2 Unix SMB/CIFS implementation.
6 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2005
7 Copyright (C) Andrew Tridgell 2005
8 Copyright (C) Stefan Metzmacher 2005
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>.
25 #include "smbd/service_task.h"
26 #include "smbd/service.h"
27 #include "smbd/service_stream.h"
28 #include "smbd/process_model.h"
29 #include "lib/events/events.h"
30 #include "lib/socket/socket.h"
32 #include "system/network.h"
33 #include "lib/util/dlinklist.h"
34 #include "lib/messaging/irpc.h"
35 #include "lib/stream/packet.h"
36 #include "librpc/gen_ndr/samr.h"
37 #include "lib/socket/netif.h"
38 #include "heimdal/kdc/windc_plugin.h"
39 #include "heimdal/lib/krb5/krb5_locl.h"
40 #include "heimdal/kdc/kdc_locl.h"
41 #include "param/param.h"
44 /* Disgusting hack to get a mem_ctx and lp_ctx into the hdb plugin, when
46 TALLOC_CTX
*kdc_mem_ctx
;
47 struct loadparm_context
*kdc_lp_ctx
;
49 /* hold all the info needed to send a reply */
51 struct kdc_reply
*next
, *prev
;
52 struct socket_address
*dest
;
56 typedef bool (*kdc_process_fn_t
)(struct kdc_server
*kdc
,
60 struct socket_address
*peer_addr
,
61 struct socket_address
*my_addr
,
64 /* hold information about one kdc socket */
66 struct socket_context
*sock
;
67 struct kdc_server
*kdc
;
70 /* a queue of outgoing replies that have been deferred */
71 struct kdc_reply
*send_queue
;
73 kdc_process_fn_t process
;
76 state of an open tcp connection
78 struct kdc_tcp_connection
{
79 /* stream connection we belong to */
80 struct stream_connection
*conn
;
82 /* the kdc_server the connection belongs to */
83 struct kdc_server
*kdc
;
85 struct packet_context
*packet
;
87 kdc_process_fn_t process
;
91 handle fd send events on a KDC socket
93 static void kdc_send_handler(struct kdc_socket
*kdc_socket
)
95 while (kdc_socket
->send_queue
) {
96 struct kdc_reply
*rep
= kdc_socket
->send_queue
;
100 status
= socket_sendto(kdc_socket
->sock
, &rep
->packet
, &sendlen
,
102 if (NT_STATUS_EQUAL(status
, STATUS_MORE_ENTRIES
)) {
105 if (NT_STATUS_EQUAL(status
, NT_STATUS_INVALID_BUFFER_SIZE
)) {
106 /* Replace with a krb err, response to big */
109 DLIST_REMOVE(kdc_socket
->send_queue
, rep
);
113 if (kdc_socket
->send_queue
== NULL
) {
114 EVENT_FD_NOT_WRITEABLE(kdc_socket
->fde
);
120 handle fd recv events on a KDC socket
122 static void kdc_recv_handler(struct kdc_socket
*kdc_socket
)
125 TALLOC_CTX
*tmp_ctx
= talloc_new(kdc_socket
);
127 struct kdc_reply
*rep
;
130 struct socket_address
*src
;
131 struct socket_address
*my_addr
;
134 status
= socket_pending(kdc_socket
->sock
, &dsize
);
135 if (!NT_STATUS_IS_OK(status
)) {
136 talloc_free(tmp_ctx
);
140 blob
= data_blob_talloc(tmp_ctx
, NULL
, dsize
);
141 if (blob
.data
== NULL
) {
142 /* hope this is a temporary low memory condition */
143 talloc_free(tmp_ctx
);
147 status
= socket_recvfrom(kdc_socket
->sock
, blob
.data
, blob
.length
, &nread
,
149 if (!NT_STATUS_IS_OK(status
)) {
150 talloc_free(tmp_ctx
);
155 DEBUG(10,("Received krb5 UDP packet of length %lu from %s:%u\n",
156 (long)blob
.length
, src
->addr
, (uint16_t)src
->port
));
158 my_addr
= socket_get_my_addr(kdc_socket
->sock
, tmp_ctx
);
160 talloc_free(tmp_ctx
);
166 ret
= kdc_socket
->process(kdc_socket
->kdc
,
173 talloc_free(tmp_ctx
);
177 /* queue a pending reply */
178 rep
= talloc(kdc_socket
, struct kdc_reply
);
180 talloc_free(tmp_ctx
);
183 rep
->dest
= talloc_steal(rep
, src
);
185 talloc_steal(rep
, reply
.data
);
187 if (rep
->packet
.data
== NULL
) {
189 talloc_free(tmp_ctx
);
193 DLIST_ADD_END(kdc_socket
->send_queue
, rep
, struct kdc_reply
*);
194 EVENT_FD_WRITEABLE(kdc_socket
->fde
);
195 talloc_free(tmp_ctx
);
199 handle fd events on a KDC socket
201 static void kdc_socket_handler(struct event_context
*ev
, struct fd_event
*fde
,
202 uint16_t flags
, void *private)
204 struct kdc_socket
*kdc_socket
= talloc_get_type(private, struct kdc_socket
);
205 if (flags
& EVENT_FD_WRITE
) {
206 kdc_send_handler(kdc_socket
);
208 if (flags
& EVENT_FD_READ
) {
209 kdc_recv_handler(kdc_socket
);
213 static void kdc_tcp_terminate_connection(struct kdc_tcp_connection
*kdcconn
, const char *reason
)
215 stream_terminate_connection(kdcconn
->conn
, reason
);
219 receive a full packet on a KDC connection
221 static NTSTATUS
kdc_tcp_recv(void *private, DATA_BLOB blob
)
223 struct kdc_tcp_connection
*kdcconn
= talloc_get_type(private,
224 struct kdc_tcp_connection
);
225 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
226 TALLOC_CTX
*tmp_ctx
= talloc_new(kdcconn
);
228 DATA_BLOB input
, reply
;
229 struct socket_address
*src_addr
;
230 struct socket_address
*my_addr
;
232 talloc_steal(tmp_ctx
, blob
.data
);
234 src_addr
= socket_get_peer_addr(kdcconn
->conn
->socket
, tmp_ctx
);
236 talloc_free(tmp_ctx
);
237 return NT_STATUS_NO_MEMORY
;
240 my_addr
= socket_get_my_addr(kdcconn
->conn
->socket
, tmp_ctx
);
242 talloc_free(tmp_ctx
);
243 return NT_STATUS_NO_MEMORY
;
247 input
= data_blob_const(blob
.data
+ 4, blob
.length
- 4);
249 ret
= kdcconn
->process(kdcconn
->kdc
,
255 0 /* Not datagram */);
257 talloc_free(tmp_ctx
);
258 return NT_STATUS_INTERNAL_ERROR
;
261 /* and now encode the reply */
262 blob
= data_blob_talloc(kdcconn
, NULL
, reply
.length
+ 4);
264 talloc_free(tmp_ctx
);
265 return NT_STATUS_NO_MEMORY
;
268 RSIVAL(blob
.data
, 0, reply
.length
);
269 memcpy(blob
.data
+ 4, reply
.data
, reply
.length
);
271 status
= packet_send(kdcconn
->packet
, blob
);
272 if (!NT_STATUS_IS_OK(status
)) {
273 talloc_free(tmp_ctx
);
277 /* the call isn't needed any more */
278 talloc_free(tmp_ctx
);
283 receive some data on a KDC connection
285 static void kdc_tcp_recv_handler(struct stream_connection
*conn
, uint16_t flags
)
287 struct kdc_tcp_connection
*kdcconn
= talloc_get_type(conn
->private,
288 struct kdc_tcp_connection
);
289 packet_recv(kdcconn
->packet
);
293 called on a tcp recv error
295 static void kdc_tcp_recv_error(void *private, NTSTATUS status
)
297 struct kdc_tcp_connection
*kdcconn
= talloc_get_type(private, struct kdc_tcp_connection
);
298 kdc_tcp_terminate_connection(kdcconn
, nt_errstr(status
));
302 called when we can write to a connection
304 static void kdc_tcp_send(struct stream_connection
*conn
, uint16_t flags
)
306 struct kdc_tcp_connection
*kdcconn
= talloc_get_type(conn
->private,
307 struct kdc_tcp_connection
);
308 packet_queue_run(kdcconn
->packet
);
312 Wrapper for krb5_kdc_process_krb5_request, converting to/from Samba
316 static bool kdc_process(struct kdc_server
*kdc
,
320 struct socket_address
*peer_addr
,
321 struct socket_address
*my_addr
,
326 krb5_data_zero(&k5_reply
);
328 krb5_kdc_update_time(NULL
);
330 DEBUG(10,("Received KDC packet of length %lu from %s:%d\n",
331 (long)input
->length
- 4, peer_addr
->addr
, peer_addr
->port
));
333 ret
= krb5_kdc_process_krb5_request(kdc
->smb_krb5_context
->krb5_context
,
335 input
->data
, input
->length
,
341 *reply
= data_blob(NULL
, 0);
344 if (k5_reply
.length
) {
345 *reply
= data_blob_talloc(mem_ctx
, k5_reply
.data
, k5_reply
.length
);
346 krb5_free_data_contents(kdc
->smb_krb5_context
->krb5_context
, &k5_reply
);
348 *reply
= data_blob(NULL
, 0);
354 called when we get a new connection
356 static void kdc_tcp_generic_accept(struct stream_connection
*conn
, kdc_process_fn_t process_fn
)
358 struct kdc_server
*kdc
= talloc_get_type(conn
->private, struct kdc_server
);
359 struct kdc_tcp_connection
*kdcconn
;
361 kdcconn
= talloc_zero(conn
, struct kdc_tcp_connection
);
363 stream_terminate_connection(conn
, "kdc_tcp_accept: out of memory");
366 kdcconn
->conn
= conn
;
368 kdcconn
->process
= process_fn
;
369 conn
->private = kdcconn
;
371 kdcconn
->packet
= packet_init(kdcconn
);
372 if (kdcconn
->packet
== NULL
) {
373 kdc_tcp_terminate_connection(kdcconn
, "kdc_tcp_accept: out of memory");
376 packet_set_private(kdcconn
->packet
, kdcconn
);
377 packet_set_socket(kdcconn
->packet
, conn
->socket
);
378 packet_set_callback(kdcconn
->packet
, kdc_tcp_recv
);
379 packet_set_full_request(kdcconn
->packet
, packet_full_request_u32
);
380 packet_set_error_handler(kdcconn
->packet
, kdc_tcp_recv_error
);
381 packet_set_event_context(kdcconn
->packet
, conn
->event
.ctx
);
382 packet_set_fde(kdcconn
->packet
, conn
->event
.fde
);
383 packet_set_serialise(kdcconn
->packet
);
386 static void kdc_tcp_accept(struct stream_connection
*conn
)
388 kdc_tcp_generic_accept(conn
, kdc_process
);
391 static const struct stream_server_ops kdc_tcp_stream_ops
= {
393 .accept_connection
= kdc_tcp_accept
,
394 .recv_handler
= kdc_tcp_recv_handler
,
395 .send_handler
= kdc_tcp_send
398 static void kpasswdd_tcp_accept(struct stream_connection
*conn
)
400 kdc_tcp_generic_accept(conn
, kpasswdd_process
);
403 static const struct stream_server_ops kpasswdd_tcp_stream_ops
= {
404 .name
= "kpasswdd_tcp",
405 .accept_connection
= kpasswdd_tcp_accept
,
406 .recv_handler
= kdc_tcp_recv_handler
,
407 .send_handler
= kdc_tcp_send
411 start listening on the given address
413 static NTSTATUS
kdc_add_socket(struct kdc_server
*kdc
, const char *address
,
414 uint16_t kdc_port
, uint16_t kpasswd_port
)
416 const struct model_ops
*model_ops
;
417 struct kdc_socket
*kdc_socket
;
418 struct kdc_socket
*kpasswd_socket
;
419 struct socket_address
*kdc_address
, *kpasswd_address
;
422 kdc_socket
= talloc(kdc
, struct kdc_socket
);
423 NT_STATUS_HAVE_NO_MEMORY(kdc_socket
);
425 kpasswd_socket
= talloc(kdc
, struct kdc_socket
);
426 NT_STATUS_HAVE_NO_MEMORY(kpasswd_socket
);
428 status
= socket_create("ip", SOCKET_TYPE_DGRAM
, &kdc_socket
->sock
, 0);
429 if (!NT_STATUS_IS_OK(status
)) {
430 talloc_free(kdc_socket
);
434 status
= socket_create("ip", SOCKET_TYPE_DGRAM
, &kpasswd_socket
->sock
, 0);
435 if (!NT_STATUS_IS_OK(status
)) {
436 talloc_free(kpasswd_socket
);
440 kdc_socket
->kdc
= kdc
;
441 kdc_socket
->send_queue
= NULL
;
442 kdc_socket
->process
= kdc_process
;
444 talloc_steal(kdc_socket
, kdc_socket
->sock
);
446 kdc_socket
->fde
= event_add_fd(kdc
->task
->event_ctx
, kdc
,
447 socket_get_fd(kdc_socket
->sock
), EVENT_FD_READ
,
448 kdc_socket_handler
, kdc_socket
);
450 kdc_address
= socket_address_from_strings(kdc_socket
, kdc_socket
->sock
->backend_name
,
452 NT_STATUS_HAVE_NO_MEMORY(kdc_address
);
454 status
= socket_listen(kdc_socket
->sock
, kdc_address
, 0, 0);
455 if (!NT_STATUS_IS_OK(status
)) {
456 DEBUG(0,("Failed to bind to %s:%d UDP for kdc - %s\n",
457 address
, kdc_port
, nt_errstr(status
)));
458 talloc_free(kdc_socket
);
462 kpasswd_socket
->kdc
= kdc
;
463 kpasswd_socket
->send_queue
= NULL
;
464 kpasswd_socket
->process
= kpasswdd_process
;
466 talloc_steal(kpasswd_socket
, kpasswd_socket
->sock
);
468 kpasswd_socket
->fde
= event_add_fd(kdc
->task
->event_ctx
, kdc
,
469 socket_get_fd(kpasswd_socket
->sock
), EVENT_FD_READ
,
470 kdc_socket_handler
, kpasswd_socket
);
472 kpasswd_address
= socket_address_from_strings(kpasswd_socket
, kpasswd_socket
->sock
->backend_name
,
473 address
, kpasswd_port
);
474 NT_STATUS_HAVE_NO_MEMORY(kpasswd_address
);
476 status
= socket_listen(kpasswd_socket
->sock
, kpasswd_address
, 0, 0);
477 if (!NT_STATUS_IS_OK(status
)) {
478 DEBUG(0,("Failed to bind to %s:%d UDP for kpasswd - %s\n",
479 address
, kpasswd_port
, nt_errstr(status
)));
480 talloc_free(kpasswd_socket
);
484 /* within the kdc task we want to be a single process, so
485 ask for the single process model ops and pass these to the
486 stream_setup_socket() call. */
487 model_ops
= process_model_byname("single");
489 DEBUG(0,("Can't find 'single' process model_ops\n"));
490 talloc_free(kdc_socket
);
491 return NT_STATUS_INTERNAL_ERROR
;
494 status
= stream_setup_socket(kdc
->task
->event_ctx
,
498 "ip", address
, &kdc_port
,
499 lp_socket_options(kdc
->task
->lp_ctx
),
501 if (!NT_STATUS_IS_OK(status
)) {
502 DEBUG(0,("Failed to bind to %s:%u TCP - %s\n",
503 address
, kdc_port
, nt_errstr(status
)));
504 talloc_free(kdc_socket
);
508 status
= stream_setup_socket(kdc
->task
->event_ctx
,
511 &kpasswdd_tcp_stream_ops
,
512 "ip", address
, &kpasswd_port
,
513 lp_socket_options(kdc
->task
->lp_ctx
),
515 if (!NT_STATUS_IS_OK(status
)) {
516 DEBUG(0,("Failed to bind to %s:%u TCP - %s\n",
517 address
, kpasswd_port
, nt_errstr(status
)));
518 talloc_free(kdc_socket
);
527 setup our listening sockets on the configured network interfaces
529 static NTSTATUS
kdc_startup_interfaces(struct kdc_server
*kdc
, struct loadparm_context
*lp_ctx
,
530 struct interface
*ifaces
)
533 TALLOC_CTX
*tmp_ctx
= talloc_new(kdc
);
537 num_interfaces
= iface_count(ifaces
);
539 for (i
=0; i
<num_interfaces
; i
++) {
540 const char *address
= talloc_strdup(tmp_ctx
, iface_n_ip(ifaces
, i
));
541 status
= kdc_add_socket(kdc
, address
, lp_krb5_port(lp_ctx
),
542 lp_kpasswd_port(lp_ctx
));
543 NT_STATUS_NOT_OK_RETURN(status
);
546 talloc_free(tmp_ctx
);
551 static struct krb5plugin_windc_ftable windc_plugin_table
= {
552 .minor_version
= KRB5_WINDC_PLUGING_MINOR
,
553 .init
= samba_kdc_plugin_init
,
554 .fini
= samba_kdc_plugin_fini
,
555 .pac_generate
= samba_kdc_get_pac
,
556 .pac_verify
= samba_kdc_reget_pac
,
557 .client_access
= samba_kdc_check_client_access
,
564 static void kdc_task_init(struct task_server
*task
)
566 struct kdc_server
*kdc
;
569 struct interface
*ifaces
;
571 switch (lp_server_role(task
->lp_ctx
)) {
572 case ROLE_STANDALONE
:
573 task_server_terminate(task
, "kdc: no KDC required in standalone configuration");
575 case ROLE_DOMAIN_MEMBER
:
576 task_server_terminate(task
, "kdc: no KDC required in member server configuration");
578 case ROLE_DOMAIN_CONTROLLER
:
579 /* Yes, we want a KDC */
583 load_interfaces(task
, lp_interfaces(task
->lp_ctx
), &ifaces
);
585 if (iface_count(ifaces
) == 0) {
586 task_server_terminate(task
, "kdc: no network interfaces configured");
590 task_server_set_title(task
, "task[kdc]");
592 kdc
= talloc(task
, struct kdc_server
);
594 task_server_terminate(task
, "kdc: out of memory");
600 initialize_krb5_error_table();
602 ret
= smb_krb5_init_context(kdc
, task
->event_ctx
, task
->lp_ctx
, &kdc
->smb_krb5_context
);
604 DEBUG(1,("kdc_task_init: krb5_init_context failed (%s)\n",
605 error_message(ret
)));
606 task_server_terminate(task
, "kdc: krb5_init_context failed");
610 krb5_add_et_list(kdc
->smb_krb5_context
->krb5_context
, initialize_hdb_error_table_r
);
612 ret
= krb5_kdc_get_config(kdc
->smb_krb5_context
->krb5_context
,
615 task_server_terminate(task
, "kdc: failed to get KDC configuration");
619 kdc
->config
->logf
= kdc
->smb_krb5_context
->logf
;
620 kdc
->config
->db
= talloc(kdc
, struct HDB
*);
621 if (!kdc
->config
->db
) {
622 task_server_terminate(task
, "kdc: out of memory");
625 kdc
->config
->num_db
= 1;
627 status
= kdc_hdb_ldb_create(kdc
, task
->lp_ctx
,
628 kdc
->smb_krb5_context
->krb5_context
,
629 &kdc
->config
->db
[0], NULL
);
630 if (!NT_STATUS_IS_OK(status
)) {
631 task_server_terminate(task
, "kdc: hdb_ldb_create (setup KDC database) failed");
635 ret
= krb5_kt_register(kdc
->smb_krb5_context
->krb5_context
, &hdb_kt_ops
);
637 task_server_terminate(task
, "kdc: failed to register hdb keytab");
641 /* Registar WinDC hooks */
642 ret
= krb5_plugin_register(kdc
->smb_krb5_context
->krb5_context
,
643 PLUGIN_TYPE_DATA
, "windc",
644 &windc_plugin_table
);
646 task_server_terminate(task
, "kdc: failed to register hdb keytab");
650 krb5_kdc_windc_init(kdc
->smb_krb5_context
->krb5_context
);
652 kdc_mem_ctx
= kdc
->smb_krb5_context
;
653 kdc_lp_ctx
= task
->lp_ctx
;
655 /* start listening on the configured network interfaces */
656 status
= kdc_startup_interfaces(kdc
, task
->lp_ctx
, ifaces
);
657 if (!NT_STATUS_IS_OK(status
)) {
658 task_server_terminate(task
, "kdc failed to setup interfaces");
662 irpc_add_name(task
->msg_ctx
, "kdc_server");
666 /* called at smbd startup - register ourselves as a server service */
667 NTSTATUS
server_service_kdc_init(void)
669 return register_server_service("kdc", kdc_task_init
);