2 * Copyright (c) 2006 - 2007 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Portions Copyright (c) 2009 Apple Inc. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the Institute nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 #define HC_DEPRECATED_CRYPTO
39 #include <digest_asn1.h>
44 typedef struct pk_client_params pk_client_params
;
47 #include <kdc-private.h>
49 krb5_kdc_configuration
*config
;
52 ntlm_service(void *ctx
, const heim_idata
*req
,
53 const heim_icred cred
,
54 heim_ipc_complete complete
,
58 unsigned char sessionkey
[16];
59 heim_idata rep
= { 0, NULL
};
60 krb5_context context
= ctx
;
61 hdb_entry_ex
*user
= NULL
;
68 kdc_log(context
, config
, 1, "digest-request: uid=%d",
69 (int)heim_ipc_cred_get_uid(cred
));
71 if (heim_ipc_cred_get_uid(cred
) != 0) {
72 (*complete
)(cctx
, EPERM
, NULL
);
78 ntp
.sessionkey
= NULL
;
80 ret
= decode_NTLMRequest2(req
->data
, req
->length
, &ntq
, NULL
);
84 /* XXX forward to NetrLogonSamLogonEx() if not a local domain */
85 if (strcmp(ntq
.loginDomainName
, "BUILTIN") == 0) {
86 domain
= ntq
.loginDomainName
;
87 } else if (strcmp(ntq
.loginDomainName
, "") == 0) {
94 kdc_log(context
, config
, 1, "digest-request: user=%s/%s",
95 ntq
.loginUserName
, domain
);
97 if (ntq
.lmchallenge
.length
!= 8)
100 if (ntq
.ntChallengeResponce
.length
== 0)
104 krb5_principal client
;
106 ret
= krb5_make_principal(context
, &client
, domain
,
107 ntq
.loginUserName
, NULL
);
111 krb5_principal_set_type(context
, client
, KRB5_NT_NTLM
);
113 ret
= _kdc_db_fetch(context
, config
, client
,
114 HDB_F_GET_CLIENT
, NULL
, &user
);
115 krb5_free_principal(context
, client
);
119 ret
= hdb_enctype2key(context
, &user
->entry
,
120 ETYPE_ARCFOUR_HMAC_MD5
, &key
);
122 krb5_set_error_message(context
, ret
, "NTLM missing arcfour key");
127 kdc_log(context
, config
, 2,
128 "digest-request: found user, processing ntlm request", ret
);
130 if (ntq
.ntChallengeResponce
.length
!= 24) {
131 struct ntlm_buf infotarget
, answer
;
133 answer
.length
= ntq
.ntChallengeResponce
.length
;
134 answer
.data
= ntq
.ntChallengeResponce
.data
;
136 ret
= heim_ntlm_verify_ntlm2(key
->key
.keyvalue
.data
,
137 key
->key
.keyvalue
.length
,
141 ntq
.lmchallenge
.data
,
149 free(infotarget
.data
);
150 /* XXX verify info target */
153 struct ntlm_buf answer
;
155 if (ntq
.flags
& NTLM_NEG_NTLM2_SESSION
) {
156 unsigned char sessionhash
[MD5_DIGEST_LENGTH
];
159 /* the first first 8 bytes is the challenge, what is the other 16 bytes ? */
160 if (ntq
.lmChallengeResponce
.length
!= 24)
163 md5ctx
= EVP_MD_CTX_create();
164 EVP_DigestInit_ex(md5ctx
, EVP_md5(), NULL
);
165 EVP_DigestUpdate(md5ctx
, ntq
.lmchallenge
.data
, 8);
166 EVP_DigestUpdate(md5ctx
, ntq
.lmChallengeResponce
.data
, 8);
167 EVP_DigestFinal_ex(md5ctx
, sessionhash
, NULL
);
168 EVP_MD_CTX_destroy(md5ctx
);
169 memcpy(ntq
.lmchallenge
.data
, sessionhash
, ntq
.lmchallenge
.length
);
172 ret
= heim_ntlm_calculate_ntlm1(key
->key
.keyvalue
.data
,
173 key
->key
.keyvalue
.length
,
174 ntq
.lmchallenge
.data
, &answer
);
178 if (ntq
.ntChallengeResponce
.length
!= answer
.length
||
179 memcmp(ntq
.ntChallengeResponce
.data
, answer
.data
, answer
.length
) != 0) {
189 ctx
= EVP_MD_CTX_create();
190 EVP_DigestInit_ex(ctx
, EVP_md4(), NULL
);
191 EVP_DigestUpdate(ctx
, key
->key
.keyvalue
.data
, key
->key
.keyvalue
.length
);
192 EVP_DigestFinal_ex(ctx
, sessionkey
, NULL
);
193 EVP_MD_CTX_destroy(ctx
);
199 ASN1_MALLOC_ENCODE(NTLMReply
, rep
.data
, rep
.length
, &ntp
, &size
, ret
);
202 if (rep
.length
!= size
)
206 kdc_log(context
, config
, 1, "digest-request: %d", ret
);
208 (*complete
)(cctx
, ret
, &rep
);
212 free_NTLMRequest2(&ntq
);
214 _kdc_free_ent (context
, user
);
217 static int help_flag
;
218 static int version_flag
;
220 static struct getargs args
[] = {
221 { "help", 'h', arg_flag
, &help_flag
},
222 { "version", 'v', arg_flag
, &version_flag
}
225 static int num_args
= sizeof(args
) / sizeof(args
[0]);
230 arg_printusage (args
, num_args
, NULL
, "");
235 main(int argc
, char **argv
)
237 krb5_context context
;
240 setprogname(argv
[0]);
242 if (getarg(args
, num_args
, argc
, argv
, &optidx
))
253 ret
= krb5_init_context(&context
);
255 krb5_errx(context
, 1, "krb5_init_context");
257 ret
= krb5_kdc_get_config(context
, &config
);
259 krb5_err(context
, 1, ret
, "krb5_kdc_default_config");
261 kdc_openlog(context
, "digest-service", config
);
263 ret
= krb5_kdc_set_dbinfo(context
, config
);
265 krb5_err(context
, 1, ret
, "krb5_kdc_set_dbinfo");
270 heim_sipc_launchd_mach_init("org.h5l.ntlm-service",
271 ntlm_service
, context
, &mach
);
272 heim_sipc_timeout(60);