xref: /titanic_52/usr/src/lib/libsmbfs/smb/krb5ssp.c (revision 36e852a172cba914383d7341c988128b2c667fbd)
1 /*
2  * Copyright (c) 2000, Boris Popov
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *    This product includes software developed by Boris Popov.
16  * 4. Neither the name of the author nor the names of any co-contributors
17  *    may be used to endorse or promote products derived from this software
18  *    without specific prior written permission.
19  *
20  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30  * SUCH DAMAGE.
31  */
32 
33 /*
34  * Copyright 2009 Sun Microsystems, Inc.  All rights reserved.
35  * Use is subject to license terms.
36  */
37 
38 /*
39  * Kerberos V Security Support Provider
40  *
41  * Based on code previously in ctx.c (from Boris Popov?)
42  * but then mostly rewritten at Sun.
43  */
44 
45 #include <errno.h>
46 #include <stdio.h>
47 #include <stddef.h>
48 #include <stdlib.h>
49 #include <unistd.h>
50 #include <strings.h>
51 #include <netdb.h>
52 #include <libintl.h>
53 #include <xti.h>
54 #include <assert.h>
55 
56 #include <sys/types.h>
57 #include <sys/time.h>
58 #include <sys/byteorder.h>
59 #include <sys/socket.h>
60 #include <sys/fcntl.h>
61 
62 #include <netinet/in.h>
63 #include <netinet/tcp.h>
64 #include <arpa/inet.h>
65 
66 #include <netsmb/smb.h>
67 #include <netsmb/smb_lib.h>
68 #include <netsmb/mchain.h>
69 
70 #include "private.h"
71 #include "charsets.h"
72 #include "spnego.h"
73 #include "derparse.h"
74 #include "ssp.h"
75 
76 #include <kerberosv5/krb5.h>
77 #include <kerberosv5/com_err.h>
78 
79 /* RFC 1964 token ID codes */
80 #define	KRB_AP_REQ	1
81 #define	KRB_AP_REP	2
82 #define	KRB_ERROR	3
83 
84 extern MECH_OID g_stcMechOIDList [];
85 
86 typedef struct krb5ssp_state {
87 	/* Filled in by krb5ssp_init_client */
88 	krb5_context ss_krb5ctx;	/* krb5 context (ptr) */
89 	krb5_ccache ss_krb5cc; 		/* credentials cache (ptr) */
90 	krb5_principal ss_krb5clp;	/* client principal (ptr) */
91 	/* Filled in by krb5ssp_get_tkt */
92 	krb5_auth_context ss_auth;	/* auth ctx. w/ server (ptr) */
93 } krb5ssp_state_t;
94 
95 
96 /*
97  * adds a GSSAPI wrapper
98  */
99 int
100 krb5ssp_tkt2gtok(uchar_t *tkt, ulong_t tktlen,
101     uchar_t **gtokp, ulong_t *gtoklenp)
102 {
103 	ulong_t		len;
104 	ulong_t		bloblen = tktlen;
105 	uchar_t		krbapreq[2] = {	KRB_AP_REQ, 0 };
106 	uchar_t 	*blob = NULL;		/* result */
107 	uchar_t 	*b;
108 
109 	bloblen += sizeof (krbapreq);
110 	bloblen += g_stcMechOIDList[spnego_mech_oid_Kerberos_V5].iLen;
111 	len = bloblen;
112 	bloblen = ASNDerCalcTokenLength(bloblen, bloblen);
113 	if ((blob = malloc(bloblen)) == NULL) {
114 		DPRINT("malloc");
115 		return (ENOMEM);
116 	}
117 
118 	b = blob;
119 	b += ASNDerWriteToken(b, SPNEGO_NEGINIT_APP_CONSTRUCT, NULL, len);
120 	b += ASNDerWriteOID(b, spnego_mech_oid_Kerberos_V5);
121 	memcpy(b, krbapreq, sizeof (krbapreq));
122 	b += sizeof (krbapreq);
123 
124 	assert(b + tktlen == blob + bloblen);
125 	memcpy(b, tkt, tktlen);
126 	*gtoklenp = bloblen;
127 	*gtokp = blob;
128 	return (0);
129 }
130 
131 /*
132  * See "Windows 2000 Kerberos Interoperability" paper by
133  * Christopher Nebergall.  RC4 HMAC is the W2K default but
134  * Samba support lagged (not due to Samba itself, but due to OS'
135  * Kerberos implementations.)
136  *
137  * Only session enc type should matter, not ticket enc type,
138  * per Sam Hartman on krbdev.
139  *
140  * Preauthentication failure topics in krb-protocol may help here...
141  * try "John Brezak" and/or "Clifford Neuman" too.
142  */
143 static krb5_enctype kenctypes[] = {
144 	ENCTYPE_ARCFOUR_HMAC,	/* defined in krb5.h */
145 	ENCTYPE_DES_CBC_MD5,
146 	ENCTYPE_DES_CBC_CRC,
147 	ENCTYPE_NULL
148 };
149 
150 static const int rq_opts =
151     AP_OPTS_USE_SUBKEY | AP_OPTS_MUTUAL_REQUIRED;
152 
153 /*
154  * Obtain a kerberos ticket for the host we're connecting to.
155  * (This does the KRB_TGS exchange.)
156  */
157 static int
158 krb5ssp_get_tkt(krb5ssp_state_t *ss, char *server,
159 	uchar_t **tktp, ulong_t *tktlenp)
160 {
161 	krb5_context	kctx = ss->ss_krb5ctx;
162 	krb5_ccache	kcc  = ss->ss_krb5cc;
163 	krb5_data	indata = {0};
164 	krb5_data	outdata = {0};
165 	krb5_error_code	kerr = 0;
166 	const char	*fn = NULL;
167 	uchar_t 	*tkt;
168 
169 	/* Should have these from krb5ssp_init_client. */
170 	if (kctx == NULL || kcc == NULL) {
171 		fn = "null kctx or kcc";
172 		kerr = EINVAL;
173 		goto out;
174 	}
175 
176 	kerr = krb5_set_default_tgs_enctypes(kctx, kenctypes);
177 	if (kerr != 0) {
178 		fn = "krb5_set_default_tgs_enctypes";
179 		goto out;
180 	}
181 
182 	/* Override the krb5 library default. */
183 	indata.data = "";
184 
185 	kerr = krb5_mk_req(kctx, &ss->ss_auth, rq_opts, "cifs", server,
186 	    &indata, kcc, &outdata);
187 	if (kerr != 0) {
188 		fn = "krb5_mk_req";
189 		goto out;
190 	}
191 	if ((tkt = malloc(outdata.length)) == NULL) {
192 		kerr = ENOMEM;
193 		fn = "malloc signing key";
194 		goto out;
195 	}
196 	memcpy(tkt, outdata.data, outdata.length);
197 	*tktp = tkt;
198 	*tktlenp = outdata.length;
199 	kerr = 0;
200 
201 out:
202 	if (kerr) {
203 		if (fn == NULL)
204 			fn = "?";
205 		DPRINT("%s err 0x%x: %s", fn, kerr, error_message(kerr));
206 		if (kerr <= 0 || kerr > ESTALE)
207 			kerr = EAUTH;
208 	}
209 
210 	if (outdata.data)
211 		krb5_free_data_contents(kctx, &outdata);
212 
213 	/* Free kctx in krb5ssp_destroy */
214 	return (kerr);
215 }
216 
217 
218 /*
219  * Build an RFC 1964 KRB_AP_REQ message
220  * The caller puts on the SPNEGO wrapper.
221  */
222 int
223 krb5ssp_put_request(struct ssp_ctx *sp, struct mbdata *out_mb)
224 {
225 	int err;
226 	struct smb_ctx *ctx = sp->smb_ctx;
227 	krb5ssp_state_t *ss = sp->sp_private;
228 	uchar_t 	*tkt = NULL;
229 	ulong_t		tktlen;
230 	uchar_t 	*gtok = NULL;		/* gssapi token */
231 	ulong_t		gtoklen;		/* gssapi token length */
232 	char		*prin = ctx->ct_srvname;
233 
234 	if ((err = krb5ssp_get_tkt(ss, prin, &tkt, &tktlen)) != 0)
235 		goto out;
236 	if ((err = krb5ssp_tkt2gtok(tkt, tktlen, &gtok, &gtoklen)) != 0)
237 		goto out;
238 
239 	if ((err = mb_init(out_mb, gtoklen)) != 0)
240 		goto out;
241 	if ((err = mb_put_mem(out_mb, gtok, gtoklen)) != 0)
242 		goto out;
243 
244 	if (ctx->ct_vcflags & SMBV_WILL_SIGN)
245 		ctx->ct_hflags2 |= SMB_FLAGS2_SECURITY_SIGNATURE;
246 
247 out:
248 	if (gtok)
249 		free(gtok);
250 	if (tkt)
251 		free(tkt);
252 
253 	return (err);
254 }
255 
256 /*
257  * Unwrap a GSS-API encapsulated RFC 1964 reply message,
258  * i.e. type KRB_AP_REP or KRB_ERROR.
259  */
260 int
261 krb5ssp_get_reply(struct ssp_ctx *sp, struct mbdata *in_mb)
262 {
263 	krb5ssp_state_t *ss = sp->sp_private;
264 	mbuf_t *m = in_mb->mb_top;
265 	int err = EBADRPC;
266 	int dlen, rc;
267 	long actual_len, token_len;
268 	uchar_t *data;
269 	krb5_data ap = {0};
270 	krb5_ap_rep_enc_part *reply = NULL;
271 
272 	/* cheating: this mbuf is contiguous */
273 	assert(m->m_data == in_mb->mb_pos);
274 	data = (uchar_t *)m->m_data;
275 	dlen = m->m_len;
276 
277 	/*
278 	 * Peel off the GSS-API wrapper.  Looks like:
279 	 *   AppToken: 60 81 83
280 	 *  OID(KRB5): 06 09 2a 86 48 86 f7 12 01 02 02
281 	 * KRB_AP_REP: 02 00
282 	 */
283 	rc = ASNDerCheckToken(data, SPNEGO_NEGINIT_APP_CONSTRUCT,
284 	    0, dlen, &token_len, &actual_len);
285 	if (rc != SPNEGO_E_SUCCESS) {
286 		DPRINT("no AppToken? rc=0x%x", rc);
287 		goto out;
288 	}
289 	if (dlen < actual_len)
290 		goto out;
291 	data += actual_len;
292 	dlen -= actual_len;
293 
294 	/* OID (KRB5) */
295 	rc = ASNDerCheckOID(data, spnego_mech_oid_Kerberos_V5,
296 	    dlen, &actual_len);
297 	if (rc != SPNEGO_E_SUCCESS) {
298 		DPRINT("no OID? rc=0x%x", rc);
299 		goto out;
300 	}
301 	if (dlen < actual_len)
302 		goto out;
303 	data += actual_len;
304 	dlen -= actual_len;
305 
306 	/* KRB_AP_REP or KRB_ERROR */
307 	if (data[0] != KRB_AP_REP) {
308 		DPRINT("KRB5 type: %d", data[1]);
309 		goto out;
310 	}
311 	if (dlen < 2)
312 		goto out;
313 	data += 2;
314 	dlen -= 2;
315 
316 	/*
317 	 * Now what's left should be a krb5 reply
318 	 * NB: ap is NOT allocated, so don't free it.
319 	 */
320 	ap.length = dlen;
321 	ap.data = (char *)data;
322 	rc = krb5_rd_rep(ss->ss_krb5ctx, ss->ss_auth, &ap, &reply);
323 	if (rc != 0) {
324 		DPRINT("krb5_rd_rep: err 0x%x (%s)",
325 		    rc, error_message(rc));
326 		err = EAUTH;
327 		goto out;
328 	}
329 
330 	/*
331 	 * Have the decoded reply.  Save anything?
332 	 *
333 	 * NB: If this returns an error, we will get
334 	 * no more calls into this back-end module.
335 	 */
336 	err = 0;
337 
338 out:
339 	if (reply != NULL)
340 		krb5_free_ap_rep_enc_part(ss->ss_krb5ctx, reply);
341 	if (err)
342 		DPRINT("ret %d", err);
343 
344 	return (err);
345 }
346 
347 /*
348  * krb5ssp_final
349  *
350  * Called after successful authentication.
351  * Setup the MAC key for signing.
352  */
353 int
354 krb5ssp_final(struct ssp_ctx *sp)
355 {
356 	struct smb_ctx *ctx = sp->smb_ctx;
357 	krb5ssp_state_t *ss = sp->sp_private;
358 	krb5_keyblock	*ssn_key = NULL;
359 	int err, len;
360 
361 	/*
362 	 * Save the session key, used for SMB signing
363 	 * and possibly other consumers (RPC).
364 	 */
365 	err = krb5_auth_con_getlocalsubkey(
366 	    ss->ss_krb5ctx, ss->ss_auth, &ssn_key);
367 	if (err != 0) {
368 		DPRINT("_getlocalsubkey, err=0x%x (%s)",
369 		    err, error_message(err));
370 		if (err <= 0 || err > ESTALE)
371 			err = EAUTH;
372 		goto out;
373 	}
374 	memset(ctx->ct_ssn_key, 0, SMBIOC_HASH_SZ);
375 	if ((len = ssn_key->length) > SMBIOC_HASH_SZ)
376 		len = SMBIOC_HASH_SZ;
377 	memcpy(ctx->ct_ssn_key, ssn_key->contents, len);
378 
379 	/*
380 	 * Set the MAC key on the first successful auth.
381 	 */
382 	if ((ctx->ct_hflags2 & SMB_FLAGS2_SECURITY_SIGNATURE) &&
383 	    (ctx->ct_mackey == NULL)) {
384 		ctx->ct_mackeylen = ssn_key->length;
385 		ctx->ct_mackey = malloc(ctx->ct_mackeylen);
386 		if (ctx->ct_mackey == NULL) {
387 			ctx->ct_mackeylen = 0;
388 			err = ENOMEM;
389 			goto out;
390 		}
391 		memcpy(ctx->ct_mackey, ssn_key->contents,
392 		    ctx->ct_mackeylen);
393 		/*
394 		 * Apparently, the server used seq. no. zero
395 		 * for our previous message, so next is two.
396 		 */
397 		ctx->ct_mac_seqno = 2;
398 	}
399 	err = 0;
400 
401 out:
402 	if (ssn_key)
403 		krb5_free_keyblock(ss->ss_krb5ctx, ssn_key);
404 
405 	return (err);
406 }
407 
408 /*
409  * krb5ssp_next_token
410  *
411  * See ssp.c: ssp_ctx_next_token
412  */
413 int
414 krb5ssp_next_token(struct ssp_ctx *sp, struct mbdata *in_mb,
415 	struct mbdata *out_mb)
416 {
417 	int err;
418 
419 	/*
420 	 * Note: in_mb == NULL on the first call.
421 	 */
422 	if (in_mb) {
423 		err = krb5ssp_get_reply(sp, in_mb);
424 		if (err)
425 			goto out;
426 	}
427 
428 	if (out_mb) {
429 		err = krb5ssp_put_request(sp, out_mb);
430 	} else
431 		err = krb5ssp_final(sp);
432 
433 out:
434 	if (err)
435 		DPRINT("ret: %d", err);
436 	return (err);
437 }
438 
439 /*
440  * krb5ssp_ctx_destroy
441  *
442  * Destroy mechanism-specific data.
443  */
444 void
445 krb5ssp_destroy(struct ssp_ctx *sp)
446 {
447 	krb5ssp_state_t *ss;
448 	krb5_context	kctx;
449 
450 	ss = sp->sp_private;
451 	if (ss == NULL)
452 		return;
453 	sp->sp_private = NULL;
454 
455 	if ((kctx = ss->ss_krb5ctx) != NULL) {
456 		/* from krb5ssp_get_tkt */
457 		if (ss->ss_auth)
458 			krb5_auth_con_free(kctx, ss->ss_auth);
459 		/* from krb5ssp_init_client */
460 		if (ss->ss_krb5clp)
461 			krb5_free_principal(kctx, ss->ss_krb5clp);
462 		if (ss->ss_krb5cc)
463 			krb5_cc_close(kctx, ss->ss_krb5cc);
464 		krb5_free_context(kctx);
465 	}
466 
467 	free(ss);
468 }
469 
470 /*
471  * krb5ssp_init_clnt
472  *
473  * Initialize a new Kerberos SSP client context.
474  *
475  * The user must already have a TGT in their credential cache,
476  * as shown by the "klist" command.
477  */
478 int
479 krb5ssp_init_client(struct ssp_ctx *sp)
480 {
481 	krb5ssp_state_t *ss;
482 	krb5_error_code	kerr;
483 	krb5_context	kctx = NULL;
484 	krb5_ccache 	kcc = NULL;
485 	krb5_principal	kprin = NULL;
486 
487 	if ((sp->smb_ctx->ct_authflags & SMB_AT_KRB5) == 0) {
488 		DPRINT("KRB5 not in authflags");
489 		return (ENOTSUP);
490 	}
491 
492 	ss = calloc(1, sizeof (*ss));
493 	if (ss == NULL)
494 		return (ENOMEM);
495 
496 	sp->sp_nexttok = krb5ssp_next_token;
497 	sp->sp_destroy = krb5ssp_destroy;
498 	sp->sp_private = ss;
499 
500 	kerr = krb5_init_context(&kctx);
501 	if (kerr) {
502 		DPRINT("krb5_init_context, kerr 0x%x", kerr);
503 		goto errout;
504 	}
505 	ss->ss_krb5ctx = kctx;
506 
507 	/* non-default would instead use krb5_cc_resolve */
508 	kerr = krb5_cc_default(kctx, &kcc);
509 	if (kerr) {
510 		DPRINT("krb5_cc_default, kerr 0x%x", kerr);
511 		goto errout;
512 	}
513 	ss->ss_krb5cc = kcc;
514 
515 	/*
516 	 * Get the client principal (ticket),
517 	 * or discover that we don't have one.
518 	 */
519 	kerr = krb5_cc_get_principal(kctx, kcc, &kprin);
520 	if (kerr) {
521 		DPRINT("krb5_cc_get_principal, kerr 0x%x", kerr);
522 		goto errout;
523 	}
524 	ss->ss_krb5clp = kprin;
525 
526 	/* Success! */
527 	DPRINT("Ticket cache: %s:%s",
528 	    krb5_cc_get_type(kctx, kcc),
529 	    krb5_cc_get_name(kctx, kcc));
530 	return (0);
531 
532 errout:
533 	krb5ssp_destroy(sp);
534 	return (ENOTSUP);
535 }
536