2 * Copyright (c) 1997-2007 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Portions Copyright (c) 2009 Apple Inc. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the Institute nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
38 #include <parse_bytes.h>
49 static char *config_file
; /* location of kdc config file */
51 static int require_preauth
= -1; /* 1 == require preauth for all principals */
52 static char *max_request_str
; /* `max_request' as a string */
54 static int disable_des
= -1;
55 static int enable_v4
= -1;
56 static int enable_kaserver
= -1;
57 static int enable_524
= -1;
58 static int enable_v4_cross_realm
= -1;
60 static int builtin_hdb_flag
;
62 static int version_flag
;
64 static struct getarg_strings addresses_str
; /* addresses to listen on */
66 static char *v4_realm
;
72 static struct getargs args
[] = {
74 "config-file", 'c', arg_string
, &config_file
,
75 "location of config file", "file"
78 "require-preauth", 'p', arg_negative_flag
, &require_preauth
,
79 "don't require pa-data in as-reqs"
82 "max-request", 0, arg_string
, &max_request_str
,
83 "max size for a kdc-request", "size"
85 { "enable-http", 'H', arg_flag
, &enable_http
, "turn on HTTP support" },
86 { "524", 0, arg_negative_flag
, &enable_524
,
87 "don't respond to 524 requests"
90 "kaserver", 'K', arg_flag
, &enable_kaserver
,
91 "enable kaserver support"
93 { "kerberos4", 0, arg_flag
, &enable_v4
,
94 "respond to kerberos 4 requests"
97 "v4-realm", 'r', arg_string
, &v4_realm
,
98 "realm to serve v4-requests for"
100 { "kerberos4-cross-realm", 0, arg_flag
,
101 &enable_v4_cross_realm
,
102 "respond to kerberos 4 requests from foreign realms"
104 { "ports", 'P', arg_string
, &port_str
,
105 "ports to listen to", "portspec"
107 #ifdef SUPPORT_DETACH
108 #if DETACH_IS_DEFAULT
110 "detach", 'D', arg_negative_flag
, &detach_from_console
,
111 "don't detach from console"
115 "detach", 0 , arg_flag
, &detach_from_console
,
116 "detach from console"
120 { "addresses", 0, arg_strings
, &addresses_str
,
121 "addresses to listen on", "list of addresses" },
122 { "disable-des", 0, arg_flag
, &disable_des
,
124 { "builtin-hdb", 0, arg_flag
, &builtin_hdb_flag
,
125 "list builtin hdb backends"},
126 { "runas-user", 0, arg_string
, &runas_string
,
127 "run as this user when connected to network"
129 { "chroot", 0, arg_string
, &chroot_string
,
130 "chroot directory to run in"
132 { "help", 'h', arg_flag
, &help_flag
},
133 { "version", 'v', arg_flag
, &version_flag
}
136 static int num_args
= sizeof(args
) / sizeof(args
[0]);
141 arg_printusage (args
, num_args
, NULL
, "");
146 add_one_address (krb5_context context
, const char *str
, int first
)
151 ret
= krb5_parse_address (context
, str
, &tmp
);
153 krb5_err (context
, 1, ret
, "parse_address `%s'", str
);
155 krb5_copy_addresses(context
, &tmp
, &explicit_addresses
);
157 krb5_append_addresses(context
, &explicit_addresses
, &tmp
);
158 krb5_free_addresses (context
, &tmp
);
161 krb5_kdc_configuration
*
162 configure(krb5_context context
, int argc
, char **argv
)
164 krb5_kdc_configuration
*config
;
169 while(getarg(args
, num_args
, argc
, argv
, &optidx
))
170 warnx("error at argument `%s'", argv
[optidx
]);
180 if (builtin_hdb_flag
) {
182 ret
= hdb_list_builtin(context
, &list
);
184 krb5_err(context
, 1, ret
, "listing builtin hdb backends");
185 printf("builtin hdb backends: %s\n", list
);
199 if (config_file
== NULL
) {
200 asprintf(&config_file
, "%s/kdc.conf", hdb_db_dir(context
));
201 if (config_file
== NULL
)
202 errx(1, "out of memory");
205 ret
= krb5_prepend_config_files_default(config_file
, &files
);
207 krb5_err(context
, 1, ret
, "getting configuration files");
209 ret
= krb5_set_config_files(context
, files
);
210 krb5_free_config_files(files
);
212 krb5_err(context
, 1, ret
, "reading configuration files");
215 ret
= krb5_kdc_get_config(context
, &config
);
217 krb5_err(context
, 1, ret
, "krb5_kdc_default_config");
219 kdc_openlog(context
, "kdc", config
);
221 ret
= krb5_kdc_set_dbinfo(context
, config
);
223 krb5_err(context
, 1, ret
, "krb5_kdc_set_dbinfo");
226 max_request_tcp
= max_request_udp
= parse_bytes(max_request_str
, NULL
);
228 if(max_request_tcp
== 0){
229 p
= krb5_config_get_string (context
,
235 max_request_tcp
= max_request_udp
= parse_bytes(p
, NULL
);
238 if(require_preauth
!= -1)
239 config
->require_preauth
= require_preauth
;
241 if(port_str
== NULL
){
242 p
= krb5_config_get_string(context
, NULL
, "kdc", "ports", NULL
);
244 port_str
= strdup(p
);
247 explicit_addresses
.len
= 0;
249 if (addresses_str
.num_strings
) {
252 for (i
= 0; i
< addresses_str
.num_strings
; ++i
)
253 add_one_address (context
, addresses_str
.strings
[i
], i
== 0);
254 free_getarg_strings (&addresses_str
);
256 char **foo
= krb5_config_get_strings (context
, NULL
,
257 "kdc", "addresses", NULL
);
260 add_one_address (context
, *foo
++, TRUE
);
262 add_one_address (context
, *foo
++, FALSE
);
267 config
->enable_v4
= enable_v4
;
269 if(enable_v4_cross_realm
!= -1)
270 config
->enable_v4_cross_realm
= enable_v4_cross_realm
;
273 config
->enable_524
= enable_524
;
275 if(enable_http
== -1)
276 enable_http
= krb5_config_get_bool(context
, NULL
, "kdc",
277 "enable-http", NULL
);
279 if(request_log
== NULL
)
280 request_log
= krb5_config_get_string(context
, NULL
,
285 if (krb5_config_get_string(context
, NULL
, "kdc",
286 "enforce-transited-policy", NULL
))
287 krb5_errx(context
, 1, "enforce-transited-policy deprecated, "
288 "use [kdc]transited-policy instead");
290 if (enable_kaserver
!= -1)
291 config
->enable_kaserver
= enable_kaserver
;
293 #ifdef SUPPORT_DETACH
294 if(detach_from_console
== -1)
295 detach_from_console
= krb5_config_get_bool_default(context
, NULL
,
299 #endif /* SUPPORT_DETACH */
301 if(max_request_tcp
== 0)
302 max_request_tcp
= 64 * 1024;
303 if(max_request_udp
== 0)
304 max_request_udp
= 64 * 1024;
306 if (port_str
== NULL
)
310 config
->v4_realm
= v4_realm
;
312 if(config
->v4_realm
== NULL
&& (config
->enable_kaserver
|| config
->enable_v4
))
313 krb5_errx(context
, 1, "Kerberos 4 enabled but no realm configured");
315 if(disable_des
== -1)
316 disable_des
= krb5_config_get_bool_default(context
, NULL
,
319 "disable-des", NULL
);
321 krb5_enctype_disable(context
, ETYPE_DES_CBC_CRC
);
322 krb5_enctype_disable(context
, ETYPE_DES_CBC_MD4
);
323 krb5_enctype_disable(context
, ETYPE_DES_CBC_MD5
);
324 krb5_enctype_disable(context
, ETYPE_DES_CBC_NONE
);
325 krb5_enctype_disable(context
, ETYPE_DES_CFB64_NONE
);
326 krb5_enctype_disable(context
, ETYPE_DES_PCBC_NONE
);
328 kdc_log(context
, config
,
329 0, "DES was disabled, turned off Kerberos V4, 524 "
331 config
->enable_v4
= 0;
332 config
->enable_524
= 0;
333 config
->enable_kaserver
= 0;
336 krb5_kdc_windc_init(context
);
339 config
->enable_pkinit
= 1;
341 if (config
->pkinit_kdc_identity
== NULL
) {
342 if (config
->pkinit_kdc_friendly_name
== NULL
)
343 config
->pkinit_kdc_friendly_name
=
344 strdup("O=System Identity,CN=com.apple.kerberos.kdc");
345 config
->pkinit_kdc_identity
= strdup("KEYCHAIN:");
347 if (config
->pkinit_kdc_anchors
== NULL
)
348 config
->pkinit_kdc_anchors
= strdup("KEYCHAIN:");
352 if (config
->enable_pkinit
) {
353 if (config
->pkinit_kdc_identity
== NULL
)
354 krb5_errx(context
, 1, "pkinit enabled but no identity");
356 if (config
->pkinit_kdc_anchors
== NULL
)
357 krb5_errx(context
, 1, "pkinit enabled but no X509 anchors");
359 _kdc_pk_initialize(context
, config
,
360 config
->pkinit_kdc_identity
,
361 config
->pkinit_kdc_anchors
,
362 config
->pkinit_kdc_cert_pool
,
363 config
->pkinit_kdc_revoke
);