2 * Copyright (c) 1997-2007 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Portions Copyright (c) 2009 Apple Inc. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * 3. Neither the name of the Institute nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
38 #include <parse_bytes.h>
47 static char *config_file
; /* location of kdc config file */
49 static int require_preauth
= -1; /* 1 == require preauth for all principals */
50 static char *max_request_str
; /* `max_request' as a string */
52 static int disable_des
= -1;
53 static int enable_v4
= -1;
54 static int enable_kaserver
= -1;
55 static int enable_524
= -1;
56 static int enable_v4_cross_realm
= -1;
58 static int builtin_hdb_flag
;
60 static int version_flag
;
62 static struct getarg_strings addresses_str
; /* addresses to listen on */
64 static char *v4_realm
;
70 static struct getargs args
[] = {
72 "config-file", 'c', arg_string
, &config_file
,
73 "location of config file", "file"
76 "require-preauth", 'p', arg_negative_flag
, &require_preauth
,
77 "don't require pa-data in as-reqs"
80 "max-request", 0, arg_string
, &max_request_str
,
81 "max size for a kdc-request", "size"
83 { "enable-http", 'H', arg_flag
, &enable_http
, "turn on HTTP support" },
84 { "524", 0, arg_negative_flag
, &enable_524
,
85 "don't respond to 524 requests"
88 "kaserver", 'K', arg_flag
, &enable_kaserver
,
89 "enable kaserver support"
91 { "kerberos4", 0, arg_flag
, &enable_v4
,
92 "respond to kerberos 4 requests"
95 "v4-realm", 'r', arg_string
, &v4_realm
,
96 "realm to serve v4-requests for"
98 { "kerberos4-cross-realm", 0, arg_flag
,
99 &enable_v4_cross_realm
,
100 "respond to kerberos 4 requests from foreign realms"
102 { "ports", 'P', arg_string
, &port_str
,
103 "ports to listen to", "portspec"
105 #ifdef SUPPORT_DETACH
106 #if DETACH_IS_DEFAULT
108 "detach", 'D', arg_negative_flag
, &detach_from_console
,
109 "don't detach from console"
113 "detach", 0 , arg_flag
, &detach_from_console
,
114 "detach from console"
118 { "addresses", 0, arg_strings
, &addresses_str
,
119 "addresses to listen on", "list of addresses" },
120 { "disable-des", 0, arg_flag
, &disable_des
,
122 { "builtin-hdb", 0, arg_flag
, &builtin_hdb_flag
,
123 "list builtin hdb backends"},
124 { "runas-user", 0, arg_string
, &runas_string
,
125 "run as this user when connected to network"
127 { "chroot", 0, arg_string
, &chroot_string
,
128 "chroot directory to run in"
130 { "help", 'h', arg_flag
, &help_flag
},
131 { "version", 'v', arg_flag
, &version_flag
}
134 static int num_args
= sizeof(args
) / sizeof(args
[0]);
139 arg_printusage (args
, num_args
, NULL
, "");
144 add_one_address (krb5_context context
, const char *str
, int first
)
149 ret
= krb5_parse_address (context
, str
, &tmp
);
151 krb5_err (context
, 1, ret
, "parse_address `%s'", str
);
153 krb5_copy_addresses(context
, &tmp
, &explicit_addresses
);
155 krb5_append_addresses(context
, &explicit_addresses
, &tmp
);
156 krb5_free_addresses (context
, &tmp
);
159 krb5_kdc_configuration
*
160 configure(krb5_context context
, int argc
, char **argv
)
162 krb5_kdc_configuration
*config
;
167 while(getarg(args
, num_args
, argc
, argv
, &optidx
))
168 warnx("error at argument `%s'", argv
[optidx
]);
178 if (builtin_hdb_flag
) {
180 ret
= hdb_list_builtin(context
, &list
);
182 krb5_err(context
, 1, ret
, "listing builtin hdb backends");
183 printf("builtin hdb backends: %s\n", list
);
197 if (config_file
== NULL
) {
198 asprintf(&config_file
, "%s/kdc.conf", hdb_db_dir(context
));
199 if (config_file
== NULL
)
200 errx(1, "out of memory");
203 ret
= krb5_prepend_config_files_default(config_file
, &files
);
205 krb5_err(context
, 1, ret
, "getting configuration files");
207 ret
= krb5_set_config_files(context
, files
);
208 krb5_free_config_files(files
);
210 krb5_err(context
, 1, ret
, "reading configuration files");
213 ret
= krb5_kdc_get_config(context
, &config
);
215 krb5_err(context
, 1, ret
, "krb5_kdc_default_config");
217 kdc_openlog(context
, "kdc", config
);
219 ret
= krb5_kdc_set_dbinfo(context
, config
);
221 krb5_err(context
, 1, ret
, "krb5_kdc_set_dbinfo");
224 max_request_tcp
= max_request_udp
= parse_bytes(max_request_str
, NULL
);
226 if(max_request_tcp
== 0){
227 p
= krb5_config_get_string (context
,
233 max_request_tcp
= max_request_udp
= parse_bytes(p
, NULL
);
236 if(require_preauth
!= -1)
237 config
->require_preauth
= require_preauth
;
239 if(port_str
== NULL
){
240 p
= krb5_config_get_string(context
, NULL
, "kdc", "ports", NULL
);
242 port_str
= strdup(p
);
245 explicit_addresses
.len
= 0;
247 if (addresses_str
.num_strings
) {
250 for (i
= 0; i
< addresses_str
.num_strings
; ++i
)
251 add_one_address (context
, addresses_str
.strings
[i
], i
== 0);
252 free_getarg_strings (&addresses_str
);
254 char **foo
= krb5_config_get_strings (context
, NULL
,
255 "kdc", "addresses", NULL
);
258 add_one_address (context
, *foo
++, TRUE
);
260 add_one_address (context
, *foo
++, FALSE
);
265 config
->enable_v4
= enable_v4
;
267 if(enable_v4_cross_realm
!= -1)
268 config
->enable_v4_cross_realm
= enable_v4_cross_realm
;
271 config
->enable_524
= enable_524
;
273 if(enable_http
== -1)
274 enable_http
= krb5_config_get_bool(context
, NULL
, "kdc",
275 "enable-http", NULL
);
277 if(request_log
== NULL
)
278 request_log
= krb5_config_get_string(context
, NULL
,
283 if (krb5_config_get_string(context
, NULL
, "kdc",
284 "enforce-transited-policy", NULL
))
285 krb5_errx(context
, 1, "enforce-transited-policy deprecated, "
286 "use [kdc]transited-policy instead");
288 if (enable_kaserver
!= -1)
289 config
->enable_kaserver
= enable_kaserver
;
291 #ifdef SUPPORT_DETACH
292 if(detach_from_console
== -1)
293 detach_from_console
= krb5_config_get_bool_default(context
, NULL
,
297 #endif /* SUPPORT_DETACH */
299 if(max_request_tcp
== 0)
300 max_request_tcp
= 64 * 1024;
301 if(max_request_udp
== 0)
302 max_request_udp
= 64 * 1024;
304 if (port_str
== NULL
)
308 config
->v4_realm
= v4_realm
;
310 if(config
->v4_realm
== NULL
&& (config
->enable_kaserver
|| config
->enable_v4
))
311 krb5_errx(context
, 1, "Kerberos 4 enabled but no realm configured");
313 if(disable_des
== -1)
314 disable_des
= krb5_config_get_bool_default(context
, NULL
,
317 "disable-des", NULL
);
319 krb5_enctype_disable(context
, ETYPE_DES_CBC_CRC
);
320 krb5_enctype_disable(context
, ETYPE_DES_CBC_MD4
);
321 krb5_enctype_disable(context
, ETYPE_DES_CBC_MD5
);
322 krb5_enctype_disable(context
, ETYPE_DES_CBC_NONE
);
323 krb5_enctype_disable(context
, ETYPE_DES_CFB64_NONE
);
324 krb5_enctype_disable(context
, ETYPE_DES_PCBC_NONE
);
326 kdc_log(context
, config
,
327 0, "DES was disabled, turned off Kerberos V4, 524 "
329 config
->enable_v4
= 0;
330 config
->enable_524
= 0;
331 config
->enable_kaserver
= 0;
334 krb5_kdc_windc_init(context
);
337 config
->enable_pkinit
= 1;
339 if (config
->pkinit_kdc_identity
== NULL
) {
340 if (config
->pkinit_kdc_friendly_name
== NULL
)
341 config
->pkinit_kdc_friendly_name
=
342 strdup("O=System Identity,CN=com.apple.kerberos.kdc");
343 config
->pkinit_kdc_identity
= strdup("KEYCHAIN:");
345 if (config
->pkinit_kdc_anchors
== NULL
)
346 config
->pkinit_kdc_anchors
= strdup("KEYCHAIN:");
350 if (config
->enable_pkinit
) {
351 if (config
->pkinit_kdc_identity
== NULL
)
352 krb5_errx(context
, 1, "pkinit enabled but no identity");
354 if (config
->pkinit_kdc_anchors
== NULL
)
355 krb5_errx(context
, 1, "pkinit enabled but no X509 anchors");
357 krb5_kdc_pk_initialize(context
, config
,
358 config
->pkinit_kdc_identity
,
359 config
->pkinit_kdc_anchors
,
360 config
->pkinit_kdc_cert_pool
,
361 config
->pkinit_kdc_revoke
);