Current Path : /usr/src/crypto/heimdal/appl/ftp/ftpd/ |
FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64 |
Current File : //usr/src/crypto/heimdal/appl/ftp/ftpd/gssapi.c |
/* * Copyright (c) 1998 - 2005 Kungliga Tekniska Högskolan * (Royal Institute of Technology, Stockholm, Sweden). * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * 3. Neither the name of the Institute nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #ifdef FTP_SERVER #include "ftpd_locl.h" #else #include "ftp_locl.h" #endif #include <gssapi.h> #include <krb5_err.h> RCSID("$Id: gssapi.c 21513 2007-07-12 12:45:25Z lha $"); int ftp_do_gss_bindings = 0; int ftp_do_gss_delegate = 1; struct gss_data { gss_ctx_id_t context_hdl; char *client_name; gss_cred_id_t delegated_cred_handle; void *mech_data; }; static int gss_init(void *app_data) { struct gss_data *d = app_data; d->context_hdl = GSS_C_NO_CONTEXT; d->delegated_cred_handle = GSS_C_NO_CREDENTIAL; #if defined(FTP_SERVER) return 0; #else /* XXX Check the gss mechanism; with gss_indicate_mechs() ? */ #ifdef KRB5 return !use_kerberos; #else return 0; #endif /* KRB5 */ #endif /* FTP_SERVER */ } static int gss_check_prot(void *app_data, int level) { if(level == prot_confidential) return -1; return 0; } static int gss_decode(void *app_data, void *buf, int len, int level) { OM_uint32 maj_stat, min_stat; gss_buffer_desc input, output; gss_qop_t qop_state; int conf_state; struct gss_data *d = app_data; size_t ret_len; input.length = len; input.value = buf; maj_stat = gss_unwrap (&min_stat, d->context_hdl, &input, &output, &conf_state, &qop_state); if(GSS_ERROR(maj_stat)) return -1; memmove(buf, output.value, output.length); ret_len = output.length; gss_release_buffer(&min_stat, &output); return ret_len; } static int gss_overhead(void *app_data, int level, int len) { return 100; /* dunno? */ } static int gss_encode(void *app_data, void *from, int length, int level, void **to) { OM_uint32 maj_stat, min_stat; gss_buffer_desc input, output; int conf_state; struct gss_data *d = app_data; input.length = length; input.value = from; maj_stat = gss_wrap (&min_stat, d->context_hdl, level == prot_private, GSS_C_QOP_DEFAULT, &input, &conf_state, &output); *to = output.value; return output.length; } static void sockaddr_to_gss_address (struct sockaddr *sa, OM_uint32 *addr_type, gss_buffer_desc *gss_addr) { switch (sa->sa_family) { #ifdef HAVE_IPV6 case AF_INET6 : { struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa; gss_addr->length = 16; gss_addr->value = &sin6->sin6_addr; *addr_type = GSS_C_AF_INET6; break; } #endif case AF_INET : { struct sockaddr_in *sin4 = (struct sockaddr_in *)sa; gss_addr->length = 4; gss_addr->value = &sin4->sin_addr; *addr_type = GSS_C_AF_INET; break; } default : errx (1, "unknown address family %d", sa->sa_family); } } /* end common stuff */ #ifdef FTP_SERVER static int gss_adat(void *app_data, void *buf, size_t len) { char *p = NULL; gss_buffer_desc input_token, output_token; OM_uint32 maj_stat, min_stat; gss_name_t client_name; struct gss_data *d = app_data; gss_channel_bindings_t bindings; if (ftp_do_gss_bindings) { bindings = malloc(sizeof(*bindings)); if (bindings == NULL) errx(1, "out of memory"); sockaddr_to_gss_address (his_addr, &bindings->initiator_addrtype, &bindings->initiator_address); sockaddr_to_gss_address (ctrl_addr, &bindings->acceptor_addrtype, &bindings->acceptor_address); bindings->application_data.length = 0; bindings->application_data.value = NULL; } else bindings = GSS_C_NO_CHANNEL_BINDINGS; input_token.value = buf; input_token.length = len; maj_stat = gss_accept_sec_context (&min_stat, &d->context_hdl, GSS_C_NO_CREDENTIAL, &input_token, bindings, &client_name, NULL, &output_token, NULL, NULL, &d->delegated_cred_handle); if (bindings != GSS_C_NO_CHANNEL_BINDINGS) free(bindings); if(output_token.length) { if(base64_encode(output_token.value, output_token.length, &p) < 0) { reply(535, "Out of memory base64-encoding."); return -1; } gss_release_buffer(&min_stat, &output_token); } if(maj_stat == GSS_S_COMPLETE){ char *name; gss_buffer_desc export_name; gss_OID oid; maj_stat = gss_display_name(&min_stat, client_name, &export_name, &oid); if(maj_stat != 0) { reply(500, "Error displaying name"); goto out; } /* XXX kerberos */ if(oid != GSS_KRB5_NT_PRINCIPAL_NAME) { reply(500, "OID not kerberos principal name"); gss_release_buffer(&min_stat, &export_name); goto out; } name = malloc(export_name.length + 1); if(name == NULL) { reply(500, "Out of memory"); gss_release_buffer(&min_stat, &export_name); goto out; } memcpy(name, export_name.value, export_name.length); name[export_name.length] = '\0'; gss_release_buffer(&min_stat, &export_name); d->client_name = name; if(p) reply(235, "ADAT=%s", p); else reply(235, "ADAT Complete"); sec_complete = 1; } else if(maj_stat == GSS_S_CONTINUE_NEEDED) { if(p) reply(335, "ADAT=%s", p); else reply(335, "OK, need more data"); } else { OM_uint32 new_stat; OM_uint32 msg_ctx = 0; gss_buffer_desc status_string; gss_display_status(&new_stat, min_stat, GSS_C_MECH_CODE, GSS_C_NO_OID, &msg_ctx, &status_string); syslog(LOG_ERR, "gss_accept_sec_context: %s", (char*)status_string.value); gss_release_buffer(&new_stat, &status_string); reply(431, "Security resource unavailable"); } out: if (client_name) gss_release_name(&min_stat, &client_name); free(p); return 0; } int gss_userok(void*, char*); int gss_session(void*, char*); struct sec_server_mech gss_server_mech = { "GSSAPI", sizeof(struct gss_data), gss_init, /* init */ NULL, /* end */ gss_check_prot, gss_overhead, gss_encode, gss_decode, /* */ NULL, gss_adat, NULL, /* pbsz */ NULL, /* ccc */ gss_userok, gss_session }; #else /* FTP_SERVER */ extern struct sockaddr *hisctladdr, *myctladdr; static int import_name(const char *kname, const char *host, gss_name_t *target_name) { OM_uint32 maj_stat, min_stat; gss_buffer_desc name; char *str; name.length = asprintf(&str, "%s@%s", kname, host); if (str == NULL) { printf("Out of memory\n"); return AUTH_ERROR; } name.value = str; maj_stat = gss_import_name(&min_stat, &name, GSS_C_NT_HOSTBASED_SERVICE, target_name); if (GSS_ERROR(maj_stat)) { OM_uint32 new_stat; OM_uint32 msg_ctx = 0; gss_buffer_desc status_string; gss_display_status(&new_stat, min_stat, GSS_C_MECH_CODE, GSS_C_NO_OID, &msg_ctx, &status_string); printf("Error importing name %s: %s\n", (char *)name.value, (char *)status_string.value); free(name.value); gss_release_buffer(&new_stat, &status_string); return AUTH_ERROR; } free(name.value); return 0; } static int gss_auth(void *app_data, char *host) { OM_uint32 maj_stat, min_stat; gss_name_t target_name; gss_buffer_desc input, output_token; int context_established = 0; char *p; int n; gss_channel_bindings_t bindings; struct gss_data *d = app_data; OM_uint32 mech_flags = GSS_C_MUTUAL_FLAG | GSS_C_SEQUENCE_FLAG; const char *knames[] = { "ftp", "host", NULL }, **kname = knames; if(import_name(*kname++, host, &target_name)) return AUTH_ERROR; input.length = 0; input.value = NULL; if (ftp_do_gss_bindings) { bindings = malloc(sizeof(*bindings)); if (bindings == NULL) errx(1, "out of memory"); sockaddr_to_gss_address (myctladdr, &bindings->initiator_addrtype, &bindings->initiator_address); sockaddr_to_gss_address (hisctladdr, &bindings->acceptor_addrtype, &bindings->acceptor_address); bindings->application_data.length = 0; bindings->application_data.value = NULL; } else bindings = GSS_C_NO_CHANNEL_BINDINGS; if (ftp_do_gss_delegate) mech_flags |= GSS_C_DELEG_FLAG; while(!context_established) { maj_stat = gss_init_sec_context(&min_stat, GSS_C_NO_CREDENTIAL, &d->context_hdl, target_name, GSS_C_NO_OID, mech_flags, 0, bindings, &input, NULL, &output_token, NULL, NULL); if (GSS_ERROR(maj_stat)) { OM_uint32 new_stat; OM_uint32 msg_ctx = 0; gss_buffer_desc status_string; d->context_hdl = GSS_C_NO_CONTEXT; gss_release_name(&min_stat, &target_name); if(*kname != NULL) { if(import_name(*kname++, host, &target_name)) { if (bindings != GSS_C_NO_CHANNEL_BINDINGS) free(bindings); return AUTH_ERROR; } continue; } if (bindings != GSS_C_NO_CHANNEL_BINDINGS) free(bindings); gss_display_status(&new_stat, min_stat, GSS_C_MECH_CODE, GSS_C_NO_OID, &msg_ctx, &status_string); printf("Error initializing security context: %s\n", (char*)status_string.value); gss_release_buffer(&new_stat, &status_string); return AUTH_CONTINUE; } if (input.value) { free(input.value); input.value = NULL; input.length = 0; } if (output_token.length != 0) { base64_encode(output_token.value, output_token.length, &p); gss_release_buffer(&min_stat, &output_token); n = command("ADAT %s", p); free(p); } if (GSS_ERROR(maj_stat)) { if (d->context_hdl != GSS_C_NO_CONTEXT) gss_delete_sec_context (&min_stat, &d->context_hdl, GSS_C_NO_BUFFER); break; } if (maj_stat & GSS_S_CONTINUE_NEEDED) { p = strstr(reply_string, "ADAT="); if(p == NULL){ printf("Error: expected ADAT in reply. got: %s\n", reply_string); if (bindings != GSS_C_NO_CHANNEL_BINDINGS) free(bindings); return AUTH_ERROR; } else { p+=5; input.value = malloc(strlen(p)); input.length = base64_decode(p, input.value); } } else { if(code != 235) { printf("Unrecognized response code: %d\n", code); if (bindings != GSS_C_NO_CHANNEL_BINDINGS) free(bindings); return AUTH_ERROR; } context_established = 1; } } gss_release_name(&min_stat, &target_name); if (bindings != GSS_C_NO_CHANNEL_BINDINGS) free(bindings); if (input.value) free(input.value); { gss_name_t targ_name; maj_stat = gss_inquire_context(&min_stat, d->context_hdl, NULL, &targ_name, NULL, NULL, NULL, NULL, NULL); if (GSS_ERROR(maj_stat) == 0) { gss_buffer_desc name; maj_stat = gss_display_name (&min_stat, targ_name, &name, NULL); if (GSS_ERROR(maj_stat) == 0) { printf("Authenticated to <%s>\n", (char *)name.value); gss_release_buffer(&min_stat, &name); } gss_release_name(&min_stat, &targ_name); } else printf("Failed to get gss name of peer.\n"); } return AUTH_OK; } struct sec_client_mech gss_client_mech = { "GSSAPI", sizeof(struct gss_data), gss_init, gss_auth, NULL, /* end */ gss_check_prot, gss_overhead, gss_encode, gss_decode, }; #endif /* FTP_SERVER */