1 /* 2 * Copyright (c) 1997-2008 Kungliga Tekniska Högskolan 3 * (Royal Institute of Technology, Stockholm, Sweden). 4 * All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions 8 * are met: 9 * 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 17 * 3. Neither the name of the Institute nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34 #include "kdc_locl.h" 35 36 /* 37 * return the realm of a krbtgt-ticket or NULL 38 */ 39 40 static Realm 41 get_krbtgt_realm(const PrincipalName *p) 42 { 43 if(p->name_string.len == 2 44 && strcmp(p->name_string.val[0], KRB5_TGS_NAME) == 0) 45 return p->name_string.val[1]; 46 else 47 return NULL; 48 } 49 50 /* 51 * The KDC might add a signed path to the ticket authorization data 52 * field. This is to avoid server impersonating clients and the 53 * request constrained delegation. 54 * 55 * This is done by storing a KRB5_AUTHDATA_IF_RELEVANT with a single 56 * entry of type KRB5SignedPath. 57 */ 58 59 static krb5_error_code 60 find_KRB5SignedPath(krb5_context context, 61 const AuthorizationData *ad, 62 krb5_data *data) 63 { 64 AuthorizationData child; 65 krb5_error_code ret; 66 int pos; 67 68 if (ad == NULL || ad->len == 0) 69 return KRB5KDC_ERR_PADATA_TYPE_NOSUPP; 70 71 pos = ad->len - 1; 72 73 if (ad->val[pos].ad_type != KRB5_AUTHDATA_IF_RELEVANT) 74 return KRB5KDC_ERR_PADATA_TYPE_NOSUPP; 75 76 ret = decode_AuthorizationData(ad->val[pos].ad_data.data, 77 ad->val[pos].ad_data.length, 78 &child, 79 NULL); 80 if (ret) { 81 krb5_set_error_message(context, ret, "Failed to decode " 82 "IF_RELEVANT with %d", ret); 83 return ret; 84 } 85 86 if (child.len != 1) { 87 free_AuthorizationData(&child); 88 return KRB5KDC_ERR_PADATA_TYPE_NOSUPP; 89 } 90 91 if (child.val[0].ad_type != KRB5_AUTHDATA_SIGNTICKET) { 92 free_AuthorizationData(&child); 93 return KRB5KDC_ERR_PADATA_TYPE_NOSUPP; 94 } 95 96 if (data) 97 ret = der_copy_octet_string(&child.val[0].ad_data, data); 98 free_AuthorizationData(&child); 99 return ret; 100 } 101 102 krb5_error_code 103 _kdc_add_KRB5SignedPath(krb5_context context, 104 krb5_kdc_configuration *config, 105 hdb_entry_ex *krbtgt, 106 krb5_enctype enctype, 107 krb5_principal client, 108 krb5_const_principal server, 109 krb5_principals principals, 110 EncTicketPart *tkt) 111 { 112 krb5_error_code ret; 113 KRB5SignedPath sp; 114 krb5_data data; 115 krb5_crypto crypto = NULL; 116 size_t size = 0; 117 118 if (server && principals) { 119 ret = add_Principals(principals, server); 120 if (ret) 121 return ret; 122 } 123 124 { 125 KRB5SignedPathData spd; 126 127 spd.client = client; 128 spd.authtime = tkt->authtime; 129 spd.delegated = principals; 130 spd.method_data = NULL; 131 132 ASN1_MALLOC_ENCODE(KRB5SignedPathData, data.data, data.length, 133 &spd, &size, ret); 134 if (ret) 135 return ret; 136 if (data.length != size) 137 krb5_abortx(context, "internal asn.1 encoder error"); 138 } 139 140 { 141 Key *key; 142 ret = hdb_enctype2key(context, &krbtgt->entry, enctype, &key); 143 if (ret == 0) 144 ret = krb5_crypto_init(context, &key->key, 0, &crypto); 145 if (ret) { 146 free(data.data); 147 return ret; 148 } 149 } 150 151 /* 152 * Fill in KRB5SignedPath 153 */ 154 155 sp.etype = enctype; 156 sp.delegated = principals; 157 sp.method_data = NULL; 158 159 ret = krb5_create_checksum(context, crypto, KRB5_KU_KRB5SIGNEDPATH, 0, 160 data.data, data.length, &sp.cksum); 161 krb5_crypto_destroy(context, crypto); 162 free(data.data); 163 if (ret) 164 return ret; 165 166 ASN1_MALLOC_ENCODE(KRB5SignedPath, data.data, data.length, &sp, &size, ret); 167 free_Checksum(&sp.cksum); 168 if (ret) 169 return ret; 170 if (data.length != size) 171 krb5_abortx(context, "internal asn.1 encoder error"); 172 173 174 /* 175 * Add IF-RELEVANT(KRB5SignedPath) to the last slot in 176 * authorization data field. 177 */ 178 179 ret = _kdc_tkt_add_if_relevant_ad(context, tkt, 180 KRB5_AUTHDATA_SIGNTICKET, &data); 181 krb5_data_free(&data); 182 183 return ret; 184 } 185 186 static krb5_error_code 187 check_KRB5SignedPath(krb5_context context, 188 krb5_kdc_configuration *config, 189 hdb_entry_ex *krbtgt, 190 krb5_principal cp, 191 EncTicketPart *tkt, 192 krb5_principals *delegated, 193 int *signedpath) 194 { 195 krb5_error_code ret; 196 krb5_data data; 197 krb5_crypto crypto = NULL; 198 199 if (delegated) 200 *delegated = NULL; 201 202 ret = find_KRB5SignedPath(context, tkt->authorization_data, &data); 203 if (ret == 0) { 204 KRB5SignedPathData spd; 205 KRB5SignedPath sp; 206 size_t size = 0; 207 208 ret = decode_KRB5SignedPath(data.data, data.length, &sp, NULL); 209 krb5_data_free(&data); 210 if (ret) 211 return ret; 212 213 spd.client = cp; 214 spd.authtime = tkt->authtime; 215 spd.delegated = sp.delegated; 216 spd.method_data = sp.method_data; 217 218 ASN1_MALLOC_ENCODE(KRB5SignedPathData, data.data, data.length, 219 &spd, &size, ret); 220 if (ret) { 221 free_KRB5SignedPath(&sp); 222 return ret; 223 } 224 if (data.length != size) 225 krb5_abortx(context, "internal asn.1 encoder error"); 226 227 { 228 Key *key; 229 ret = hdb_enctype2key(context, &krbtgt->entry, sp.etype, &key); 230 if (ret == 0) 231 ret = krb5_crypto_init(context, &key->key, 0, &crypto); 232 if (ret) { 233 free(data.data); 234 free_KRB5SignedPath(&sp); 235 return ret; 236 } 237 } 238 ret = krb5_verify_checksum(context, crypto, KRB5_KU_KRB5SIGNEDPATH, 239 data.data, data.length, 240 &sp.cksum); 241 krb5_crypto_destroy(context, crypto); 242 free(data.data); 243 if (ret) { 244 free_KRB5SignedPath(&sp); 245 kdc_log(context, config, 5, 246 "KRB5SignedPath not signed correctly, not marking as signed"); 247 return 0; 248 } 249 250 if (delegated && sp.delegated) { 251 252 *delegated = malloc(sizeof(*sp.delegated)); 253 if (*delegated == NULL) { 254 free_KRB5SignedPath(&sp); 255 return ENOMEM; 256 } 257 258 ret = copy_Principals(*delegated, sp.delegated); 259 if (ret) { 260 free_KRB5SignedPath(&sp); 261 free(*delegated); 262 *delegated = NULL; 263 return ret; 264 } 265 } 266 free_KRB5SignedPath(&sp); 267 268 *signedpath = 1; 269 } 270 271 return 0; 272 } 273 274 /* 275 * 276 */ 277 278 static krb5_error_code 279 check_PAC(krb5_context context, 280 krb5_kdc_configuration *config, 281 const krb5_principal client_principal, 282 const krb5_principal delegated_proxy_principal, 283 hdb_entry_ex *client, 284 hdb_entry_ex *server, 285 hdb_entry_ex *krbtgt, 286 const EncryptionKey *server_check_key, 287 const EncryptionKey *krbtgt_check_key, 288 const EncryptionKey *server_sign_key, 289 const EncryptionKey *krbtgt_sign_key, 290 EncTicketPart *tkt, 291 krb5_data *rspac, 292 int *signedpath) 293 { 294 AuthorizationData *ad = tkt->authorization_data; 295 unsigned i, j; 296 krb5_error_code ret; 297 298 if (ad == NULL || ad->len == 0) 299 return 0; 300 301 for (i = 0; i < ad->len; i++) { 302 AuthorizationData child; 303 304 if (ad->val[i].ad_type != KRB5_AUTHDATA_IF_RELEVANT) 305 continue; 306 307 ret = decode_AuthorizationData(ad->val[i].ad_data.data, 308 ad->val[i].ad_data.length, 309 &child, 310 NULL); 311 if (ret) { 312 krb5_set_error_message(context, ret, "Failed to decode " 313 "IF_RELEVANT with %d", ret); 314 return ret; 315 } 316 for (j = 0; j < child.len; j++) { 317 318 if (child.val[j].ad_type == KRB5_AUTHDATA_WIN2K_PAC) { 319 int signed_pac = 0; 320 krb5_pac pac; 321 322 /* Found PAC */ 323 ret = krb5_pac_parse(context, 324 child.val[j].ad_data.data, 325 child.val[j].ad_data.length, 326 &pac); 327 free_AuthorizationData(&child); 328 if (ret) 329 return ret; 330 331 ret = krb5_pac_verify(context, pac, tkt->authtime, 332 client_principal, 333 server_check_key, krbtgt_check_key); 334 if (ret) { 335 krb5_pac_free(context, pac); 336 return ret; 337 } 338 339 ret = _kdc_pac_verify(context, client_principal, 340 delegated_proxy_principal, 341 client, server, krbtgt, &pac, &signed_pac); 342 if (ret) { 343 krb5_pac_free(context, pac); 344 return ret; 345 } 346 347 /* 348 * Only re-sign PAC if we could verify it with the PAC 349 * function. The no-verify case happens when we get in 350 * a PAC from cross realm from a Windows domain and 351 * that there is no PAC verification function. 352 */ 353 if (signed_pac) { 354 *signedpath = 1; 355 ret = _krb5_pac_sign(context, pac, tkt->authtime, 356 client_principal, 357 server_sign_key, krbtgt_sign_key, rspac); 358 } 359 krb5_pac_free(context, pac); 360 361 return ret; 362 } 363 } 364 free_AuthorizationData(&child); 365 } 366 return 0; 367 } 368 369 /* 370 * 371 */ 372 373 static krb5_error_code 374 check_tgs_flags(krb5_context context, 375 krb5_kdc_configuration *config, 376 KDC_REQ_BODY *b, const EncTicketPart *tgt, EncTicketPart *et) 377 { 378 KDCOptions f = b->kdc_options; 379 380 if(f.validate){ 381 if(!tgt->flags.invalid || tgt->starttime == NULL){ 382 kdc_log(context, config, 0, 383 "Bad request to validate ticket"); 384 return KRB5KDC_ERR_BADOPTION; 385 } 386 if(*tgt->starttime > kdc_time){ 387 kdc_log(context, config, 0, 388 "Early request to validate ticket"); 389 return KRB5KRB_AP_ERR_TKT_NYV; 390 } 391 /* XXX tkt = tgt */ 392 et->flags.invalid = 0; 393 }else if(tgt->flags.invalid){ 394 kdc_log(context, config, 0, 395 "Ticket-granting ticket has INVALID flag set"); 396 return KRB5KRB_AP_ERR_TKT_INVALID; 397 } 398 399 if(f.forwardable){ 400 if(!tgt->flags.forwardable){ 401 kdc_log(context, config, 0, 402 "Bad request for forwardable ticket"); 403 return KRB5KDC_ERR_BADOPTION; 404 } 405 et->flags.forwardable = 1; 406 } 407 if(f.forwarded){ 408 if(!tgt->flags.forwardable){ 409 kdc_log(context, config, 0, 410 "Request to forward non-forwardable ticket"); 411 return KRB5KDC_ERR_BADOPTION; 412 } 413 et->flags.forwarded = 1; 414 et->caddr = b->addresses; 415 } 416 if(tgt->flags.forwarded) 417 et->flags.forwarded = 1; 418 419 if(f.proxiable){ 420 if(!tgt->flags.proxiable){ 421 kdc_log(context, config, 0, 422 "Bad request for proxiable ticket"); 423 return KRB5KDC_ERR_BADOPTION; 424 } 425 et->flags.proxiable = 1; 426 } 427 if(f.proxy){ 428 if(!tgt->flags.proxiable){ 429 kdc_log(context, config, 0, 430 "Request to proxy non-proxiable ticket"); 431 return KRB5KDC_ERR_BADOPTION; 432 } 433 et->flags.proxy = 1; 434 et->caddr = b->addresses; 435 } 436 if(tgt->flags.proxy) 437 et->flags.proxy = 1; 438 439 if(f.allow_postdate){ 440 if(!tgt->flags.may_postdate){ 441 kdc_log(context, config, 0, 442 "Bad request for post-datable ticket"); 443 return KRB5KDC_ERR_BADOPTION; 444 } 445 et->flags.may_postdate = 1; 446 } 447 if(f.postdated){ 448 if(!tgt->flags.may_postdate){ 449 kdc_log(context, config, 0, 450 "Bad request for postdated ticket"); 451 return KRB5KDC_ERR_BADOPTION; 452 } 453 if(b->from) 454 *et->starttime = *b->from; 455 et->flags.postdated = 1; 456 et->flags.invalid = 1; 457 }else if(b->from && *b->from > kdc_time + context->max_skew){ 458 kdc_log(context, config, 0, "Ticket cannot be postdated"); 459 return KRB5KDC_ERR_CANNOT_POSTDATE; 460 } 461 462 if(f.renewable){ 463 if(!tgt->flags.renewable || tgt->renew_till == NULL){ 464 kdc_log(context, config, 0, 465 "Bad request for renewable ticket"); 466 return KRB5KDC_ERR_BADOPTION; 467 } 468 et->flags.renewable = 1; 469 ALLOC(et->renew_till); 470 _kdc_fix_time(&b->rtime); 471 *et->renew_till = *b->rtime; 472 } 473 if(f.renew){ 474 time_t old_life; 475 if(!tgt->flags.renewable || tgt->renew_till == NULL){ 476 kdc_log(context, config, 0, 477 "Request to renew non-renewable ticket"); 478 return KRB5KDC_ERR_BADOPTION; 479 } 480 old_life = tgt->endtime; 481 if(tgt->starttime) 482 old_life -= *tgt->starttime; 483 else 484 old_life -= tgt->authtime; 485 et->endtime = *et->starttime + old_life; 486 if (et->renew_till != NULL) 487 et->endtime = min(*et->renew_till, et->endtime); 488 } 489 490 #if 0 491 /* checks for excess flags */ 492 if(f.request_anonymous && !config->allow_anonymous){ 493 kdc_log(context, config, 0, 494 "Request for anonymous ticket"); 495 return KRB5KDC_ERR_BADOPTION; 496 } 497 #endif 498 return 0; 499 } 500 501 /* 502 * Determine if constrained delegation is allowed from this client to this server 503 */ 504 505 static krb5_error_code 506 check_constrained_delegation(krb5_context context, 507 krb5_kdc_configuration *config, 508 HDB *clientdb, 509 hdb_entry_ex *client, 510 hdb_entry_ex *server, 511 krb5_const_principal target) 512 { 513 const HDB_Ext_Constrained_delegation_acl *acl; 514 krb5_error_code ret; 515 size_t i; 516 517 /* 518 * constrained_delegation (S4U2Proxy) only works within 519 * the same realm. We use the already canonicalized version 520 * of the principals here, while "target" is the principal 521 * provided by the client. 522 */ 523 if(!krb5_realm_compare(context, client->entry.principal, server->entry.principal)) { 524 ret = KRB5KDC_ERR_BADOPTION; 525 kdc_log(context, config, 0, 526 "Bad request for constrained delegation"); 527 return ret; 528 } 529 530 if (clientdb->hdb_check_constrained_delegation) { 531 ret = clientdb->hdb_check_constrained_delegation(context, clientdb, client, target); 532 if (ret == 0) 533 return 0; 534 } else { 535 /* if client delegates to itself, that ok */ 536 if (krb5_principal_compare(context, client->entry.principal, server->entry.principal) == TRUE) 537 return 0; 538 539 ret = hdb_entry_get_ConstrainedDelegACL(&client->entry, &acl); 540 if (ret) { 541 krb5_clear_error_message(context); 542 return ret; 543 } 544 545 if (acl) { 546 for (i = 0; i < acl->len; i++) { 547 if (krb5_principal_compare(context, target, &acl->val[i]) == TRUE) 548 return 0; 549 } 550 } 551 ret = KRB5KDC_ERR_BADOPTION; 552 } 553 kdc_log(context, config, 0, 554 "Bad request for constrained delegation"); 555 return ret; 556 } 557 558 /* 559 * Determine if s4u2self is allowed from this client to this server 560 * 561 * For example, regardless of the principal being impersonated, if the 562 * 'client' and 'server' are the same, then it's safe. 563 */ 564 565 static krb5_error_code 566 check_s4u2self(krb5_context context, 567 krb5_kdc_configuration *config, 568 HDB *clientdb, 569 hdb_entry_ex *client, 570 krb5_const_principal server) 571 { 572 krb5_error_code ret; 573 574 /* if client does a s4u2self to itself, that ok */ 575 if (krb5_principal_compare(context, client->entry.principal, server) == TRUE) 576 return 0; 577 578 if (clientdb->hdb_check_s4u2self) { 579 ret = clientdb->hdb_check_s4u2self(context, clientdb, client, server); 580 if (ret == 0) 581 return 0; 582 } else { 583 ret = KRB5KDC_ERR_BADOPTION; 584 } 585 return ret; 586 } 587 588 /* 589 * 590 */ 591 592 static krb5_error_code 593 verify_flags (krb5_context context, 594 krb5_kdc_configuration *config, 595 const EncTicketPart *et, 596 const char *pstr) 597 { 598 if(et->endtime < kdc_time){ 599 kdc_log(context, config, 0, "Ticket expired (%s)", pstr); 600 return KRB5KRB_AP_ERR_TKT_EXPIRED; 601 } 602 if(et->flags.invalid){ 603 kdc_log(context, config, 0, "Ticket not valid (%s)", pstr); 604 return KRB5KRB_AP_ERR_TKT_NYV; 605 } 606 return 0; 607 } 608 609 /* 610 * 611 */ 612 613 static krb5_error_code 614 fix_transited_encoding(krb5_context context, 615 krb5_kdc_configuration *config, 616 krb5_boolean check_policy, 617 const TransitedEncoding *tr, 618 EncTicketPart *et, 619 const char *client_realm, 620 const char *server_realm, 621 const char *tgt_realm) 622 { 623 krb5_error_code ret = 0; 624 char **realms, **tmp; 625 unsigned int num_realms; 626 size_t i; 627 628 switch (tr->tr_type) { 629 case DOMAIN_X500_COMPRESS: 630 break; 631 case 0: 632 /* 633 * Allow empty content of type 0 because that is was Microsoft 634 * generates in their TGT. 635 */ 636 if (tr->contents.length == 0) 637 break; 638 kdc_log(context, config, 0, 639 "Transited type 0 with non empty content"); 640 return KRB5KDC_ERR_TRTYPE_NOSUPP; 641 default: 642 kdc_log(context, config, 0, 643 "Unknown transited type: %u", tr->tr_type); 644 return KRB5KDC_ERR_TRTYPE_NOSUPP; 645 } 646 647 ret = krb5_domain_x500_decode(context, 648 tr->contents, 649 &realms, 650 &num_realms, 651 client_realm, 652 server_realm); 653 if(ret){ 654 krb5_warn(context, ret, 655 "Decoding transited encoding"); 656 return ret; 657 } 658 if(strcmp(client_realm, tgt_realm) && strcmp(server_realm, tgt_realm)) { 659 /* not us, so add the previous realm to transited set */ 660 if (num_realms + 1 > UINT_MAX/sizeof(*realms)) { 661 ret = ERANGE; 662 goto free_realms; 663 } 664 tmp = realloc(realms, (num_realms + 1) * sizeof(*realms)); 665 if(tmp == NULL){ 666 ret = ENOMEM; 667 goto free_realms; 668 } 669 realms = tmp; 670 realms[num_realms] = strdup(tgt_realm); 671 if(realms[num_realms] == NULL){ 672 ret = ENOMEM; 673 goto free_realms; 674 } 675 num_realms++; 676 } 677 if(num_realms == 0) { 678 if(strcmp(client_realm, server_realm)) 679 kdc_log(context, config, 0, 680 "cross-realm %s -> %s", client_realm, server_realm); 681 } else { 682 size_t l = 0; 683 char *rs; 684 for(i = 0; i < num_realms; i++) 685 l += strlen(realms[i]) + 2; 686 rs = malloc(l); 687 if(rs != NULL) { 688 *rs = '\0'; 689 for(i = 0; i < num_realms; i++) { 690 if(i > 0) 691 strlcat(rs, ", ", l); 692 strlcat(rs, realms[i], l); 693 } 694 kdc_log(context, config, 0, 695 "cross-realm %s -> %s via [%s]", 696 client_realm, server_realm, rs); 697 free(rs); 698 } 699 } 700 if(check_policy) { 701 ret = krb5_check_transited(context, client_realm, 702 server_realm, 703 realms, num_realms, NULL); 704 if(ret) { 705 krb5_warn(context, ret, "cross-realm %s -> %s", 706 client_realm, server_realm); 707 goto free_realms; 708 } 709 et->flags.transited_policy_checked = 1; 710 } 711 et->transited.tr_type = DOMAIN_X500_COMPRESS; 712 ret = krb5_domain_x500_encode(realms, num_realms, &et->transited.contents); 713 if(ret) 714 krb5_warn(context, ret, "Encoding transited encoding"); 715 free_realms: 716 for(i = 0; i < num_realms; i++) 717 free(realms[i]); 718 free(realms); 719 return ret; 720 } 721 722 723 static krb5_error_code 724 tgs_make_reply(krb5_context context, 725 krb5_kdc_configuration *config, 726 KDC_REQ_BODY *b, 727 krb5_const_principal tgt_name, 728 const EncTicketPart *tgt, 729 const krb5_keyblock *replykey, 730 int rk_is_subkey, 731 const EncryptionKey *serverkey, 732 const krb5_keyblock *sessionkey, 733 krb5_kvno kvno, 734 AuthorizationData *auth_data, 735 hdb_entry_ex *server, 736 krb5_principal server_principal, 737 const char *server_name, 738 hdb_entry_ex *client, 739 krb5_principal client_principal, 740 hdb_entry_ex *krbtgt, 741 krb5_enctype krbtgt_etype, 742 krb5_principals spp, 743 const krb5_data *rspac, 744 const METHOD_DATA *enc_pa_data, 745 const char **e_text, 746 krb5_data *reply) 747 { 748 KDC_REP rep; 749 EncKDCRepPart ek; 750 EncTicketPart et; 751 KDCOptions f = b->kdc_options; 752 krb5_error_code ret; 753 int is_weak = 0; 754 755 memset(&rep, 0, sizeof(rep)); 756 memset(&et, 0, sizeof(et)); 757 memset(&ek, 0, sizeof(ek)); 758 759 rep.pvno = 5; 760 rep.msg_type = krb_tgs_rep; 761 762 et.authtime = tgt->authtime; 763 _kdc_fix_time(&b->till); 764 et.endtime = min(tgt->endtime, *b->till); 765 ALLOC(et.starttime); 766 *et.starttime = kdc_time; 767 768 ret = check_tgs_flags(context, config, b, tgt, &et); 769 if(ret) 770 goto out; 771 772 /* We should check the transited encoding if: 773 1) the request doesn't ask not to be checked 774 2) globally enforcing a check 775 3) principal requires checking 776 4) we allow non-check per-principal, but principal isn't marked as allowing this 777 5) we don't globally allow this 778 */ 779 780 #define GLOBAL_FORCE_TRANSITED_CHECK \ 781 (config->trpolicy == TRPOLICY_ALWAYS_CHECK) 782 #define GLOBAL_ALLOW_PER_PRINCIPAL \ 783 (config->trpolicy == TRPOLICY_ALLOW_PER_PRINCIPAL) 784 #define GLOBAL_ALLOW_DISABLE_TRANSITED_CHECK \ 785 (config->trpolicy == TRPOLICY_ALWAYS_HONOUR_REQUEST) 786 787 /* these will consult the database in future release */ 788 #define PRINCIPAL_FORCE_TRANSITED_CHECK(P) 0 789 #define PRINCIPAL_ALLOW_DISABLE_TRANSITED_CHECK(P) 0 790 791 ret = fix_transited_encoding(context, config, 792 !f.disable_transited_check || 793 GLOBAL_FORCE_TRANSITED_CHECK || 794 PRINCIPAL_FORCE_TRANSITED_CHECK(server) || 795 !((GLOBAL_ALLOW_PER_PRINCIPAL && 796 PRINCIPAL_ALLOW_DISABLE_TRANSITED_CHECK(server)) || 797 GLOBAL_ALLOW_DISABLE_TRANSITED_CHECK), 798 &tgt->transited, &et, 799 krb5_principal_get_realm(context, client_principal), 800 krb5_principal_get_realm(context, server->entry.principal), 801 krb5_principal_get_realm(context, krbtgt->entry.principal)); 802 if(ret) 803 goto out; 804 805 copy_Realm(&server_principal->realm, &rep.ticket.realm); 806 _krb5_principal2principalname(&rep.ticket.sname, server_principal); 807 copy_Realm(&tgt_name->realm, &rep.crealm); 808 /* 809 if (f.request_anonymous) 810 _kdc_make_anonymous_principalname (&rep.cname); 811 else */ 812 813 copy_PrincipalName(&tgt_name->name, &rep.cname); 814 rep.ticket.tkt_vno = 5; 815 816 ek.caddr = et.caddr; 817 if(et.caddr == NULL) 818 et.caddr = tgt->caddr; 819 820 { 821 time_t life; 822 life = et.endtime - *et.starttime; 823 if(client && client->entry.max_life) 824 life = min(life, *client->entry.max_life); 825 if(server->entry.max_life) 826 life = min(life, *server->entry.max_life); 827 et.endtime = *et.starttime + life; 828 } 829 if(f.renewable_ok && tgt->flags.renewable && 830 et.renew_till == NULL && et.endtime < *b->till && 831 tgt->renew_till != NULL) 832 { 833 et.flags.renewable = 1; 834 ALLOC(et.renew_till); 835 *et.renew_till = *b->till; 836 } 837 if(et.renew_till){ 838 time_t renew; 839 renew = *et.renew_till - et.authtime; 840 if(client && client->entry.max_renew) 841 renew = min(renew, *client->entry.max_renew); 842 if(server->entry.max_renew) 843 renew = min(renew, *server->entry.max_renew); 844 *et.renew_till = et.authtime + renew; 845 } 846 847 if(et.renew_till){ 848 *et.renew_till = min(*et.renew_till, *tgt->renew_till); 849 *et.starttime = min(*et.starttime, *et.renew_till); 850 et.endtime = min(et.endtime, *et.renew_till); 851 } 852 853 *et.starttime = min(*et.starttime, et.endtime); 854 855 if(*et.starttime == et.endtime){ 856 ret = KRB5KDC_ERR_NEVER_VALID; 857 goto out; 858 } 859 if(et.renew_till && et.endtime == *et.renew_till){ 860 free(et.renew_till); 861 et.renew_till = NULL; 862 et.flags.renewable = 0; 863 } 864 865 et.flags.pre_authent = tgt->flags.pre_authent; 866 et.flags.hw_authent = tgt->flags.hw_authent; 867 et.flags.anonymous = tgt->flags.anonymous; 868 et.flags.ok_as_delegate = server->entry.flags.ok_as_delegate; 869 870 if(rspac->length) { 871 /* 872 * No not need to filter out the any PAC from the 873 * auth_data since it's signed by the KDC. 874 */ 875 ret = _kdc_tkt_add_if_relevant_ad(context, &et, 876 KRB5_AUTHDATA_WIN2K_PAC, rspac); 877 if (ret) 878 goto out; 879 } 880 881 if (auth_data) { 882 unsigned int i = 0; 883 884 /* XXX check authdata */ 885 886 if (et.authorization_data == NULL) { 887 et.authorization_data = calloc(1, sizeof(*et.authorization_data)); 888 if (et.authorization_data == NULL) { 889 ret = ENOMEM; 890 krb5_set_error_message(context, ret, "malloc: out of memory"); 891 goto out; 892 } 893 } 894 for(i = 0; i < auth_data->len ; i++) { 895 ret = add_AuthorizationData(et.authorization_data, &auth_data->val[i]); 896 if (ret) { 897 krb5_set_error_message(context, ret, "malloc: out of memory"); 898 goto out; 899 } 900 } 901 902 /* Filter out type KRB5SignedPath */ 903 ret = find_KRB5SignedPath(context, et.authorization_data, NULL); 904 if (ret == 0) { 905 if (et.authorization_data->len == 1) { 906 free_AuthorizationData(et.authorization_data); 907 free(et.authorization_data); 908 et.authorization_data = NULL; 909 } else { 910 AuthorizationData *ad = et.authorization_data; 911 free_AuthorizationDataElement(&ad->val[ad->len - 1]); 912 ad->len--; 913 } 914 } 915 } 916 917 ret = krb5_copy_keyblock_contents(context, sessionkey, &et.key); 918 if (ret) 919 goto out; 920 et.crealm = tgt_name->realm; 921 et.cname = tgt_name->name; 922 923 ek.key = et.key; 924 /* MIT must have at least one last_req */ 925 ek.last_req.len = 1; 926 ek.last_req.val = calloc(1, sizeof(*ek.last_req.val)); 927 if (ek.last_req.val == NULL) { 928 ret = ENOMEM; 929 goto out; 930 } 931 ek.nonce = b->nonce; 932 ek.flags = et.flags; 933 ek.authtime = et.authtime; 934 ek.starttime = et.starttime; 935 ek.endtime = et.endtime; 936 ek.renew_till = et.renew_till; 937 ek.srealm = rep.ticket.realm; 938 ek.sname = rep.ticket.sname; 939 940 _kdc_log_timestamp(context, config, "TGS-REQ", et.authtime, et.starttime, 941 et.endtime, et.renew_till); 942 943 /* Don't sign cross realm tickets, they can't be checked anyway */ 944 { 945 char *r = get_krbtgt_realm(&ek.sname); 946 947 if (r == NULL || strcmp(r, ek.srealm) == 0) { 948 ret = _kdc_add_KRB5SignedPath(context, 949 config, 950 krbtgt, 951 krbtgt_etype, 952 client_principal, 953 NULL, 954 spp, 955 &et); 956 if (ret) 957 goto out; 958 } 959 } 960 961 if (enc_pa_data->len) { 962 rep.padata = calloc(1, sizeof(*rep.padata)); 963 if (rep.padata == NULL) { 964 ret = ENOMEM; 965 goto out; 966 } 967 ret = copy_METHOD_DATA(enc_pa_data, rep.padata); 968 if (ret) 969 goto out; 970 } 971 972 if (krb5_enctype_valid(context, et.key.keytype) != 0 973 && _kdc_is_weak_exception(server->entry.principal, et.key.keytype)) 974 { 975 krb5_enctype_enable(context, et.key.keytype); 976 is_weak = 1; 977 } 978 979 980 /* It is somewhat unclear where the etype in the following 981 encryption should come from. What we have is a session 982 key in the passed tgt, and a list of preferred etypes 983 *for the new ticket*. Should we pick the best possible 984 etype, given the keytype in the tgt, or should we look 985 at the etype list here as well? What if the tgt 986 session key is DES3 and we want a ticket with a (say) 987 CAST session key. Should the DES3 etype be added to the 988 etype list, even if we don't want a session key with 989 DES3? */ 990 ret = _kdc_encode_reply(context, config, 991 &rep, &et, &ek, et.key.keytype, 992 kvno, 993 serverkey, 0, replykey, rk_is_subkey, 994 e_text, reply); 995 if (is_weak) 996 krb5_enctype_disable(context, et.key.keytype); 997 998 out: 999 free_TGS_REP(&rep); 1000 free_TransitedEncoding(&et.transited); 1001 if(et.starttime) 1002 free(et.starttime); 1003 if(et.renew_till) 1004 free(et.renew_till); 1005 if(et.authorization_data) { 1006 free_AuthorizationData(et.authorization_data); 1007 free(et.authorization_data); 1008 } 1009 free_LastReq(&ek.last_req); 1010 memset(et.key.keyvalue.data, 0, et.key.keyvalue.length); 1011 free_EncryptionKey(&et.key); 1012 return ret; 1013 } 1014 1015 static krb5_error_code 1016 tgs_check_authenticator(krb5_context context, 1017 krb5_kdc_configuration *config, 1018 krb5_auth_context ac, 1019 KDC_REQ_BODY *b, 1020 const char **e_text, 1021 krb5_keyblock *key) 1022 { 1023 krb5_authenticator auth; 1024 size_t len = 0; 1025 unsigned char *buf; 1026 size_t buf_size; 1027 krb5_error_code ret; 1028 krb5_crypto crypto; 1029 1030 krb5_auth_con_getauthenticator(context, ac, &auth); 1031 if(auth->cksum == NULL){ 1032 kdc_log(context, config, 0, "No authenticator in request"); 1033 ret = KRB5KRB_AP_ERR_INAPP_CKSUM; 1034 goto out; 1035 } 1036 /* 1037 * according to RFC1510 it doesn't need to be keyed, 1038 * but according to the latest draft it needs to. 1039 */ 1040 if ( 1041 #if 0 1042 !krb5_checksum_is_keyed(context, auth->cksum->cksumtype) 1043 || 1044 #endif 1045 !krb5_checksum_is_collision_proof(context, auth->cksum->cksumtype)) { 1046 kdc_log(context, config, 0, "Bad checksum type in authenticator: %d", 1047 auth->cksum->cksumtype); 1048 ret = KRB5KRB_AP_ERR_INAPP_CKSUM; 1049 goto out; 1050 } 1051 1052 /* XXX should not re-encode this */ 1053 ASN1_MALLOC_ENCODE(KDC_REQ_BODY, buf, buf_size, b, &len, ret); 1054 if(ret){ 1055 const char *msg = krb5_get_error_message(context, ret); 1056 kdc_log(context, config, 0, "Failed to encode KDC-REQ-BODY: %s", msg); 1057 krb5_free_error_message(context, msg); 1058 goto out; 1059 } 1060 if(buf_size != len) { 1061 free(buf); 1062 kdc_log(context, config, 0, "Internal error in ASN.1 encoder"); 1063 *e_text = "KDC internal error"; 1064 ret = KRB5KRB_ERR_GENERIC; 1065 goto out; 1066 } 1067 ret = krb5_crypto_init(context, key, 0, &crypto); 1068 if (ret) { 1069 const char *msg = krb5_get_error_message(context, ret); 1070 free(buf); 1071 kdc_log(context, config, 0, "krb5_crypto_init failed: %s", msg); 1072 krb5_free_error_message(context, msg); 1073 goto out; 1074 } 1075 ret = krb5_verify_checksum(context, 1076 crypto, 1077 KRB5_KU_TGS_REQ_AUTH_CKSUM, 1078 buf, 1079 len, 1080 auth->cksum); 1081 free(buf); 1082 krb5_crypto_destroy(context, crypto); 1083 if(ret){ 1084 const char *msg = krb5_get_error_message(context, ret); 1085 kdc_log(context, config, 0, 1086 "Failed to verify authenticator checksum: %s", msg); 1087 krb5_free_error_message(context, msg); 1088 } 1089 out: 1090 free_Authenticator(auth); 1091 free(auth); 1092 return ret; 1093 } 1094 1095 /* 1096 * 1097 */ 1098 1099 static const char * 1100 find_rpath(krb5_context context, Realm crealm, Realm srealm) 1101 { 1102 const char *new_realm = krb5_config_get_string(context, 1103 NULL, 1104 "capaths", 1105 crealm, 1106 srealm, 1107 NULL); 1108 return new_realm; 1109 } 1110 1111 1112 static krb5_boolean 1113 need_referral(krb5_context context, krb5_kdc_configuration *config, 1114 const KDCOptions * const options, krb5_principal server, 1115 krb5_realm **realms) 1116 { 1117 const char *name; 1118 1119 if(!options->canonicalize && server->name.name_type != KRB5_NT_SRV_INST) 1120 return FALSE; 1121 1122 if (server->name.name_string.len == 1) 1123 name = server->name.name_string.val[0]; 1124 else if (server->name.name_string.len > 1) 1125 name = server->name.name_string.val[1]; 1126 else 1127 return FALSE; 1128 1129 kdc_log(context, config, 0, "Searching referral for %s", name); 1130 1131 return _krb5_get_host_realm_int(context, name, FALSE, realms) == 0; 1132 } 1133 1134 static krb5_error_code 1135 tgs_parse_request(krb5_context context, 1136 krb5_kdc_configuration *config, 1137 KDC_REQ_BODY *b, 1138 const PA_DATA *tgs_req, 1139 hdb_entry_ex **krbtgt, 1140 krb5_enctype *krbtgt_etype, 1141 krb5_ticket **ticket, 1142 const char **e_text, 1143 const char *from, 1144 const struct sockaddr *from_addr, 1145 time_t **csec, 1146 int **cusec, 1147 AuthorizationData **auth_data, 1148 krb5_keyblock **replykey, 1149 int *rk_is_subkey) 1150 { 1151 static char failed[] = "<unparse_name failed>"; 1152 krb5_ap_req ap_req; 1153 krb5_error_code ret; 1154 krb5_principal princ; 1155 krb5_auth_context ac = NULL; 1156 krb5_flags ap_req_options; 1157 krb5_flags verify_ap_req_flags; 1158 krb5_crypto crypto; 1159 Key *tkey; 1160 krb5_keyblock *subkey = NULL; 1161 unsigned usage; 1162 1163 *auth_data = NULL; 1164 *csec = NULL; 1165 *cusec = NULL; 1166 *replykey = NULL; 1167 1168 memset(&ap_req, 0, sizeof(ap_req)); 1169 ret = krb5_decode_ap_req(context, &tgs_req->padata_value, &ap_req); 1170 if(ret){ 1171 const char *msg = krb5_get_error_message(context, ret); 1172 kdc_log(context, config, 0, "Failed to decode AP-REQ: %s", msg); 1173 krb5_free_error_message(context, msg); 1174 goto out; 1175 } 1176 1177 if(!get_krbtgt_realm(&ap_req.ticket.sname)){ 1178 /* XXX check for ticket.sname == req.sname */ 1179 kdc_log(context, config, 0, "PA-DATA is not a ticket-granting ticket"); 1180 ret = KRB5KDC_ERR_POLICY; /* ? */ 1181 goto out; 1182 } 1183 1184 _krb5_principalname2krb5_principal(context, 1185 &princ, 1186 ap_req.ticket.sname, 1187 ap_req.ticket.realm); 1188 1189 ret = _kdc_db_fetch(context, config, princ, HDB_F_GET_KRBTGT, ap_req.ticket.enc_part.kvno, NULL, krbtgt); 1190 1191 if(ret == HDB_ERR_NOT_FOUND_HERE) { 1192 char *p; 1193 ret = krb5_unparse_name(context, princ, &p); 1194 if (ret != 0) 1195 p = failed; 1196 krb5_free_principal(context, princ); 1197 kdc_log(context, config, 5, "Ticket-granting ticket account %s does not have secrets at this KDC, need to proxy", p); 1198 if (ret == 0) 1199 free(p); 1200 ret = HDB_ERR_NOT_FOUND_HERE; 1201 goto out; 1202 } else if(ret){ 1203 const char *msg = krb5_get_error_message(context, ret); 1204 char *p; 1205 ret = krb5_unparse_name(context, princ, &p); 1206 if (ret != 0) 1207 p = failed; 1208 krb5_free_principal(context, princ); 1209 kdc_log(context, config, 0, 1210 "Ticket-granting ticket not found in database: %s", msg); 1211 krb5_free_error_message(context, msg); 1212 if (ret == 0) 1213 free(p); 1214 ret = KRB5KRB_AP_ERR_NOT_US; 1215 goto out; 1216 } 1217 1218 if(ap_req.ticket.enc_part.kvno && 1219 *ap_req.ticket.enc_part.kvno != (*krbtgt)->entry.kvno){ 1220 char *p; 1221 1222 ret = krb5_unparse_name (context, princ, &p); 1223 krb5_free_principal(context, princ); 1224 if (ret != 0) 1225 p = failed; 1226 kdc_log(context, config, 0, 1227 "Ticket kvno = %d, DB kvno = %d (%s)", 1228 *ap_req.ticket.enc_part.kvno, 1229 (*krbtgt)->entry.kvno, 1230 p); 1231 if (ret == 0) 1232 free (p); 1233 ret = KRB5KRB_AP_ERR_BADKEYVER; 1234 goto out; 1235 } 1236 1237 *krbtgt_etype = ap_req.ticket.enc_part.etype; 1238 1239 ret = hdb_enctype2key(context, &(*krbtgt)->entry, 1240 ap_req.ticket.enc_part.etype, &tkey); 1241 if(ret){ 1242 char *str = NULL, *p = NULL; 1243 1244 krb5_enctype_to_string(context, ap_req.ticket.enc_part.etype, &str); 1245 krb5_unparse_name(context, princ, &p); 1246 kdc_log(context, config, 0, 1247 "No server key with enctype %s found for %s", 1248 str ? str : "<unknown enctype>", 1249 p ? p : "<unparse_name failed>"); 1250 free(str); 1251 free(p); 1252 ret = KRB5KRB_AP_ERR_BADKEYVER; 1253 goto out; 1254 } 1255 1256 if (b->kdc_options.validate) 1257 verify_ap_req_flags = KRB5_VERIFY_AP_REQ_IGNORE_INVALID; 1258 else 1259 verify_ap_req_flags = 0; 1260 1261 ret = krb5_verify_ap_req2(context, 1262 &ac, 1263 &ap_req, 1264 princ, 1265 &tkey->key, 1266 verify_ap_req_flags, 1267 &ap_req_options, 1268 ticket, 1269 KRB5_KU_TGS_REQ_AUTH); 1270 1271 krb5_free_principal(context, princ); 1272 if(ret) { 1273 const char *msg = krb5_get_error_message(context, ret); 1274 kdc_log(context, config, 0, "Failed to verify AP-REQ: %s", msg); 1275 krb5_free_error_message(context, msg); 1276 goto out; 1277 } 1278 1279 { 1280 krb5_authenticator auth; 1281 1282 ret = krb5_auth_con_getauthenticator(context, ac, &auth); 1283 if (ret == 0) { 1284 *csec = malloc(sizeof(**csec)); 1285 if (*csec == NULL) { 1286 krb5_free_authenticator(context, &auth); 1287 kdc_log(context, config, 0, "malloc failed"); 1288 goto out; 1289 } 1290 **csec = auth->ctime; 1291 *cusec = malloc(sizeof(**cusec)); 1292 if (*cusec == NULL) { 1293 krb5_free_authenticator(context, &auth); 1294 kdc_log(context, config, 0, "malloc failed"); 1295 goto out; 1296 } 1297 **cusec = auth->cusec; 1298 krb5_free_authenticator(context, &auth); 1299 } 1300 } 1301 1302 ret = tgs_check_authenticator(context, config, 1303 ac, b, e_text, &(*ticket)->ticket.key); 1304 if (ret) { 1305 krb5_auth_con_free(context, ac); 1306 goto out; 1307 } 1308 1309 usage = KRB5_KU_TGS_REQ_AUTH_DAT_SUBKEY; 1310 *rk_is_subkey = 1; 1311 1312 ret = krb5_auth_con_getremotesubkey(context, ac, &subkey); 1313 if(ret){ 1314 const char *msg = krb5_get_error_message(context, ret); 1315 krb5_auth_con_free(context, ac); 1316 kdc_log(context, config, 0, "Failed to get remote subkey: %s", msg); 1317 krb5_free_error_message(context, msg); 1318 goto out; 1319 } 1320 if(subkey == NULL){ 1321 usage = KRB5_KU_TGS_REQ_AUTH_DAT_SESSION; 1322 *rk_is_subkey = 0; 1323 1324 ret = krb5_auth_con_getkey(context, ac, &subkey); 1325 if(ret) { 1326 const char *msg = krb5_get_error_message(context, ret); 1327 krb5_auth_con_free(context, ac); 1328 kdc_log(context, config, 0, "Failed to get session key: %s", msg); 1329 krb5_free_error_message(context, msg); 1330 goto out; 1331 } 1332 } 1333 if(subkey == NULL){ 1334 krb5_auth_con_free(context, ac); 1335 kdc_log(context, config, 0, 1336 "Failed to get key for enc-authorization-data"); 1337 ret = KRB5KRB_AP_ERR_BAD_INTEGRITY; /* ? */ 1338 goto out; 1339 } 1340 1341 *replykey = subkey; 1342 1343 if (b->enc_authorization_data) { 1344 krb5_data ad; 1345 1346 ret = krb5_crypto_init(context, subkey, 0, &crypto); 1347 if (ret) { 1348 const char *msg = krb5_get_error_message(context, ret); 1349 krb5_auth_con_free(context, ac); 1350 kdc_log(context, config, 0, "krb5_crypto_init failed: %s", msg); 1351 krb5_free_error_message(context, msg); 1352 goto out; 1353 } 1354 ret = krb5_decrypt_EncryptedData (context, 1355 crypto, 1356 usage, 1357 b->enc_authorization_data, 1358 &ad); 1359 krb5_crypto_destroy(context, crypto); 1360 if(ret){ 1361 krb5_auth_con_free(context, ac); 1362 kdc_log(context, config, 0, 1363 "Failed to decrypt enc-authorization-data"); 1364 ret = KRB5KRB_AP_ERR_BAD_INTEGRITY; /* ? */ 1365 goto out; 1366 } 1367 ALLOC(*auth_data); 1368 if (*auth_data == NULL) { 1369 krb5_auth_con_free(context, ac); 1370 ret = KRB5KRB_AP_ERR_BAD_INTEGRITY; /* ? */ 1371 goto out; 1372 } 1373 ret = decode_AuthorizationData(ad.data, ad.length, *auth_data, NULL); 1374 if(ret){ 1375 krb5_auth_con_free(context, ac); 1376 free(*auth_data); 1377 *auth_data = NULL; 1378 kdc_log(context, config, 0, "Failed to decode authorization data"); 1379 ret = KRB5KRB_AP_ERR_BAD_INTEGRITY; /* ? */ 1380 goto out; 1381 } 1382 } 1383 1384 krb5_auth_con_free(context, ac); 1385 1386 out: 1387 free_AP_REQ(&ap_req); 1388 1389 return ret; 1390 } 1391 1392 static krb5_error_code 1393 build_server_referral(krb5_context context, 1394 krb5_kdc_configuration *config, 1395 krb5_crypto session, 1396 krb5_const_realm referred_realm, 1397 const PrincipalName *true_principal_name, 1398 const PrincipalName *requested_principal, 1399 krb5_data *outdata) 1400 { 1401 PA_ServerReferralData ref; 1402 krb5_error_code ret; 1403 EncryptedData ed; 1404 krb5_data data; 1405 size_t size = 0; 1406 1407 memset(&ref, 0, sizeof(ref)); 1408 1409 if (referred_realm) { 1410 ALLOC(ref.referred_realm); 1411 if (ref.referred_realm == NULL) 1412 goto eout; 1413 *ref.referred_realm = strdup(referred_realm); 1414 if (*ref.referred_realm == NULL) 1415 goto eout; 1416 } 1417 if (true_principal_name) { 1418 ALLOC(ref.true_principal_name); 1419 if (ref.true_principal_name == NULL) 1420 goto eout; 1421 ret = copy_PrincipalName(true_principal_name, ref.true_principal_name); 1422 if (ret) 1423 goto eout; 1424 } 1425 if (requested_principal) { 1426 ALLOC(ref.requested_principal_name); 1427 if (ref.requested_principal_name == NULL) 1428 goto eout; 1429 ret = copy_PrincipalName(requested_principal, 1430 ref.requested_principal_name); 1431 if (ret) 1432 goto eout; 1433 } 1434 1435 ASN1_MALLOC_ENCODE(PA_ServerReferralData, 1436 data.data, data.length, 1437 &ref, &size, ret); 1438 free_PA_ServerReferralData(&ref); 1439 if (ret) 1440 return ret; 1441 if (data.length != size) 1442 krb5_abortx(context, "internal asn.1 encoder error"); 1443 1444 ret = krb5_encrypt_EncryptedData(context, session, 1445 KRB5_KU_PA_SERVER_REFERRAL, 1446 data.data, data.length, 1447 0 /* kvno */, &ed); 1448 free(data.data); 1449 if (ret) 1450 return ret; 1451 1452 ASN1_MALLOC_ENCODE(EncryptedData, 1453 outdata->data, outdata->length, 1454 &ed, &size, ret); 1455 free_EncryptedData(&ed); 1456 if (ret) 1457 return ret; 1458 if (outdata->length != size) 1459 krb5_abortx(context, "internal asn.1 encoder error"); 1460 1461 return 0; 1462 eout: 1463 free_PA_ServerReferralData(&ref); 1464 krb5_set_error_message(context, ENOMEM, "malloc: out of memory"); 1465 return ENOMEM; 1466 } 1467 1468 static krb5_error_code 1469 tgs_build_reply(krb5_context context, 1470 krb5_kdc_configuration *config, 1471 KDC_REQ *req, 1472 KDC_REQ_BODY *b, 1473 hdb_entry_ex *krbtgt, 1474 krb5_enctype krbtgt_etype, 1475 const krb5_keyblock *replykey, 1476 int rk_is_subkey, 1477 krb5_ticket *ticket, 1478 krb5_data *reply, 1479 const char *from, 1480 const char **e_text, 1481 AuthorizationData **auth_data, 1482 const struct sockaddr *from_addr) 1483 { 1484 krb5_error_code ret; 1485 krb5_principal cp = NULL, sp = NULL, rsp = NULL, tp = NULL, dp = NULL; 1486 krb5_principal krbtgt_principal = NULL; 1487 char *spn = NULL, *cpn = NULL, *tpn = NULL, *dpn = NULL; 1488 hdb_entry_ex *server = NULL, *client = NULL, *s4u2self_impersonated_client = NULL; 1489 HDB *clientdb, *s4u2self_impersonated_clientdb; 1490 krb5_realm ref_realm = NULL; 1491 EncTicketPart *tgt = &ticket->ticket; 1492 krb5_principals spp = NULL; 1493 const EncryptionKey *ekey; 1494 krb5_keyblock sessionkey; 1495 krb5_kvno kvno; 1496 krb5_data rspac; 1497 1498 hdb_entry_ex *krbtgt_out = NULL; 1499 1500 METHOD_DATA enc_pa_data; 1501 1502 PrincipalName *s; 1503 Realm r; 1504 int nloop = 0; 1505 EncTicketPart adtkt; 1506 char opt_str[128]; 1507 int signedpath = 0; 1508 1509 Key *tkey_check; 1510 Key *tkey_sign; 1511 int flags = HDB_F_FOR_TGS_REQ; 1512 1513 memset(&sessionkey, 0, sizeof(sessionkey)); 1514 memset(&adtkt, 0, sizeof(adtkt)); 1515 krb5_data_zero(&rspac); 1516 memset(&enc_pa_data, 0, sizeof(enc_pa_data)); 1517 1518 s = b->sname; 1519 r = b->realm; 1520 1521 /* 1522 * Always to do CANON, see comment below about returned server principal (rsp). 1523 */ 1524 flags |= HDB_F_CANON; 1525 1526 if(b->kdc_options.enc_tkt_in_skey){ 1527 Ticket *t; 1528 hdb_entry_ex *uu; 1529 krb5_principal p; 1530 Key *uukey; 1531 1532 if(b->additional_tickets == NULL || 1533 b->additional_tickets->len == 0){ 1534 ret = KRB5KDC_ERR_BADOPTION; /* ? */ 1535 kdc_log(context, config, 0, 1536 "No second ticket present in request"); 1537 goto out; 1538 } 1539 t = &b->additional_tickets->val[0]; 1540 if(!get_krbtgt_realm(&t->sname)){ 1541 kdc_log(context, config, 0, 1542 "Additional ticket is not a ticket-granting ticket"); 1543 ret = KRB5KDC_ERR_POLICY; 1544 goto out; 1545 } 1546 _krb5_principalname2krb5_principal(context, &p, t->sname, t->realm); 1547 ret = _kdc_db_fetch(context, config, p, 1548 HDB_F_GET_KRBTGT, t->enc_part.kvno, 1549 NULL, &uu); 1550 krb5_free_principal(context, p); 1551 if(ret){ 1552 if (ret == HDB_ERR_NOENTRY) 1553 ret = KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN; 1554 goto out; 1555 } 1556 ret = hdb_enctype2key(context, &uu->entry, 1557 t->enc_part.etype, &uukey); 1558 if(ret){ 1559 _kdc_free_ent(context, uu); 1560 ret = KRB5KDC_ERR_ETYPE_NOSUPP; /* XXX */ 1561 goto out; 1562 } 1563 ret = krb5_decrypt_ticket(context, t, &uukey->key, &adtkt, 0); 1564 _kdc_free_ent(context, uu); 1565 if(ret) 1566 goto out; 1567 1568 ret = verify_flags(context, config, &adtkt, spn); 1569 if (ret) 1570 goto out; 1571 1572 s = &adtkt.cname; 1573 r = adtkt.crealm; 1574 } 1575 1576 _krb5_principalname2krb5_principal(context, &sp, *s, r); 1577 ret = krb5_unparse_name(context, sp, &spn); 1578 if (ret) 1579 goto out; 1580 _krb5_principalname2krb5_principal(context, &cp, tgt->cname, tgt->crealm); 1581 ret = krb5_unparse_name(context, cp, &cpn); 1582 if (ret) 1583 goto out; 1584 unparse_flags (KDCOptions2int(b->kdc_options), 1585 asn1_KDCOptions_units(), 1586 opt_str, sizeof(opt_str)); 1587 if(*opt_str) 1588 kdc_log(context, config, 0, 1589 "TGS-REQ %s from %s for %s [%s]", 1590 cpn, from, spn, opt_str); 1591 else 1592 kdc_log(context, config, 0, 1593 "TGS-REQ %s from %s for %s", cpn, from, spn); 1594 1595 /* 1596 * Fetch server 1597 */ 1598 1599 server_lookup: 1600 ret = _kdc_db_fetch(context, config, sp, HDB_F_GET_SERVER | flags, 1601 NULL, NULL, &server); 1602 1603 if(ret == HDB_ERR_NOT_FOUND_HERE) { 1604 kdc_log(context, config, 5, "target %s does not have secrets at this KDC, need to proxy", sp); 1605 goto out; 1606 } else if(ret){ 1607 const char *new_rlm, *msg; 1608 Realm req_rlm; 1609 krb5_realm *realms; 1610 1611 if ((req_rlm = get_krbtgt_realm(&sp->name)) != NULL) { 1612 if(nloop++ < 2) { 1613 new_rlm = find_rpath(context, tgt->crealm, req_rlm); 1614 if(new_rlm) { 1615 kdc_log(context, config, 5, "krbtgt for realm %s " 1616 "not found, trying %s", 1617 req_rlm, new_rlm); 1618 krb5_free_principal(context, sp); 1619 free(spn); 1620 krb5_make_principal(context, &sp, r, 1621 KRB5_TGS_NAME, new_rlm, NULL); 1622 ret = krb5_unparse_name(context, sp, &spn); 1623 if (ret) 1624 goto out; 1625 1626 if (ref_realm) 1627 free(ref_realm); 1628 ref_realm = strdup(new_rlm); 1629 goto server_lookup; 1630 } 1631 } 1632 } else if(need_referral(context, config, &b->kdc_options, sp, &realms)) { 1633 if (strcmp(realms[0], sp->realm) != 0) { 1634 kdc_log(context, config, 5, 1635 "Returning a referral to realm %s for " 1636 "server %s that was not found", 1637 realms[0], spn); 1638 krb5_free_principal(context, sp); 1639 free(spn); 1640 krb5_make_principal(context, &sp, r, KRB5_TGS_NAME, 1641 realms[0], NULL); 1642 ret = krb5_unparse_name(context, sp, &spn); 1643 if (ret) 1644 goto out; 1645 1646 if (ref_realm) 1647 free(ref_realm); 1648 ref_realm = strdup(realms[0]); 1649 1650 krb5_free_host_realm(context, realms); 1651 goto server_lookup; 1652 } 1653 krb5_free_host_realm(context, realms); 1654 } 1655 msg = krb5_get_error_message(context, ret); 1656 kdc_log(context, config, 0, 1657 "Server not found in database: %s: %s", spn, msg); 1658 krb5_free_error_message(context, msg); 1659 if (ret == HDB_ERR_NOENTRY) 1660 ret = KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN; 1661 goto out; 1662 } 1663 1664 /* the name returned to the client depend on what was asked for, 1665 * return canonical name if kdc_options.canonicalize was set, the 1666 * client wants the true name of the principal, if not it just 1667 * wants the name its asked for. 1668 */ 1669 1670 if (b->kdc_options.canonicalize) 1671 rsp = server->entry.principal; 1672 else 1673 rsp = sp; 1674 1675 1676 /* 1677 * Select enctype, return key and kvno. 1678 */ 1679 1680 { 1681 krb5_enctype etype; 1682 1683 if(b->kdc_options.enc_tkt_in_skey) { 1684 size_t i; 1685 ekey = &adtkt.key; 1686 for(i = 0; i < b->etype.len; i++) 1687 if (b->etype.val[i] == adtkt.key.keytype) 1688 break; 1689 if(i == b->etype.len) { 1690 kdc_log(context, config, 0, 1691 "Addition ticket have not matching etypes"); 1692 krb5_clear_error_message(context); 1693 ret = KRB5KDC_ERR_ETYPE_NOSUPP; 1694 goto out; 1695 } 1696 etype = b->etype.val[i]; 1697 kvno = 0; 1698 } else { 1699 Key *skey; 1700 1701 ret = _kdc_find_etype(context, 1702 krb5_principal_is_krbtgt(context, sp) ? 1703 config->tgt_use_strongest_session_key : 1704 config->svc_use_strongest_session_key, FALSE, 1705 server, b->etype.val, b->etype.len, NULL, 1706 &skey); 1707 if(ret) { 1708 kdc_log(context, config, 0, 1709 "Server (%s) has no support for etypes", spn); 1710 goto out; 1711 } 1712 ekey = &skey->key; 1713 etype = skey->key.keytype; 1714 kvno = server->entry.kvno; 1715 } 1716 1717 ret = krb5_generate_random_keyblock(context, etype, &sessionkey); 1718 if (ret) 1719 goto out; 1720 } 1721 1722 /* 1723 * Check that service is in the same realm as the krbtgt. If it's 1724 * not the same, it's someone that is using a uni-directional trust 1725 * backward. 1726 */ 1727 1728 /* 1729 * Validate authoriation data 1730 */ 1731 1732 ret = hdb_enctype2key(context, &krbtgt->entry, 1733 krbtgt_etype, &tkey_check); 1734 if(ret) { 1735 kdc_log(context, config, 0, 1736 "Failed to find key for krbtgt PAC check"); 1737 goto out; 1738 } 1739 1740 /* Now refetch the primary krbtgt, and get the current kvno (the 1741 * sign check may have been on an old kvno, and the server may 1742 * have been an incoming trust) */ 1743 ret = krb5_make_principal(context, &krbtgt_principal, 1744 krb5_principal_get_comp_string(context, 1745 krbtgt->entry.principal, 1746 1), 1747 KRB5_TGS_NAME, 1748 krb5_principal_get_comp_string(context, 1749 krbtgt->entry.principal, 1750 1), NULL); 1751 if(ret) { 1752 kdc_log(context, config, 0, 1753 "Failed to generate krbtgt principal"); 1754 goto out; 1755 } 1756 1757 ret = _kdc_db_fetch(context, config, krbtgt_principal, HDB_F_GET_KRBTGT, NULL, NULL, &krbtgt_out); 1758 krb5_free_principal(context, krbtgt_principal); 1759 if (ret) { 1760 krb5_error_code ret2; 1761 char *ktpn, *ktpn2; 1762 ret = krb5_unparse_name(context, krbtgt->entry.principal, &ktpn); 1763 ret2 = krb5_unparse_name(context, krbtgt_principal, &ktpn2); 1764 kdc_log(context, config, 0, 1765 "Request with wrong krbtgt: %s, %s not found in our database", 1766 (ret == 0) ? ktpn : "<unknown>", (ret2 == 0) ? ktpn2 : "<unknown>"); 1767 if(ret == 0) 1768 free(ktpn); 1769 if(ret2 == 0) 1770 free(ktpn2); 1771 ret = KRB5KRB_AP_ERR_NOT_US; 1772 goto out; 1773 } 1774 1775 /* The first realm is the realm of the service, the second is 1776 * krbtgt/<this>/@REALM component of the krbtgt DN the request was 1777 * encrypted to. The redirection via the krbtgt_out entry allows 1778 * the DB to possibly correct the case of the realm (Samba4 does 1779 * this) before the strcmp() */ 1780 if (strcmp(krb5_principal_get_realm(context, server->entry.principal), 1781 krb5_principal_get_realm(context, krbtgt_out->entry.principal)) != 0) { 1782 char *ktpn; 1783 ret = krb5_unparse_name(context, krbtgt_out->entry.principal, &ktpn); 1784 kdc_log(context, config, 0, 1785 "Request with wrong krbtgt: %s", 1786 (ret == 0) ? ktpn : "<unknown>"); 1787 if(ret == 0) 1788 free(ktpn); 1789 ret = KRB5KRB_AP_ERR_NOT_US; 1790 } 1791 1792 ret = hdb_enctype2key(context, &krbtgt_out->entry, 1793 krbtgt_etype, &tkey_sign); 1794 if(ret) { 1795 kdc_log(context, config, 0, 1796 "Failed to find key for krbtgt PAC signature"); 1797 goto out; 1798 } 1799 1800 ret = _kdc_db_fetch(context, config, cp, HDB_F_GET_CLIENT | flags, 1801 NULL, &clientdb, &client); 1802 if(ret == HDB_ERR_NOT_FOUND_HERE) { 1803 /* This is OK, we are just trying to find out if they have 1804 * been disabled or deleted in the meantime, missing secrets 1805 * is OK */ 1806 } else if(ret){ 1807 const char *krbtgt_realm, *msg; 1808 1809 /* 1810 * If the client belongs to the same realm as our krbtgt, it 1811 * should exist in the local database. 1812 * 1813 */ 1814 1815 krbtgt_realm = krb5_principal_get_realm(context, krbtgt_out->entry.principal); 1816 1817 if(strcmp(krb5_principal_get_realm(context, cp), krbtgt_realm) == 0) { 1818 if (ret == HDB_ERR_NOENTRY) 1819 ret = KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN; 1820 kdc_log(context, config, 1, "Client no longer in database: %s", 1821 cpn); 1822 goto out; 1823 } 1824 1825 msg = krb5_get_error_message(context, ret); 1826 kdc_log(context, config, 1, "Client not found in database: %s", msg); 1827 krb5_free_error_message(context, msg); 1828 } 1829 1830 ret = check_PAC(context, config, cp, NULL, 1831 client, server, krbtgt, 1832 &tkey_check->key, &tkey_check->key, 1833 ekey, &tkey_sign->key, 1834 tgt, &rspac, &signedpath); 1835 if (ret) { 1836 const char *msg = krb5_get_error_message(context, ret); 1837 kdc_log(context, config, 0, 1838 "Verify PAC failed for %s (%s) from %s with %s", 1839 spn, cpn, from, msg); 1840 krb5_free_error_message(context, msg); 1841 goto out; 1842 } 1843 1844 /* also check the krbtgt for signature */ 1845 ret = check_KRB5SignedPath(context, 1846 config, 1847 krbtgt, 1848 cp, 1849 tgt, 1850 &spp, 1851 &signedpath); 1852 if (ret) { 1853 const char *msg = krb5_get_error_message(context, ret); 1854 kdc_log(context, config, 0, 1855 "KRB5SignedPath check failed for %s (%s) from %s with %s", 1856 spn, cpn, from, msg); 1857 krb5_free_error_message(context, msg); 1858 goto out; 1859 } 1860 1861 /* 1862 * Process request 1863 */ 1864 1865 /* by default the tgt principal matches the client principal */ 1866 tp = cp; 1867 tpn = cpn; 1868 1869 if (client) { 1870 const PA_DATA *sdata; 1871 int i = 0; 1872 1873 sdata = _kdc_find_padata(req, &i, KRB5_PADATA_FOR_USER); 1874 if (sdata) { 1875 krb5_crypto crypto; 1876 krb5_data datack; 1877 PA_S4U2Self self; 1878 const char *str; 1879 1880 ret = decode_PA_S4U2Self(sdata->padata_value.data, 1881 sdata->padata_value.length, 1882 &self, NULL); 1883 if (ret) { 1884 kdc_log(context, config, 0, "Failed to decode PA-S4U2Self"); 1885 goto out; 1886 } 1887 1888 ret = _krb5_s4u2self_to_checksumdata(context, &self, &datack); 1889 if (ret) 1890 goto out; 1891 1892 ret = krb5_crypto_init(context, &tgt->key, 0, &crypto); 1893 if (ret) { 1894 const char *msg = krb5_get_error_message(context, ret); 1895 free_PA_S4U2Self(&self); 1896 krb5_data_free(&datack); 1897 kdc_log(context, config, 0, "krb5_crypto_init failed: %s", msg); 1898 krb5_free_error_message(context, msg); 1899 goto out; 1900 } 1901 1902 ret = krb5_verify_checksum(context, 1903 crypto, 1904 KRB5_KU_OTHER_CKSUM, 1905 datack.data, 1906 datack.length, 1907 &self.cksum); 1908 krb5_data_free(&datack); 1909 krb5_crypto_destroy(context, crypto); 1910 if (ret) { 1911 const char *msg = krb5_get_error_message(context, ret); 1912 free_PA_S4U2Self(&self); 1913 kdc_log(context, config, 0, 1914 "krb5_verify_checksum failed for S4U2Self: %s", msg); 1915 krb5_free_error_message(context, msg); 1916 goto out; 1917 } 1918 1919 ret = _krb5_principalname2krb5_principal(context, 1920 &tp, 1921 self.name, 1922 self.realm); 1923 free_PA_S4U2Self(&self); 1924 if (ret) 1925 goto out; 1926 1927 ret = krb5_unparse_name(context, tp, &tpn); 1928 if (ret) 1929 goto out; 1930 1931 /* If we were about to put a PAC into the ticket, we better fix it to be the right PAC */ 1932 if(rspac.data) { 1933 krb5_pac p = NULL; 1934 krb5_data_free(&rspac); 1935 ret = _kdc_db_fetch(context, config, tp, HDB_F_GET_CLIENT | flags, 1936 NULL, &s4u2self_impersonated_clientdb, &s4u2self_impersonated_client); 1937 if (ret) { 1938 const char *msg; 1939 1940 /* 1941 * If the client belongs to the same realm as our krbtgt, it 1942 * should exist in the local database. 1943 * 1944 */ 1945 1946 if (ret == HDB_ERR_NOENTRY) 1947 ret = KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN; 1948 msg = krb5_get_error_message(context, ret); 1949 kdc_log(context, config, 1, 1950 "S2U4Self principal to impersonate %s not found in database: %s", 1951 tpn, msg); 1952 krb5_free_error_message(context, msg); 1953 goto out; 1954 } 1955 ret = _kdc_pac_generate(context, s4u2self_impersonated_client, &p); 1956 if (ret) { 1957 kdc_log(context, config, 0, "PAC generation failed for -- %s", 1958 tpn); 1959 goto out; 1960 } 1961 if (p != NULL) { 1962 ret = _krb5_pac_sign(context, p, ticket->ticket.authtime, 1963 s4u2self_impersonated_client->entry.principal, 1964 ekey, &tkey_sign->key, 1965 &rspac); 1966 krb5_pac_free(context, p); 1967 if (ret) { 1968 kdc_log(context, config, 0, "PAC signing failed for -- %s", 1969 tpn); 1970 goto out; 1971 } 1972 } 1973 } 1974 1975 /* 1976 * Check that service doing the impersonating is 1977 * requesting a ticket to it-self. 1978 */ 1979 ret = check_s4u2self(context, config, clientdb, client, sp); 1980 if (ret) { 1981 kdc_log(context, config, 0, "S4U2Self: %s is not allowed " 1982 "to impersonate to service " 1983 "(tried for user %s to service %s)", 1984 cpn, tpn, spn); 1985 goto out; 1986 } 1987 1988 /* 1989 * If the service isn't trusted for authentication to 1990 * delegation, remove the forward flag. 1991 */ 1992 1993 if (client->entry.flags.trusted_for_delegation) { 1994 str = "[forwardable]"; 1995 } else { 1996 b->kdc_options.forwardable = 0; 1997 str = ""; 1998 } 1999 kdc_log(context, config, 0, "s4u2self %s impersonating %s to " 2000 "service %s %s", cpn, tpn, spn, str); 2001 } 2002 } 2003 2004 /* 2005 * Constrained delegation 2006 */ 2007 2008 if (client != NULL 2009 && b->additional_tickets != NULL 2010 && b->additional_tickets->len != 0 2011 && b->kdc_options.enc_tkt_in_skey == 0) 2012 { 2013 int ad_signedpath = 0; 2014 Key *clientkey; 2015 Ticket *t; 2016 2017 /* 2018 * Require that the KDC have issued the service's krbtgt (not 2019 * self-issued ticket with kimpersonate(1). 2020 */ 2021 if (!signedpath) { 2022 ret = KRB5KDC_ERR_BADOPTION; 2023 kdc_log(context, config, 0, 2024 "Constrained delegation done on service ticket %s/%s", 2025 cpn, spn); 2026 goto out; 2027 } 2028 2029 t = &b->additional_tickets->val[0]; 2030 2031 ret = hdb_enctype2key(context, &client->entry, 2032 t->enc_part.etype, &clientkey); 2033 if(ret){ 2034 ret = KRB5KDC_ERR_ETYPE_NOSUPP; /* XXX */ 2035 goto out; 2036 } 2037 2038 ret = krb5_decrypt_ticket(context, t, &clientkey->key, &adtkt, 0); 2039 if (ret) { 2040 kdc_log(context, config, 0, 2041 "failed to decrypt ticket for " 2042 "constrained delegation from %s to %s ", cpn, spn); 2043 goto out; 2044 } 2045 2046 ret = _krb5_principalname2krb5_principal(context, 2047 &tp, 2048 adtkt.cname, 2049 adtkt.crealm); 2050 if (ret) 2051 goto out; 2052 2053 ret = krb5_unparse_name(context, tp, &tpn); 2054 if (ret) 2055 goto out; 2056 2057 ret = _krb5_principalname2krb5_principal(context, 2058 &dp, 2059 t->sname, 2060 t->realm); 2061 if (ret) 2062 goto out; 2063 2064 ret = krb5_unparse_name(context, dp, &dpn); 2065 if (ret) 2066 goto out; 2067 2068 /* check that ticket is valid */ 2069 if (adtkt.flags.forwardable == 0) { 2070 kdc_log(context, config, 0, 2071 "Missing forwardable flag on ticket for " 2072 "constrained delegation from %s (%s) as %s to %s ", 2073 cpn, dpn, tpn, spn); 2074 ret = KRB5KDC_ERR_BADOPTION; 2075 goto out; 2076 } 2077 2078 ret = check_constrained_delegation(context, config, clientdb, 2079 client, server, sp); 2080 if (ret) { 2081 kdc_log(context, config, 0, 2082 "constrained delegation from %s (%s) as %s to %s not allowed", 2083 cpn, dpn, tpn, spn); 2084 goto out; 2085 } 2086 2087 ret = verify_flags(context, config, &adtkt, tpn); 2088 if (ret) { 2089 goto out; 2090 } 2091 2092 krb5_data_free(&rspac); 2093 2094 /* 2095 * generate the PAC for the user. 2096 * 2097 * TODO: pass in t->sname and t->realm and build 2098 * a S4U_DELEGATION_INFO blob to the PAC. 2099 */ 2100 ret = check_PAC(context, config, tp, dp, 2101 client, server, krbtgt, 2102 &clientkey->key, &tkey_check->key, 2103 ekey, &tkey_sign->key, 2104 &adtkt, &rspac, &ad_signedpath); 2105 if (ret) { 2106 const char *msg = krb5_get_error_message(context, ret); 2107 kdc_log(context, config, 0, 2108 "Verify delegated PAC failed to %s for client" 2109 "%s (%s) as %s from %s with %s", 2110 spn, cpn, dpn, tpn, from, msg); 2111 krb5_free_error_message(context, msg); 2112 goto out; 2113 } 2114 2115 /* 2116 * Check that the KDC issued the user's ticket. 2117 */ 2118 ret = check_KRB5SignedPath(context, 2119 config, 2120 krbtgt, 2121 cp, 2122 &adtkt, 2123 NULL, 2124 &ad_signedpath); 2125 if (ret) { 2126 const char *msg = krb5_get_error_message(context, ret); 2127 kdc_log(context, config, 0, 2128 "KRB5SignedPath check from service %s failed " 2129 "for delegation to %s for client %s (%s)" 2130 "from %s failed with %s", 2131 spn, tpn, dpn, cpn, from, msg); 2132 krb5_free_error_message(context, msg); 2133 goto out; 2134 } 2135 2136 if (!ad_signedpath) { 2137 ret = KRB5KDC_ERR_BADOPTION; 2138 kdc_log(context, config, 0, 2139 "Ticket not signed with PAC nor SignedPath service %s failed " 2140 "for delegation to %s for client %s (%s)" 2141 "from %s", 2142 spn, tpn, dpn, cpn, from); 2143 goto out; 2144 } 2145 2146 kdc_log(context, config, 0, "constrained delegation for %s " 2147 "from %s (%s) to %s", tpn, cpn, dpn, spn); 2148 } 2149 2150 /* 2151 * Check flags 2152 */ 2153 2154 ret = kdc_check_flags(context, config, 2155 client, cpn, 2156 server, spn, 2157 FALSE); 2158 if(ret) 2159 goto out; 2160 2161 if((b->kdc_options.validate || b->kdc_options.renew) && 2162 !krb5_principal_compare(context, 2163 krbtgt->entry.principal, 2164 server->entry.principal)){ 2165 kdc_log(context, config, 0, "Inconsistent request."); 2166 ret = KRB5KDC_ERR_SERVER_NOMATCH; 2167 goto out; 2168 } 2169 2170 /* check for valid set of addresses */ 2171 if(!_kdc_check_addresses(context, config, tgt->caddr, from_addr)) { 2172 ret = KRB5KRB_AP_ERR_BADADDR; 2173 kdc_log(context, config, 0, "Request from wrong address"); 2174 goto out; 2175 } 2176 2177 /* 2178 * If this is an referral, add server referral data to the 2179 * auth_data reply . 2180 */ 2181 if (ref_realm) { 2182 PA_DATA pa; 2183 krb5_crypto crypto; 2184 2185 kdc_log(context, config, 0, 2186 "Adding server referral to %s", ref_realm); 2187 2188 ret = krb5_crypto_init(context, &sessionkey, 0, &crypto); 2189 if (ret) 2190 goto out; 2191 2192 ret = build_server_referral(context, config, crypto, ref_realm, 2193 NULL, s, &pa.padata_value); 2194 krb5_crypto_destroy(context, crypto); 2195 if (ret) { 2196 kdc_log(context, config, 0, 2197 "Failed building server referral"); 2198 goto out; 2199 } 2200 pa.padata_type = KRB5_PADATA_SERVER_REFERRAL; 2201 2202 ret = add_METHOD_DATA(&enc_pa_data, &pa); 2203 krb5_data_free(&pa.padata_value); 2204 if (ret) { 2205 kdc_log(context, config, 0, 2206 "Add server referral METHOD-DATA failed"); 2207 goto out; 2208 } 2209 } 2210 2211 /* 2212 * 2213 */ 2214 2215 ret = tgs_make_reply(context, 2216 config, 2217 b, 2218 tp, 2219 tgt, 2220 replykey, 2221 rk_is_subkey, 2222 ekey, 2223 &sessionkey, 2224 kvno, 2225 *auth_data, 2226 server, 2227 rsp, 2228 spn, 2229 client, 2230 cp, 2231 krbtgt_out, 2232 krbtgt_etype, 2233 spp, 2234 &rspac, 2235 &enc_pa_data, 2236 e_text, 2237 reply); 2238 2239 out: 2240 if (tpn != cpn) 2241 free(tpn); 2242 free(spn); 2243 free(cpn); 2244 if (dpn) 2245 free(dpn); 2246 2247 krb5_data_free(&rspac); 2248 krb5_free_keyblock_contents(context, &sessionkey); 2249 if(krbtgt_out) 2250 _kdc_free_ent(context, krbtgt_out); 2251 if(server) 2252 _kdc_free_ent(context, server); 2253 if(client) 2254 _kdc_free_ent(context, client); 2255 if(s4u2self_impersonated_client) 2256 _kdc_free_ent(context, s4u2self_impersonated_client); 2257 2258 if (tp && tp != cp) 2259 krb5_free_principal(context, tp); 2260 if (cp) 2261 krb5_free_principal(context, cp); 2262 if (dp) 2263 krb5_free_principal(context, dp); 2264 if (sp) 2265 krb5_free_principal(context, sp); 2266 if (ref_realm) 2267 free(ref_realm); 2268 free_METHOD_DATA(&enc_pa_data); 2269 2270 free_EncTicketPart(&adtkt); 2271 2272 return ret; 2273 } 2274 2275 /* 2276 * 2277 */ 2278 2279 krb5_error_code 2280 _kdc_tgs_rep(krb5_context context, 2281 krb5_kdc_configuration *config, 2282 KDC_REQ *req, 2283 krb5_data *data, 2284 const char *from, 2285 struct sockaddr *from_addr, 2286 int datagram_reply) 2287 { 2288 AuthorizationData *auth_data = NULL; 2289 krb5_error_code ret; 2290 int i = 0; 2291 const PA_DATA *tgs_req; 2292 2293 hdb_entry_ex *krbtgt = NULL; 2294 krb5_ticket *ticket = NULL; 2295 const char *e_text = NULL; 2296 krb5_enctype krbtgt_etype = ETYPE_NULL; 2297 2298 krb5_keyblock *replykey = NULL; 2299 int rk_is_subkey = 0; 2300 time_t *csec = NULL; 2301 int *cusec = NULL; 2302 2303 if(req->padata == NULL){ 2304 ret = KRB5KDC_ERR_PREAUTH_REQUIRED; /* XXX ??? */ 2305 kdc_log(context, config, 0, 2306 "TGS-REQ from %s without PA-DATA", from); 2307 goto out; 2308 } 2309 2310 tgs_req = _kdc_find_padata(req, &i, KRB5_PADATA_TGS_REQ); 2311 2312 if(tgs_req == NULL){ 2313 ret = KRB5KDC_ERR_PADATA_TYPE_NOSUPP; 2314 2315 kdc_log(context, config, 0, 2316 "TGS-REQ from %s without PA-TGS-REQ", from); 2317 goto out; 2318 } 2319 ret = tgs_parse_request(context, config, 2320 &req->req_body, tgs_req, 2321 &krbtgt, 2322 &krbtgt_etype, 2323 &ticket, 2324 &e_text, 2325 from, from_addr, 2326 &csec, &cusec, 2327 &auth_data, 2328 &replykey, 2329 &rk_is_subkey); 2330 if (ret == HDB_ERR_NOT_FOUND_HERE) { 2331 /* kdc_log() is called in tgs_parse_request() */ 2332 goto out; 2333 } 2334 if (ret) { 2335 kdc_log(context, config, 0, 2336 "Failed parsing TGS-REQ from %s", from); 2337 goto out; 2338 } 2339 2340 ret = tgs_build_reply(context, 2341 config, 2342 req, 2343 &req->req_body, 2344 krbtgt, 2345 krbtgt_etype, 2346 replykey, 2347 rk_is_subkey, 2348 ticket, 2349 data, 2350 from, 2351 &e_text, 2352 &auth_data, 2353 from_addr); 2354 if (ret) { 2355 kdc_log(context, config, 0, 2356 "Failed building TGS-REP to %s", from); 2357 goto out; 2358 } 2359 2360 /* */ 2361 if (datagram_reply && data->length > config->max_datagram_reply_length) { 2362 krb5_data_free(data); 2363 ret = KRB5KRB_ERR_RESPONSE_TOO_BIG; 2364 e_text = "Reply packet too large"; 2365 } 2366 2367 out: 2368 if (replykey) 2369 krb5_free_keyblock(context, replykey); 2370 if(ret && ret != HDB_ERR_NOT_FOUND_HERE && data->data == NULL){ 2371 krb5_mk_error(context, 2372 ret, 2373 NULL, 2374 NULL, 2375 NULL, 2376 NULL, 2377 csec, 2378 cusec, 2379 data); 2380 ret = 0; 2381 } 2382 free(csec); 2383 free(cusec); 2384 if (ticket) 2385 krb5_free_ticket(context, ticket); 2386 if(krbtgt) 2387 _kdc_free_ent(context, krbtgt); 2388 2389 if (auth_data) { 2390 free_AuthorizationData(auth_data); 2391 free(auth_data); 2392 } 2393 2394 return ret; 2395 } 2396