1 | /*
|
---|
2 | Public Interface file for Linux DNS client library implementation
|
---|
3 |
|
---|
4 | Copyright (C) 2006 Krishna Ganugapati <krishnag@centeris.com>
|
---|
5 | Copyright (C) 2006 Gerald Carter <jerry@samba.org>
|
---|
6 |
|
---|
7 | ** NOTE! The following LGPL license applies to the libaddns
|
---|
8 | ** library. This does NOT imply that all of Samba is released
|
---|
9 | ** under the LGPL
|
---|
10 |
|
---|
11 | This library is free software; you can redistribute it and/or
|
---|
12 | modify it under the terms of the GNU Lesser General Public
|
---|
13 | License as published by the Free Software Foundation; either
|
---|
14 | version 2.1 of the License, or (at your option) any later version.
|
---|
15 |
|
---|
16 | This library is distributed in the hope that it will be useful,
|
---|
17 | but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
18 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
---|
19 | Lesser General Public License for more details.
|
---|
20 |
|
---|
21 | You should have received a copy of the GNU Lesser General Public
|
---|
22 | License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
---|
23 | */
|
---|
24 |
|
---|
25 | #include "dns.h"
|
---|
26 | #include <ctype.h>
|
---|
27 |
|
---|
28 |
|
---|
29 | #ifdef HAVE_GSSAPI_SUPPORT
|
---|
30 |
|
---|
31 | /*********************************************************************
|
---|
32 | *********************************************************************/
|
---|
33 |
|
---|
34 | #ifndef HAVE_STRUPR
|
---|
35 | static int strupr( char *szDomainName )
|
---|
36 | {
|
---|
37 | if ( !szDomainName ) {
|
---|
38 | return ( 0 );
|
---|
39 | }
|
---|
40 | while ( *szDomainName != '\0' ) {
|
---|
41 | *szDomainName = toupper( *szDomainName );
|
---|
42 | szDomainName++;
|
---|
43 | }
|
---|
44 | return ( 0 );
|
---|
45 | }
|
---|
46 | #endif
|
---|
47 |
|
---|
48 | #if 0
|
---|
49 | /*********************************************************************
|
---|
50 | *********************************************************************/
|
---|
51 |
|
---|
52 | static void display_status_1( const char *m, OM_uint32 code, int type )
|
---|
53 | {
|
---|
54 | OM_uint32 maj_stat, min_stat;
|
---|
55 | gss_buffer_desc msg;
|
---|
56 | OM_uint32 msg_ctx;
|
---|
57 |
|
---|
58 | msg_ctx = 0;
|
---|
59 | while ( 1 ) {
|
---|
60 | maj_stat = gss_display_status( &min_stat, code,
|
---|
61 | type, GSS_C_NULL_OID,
|
---|
62 | &msg_ctx, &msg );
|
---|
63 | fprintf( stdout, "GSS-API error %s: %s\n", m,
|
---|
64 | ( char * ) msg.value );
|
---|
65 | ( void ) gss_release_buffer( &min_stat, &msg );
|
---|
66 |
|
---|
67 | if ( !msg_ctx )
|
---|
68 | break;
|
---|
69 | }
|
---|
70 | }
|
---|
71 |
|
---|
72 | /*********************************************************************
|
---|
73 | *********************************************************************/
|
---|
74 |
|
---|
75 | void display_status( const char *msg, OM_uint32 maj_stat, OM_uint32 min_stat )
|
---|
76 | {
|
---|
77 | display_status_1( msg, maj_stat, GSS_C_GSS_CODE );
|
---|
78 | display_status_1( msg, min_stat, GSS_C_MECH_CODE );
|
---|
79 | }
|
---|
80 | #endif
|
---|
81 |
|
---|
82 | static DNS_ERROR dns_negotiate_gss_ctx_int( TALLOC_CTX *mem_ctx,
|
---|
83 | struct dns_connection *conn,
|
---|
84 | const char *keyname,
|
---|
85 | const gss_name_t target_name,
|
---|
86 | gss_ctx_id_t *ctx,
|
---|
87 | enum dns_ServerType srv_type )
|
---|
88 | {
|
---|
89 | struct gss_buffer_desc_struct input_desc, *input_ptr, output_desc;
|
---|
90 | OM_uint32 major, minor;
|
---|
91 | OM_uint32 ret_flags;
|
---|
92 | DNS_ERROR err;
|
---|
93 |
|
---|
94 | gss_OID_desc krb5_oid_desc =
|
---|
95 | { 9, (char *)"\x2a\x86\x48\x86\xf7\x12\x01\x02\x02" };
|
---|
96 |
|
---|
97 | *ctx = GSS_C_NO_CONTEXT;
|
---|
98 | input_ptr = NULL;
|
---|
99 |
|
---|
100 | do {
|
---|
101 | major = gss_init_sec_context(
|
---|
102 | &minor, NULL, ctx, target_name, &krb5_oid_desc,
|
---|
103 | GSS_C_REPLAY_FLAG | GSS_C_MUTUAL_FLAG |
|
---|
104 | GSS_C_CONF_FLAG |
|
---|
105 | GSS_C_INTEG_FLAG,
|
---|
106 | 0, NULL, input_ptr, NULL, &output_desc,
|
---|
107 | &ret_flags, NULL );
|
---|
108 |
|
---|
109 | if (input_ptr != NULL) {
|
---|
110 | TALLOC_FREE(input_desc.value);
|
---|
111 | }
|
---|
112 |
|
---|
113 | if (output_desc.length != 0) {
|
---|
114 |
|
---|
115 | struct dns_request *req;
|
---|
116 | struct dns_rrec *rec;
|
---|
117 | struct dns_buffer *buf;
|
---|
118 |
|
---|
119 | time_t t = time(NULL);
|
---|
120 |
|
---|
121 | err = dns_create_query(mem_ctx, keyname, QTYPE_TKEY,
|
---|
122 | DNS_CLASS_IN, &req);
|
---|
123 | if (!ERR_DNS_IS_OK(err)) goto error;
|
---|
124 |
|
---|
125 | err = dns_create_tkey_record(
|
---|
126 | req, keyname, "gss.microsoft.com", t,
|
---|
127 | t + 86400, DNS_TKEY_MODE_GSSAPI, 0,
|
---|
128 | output_desc.length, (uint8 *)output_desc.value,
|
---|
129 | &rec );
|
---|
130 | if (!ERR_DNS_IS_OK(err)) goto error;
|
---|
131 |
|
---|
132 | /* Windows 2000 DNS is broken and requires the
|
---|
133 | TKEY payload in the Answer section instead
|
---|
134 | of the Additional seciton like Windows 2003 */
|
---|
135 |
|
---|
136 | if ( srv_type == DNS_SRV_WIN2000 ) {
|
---|
137 | err = dns_add_rrec(req, rec, &req->num_answers,
|
---|
138 | &req->answers);
|
---|
139 | } else {
|
---|
140 | err = dns_add_rrec(req, rec, &req->num_additionals,
|
---|
141 | &req->additionals);
|
---|
142 | }
|
---|
143 |
|
---|
144 | if (!ERR_DNS_IS_OK(err)) goto error;
|
---|
145 |
|
---|
146 | err = dns_marshall_request(req, req, &buf);
|
---|
147 | if (!ERR_DNS_IS_OK(err)) goto error;
|
---|
148 |
|
---|
149 | err = dns_send(conn, buf);
|
---|
150 | if (!ERR_DNS_IS_OK(err)) goto error;
|
---|
151 |
|
---|
152 | TALLOC_FREE(req);
|
---|
153 | }
|
---|
154 |
|
---|
155 | gss_release_buffer(&minor, &output_desc);
|
---|
156 |
|
---|
157 | if ((major != GSS_S_COMPLETE) &&
|
---|
158 | (major != GSS_S_CONTINUE_NEEDED)) {
|
---|
159 | return ERROR_DNS_GSS_ERROR;
|
---|
160 | }
|
---|
161 |
|
---|
162 | if (major == GSS_S_CONTINUE_NEEDED) {
|
---|
163 |
|
---|
164 | struct dns_request *resp;
|
---|
165 | struct dns_buffer *buf;
|
---|
166 | struct dns_tkey_record *tkey;
|
---|
167 |
|
---|
168 | err = dns_receive(mem_ctx, conn, &buf);
|
---|
169 | if (!ERR_DNS_IS_OK(err)) goto error;
|
---|
170 |
|
---|
171 | err = dns_unmarshall_request(buf, buf, &resp);
|
---|
172 | if (!ERR_DNS_IS_OK(err)) goto error;
|
---|
173 |
|
---|
174 | /*
|
---|
175 | * TODO: Compare id and keyname
|
---|
176 | */
|
---|
177 |
|
---|
178 | if ((resp->num_additionals != 1) ||
|
---|
179 | (resp->num_answers == 0) ||
|
---|
180 | (resp->answers[0]->type != QTYPE_TKEY)) {
|
---|
181 | err = ERROR_DNS_INVALID_MESSAGE;
|
---|
182 | goto error;
|
---|
183 | }
|
---|
184 |
|
---|
185 | err = dns_unmarshall_tkey_record(
|
---|
186 | mem_ctx, resp->answers[0], &tkey);
|
---|
187 | if (!ERR_DNS_IS_OK(err)) goto error;
|
---|
188 |
|
---|
189 | input_desc.length = tkey->key_length;
|
---|
190 | input_desc.value = talloc_move(mem_ctx, &tkey->key);
|
---|
191 |
|
---|
192 | input_ptr = &input_desc;
|
---|
193 |
|
---|
194 | TALLOC_FREE(buf);
|
---|
195 | }
|
---|
196 |
|
---|
197 | } while ( major == GSS_S_CONTINUE_NEEDED );
|
---|
198 |
|
---|
199 | /* If we arrive here, we have a valid security context */
|
---|
200 |
|
---|
201 | err = ERROR_DNS_SUCCESS;
|
---|
202 |
|
---|
203 | error:
|
---|
204 |
|
---|
205 | return err;
|
---|
206 | }
|
---|
207 |
|
---|
208 | DNS_ERROR dns_negotiate_sec_ctx( const char *target_realm,
|
---|
209 | const char *servername,
|
---|
210 | const char *keyname,
|
---|
211 | gss_ctx_id_t *gss_ctx,
|
---|
212 | enum dns_ServerType srv_type )
|
---|
213 | {
|
---|
214 | OM_uint32 major, minor;
|
---|
215 |
|
---|
216 | char *upcaserealm, *targetname;
|
---|
217 | DNS_ERROR err;
|
---|
218 |
|
---|
219 | gss_buffer_desc input_name;
|
---|
220 | struct dns_connection *conn;
|
---|
221 |
|
---|
222 | gss_name_t targ_name;
|
---|
223 |
|
---|
224 | gss_OID_desc nt_host_oid_desc =
|
---|
225 | {10, (char *)"\x2a\x86\x48\x86\xf7\x12\x01\x02\x02\x01"};
|
---|
226 |
|
---|
227 | TALLOC_CTX *mem_ctx;
|
---|
228 |
|
---|
229 | if (!(mem_ctx = talloc_init("dns_negotiate_sec_ctx"))) {
|
---|
230 | return ERROR_DNS_NO_MEMORY;
|
---|
231 | }
|
---|
232 |
|
---|
233 | err = dns_open_connection( servername, DNS_TCP, mem_ctx, &conn );
|
---|
234 | if (!ERR_DNS_IS_OK(err)) goto error;
|
---|
235 |
|
---|
236 | if (!(upcaserealm = talloc_strdup(mem_ctx, target_realm))) {
|
---|
237 | err = ERROR_DNS_NO_MEMORY;
|
---|
238 | goto error;
|
---|
239 | }
|
---|
240 |
|
---|
241 | strupr(upcaserealm);
|
---|
242 |
|
---|
243 | if (!(targetname = talloc_asprintf(mem_ctx, "dns/%s@%s",
|
---|
244 | servername, upcaserealm))) {
|
---|
245 | err = ERROR_DNS_NO_MEMORY;
|
---|
246 | goto error;
|
---|
247 | }
|
---|
248 |
|
---|
249 | input_name.value = targetname;
|
---|
250 | input_name.length = strlen(targetname);
|
---|
251 |
|
---|
252 | major = gss_import_name( &minor, &input_name,
|
---|
253 | &nt_host_oid_desc, &targ_name );
|
---|
254 |
|
---|
255 | if (major) {
|
---|
256 | err = ERROR_DNS_GSS_ERROR;
|
---|
257 | goto error;
|
---|
258 | }
|
---|
259 |
|
---|
260 | err = dns_negotiate_gss_ctx_int(mem_ctx, conn, keyname,
|
---|
261 | targ_name, gss_ctx, srv_type );
|
---|
262 |
|
---|
263 | gss_release_name( &minor, &targ_name );
|
---|
264 |
|
---|
265 | error:
|
---|
266 | TALLOC_FREE(mem_ctx);
|
---|
267 |
|
---|
268 | return err;
|
---|
269 | }
|
---|
270 |
|
---|
271 | DNS_ERROR dns_sign_update(struct dns_update_request *req,
|
---|
272 | gss_ctx_id_t gss_ctx,
|
---|
273 | const char *keyname,
|
---|
274 | const char *algorithmname,
|
---|
275 | time_t time_signed, uint16 fudge)
|
---|
276 | {
|
---|
277 | struct dns_buffer *buf;
|
---|
278 | DNS_ERROR err;
|
---|
279 | struct dns_domain_name *key, *algorithm;
|
---|
280 | struct gss_buffer_desc_struct msg, mic;
|
---|
281 | OM_uint32 major, minor;
|
---|
282 | struct dns_rrec *rec;
|
---|
283 |
|
---|
284 | err = dns_marshall_update_request(req, req, &buf);
|
---|
285 | if (!ERR_DNS_IS_OK(err)) return err;
|
---|
286 |
|
---|
287 | err = dns_domain_name_from_string(buf, keyname, &key);
|
---|
288 | if (!ERR_DNS_IS_OK(err)) goto error;
|
---|
289 |
|
---|
290 | err = dns_domain_name_from_string(buf, algorithmname, &algorithm);
|
---|
291 | if (!ERR_DNS_IS_OK(err)) goto error;
|
---|
292 |
|
---|
293 | dns_marshall_domain_name(buf, key);
|
---|
294 | dns_marshall_uint16(buf, DNS_CLASS_ANY);
|
---|
295 | dns_marshall_uint32(buf, 0); /* TTL */
|
---|
296 | dns_marshall_domain_name(buf, algorithm);
|
---|
297 | dns_marshall_uint16(buf, 0); /* Time prefix for 48-bit time_t */
|
---|
298 | dns_marshall_uint32(buf, time_signed);
|
---|
299 | dns_marshall_uint16(buf, fudge);
|
---|
300 | dns_marshall_uint16(buf, 0); /* error */
|
---|
301 | dns_marshall_uint16(buf, 0); /* other len */
|
---|
302 |
|
---|
303 | err = buf->error;
|
---|
304 | if (!ERR_DNS_IS_OK(buf->error)) goto error;
|
---|
305 |
|
---|
306 | msg.value = (void *)buf->data;
|
---|
307 | msg.length = buf->offset;
|
---|
308 |
|
---|
309 | major = gss_get_mic(&minor, gss_ctx, 0, &msg, &mic);
|
---|
310 | if (major != 0) {
|
---|
311 | err = ERROR_DNS_GSS_ERROR;
|
---|
312 | goto error;
|
---|
313 | }
|
---|
314 |
|
---|
315 | if (mic.length > 0xffff) {
|
---|
316 | gss_release_buffer(&minor, &mic);
|
---|
317 | err = ERROR_DNS_GSS_ERROR;
|
---|
318 | goto error;
|
---|
319 | }
|
---|
320 |
|
---|
321 | err = dns_create_tsig_record(buf, keyname, algorithmname, time_signed,
|
---|
322 | fudge, mic.length, (uint8 *)mic.value,
|
---|
323 | req->id, 0, &rec);
|
---|
324 | gss_release_buffer(&minor, &mic);
|
---|
325 | if (!ERR_DNS_IS_OK(err)) goto error;
|
---|
326 |
|
---|
327 | err = dns_add_rrec(req, rec, &req->num_additionals, &req->additionals);
|
---|
328 |
|
---|
329 | error:
|
---|
330 | TALLOC_FREE(buf);
|
---|
331 | return err;
|
---|
332 | }
|
---|
333 |
|
---|
334 | #endif /* HAVE_GSSAPI_SUPPORT */
|
---|