mirror of
https://github.com/samba-team/samba.git
synced 2025-01-25 06:04:04 +03:00
40f2070d3b
authenticate_ldap_simple_bind*() needs to pass the result of the cracknames operation into the auth stack as user_info->client.{account,domain}_name, because user_info->client.{account,domain}_name is also used when forwarding the request via netrLogonSamLogon* to a remote server, for exactly that the values are also used in order to map a AUTH_PASSWORD_PLAIN into AUTH_PASSWORD_RESPONSE, where the NTLMv2 response contains the account and domain names passed in the netr_IdentityInfo value. Otherwise it would not be possible to forward the LDAP simple bind authentication request to a remote DC. Currently this only applies to an RODC that forwards the request to an RWDC. But note that LDAP simple binds (as on Windows) only work for users in the DCs forest, as the DsCrackNames need to work and it can't work for users of remote forests. I tested that in a DC of a forest root domain, if rejected the LDAP simple bind against a different forest, but allowed it for a users of a child domain in the same forest. The NTLMSSP bind worked in both cases. BUG: https://bugzilla.samba.org/show_bug.cgi?id=13879 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Andrew Bartlett <abartlet@samba.org> Autobuild-User(master): Andrew Bartlett <abartlet@samba.org> Autobuild-Date(master): Thu Mar 10 04:10:54 UTC 2022 on sn-devel-184
218 lines
6.2 KiB
C
218 lines
6.2 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
auth functions
|
|
|
|
Copyright (C) Simo Sorce 2005
|
|
Copyright (C) Andrew Tridgell 2005
|
|
Copyright (C) Andrew Bartlett 2005
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include <tevent.h>
|
|
#include "lib/util/tevent_ntstatus.h"
|
|
#include "auth/auth.h"
|
|
#include "dsdb/samdb/samdb.h"
|
|
#include "lib/param/param.h"
|
|
|
|
#undef DBGC_CLASS
|
|
#define DBGC_CLASS DBGC_AUTH
|
|
|
|
struct authenticate_ldap_simple_bind_state {
|
|
bool using_tls;
|
|
struct auth4_context *auth_context;
|
|
struct auth_usersupplied_info *user_info;
|
|
struct auth_session_info *session_info;
|
|
};
|
|
|
|
static void authenticate_ldap_simple_bind_done(struct tevent_req *subreq);
|
|
|
|
_PUBLIC_ struct tevent_req *authenticate_ldap_simple_bind_send(TALLOC_CTX *mem_ctx,
|
|
struct tevent_context *ev,
|
|
struct imessaging_context *msg,
|
|
struct loadparm_context *lp_ctx,
|
|
struct tsocket_address *remote_address,
|
|
struct tsocket_address *local_address,
|
|
bool using_tls,
|
|
const char *dn,
|
|
const char *password)
|
|
{
|
|
struct tevent_req *req = NULL;
|
|
struct authenticate_ldap_simple_bind_state *state = NULL;
|
|
struct auth_usersupplied_info *user_info = NULL;
|
|
const char *nt4_domain = NULL;
|
|
const char *nt4_username = NULL;
|
|
struct tevent_req *subreq = NULL;
|
|
NTSTATUS status;
|
|
|
|
req = tevent_req_create(mem_ctx, &state,
|
|
struct authenticate_ldap_simple_bind_state);
|
|
if (req == NULL) {
|
|
return NULL;
|
|
}
|
|
state->using_tls = using_tls;
|
|
|
|
status = auth_context_create(state, ev, msg, lp_ctx,
|
|
&state->auth_context);
|
|
if (tevent_req_nterror(req, status)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
user_info = talloc_zero(state, struct auth_usersupplied_info);
|
|
if (tevent_req_nomem(user_info, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
state->user_info = user_info;
|
|
|
|
user_info->client.account_name = dn;
|
|
/* No client.domain_name, use account_name instead */
|
|
/* user_info->mapped.* will be filled below */
|
|
|
|
user_info->workstation_name = lpcfg_netbios_name(lp_ctx);
|
|
|
|
user_info->remote_host = remote_address;
|
|
user_info->local_host = local_address;
|
|
|
|
user_info->service_description = "LDAP";
|
|
|
|
if (using_tls) {
|
|
user_info->auth_description = "simple bind/TLS";
|
|
} else {
|
|
user_info->auth_description = "simple bind";
|
|
}
|
|
|
|
user_info->password_state = AUTH_PASSWORD_PLAIN;
|
|
user_info->password.plaintext = talloc_strdup(user_info, password);
|
|
if (tevent_req_nomem(user_info->password.plaintext, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
user_info->flags = USER_INFO_CASE_INSENSITIVE_USERNAME |
|
|
USER_INFO_DONT_CHECK_UNIX_ACCOUNT;
|
|
|
|
user_info->logon_parameters =
|
|
MSV1_0_ALLOW_SERVER_TRUST_ACCOUNT |
|
|
MSV1_0_ALLOW_WORKSTATION_TRUST_ACCOUNT |
|
|
MSV1_0_CLEARTEXT_PASSWORD_ALLOWED |
|
|
MSV1_0_CLEARTEXT_PASSWORD_SUPPLIED;
|
|
|
|
status = crack_auto_name_to_nt4_name(state, state->auth_context->sam_ctx,
|
|
dn, &nt4_domain, &nt4_username);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
log_authentication_event(msg, lp_ctx,
|
|
&state->auth_context->start_time,
|
|
user_info, status,
|
|
NULL, NULL, NULL);
|
|
}
|
|
if (tevent_req_nterror(req, status)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
|
|
user_info->orig_client = user_info->client;
|
|
user_info->client.account_name = nt4_username;
|
|
user_info->client.domain_name = nt4_domain;
|
|
user_info->cracknames_called = true;
|
|
|
|
subreq = auth_check_password_send(state, ev,
|
|
state->auth_context,
|
|
state->user_info);
|
|
if (tevent_req_nomem(subreq, req)) {
|
|
return tevent_req_post(req, ev);
|
|
}
|
|
tevent_req_set_callback(subreq, authenticate_ldap_simple_bind_done, req);
|
|
|
|
return req;
|
|
}
|
|
|
|
static void authenticate_ldap_simple_bind_done(struct tevent_req *subreq)
|
|
{
|
|
struct tevent_req *req =
|
|
tevent_req_callback_data(subreq,
|
|
struct tevent_req);
|
|
struct authenticate_ldap_simple_bind_state *state =
|
|
tevent_req_data(req,
|
|
struct authenticate_ldap_simple_bind_state);
|
|
struct auth4_context *auth_context = state->auth_context;
|
|
struct auth_usersupplied_info *user_info = state->user_info;
|
|
const char *nt4_username = user_info->mapped.account_name;
|
|
const struct tsocket_address *remote_address = user_info->remote_host;
|
|
const struct tsocket_address *local_address = user_info->local_host;
|
|
const char *transport_protection = AUTHZ_TRANSPORT_PROTECTION_NONE;
|
|
struct auth_user_info_dc *user_info_dc = NULL;
|
|
uint8_t authoritative = 1;
|
|
uint32_t flags = 0;
|
|
NTSTATUS nt_status;
|
|
|
|
if (state->using_tls) {
|
|
transport_protection = AUTHZ_TRANSPORT_PROTECTION_TLS;
|
|
}
|
|
|
|
nt_status = auth_check_password_recv(subreq, state,
|
|
&user_info_dc,
|
|
&authoritative);
|
|
TALLOC_FREE(subreq);
|
|
if (tevent_req_nterror(req, nt_status)) {
|
|
return;
|
|
}
|
|
|
|
flags = AUTH_SESSION_INFO_DEFAULT_GROUPS;
|
|
if (user_info_dc->info->authenticated) {
|
|
flags |= AUTH_SESSION_INFO_AUTHENTICATED;
|
|
}
|
|
|
|
nt_status = auth_context->generate_session_info(auth_context,
|
|
state,
|
|
user_info_dc,
|
|
nt4_username,
|
|
flags,
|
|
&state->session_info);
|
|
if (tevent_req_nterror(req, nt_status)) {
|
|
return;
|
|
}
|
|
|
|
log_successful_authz_event(auth_context->msg_ctx,
|
|
auth_context->lp_ctx,
|
|
remote_address,
|
|
local_address,
|
|
"LDAP",
|
|
"simple bind",
|
|
transport_protection,
|
|
state->session_info);
|
|
|
|
tevent_req_done(req);
|
|
}
|
|
|
|
_PUBLIC_ NTSTATUS authenticate_ldap_simple_bind_recv(struct tevent_req *req,
|
|
TALLOC_CTX *mem_ctx,
|
|
struct auth_session_info **session_info)
|
|
{
|
|
struct authenticate_ldap_simple_bind_state *state =
|
|
tevent_req_data(req,
|
|
struct authenticate_ldap_simple_bind_state);
|
|
NTSTATUS status;
|
|
|
|
*session_info = NULL;
|
|
|
|
if (tevent_req_is_nterror(req, &status)) {
|
|
tevent_req_received(req);
|
|
return status;
|
|
}
|
|
|
|
*session_info = talloc_move(mem_ctx, &state->session_info);
|
|
tevent_req_received(req);
|
|
return NT_STATUS_OK;
|
|
}
|