2 * Copyright (c) 1997-2008 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
37 * return the realm of a krbtgt-ticket or NULL
41 get_krbtgt_realm(const PrincipalName
*p
)
43 if(p
->name_string
.len
== 2
44 && strcmp(p
->name_string
.val
[0], KRB5_TGS_NAME
) == 0)
45 return p
->name_string
.val
[1];
51 * The KDC might add a signed path to the ticket authorization data
52 * field. This is to avoid server impersonating clients and the
53 * request constrained delegation.
55 * This is done by storing a KRB5_AUTHDATA_IF_RELEVANT with a single
56 * entry of type KRB5SignedPath.
59 static krb5_error_code
60 find_KRB5SignedPath(krb5_context context
,
61 const AuthorizationData
*ad
,
64 AuthorizationData child
;
68 if (ad
== NULL
|| ad
->len
== 0)
69 return KRB5KDC_ERR_PADATA_TYPE_NOSUPP
;
73 if (ad
->val
[pos
].ad_type
!= KRB5_AUTHDATA_IF_RELEVANT
)
74 return KRB5KDC_ERR_PADATA_TYPE_NOSUPP
;
76 ret
= decode_AuthorizationData(ad
->val
[pos
].ad_data
.data
,
77 ad
->val
[pos
].ad_data
.length
,
81 krb5_set_error_message(context
, ret
, "Failed to decode "
82 "IF_RELEVANT with %d", ret
);
87 free_AuthorizationData(&child
);
88 return KRB5KDC_ERR_PADATA_TYPE_NOSUPP
;
91 if (child
.val
[0].ad_type
!= KRB5_AUTHDATA_SIGNTICKET
) {
92 free_AuthorizationData(&child
);
93 return KRB5KDC_ERR_PADATA_TYPE_NOSUPP
;
97 ret
= der_copy_octet_string(&child
.val
[0].ad_data
, data
);
98 free_AuthorizationData(&child
);
103 _kdc_add_KRB5SignedPath(krb5_context context
,
104 krb5_kdc_configuration
*config
,
105 hdb_entry_ex
*krbtgt
,
106 krb5_enctype enctype
,
107 krb5_principal client
,
108 krb5_const_principal server
,
109 krb5_principals principals
,
115 krb5_crypto crypto
= NULL
;
118 if (server
&& principals
) {
119 ret
= add_Principals(principals
, server
);
125 KRB5SignedPathData spd
;
128 spd
.authtime
= tkt
->authtime
;
129 spd
.delegated
= principals
;
130 spd
.method_data
= NULL
;
132 ASN1_MALLOC_ENCODE(KRB5SignedPathData
, data
.data
, data
.length
,
136 if (data
.length
!= size
)
137 krb5_abortx(context
, "internal asn.1 encoder error");
142 ret
= hdb_enctype2key(context
, &krbtgt
->entry
, NULL
, enctype
, &key
);
144 ret
= krb5_crypto_init(context
, &key
->key
, 0, &crypto
);
152 * Fill in KRB5SignedPath
156 sp
.delegated
= principals
;
157 sp
.method_data
= NULL
;
159 ret
= krb5_create_checksum(context
, crypto
, KRB5_KU_KRB5SIGNEDPATH
, 0,
160 data
.data
, data
.length
, &sp
.cksum
);
161 krb5_crypto_destroy(context
, crypto
);
166 ASN1_MALLOC_ENCODE(KRB5SignedPath
, data
.data
, data
.length
, &sp
, &size
, ret
);
167 free_Checksum(&sp
.cksum
);
170 if (data
.length
!= size
)
171 krb5_abortx(context
, "internal asn.1 encoder error");
175 * Add IF-RELEVANT(KRB5SignedPath) to the last slot in
176 * authorization data field.
179 ret
= _kdc_tkt_add_if_relevant_ad(context
, tkt
,
180 KRB5_AUTHDATA_SIGNTICKET
, &data
);
181 krb5_data_free(&data
);
186 static krb5_error_code
187 check_KRB5SignedPath(krb5_context context
,
188 krb5_kdc_configuration
*config
,
189 hdb_entry_ex
*krbtgt
,
192 krb5_principals
*delegated
,
197 krb5_crypto crypto
= NULL
;
202 ret
= find_KRB5SignedPath(context
, tkt
->authorization_data
, &data
);
204 KRB5SignedPathData spd
;
208 ret
= decode_KRB5SignedPath(data
.data
, data
.length
, &sp
, NULL
);
209 krb5_data_free(&data
);
214 spd
.authtime
= tkt
->authtime
;
215 spd
.delegated
= sp
.delegated
;
216 spd
.method_data
= sp
.method_data
;
218 ASN1_MALLOC_ENCODE(KRB5SignedPathData
, data
.data
, data
.length
,
221 free_KRB5SignedPath(&sp
);
224 if (data
.length
!= size
)
225 krb5_abortx(context
, "internal asn.1 encoder error");
229 ret
= hdb_enctype2key(context
, &krbtgt
->entry
, NULL
, /* XXX use correct kvno! */
232 ret
= krb5_crypto_init(context
, &key
->key
, 0, &crypto
);
235 free_KRB5SignedPath(&sp
);
239 ret
= krb5_verify_checksum(context
, crypto
, KRB5_KU_KRB5SIGNEDPATH
,
240 data
.data
, data
.length
,
242 krb5_crypto_destroy(context
, crypto
);
245 free_KRB5SignedPath(&sp
);
246 kdc_log(context
, config
, 5,
247 "KRB5SignedPath not signed correctly, not marking as signed");
251 if (delegated
&& sp
.delegated
) {
253 *delegated
= malloc(sizeof(*sp
.delegated
));
254 if (*delegated
== NULL
) {
255 free_KRB5SignedPath(&sp
);
259 ret
= copy_Principals(*delegated
, sp
.delegated
);
261 free_KRB5SignedPath(&sp
);
267 free_KRB5SignedPath(&sp
);
279 static krb5_error_code
280 check_PAC(krb5_context context
,
281 krb5_kdc_configuration
*config
,
282 const krb5_principal client_principal
,
283 const krb5_principal delegated_proxy_principal
,
284 hdb_entry_ex
*client
,
285 hdb_entry_ex
*server
,
286 hdb_entry_ex
*krbtgt
,
287 const EncryptionKey
*server_check_key
,
288 const EncryptionKey
*server_sign_key
,
289 const EncryptionKey
*krbtgt_sign_key
,
294 AuthorizationData
*ad
= tkt
->authorization_data
;
298 if (ad
== NULL
|| ad
->len
== 0)
301 for (i
= 0; i
< ad
->len
; i
++) {
302 AuthorizationData child
;
304 if (ad
->val
[i
].ad_type
!= KRB5_AUTHDATA_IF_RELEVANT
)
307 ret
= decode_AuthorizationData(ad
->val
[i
].ad_data
.data
,
308 ad
->val
[i
].ad_data
.length
,
312 krb5_set_error_message(context
, ret
, "Failed to decode "
313 "IF_RELEVANT with %d", ret
);
316 for (j
= 0; j
< child
.len
; j
++) {
318 if (child
.val
[j
].ad_type
== KRB5_AUTHDATA_WIN2K_PAC
) {
323 ret
= krb5_pac_parse(context
,
324 child
.val
[j
].ad_data
.data
,
325 child
.val
[j
].ad_data
.length
,
327 free_AuthorizationData(&child
);
331 ret
= krb5_pac_verify(context
, pac
, tkt
->authtime
,
333 server_check_key
, NULL
);
335 krb5_pac_free(context
, pac
);
339 ret
= _kdc_pac_verify(context
, client_principal
,
340 delegated_proxy_principal
,
341 client
, server
, krbtgt
, &pac
, &signed_pac
);
343 krb5_pac_free(context
, pac
);
348 * Only re-sign PAC if we could verify it with the PAC
349 * function. The no-verify case happens when we get in
350 * a PAC from cross realm from a Windows domain and
351 * that there is no PAC verification function.
355 ret
= _krb5_pac_sign(context
, pac
, tkt
->authtime
,
357 server_sign_key
, krbtgt_sign_key
, rspac
);
359 krb5_pac_free(context
, pac
);
364 free_AuthorizationData(&child
);
373 static krb5_error_code
374 check_tgs_flags(krb5_context context
,
375 krb5_kdc_configuration
*config
,
376 KDC_REQ_BODY
*b
, const EncTicketPart
*tgt
, EncTicketPart
*et
)
378 KDCOptions f
= b
->kdc_options
;
381 if(!tgt
->flags
.invalid
|| tgt
->starttime
== NULL
){
382 kdc_log(context
, config
, 0,
383 "Bad request to validate ticket");
384 return KRB5KDC_ERR_BADOPTION
;
386 if(*tgt
->starttime
> kdc_time
){
387 kdc_log(context
, config
, 0,
388 "Early request to validate ticket");
389 return KRB5KRB_AP_ERR_TKT_NYV
;
392 et
->flags
.invalid
= 0;
393 }else if(tgt
->flags
.invalid
){
394 kdc_log(context
, config
, 0,
395 "Ticket-granting ticket has INVALID flag set");
396 return KRB5KRB_AP_ERR_TKT_INVALID
;
400 if(!tgt
->flags
.forwardable
){
401 kdc_log(context
, config
, 0,
402 "Bad request for forwardable ticket");
403 return KRB5KDC_ERR_BADOPTION
;
405 et
->flags
.forwardable
= 1;
408 if(!tgt
->flags
.forwardable
){
409 kdc_log(context
, config
, 0,
410 "Request to forward non-forwardable ticket");
411 return KRB5KDC_ERR_BADOPTION
;
413 et
->flags
.forwarded
= 1;
414 et
->caddr
= b
->addresses
;
416 if(tgt
->flags
.forwarded
)
417 et
->flags
.forwarded
= 1;
420 if(!tgt
->flags
.proxiable
){
421 kdc_log(context
, config
, 0,
422 "Bad request for proxiable ticket");
423 return KRB5KDC_ERR_BADOPTION
;
425 et
->flags
.proxiable
= 1;
428 if(!tgt
->flags
.proxiable
){
429 kdc_log(context
, config
, 0,
430 "Request to proxy non-proxiable ticket");
431 return KRB5KDC_ERR_BADOPTION
;
434 et
->caddr
= b
->addresses
;
439 if(f
.allow_postdate
){
440 if(!tgt
->flags
.may_postdate
){
441 kdc_log(context
, config
, 0,
442 "Bad request for post-datable ticket");
443 return KRB5KDC_ERR_BADOPTION
;
445 et
->flags
.may_postdate
= 1;
448 if(!tgt
->flags
.may_postdate
){
449 kdc_log(context
, config
, 0,
450 "Bad request for postdated ticket");
451 return KRB5KDC_ERR_BADOPTION
;
454 *et
->starttime
= *b
->from
;
455 et
->flags
.postdated
= 1;
456 et
->flags
.invalid
= 1;
457 }else if(b
->from
&& *b
->from
> kdc_time
+ context
->max_skew
){
458 kdc_log(context
, config
, 0, "Ticket cannot be postdated");
459 return KRB5KDC_ERR_CANNOT_POSTDATE
;
463 if(!tgt
->flags
.renewable
|| tgt
->renew_till
== NULL
){
464 kdc_log(context
, config
, 0,
465 "Bad request for renewable ticket");
466 return KRB5KDC_ERR_BADOPTION
;
468 et
->flags
.renewable
= 1;
469 ALLOC(et
->renew_till
);
470 _kdc_fix_time(&b
->rtime
);
471 *et
->renew_till
= *b
->rtime
;
475 if(!tgt
->flags
.renewable
|| tgt
->renew_till
== NULL
){
476 kdc_log(context
, config
, 0,
477 "Request to renew non-renewable ticket");
478 return KRB5KDC_ERR_BADOPTION
;
480 old_life
= tgt
->endtime
;
482 old_life
-= *tgt
->starttime
;
484 old_life
-= tgt
->authtime
;
485 et
->endtime
= *et
->starttime
+ old_life
;
486 if (et
->renew_till
!= NULL
)
487 et
->endtime
= min(*et
->renew_till
, et
->endtime
);
491 /* checks for excess flags */
492 if(f
.request_anonymous
&& !config
->allow_anonymous
){
493 kdc_log(context
, config
, 0,
494 "Request for anonymous ticket");
495 return KRB5KDC_ERR_BADOPTION
;
502 * Determine if constrained delegation is allowed from this client to this server
505 static krb5_error_code
506 check_constrained_delegation(krb5_context context
,
507 krb5_kdc_configuration
*config
,
509 hdb_entry_ex
*client
,
510 hdb_entry_ex
*server
,
511 krb5_const_principal target
)
513 const HDB_Ext_Constrained_delegation_acl
*acl
;
518 * constrained_delegation (S4U2Proxy) only works within
519 * the same realm. We use the already canonicalized version
520 * of the principals here, while "target" is the principal
521 * provided by the client.
523 if(!krb5_realm_compare(context
, client
->entry
.principal
, server
->entry
.principal
)) {
524 ret
= KRB5KDC_ERR_BADOPTION
;
525 kdc_log(context
, config
, 0,
526 "Bad request for constrained delegation");
530 if (clientdb
->hdb_check_constrained_delegation
) {
531 ret
= clientdb
->hdb_check_constrained_delegation(context
, clientdb
, client
, target
);
535 /* if client delegates to itself, that ok */
536 if (krb5_principal_compare(context
, client
->entry
.principal
, server
->entry
.principal
) == TRUE
)
539 ret
= hdb_entry_get_ConstrainedDelegACL(&client
->entry
, &acl
);
541 krb5_clear_error_message(context
);
546 for (i
= 0; i
< acl
->len
; i
++) {
547 if (krb5_principal_compare(context
, target
, &acl
->val
[i
]) == TRUE
)
551 ret
= KRB5KDC_ERR_BADOPTION
;
553 kdc_log(context
, config
, 0,
554 "Bad request for constrained delegation");
559 * Determine if s4u2self is allowed from this client to this server
561 * For example, regardless of the principal being impersonated, if the
562 * 'client' and 'server' are the same, then it's safe.
565 static krb5_error_code
566 check_s4u2self(krb5_context context
,
567 krb5_kdc_configuration
*config
,
569 hdb_entry_ex
*client
,
570 krb5_const_principal server
)
574 /* if client does a s4u2self to itself, that ok */
575 if (krb5_principal_compare(context
, client
->entry
.principal
, server
) == TRUE
)
578 if (clientdb
->hdb_check_s4u2self
) {
579 ret
= clientdb
->hdb_check_s4u2self(context
, clientdb
, client
, server
);
583 ret
= KRB5KDC_ERR_BADOPTION
;
592 static krb5_error_code
593 verify_flags (krb5_context context
,
594 krb5_kdc_configuration
*config
,
595 const EncTicketPart
*et
,
598 if(et
->endtime
< kdc_time
){
599 kdc_log(context
, config
, 0, "Ticket expired (%s)", pstr
);
600 return KRB5KRB_AP_ERR_TKT_EXPIRED
;
602 if(et
->flags
.invalid
){
603 kdc_log(context
, config
, 0, "Ticket not valid (%s)", pstr
);
604 return KRB5KRB_AP_ERR_TKT_NYV
;
613 static krb5_error_code
614 fix_transited_encoding(krb5_context context
,
615 krb5_kdc_configuration
*config
,
616 krb5_boolean check_policy
,
617 const TransitedEncoding
*tr
,
619 const char *client_realm
,
620 const char *server_realm
,
621 const char *tgt_realm
)
623 krb5_error_code ret
= 0;
624 char **realms
, **tmp
;
625 unsigned int num_realms
;
628 switch (tr
->tr_type
) {
629 case DOMAIN_X500_COMPRESS
:
633 * Allow empty content of type 0 because that is was Microsoft
634 * generates in their TGT.
636 if (tr
->contents
.length
== 0)
638 kdc_log(context
, config
, 0,
639 "Transited type 0 with non empty content");
640 return KRB5KDC_ERR_TRTYPE_NOSUPP
;
642 kdc_log(context
, config
, 0,
643 "Unknown transited type: %u", tr
->tr_type
);
644 return KRB5KDC_ERR_TRTYPE_NOSUPP
;
647 ret
= krb5_domain_x500_decode(context
,
654 krb5_warn(context
, ret
,
655 "Decoding transited encoding");
658 if(strcmp(client_realm
, tgt_realm
) && strcmp(server_realm
, tgt_realm
)) {
659 /* not us, so add the previous realm to transited set */
660 if (num_realms
+ 1 > UINT_MAX
/sizeof(*realms
)) {
664 tmp
= realloc(realms
, (num_realms
+ 1) * sizeof(*realms
));
670 realms
[num_realms
] = strdup(tgt_realm
);
671 if(realms
[num_realms
] == NULL
){
677 if(num_realms
== 0) {
678 if(strcmp(client_realm
, server_realm
))
679 kdc_log(context
, config
, 0,
680 "cross-realm %s -> %s", client_realm
, server_realm
);
684 for(i
= 0; i
< num_realms
; i
++)
685 l
+= strlen(realms
[i
]) + 2;
689 for(i
= 0; i
< num_realms
; i
++) {
691 strlcat(rs
, ", ", l
);
692 strlcat(rs
, realms
[i
], l
);
694 kdc_log(context
, config
, 0,
695 "cross-realm %s -> %s via [%s]",
696 client_realm
, server_realm
, rs
);
701 ret
= krb5_check_transited(context
, client_realm
,
703 realms
, num_realms
, NULL
);
705 krb5_warn(context
, ret
, "cross-realm %s -> %s",
706 client_realm
, server_realm
);
709 et
->flags
.transited_policy_checked
= 1;
711 et
->transited
.tr_type
= DOMAIN_X500_COMPRESS
;
712 ret
= krb5_domain_x500_encode(realms
, num_realms
, &et
->transited
.contents
);
714 krb5_warn(context
, ret
, "Encoding transited encoding");
716 for(i
= 0; i
< num_realms
; i
++)
723 static krb5_error_code
724 tgs_make_reply(krb5_context context
,
725 krb5_kdc_configuration
*config
,
727 krb5_const_principal tgt_name
,
728 const EncTicketPart
*tgt
,
729 const krb5_keyblock
*replykey
,
731 const EncryptionKey
*serverkey
,
732 const krb5_keyblock
*sessionkey
,
734 AuthorizationData
*auth_data
,
735 hdb_entry_ex
*server
,
736 krb5_principal server_principal
,
737 const char *server_name
,
738 hdb_entry_ex
*client
,
739 krb5_principal client_principal
,
740 hdb_entry_ex
*krbtgt
,
741 krb5_enctype krbtgt_etype
,
743 const krb5_data
*rspac
,
744 const METHOD_DATA
*enc_pa_data
,
751 KDCOptions f
= b
->kdc_options
;
755 memset(&rep
, 0, sizeof(rep
));
756 memset(&et
, 0, sizeof(et
));
757 memset(&ek
, 0, sizeof(ek
));
760 rep
.msg_type
= krb_tgs_rep
;
762 et
.authtime
= tgt
->authtime
;
763 _kdc_fix_time(&b
->till
);
764 et
.endtime
= min(tgt
->endtime
, *b
->till
);
766 *et
.starttime
= kdc_time
;
768 ret
= check_tgs_flags(context
, config
, b
, tgt
, &et
);
772 /* We should check the transited encoding if:
773 1) the request doesn't ask not to be checked
774 2) globally enforcing a check
775 3) principal requires checking
776 4) we allow non-check per-principal, but principal isn't marked as allowing this
777 5) we don't globally allow this
780 #define GLOBAL_FORCE_TRANSITED_CHECK \
781 (config->trpolicy == TRPOLICY_ALWAYS_CHECK)
782 #define GLOBAL_ALLOW_PER_PRINCIPAL \
783 (config->trpolicy == TRPOLICY_ALLOW_PER_PRINCIPAL)
784 #define GLOBAL_ALLOW_DISABLE_TRANSITED_CHECK \
785 (config->trpolicy == TRPOLICY_ALWAYS_HONOUR_REQUEST)
787 /* these will consult the database in future release */
788 #define PRINCIPAL_FORCE_TRANSITED_CHECK(P) 0
789 #define PRINCIPAL_ALLOW_DISABLE_TRANSITED_CHECK(P) 0
791 ret
= fix_transited_encoding(context
, config
,
792 !f
.disable_transited_check
||
793 GLOBAL_FORCE_TRANSITED_CHECK
||
794 PRINCIPAL_FORCE_TRANSITED_CHECK(server
) ||
795 !((GLOBAL_ALLOW_PER_PRINCIPAL
&&
796 PRINCIPAL_ALLOW_DISABLE_TRANSITED_CHECK(server
)) ||
797 GLOBAL_ALLOW_DISABLE_TRANSITED_CHECK
),
798 &tgt
->transited
, &et
,
799 krb5_principal_get_realm(context
, client_principal
),
800 krb5_principal_get_realm(context
, server
->entry
.principal
),
801 krb5_principal_get_realm(context
, krbtgt
->entry
.principal
));
805 copy_Realm(&server_principal
->realm
, &rep
.ticket
.realm
);
806 _krb5_principal2principalname(&rep
.ticket
.sname
, server_principal
);
807 copy_Realm(&tgt_name
->realm
, &rep
.crealm
);
809 if (f.request_anonymous)
810 _kdc_make_anonymous_principalname (&rep.cname);
813 copy_PrincipalName(&tgt_name
->name
, &rep
.cname
);
814 rep
.ticket
.tkt_vno
= 5;
818 et
.caddr
= tgt
->caddr
;
822 life
= et
.endtime
- *et
.starttime
;
823 if(client
&& client
->entry
.max_life
)
824 life
= min(life
, *client
->entry
.max_life
);
825 if(server
->entry
.max_life
)
826 life
= min(life
, *server
->entry
.max_life
);
827 et
.endtime
= *et
.starttime
+ life
;
829 if(f
.renewable_ok
&& tgt
->flags
.renewable
&&
830 et
.renew_till
== NULL
&& et
.endtime
< *b
->till
&&
831 tgt
->renew_till
!= NULL
)
833 et
.flags
.renewable
= 1;
834 ALLOC(et
.renew_till
);
835 *et
.renew_till
= *b
->till
;
839 renew
= *et
.renew_till
- *et
.starttime
;
840 if(client
&& client
->entry
.max_renew
)
841 renew
= min(renew
, *client
->entry
.max_renew
);
842 if(server
->entry
.max_renew
)
843 renew
= min(renew
, *server
->entry
.max_renew
);
844 *et
.renew_till
= *et
.starttime
+ renew
;
848 *et
.renew_till
= min(*et
.renew_till
, *tgt
->renew_till
);
849 *et
.starttime
= min(*et
.starttime
, *et
.renew_till
);
850 et
.endtime
= min(et
.endtime
, *et
.renew_till
);
853 *et
.starttime
= min(*et
.starttime
, et
.endtime
);
855 if(*et
.starttime
== et
.endtime
){
856 ret
= KRB5KDC_ERR_NEVER_VALID
;
859 if(et
.renew_till
&& et
.endtime
== *et
.renew_till
){
861 et
.renew_till
= NULL
;
862 et
.flags
.renewable
= 0;
865 et
.flags
.pre_authent
= tgt
->flags
.pre_authent
;
866 et
.flags
.hw_authent
= tgt
->flags
.hw_authent
;
867 et
.flags
.anonymous
= tgt
->flags
.anonymous
;
868 et
.flags
.ok_as_delegate
= server
->entry
.flags
.ok_as_delegate
;
872 * No not need to filter out the any PAC from the
873 * auth_data since it's signed by the KDC.
875 ret
= _kdc_tkt_add_if_relevant_ad(context
, &et
,
876 KRB5_AUTHDATA_WIN2K_PAC
, rspac
);
884 /* XXX check authdata */
886 if (et
.authorization_data
== NULL
) {
887 et
.authorization_data
= calloc(1, sizeof(*et
.authorization_data
));
888 if (et
.authorization_data
== NULL
) {
890 krb5_set_error_message(context
, ret
, "malloc: out of memory");
894 for(i
= 0; i
< auth_data
->len
; i
++) {
895 ret
= add_AuthorizationData(et
.authorization_data
, &auth_data
->val
[i
]);
897 krb5_set_error_message(context
, ret
, "malloc: out of memory");
902 /* Filter out type KRB5SignedPath */
903 ret
= find_KRB5SignedPath(context
, et
.authorization_data
, NULL
);
905 if (et
.authorization_data
->len
== 1) {
906 free_AuthorizationData(et
.authorization_data
);
907 free(et
.authorization_data
);
908 et
.authorization_data
= NULL
;
910 AuthorizationData
*ad
= et
.authorization_data
;
911 free_AuthorizationDataElement(&ad
->val
[ad
->len
- 1]);
917 ret
= krb5_copy_keyblock_contents(context
, sessionkey
, &et
.key
);
920 et
.crealm
= tgt_name
->realm
;
921 et
.cname
= tgt_name
->name
;
924 /* MIT must have at least one last_req */
926 ek
.last_req
.val
= calloc(1, sizeof(*ek
.last_req
.val
));
927 if (ek
.last_req
.val
== NULL
) {
933 ek
.authtime
= et
.authtime
;
934 ek
.starttime
= et
.starttime
;
935 ek
.endtime
= et
.endtime
;
936 ek
.renew_till
= et
.renew_till
;
937 ek
.srealm
= rep
.ticket
.realm
;
938 ek
.sname
= rep
.ticket
.sname
;
940 _kdc_log_timestamp(context
, config
, "TGS-REQ", et
.authtime
, et
.starttime
,
941 et
.endtime
, et
.renew_till
);
943 /* Don't sign cross realm tickets, they can't be checked anyway */
945 char *r
= get_krbtgt_realm(&ek
.sname
);
947 if (r
== NULL
|| strcmp(r
, ek
.srealm
) == 0) {
948 ret
= _kdc_add_KRB5SignedPath(context
,
961 if (enc_pa_data
->len
) {
962 rep
.padata
= calloc(1, sizeof(*rep
.padata
));
963 if (rep
.padata
== NULL
) {
967 ret
= copy_METHOD_DATA(enc_pa_data
, rep
.padata
);
972 if (krb5_enctype_valid(context
, serverkey
->keytype
) != 0
973 && _kdc_is_weak_exception(server
->entry
.principal
, serverkey
->keytype
))
975 krb5_enctype_enable(context
, serverkey
->keytype
);
980 /* It is somewhat unclear where the etype in the following
981 encryption should come from. What we have is a session
982 key in the passed tgt, and a list of preferred etypes
983 *for the new ticket*. Should we pick the best possible
984 etype, given the keytype in the tgt, or should we look
985 at the etype list here as well? What if the tgt
986 session key is DES3 and we want a ticket with a (say)
987 CAST session key. Should the DES3 etype be added to the
988 etype list, even if we don't want a session key with
990 ret
= _kdc_encode_reply(context
, config
, NULL
, 0,
991 &rep
, &et
, &ek
, serverkey
->keytype
,
993 serverkey
, 0, replykey
, rk_is_subkey
,
996 krb5_enctype_disable(context
, serverkey
->keytype
);
1000 free_TransitedEncoding(&et
.transited
);
1004 free(et
.renew_till
);
1005 if(et
.authorization_data
) {
1006 free_AuthorizationData(et
.authorization_data
);
1007 free(et
.authorization_data
);
1009 free_LastReq(&ek
.last_req
);
1010 memset(et
.key
.keyvalue
.data
, 0, et
.key
.keyvalue
.length
);
1011 free_EncryptionKey(&et
.key
);
1015 static krb5_error_code
1016 tgs_check_authenticator(krb5_context context
,
1017 krb5_kdc_configuration
*config
,
1018 krb5_auth_context ac
,
1020 const char **e_text
,
1023 krb5_authenticator auth
;
1027 krb5_error_code ret
;
1030 krb5_auth_con_getauthenticator(context
, ac
, &auth
);
1031 if(auth
->cksum
== NULL
){
1032 kdc_log(context
, config
, 0, "No authenticator in request");
1033 ret
= KRB5KRB_AP_ERR_INAPP_CKSUM
;
1037 * according to RFC1510 it doesn't need to be keyed,
1038 * but according to the latest draft it needs to.
1042 !krb5_checksum_is_keyed(context
, auth
->cksum
->cksumtype
)
1045 !krb5_checksum_is_collision_proof(context
, auth
->cksum
->cksumtype
)) {
1046 kdc_log(context
, config
, 0, "Bad checksum type in authenticator: %d",
1047 auth
->cksum
->cksumtype
);
1048 ret
= KRB5KRB_AP_ERR_INAPP_CKSUM
;
1052 /* XXX should not re-encode this */
1053 ASN1_MALLOC_ENCODE(KDC_REQ_BODY
, buf
, buf_size
, b
, &len
, ret
);
1055 const char *msg
= krb5_get_error_message(context
, ret
);
1056 kdc_log(context
, config
, 0, "Failed to encode KDC-REQ-BODY: %s", msg
);
1057 krb5_free_error_message(context
, msg
);
1060 if(buf_size
!= len
) {
1062 kdc_log(context
, config
, 0, "Internal error in ASN.1 encoder");
1063 *e_text
= "KDC internal error";
1064 ret
= KRB5KRB_ERR_GENERIC
;
1067 ret
= krb5_crypto_init(context
, key
, 0, &crypto
);
1069 const char *msg
= krb5_get_error_message(context
, ret
);
1071 kdc_log(context
, config
, 0, "krb5_crypto_init failed: %s", msg
);
1072 krb5_free_error_message(context
, msg
);
1075 ret
= krb5_verify_checksum(context
,
1077 KRB5_KU_TGS_REQ_AUTH_CKSUM
,
1082 krb5_crypto_destroy(context
, crypto
);
1084 const char *msg
= krb5_get_error_message(context
, ret
);
1085 kdc_log(context
, config
, 0,
1086 "Failed to verify authenticator checksum: %s", msg
);
1087 krb5_free_error_message(context
, msg
);
1090 free_Authenticator(auth
);
1100 find_rpath(krb5_context context
, Realm crealm
, Realm srealm
)
1102 const char *new_realm
= krb5_config_get_string(context
,
1113 need_referral(krb5_context context
, krb5_kdc_configuration
*config
,
1114 const KDCOptions
* const options
, krb5_principal server
,
1115 krb5_realm
**realms
)
1119 if(!options
->canonicalize
&& server
->name
.name_type
!= KRB5_NT_SRV_INST
)
1122 if (server
->name
.name_string
.len
== 1)
1123 name
= server
->name
.name_string
.val
[0];
1124 else if (server
->name
.name_string
.len
== 3 &&
1125 strcasecmp("E3514235-4B06-11D1-AB04-00C04FC2DCD2", server
->name
.name_string
.val
[0]) == 0) {
1127 This is used to give referrals for the
1128 E3514235-4B06-11D1-AB04-00C04FC2DCD2/NTDSGUID/DNSDOMAIN
1129 SPN form, which is used for inter-domain communication in AD
1131 name
= server
->name
.name_string
.val
[2];
1132 kdc_log(context
, config
, 0, "Giving 3 part DRSUAPI referral for %s", name
);
1133 *realms
= malloc(sizeof(char *)*2);
1134 if (*realms
== NULL
) {
1135 krb5_set_error_message(context
, ENOMEM
, N_("malloc: out of memory", ""));
1138 (*realms
)[0] = strdup(name
);
1139 (*realms
)[1] = NULL
;
1141 } else if (server
->name
.name_string
.len
> 1)
1142 name
= server
->name
.name_string
.val
[1];
1146 kdc_log(context
, config
, 0, "Searching referral for %s", name
);
1148 return _krb5_get_host_realm_int(context
, name
, FALSE
, realms
) == 0;
1151 static krb5_error_code
1152 tgs_parse_request(krb5_context context
,
1153 krb5_kdc_configuration
*config
,
1155 const PA_DATA
*tgs_req
,
1156 hdb_entry_ex
**krbtgt
,
1157 krb5_enctype
*krbtgt_etype
,
1158 krb5_ticket
**ticket
,
1159 const char **e_text
,
1161 const struct sockaddr
*from_addr
,
1164 AuthorizationData
**auth_data
,
1165 krb5_keyblock
**replykey
,
1168 static char failed
[] = "<unparse_name failed>";
1170 krb5_error_code ret
;
1171 krb5_principal princ
;
1172 krb5_auth_context ac
= NULL
;
1173 krb5_flags ap_req_options
;
1174 krb5_flags verify_ap_req_flags
;
1176 krb5uint32 krbtgt_kvno
; /* kvno used for the PA-TGS-REQ AP-REQ Ticket */
1177 krb5uint32 krbtgt_kvno_try
;
1178 int kvno_search_tries
= 4; /* number of kvnos to try when tkt_vno == 0 */
1179 const Keys
*krbtgt_keys
;/* keyset for TGT tkt_vno */
1181 krb5_keyblock
*subkey
= NULL
;
1189 memset(&ap_req
, 0, sizeof(ap_req
));
1190 ret
= krb5_decode_ap_req(context
, &tgs_req
->padata_value
, &ap_req
);
1192 const char *msg
= krb5_get_error_message(context
, ret
);
1193 kdc_log(context
, config
, 0, "Failed to decode AP-REQ: %s", msg
);
1194 krb5_free_error_message(context
, msg
);
1198 if(!get_krbtgt_realm(&ap_req
.ticket
.sname
)){
1199 /* XXX check for ticket.sname == req.sname */
1200 kdc_log(context
, config
, 0, "PA-DATA is not a ticket-granting ticket");
1201 ret
= KRB5KDC_ERR_POLICY
; /* ? */
1205 _krb5_principalname2krb5_principal(context
,
1207 ap_req
.ticket
.sname
,
1208 ap_req
.ticket
.realm
);
1210 krbtgt_kvno
= ap_req
.ticket
.enc_part
.kvno
? *ap_req
.ticket
.enc_part
.kvno
: 0;
1211 ret
= _kdc_db_fetch(context
, config
, princ
, HDB_F_GET_KRBTGT
,
1212 &krbtgt_kvno
, NULL
, krbtgt
);
1214 if (ret
== HDB_ERR_NOT_FOUND_HERE
) {
1215 /* XXX Factor out this unparsing of the same princ all over */
1217 ret
= krb5_unparse_name(context
, princ
, &p
);
1220 krb5_free_principal(context
, princ
);
1221 kdc_log(context
, config
, 5,
1222 "Ticket-granting ticket account %s does not have secrets at "
1223 "this KDC, need to proxy", p
);
1226 ret
= HDB_ERR_NOT_FOUND_HERE
;
1228 } else if (ret
== HDB_ERR_KVNO_NOT_FOUND
) {
1230 ret
= krb5_unparse_name(context
, princ
, &p
);
1233 krb5_free_principal(context
, princ
);
1234 kdc_log(context
, config
, 5,
1235 "Ticket-granting ticket account %s does not have keys for "
1236 "kvno %d at this KDC", p
, krbtgt_kvno
);
1239 ret
= HDB_ERR_KVNO_NOT_FOUND
;
1241 } else if (ret
== HDB_ERR_NO_MKEY
) {
1243 ret
= krb5_unparse_name(context
, princ
, &p
);
1246 krb5_free_principal(context
, princ
);
1247 kdc_log(context
, config
, 5,
1248 "Missing master key for decrypting keys for ticket-granting "
1249 "ticket account %s with kvno %d at this KDC", p
, krbtgt_kvno
);
1252 ret
= HDB_ERR_KVNO_NOT_FOUND
;
1255 const char *msg
= krb5_get_error_message(context
, ret
);
1257 ret
= krb5_unparse_name(context
, princ
, &p
);
1260 krb5_free_principal(context
, princ
);
1261 kdc_log(context
, config
, 0,
1262 "Ticket-granting ticket not found in database: %s", msg
);
1263 krb5_free_error_message(context
, msg
);
1266 ret
= KRB5KRB_AP_ERR_NOT_US
;
1270 krbtgt_kvno_try
= krbtgt_kvno
? krbtgt_kvno
: (*krbtgt
)->entry
.kvno
;
1271 *krbtgt_etype
= ap_req
.ticket
.enc_part
.etype
;
1274 krbtgt_keys
= hdb_kvno2keys(context
, &(*krbtgt
)->entry
, krbtgt_kvno_try
);
1275 ret
= hdb_enctype2key(context
, &(*krbtgt
)->entry
, krbtgt_keys
,
1276 ap_req
.ticket
.enc_part
.etype
, &tkey
);
1277 if (ret
&& krbtgt_kvno
== 0 && kvno_search_tries
> 0) {
1278 kvno_search_tries
--;
1282 char *str
= NULL
, *p
= NULL
;
1284 krb5_enctype_to_string(context
, ap_req
.ticket
.enc_part
.etype
, &str
);
1285 krb5_unparse_name(context
, princ
, &p
);
1286 kdc_log(context
, config
, 0,
1287 "No server key with enctype %s found for %s",
1288 str
? str
: "<unknown enctype>",
1289 p
? p
: "<unparse_name failed>");
1292 ret
= KRB5KRB_AP_ERR_BADKEYVER
;
1296 if (b
->kdc_options
.validate
)
1297 verify_ap_req_flags
= KRB5_VERIFY_AP_REQ_IGNORE_INVALID
;
1299 verify_ap_req_flags
= 0;
1301 ret
= krb5_verify_ap_req2(context
,
1306 verify_ap_req_flags
,
1309 KRB5_KU_TGS_REQ_AUTH
);
1310 if (ret
== KRB5KRB_AP_ERR_BAD_INTEGRITY
&& kvno_search_tries
> 0) {
1311 kvno_search_tries
--;
1316 krb5_free_principal(context
, princ
);
1318 const char *msg
= krb5_get_error_message(context
, ret
);
1319 kdc_log(context
, config
, 0, "Failed to verify AP-REQ: %s", msg
);
1320 krb5_free_error_message(context
, msg
);
1325 krb5_authenticator auth
;
1327 ret
= krb5_auth_con_getauthenticator(context
, ac
, &auth
);
1329 *csec
= malloc(sizeof(**csec
));
1330 if (*csec
== NULL
) {
1331 krb5_free_authenticator(context
, &auth
);
1332 kdc_log(context
, config
, 0, "malloc failed");
1335 **csec
= auth
->ctime
;
1336 *cusec
= malloc(sizeof(**cusec
));
1337 if (*cusec
== NULL
) {
1338 krb5_free_authenticator(context
, &auth
);
1339 kdc_log(context
, config
, 0, "malloc failed");
1342 **cusec
= auth
->cusec
;
1343 krb5_free_authenticator(context
, &auth
);
1347 ret
= tgs_check_authenticator(context
, config
,
1348 ac
, b
, e_text
, &(*ticket
)->ticket
.key
);
1350 krb5_auth_con_free(context
, ac
);
1354 usage
= KRB5_KU_TGS_REQ_AUTH_DAT_SUBKEY
;
1357 ret
= krb5_auth_con_getremotesubkey(context
, ac
, &subkey
);
1359 const char *msg
= krb5_get_error_message(context
, ret
);
1360 krb5_auth_con_free(context
, ac
);
1361 kdc_log(context
, config
, 0, "Failed to get remote subkey: %s", msg
);
1362 krb5_free_error_message(context
, msg
);
1366 usage
= KRB5_KU_TGS_REQ_AUTH_DAT_SESSION
;
1369 ret
= krb5_auth_con_getkey(context
, ac
, &subkey
);
1371 const char *msg
= krb5_get_error_message(context
, ret
);
1372 krb5_auth_con_free(context
, ac
);
1373 kdc_log(context
, config
, 0, "Failed to get session key: %s", msg
);
1374 krb5_free_error_message(context
, msg
);
1379 krb5_auth_con_free(context
, ac
);
1380 kdc_log(context
, config
, 0,
1381 "Failed to get key for enc-authorization-data");
1382 ret
= KRB5KRB_AP_ERR_BAD_INTEGRITY
; /* ? */
1388 if (b
->enc_authorization_data
) {
1391 ret
= krb5_crypto_init(context
, subkey
, 0, &crypto
);
1393 const char *msg
= krb5_get_error_message(context
, ret
);
1394 krb5_auth_con_free(context
, ac
);
1395 kdc_log(context
, config
, 0, "krb5_crypto_init failed: %s", msg
);
1396 krb5_free_error_message(context
, msg
);
1399 ret
= krb5_decrypt_EncryptedData (context
,
1402 b
->enc_authorization_data
,
1404 krb5_crypto_destroy(context
, crypto
);
1406 krb5_auth_con_free(context
, ac
);
1407 kdc_log(context
, config
, 0,
1408 "Failed to decrypt enc-authorization-data");
1409 ret
= KRB5KRB_AP_ERR_BAD_INTEGRITY
; /* ? */
1413 if (*auth_data
== NULL
) {
1414 krb5_auth_con_free(context
, ac
);
1415 ret
= KRB5KRB_AP_ERR_BAD_INTEGRITY
; /* ? */
1418 ret
= decode_AuthorizationData(ad
.data
, ad
.length
, *auth_data
, NULL
);
1420 krb5_auth_con_free(context
, ac
);
1423 kdc_log(context
, config
, 0, "Failed to decode authorization data");
1424 ret
= KRB5KRB_AP_ERR_BAD_INTEGRITY
; /* ? */
1429 krb5_auth_con_free(context
, ac
);
1432 free_AP_REQ(&ap_req
);
1437 static krb5_error_code
1438 build_server_referral(krb5_context context
,
1439 krb5_kdc_configuration
*config
,
1440 krb5_crypto session
,
1441 krb5_const_realm referred_realm
,
1442 const PrincipalName
*true_principal_name
,
1443 const PrincipalName
*requested_principal
,
1446 PA_ServerReferralData ref
;
1447 krb5_error_code ret
;
1452 memset(&ref
, 0, sizeof(ref
));
1454 if (referred_realm
) {
1455 ALLOC(ref
.referred_realm
);
1456 if (ref
.referred_realm
== NULL
)
1458 *ref
.referred_realm
= strdup(referred_realm
);
1459 if (*ref
.referred_realm
== NULL
)
1462 if (true_principal_name
) {
1463 ALLOC(ref
.true_principal_name
);
1464 if (ref
.true_principal_name
== NULL
)
1466 ret
= copy_PrincipalName(true_principal_name
, ref
.true_principal_name
);
1470 if (requested_principal
) {
1471 ALLOC(ref
.requested_principal_name
);
1472 if (ref
.requested_principal_name
== NULL
)
1474 ret
= copy_PrincipalName(requested_principal
,
1475 ref
.requested_principal_name
);
1480 ASN1_MALLOC_ENCODE(PA_ServerReferralData
,
1481 data
.data
, data
.length
,
1483 free_PA_ServerReferralData(&ref
);
1486 if (data
.length
!= size
)
1487 krb5_abortx(context
, "internal asn.1 encoder error");
1489 ret
= krb5_encrypt_EncryptedData(context
, session
,
1490 KRB5_KU_PA_SERVER_REFERRAL
,
1491 data
.data
, data
.length
,
1497 ASN1_MALLOC_ENCODE(EncryptedData
,
1498 outdata
->data
, outdata
->length
,
1500 free_EncryptedData(&ed
);
1503 if (outdata
->length
!= size
)
1504 krb5_abortx(context
, "internal asn.1 encoder error");
1508 free_PA_ServerReferralData(&ref
);
1509 krb5_set_error_message(context
, ENOMEM
, "malloc: out of memory");
1513 static krb5_error_code
1514 tgs_build_reply(krb5_context context
,
1515 krb5_kdc_configuration
*config
,
1518 hdb_entry_ex
*krbtgt
,
1519 krb5_enctype krbtgt_etype
,
1520 const krb5_keyblock
*replykey
,
1522 krb5_ticket
*ticket
,
1525 const char **e_text
,
1526 AuthorizationData
**auth_data
,
1527 const struct sockaddr
*from_addr
)
1529 krb5_error_code ret
;
1530 krb5_principal cp
= NULL
, sp
= NULL
, rsp
= NULL
, tp
= NULL
, dp
= NULL
;
1531 krb5_principal krbtgt_out_principal
= NULL
;
1532 char *spn
= NULL
, *cpn
= NULL
, *tpn
= NULL
, *dpn
= NULL
, *krbtgt_out_n
= NULL
;
1533 hdb_entry_ex
*server
= NULL
, *client
= NULL
, *s4u2self_impersonated_client
= NULL
;
1534 HDB
*clientdb
, *s4u2self_impersonated_clientdb
;
1535 krb5_realm ref_realm
= NULL
;
1536 EncTicketPart
*tgt
= &ticket
->ticket
;
1537 krb5_principals spp
= NULL
;
1538 const EncryptionKey
*ekey
;
1539 krb5_keyblock sessionkey
;
1543 hdb_entry_ex
*krbtgt_out
= NULL
;
1545 METHOD_DATA enc_pa_data
;
1550 EncTicketPart adtkt
;
1556 int flags
= HDB_F_FOR_TGS_REQ
;
1558 memset(&sessionkey
, 0, sizeof(sessionkey
));
1559 memset(&adtkt
, 0, sizeof(adtkt
));
1560 krb5_data_zero(&rspac
);
1561 memset(&enc_pa_data
, 0, sizeof(enc_pa_data
));
1567 * Always to do CANON, see comment below about returned server principal (rsp).
1569 flags
|= HDB_F_CANON
;
1571 if(b
->kdc_options
.enc_tkt_in_skey
){
1577 if(b
->additional_tickets
== NULL
||
1578 b
->additional_tickets
->len
== 0){
1579 ret
= KRB5KDC_ERR_BADOPTION
; /* ? */
1580 kdc_log(context
, config
, 0,
1581 "No second ticket present in request");
1584 t
= &b
->additional_tickets
->val
[0];
1585 if(!get_krbtgt_realm(&t
->sname
)){
1586 kdc_log(context
, config
, 0,
1587 "Additional ticket is not a ticket-granting ticket");
1588 ret
= KRB5KDC_ERR_POLICY
;
1591 _krb5_principalname2krb5_principal(context
, &p
, t
->sname
, t
->realm
);
1592 ret
= _kdc_db_fetch(context
, config
, p
,
1593 HDB_F_GET_KRBTGT
, t
->enc_part
.kvno
,
1595 krb5_free_principal(context
, p
);
1597 if (ret
== HDB_ERR_NOENTRY
)
1598 ret
= KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN
;
1601 ret
= hdb_enctype2key(context
, &uu
->entry
, NULL
,
1602 t
->enc_part
.etype
, &uukey
);
1604 _kdc_free_ent(context
, uu
);
1605 ret
= KRB5KDC_ERR_ETYPE_NOSUPP
; /* XXX */
1608 ret
= krb5_decrypt_ticket(context
, t
, &uukey
->key
, &adtkt
, 0);
1609 _kdc_free_ent(context
, uu
);
1613 ret
= verify_flags(context
, config
, &adtkt
, spn
);
1621 _krb5_principalname2krb5_principal(context
, &sp
, *s
, r
);
1622 ret
= krb5_unparse_name(context
, sp
, &spn
);
1625 _krb5_principalname2krb5_principal(context
, &cp
, tgt
->cname
, tgt
->crealm
);
1626 ret
= krb5_unparse_name(context
, cp
, &cpn
);
1629 unparse_flags (KDCOptions2int(b
->kdc_options
),
1630 asn1_KDCOptions_units(),
1631 opt_str
, sizeof(opt_str
));
1633 kdc_log(context
, config
, 0,
1634 "TGS-REQ %s from %s for %s [%s]",
1635 cpn
, from
, spn
, opt_str
);
1637 kdc_log(context
, config
, 0,
1638 "TGS-REQ %s from %s for %s", cpn
, from
, spn
);
1645 ret
= _kdc_db_fetch(context
, config
, sp
, HDB_F_GET_SERVER
| flags
,
1646 NULL
, NULL
, &server
);
1648 if(ret
== HDB_ERR_NOT_FOUND_HERE
) {
1649 kdc_log(context
, config
, 5, "target %s does not have secrets at this KDC, need to proxy", sp
);
1652 const char *new_rlm
, *msg
;
1656 if ((req_rlm
= get_krbtgt_realm(&sp
->name
)) != NULL
) {
1658 new_rlm
= find_rpath(context
, tgt
->crealm
, req_rlm
);
1660 kdc_log(context
, config
, 5, "krbtgt for realm %s "
1661 "not found, trying %s",
1663 krb5_free_principal(context
, sp
);
1665 krb5_make_principal(context
, &sp
, r
,
1666 KRB5_TGS_NAME
, new_rlm
, NULL
);
1667 ret
= krb5_unparse_name(context
, sp
, &spn
);
1673 ref_realm
= strdup(new_rlm
);
1677 } else if(need_referral(context
, config
, &b
->kdc_options
, sp
, &realms
)) {
1678 if (strcmp(realms
[0], sp
->realm
) != 0) {
1679 kdc_log(context
, config
, 5,
1680 "Returning a referral to realm %s for "
1681 "server %s that was not found",
1683 krb5_free_principal(context
, sp
);
1685 krb5_make_principal(context
, &sp
, r
, KRB5_TGS_NAME
,
1687 ret
= krb5_unparse_name(context
, sp
, &spn
);
1693 ref_realm
= strdup(realms
[0]);
1695 krb5_free_host_realm(context
, realms
);
1698 krb5_free_host_realm(context
, realms
);
1700 msg
= krb5_get_error_message(context
, ret
);
1701 kdc_log(context
, config
, 0,
1702 "Server not found in database: %s: %s", spn
, msg
);
1703 krb5_free_error_message(context
, msg
);
1704 if (ret
== HDB_ERR_NOENTRY
)
1705 ret
= KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN
;
1709 /* the name returned to the client depend on what was asked for,
1710 * return canonical name if kdc_options.canonicalize was set, the
1711 * client wants the true name of the principal, if not it just
1712 * wants the name its asked for.
1715 if (b
->kdc_options
.canonicalize
)
1716 rsp
= server
->entry
.principal
;
1722 * Select enctype, return key and kvno.
1728 if(b
->kdc_options
.enc_tkt_in_skey
) {
1731 for(i
= 0; i
< b
->etype
.len
; i
++)
1732 if (b
->etype
.val
[i
] == adtkt
.key
.keytype
)
1734 if(i
== b
->etype
.len
) {
1735 kdc_log(context
, config
, 0,
1736 "Addition ticket have not matching etypes");
1737 krb5_clear_error_message(context
);
1738 ret
= KRB5KDC_ERR_ETYPE_NOSUPP
;
1741 etype
= b
->etype
.val
[i
];
1746 ret
= _kdc_find_etype(context
,
1747 krb5_principal_is_krbtgt(context
, sp
) ?
1748 config
->tgt_use_strongest_session_key
:
1749 config
->svc_use_strongest_session_key
, FALSE
,
1750 server
, b
->etype
.val
, b
->etype
.len
, &etype
,
1753 kdc_log(context
, config
, 0,
1754 "Server (%s) has no support for etypes", spn
);
1757 ret
= _kdc_get_preferred_key(context
, config
, server
, spn
,
1760 kdc_log(context
, config
, 0,
1761 "Server (%s) has no supported etypes", spn
);
1765 kvno
= server
->entry
.kvno
;
1768 ret
= krb5_generate_random_keyblock(context
, etype
, &sessionkey
);
1774 * Check that service is in the same realm as the krbtgt. If it's
1775 * not the same, it's someone that is using a uni-directional trust
1780 * Validate authoriation data
1783 ret
= hdb_enctype2key(context
, &krbtgt
->entry
, NULL
, /* XXX use the right kvno! */
1784 krbtgt_etype
, &tkey_check
);
1786 kdc_log(context
, config
, 0,
1787 "Failed to find key for krbtgt PAC check");
1792 * Now refetch the primary krbtgt, and get the current kvno (the
1793 * sign check may have been on an old kvno, and the server may
1794 * have been an incoming trust)
1798 const char *remote_realm
=
1799 krb5_principal_get_comp_string(context
, krbtgt
->entry
.principal
, 1);
1801 ret
= krb5_make_principal(context
,
1802 &krbtgt_out_principal
,
1808 kdc_log(context
, config
, 0,
1809 "Failed to make krbtgt principal name object for "
1810 "authz-data signatures");
1813 ret
= krb5_unparse_name(context
, krbtgt_out_principal
, &krbtgt_out_n
);
1815 kdc_log(context
, config
, 0,
1816 "Failed to make krbtgt principal name object for "
1817 "authz-data signatures");
1822 ret
= _kdc_db_fetch(context
, config
, krbtgt_out_principal
,
1823 HDB_F_GET_KRBTGT
, NULL
, NULL
, &krbtgt_out
);
1826 ret
= krb5_unparse_name(context
, krbtgt
->entry
.principal
, &ktpn
);
1827 kdc_log(context
, config
, 0,
1828 "No such principal %s (needed for authz-data signature keys) "
1829 "while processing TGS-REQ for service %s with krbtg %s",
1830 krbtgt_out_n
, spn
, (ret
== 0) ? ktpn
: "<unknown>");
1832 ret
= KRB5KRB_AP_ERR_NOT_US
;
1837 * The first realm is the realm of the service, the second is
1838 * krbtgt/<this>/@REALM component of the krbtgt DN the request was
1839 * encrypted to. The redirection via the krbtgt_out entry allows
1840 * the DB to possibly correct the case of the realm (Samba4 does
1841 * this) before the strcmp()
1843 if (strcmp(krb5_principal_get_realm(context
, server
->entry
.principal
),
1844 krb5_principal_get_realm(context
, krbtgt_out
->entry
.principal
)) != 0) {
1846 ret
= krb5_unparse_name(context
, krbtgt_out
->entry
.principal
, &ktpn
);
1847 kdc_log(context
, config
, 0,
1848 "Request with wrong krbtgt: %s",
1849 (ret
== 0) ? ktpn
: "<unknown>");
1852 ret
= KRB5KRB_AP_ERR_NOT_US
;
1856 ret
= _kdc_get_preferred_key(context
, config
, krbtgt_out
, krbtgt_out_n
,
1859 kdc_log(context
, config
, 0,
1860 "Failed to find key for krbtgt PAC signature");
1863 ret
= hdb_enctype2key(context
, &krbtgt_out
->entry
, NULL
,
1864 tkey_sign
->key
.keytype
, &tkey_sign
);
1866 kdc_log(context
, config
, 0,
1867 "Failed to find key for krbtgt PAC signature");
1871 ret
= _kdc_db_fetch(context
, config
, cp
, HDB_F_GET_CLIENT
| flags
,
1872 NULL
, &clientdb
, &client
);
1873 if(ret
== HDB_ERR_NOT_FOUND_HERE
) {
1874 /* This is OK, we are just trying to find out if they have
1875 * been disabled or deleted in the meantime, missing secrets
1878 const char *krbtgt_realm
, *msg
;
1881 * If the client belongs to the same realm as our krbtgt, it
1882 * should exist in the local database.
1886 krbtgt_realm
= krb5_principal_get_realm(context
, krbtgt_out
->entry
.principal
);
1888 if(strcmp(krb5_principal_get_realm(context
, cp
), krbtgt_realm
) == 0) {
1889 if (ret
== HDB_ERR_NOENTRY
)
1890 ret
= KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN
;
1891 kdc_log(context
, config
, 1, "Client no longer in database: %s",
1896 msg
= krb5_get_error_message(context
, ret
);
1897 kdc_log(context
, config
, 1, "Client not found in database: %s", msg
);
1898 krb5_free_error_message(context
, msg
);
1901 ret
= check_PAC(context
, config
, cp
, NULL
,
1902 client
, server
, krbtgt
,
1904 ekey
, &tkey_sign
->key
,
1905 tgt
, &rspac
, &signedpath
);
1907 const char *msg
= krb5_get_error_message(context
, ret
);
1908 kdc_log(context
, config
, 0,
1909 "Verify PAC failed for %s (%s) from %s with %s",
1910 spn
, cpn
, from
, msg
);
1911 krb5_free_error_message(context
, msg
);
1915 /* also check the krbtgt for signature */
1916 ret
= check_KRB5SignedPath(context
,
1924 const char *msg
= krb5_get_error_message(context
, ret
);
1925 kdc_log(context
, config
, 0,
1926 "KRB5SignedPath check failed for %s (%s) from %s with %s",
1927 spn
, cpn
, from
, msg
);
1928 krb5_free_error_message(context
, msg
);
1936 /* by default the tgt principal matches the client principal */
1941 const PA_DATA
*sdata
;
1944 sdata
= _kdc_find_padata(req
, &i
, KRB5_PADATA_FOR_USER
);
1951 ret
= decode_PA_S4U2Self(sdata
->padata_value
.data
,
1952 sdata
->padata_value
.length
,
1955 kdc_log(context
, config
, 0, "Failed to decode PA-S4U2Self");
1959 ret
= _krb5_s4u2self_to_checksumdata(context
, &self
, &datack
);
1963 ret
= krb5_crypto_init(context
, &tgt
->key
, 0, &crypto
);
1965 const char *msg
= krb5_get_error_message(context
, ret
);
1966 free_PA_S4U2Self(&self
);
1967 krb5_data_free(&datack
);
1968 kdc_log(context
, config
, 0, "krb5_crypto_init failed: %s", msg
);
1969 krb5_free_error_message(context
, msg
);
1973 ret
= krb5_verify_checksum(context
,
1975 KRB5_KU_OTHER_CKSUM
,
1979 krb5_data_free(&datack
);
1980 krb5_crypto_destroy(context
, crypto
);
1982 const char *msg
= krb5_get_error_message(context
, ret
);
1983 free_PA_S4U2Self(&self
);
1984 kdc_log(context
, config
, 0,
1985 "krb5_verify_checksum failed for S4U2Self: %s", msg
);
1986 krb5_free_error_message(context
, msg
);
1990 ret
= _krb5_principalname2krb5_principal(context
,
1994 free_PA_S4U2Self(&self
);
1998 ret
= krb5_unparse_name(context
, tp
, &tpn
);
2002 /* If we were about to put a PAC into the ticket, we better fix it to be the right PAC */
2005 krb5_data_free(&rspac
);
2006 ret
= _kdc_db_fetch(context
, config
, tp
, HDB_F_GET_CLIENT
| flags
,
2007 NULL
, &s4u2self_impersonated_clientdb
, &s4u2self_impersonated_client
);
2012 * If the client belongs to the same realm as our krbtgt, it
2013 * should exist in the local database.
2017 if (ret
== HDB_ERR_NOENTRY
)
2018 ret
= KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN
;
2019 msg
= krb5_get_error_message(context
, ret
);
2020 kdc_log(context
, config
, 1,
2021 "S2U4Self principal to impersonate %s not found in database: %s",
2023 krb5_free_error_message(context
, msg
);
2026 ret
= _kdc_pac_generate(context
, s4u2self_impersonated_client
, &p
);
2028 kdc_log(context
, config
, 0, "PAC generation failed for -- %s",
2033 ret
= _krb5_pac_sign(context
, p
, ticket
->ticket
.authtime
,
2034 s4u2self_impersonated_client
->entry
.principal
,
2035 ekey
, &tkey_sign
->key
,
2037 krb5_pac_free(context
, p
);
2039 kdc_log(context
, config
, 0, "PAC signing failed for -- %s",
2047 * Check that service doing the impersonating is
2048 * requesting a ticket to it-self.
2050 ret
= check_s4u2self(context
, config
, clientdb
, client
, sp
);
2052 kdc_log(context
, config
, 0, "S4U2Self: %s is not allowed "
2053 "to impersonate to service "
2054 "(tried for user %s to service %s)",
2060 * If the service isn't trusted for authentication to
2061 * delegation, remove the forward flag.
2064 if (client
->entry
.flags
.trusted_for_delegation
) {
2065 str
= "[forwardable]";
2067 b
->kdc_options
.forwardable
= 0;
2070 kdc_log(context
, config
, 0, "s4u2self %s impersonating %s to "
2071 "service %s %s", cpn
, tpn
, spn
, str
);
2076 * Constrained delegation
2080 && b
->additional_tickets
!= NULL
2081 && b
->additional_tickets
->len
!= 0
2082 && b
->kdc_options
.enc_tkt_in_skey
== 0)
2084 int ad_signedpath
= 0;
2089 * Require that the KDC have issued the service's krbtgt (not
2090 * self-issued ticket with kimpersonate(1).
2093 ret
= KRB5KDC_ERR_BADOPTION
;
2094 kdc_log(context
, config
, 0,
2095 "Constrained delegation done on service ticket %s/%s",
2100 t
= &b
->additional_tickets
->val
[0];
2102 ret
= hdb_enctype2key(context
, &client
->entry
,
2103 hdb_kvno2keys(context
, &client
->entry
,
2104 t
->enc_part
.kvno
? * t
->enc_part
.kvno
: 0),
2105 t
->enc_part
.etype
, &clientkey
);
2107 ret
= KRB5KDC_ERR_ETYPE_NOSUPP
; /* XXX */
2111 ret
= krb5_decrypt_ticket(context
, t
, &clientkey
->key
, &adtkt
, 0);
2113 kdc_log(context
, config
, 0,
2114 "failed to decrypt ticket for "
2115 "constrained delegation from %s to %s ", cpn
, spn
);
2119 ret
= _krb5_principalname2krb5_principal(context
,
2126 ret
= krb5_unparse_name(context
, tp
, &tpn
);
2130 ret
= _krb5_principalname2krb5_principal(context
,
2137 ret
= krb5_unparse_name(context
, dp
, &dpn
);
2141 /* check that ticket is valid */
2142 if (adtkt
.flags
.forwardable
== 0) {
2143 kdc_log(context
, config
, 0,
2144 "Missing forwardable flag on ticket for "
2145 "constrained delegation from %s (%s) as %s to %s ",
2146 cpn
, dpn
, tpn
, spn
);
2147 ret
= KRB5KDC_ERR_BADOPTION
;
2151 ret
= check_constrained_delegation(context
, config
, clientdb
,
2152 client
, server
, sp
);
2154 kdc_log(context
, config
, 0,
2155 "constrained delegation from %s (%s) as %s to %s not allowed",
2156 cpn
, dpn
, tpn
, spn
);
2160 ret
= verify_flags(context
, config
, &adtkt
, tpn
);
2165 krb5_data_free(&rspac
);
2168 * generate the PAC for the user.
2170 * TODO: pass in t->sname and t->realm and build
2171 * a S4U_DELEGATION_INFO blob to the PAC.
2173 ret
= check_PAC(context
, config
, tp
, dp
,
2174 client
, server
, krbtgt
,
2176 ekey
, &tkey_sign
->key
,
2177 &adtkt
, &rspac
, &ad_signedpath
);
2179 const char *msg
= krb5_get_error_message(context
, ret
);
2180 kdc_log(context
, config
, 0,
2181 "Verify delegated PAC failed to %s for client"
2182 "%s (%s) as %s from %s with %s",
2183 spn
, cpn
, dpn
, tpn
, from
, msg
);
2184 krb5_free_error_message(context
, msg
);
2189 * Check that the KDC issued the user's ticket.
2191 ret
= check_KRB5SignedPath(context
,
2199 const char *msg
= krb5_get_error_message(context
, ret
);
2200 kdc_log(context
, config
, 0,
2201 "KRB5SignedPath check from service %s failed "
2202 "for delegation to %s for client %s (%s)"
2203 "from %s failed with %s",
2204 spn
, tpn
, dpn
, cpn
, from
, msg
);
2205 krb5_free_error_message(context
, msg
);
2209 if (!ad_signedpath
) {
2210 ret
= KRB5KDC_ERR_BADOPTION
;
2211 kdc_log(context
, config
, 0,
2212 "Ticket not signed with PAC nor SignedPath service %s failed "
2213 "for delegation to %s for client %s (%s)"
2215 spn
, tpn
, dpn
, cpn
, from
);
2219 kdc_log(context
, config
, 0, "constrained delegation for %s "
2220 "from %s (%s) to %s", tpn
, cpn
, dpn
, spn
);
2227 ret
= kdc_check_flags(context
, config
,
2234 if((b
->kdc_options
.validate
|| b
->kdc_options
.renew
) &&
2235 !krb5_principal_compare(context
,
2236 krbtgt
->entry
.principal
,
2237 server
->entry
.principal
)){
2238 kdc_log(context
, config
, 0, "Inconsistent request.");
2239 ret
= KRB5KDC_ERR_SERVER_NOMATCH
;
2243 /* check for valid set of addresses */
2244 if(!_kdc_check_addresses(context
, config
, tgt
->caddr
, from_addr
)) {
2245 ret
= KRB5KRB_AP_ERR_BADADDR
;
2246 kdc_log(context
, config
, 0, "Request from wrong address");
2251 * If this is an referral, add server referral data to the
2258 kdc_log(context
, config
, 0,
2259 "Adding server referral to %s", ref_realm
);
2261 ret
= krb5_crypto_init(context
, &sessionkey
, 0, &crypto
);
2265 ret
= build_server_referral(context
, config
, crypto
, ref_realm
,
2266 NULL
, s
, &pa
.padata_value
);
2267 krb5_crypto_destroy(context
, crypto
);
2269 kdc_log(context
, config
, 0,
2270 "Failed building server referral");
2273 pa
.padata_type
= KRB5_PADATA_SERVER_REFERRAL
;
2275 ret
= add_METHOD_DATA(&enc_pa_data
, &pa
);
2276 krb5_data_free(&pa
.padata_value
);
2278 kdc_log(context
, config
, 0,
2279 "Add server referral METHOD-DATA failed");
2288 ret
= tgs_make_reply(context
,
2305 tkey_sign
->key
.keytype
,
2320 krb5_data_free(&rspac
);
2321 krb5_free_keyblock_contents(context
, &sessionkey
);
2323 _kdc_free_ent(context
, krbtgt_out
);
2325 _kdc_free_ent(context
, server
);
2327 _kdc_free_ent(context
, client
);
2328 if(s4u2self_impersonated_client
)
2329 _kdc_free_ent(context
, s4u2self_impersonated_client
);
2332 krb5_free_principal(context
, tp
);
2333 krb5_free_principal(context
, cp
);
2334 krb5_free_principal(context
, dp
);
2335 krb5_free_principal(context
, sp
);
2336 krb5_free_principal(context
, krbtgt_out_principal
);
2339 free_METHOD_DATA(&enc_pa_data
);
2341 free_EncTicketPart(&adtkt
);
2351 _kdc_tgs_rep(krb5_context context
,
2352 krb5_kdc_configuration
*config
,
2356 struct sockaddr
*from_addr
,
2359 AuthorizationData
*auth_data
= NULL
;
2360 krb5_error_code ret
;
2362 const PA_DATA
*tgs_req
;
2364 hdb_entry_ex
*krbtgt
= NULL
;
2365 krb5_ticket
*ticket
= NULL
;
2366 const char *e_text
= NULL
;
2367 krb5_enctype krbtgt_etype
= ETYPE_NULL
;
2369 krb5_keyblock
*replykey
= NULL
;
2370 int rk_is_subkey
= 0;
2371 time_t *csec
= NULL
;
2374 if(req
->padata
== NULL
){
2375 ret
= KRB5KDC_ERR_PREAUTH_REQUIRED
; /* XXX ??? */
2376 kdc_log(context
, config
, 0,
2377 "TGS-REQ from %s without PA-DATA", from
);
2381 tgs_req
= _kdc_find_padata(req
, &i
, KRB5_PADATA_TGS_REQ
);
2383 if(tgs_req
== NULL
){
2384 ret
= KRB5KDC_ERR_PADATA_TYPE_NOSUPP
;
2386 kdc_log(context
, config
, 0,
2387 "TGS-REQ from %s without PA-TGS-REQ", from
);
2390 ret
= tgs_parse_request(context
, config
,
2391 &req
->req_body
, tgs_req
,
2401 if (ret
== HDB_ERR_NOT_FOUND_HERE
) {
2402 /* kdc_log() is called in tgs_parse_request() */
2406 kdc_log(context
, config
, 0,
2407 "Failed parsing TGS-REQ from %s", from
);
2412 const PA_DATA
*pa
= _kdc_find_padata(req
, &i
, KRB5_PADATA_FX_FAST
);
2414 kdc_log(context
, config
, 10, "Got TGS FAST request");
2418 ret
= tgs_build_reply(context
,
2433 kdc_log(context
, config
, 0,
2434 "Failed building TGS-REP to %s", from
);
2439 if (datagram_reply
&& data
->length
> config
->max_datagram_reply_length
) {
2440 krb5_data_free(data
);
2441 ret
= KRB5KRB_ERR_RESPONSE_TOO_BIG
;
2442 e_text
= "Reply packet too large";
2447 krb5_free_keyblock(context
, replykey
);
2449 if(ret
&& ret
!= HDB_ERR_NOT_FOUND_HERE
&& data
->data
== NULL
){
2450 /* XXX add fast wrapping on the error */
2451 METHOD_DATA error_method
= { 0, NULL
};
2454 kdc_log(context
, config
, 10, "tgs-req: sending error: %d to client", ret
);
2455 ret
= _kdc_fast_mk_error(context
, NULL
,
2463 free_METHOD_DATA(&error_method
);
2468 krb5_free_ticket(context
, ticket
);
2470 _kdc_free_ent(context
, krbtgt
);
2473 free_AuthorizationData(auth_data
);