2 * Copyright (c) 1997 - 2005 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 #include "kafs_locl.h"
36 #define AUTH_SUPERUSER "afs"
39 * Here only ASCII characters are relevant.
42 #define IsAsciiLower(c) ('a' <= (c) && (c) <= 'z')
44 #define ToAsciiUpper(c) ((c) - 'a' + 'A')
46 static void (*kafs_verbose
)(void *, const char *);
47 static void *kafs_verbose_ctx
;
50 _kafs_foldup(char *a
, const char *b
)
54 *a
= ToAsciiUpper(*b
);
61 kafs_set_verbose(void (*f
)(void *, const char *), void *ctx
)
65 kafs_verbose_ctx
= ctx
;
70 kafs_settoken_rxkad(const char *cell
, struct ClearToken
*ct
,
71 void *ticket
, size_t ticket_len
)
73 struct ViceIoctl parms
;
79 * length of secret token followed by secret token
81 sizeof_x
= ticket_len
;
82 memcpy(t
, &sizeof_x
, sizeof(sizeof_x
));
83 t
+= sizeof(sizeof_x
);
84 memcpy(t
, ticket
, sizeof_x
);
87 * length of clear token followed by clear token
89 sizeof_x
= sizeof(*ct
);
90 memcpy(t
, &sizeof_x
, sizeof(sizeof_x
));
91 t
+= sizeof(sizeof_x
);
92 memcpy(t
, ct
, sizeof_x
);
96 * do *not* mark as primary cell
99 memcpy(t
, &sizeof_x
, sizeof(sizeof_x
));
100 t
+= sizeof(sizeof_x
);
102 * follow with cell name
104 sizeof_x
= strlen(cell
) + 1;
105 memcpy(t
, cell
, sizeof_x
);
109 * Build argument block
112 parms
.in_size
= t
- buf
;
116 return k_pioctl(0, VIOCSETTOK
, &parms
, 0);
120 _kafs_fixup_viceid(struct ClearToken
*ct
, uid_t uid
)
122 #define ODD(x) ((x) & 1)
123 /* According to Transarc conventions ViceId is valid iff
124 * (EndTimestamp - BeginTimestamp) is odd. By decrementing EndTime
125 * the transformations:
127 * (issue_date, life) -> (StartTime, EndTime) -> (issue_date, life)
128 * preserves the original values.
130 if (uid
!= 0) /* valid ViceId */
132 if (!ODD(ct
->EndTimestamp
- ct
->BeginTimestamp
))
135 else /* not valid ViceId */
137 if (ODD(ct
->EndTimestamp
- ct
->BeginTimestamp
))
144 _kafs_v4_to_kt(CREDENTIALS
*c
, uid_t uid
, struct kafs_token
*kt
)
148 if (c
->ticket_st
.length
> MAX_KTXT_LEN
)
151 kt
->ticket
= malloc(c
->ticket_st
.length
);
152 if (kt
->ticket
== NULL
)
154 kt
->ticket_len
= c
->ticket_st
.length
;
155 memcpy(kt
->ticket
, c
->ticket_st
.dat
, kt
->ticket_len
);
158 * Build a struct ClearToken
160 kt
->ct
.AuthHandle
= c
->kvno
;
161 memcpy (kt
->ct
.HandShakeKey
, c
->session
, sizeof(c
->session
));
163 kt
->ct
.BeginTimestamp
= c
->issue_date
;
164 kt
->ct
.EndTimestamp
= krb_life_to_time(c
->issue_date
, c
->lifetime
);
166 _kafs_fixup_viceid(&kt
->ct
, uid
);
171 /* Try to get a db-server for an AFS cell from a AFSDB record */
174 dns_find_cell(const char *cell
, char *dbserver
, size_t len
)
176 struct rk_dns_reply
*r
;
178 r
= rk_dns_lookup(cell
, "afsdb");
180 struct rk_resource_record
*rr
= r
->head
;
182 if(rr
->type
== rk_ns_t_afsdb
&& rr
->u
.afsdb
->preference
== 1){
198 * Try to find the cells we should try to klog to in "file".
201 find_cells(const char *file
, char ***cells
, int *idx
)
208 f
= fopen(file
, "r");
211 while (fgets(cell
, sizeof(cell
), f
)) {
213 t
= cell
+ strlen(cell
);
214 for (; t
>= cell
; t
--)
215 if (*t
== '\n' || *t
== '\t' || *t
== ' ')
217 if (cell
[0] == '\0' || cell
[0] == '#')
219 for(i
= 0; i
< ind
; i
++)
220 if(strcmp((*cells
)[i
], cell
) == 0)
225 tmp
= realloc(*cells
, (ind
+ 1) * sizeof(**cells
));
229 (*cells
)[ind
] = strdup(cell
);
230 if ((*cells
)[ind
] == NULL
)
240 * Get tokens for all cells[]
243 afslog_cells(struct kafs_data
*data
, char **cells
, int max
, uid_t uid
,
248 for (i
= 0; i
< max
; i
++) {
249 int er
= (*data
->afslog_uid
)(data
, cells
[i
], 0, uid
, homedir
);
257 _kafs_afslog_all_local_cells(struct kafs_data
*data
,
258 uid_t uid
, const char *homedir
)
265 homedir
= getenv("HOME");
266 if (homedir
!= NULL
) {
267 char home
[MaxPathLen
];
268 snprintf(home
, sizeof(home
), "%s/.TheseCells", homedir
);
269 find_cells(home
, &cells
, &idx
);
271 find_cells(_PATH_THESECELLS
, &cells
, &idx
);
272 find_cells(_PATH_THISCELL
, &cells
, &idx
);
273 find_cells(_PATH_ARLA_THESECELLS
, &cells
, &idx
);
274 find_cells(_PATH_ARLA_THISCELL
, &cells
, &idx
);
275 find_cells(_PATH_OPENAFS_DEBIAN_THESECELLS
, &cells
, &idx
);
276 find_cells(_PATH_OPENAFS_DEBIAN_THISCELL
, &cells
, &idx
);
277 find_cells(_PATH_OPENAFS_MACOSX_THESECELLS
, &cells
, &idx
);
278 find_cells(_PATH_OPENAFS_MACOSX_THISCELL
, &cells
, &idx
);
279 find_cells(_PATH_ARLA_DEBIAN_THESECELLS
, &cells
, &idx
);
280 find_cells(_PATH_ARLA_DEBIAN_THISCELL
, &cells
, &idx
);
281 find_cells(_PATH_ARLA_OPENBSD_THESECELLS
, &cells
, &idx
);
282 find_cells(_PATH_ARLA_OPENBSD_THISCELL
, &cells
, &idx
);
284 ret
= afslog_cells(data
, cells
, idx
, uid
, homedir
);
293 file_find_cell(struct kafs_data
*data
,
294 const char *cell
, char **realm
, int exact
)
301 if ((F
= fopen(_PATH_CELLSERVDB
, "r"))
302 || (F
= fopen(_PATH_ARLA_CELLSERVDB
, "r"))
303 || (F
= fopen(_PATH_OPENAFS_DEBIAN_CELLSERVDB
, "r"))
304 || (F
= fopen(_PATH_OPENAFS_MACOSX_CELLSERVDB
, "r"))
305 || (F
= fopen(_PATH_ARLA_DEBIAN_CELLSERVDB
, "r"))) {
306 while (fgets(buf
, sizeof(buf
), F
)) {
310 continue; /* Not a cell name line, try next line */
312 strsep(&p
, " \t\n#");
315 cmp
= strcmp(buf
+ 1, cell
);
317 cmp
= strncmp(buf
+ 1, cell
, strlen(cell
));
321 * We found the cell name we're looking for.
322 * Read next line on the form ip-address '#' hostname
324 if (fgets(buf
, sizeof(buf
), F
) == NULL
)
325 break; /* Read failed, give up */
326 p
= strchr(buf
, '#');
328 break; /* No '#', give up */
330 if (buf
[strlen(buf
) - 1] == '\n')
331 buf
[strlen(buf
) - 1] = '\0';
332 *realm
= (*data
->get_realm
)(data
, p
);
333 if (*realm
&& **realm
!= '\0')
335 break; /* Won't try any more */
343 /* Find the realm associated with cell. Do this by opening CellServDB
344 file and getting the realm-of-host for the first VL-server for the
347 This does not work when the VL-server is living in one realm, but
348 the cell it is serving is living in another realm.
350 Return 0 on success, -1 otherwise.
354 _kafs_realm_of_cell(struct kafs_data
*data
,
355 const char *cell
, char **realm
)
360 ret
= file_find_cell(data
, cell
, realm
, 1);
363 if (dns_find_cell(cell
, buf
, sizeof(buf
)) == 0) {
364 *realm
= (*data
->get_realm
)(data
, buf
);
368 return file_find_cell(data
, cell
, realm
, 0);
372 _kafs_try_get_cred(struct kafs_data
*data
, const char *user
, const char *cell
,
373 const char *realm
, uid_t uid
, struct kafs_token
*kt
)
377 ret
= (*data
->get_cred
)(data
, user
, cell
, realm
, uid
, kt
);
379 const char *estr
= (*data
->get_error
)(data
, ret
);
381 asprintf(&str
, "%s tried afs%s%s@%s -> %s (%d)",
382 data
->name
, cell
? "/" : "",
383 cell
? cell
: "", realm
, estr
? estr
: "unknown", ret
);
384 (*kafs_verbose
)(kafs_verbose_ctx
, str
);
386 (*data
->free_error
)(data
, estr
);
395 _kafs_get_cred(struct kafs_data
*data
,
397 const char *realm_hint
,
400 struct kafs_token
*kt
)
406 /* We're about to find the realm that holds the key for afs in
407 * the specified cell. The problem is that null-instance
408 * afs-principals are common and that hitting the wrong realm might
409 * yield the wrong afs key. The following assumptions were made.
411 * Any realm passed to us is preferred.
413 * If there is a realm with the same name as the cell, it is most
414 * likely the correct realm to talk to.
416 * In most (maybe even all) cases the database servers of the cell
417 * will live in the realm we are looking for.
419 * Try the local realm, but if the previous cases fail, this is
420 * really a long shot.
424 /* comments on the ordering of these tests */
426 /* If the user passes a realm, she probably knows something we don't
427 * know and we should try afs@realm_hint.
431 ret
= _kafs_try_get_cred(data
, AUTH_SUPERUSER
,
432 cell
, realm_hint
, uid
, kt
);
433 if (ret
== 0) return 0;
434 ret
= _kafs_try_get_cred(data
, AUTH_SUPERUSER
,
435 NULL
, realm_hint
, uid
, kt
);
436 if (ret
== 0) return 0;
439 _kafs_foldup(CELL
, cell
);
442 * If the AFS servers have a file /usr/afs/etc/krb.conf containing
443 * REALM we still don't have to resort to cross-cell authentication.
444 * Try afs.cell@REALM.
446 ret
= _kafs_try_get_cred(data
, AUTH_SUPERUSER
,
447 cell
, realm
, uid
, kt
);
448 if (ret
== 0) return 0;
451 * If cell == realm we don't need no cross-cell authentication.
454 if (strcmp(CELL
, realm
) == 0) {
455 ret
= _kafs_try_get_cred(data
, AUTH_SUPERUSER
,
456 NULL
, realm
, uid
, kt
);
457 if (ret
== 0) return 0;
461 * We failed to get ``first class tickets'' for afs,
462 * fall back to cross-cell authentication.
466 ret
= _kafs_try_get_cred(data
, AUTH_SUPERUSER
,
467 NULL
, CELL
, uid
, kt
);
468 if (ret
== 0) return 0;
469 ret
= _kafs_try_get_cred(data
, AUTH_SUPERUSER
,
470 cell
, CELL
, uid
, kt
);
471 if (ret
== 0) return 0;
474 * Perhaps the cell doesn't correspond to any realm?
475 * Use realm of first volume location DB server.
476 * Try afs.cell@VL_REALM.
477 * Try afs@VL_REALM???
479 if (_kafs_realm_of_cell(data
, cell
, &vl_realm
) == 0
480 && strcmp(vl_realm
, realm
) != 0
481 && strcmp(vl_realm
, CELL
) != 0) {
482 ret
= _kafs_try_get_cred(data
, AUTH_SUPERUSER
,
483 cell
, vl_realm
, uid
, kt
);
485 ret
= _kafs_try_get_cred(data
, AUTH_SUPERUSER
,
486 NULL
, vl_realm
, uid
, kt
);
488 if (ret
== 0) return 0;