xref: /freebsd/crypto/heimdal/kdc/digest-service.c (revision 6a068746777241722b2b32c5d0bc443a2a64d80b)
1*ae771770SStanislav Sedov /*
2*ae771770SStanislav Sedov  * Copyright (c) 2006 - 2007 Kungliga Tekniska H�gskolan
3*ae771770SStanislav Sedov  * (Royal Institute of Technology, Stockholm, Sweden).
4*ae771770SStanislav Sedov  * All rights reserved.
5*ae771770SStanislav Sedov  *
6*ae771770SStanislav Sedov  * Portions Copyright (c) 2009 Apple Inc. All rights reserved.
7*ae771770SStanislav Sedov  *
8*ae771770SStanislav Sedov  * Redistribution and use in source and binary forms, with or without
9*ae771770SStanislav Sedov  * modification, are permitted provided that the following conditions
10*ae771770SStanislav Sedov  * are met:
11*ae771770SStanislav Sedov  *
12*ae771770SStanislav Sedov  * 1. Redistributions of source code must retain the above copyright
13*ae771770SStanislav Sedov  *    notice, this list of conditions and the following disclaimer.
14*ae771770SStanislav Sedov  *
15*ae771770SStanislav Sedov  * 2. Redistributions in binary form must reproduce the above copyright
16*ae771770SStanislav Sedov  *    notice, this list of conditions and the following disclaimer in the
17*ae771770SStanislav Sedov  *    documentation and/or other materials provided with the distribution.
18*ae771770SStanislav Sedov  *
19*ae771770SStanislav Sedov  * 3. Neither the name of the Institute nor the names of its contributors
20*ae771770SStanislav Sedov  *    may be used to endorse or promote products derived from this software
21*ae771770SStanislav Sedov  *    without specific prior written permission.
22*ae771770SStanislav Sedov  *
23*ae771770SStanislav Sedov  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24*ae771770SStanislav Sedov  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25*ae771770SStanislav Sedov  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26*ae771770SStanislav Sedov  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27*ae771770SStanislav Sedov  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28*ae771770SStanislav Sedov  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29*ae771770SStanislav Sedov  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30*ae771770SStanislav Sedov  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31*ae771770SStanislav Sedov  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32*ae771770SStanislav Sedov  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33*ae771770SStanislav Sedov  * SUCH DAMAGE.
34*ae771770SStanislav Sedov  */
35*ae771770SStanislav Sedov 
36*ae771770SStanislav Sedov #define HC_DEPRECATED_CRYPTO
37*ae771770SStanislav Sedov 
38*ae771770SStanislav Sedov #include "headers.h"
39*ae771770SStanislav Sedov #include <digest_asn1.h>
40*ae771770SStanislav Sedov #include <heimntlm.h>
41*ae771770SStanislav Sedov #include <heim-ipc.h>
42*ae771770SStanislav Sedov #include <getarg.h>
43*ae771770SStanislav Sedov 
44*ae771770SStanislav Sedov typedef struct pk_client_params pk_client_params;
45*ae771770SStanislav Sedov struct DigestREQ;
46*ae771770SStanislav Sedov struct Kx509Request;
47*ae771770SStanislav Sedov #include <kdc-private.h>
48*ae771770SStanislav Sedov 
49*ae771770SStanislav Sedov krb5_kdc_configuration *config;
50*ae771770SStanislav Sedov 
51*ae771770SStanislav Sedov static void
ntlm_service(void * ctx,const heim_idata * req,const heim_icred cred,heim_ipc_complete complete,heim_sipc_call cctx)52*ae771770SStanislav Sedov ntlm_service(void *ctx, const heim_idata *req,
53*ae771770SStanislav Sedov 	     const heim_icred cred,
54*ae771770SStanislav Sedov 	     heim_ipc_complete complete,
55*ae771770SStanislav Sedov 	     heim_sipc_call cctx)
56*ae771770SStanislav Sedov {
57*ae771770SStanislav Sedov     NTLMRequest2 ntq;
58*ae771770SStanislav Sedov     unsigned char sessionkey[16];
59*ae771770SStanislav Sedov     heim_idata rep = { 0, NULL };
60*ae771770SStanislav Sedov     krb5_context context = ctx;
61*ae771770SStanislav Sedov     hdb_entry_ex *user = NULL;
62*ae771770SStanislav Sedov     Key *key = NULL;
63*ae771770SStanislav Sedov     NTLMReply ntp;
64*ae771770SStanislav Sedov     size_t size;
65*ae771770SStanislav Sedov     int ret;
66*ae771770SStanislav Sedov     const char *domain;
67*ae771770SStanislav Sedov 
68*ae771770SStanislav Sedov     kdc_log(context, config, 1, "digest-request: uid=%d",
69*ae771770SStanislav Sedov 	    (int)heim_ipc_cred_get_uid(cred));
70*ae771770SStanislav Sedov 
71*ae771770SStanislav Sedov     if (heim_ipc_cred_get_uid(cred) != 0) {
72*ae771770SStanislav Sedov 	(*complete)(cctx, EPERM, NULL);
73*ae771770SStanislav Sedov 	return;
74*ae771770SStanislav Sedov     }
75*ae771770SStanislav Sedov 
76*ae771770SStanislav Sedov     ntp.success = 0;
77*ae771770SStanislav Sedov     ntp.flags = 0;
78*ae771770SStanislav Sedov     ntp.sessionkey = NULL;
79*ae771770SStanislav Sedov 
80*ae771770SStanislav Sedov     ret = decode_NTLMRequest2(req->data, req->length, &ntq, NULL);
81*ae771770SStanislav Sedov     if (ret)
82*ae771770SStanislav Sedov 	goto failed;
83*ae771770SStanislav Sedov 
84*ae771770SStanislav Sedov     /* XXX forward to NetrLogonSamLogonEx() if not a local domain */
85*ae771770SStanislav Sedov     if (strcmp(ntq.loginDomainName, "BUILTIN") == 0) {
86*ae771770SStanislav Sedov 	domain = ntq.loginDomainName;
87*ae771770SStanislav Sedov     } else if (strcmp(ntq.loginDomainName, "") == 0) {
88*ae771770SStanislav Sedov 	domain = "BUILTIN";
89*ae771770SStanislav Sedov     } else {
90*ae771770SStanislav Sedov 	ret = EINVAL;
91*ae771770SStanislav Sedov 	goto failed;
92*ae771770SStanislav Sedov     }
93*ae771770SStanislav Sedov 
94*ae771770SStanislav Sedov     kdc_log(context, config, 1, "digest-request: user=%s/%s",
95*ae771770SStanislav Sedov 	    ntq.loginUserName, domain);
96*ae771770SStanislav Sedov 
97*ae771770SStanislav Sedov     if (ntq.lmchallenge.length != 8)
98*ae771770SStanislav Sedov 	goto failed;
99*ae771770SStanislav Sedov 
100*ae771770SStanislav Sedov     if (ntq.ntChallengeResponce.length == 0)
101*ae771770SStanislav Sedov 	goto failed;
102*ae771770SStanislav Sedov 
103*ae771770SStanislav Sedov     {
104*ae771770SStanislav Sedov 	krb5_principal client;
105*ae771770SStanislav Sedov 
106*ae771770SStanislav Sedov 	ret = krb5_make_principal(context, &client, domain,
107*ae771770SStanislav Sedov 				  ntq.loginUserName, NULL);
108*ae771770SStanislav Sedov 	if (ret)
109*ae771770SStanislav Sedov 	    goto failed;
110*ae771770SStanislav Sedov 
111*ae771770SStanislav Sedov 	krb5_principal_set_type(context, client, KRB5_NT_NTLM);
112*ae771770SStanislav Sedov 
113*ae771770SStanislav Sedov 	ret = _kdc_db_fetch(context, config, client,
114*ae771770SStanislav Sedov 			    HDB_F_GET_CLIENT, NULL, NULL, &user);
115*ae771770SStanislav Sedov 	krb5_free_principal(context, client);
116*ae771770SStanislav Sedov 	if (ret)
117*ae771770SStanislav Sedov 	    goto failed;
118*ae771770SStanislav Sedov 
119*ae771770SStanislav Sedov 	ret = hdb_enctype2key(context, &user->entry,
120*ae771770SStanislav Sedov 			      ETYPE_ARCFOUR_HMAC_MD5, &key);
121*ae771770SStanislav Sedov 	if (ret) {
122*ae771770SStanislav Sedov 	    krb5_set_error_message(context, ret, "NTLM missing arcfour key");
123*ae771770SStanislav Sedov 	    goto failed;
124*ae771770SStanislav Sedov 	}
125*ae771770SStanislav Sedov     }
126*ae771770SStanislav Sedov 
127*ae771770SStanislav Sedov     kdc_log(context, config, 2,
128*ae771770SStanislav Sedov 	    "digest-request: found user, processing ntlm request", ret);
129*ae771770SStanislav Sedov 
130*ae771770SStanislav Sedov     if (ntq.ntChallengeResponce.length != 24) {
131*ae771770SStanislav Sedov 	struct ntlm_buf infotarget, answer;
132*ae771770SStanislav Sedov 
133*ae771770SStanislav Sedov 	answer.length = ntq.ntChallengeResponce.length;
134*ae771770SStanislav Sedov 	answer.data = ntq.ntChallengeResponce.data;
135*ae771770SStanislav Sedov 
136*ae771770SStanislav Sedov 	ret = heim_ntlm_verify_ntlm2(key->key.keyvalue.data,
137*ae771770SStanislav Sedov 				     key->key.keyvalue.length,
138*ae771770SStanislav Sedov 				     ntq.loginUserName,
139*ae771770SStanislav Sedov 				     ntq.loginDomainName,
140*ae771770SStanislav Sedov 				     0,
141*ae771770SStanislav Sedov 				     ntq.lmchallenge.data,
142*ae771770SStanislav Sedov 				     &answer,
143*ae771770SStanislav Sedov 				     &infotarget,
144*ae771770SStanislav Sedov 				     sessionkey);
145*ae771770SStanislav Sedov 	if (ret) {
146*ae771770SStanislav Sedov 	    goto failed;
147*ae771770SStanislav Sedov 	}
148*ae771770SStanislav Sedov 
149*ae771770SStanislav Sedov 	free(infotarget.data);
150*ae771770SStanislav Sedov 	/* XXX verify info target */
151*ae771770SStanislav Sedov 
152*ae771770SStanislav Sedov     } else {
153*ae771770SStanislav Sedov 	struct ntlm_buf answer;
154*ae771770SStanislav Sedov 
155*ae771770SStanislav Sedov 	if (ntq.flags & NTLM_NEG_NTLM2_SESSION) {
156*ae771770SStanislav Sedov 	    unsigned char sessionhash[MD5_DIGEST_LENGTH];
157*ae771770SStanislav Sedov 	    EVP_MD_CTX *md5ctx;
158*ae771770SStanislav Sedov 
159*ae771770SStanislav Sedov 	    /* the first first 8 bytes is the challenge, what is the other 16 bytes ? */
160*ae771770SStanislav Sedov 	    if (ntq.lmChallengeResponce.length != 24)
161*ae771770SStanislav Sedov 		goto failed;
162*ae771770SStanislav Sedov 
163*ae771770SStanislav Sedov 	    md5ctx = EVP_MD_CTX_create();
164*ae771770SStanislav Sedov 	    EVP_DigestInit_ex(md5ctx, EVP_md5(), NULL);
165*ae771770SStanislav Sedov 	    EVP_DigestUpdate(md5ctx, ntq.lmchallenge.data, 8);
166*ae771770SStanislav Sedov 	    EVP_DigestUpdate(md5ctx, ntq.lmChallengeResponce.data, 8);
167*ae771770SStanislav Sedov 	    EVP_DigestFinal_ex(md5ctx, sessionhash, NULL);
168*ae771770SStanislav Sedov 	    EVP_MD_CTX_destroy(md5ctx);
169*ae771770SStanislav Sedov 	    memcpy(ntq.lmchallenge.data, sessionhash, ntq.lmchallenge.length);
170*ae771770SStanislav Sedov 	}
171*ae771770SStanislav Sedov 
172*ae771770SStanislav Sedov 	ret = heim_ntlm_calculate_ntlm1(key->key.keyvalue.data,
173*ae771770SStanislav Sedov 					key->key.keyvalue.length,
174*ae771770SStanislav Sedov 					ntq.lmchallenge.data, &answer);
175*ae771770SStanislav Sedov 	if (ret)
176*ae771770SStanislav Sedov 	    goto failed;
177*ae771770SStanislav Sedov 
178*ae771770SStanislav Sedov 	if (ntq.ntChallengeResponce.length != answer.length ||
179*ae771770SStanislav Sedov 	    memcmp(ntq.ntChallengeResponce.data, answer.data, answer.length) != 0) {
180*ae771770SStanislav Sedov 	    free(answer.data);
181*ae771770SStanislav Sedov 	    ret = EINVAL;
182*ae771770SStanislav Sedov 	    goto failed;
183*ae771770SStanislav Sedov 	}
184*ae771770SStanislav Sedov 	free(answer.data);
185*ae771770SStanislav Sedov 
186*ae771770SStanislav Sedov 	{
187*ae771770SStanislav Sedov 	    EVP_MD_CTX *ctxp;
188*ae771770SStanislav Sedov 
189*ae771770SStanislav Sedov 	    ctxp = EVP_MD_CTX_create();
190*ae771770SStanislav Sedov 	    EVP_DigestInit_ex(ctxp, EVP_md4(), NULL);
191*ae771770SStanislav Sedov 	    EVP_DigestUpdate(ctxp, key->key.keyvalue.data, key->key.keyvalue.length);
192*ae771770SStanislav Sedov 	    EVP_DigestFinal_ex(ctxp, sessionkey, NULL);
193*ae771770SStanislav Sedov 	    EVP_MD_CTX_destroy(ctxp);
194*ae771770SStanislav Sedov 	}
195*ae771770SStanislav Sedov     }
196*ae771770SStanislav Sedov 
197*ae771770SStanislav Sedov     ntp.success = 1;
198*ae771770SStanislav Sedov 
199*ae771770SStanislav Sedov     ASN1_MALLOC_ENCODE(NTLMReply, rep.data, rep.length, &ntp, &size, ret);
200*ae771770SStanislav Sedov     if (ret)
201*ae771770SStanislav Sedov 	goto failed;
202*ae771770SStanislav Sedov     if (rep.length != size)
203*ae771770SStanislav Sedov 	abort();
204*ae771770SStanislav Sedov 
205*ae771770SStanislav Sedov   failed:
206*ae771770SStanislav Sedov     kdc_log(context, config, 1, "digest-request: %d", ret);
207*ae771770SStanislav Sedov 
208*ae771770SStanislav Sedov     (*complete)(cctx, ret, &rep);
209*ae771770SStanislav Sedov 
210*ae771770SStanislav Sedov     free(rep.data);
211*ae771770SStanislav Sedov 
212*ae771770SStanislav Sedov     free_NTLMRequest2(&ntq);
213*ae771770SStanislav Sedov     if (user)
214*ae771770SStanislav Sedov 	_kdc_free_ent (context, user);
215*ae771770SStanislav Sedov }
216*ae771770SStanislav Sedov 
217*ae771770SStanislav Sedov static int help_flag;
218*ae771770SStanislav Sedov static int version_flag;
219*ae771770SStanislav Sedov 
220*ae771770SStanislav Sedov static struct getargs args[] = {
221*ae771770SStanislav Sedov     {	"help",		'h',	arg_flag,   &help_flag, NULL, NULL },
222*ae771770SStanislav Sedov     {	"version",	'v',	arg_flag,   &version_flag, NULL, NULL }
223*ae771770SStanislav Sedov };
224*ae771770SStanislav Sedov 
225*ae771770SStanislav Sedov static int num_args = sizeof(args) / sizeof(args[0]);
226*ae771770SStanislav Sedov 
227*ae771770SStanislav Sedov static void
usage(int ret)228*ae771770SStanislav Sedov usage(int ret)
229*ae771770SStanislav Sedov {
230*ae771770SStanislav Sedov     arg_printusage (args, num_args, NULL, "");
231*ae771770SStanislav Sedov     exit (ret);
232*ae771770SStanislav Sedov }
233*ae771770SStanislav Sedov 
234*ae771770SStanislav Sedov int
main(int argc,char ** argv)235*ae771770SStanislav Sedov main(int argc, char **argv)
236*ae771770SStanislav Sedov {
237*ae771770SStanislav Sedov     krb5_context context;
238*ae771770SStanislav Sedov     int ret, optidx = 0;
239*ae771770SStanislav Sedov 
240*ae771770SStanislav Sedov     setprogname(argv[0]);
241*ae771770SStanislav Sedov 
242*ae771770SStanislav Sedov     if (getarg(args, num_args, argc, argv, &optidx))
243*ae771770SStanislav Sedov 	usage(1);
244*ae771770SStanislav Sedov 
245*ae771770SStanislav Sedov     if (help_flag)
246*ae771770SStanislav Sedov 	usage(0);
247*ae771770SStanislav Sedov 
248*ae771770SStanislav Sedov     if (version_flag) {
249*ae771770SStanislav Sedov 	print_version(NULL);
250*ae771770SStanislav Sedov 	exit(0);
251*ae771770SStanislav Sedov     }
252*ae771770SStanislav Sedov 
253*ae771770SStanislav Sedov     ret = krb5_init_context(&context);
254*ae771770SStanislav Sedov     if (ret)
255*ae771770SStanislav Sedov 	krb5_errx(context, 1, "krb5_init_context");
256*ae771770SStanislav Sedov 
257*ae771770SStanislav Sedov     ret = krb5_kdc_get_config(context, &config);
258*ae771770SStanislav Sedov     if (ret)
259*ae771770SStanislav Sedov 	krb5_err(context, 1, ret, "krb5_kdc_default_config");
260*ae771770SStanislav Sedov 
261*ae771770SStanislav Sedov     kdc_openlog(context, "digest-service", config);
262*ae771770SStanislav Sedov 
263*ae771770SStanislav Sedov     ret = krb5_kdc_set_dbinfo(context, config);
264*ae771770SStanislav Sedov     if (ret)
265*ae771770SStanislav Sedov 	krb5_err(context, 1, ret, "krb5_kdc_set_dbinfo");
266*ae771770SStanislav Sedov 
267*ae771770SStanislav Sedov #if __APPLE__
268*ae771770SStanislav Sedov     {
269*ae771770SStanislav Sedov 	heim_sipc mach;
270*ae771770SStanislav Sedov 	heim_sipc_launchd_mach_init("org.h5l.ntlm-service",
271*ae771770SStanislav Sedov 				    ntlm_service, context, &mach);
272*ae771770SStanislav Sedov 	heim_sipc_timeout(60);
273*ae771770SStanislav Sedov     }
274*ae771770SStanislav Sedov #endif
275*ae771770SStanislav Sedov     {
276*ae771770SStanislav Sedov 	heim_sipc un;
277*ae771770SStanislav Sedov 	heim_sipc_service_unix("org.h5l.ntlm-service", ntlm_service, NULL, &un);
278*ae771770SStanislav Sedov     }
279*ae771770SStanislav Sedov 
280*ae771770SStanislav Sedov     heim_ipc_main();
281*ae771770SStanislav Sedov     return 0;
282*ae771770SStanislav Sedov }
283