdb.h"
#include "auth/auth.h"
#include "libcli/security/security.h"
#include "libcli/ldap/ldap_ndr.h"
#include <ldb.h>
#include <ldb_errors.h>
#include "system/network.h"
#include "system/passwd.h"
#include "lib/crypto/gnutls_helpers.h"
#include <gnutls/gnutls.h>
#include <gnutls/crypto.h>
NTSTATUS server_service_ntp_signd_init(TALLOC_CTX *);
/*
top level context structure for the ntp_signd server
*/
struct ntp_signd_server {
struct task_server *task;
struct ldb_context *samdb;
};
/*
state of an open connection
*/
struct ntp_signd_connection {
/* stream connection we belong to */
struct stream_connection *conn;
/* the ntp_signd_server the connection belongs to */
struct ntp_signd_server *ntp_signd;
struct tstream_context *tstream;
struct tevent_queue *send_queue;
};
static void ntp_signd_terminate_connection(struct ntp_signd_connection *ntp_signd_conn, const char *reason)
{
stream_terminate_connection(ntp_signd_conn->conn, reason);
}
static NTSTATUS signing_failure(struct ntp_signd_connection *ntp_signdconn,
TALLOC_CTX *mem_ctx,
DATA_BLOB *output,
uint32_t packet_id)
{
struct signed_reply signed_reply;
enum ndr_err_code ndr_err;
signed_reply.op = SIGNING_FAILURE;
signed_reply.packet_id = packet_id;
signed_reply.signed_packet = data_blob(NULL, 0);
ndr_err = ndr_push_struct_blob(output, mem_ctx, &signed_reply,
(ndr_push_flags_fn_t)ndr_push_signed_reply);
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
DEBUG(1,("failed to push ntp error reply\n"));
return ndr_map_error2ntstatus(ndr_err);
}
return NT_STATUS_OK;
}
/*
receive a full packet on a NTP_SIGND connection
*/
static NTSTATUS ntp_signd_process(struct ntp_signd_connection *ntp_signd_conn,
TALLOC_CTX *mem_ctx,
DATA_BLOB *input,
DATA_BLOB *output)
{
const struct dom_sid *domain_sid;
struct dom_sid *sid;
struct sign_request sign_request;
struct signed_reply signed_reply;
enum ndr_err_code ndr_err;
struct ldb_result *res;
const char *attrs[] = { "unicodePwd", "userAccountControl", "cn", NULL };
gnutls_hash_hd_t hash_hnd = NULL;
struct samr_Password *nt_hash;
uint32_t user_account_control;
struct dom_sid_buf buf;
int ret;
ndr_err = ndr_pull_struct_blob_all(input, mem_ctx,
&sign_request,
(ndr_pull_flags_fn_t)ndr_pull_sign_request);
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
DEBUG(1,("failed to parse ntp signing request\n"));
dump_data(1, input->data, input->length);
return ndr_map_error2ntstatus(ndr_err);
}
/* We need to implement 'check signature' and 'request server
* to sign' operations at some point */
if (sign_request.op != SIGN_TO_CLIENT) {
return signing_failure(ntp_signd_conn,
mem_ctx,
output,
sign_request.packet_id);
}
/* We need to implement 'check signature' and 'request server
* to sign' operations at some point */
if (sign_request.version != NTP_SIGND_PROTOCOL_VERSION_0) {
return signing_failure(ntp_signd_conn,
mem_ctx,
output,
sign_request.packet_id);
}
domain_sid = samdb_domain_sid(ntp_signd_conn->ntp_signd->samdb);
if (domain_sid == NULL) {
return signing_failure(ntp_signd_conn,
mem_ctx,
output,
sign_request.packet_id);
}
/* The top bit is a 'key selector' */
sid = dom_sid_add_rid(mem_ctx, domain_sid,
sign_request.key_id & 0x7FFFFFFF);
if (sid == NULL) {
talloc_free(mem_ctx);
return signing_failure(ntp_signd_conn,
mem_ctx,
output,
sign_request.packet_id);
}
ret = ldb_search(ntp_signd_conn->ntp_signd->samdb, mem_ctx,
&res,
ldb_get_default_basedn(ntp_signd_conn->ntp_signd->samdb),
LDB_SCOPE_SUBTREE,
attrs,
"(&(objectSid=%s)(objectClass=user))",
ldap_encode_ndr_dom_sid(mem_ctx, sid));
if (ret != LDB_SUCCESS) {
DEBUG(2, ("Failed to search for SID %s in SAM for NTP signing: "
"%s\n",
dom_sid_str_buf(sid, &buf),
ldb_errstring(ntp_signd_conn->ntp_signd->samdb)));
return signing_failure(ntp_signd_conn,
mem_ctx,
output,
sign_request.packet_id);
}
if (res->count == 0) {
DEBUG(2, ("Failed to find SID %s in SAM for NTP signing\n",
dom_sid_str_buf(sid, &buf)));
return signing_failure(ntp_signd_conn,
mem_ctx,
output,
sign_request.packet_id);
} else if (res->count != 1) {
DEBUG(1, ("Found SID %s %u times in SAM for NTP signing\n",
dom_sid_str_buf(sid, &buf),
res->count));
return signing_failure(ntp_signd_conn,
mem_ctx,
output,
sign_request.packet_id);
}
user_account_control = ldb_msg_find_attr_as_uint(res->msgs[0],
"userAccountControl",
0);
if (user_account_control & UF_ACCOUNTDISABLE) {
DEBUG(1, ("Account %s for SID [%s] is disabled\n",
ldb_dn_get_linearized(res->msgs[0]->dn),
dom_sid_str_buf(sid, &buf)));
return NT_STATUS_ACCESS_DENIED;
}
if (!(user_account_control & (UF_INTERDOMAIN_TRUST_ACCOUNT|UF_SERVER_TRUST_ACCOUNT|UF_WORKSTATION_TRUST_ACCOUNT))) {
DEBUG(1, ("Account %s for SID [%s] is not a trust account\n",
ldb_dn_get_linearized(res->msgs[0]->dn),
dom_sid_str_buf(sid, &buf)));
return NT_STATUS_ACCESS_DENIED;
}
nt_hash = samdb_result_hash(mem_ctx, res->msgs[0], "unicodePwd");
if (!nt_hash) {
DEBUG(1, ("No unicodePwd found on record of SID %s "
"for NTP signing\n",
dom_sid_str_buf(sid, &buf)));
return signing_failure(ntp_signd_conn,
mem_ctx,
output,
sign_request.packet_id);
}
/* Generate the reply packet */
signed_reply.packet_id = sign_request.packet_id;
signed_reply.op = SIGNING_SUCCESS;
signed_reply.signed_packet = data_blob_talloc(mem_ctx,
NULL,
sign_request.packet_to_sign.length + 20);
if (!signed_reply.signed_packet.data) {
return signing_failure(ntp_signd_conn,
mem_ctx,
output,
sign_request.packet_id);
}
memcpy(signed_reply.signed_packet.data, sign_request.packet_to_sign.data, sign_request.packet_to_sign.length);
SIVAL(signed_reply.signed_packet.data, sign_request.packet_to_sign.length, sign_request.key_id);
/* Sign the NTP response with the unicodePwd */
ret = gnutls_hash_init(&hash_hnd, GNUTLS_DIG_MD5);
if (ret < 0) {
return gnutls_error_to_ntstatus(ret, NT_STATUS_HASH_NOT_SUPPORTED);
}
ret = gnutls_hash(hash_hnd,
nt_hash->hash,
sizeof(nt_hash->hash));
if (ret < 0) {
gnutls_hash_deinit(hash_hnd, NULL);
return gnutls_error_to_ntstatus(ret, NT_STATUS_HASH_NOT_SUPPORTED);
}
ret = gnutls_hash(hash_hnd,
sign_request.packet_to_sign.data,
sign_request.packet_to_sign.length);
if (ret < 0) {
gnutls_hash_deinit(hash_hnd, NULL);
return gnutls_error_to_ntstatus(ret, NT_STATUS_HASH_NOT_SUPPORTED);
}
gnutls_hash_deinit(hash_hnd,
signed_reply.signed_packet.data +
sign_request.packet_to_sign.length + 4);
/* Place it into the packet for the wire */
ndr_err = ndr_push_struct_blob(output, mem_ctx, &signed_reply,
(ndr_push_flags_fn_t)ndr_push_signed_reply);
if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
DEBUG(1,("failed to push ntp error reply\n"));
return ndr_map_error2ntstatus(ndr_err);
}
return NT_STATUS_OK;
}
/*
called on a tcp recv
*/
static void ntp_signd_recv(struct stream_connection *conn, uint16_t flags)
{
struct ntp_signd_connection *ntp_signd_conn = talloc_get_type(conn->private_data,
struct ntp_signd_connection);
ntp_signd_terminate_connection(ntp_signd_conn,
"ntp_signd_recv: called");
}
/*
called when we can write to a connection
*/
static void ntp_signd_send(struct stream_connection *conn, uint16_t flags)
{
struct ntp_signd_connection *ntp_signd_conn = talloc_get_type(conn->private_data,
struct ntp_signd_connection);
/* this should never be triggered! */
ntp_signd_terminate_connection(ntp_signd_conn,
"ntp_signd_send: called");
}
struct ntp_signd_call {
struct ntp_signd_connection *ntp_signd_conn;
DATA_BLOB in;
DATA_BLOB out;
uint8_t out_hdr[4];
struct iovec out_iov[2];
};
static void ntp_signd_call_writev_done(struct tevent_req *subreq);
static void ntp_signd_call_loop(struct tevent_req *subreq)
{
struct ntp_signd_connection *ntp_signd_conn = tevent_req_callback_data(subreq,
struct ntp_signd_connection);
struct ntp_signd_call *call;
NTSTATUS status;
call = talloc(ntp_signd_conn, struct ntp_signd_call);
if (call == NULL) {
ntp_signd_terminate_connection(ntp_signd_conn,
"ntp_signd_call_loop: "
"no memory for ntp_signd_call");
return;
}
call->ntp_signd_conn = ntp_signd_conn;
status = tstream_read_pdu_blob_recv(subreq,
call,
&call->in);
TALLOC_FREE(subreq);
if (!NT_STATUS_IS_OK(status)) {
const char *reason;
reason = talloc_asprintf(call, "ntp_signd_call_loop: "
"tstream_read_pdu_blob_recv() - %s",
nt_errstr(status));
if (reason == NULL) {
reason = nt_errstr(status);
}
ntp_signd_terminate_connection(ntp_signd_conn, reason);
return;
}
DEBUG(10,("Received NTP TCP packet of length %lu from %s\n",
(long) call->in.length,
tsocket_address_string(ntp_signd_conn->conn->remote_address, call)));
/* skip length header */
call->in.data +=4;
call->in.length -= 4;
status = ntp_signd_process(ntp_signd_conn,
call,
&call->in,
&call->out);
if (! NT_STATUS_IS_OK(status)) {
const char *reason;
reason = talloc_asprintf(call, "ntp_signd_process failed: %s",
nt_errstr(status));
if (reason == NULL) {
reason = nt_errstr(status);
}
ntp_signd_terminate_connection(ntp_signd_conn, reason);
return;
}
/* First add the length of the out buffer */
RSIVAL(call->out_hdr, 0, call->out.length);
call->out_iov[0].iov_base = (char *) call->out_hdr;
call->out_iov[0].iov_len = 4;
call->out_iov[1].iov_base = (char *) call->out.data;
call->out_iov[1].iov_len = call->out.length;
subreq = tstream_writev_queue_send(call,
ntp_signd_conn->conn->event.ctx,
ntp_signd_conn->tstream,
ntp_signd_conn->send_queue,
call->out_iov, 2);
if (subreq == NULL) {
ntp_signd_terminate_connection(ntp_signd_conn, "ntp_signd_call_loop: "
"no memory for tstream_writev_queue_send");
return;
}
tevent_req_set_callback(subreq, ntp_signd_call_writev_done, call);
/*
* The NTP tcp pdu's has the length as 4 byte (initial_read_size),
* packet_full_request_u32 provides the pdu length then.
*/
subreq = tstream_read_pdu_blob_send(ntp_signd_conn,
ntp_signd_conn->conn->event.ctx,
ntp_signd_conn->tstream,
4, /* initial_read_size */
packet_full_request_u32,
ntp_signd_conn);
if (subreq == NULL) {
ntp_signd_terminate_connection(ntp_signd_conn, "ntp_signd_call_loop: "
"no memory for tstream_read_pdu_blob_send");
return;
}
tevent_req_set_callback(subreq, ntp_signd_call_loop, ntp_signd_conn);
}
static void ntp_signd_call_writev_done(struct tevent_req *subreq)
{
struct ntp_signd_call *call = tevent_req_callback_data(subreq,
struct ntp_signd_call);
int sys_errno;
int rc;
rc = tstream_writev_queue_recv(subreq, &sys_errno);
TALLOC_FREE(subreq);
if (rc == -1) {
const char *reason;
reason = talloc_asprintf(call, "ntp_signd_call_writev_done: "
"tstream_writev_queue_recv() - %d:%s",
sys_errno, strerror(sys_errno));
if (!reason) {
reason = "ntp_signd_call_writev_done: "
"tstream_writev_queue_recv() failed";
}
ntp_signd_terminate_connection(call->ntp_signd_conn, reason);
return;
}
/* We don't care about errors */
talloc_free(call);
}
/*
called when we get a new connection
*/
static void ntp_signd_accept(struct stream_connection *conn)
{
struct ntp_signd_server *ntp_signd = talloc_get_type(conn->private_data,
struct ntp_signd_server);
struct ntp_signd_connection *ntp_signd_conn;
struct tevent_req *subreq;
int rc;
ntp_signd_conn = talloc_zero(conn, struct ntp_signd_connection);
if (ntp_signd_conn == NULL) {
stream_terminate_connection(conn,
"ntp_signd_accept: out of memory");
return;
}
ntp_signd_conn->send_queue = tevent_queue_create(conn,
"ntp_signd_accept");
if (ntp_signd_conn->send_queue == NULL) {
stream_terminate_connection(conn,
"ntp_signd_accept: out of memory");
return;
}
TALLOC_FREE(conn->event.fde);
rc = tstream_bsd_existing_socket(ntp_signd_conn,
socket_get_fd(conn->socket),
&ntp_signd_conn->tstream);
if (rc < 0) {
stream_terminate_connection(conn,
"ntp_signd_accept: out of memory");
return;
}
ntp_signd_conn->conn = conn;
ntp_signd_conn->ntp_signd = ntp_signd;
conn->private_data = ntp_signd_conn;
/*
* The NTP tcp pdu's has the length as 4 byte (initial_read_size),
* packet_full_request_u32 provides the pdu length then.
*/
subreq = tstream_read_pdu_blob_send(ntp_signd_conn,
ntp_signd_conn->conn->event.ctx,
ntp_signd_conn->tstream,
4, /* initial_read_size */
packet_full_request_u32,
ntp_signd_conn);
if (subreq == NULL) {
ntp_signd_terminate_connection(ntp_signd_conn,
"ntp_signd_accept: "
"no memory for tstream_read_pdu_blob_send");
return;
}
tevent_req_set_callback(subreq, ntp_signd_call_loop, ntp_signd_conn);
}
static const struct stream_server_ops ntp_signd_stream_ops = {
.name = "ntp_signd",
.accept_connection = ntp_signd_accept,
.recv_handler = ntp_signd_recv,
.send_handler = ntp_signd_send
};
/*
startup the ntp_signd task
*/
static NTSTATUS ntp_signd_task_init(struct task_server *task)
{
struct ntp_signd_server *ntp_signd;
NTSTATUS status;
const char *address;
if (!directory_create_or_exist_strict(lpcfg_ntp_signd_socket_directory(task->lp_ctx), geteuid(), 0750)) {
char *error = talloc_asprintf(task, "Cannot create NTP signd pipe directory: %s",
lpcfg_ntp_signd_socket_directory(task->lp_ctx));
task_server_terminate(task,
error, true);
return NT_STATUS_UNSUCCESSFUL;
}
task_server_set_title(task, "task[ntp_signd]");
ntp_signd = talloc(task, struct ntp_signd_server);
if (ntp_signd == NULL) {
task_server_terminate(task, "ntp_signd: out of memory", true);
return NT_STATUS_NO_MEMORY;
}
ntp_signd->task = task;
/* Must be system to get at the password hashes */
ntp_signd->samdb = samdb_connect(ntp_signd,
task->event_ctx,
task->lp_ctx,
system_session(task->lp_ctx),
NULL,
0);
if (ntp_signd->samdb == NULL) {
task_server_terminate(task, "ntp_signd failed to open samdb", true);
return NT_STATUS_UNSUCCESSFUL;
}
address = talloc_asprintf(ntp_signd, "%s/socket", lpcfg_ntp_signd_socket_directory(task->lp_ctx));
if (address == NULL) {
task_server_terminate(
task, "ntp_signd out of memory in talloc_asprintf()", true);
return NT_STATUS_NO_MEMORY;
}
status = stream_setup_socket(ntp_signd->task,
ntp_signd->task->event_ctx,
ntp_signd->task->lp_ctx,
task->model_ops,
&ntp_signd_stream_ops,
"unix", address, NULL,
lpcfg_socket_options(ntp_signd->task->lp_ctx),
ntp_signd,
ntp_signd->task->process_context);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(0,("Failed to bind to %s - %s\n",
address, nt_errstr(status)));
return status;
}
return NT_STATUS_OK;
}
/* called at smbd startup - register ourselves as a server service */
NTSTATUS server_service_ntp_signd_init(TALLOC_CTX *ctx)
{
static const struct service_details details = {
.inhibit_fork_on_accept = true,
.inhibit_pre_fork = true,
.task_init = ntp_signd_task_init,
.post_fork = NULL
};
return register_server_service(ctx, "ntp_signd", &details);
}