[137] | 1 | /*
|
---|
| 2 | Unix SMB/CIFS implementation.
|
---|
| 3 | krb5 set password implementation
|
---|
| 4 | Copyright (C) Remus Koos 2001 (remuskoos@yahoo.com)
|
---|
| 5 |
|
---|
| 6 | This program is free software; you can redistribute it and/or modify
|
---|
| 7 | it under the terms of the GNU General Public License as published by
|
---|
| 8 | the Free Software Foundation; either version 3 of the License, or
|
---|
| 9 | (at your option) any later version.
|
---|
| 10 |
|
---|
| 11 | This program is distributed in the hope that it will be useful,
|
---|
| 12 | but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
| 13 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
---|
| 14 | GNU General Public License for more details.
|
---|
| 15 |
|
---|
| 16 | You should have received a copy of the GNU General Public License
|
---|
| 17 | along with this program. If not, see <http://www.gnu.org/licenses/>.
|
---|
| 18 | */
|
---|
| 19 |
|
---|
| 20 | #include "includes.h"
|
---|
| 21 |
|
---|
| 22 | #ifdef HAVE_KRB5
|
---|
| 23 |
|
---|
| 24 | ADS_STATUS ads_change_trust_account_password(ADS_STRUCT *ads, char *host_principal)
|
---|
| 25 | {
|
---|
| 26 | char *password;
|
---|
| 27 | char *new_password;
|
---|
| 28 | ADS_STATUS ret;
|
---|
| 29 | uint32 sec_channel_type;
|
---|
| 30 |
|
---|
| 31 | if ((password = secrets_fetch_machine_password(lp_workgroup(), NULL, &sec_channel_type)) == NULL) {
|
---|
| 32 | DEBUG(1,("Failed to retrieve password for principal %s\n", host_principal));
|
---|
| 33 | return ADS_ERROR_SYSTEM(ENOENT);
|
---|
| 34 | }
|
---|
| 35 |
|
---|
| 36 | new_password = generate_random_str(DEFAULT_TRUST_ACCOUNT_PASSWORD_LENGTH);
|
---|
| 37 |
|
---|
| 38 | ret = kerberos_set_password(ads->auth.kdc_server, host_principal, password, host_principal, new_password, ads->auth.time_offset);
|
---|
| 39 |
|
---|
| 40 | if (!ADS_ERR_OK(ret)) {
|
---|
| 41 | goto failed;
|
---|
| 42 | }
|
---|
| 43 |
|
---|
| 44 | if (!secrets_store_machine_password(new_password, lp_workgroup(), sec_channel_type)) {
|
---|
| 45 | DEBUG(1,("Failed to save machine password\n"));
|
---|
| 46 | ret = ADS_ERROR_SYSTEM(EACCES);
|
---|
| 47 | goto failed;
|
---|
| 48 | }
|
---|
| 49 |
|
---|
| 50 | failed:
|
---|
| 51 | SAFE_FREE(password);
|
---|
| 52 | return ret;
|
---|
| 53 | }
|
---|
| 54 |
|
---|
| 55 | ADS_STATUS ads_guess_service_principal(ADS_STRUCT *ads,
|
---|
| 56 | char **returned_principal)
|
---|
| 57 | {
|
---|
| 58 | char *princ = NULL;
|
---|
| 59 |
|
---|
| 60 | if (ads->server.realm && ads->server.ldap_server) {
|
---|
| 61 | char *server, *server_realm;
|
---|
| 62 |
|
---|
| 63 | server = SMB_STRDUP(ads->server.ldap_server);
|
---|
| 64 | server_realm = SMB_STRDUP(ads->server.realm);
|
---|
| 65 |
|
---|
| 66 | if (!server || !server_realm) {
|
---|
| 67 | SAFE_FREE(server);
|
---|
| 68 | SAFE_FREE(server_realm);
|
---|
| 69 | return ADS_ERROR(LDAP_NO_MEMORY);
|
---|
| 70 | }
|
---|
| 71 |
|
---|
| 72 | strlower_m(server);
|
---|
| 73 | strupper_m(server_realm);
|
---|
| 74 | asprintf(&princ, "ldap/%s@%s", server, server_realm);
|
---|
| 75 |
|
---|
| 76 | SAFE_FREE(server);
|
---|
| 77 | SAFE_FREE(server_realm);
|
---|
| 78 |
|
---|
| 79 | if (!princ) {
|
---|
| 80 | return ADS_ERROR(LDAP_NO_MEMORY);
|
---|
| 81 | }
|
---|
| 82 | } else if (ads->config.realm && ads->config.ldap_server_name) {
|
---|
| 83 | char *server, *server_realm;
|
---|
| 84 |
|
---|
| 85 | server = SMB_STRDUP(ads->config.ldap_server_name);
|
---|
| 86 | server_realm = SMB_STRDUP(ads->config.realm);
|
---|
| 87 |
|
---|
| 88 | if (!server || !server_realm) {
|
---|
[228] | 89 | SAFE_FREE(server);
|
---|
| 90 | SAFE_FREE(server_realm);
|
---|
[137] | 91 | return ADS_ERROR(LDAP_NO_MEMORY);
|
---|
| 92 | }
|
---|
| 93 |
|
---|
| 94 | strlower_m(server);
|
---|
| 95 | strupper_m(server_realm);
|
---|
| 96 | asprintf(&princ, "ldap/%s@%s", server, server_realm);
|
---|
| 97 |
|
---|
| 98 | SAFE_FREE(server);
|
---|
| 99 | SAFE_FREE(server_realm);
|
---|
| 100 |
|
---|
| 101 | if (!princ) {
|
---|
| 102 | return ADS_ERROR(LDAP_NO_MEMORY);
|
---|
| 103 | }
|
---|
| 104 | }
|
---|
| 105 |
|
---|
| 106 | if (!princ) {
|
---|
| 107 | return ADS_ERROR(LDAP_PARAM_ERROR);
|
---|
| 108 | }
|
---|
| 109 |
|
---|
| 110 | *returned_principal = princ;
|
---|
| 111 |
|
---|
| 112 | return ADS_SUCCESS;
|
---|
| 113 | }
|
---|
| 114 |
|
---|
| 115 | #endif
|
---|