xref: /titanic_44/usr/src/cmd/smbsrv/smbd/smbd_logon.c (revision b819cea2f73f98c5662230cc9affc8cc84f77fcf)
1da6c28aaSamw /*
2da6c28aaSamw  * CDDL HEADER START
3da6c28aaSamw  *
4da6c28aaSamw  * The contents of this file are subject to the terms of the
5da6c28aaSamw  * Common Development and Distribution License (the "License").
6da6c28aaSamw  * You may not use this file except in compliance with the License.
7da6c28aaSamw  *
8da6c28aaSamw  * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
9da6c28aaSamw  * or http://www.opensolaris.org/os/licensing.
10da6c28aaSamw  * See the License for the specific language governing permissions
11da6c28aaSamw  * and limitations under the License.
12da6c28aaSamw  *
13da6c28aaSamw  * When distributing Covered Code, include this CDDL HEADER in each
14da6c28aaSamw  * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
15da6c28aaSamw  * If applicable, add the following below this CDDL HEADER, with the
16da6c28aaSamw  * fields enclosed by brackets "[]" replaced with your own identifying
17da6c28aaSamw  * information: Portions Copyright [yyyy] [name of copyright owner]
18da6c28aaSamw  *
19da6c28aaSamw  * CDDL HEADER END
20da6c28aaSamw  */
21da6c28aaSamw /*
22c5866007SKeyur Desai  * Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
23da6c28aaSamw  */
24da6c28aaSamw 
25da6c28aaSamw #include <sys/types.h>
26da6c28aaSamw #include <errno.h>
27da6c28aaSamw #include <synch.h>
28da6c28aaSamw #include <stdio.h>
29da6c28aaSamw #include <stdlib.h>
30da6c28aaSamw #include <unistd.h>
31da6c28aaSamw #include <string.h>
32da6c28aaSamw #include <strings.h>
33da6c28aaSamw #include <syslog.h>
34da6c28aaSamw #include <fcntl.h>
35da6c28aaSamw #include <bsm/adt.h>
36da6c28aaSamw #include <bsm/adt_event.h>
37da6c28aaSamw #include <bsm/audit_uevents.h>
38c5866007SKeyur Desai #include <pwd.h>
39c5866007SKeyur Desai #include <nss_dbdefs.h>
40c5866007SKeyur Desai #include <sys/idmap.h>
41da6c28aaSamw #include "smbd.h"
42da6c28aaSamw 
43da6c28aaSamw 
44da6c28aaSamw /*
45da6c28aaSamw  * An audit session is established at user logon and terminated at user
46da6c28aaSamw  * logoff.
47da6c28aaSamw  *
48da6c28aaSamw  * SMB audit handles are allocated when users logon (SmbSessionSetupX)
49da6c28aaSamw  * and deallocted when a user logs off (SmbLogoffX).  Each time an SMB
50da6c28aaSamw  * audit handle is allocated it is added to a global list.
51da6c28aaSamw  */
52da6c28aaSamw typedef struct smb_audit {
53da6c28aaSamw 	struct smb_audit *sa_next;
54da6c28aaSamw 	adt_session_data_t *sa_handle;
55da6c28aaSamw 	uid_t sa_uid;
56da6c28aaSamw 	gid_t sa_gid;
57da6c28aaSamw 	uint32_t sa_audit_sid;
58da6c28aaSamw 	uint32_t sa_refcnt;
59da6c28aaSamw 	char *sa_domain;
60da6c28aaSamw 	char *sa_username;
61da6c28aaSamw } smb_audit_t;
62da6c28aaSamw 
63da6c28aaSamw static smb_audit_t *smbd_audit_list;
64da6c28aaSamw static mutex_t smbd_audit_lock;
65da6c28aaSamw 
66da6c28aaSamw /*
67da6c28aaSamw  * Unique identifier for audit sessions in the audit list.
68da6c28aaSamw  * Used to lookup an audit session on logoff.
69da6c28aaSamw  */
70da6c28aaSamw static uint32_t smbd_audit_sid;
71da6c28aaSamw 
72da6c28aaSamw static void smbd_audit_link(smb_audit_t *);
73da6c28aaSamw static smb_audit_t *smbd_audit_unlink(uint32_t);
74da6c28aaSamw 
75da6c28aaSamw 
76da6c28aaSamw /*
77da6c28aaSamw  * Invoked at user logon due to SmbSessionSetupX.  Authenticate the
78da6c28aaSamw  * user, start an audit session and audit the event.
79da6c28aaSamw  */
80da6c28aaSamw smb_token_t *
smbd_user_auth_logon(smb_logon_t * user_info)819fb67ea3Safshin salek ardakani - Sun Microsystems - Irvine United States smbd_user_auth_logon(smb_logon_t *user_info)
82da6c28aaSamw {
83da6c28aaSamw 	smb_token_t *token;
84da6c28aaSamw 	smb_audit_t *entry;
85da6c28aaSamw 	adt_session_data_t *ah;
86da6c28aaSamw 	adt_event_data_t *event;
87da6c28aaSamw 	au_tid_addr_t termid;
886537f381Sas200622 	char sidbuf[SMB_SID_STRSZ];
897f667e74Sjose borrego 	char *username;
907f667e74Sjose borrego 	char *domain;
91da6c28aaSamw 	uid_t uid;
92da6c28aaSamw 	gid_t gid;
93da6c28aaSamw 	char *sid;
94da6c28aaSamw 	int status;
95da6c28aaSamw 	int retval;
96da6c28aaSamw 
979fb67ea3Safshin salek ardakani - Sun Microsystems - Irvine United States 	if ((token = smb_logon(user_info)) == NULL) {
98da6c28aaSamw 		uid = ADT_NO_ATTRIB;
99da6c28aaSamw 		gid = ADT_NO_ATTRIB;
1006537f381Sas200622 		sid = NT_NULL_SIDSTR;
1019fb67ea3Safshin salek ardakani - Sun Microsystems - Irvine United States 		username = user_info->lg_e_username;
1029fb67ea3Safshin salek ardakani - Sun Microsystems - Irvine United States 		domain = user_info->lg_e_domain;
103da6c28aaSamw 		status = ADT_FAILURE;
104da6c28aaSamw 		retval = ADT_FAIL_VALUE_AUTH;
105da6c28aaSamw 	} else {
1067f667e74Sjose borrego 		uid = token->tkn_user.i_id;
1077f667e74Sjose borrego 		gid = token->tkn_primary_grp.i_id;
1087f667e74Sjose borrego 		smb_sid_tostr(token->tkn_user.i_sid, sidbuf);
1096537f381Sas200622 		sid = sidbuf;
1107f667e74Sjose borrego 		username = token->tkn_account_name;
1117f667e74Sjose borrego 		domain = token->tkn_domain_name;
112da6c28aaSamw 		status = ADT_SUCCESS;
113da6c28aaSamw 		retval = ADT_SUCCESS;
114da6c28aaSamw 	}
115da6c28aaSamw 
116da6c28aaSamw 	if (adt_start_session(&ah, NULL, 0)) {
117da6c28aaSamw 		syslog(LOG_AUTH | LOG_ALERT, "adt_start_session: %m");
118da6c28aaSamw 		smb_token_destroy(token);
119da6c28aaSamw 		return (NULL);
120da6c28aaSamw 	}
121da6c28aaSamw 
122da6c28aaSamw 	if ((event = adt_alloc_event(ah, ADT_smbd_session)) == NULL) {
123da6c28aaSamw 		syslog(LOG_AUTH | LOG_ALERT,
124da6c28aaSamw 		    "adt_alloc_event(ADT_smbd_session): %m");
125da6c28aaSamw 		(void) adt_end_session(ah);
126da6c28aaSamw 		smb_token_destroy(token);
127da6c28aaSamw 		return (NULL);
128da6c28aaSamw 	}
129da6c28aaSamw 
130da6c28aaSamw 	(void) memset(&termid, 0, sizeof (au_tid_addr_t));
1319fb67ea3Safshin salek ardakani - Sun Microsystems - Irvine United States 	termid.at_port = user_info->lg_local_port;
1327f667e74Sjose borrego 
1339fb67ea3Safshin salek ardakani - Sun Microsystems - Irvine United States 	if (user_info->lg_clnt_ipaddr.a_family == AF_INET) {
1349fb67ea3Safshin salek ardakani - Sun Microsystems - Irvine United States 		termid.at_addr[0] = user_info->lg_clnt_ipaddr.a_ipv4;
135da6c28aaSamw 		termid.at_type = AU_IPv4;
1367f667e74Sjose borrego 	} else {
1379fb67ea3Safshin salek ardakani - Sun Microsystems - Irvine United States 		bcopy(&user_info->lg_clnt_ipaddr.a_ip, termid.at_addr,
138*b819cea2SGordon Ross 		    sizeof (in6_addr_t));
1397f667e74Sjose borrego 		termid.at_type = AU_IPv6;
1407f667e74Sjose borrego 	}
141da6c28aaSamw 	adt_set_termid(ah, &termid);
142da6c28aaSamw 
143da6c28aaSamw 	if (adt_set_user(ah, uid, gid, uid, gid, NULL, ADT_NEW)) {
144da6c28aaSamw 		syslog(LOG_AUTH | LOG_ALERT, "adt_set_user: %m");
145da6c28aaSamw 		adt_free_event(event);
146da6c28aaSamw 		(void) adt_end_session(ah);
147da6c28aaSamw 		smb_token_destroy(token);
148da6c28aaSamw 		return (NULL);
149da6c28aaSamw 	}
150da6c28aaSamw 
1517f667e74Sjose borrego 	event->adt_smbd_session.domain = domain;
1527f667e74Sjose borrego 	event->adt_smbd_session.username = username;
153da6c28aaSamw 	event->adt_smbd_session.sid = sid;
154da6c28aaSamw 
155da6c28aaSamw 	if (adt_put_event(event, status, retval))
156da6c28aaSamw 		syslog(LOG_AUTH | LOG_ALERT, "adt_put_event: %m");
157da6c28aaSamw 
158da6c28aaSamw 	adt_free_event(event);
159da6c28aaSamw 
160da6c28aaSamw 	if (token) {
161da6c28aaSamw 		if ((entry = malloc(sizeof (smb_audit_t))) == NULL) {
162da6c28aaSamw 			syslog(LOG_ERR, "smbd_user_auth_logon: %m");
163da6c28aaSamw 			(void) adt_end_session(ah);
164da6c28aaSamw 			smb_token_destroy(token);
165da6c28aaSamw 			return (NULL);
166da6c28aaSamw 		}
167da6c28aaSamw 
168da6c28aaSamw 		entry->sa_handle = ah;
169da6c28aaSamw 		entry->sa_uid = uid;
170da6c28aaSamw 		entry->sa_gid = gid;
1717f667e74Sjose borrego 		entry->sa_username = strdup(username);
1727f667e74Sjose borrego 		entry->sa_domain = strdup(domain);
173da6c28aaSamw 
174fe1c642dSBill Krier 		smb_autohome_add(token);
175da6c28aaSamw 		smbd_audit_link(entry);
176da6c28aaSamw 		token->tkn_audit_sid = entry->sa_audit_sid;
177da6c28aaSamw 	}
178da6c28aaSamw 
179da6c28aaSamw 	return (token);
180da6c28aaSamw }
181da6c28aaSamw 
182da6c28aaSamw /*
183da6c28aaSamw  * Logon due to a subsequent SmbSessionSetupX on an existing session.
184da6c28aaSamw  * The user was authenticated during the initial session setup.
185da6c28aaSamw  */
186da6c28aaSamw void
smbd_user_nonauth_logon(uint32_t audit_sid)187da6c28aaSamw smbd_user_nonauth_logon(uint32_t audit_sid)
188da6c28aaSamw {
189da6c28aaSamw 	smb_audit_t *entry;
190da6c28aaSamw 
191da6c28aaSamw 	(void) mutex_lock(&smbd_audit_lock);
192da6c28aaSamw 	entry = smbd_audit_list;
193da6c28aaSamw 
194da6c28aaSamw 	while (entry) {
195da6c28aaSamw 		if (entry->sa_audit_sid == audit_sid) {
196da6c28aaSamw 			++entry->sa_refcnt;
197da6c28aaSamw 			break;
198da6c28aaSamw 		}
199da6c28aaSamw 
200da6c28aaSamw 		entry = entry->sa_next;
201da6c28aaSamw 	}
202da6c28aaSamw 
203da6c28aaSamw 	(void) mutex_unlock(&smbd_audit_lock);
204da6c28aaSamw }
205da6c28aaSamw 
206da6c28aaSamw /*
207da6c28aaSamw  * Invoked at user logoff due to SmbLogoffX.  If this is the final
208da6c28aaSamw  * logoff for this user on the session, audit the event and terminate
209da6c28aaSamw  * the audit session.
210da6c28aaSamw  */
211da6c28aaSamw void
smbd_user_auth_logoff(uint32_t audit_sid)212da6c28aaSamw smbd_user_auth_logoff(uint32_t audit_sid)
213da6c28aaSamw {
214da6c28aaSamw 	smb_audit_t *entry;
215da6c28aaSamw 	adt_session_data_t *ah;
216da6c28aaSamw 	adt_event_data_t *event;
217c5866007SKeyur Desai 	struct passwd pw;
218c5866007SKeyur Desai 	char buf[NSS_LINELEN_PASSWD];
219da6c28aaSamw 
220da6c28aaSamw 	if ((entry = smbd_audit_unlink(audit_sid)) == NULL)
221da6c28aaSamw 		return;
222da6c28aaSamw 
223c5866007SKeyur Desai 	if (IDMAP_ID_IS_EPHEMERAL(entry->sa_uid)) {
2243ad684d6Sjb150015 		smb_autohome_remove(entry->sa_username);
225c5866007SKeyur Desai 	} else {
226c5866007SKeyur Desai 		if (getpwuid_r(entry->sa_uid, &pw, buf, sizeof (buf)) == NULL)
227c5866007SKeyur Desai 			return;
228c5866007SKeyur Desai 
229c5866007SKeyur Desai 		smb_autohome_remove(pw.pw_name);
230c5866007SKeyur Desai 	}
231da6c28aaSamw 
232da6c28aaSamw 	ah = entry->sa_handle;
233da6c28aaSamw 
234da6c28aaSamw 	if ((event = adt_alloc_event(ah, ADT_smbd_logoff)) == NULL) {
235da6c28aaSamw 		syslog(LOG_AUTH | LOG_ALERT,
236da6c28aaSamw 		    "adt_alloc_event(ADT_smbd_logoff): %m");
237da6c28aaSamw 	} else {
238da6c28aaSamw 		event->adt_smbd_logoff.domain = entry->sa_domain;
239da6c28aaSamw 		event->adt_smbd_logoff.username = entry->sa_username;
240da6c28aaSamw 
241da6c28aaSamw 		if (adt_put_event(event, ADT_SUCCESS, ADT_SUCCESS))
242da6c28aaSamw 			syslog(LOG_AUTH | LOG_ALERT, "adt_put_event: %m");
243da6c28aaSamw 
244da6c28aaSamw 		adt_free_event(event);
245da6c28aaSamw 	}
246da6c28aaSamw 
247da6c28aaSamw 	(void) adt_end_session(ah);
248da6c28aaSamw 
249da6c28aaSamw 	free(entry->sa_username);
250da6c28aaSamw 	free(entry->sa_domain);
251da6c28aaSamw 	free(entry);
252da6c28aaSamw }
253da6c28aaSamw 
254da6c28aaSamw /*
255da6c28aaSamw  * Allocate an id and link an audit handle onto the global list.
256da6c28aaSamw  */
257da6c28aaSamw static void
smbd_audit_link(smb_audit_t * entry)258da6c28aaSamw smbd_audit_link(smb_audit_t *entry)
259da6c28aaSamw {
260da6c28aaSamw 	(void) mutex_lock(&smbd_audit_lock);
261da6c28aaSamw 
262da6c28aaSamw 	do {
263da6c28aaSamw 		++smbd_audit_sid;
264da6c28aaSamw 	} while ((smbd_audit_sid == 0) || (smbd_audit_sid == (uint32_t)-1));
265da6c28aaSamw 
266da6c28aaSamw 	entry->sa_audit_sid = smbd_audit_sid;
267da6c28aaSamw 	entry->sa_refcnt = 1;
268da6c28aaSamw 	entry->sa_next = smbd_audit_list;
269da6c28aaSamw 	smbd_audit_list = entry;
270da6c28aaSamw 
271da6c28aaSamw 	(void) mutex_unlock(&smbd_audit_lock);
272da6c28aaSamw }
273da6c28aaSamw 
274da6c28aaSamw /*
275da6c28aaSamw  * Unlink an audit handle.  If the reference count reaches 0, the entry
276da6c28aaSamw  * is removed from the list and returned.  Otherwise the entry remains
277da6c28aaSamw  * on the list and a null pointer is returned.
278da6c28aaSamw  */
279da6c28aaSamw static smb_audit_t *
smbd_audit_unlink(uint32_t audit_sid)280da6c28aaSamw smbd_audit_unlink(uint32_t audit_sid)
281da6c28aaSamw {
282da6c28aaSamw 	smb_audit_t *entry;
283da6c28aaSamw 	smb_audit_t **ppe;
284da6c28aaSamw 
285da6c28aaSamw 	(void) mutex_lock(&smbd_audit_lock);
286da6c28aaSamw 	ppe = &smbd_audit_list;
287da6c28aaSamw 
288da6c28aaSamw 	while (*ppe) {
289da6c28aaSamw 		entry = *ppe;
290da6c28aaSamw 
291da6c28aaSamw 		if (entry->sa_audit_sid == audit_sid) {
292da6c28aaSamw 			if (entry->sa_refcnt == 0)
293da6c28aaSamw 				break;
294da6c28aaSamw 
295da6c28aaSamw 			if ((--entry->sa_refcnt) != 0)
296da6c28aaSamw 				break;
297da6c28aaSamw 
298da6c28aaSamw 			*ppe = entry->sa_next;
299da6c28aaSamw 			(void) mutex_unlock(&smbd_audit_lock);
300da6c28aaSamw 			return (entry);
301da6c28aaSamw 		}
302da6c28aaSamw 
303da6c28aaSamw 		ppe = &(*ppe)->sa_next;
304da6c28aaSamw 	}
305da6c28aaSamw 
306da6c28aaSamw 	(void) mutex_unlock(&smbd_audit_lock);
307da6c28aaSamw 	return (NULL);
308da6c28aaSamw }
309