s4:auth/gensec_gssapi: remember the expire time
[metze/samba/wip.git] / source4 / auth / gensec / gensec_gssapi.c
1 /* 
2    Unix SMB/CIFS implementation.
3
4    Kerberos backend for GENSEC
5    
6    Copyright (C) Andrew Bartlett <abartlet@samba.org> 2004-2005
7    Copyright (C) Stefan Metzmacher <metze@samba.org> 2004-2005
8
9    This program is free software; you can redistribute it and/or modify
10    it under the terms of the GNU General Public License as published by
11    the Free Software Foundation; either version 3 of the License, or
12    (at your option) any later version.
13    
14    This program is distributed in the hope that it will be useful,
15    but WITHOUT ANY WARRANTY; without even the implied warranty of
16    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
17    GNU General Public License for more details.
18
19    
20    You should have received a copy of the GNU General Public License
21    along with this program.  If not, see <http://www.gnu.org/licenses/>.
22 */
23
24 #include "includes.h"
25 #include "lib/events/events.h"
26 #include "system/kerberos.h"
27 #include "system/gssapi.h"
28 #include "auth/kerberos/kerberos.h"
29 #include "librpc/gen_ndr/krb5pac.h"
30 #include "auth/auth.h"
31 #include <ldb.h>
32 #include "auth/auth_sam.h"
33 #include "librpc/rpc/dcerpc.h"
34 #include "auth/credentials/credentials.h"
35 #include "auth/credentials/credentials_krb5.h"
36 #include "auth/gensec/gensec.h"
37 #include "auth/gensec/gensec_proto.h"
38 #include "auth/gensec/gensec_toplevel_proto.h"
39 #include "param/param.h"
40 #include "auth/session_proto.h"
41 #include "gensec_gssapi.h"
42 #include "lib/util/util_net.h"
43 #include "auth/kerberos/pac_utils.h"
44
45 _PUBLIC_ NTSTATUS gensec_gssapi_init(void);
46
47 static size_t gensec_gssapi_max_input_size(struct gensec_security *gensec_security);
48 static size_t gensec_gssapi_max_wrapped_size(struct gensec_security *gensec_security);
49
50 static int gensec_gssapi_destructor(struct gensec_gssapi_state *gensec_gssapi_state)
51 {
52         OM_uint32 maj_stat, min_stat;
53         
54         if (gensec_gssapi_state->delegated_cred_handle != GSS_C_NO_CREDENTIAL) {
55                 maj_stat = gss_release_cred(&min_stat, 
56                                             &gensec_gssapi_state->delegated_cred_handle);
57         }
58
59         if (gensec_gssapi_state->gssapi_context != GSS_C_NO_CONTEXT) {
60                 maj_stat = gss_delete_sec_context (&min_stat,
61                                                    &gensec_gssapi_state->gssapi_context,
62                                                    GSS_C_NO_BUFFER);
63         }
64
65         if (gensec_gssapi_state->server_name != GSS_C_NO_NAME) {
66                 maj_stat = gss_release_name(&min_stat, &gensec_gssapi_state->server_name);
67         }
68         if (gensec_gssapi_state->client_name != GSS_C_NO_NAME) {
69                 maj_stat = gss_release_name(&min_stat, &gensec_gssapi_state->client_name);
70         }
71
72         if (gensec_gssapi_state->lucid) {
73                 gss_krb5_free_lucid_sec_context(&min_stat, gensec_gssapi_state->lucid);
74         }
75
76         return 0;
77 }
78
79 static NTSTATUS gensec_gssapi_init_lucid(struct gensec_gssapi_state *gensec_gssapi_state)
80 {
81         OM_uint32 maj_stat, min_stat;
82
83         if (gensec_gssapi_state->lucid) {
84                 return NT_STATUS_OK;
85         }
86
87         maj_stat = gss_krb5_export_lucid_sec_context(&min_stat,
88                                                      &gensec_gssapi_state->gssapi_context,
89                                                      1,
90                                                      (void **)&gensec_gssapi_state->lucid);
91         if (maj_stat != GSS_S_COMPLETE) {
92                 DEBUG(0,("gensec_gssapi_init_lucid: %s\n",
93                         gssapi_error_string(gensec_gssapi_state,
94                                             maj_stat, min_stat,
95                                             gensec_gssapi_state->gss_oid)));
96                 return NT_STATUS_INTERNAL_ERROR;
97         }
98
99         if (gensec_gssapi_state->lucid->version != 1) {
100                 DEBUG(0,("gensec_gssapi_init_lucid: lucid version[%d] != 1\n",
101                         gensec_gssapi_state->lucid->version));
102                 gss_krb5_free_lucid_sec_context(&min_stat, gensec_gssapi_state->lucid);
103                 gensec_gssapi_state->lucid = NULL;
104                 return NT_STATUS_INTERNAL_ERROR;
105         }
106
107         return NT_STATUS_OK;
108 }
109
110 static NTSTATUS gensec_gssapi_start(struct gensec_security *gensec_security)
111 {
112         struct gensec_gssapi_state *gensec_gssapi_state;
113         krb5_error_code ret;
114         const char *realm;
115
116         gensec_gssapi_state = talloc_zero(gensec_security, struct gensec_gssapi_state);
117         if (!gensec_gssapi_state) {
118                 return NT_STATUS_NO_MEMORY;
119         }
120
121         gensec_security->private_data = gensec_gssapi_state;
122
123         gensec_gssapi_state->gssapi_context = GSS_C_NO_CONTEXT;
124
125         /* TODO: Fill in channel bindings */
126         gensec_gssapi_state->input_chan_bindings = GSS_C_NO_CHANNEL_BINDINGS;
127
128         gensec_gssapi_state->server_name = GSS_C_NO_NAME;
129         gensec_gssapi_state->client_name = GSS_C_NO_NAME;
130         
131         gensec_gssapi_state->gss_want_flags = 0;
132
133         if (gensec_setting_bool(gensec_security->settings, "gensec_gssapi", "delegation_by_kdc_policy", true)) {
134                 gensec_gssapi_state->gss_want_flags |= GSS_C_DELEG_POLICY_FLAG;
135         }
136         if (gensec_setting_bool(gensec_security->settings, "gensec_gssapi", "mutual", true)) {
137                 gensec_gssapi_state->gss_want_flags |= GSS_C_MUTUAL_FLAG;
138         }
139         if (gensec_setting_bool(gensec_security->settings, "gensec_gssapi", "delegation", true)) {
140                 gensec_gssapi_state->gss_want_flags |= GSS_C_DELEG_FLAG;
141         }
142         if (gensec_setting_bool(gensec_security->settings, "gensec_gssapi", "replay", true)) {
143                 gensec_gssapi_state->gss_want_flags |= GSS_C_REPLAY_FLAG;
144         }
145         if (gensec_setting_bool(gensec_security->settings, "gensec_gssapi", "sequence", true)) {
146                 gensec_gssapi_state->gss_want_flags |= GSS_C_SEQUENCE_FLAG;
147         }
148
149         if (gensec_security->want_features & GENSEC_FEATURE_SIGN) {
150                 gensec_gssapi_state->gss_want_flags |= GSS_C_INTEG_FLAG;
151         }
152         if (gensec_security->want_features & GENSEC_FEATURE_SEAL) {
153                 gensec_gssapi_state->gss_want_flags |= GSS_C_INTEG_FLAG;
154                 gensec_gssapi_state->gss_want_flags |= GSS_C_CONF_FLAG;
155         }
156         if (gensec_security->want_features & GENSEC_FEATURE_DCE_STYLE) {
157                 gensec_gssapi_state->gss_want_flags |= GSS_C_DCE_STYLE;
158         }
159
160         gensec_gssapi_state->gss_got_flags = 0;
161
162         switch (gensec_security->ops->auth_type) {
163         case DCERPC_AUTH_TYPE_SPNEGO:
164                 gensec_gssapi_state->gss_oid = gss_mech_spnego;
165                 break;
166         case DCERPC_AUTH_TYPE_KRB5:
167         default:
168                 gensec_gssapi_state->gss_oid = gss_mech_krb5;
169                 break;
170         }
171
172         ret = smb_krb5_init_context(gensec_gssapi_state,
173                                     NULL,
174                                     gensec_security->settings->lp_ctx,
175                                     &gensec_gssapi_state->smb_krb5_context);
176         if (ret) {
177                 DEBUG(1,("gensec_krb5_start: krb5_init_context failed (%s)\n",
178                          error_message(ret)));
179                 talloc_free(gensec_gssapi_state);
180                 return NT_STATUS_INTERNAL_ERROR;
181         }
182
183         gensec_gssapi_state->client_cred = NULL;
184         gensec_gssapi_state->server_cred = NULL;
185
186         gensec_gssapi_state->lucid = NULL;
187
188         gensec_gssapi_state->delegated_cred_handle = GSS_C_NO_CREDENTIAL;
189
190         gensec_gssapi_state->sasl = false;
191         gensec_gssapi_state->sasl_state = STAGE_GSS_NEG;
192         gensec_gssapi_state->sasl_protection = 0;
193
194         gensec_gssapi_state->max_wrap_buf_size
195                 = gensec_setting_int(gensec_security->settings, "gensec_gssapi", "max wrap buf size", 65536);
196         gensec_gssapi_state->gss_exchange_count = 0;
197         gensec_gssapi_state->sig_size = 0;
198
199         talloc_set_destructor(gensec_gssapi_state, gensec_gssapi_destructor);
200
201         realm = lpcfg_realm(gensec_security->settings->lp_ctx);
202         if (realm != NULL) {
203                 ret = gsskrb5_set_default_realm(realm);
204                 if (ret) {
205                         DEBUG(1,("gensec_krb5_start: gsskrb5_set_default_realm failed\n"));
206                         talloc_free(gensec_gssapi_state);
207                         return NT_STATUS_INTERNAL_ERROR;
208                 }
209         }
210
211         /* don't do DNS lookups of any kind, it might/will fail for a netbios name */
212         ret = gsskrb5_set_dns_canonicalize(gensec_setting_bool(gensec_security->settings, "krb5", "set_dns_canonicalize", false));
213         if (ret) {
214                 DEBUG(1,("gensec_krb5_start: gsskrb5_set_dns_canonicalize failed\n"));
215                 talloc_free(gensec_gssapi_state);
216                 return NT_STATUS_INTERNAL_ERROR;
217         }
218
219         return NT_STATUS_OK;
220 }
221
222 static NTSTATUS gensec_gssapi_server_start(struct gensec_security *gensec_security)
223 {
224         NTSTATUS nt_status;
225         int ret;
226         struct gensec_gssapi_state *gensec_gssapi_state;
227         struct cli_credentials *machine_account;
228         struct gssapi_creds_container *gcc;
229
230         nt_status = gensec_gssapi_start(gensec_security);
231         if (!NT_STATUS_IS_OK(nt_status)) {
232                 return nt_status;
233         }
234
235         gensec_gssapi_state = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
236
237         machine_account = gensec_get_credentials(gensec_security);
238         
239         if (!machine_account) {
240                 DEBUG(3, ("No machine account credentials specified\n"));
241                 return NT_STATUS_CANT_ACCESS_DOMAIN_INFO;
242         } else {
243                 ret = cli_credentials_get_server_gss_creds(machine_account, 
244                                                            gensec_security->settings->lp_ctx, &gcc);
245                 if (ret) {
246                         DEBUG(1, ("Aquiring acceptor credentials failed: %s\n", 
247                                   error_message(ret)));
248                         return NT_STATUS_CANT_ACCESS_DOMAIN_INFO;
249                 }
250         }
251
252         gensec_gssapi_state->server_cred = gcc;
253         return NT_STATUS_OK;
254
255 }
256
257 static NTSTATUS gensec_gssapi_sasl_server_start(struct gensec_security *gensec_security)
258 {
259         NTSTATUS nt_status;
260         struct gensec_gssapi_state *gensec_gssapi_state;
261         nt_status = gensec_gssapi_server_start(gensec_security);
262
263         if (NT_STATUS_IS_OK(nt_status)) {
264                 gensec_gssapi_state = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
265                 gensec_gssapi_state->sasl = true;
266         }
267         return nt_status;
268 }
269
270 static NTSTATUS gensec_gssapi_client_creds(struct gensec_security *gensec_security,
271                                            struct tevent_context *ev)
272 {
273         struct gensec_gssapi_state *gensec_gssapi_state;
274         struct gssapi_creds_container *gcc;
275         struct cli_credentials *creds = gensec_get_credentials(gensec_security);
276         const char *error_string;
277         int ret;
278
279         gensec_gssapi_state = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
280
281         /* Only run this the first time the update() call is made */
282         if (gensec_gssapi_state->client_cred) {
283                 return NT_STATUS_OK;
284         }
285
286         ret = cli_credentials_get_client_gss_creds(creds,
287                                                    ev,
288                                                    gensec_security->settings->lp_ctx, &gcc, &error_string);
289         switch (ret) {
290         case 0:
291                 break;
292         case EINVAL:
293                 DEBUG(3, ("Cannot obtain client GSS credentials we need to contact %s : %s\n", gensec_gssapi_state->target_principal, error_string));
294                 return NT_STATUS_INVALID_PARAMETER;
295         case KRB5KDC_ERR_PREAUTH_FAILED:
296         case KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN:
297                 DEBUG(1, ("Wrong username or password: %s\n", error_string));
298                 return NT_STATUS_LOGON_FAILURE;
299         case KRB5_KDC_UNREACH:
300                 DEBUG(3, ("Cannot reach a KDC we require to contact %s : %s\n", gensec_gssapi_state->target_principal, error_string));
301                 return NT_STATUS_NO_LOGON_SERVERS;
302         case KRB5_CC_NOTFOUND:
303         case KRB5_CC_END:
304                 DEBUG(2, ("Error obtaining ticket we require to contact %s: (possibly due to clock skew between us and the KDC) %s\n", gensec_gssapi_state->target_principal, error_string));
305                 return NT_STATUS_TIME_DIFFERENCE_AT_DC;
306         default:
307                 DEBUG(1, ("Aquiring initiator credentials failed: %s\n", error_string));
308                 return NT_STATUS_UNSUCCESSFUL;
309         }
310
311         gensec_gssapi_state->client_cred = gcc;
312         if (!talloc_reference(gensec_gssapi_state, gcc)) {
313                 return NT_STATUS_NO_MEMORY;
314         }
315
316         return NT_STATUS_OK;
317 }
318
319 static NTSTATUS gensec_gssapi_client_start(struct gensec_security *gensec_security)
320 {
321         struct gensec_gssapi_state *gensec_gssapi_state;
322         struct cli_credentials *creds = gensec_get_credentials(gensec_security);
323         NTSTATUS nt_status;
324         gss_buffer_desc name_token;
325         gss_OID name_type;
326         OM_uint32 maj_stat, min_stat;
327         const char *hostname = gensec_get_target_hostname(gensec_security);
328
329         if (!hostname) {
330                 DEBUG(1, ("Could not determine hostname for target computer, cannot use kerberos\n"));
331                 return NT_STATUS_INVALID_PARAMETER;
332         }
333         if (is_ipaddress(hostname)) {
334                 DEBUG(2, ("Cannot do GSSAPI to an IP address\n"));
335                 return NT_STATUS_INVALID_PARAMETER;
336         }
337         if (strcmp(hostname, "localhost") == 0) {
338                 DEBUG(2, ("GSSAPI to 'localhost' does not make sense\n"));
339                 return NT_STATUS_INVALID_PARAMETER;
340         }
341
342         nt_status = gensec_gssapi_start(gensec_security);
343         if (!NT_STATUS_IS_OK(nt_status)) {
344                 return nt_status;
345         }
346
347         gensec_gssapi_state = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
348
349         if (cli_credentials_get_impersonate_principal(creds)) {
350                 gensec_gssapi_state->gss_want_flags &= ~(GSS_C_DELEG_FLAG|GSS_C_DELEG_POLICY_FLAG);
351         }
352
353         gensec_gssapi_state->target_principal = gensec_get_target_principal(gensec_security);
354         if (gensec_gssapi_state->target_principal) {
355                 name_type = GSS_C_NULL_OID;
356         } else {
357                 gensec_gssapi_state->target_principal = talloc_asprintf(gensec_gssapi_state, "%s/%s@%s",
358                                             gensec_get_target_service(gensec_security), 
359                                             hostname, lpcfg_realm(gensec_security->settings->lp_ctx));
360
361                 name_type = GSS_C_NT_USER_NAME;
362         }
363         name_token.value  = discard_const_p(uint8_t, gensec_gssapi_state->target_principal);
364         name_token.length = strlen(gensec_gssapi_state->target_principal);
365
366
367         maj_stat = gss_import_name (&min_stat,
368                                     &name_token,
369                                     name_type,
370                                     &gensec_gssapi_state->server_name);
371         if (maj_stat) {
372                 DEBUG(2, ("GSS Import name of %s failed: %s\n",
373                           (char *)name_token.value,
374                           gssapi_error_string(gensec_gssapi_state, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
375                 return NT_STATUS_INVALID_PARAMETER;
376         }
377
378         return NT_STATUS_OK;
379 }
380
381 static NTSTATUS gensec_gssapi_sasl_client_start(struct gensec_security *gensec_security)
382 {
383         NTSTATUS nt_status;
384         struct gensec_gssapi_state *gensec_gssapi_state;
385         nt_status = gensec_gssapi_client_start(gensec_security);
386
387         if (NT_STATUS_IS_OK(nt_status)) {
388                 gensec_gssapi_state = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
389                 gensec_gssapi_state->sasl = true;
390         }
391         return nt_status;
392 }
393
394
395 /**
396  * Next state function for the GSSAPI GENSEC mechanism
397  * 
398  * @param gensec_gssapi_state GSSAPI State
399  * @param out_mem_ctx The TALLOC_CTX for *out to be allocated on
400  * @param in The request, as a DATA_BLOB
401  * @param out The reply, as an talloc()ed DATA_BLOB, on *out_mem_ctx
402  * @return Error, MORE_PROCESSING_REQUIRED if a reply is sent, 
403  *                or NT_STATUS_OK if the user is authenticated. 
404  */
405
406 static NTSTATUS gensec_gssapi_update(struct gensec_security *gensec_security, 
407                                      TALLOC_CTX *out_mem_ctx,
408                                      struct tevent_context *ev,
409                                      const DATA_BLOB in, DATA_BLOB *out)
410 {
411         struct gensec_gssapi_state *gensec_gssapi_state
412                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
413         NTSTATUS nt_status = NT_STATUS_LOGON_FAILURE;
414         OM_uint32 maj_stat, min_stat;
415         OM_uint32 min_stat2;
416         gss_buffer_desc input_token, output_token;
417         gss_OID gss_oid_p = NULL;
418         OM_uint32 time_rec = 0;
419         struct timeval tv;
420
421         input_token.length = in.length;
422         input_token.value = in.data;
423
424         switch (gensec_gssapi_state->sasl_state) {
425         case STAGE_GSS_NEG:
426         {
427                 switch (gensec_security->gensec_role) {
428                 case GENSEC_CLIENT:
429                 {
430                         struct gsskrb5_send_to_kdc send_to_kdc;
431                         krb5_error_code ret;
432
433                         nt_status = gensec_gssapi_client_creds(gensec_security, ev);
434                         if (!NT_STATUS_IS_OK(nt_status)) {
435                                 return nt_status;
436                         }
437
438 #ifdef SAMBA4_USES_HEIMDAL
439                         send_to_kdc.func = smb_krb5_send_and_recv_func;
440                         send_to_kdc.ptr = ev;
441 #endif
442
443                         min_stat = gsskrb5_set_send_to_kdc(&send_to_kdc);
444                         if (min_stat) {
445                                 DEBUG(1,("gensec_krb5_start: gsskrb5_set_send_to_kdc failed\n"));
446                                 return NT_STATUS_INTERNAL_ERROR;
447                         }
448
449                         maj_stat = gss_init_sec_context(&min_stat, 
450                                                         gensec_gssapi_state->client_cred->creds,
451                                                         &gensec_gssapi_state->gssapi_context, 
452                                                         gensec_gssapi_state->server_name, 
453                                                         gensec_gssapi_state->gss_oid,
454                                                         gensec_gssapi_state->gss_want_flags, 
455                                                         0, 
456                                                         gensec_gssapi_state->input_chan_bindings,
457                                                         &input_token, 
458                                                         &gss_oid_p,
459                                                         &output_token, 
460                                                         &gensec_gssapi_state->gss_got_flags, /* ret flags */
461                                                         &time_rec);
462                         if (gss_oid_p) {
463                                 gensec_gssapi_state->gss_oid = gss_oid_p;
464                         }
465
466 #ifdef SAMBA4_USES_HEIMDAL
467                         send_to_kdc.func = smb_krb5_send_and_recv_func;
468                         send_to_kdc.ptr = NULL;
469 #endif
470
471                         ret = gsskrb5_set_send_to_kdc(&send_to_kdc);
472                         if (ret) {
473                                 DEBUG(1,("gensec_krb5_start: gsskrb5_set_send_to_kdc failed\n"));
474                                 return NT_STATUS_INTERNAL_ERROR;
475                         }
476
477                         break;
478                 }
479                 case GENSEC_SERVER:
480                 {
481                         maj_stat = gss_accept_sec_context(&min_stat, 
482                                                           &gensec_gssapi_state->gssapi_context, 
483                                                           gensec_gssapi_state->server_cred->creds,
484                                                           &input_token, 
485                                                           gensec_gssapi_state->input_chan_bindings,
486                                                           &gensec_gssapi_state->client_name, 
487                                                           &gss_oid_p,
488                                                           &output_token, 
489                                                           &gensec_gssapi_state->gss_got_flags, 
490                                                           &time_rec,
491                                                           &gensec_gssapi_state->delegated_cred_handle);
492                         if (gss_oid_p) {
493                                 gensec_gssapi_state->gss_oid = gss_oid_p;
494                         }
495                         break;
496                 }
497                 default:
498                         return NT_STATUS_INVALID_PARAMETER;
499                         
500                 }
501
502                 gensec_gssapi_state->gss_exchange_count++;
503
504                 if (maj_stat == GSS_S_COMPLETE) {
505                         *out = data_blob_talloc(out_mem_ctx, output_token.value, output_token.length);
506                         gss_release_buffer(&min_stat2, &output_token);
507                         
508                         if (gensec_gssapi_state->gss_got_flags & GSS_C_DELEG_FLAG) {
509                                 DEBUG(5, ("gensec_gssapi: credentials were delegated\n"));
510                         } else {
511                                 DEBUG(5, ("gensec_gssapi: NO credentials were delegated\n"));
512                         }
513
514                         tv = timeval_current_ofs(time_rec, 0);
515                         gensec_gssapi_state->expire_time = timeval_to_nttime(&tv);
516
517                         /* We may have been invoked as SASL, so there
518                          * is more work to do */
519                         if (gensec_gssapi_state->sasl) {
520                                 gensec_gssapi_state->sasl_state = STAGE_SASL_SSF_NEG;
521                                 return NT_STATUS_MORE_PROCESSING_REQUIRED;
522                         } else {
523                                 gensec_gssapi_state->sasl_state = STAGE_DONE;
524
525                                 if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
526                                         DEBUG(5, ("GSSAPI Connection will be cryptographically sealed\n"));
527                                 } else if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
528                                         DEBUG(5, ("GSSAPI Connection will be cryptographically signed\n"));
529                                 } else {
530                                         DEBUG(5, ("GSSAPI Connection will have no cryptographic protection\n"));
531                                 }
532
533                                 return NT_STATUS_OK;
534                         }
535                 } else if (maj_stat == GSS_S_CONTINUE_NEEDED) {
536                         *out = data_blob_talloc(out_mem_ctx, output_token.value, output_token.length);
537                         gss_release_buffer(&min_stat2, &output_token);
538                         
539                         return NT_STATUS_MORE_PROCESSING_REQUIRED;
540                 } else if (maj_stat == GSS_S_CONTEXT_EXPIRED) {
541                         gss_cred_id_t creds;
542                         gss_name_t name;
543                         gss_buffer_desc buffer;
544                         OM_uint32 lifetime = 0;
545                         gss_cred_usage_t usage;
546                         const char *role = NULL;
547                         DEBUG(0, ("GSS %s Update(krb5)(%d) Update failed, credentials expired during GSSAPI handshake!\n",
548                                   role,
549                                   gensec_gssapi_state->gss_exchange_count));
550
551                         
552                         switch (gensec_security->gensec_role) {
553                         case GENSEC_CLIENT:
554                                 creds = gensec_gssapi_state->client_cred->creds;
555                                 role = "client";
556                         case GENSEC_SERVER:
557                                 creds = gensec_gssapi_state->server_cred->creds;
558                                 role = "server";
559                         }
560
561                         maj_stat = gss_inquire_cred(&min_stat, 
562                                                     creds,
563                                                     &name, &lifetime, &usage, NULL);
564
565                         if (maj_stat == GSS_S_COMPLETE) {
566                                 const char *usage_string;
567                                 switch (usage) {
568                                 case GSS_C_BOTH:
569                                         usage_string = "GSS_C_BOTH";
570                                         break;
571                                 case GSS_C_ACCEPT:
572                                         usage_string = "GSS_C_ACCEPT";
573                                         break;
574                                 case GSS_C_INITIATE:
575                                         usage_string = "GSS_C_INITIATE";
576                                         break;
577                                 }
578                                 maj_stat = gss_display_name(&min_stat, name, &buffer, NULL);
579                                 if (maj_stat) {
580                                         buffer.value = NULL;
581                                         buffer.length = 0;
582                                 }
583                                 if (lifetime > 0) {
584                                         DEBUG(0, ("GSSAPI gss_inquire_cred indicates expiry of %*.*s in %u sec for %s\n", 
585                                                   (int)buffer.length, (int)buffer.length, (char *)buffer.value, 
586                                                   lifetime, usage_string));
587                                 } else {
588                                         DEBUG(0, ("GSSAPI gss_inquire_cred indicates %*.*s has already expired for %s\n", 
589                                                   (int)buffer.length, (int)buffer.length, (char *)buffer.value, 
590                                                   usage_string));
591                                 }
592                                 gss_release_buffer(&min_stat, &buffer);
593                                 gss_release_name(&min_stat, &name);
594                         } else if (maj_stat != GSS_S_COMPLETE) {
595                                 DEBUG(0, ("inquiry of credential lifefime via GSSAPI gss_inquire_cred failed: %s\n",
596                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
597                         }
598                         return NT_STATUS_INVALID_PARAMETER;
599                 } else if (gss_oid_equal(gensec_gssapi_state->gss_oid, gss_mech_krb5)) {
600                         switch (min_stat) {
601                         case KRB5KRB_AP_ERR_TKT_NYV:
602                                 DEBUG(1, ("Error with ticket to contact %s: possible clock skew between us and the KDC or target server: %s\n",
603                                           gensec_gssapi_state->target_principal,
604                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
605                                 return NT_STATUS_TIME_DIFFERENCE_AT_DC; /* Make SPNEGO ignore us, we can't go any further here */
606                         case KRB5KRB_AP_ERR_TKT_EXPIRED:
607                                 DEBUG(1, ("Error with ticket to contact %s: ticket is expired, possible clock skew between us and the KDC or target server: %s\n",
608                                           gensec_gssapi_state->target_principal,
609                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
610                                 return NT_STATUS_INVALID_PARAMETER; /* Make SPNEGO ignore us, we can't go any further here */
611                         case KRB5_KDC_UNREACH:
612                                 DEBUG(3, ("Cannot reach a KDC we require in order to obtain a ticetk to %s: %s\n",
613                                           gensec_gssapi_state->target_principal,
614                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
615                                 return NT_STATUS_NO_LOGON_SERVERS; /* Make SPNEGO ignore us, we can't go any further here */
616                         case KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN:
617                                 DEBUG(3, ("Server %s is not registered with our KDC: %s\n",
618                                           gensec_gssapi_state->target_principal,
619                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
620                                 return NT_STATUS_INVALID_PARAMETER; /* Make SPNEGO ignore us, we can't go any further here */
621                         case KRB5KRB_AP_ERR_MSG_TYPE:
622                                 /* garbage input, possibly from the auto-mech detection */
623                                 return NT_STATUS_INVALID_PARAMETER;
624                         default:
625                                 DEBUG(1, ("GSS %s Update(krb5)(%d) Update failed: %s\n",
626                                           gensec_security->gensec_role == GENSEC_CLIENT ? "client" : "server",
627                                           gensec_gssapi_state->gss_exchange_count,
628                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
629                                 return nt_status;
630                         }
631                 } else {
632                         DEBUG(1, ("GSS %s Update(%d) failed: %s\n",
633                                   gensec_security->gensec_role == GENSEC_CLIENT ? "client" : "server",
634                                   gensec_gssapi_state->gss_exchange_count,
635                                   gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
636                         return nt_status;
637                 }
638                 break;
639         }
640
641         /* These last two stages are only done if we were invoked as SASL */
642         case STAGE_SASL_SSF_NEG:
643         {
644                 switch (gensec_security->gensec_role) {
645                 case GENSEC_CLIENT:
646                 {
647                         uint8_t maxlength_proposed[4]; 
648                         uint8_t maxlength_accepted[4]; 
649                         uint8_t security_supported;
650                         int conf_state;
651                         gss_qop_t qop_state;
652                         input_token.length = in.length;
653                         input_token.value = in.data;
654
655                         /* As a client, we have just send a
656                          * zero-length blob to the server (after the
657                          * normal GSSAPI exchange), and it has replied
658                          * with it's SASL negotiation */
659                         
660                         maj_stat = gss_unwrap(&min_stat, 
661                                               gensec_gssapi_state->gssapi_context, 
662                                               &input_token,
663                                               &output_token, 
664                                               &conf_state,
665                                               &qop_state);
666                         if (GSS_ERROR(maj_stat)) {
667                                 DEBUG(1, ("gensec_gssapi_update: GSS UnWrap of SASL protection negotiation failed: %s\n", 
668                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
669                                 return NT_STATUS_ACCESS_DENIED;
670                         }
671                         
672                         if (output_token.length < 4) {
673                                 return NT_STATUS_INVALID_PARAMETER;
674                         }
675
676                         memcpy(maxlength_proposed, output_token.value, 4);
677                         gss_release_buffer(&min_stat, &output_token);
678
679                         /* first byte is the proposed security */
680                         security_supported = maxlength_proposed[0];
681                         maxlength_proposed[0] = '\0';
682                         
683                         /* Rest is the proposed max wrap length */
684                         gensec_gssapi_state->max_wrap_buf_size = MIN(RIVAL(maxlength_proposed, 0), 
685                                                                      gensec_gssapi_state->max_wrap_buf_size);
686                         gensec_gssapi_state->sasl_protection = 0;
687                         if (security_supported & NEG_SEAL) {
688                                 if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
689                                         gensec_gssapi_state->sasl_protection |= NEG_SEAL;
690                                 }
691                         }
692                         if (security_supported & NEG_SIGN) {
693                                 if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
694                                         gensec_gssapi_state->sasl_protection |= NEG_SIGN;
695                                 }
696                         }
697                         if (security_supported & NEG_NONE) {
698                                 gensec_gssapi_state->sasl_protection |= NEG_NONE;
699                         }
700                         if (gensec_gssapi_state->sasl_protection == 0) {
701                                 DEBUG(1, ("Remote server does not support unprotected connections\n"));
702                                 return NT_STATUS_ACCESS_DENIED;
703                         }
704
705                         /* Send back the negotiated max length */
706
707                         RSIVAL(maxlength_accepted, 0, gensec_gssapi_state->max_wrap_buf_size);
708
709                         maxlength_accepted[0] = gensec_gssapi_state->sasl_protection;
710                         
711                         input_token.value = maxlength_accepted;
712                         input_token.length = sizeof(maxlength_accepted);
713
714                         maj_stat = gss_wrap(&min_stat, 
715                                             gensec_gssapi_state->gssapi_context, 
716                                             false,
717                                             GSS_C_QOP_DEFAULT,
718                                             &input_token,
719                                             &conf_state,
720                                             &output_token);
721                         if (GSS_ERROR(maj_stat)) {
722                                 DEBUG(1, ("GSS Update(SSF_NEG): GSS Wrap failed: %s\n", 
723                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
724                                 return NT_STATUS_ACCESS_DENIED;
725                         }
726                         
727                         *out = data_blob_talloc(out_mem_ctx, output_token.value, output_token.length);
728                         gss_release_buffer(&min_stat, &output_token);
729
730                         /* quirk:  This changes the value that gensec_have_feature returns, to be that after SASL negotiation */
731                         gensec_gssapi_state->sasl_state = STAGE_DONE;
732
733                         if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
734                                 DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographically sealed\n"));
735                         } else if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
736                                 DEBUG(3, ("SASL/GSSAPI Connection to server will be cryptographically signed\n"));
737                         } else {
738                                 DEBUG(3, ("SASL/GSSAPI Connection to server will have no cryptographically protection\n"));
739                         }
740
741                         return NT_STATUS_OK;
742                 }
743                 case GENSEC_SERVER:
744                 {
745                         uint8_t maxlength_proposed[4]; 
746                         uint8_t security_supported = 0x0;
747                         int conf_state;
748
749                         /* As a server, we have just been sent a zero-length blob (note this, but it isn't fatal) */
750                         if (in.length != 0) {
751                                 DEBUG(1, ("SASL/GSSAPI: client sent non-zero length starting SASL negotiation!\n"));
752                         }
753                         
754                         /* Give the client some idea what we will support */
755                           
756                         RSIVAL(maxlength_proposed, 0, gensec_gssapi_state->max_wrap_buf_size);
757                         /* first byte is the proposed security */
758                         maxlength_proposed[0] = '\0';
759                         
760                         gensec_gssapi_state->sasl_protection = 0;
761                         if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
762                                 security_supported |= NEG_SEAL;
763                         } 
764                         if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
765                                 security_supported |= NEG_SIGN;
766                         }
767                         if (security_supported == 0) {
768                                 /* If we don't support anything, this must be 0 */
769                                 RSIVAL(maxlength_proposed, 0, 0x0);
770                         }
771
772                         /* TODO:  We may not wish to support this */
773                         security_supported |= NEG_NONE;
774                         maxlength_proposed[0] = security_supported;
775                         
776                         input_token.value = maxlength_proposed;
777                         input_token.length = sizeof(maxlength_proposed);
778
779                         maj_stat = gss_wrap(&min_stat, 
780                                             gensec_gssapi_state->gssapi_context, 
781                                             false,
782                                             GSS_C_QOP_DEFAULT,
783                                             &input_token,
784                                             &conf_state,
785                                             &output_token);
786                         if (GSS_ERROR(maj_stat)) {
787                                 DEBUG(1, ("GSS Update(SSF_NEG): GSS Wrap failed: %s\n", 
788                                           gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
789                                 return NT_STATUS_ACCESS_DENIED;
790                         }
791                         
792                         *out = data_blob_talloc(out_mem_ctx, output_token.value, output_token.length);
793                         gss_release_buffer(&min_stat, &output_token);
794
795                         gensec_gssapi_state->sasl_state = STAGE_SASL_SSF_ACCEPT;
796                         return NT_STATUS_MORE_PROCESSING_REQUIRED;
797                 }
798                 default:
799                         return NT_STATUS_INVALID_PARAMETER;
800                         
801                 }
802         }
803         /* This is s server-only stage */
804         case STAGE_SASL_SSF_ACCEPT:
805         {
806                 uint8_t maxlength_accepted[4]; 
807                 uint8_t security_accepted;
808                 int conf_state;
809                 gss_qop_t qop_state;
810                 input_token.length = in.length;
811                 input_token.value = in.data;
812                         
813                 maj_stat = gss_unwrap(&min_stat, 
814                                       gensec_gssapi_state->gssapi_context, 
815                                       &input_token,
816                                       &output_token, 
817                                       &conf_state,
818                                       &qop_state);
819                 if (GSS_ERROR(maj_stat)) {
820                         DEBUG(1, ("gensec_gssapi_update: GSS UnWrap of SASL protection negotiation failed: %s\n", 
821                                   gssapi_error_string(out_mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
822                         return NT_STATUS_ACCESS_DENIED;
823                 }
824                         
825                 if (output_token.length < 4) {
826                         return NT_STATUS_INVALID_PARAMETER;
827                 }
828
829                 memcpy(maxlength_accepted, output_token.value, 4);
830                 gss_release_buffer(&min_stat, &output_token);
831                 
832                 /* first byte is the proposed security */
833                 security_accepted = maxlength_accepted[0];
834                 maxlength_accepted[0] = '\0';
835
836                 /* Rest is the proposed max wrap length */
837                 gensec_gssapi_state->max_wrap_buf_size = MIN(RIVAL(maxlength_accepted, 0), 
838                                                              gensec_gssapi_state->max_wrap_buf_size);
839
840                 gensec_gssapi_state->sasl_protection = 0;
841                 if (security_accepted & NEG_SEAL) {
842                         if (!gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
843                                 DEBUG(1, ("Remote client wanted seal, but gensec refused\n"));
844                                 return NT_STATUS_ACCESS_DENIED;
845                         }
846                         gensec_gssapi_state->sasl_protection |= NEG_SEAL;
847                 }
848                 if (security_accepted & NEG_SIGN) {
849                         if (!gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
850                                 DEBUG(1, ("Remote client wanted sign, but gensec refused\n"));
851                                 return NT_STATUS_ACCESS_DENIED;
852                         }
853                         gensec_gssapi_state->sasl_protection |= NEG_SIGN;
854                 }
855                 if (security_accepted & NEG_NONE) {
856                         gensec_gssapi_state->sasl_protection |= NEG_NONE;
857                 }
858
859                 /* quirk:  This changes the value that gensec_have_feature returns, to be that after SASL negotiation */
860                 gensec_gssapi_state->sasl_state = STAGE_DONE;
861                 if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)) {
862                         DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographically sealed\n"));
863                 } else if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SIGN)) {
864                         DEBUG(5, ("SASL/GSSAPI Connection from client will be cryptographically signed\n"));
865                 } else {
866                         DEBUG(5, ("SASL/GSSAPI Connection from client will have no cryptographic protection\n"));
867                 }
868
869                 *out = data_blob(NULL, 0);
870                 return NT_STATUS_OK;    
871         }
872         default:
873                 return NT_STATUS_INVALID_PARAMETER;
874         }
875 }
876
877 static NTSTATUS gensec_gssapi_wrap(struct gensec_security *gensec_security, 
878                                    TALLOC_CTX *mem_ctx, 
879                                    const DATA_BLOB *in, 
880                                    DATA_BLOB *out)
881 {
882         struct gensec_gssapi_state *gensec_gssapi_state
883                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
884         OM_uint32 maj_stat, min_stat;
885         gss_buffer_desc input_token, output_token;
886         int conf_state;
887         input_token.length = in->length;
888         input_token.value = in->data;
889
890         maj_stat = gss_wrap(&min_stat, 
891                             gensec_gssapi_state->gssapi_context, 
892                             gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL),
893                             GSS_C_QOP_DEFAULT,
894                             &input_token,
895                             &conf_state,
896                             &output_token);
897         if (GSS_ERROR(maj_stat)) {
898                 DEBUG(1, ("gensec_gssapi_wrap: GSS Wrap failed: %s\n", 
899                           gssapi_error_string(mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
900                 return NT_STATUS_ACCESS_DENIED;
901         }
902
903         *out = data_blob_talloc(mem_ctx, output_token.value, output_token.length);
904         gss_release_buffer(&min_stat, &output_token);
905
906         if (gensec_gssapi_state->sasl) {
907                 size_t max_wrapped_size = gensec_gssapi_max_wrapped_size(gensec_security);
908                 if (max_wrapped_size < out->length) {
909                         DEBUG(1, ("gensec_gssapi_wrap: when wrapped, INPUT data (%u) is grew to be larger than SASL negotiated maximum output size (%u > %u)\n",
910                                   (unsigned)in->length, 
911                                   (unsigned)out->length, 
912                                   (unsigned int)max_wrapped_size));
913                         return NT_STATUS_INVALID_PARAMETER;
914                 }
915         }
916         
917         if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)
918             && !conf_state) {
919                 return NT_STATUS_ACCESS_DENIED;
920         }
921         return NT_STATUS_OK;
922 }
923
924 static NTSTATUS gensec_gssapi_unwrap(struct gensec_security *gensec_security, 
925                                      TALLOC_CTX *mem_ctx, 
926                                      const DATA_BLOB *in, 
927                                      DATA_BLOB *out)
928 {
929         struct gensec_gssapi_state *gensec_gssapi_state
930                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
931         OM_uint32 maj_stat, min_stat;
932         gss_buffer_desc input_token, output_token;
933         int conf_state;
934         gss_qop_t qop_state;
935         input_token.length = in->length;
936         input_token.value = in->data;
937         
938         if (gensec_gssapi_state->sasl) {
939                 size_t max_wrapped_size = gensec_gssapi_max_wrapped_size(gensec_security);
940                 if (max_wrapped_size < in->length) {
941                         DEBUG(1, ("gensec_gssapi_unwrap: WRAPPED data is larger than SASL negotiated maximum size\n"));
942                         return NT_STATUS_INVALID_PARAMETER;
943                 }
944         }
945         
946         maj_stat = gss_unwrap(&min_stat, 
947                               gensec_gssapi_state->gssapi_context, 
948                               &input_token,
949                               &output_token, 
950                               &conf_state,
951                               &qop_state);
952         if (GSS_ERROR(maj_stat)) {
953                 DEBUG(1, ("gensec_gssapi_unwrap: GSS UnWrap failed: %s\n", 
954                           gssapi_error_string(mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
955                 return NT_STATUS_ACCESS_DENIED;
956         }
957
958         *out = data_blob_talloc(mem_ctx, output_token.value, output_token.length);
959         gss_release_buffer(&min_stat, &output_token);
960         
961         if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)
962             && !conf_state) {
963                 return NT_STATUS_ACCESS_DENIED;
964         }
965         return NT_STATUS_OK;
966 }
967
968 /* Find out the maximum input size negotiated on this connection */
969
970 static size_t gensec_gssapi_max_input_size(struct gensec_security *gensec_security) 
971 {
972         struct gensec_gssapi_state *gensec_gssapi_state
973                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
974         OM_uint32 maj_stat, min_stat;
975         OM_uint32 max_input_size;
976
977         maj_stat = gss_wrap_size_limit(&min_stat, 
978                                        gensec_gssapi_state->gssapi_context,
979                                        gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL),
980                                        GSS_C_QOP_DEFAULT,
981                                        gensec_gssapi_state->max_wrap_buf_size,
982                                        &max_input_size);
983         if (GSS_ERROR(maj_stat)) {
984                 TALLOC_CTX *mem_ctx = talloc_new(NULL); 
985                 DEBUG(1, ("gensec_gssapi_max_input_size: determinaing signature size with gss_wrap_size_limit failed: %s\n", 
986                           gssapi_error_string(mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
987                 talloc_free(mem_ctx);
988                 return 0;
989         }
990
991         return max_input_size;
992 }
993
994 /* Find out the maximum output size negotiated on this connection */
995 static size_t gensec_gssapi_max_wrapped_size(struct gensec_security *gensec_security) 
996 {
997         struct gensec_gssapi_state *gensec_gssapi_state = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);;
998         return gensec_gssapi_state->max_wrap_buf_size;
999 }
1000
1001 static NTSTATUS gensec_gssapi_seal_packet(struct gensec_security *gensec_security, 
1002                                           TALLOC_CTX *mem_ctx, 
1003                                           uint8_t *data, size_t length, 
1004                                           const uint8_t *whole_pdu, size_t pdu_length, 
1005                                           DATA_BLOB *sig)
1006 {
1007         struct gensec_gssapi_state *gensec_gssapi_state
1008                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1009         OM_uint32 maj_stat, min_stat;
1010         gss_buffer_desc input_token, output_token;
1011         int conf_state;
1012         ssize_t sig_length;
1013
1014         input_token.length = length;
1015         input_token.value = data;
1016         
1017         maj_stat = gss_wrap(&min_stat, 
1018                             gensec_gssapi_state->gssapi_context,
1019                             gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL),
1020                             GSS_C_QOP_DEFAULT,
1021                             &input_token,
1022                             &conf_state,
1023                             &output_token);
1024         if (GSS_ERROR(maj_stat)) {
1025                 DEBUG(1, ("gensec_gssapi_seal_packet: GSS Wrap failed: %s\n", 
1026                           gssapi_error_string(mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
1027                 return NT_STATUS_ACCESS_DENIED;
1028         }
1029
1030         if (output_token.length < input_token.length) {
1031                 DEBUG(1, ("gensec_gssapi_seal_packet: GSS Wrap length [%ld] *less* than caller length [%ld]\n", 
1032                           (long)output_token.length, (long)length));
1033                 return NT_STATUS_INTERNAL_ERROR;
1034         }
1035         sig_length = output_token.length - input_token.length;
1036
1037         memcpy(data, ((uint8_t *)output_token.value) + sig_length, length);
1038         *sig = data_blob_talloc(mem_ctx, (uint8_t *)output_token.value, sig_length);
1039
1040         dump_data_pw("gensec_gssapi_seal_packet: sig\n", sig->data, sig->length);
1041         dump_data_pw("gensec_gssapi_seal_packet: clear\n", data, length);
1042         dump_data_pw("gensec_gssapi_seal_packet: sealed\n", ((uint8_t *)output_token.value) + sig_length, output_token.length - sig_length);
1043
1044         gss_release_buffer(&min_stat, &output_token);
1045
1046         if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)
1047             && !conf_state) {
1048                 return NT_STATUS_ACCESS_DENIED;
1049         }
1050         return NT_STATUS_OK;
1051 }
1052
1053 static NTSTATUS gensec_gssapi_unseal_packet(struct gensec_security *gensec_security, 
1054                                             uint8_t *data, size_t length, 
1055                                             const uint8_t *whole_pdu, size_t pdu_length,
1056                                             const DATA_BLOB *sig)
1057 {
1058         struct gensec_gssapi_state *gensec_gssapi_state
1059                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1060         OM_uint32 maj_stat, min_stat;
1061         gss_buffer_desc input_token, output_token;
1062         int conf_state;
1063         gss_qop_t qop_state;
1064         DATA_BLOB in;
1065
1066         dump_data_pw("gensec_gssapi_unseal_packet: sig\n", sig->data, sig->length);
1067
1068         in = data_blob_talloc(gensec_security, NULL, sig->length + length);
1069
1070         memcpy(in.data, sig->data, sig->length);
1071         memcpy(in.data + sig->length, data, length);
1072
1073         input_token.length = in.length;
1074         input_token.value = in.data;
1075         
1076         maj_stat = gss_unwrap(&min_stat, 
1077                               gensec_gssapi_state->gssapi_context, 
1078                               &input_token,
1079                               &output_token, 
1080                               &conf_state,
1081                               &qop_state);
1082         talloc_free(in.data);
1083         if (GSS_ERROR(maj_stat)) {
1084                 char *error_string = gssapi_error_string(NULL, maj_stat, min_stat, gensec_gssapi_state->gss_oid);
1085                 DEBUG(1, ("gensec_gssapi_unseal_packet: GSS UnWrap failed: %s\n", 
1086                           error_string));
1087                 talloc_free(error_string);
1088                 return NT_STATUS_ACCESS_DENIED;
1089         }
1090
1091         if (output_token.length != length) {
1092                 return NT_STATUS_INTERNAL_ERROR;
1093         }
1094
1095         memcpy(data, output_token.value, length);
1096
1097         gss_release_buffer(&min_stat, &output_token);
1098         
1099         if (gensec_have_feature(gensec_security, GENSEC_FEATURE_SEAL)
1100             && !conf_state) {
1101                 return NT_STATUS_ACCESS_DENIED;
1102         }
1103         return NT_STATUS_OK;
1104 }
1105
1106 static NTSTATUS gensec_gssapi_sign_packet(struct gensec_security *gensec_security, 
1107                                           TALLOC_CTX *mem_ctx, 
1108                                           const uint8_t *data, size_t length, 
1109                                           const uint8_t *whole_pdu, size_t pdu_length, 
1110                                           DATA_BLOB *sig)
1111 {
1112         struct gensec_gssapi_state *gensec_gssapi_state
1113                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1114         OM_uint32 maj_stat, min_stat;
1115         gss_buffer_desc input_token, output_token;
1116
1117         if (gensec_security->want_features & GENSEC_FEATURE_SIGN_PKT_HEADER) {
1118                 input_token.length = pdu_length;
1119                 input_token.value = discard_const_p(uint8_t *, whole_pdu);
1120         } else {
1121                 input_token.length = length;
1122                 input_token.value = discard_const_p(uint8_t *, data);
1123         }
1124
1125         maj_stat = gss_get_mic(&min_stat,
1126                             gensec_gssapi_state->gssapi_context,
1127                             GSS_C_QOP_DEFAULT,
1128                             &input_token,
1129                             &output_token);
1130         if (GSS_ERROR(maj_stat)) {
1131                 DEBUG(1, ("GSS GetMic failed: %s\n",
1132                           gssapi_error_string(mem_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
1133                 return NT_STATUS_ACCESS_DENIED;
1134         }
1135
1136         *sig = data_blob_talloc(mem_ctx, (uint8_t *)output_token.value, output_token.length);
1137
1138         dump_data_pw("gensec_gssapi_seal_packet: sig\n", sig->data, sig->length);
1139
1140         gss_release_buffer(&min_stat, &output_token);
1141
1142         return NT_STATUS_OK;
1143 }
1144
1145 static NTSTATUS gensec_gssapi_check_packet(struct gensec_security *gensec_security, 
1146                                            const uint8_t *data, size_t length, 
1147                                            const uint8_t *whole_pdu, size_t pdu_length, 
1148                                            const DATA_BLOB *sig)
1149 {
1150         struct gensec_gssapi_state *gensec_gssapi_state
1151                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1152         OM_uint32 maj_stat, min_stat;
1153         gss_buffer_desc input_token;
1154         gss_buffer_desc input_message;
1155         gss_qop_t qop_state;
1156
1157         dump_data_pw("gensec_gssapi_seal_packet: sig\n", sig->data, sig->length);
1158
1159         if (gensec_security->want_features & GENSEC_FEATURE_SIGN_PKT_HEADER) {
1160                 input_message.length = pdu_length;
1161                 input_message.value = discard_const(whole_pdu);
1162         } else {
1163                 input_message.length = length;
1164                 input_message.value = discard_const(data);
1165         }
1166
1167         input_token.length = sig->length;
1168         input_token.value = sig->data;
1169
1170         maj_stat = gss_verify_mic(&min_stat,
1171                               gensec_gssapi_state->gssapi_context, 
1172                               &input_message,
1173                               &input_token,
1174                               &qop_state);
1175         if (GSS_ERROR(maj_stat)) {
1176                 char *error_string = gssapi_error_string(NULL, maj_stat, min_stat, gensec_gssapi_state->gss_oid);
1177                 DEBUG(1, ("GSS VerifyMic failed: %s\n", error_string));
1178                 talloc_free(error_string);
1179
1180                 return NT_STATUS_ACCESS_DENIED;
1181         }
1182
1183         return NT_STATUS_OK;
1184 }
1185
1186 /* Try to figure out what features we actually got on the connection */
1187 static bool gensec_gssapi_have_feature(struct gensec_security *gensec_security, 
1188                                        uint32_t feature) 
1189 {
1190         struct gensec_gssapi_state *gensec_gssapi_state
1191                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1192         if (feature & GENSEC_FEATURE_SIGN) {
1193                 /* If we are going GSSAPI SASL, then we honour the second negotiation */
1194                 if (gensec_gssapi_state->sasl 
1195                     && gensec_gssapi_state->sasl_state == STAGE_DONE) {
1196                         return ((gensec_gssapi_state->sasl_protection & NEG_SIGN) 
1197                                 && (gensec_gssapi_state->gss_got_flags & GSS_C_INTEG_FLAG));
1198                 }
1199                 return gensec_gssapi_state->gss_got_flags & GSS_C_INTEG_FLAG;
1200         }
1201         if (feature & GENSEC_FEATURE_SEAL) {
1202                 /* If we are going GSSAPI SASL, then we honour the second negotiation */
1203                 if (gensec_gssapi_state->sasl 
1204                     && gensec_gssapi_state->sasl_state == STAGE_DONE) {
1205                         return ((gensec_gssapi_state->sasl_protection & NEG_SEAL) 
1206                                  && (gensec_gssapi_state->gss_got_flags & GSS_C_CONF_FLAG));
1207                 }
1208                 return gensec_gssapi_state->gss_got_flags & GSS_C_CONF_FLAG;
1209         }
1210         if (feature & GENSEC_FEATURE_SESSION_KEY) {
1211                 /* Only for GSSAPI/Krb5 */
1212                 if (gss_oid_equal(gensec_gssapi_state->gss_oid, gss_mech_krb5)) {
1213                         return true;
1214                 }
1215         }
1216         if (feature & GENSEC_FEATURE_DCE_STYLE) {
1217                 return gensec_gssapi_state->gss_got_flags & GSS_C_DCE_STYLE;
1218         }
1219         if (feature & GENSEC_FEATURE_NEW_SPNEGO) {
1220                 NTSTATUS status;
1221                 uint32_t keytype;
1222
1223                 if (!(gensec_gssapi_state->gss_got_flags & GSS_C_INTEG_FLAG)) {
1224                         return false;
1225                 }
1226
1227                 if (gensec_setting_bool(gensec_security->settings, "gensec_gssapi", "force_new_spnego", false)) {
1228                         return true;
1229                 }
1230                 if (gensec_setting_bool(gensec_security->settings, "gensec_gssapi", "disable_new_spnego", false)) {
1231                         return false;
1232                 }
1233
1234                 status = gssapi_get_session_key(gensec_gssapi_state,
1235                                                 gensec_gssapi_state->gssapi_context, NULL, &keytype);
1236                 /* 
1237                  * We should do a proper sig on the mechListMic unless
1238                  * we know we have to be backwards compatible with
1239                  * earlier windows versions.  
1240                  * 
1241                  * Negotiating a non-krb5
1242                  * mech for example should be regarded as having
1243                  * NEW_SPNEGO
1244                  */
1245                 if (NT_STATUS_IS_OK(status)) {
1246                         switch (keytype) {
1247                         case ENCTYPE_DES_CBC_CRC:
1248                         case ENCTYPE_DES_CBC_MD5:
1249                         case ENCTYPE_ARCFOUR_HMAC:
1250                         case ENCTYPE_DES3_CBC_SHA1:
1251                                 return false;
1252                         }
1253                 }
1254                 return true;
1255         }
1256         /* We can always do async (rather than strict request/reply) packets.  */
1257         if (feature & GENSEC_FEATURE_ASYNC_REPLIES) {
1258                 return true;
1259         }
1260         return false;
1261 }
1262
1263 /*
1264  * Extract the 'sesssion key' needed by SMB signing and ncacn_np 
1265  * (for encrypting some passwords).
1266  * 
1267  * This breaks all the abstractions, but what do you expect...
1268  */
1269 static NTSTATUS gensec_gssapi_session_key(struct gensec_security *gensec_security, 
1270                                           TALLOC_CTX *mem_ctx,
1271                                           DATA_BLOB *session_key) 
1272 {
1273         struct gensec_gssapi_state *gensec_gssapi_state
1274                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1275         return gssapi_get_session_key(mem_ctx, gensec_gssapi_state->gssapi_context, session_key, NULL);
1276 }
1277
1278 /* Get some basic (and authorization) information about the user on
1279  * this session.  This uses either the PAC (if present) or a local
1280  * database lookup */
1281 static NTSTATUS gensec_gssapi_session_info(struct gensec_security *gensec_security,
1282                                            TALLOC_CTX *mem_ctx,
1283                                            struct auth_session_info **_session_info) 
1284 {
1285         NTSTATUS nt_status;
1286         TALLOC_CTX *tmp_ctx;
1287         struct gensec_gssapi_state *gensec_gssapi_state
1288                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1289         struct auth_session_info *session_info = NULL;
1290         OM_uint32 maj_stat, min_stat;
1291         DATA_BLOB pac_blob, *pac_blob_ptr = NULL;
1292
1293         gss_buffer_desc name_token;
1294         char *principal_string;
1295         
1296         tmp_ctx = talloc_named(mem_ctx, 0, "gensec_gssapi_session_info context");
1297         NT_STATUS_HAVE_NO_MEMORY(tmp_ctx);
1298
1299         maj_stat = gss_display_name (&min_stat,
1300                                      gensec_gssapi_state->client_name,
1301                                      &name_token,
1302                                      NULL);
1303         if (GSS_ERROR(maj_stat)) {
1304                 DEBUG(1, ("GSS display_name failed: %s\n",
1305                           gssapi_error_string(tmp_ctx, maj_stat, min_stat, gensec_gssapi_state->gss_oid)));
1306                 talloc_free(tmp_ctx);
1307                 return NT_STATUS_FOOBAR;
1308         }
1309
1310         principal_string = talloc_strndup(tmp_ctx,
1311                                           (const char *)name_token.value,
1312                                           name_token.length);
1313
1314         gss_release_buffer(&min_stat, &name_token);
1315
1316         if (!principal_string) {
1317                 talloc_free(tmp_ctx);
1318                 return NT_STATUS_NO_MEMORY;
1319         }
1320
1321         nt_status = gssapi_obtain_pac_blob(tmp_ctx,  gensec_gssapi_state->gssapi_context,
1322                                            gensec_gssapi_state->client_name,
1323                                            &pac_blob);
1324         
1325         /* IF we have the PAC - otherwise we need to get this
1326          * data from elsewere - local ldb, or (TODO) lookup of some
1327          * kind... 
1328          */
1329         if (NT_STATUS_IS_OK(nt_status)) {
1330                 pac_blob_ptr = &pac_blob;
1331         }
1332         nt_status = gensec_generate_session_info_pac(tmp_ctx,
1333                                                      gensec_security,
1334                                                      gensec_gssapi_state->smb_krb5_context,
1335                                                      pac_blob_ptr, principal_string,
1336                                                      gensec_get_remote_address(gensec_security),
1337                                                      &session_info);
1338         if (!NT_STATUS_IS_OK(nt_status)) {
1339                 talloc_free(tmp_ctx);
1340                 return nt_status;
1341         }
1342
1343         nt_status = gensec_gssapi_session_key(gensec_security, session_info, &session_info->session_key);
1344         if (!NT_STATUS_IS_OK(nt_status)) {
1345                 talloc_free(tmp_ctx);
1346                 return nt_status;
1347         }
1348
1349         if (!(gensec_gssapi_state->gss_got_flags & GSS_C_DELEG_FLAG)) {
1350                 DEBUG(10, ("gensec_gssapi: NO delegated credentials supplied by client\n"));
1351         } else {
1352                 krb5_error_code ret;
1353                 const char *error_string;
1354
1355                 DEBUG(10, ("gensec_gssapi: delegated credentials supplied by client\n"));
1356                 session_info->credentials = cli_credentials_init(session_info);
1357                 if (!session_info->credentials) {
1358                         talloc_free(tmp_ctx);
1359                         return NT_STATUS_NO_MEMORY;
1360                 }
1361
1362                 cli_credentials_set_conf(session_info->credentials, gensec_security->settings->lp_ctx);
1363                 /* Just so we don't segfault trying to get at a username */
1364                 cli_credentials_set_anonymous(session_info->credentials);
1365                 
1366                 ret = cli_credentials_set_client_gss_creds(session_info->credentials, 
1367                                                            gensec_security->settings->lp_ctx,
1368                                                            gensec_gssapi_state->delegated_cred_handle,
1369                                                            CRED_SPECIFIED, &error_string);
1370                 if (ret) {
1371                         talloc_free(tmp_ctx);
1372                         DEBUG(2,("Failed to get gss creds: %s\n", error_string));
1373                         return NT_STATUS_NO_MEMORY;
1374                 }
1375                 
1376                 /* This credential handle isn't useful for password authentication, so ensure nobody tries to do that */
1377                 cli_credentials_set_kerberos_state(session_info->credentials, CRED_MUST_USE_KERBEROS);
1378
1379                 /* It has been taken from this place... */
1380                 gensec_gssapi_state->delegated_cred_handle = GSS_C_NO_CREDENTIAL;
1381         }
1382         *_session_info = talloc_steal(mem_ctx, session_info);
1383         talloc_free(tmp_ctx);
1384
1385         return NT_STATUS_OK;
1386 }
1387
1388 static size_t gensec_gssapi_sig_size(struct gensec_security *gensec_security, size_t data_size)
1389 {
1390         struct gensec_gssapi_state *gensec_gssapi_state
1391                 = talloc_get_type(gensec_security->private_data, struct gensec_gssapi_state);
1392         NTSTATUS status;
1393
1394         if (gensec_gssapi_state->sig_size) {
1395                 return gensec_gssapi_state->sig_size;
1396         }
1397
1398         if (gensec_gssapi_state->gss_got_flags & GSS_C_CONF_FLAG) {
1399                 gensec_gssapi_state->sig_size = 45;
1400         } else {
1401                 gensec_gssapi_state->sig_size = 37;
1402         }
1403
1404         status = gensec_gssapi_init_lucid(gensec_gssapi_state);
1405         if (!NT_STATUS_IS_OK(status)) {
1406                 return gensec_gssapi_state->sig_size;
1407         }
1408
1409         if (gensec_gssapi_state->lucid->protocol == 1) {
1410                 if (gensec_gssapi_state->gss_got_flags & GSS_C_CONF_FLAG) {
1411                         /*
1412                          * TODO: windows uses 76 here, but we don't know
1413                          *       gss_wrap works with aes keys yet
1414                          */
1415                         gensec_gssapi_state->sig_size = 76;
1416                 } else {
1417                         gensec_gssapi_state->sig_size = 28;
1418                 }
1419         } else if (gensec_gssapi_state->lucid->protocol == 0) {
1420                 switch (gensec_gssapi_state->lucid->rfc1964_kd.ctx_key.type) {
1421                 case KEYTYPE_DES:
1422                 case KEYTYPE_ARCFOUR:
1423                 case KEYTYPE_ARCFOUR_56:
1424                         if (gensec_gssapi_state->gss_got_flags & GSS_C_CONF_FLAG) {
1425                                 gensec_gssapi_state->sig_size = 45;
1426                         } else {
1427                                 gensec_gssapi_state->sig_size = 37;
1428                         }
1429                         break;
1430                 case KEYTYPE_DES3:
1431                         if (gensec_gssapi_state->gss_got_flags & GSS_C_CONF_FLAG) {
1432                                 gensec_gssapi_state->sig_size = 57;
1433                         } else {
1434                                 gensec_gssapi_state->sig_size = 49;
1435                         }
1436                         break;
1437                 }
1438         }
1439
1440         return gensec_gssapi_state->sig_size;
1441 }
1442
1443 static const char *gensec_gssapi_krb5_oids[] = { 
1444         GENSEC_OID_KERBEROS5_OLD,
1445         GENSEC_OID_KERBEROS5,
1446         NULL 
1447 };
1448
1449 static const char *gensec_gssapi_spnego_oids[] = { 
1450         GENSEC_OID_SPNEGO,
1451         NULL 
1452 };
1453
1454 /* As a server, this could in theory accept any GSSAPI mech */
1455 static const struct gensec_security_ops gensec_gssapi_spnego_security_ops = {
1456         .name           = "gssapi_spnego",
1457         .sasl_name      = "GSS-SPNEGO",
1458         .auth_type      = DCERPC_AUTH_TYPE_SPNEGO,
1459         .oid            = gensec_gssapi_spnego_oids,
1460         .client_start   = gensec_gssapi_client_start,
1461         .server_start   = gensec_gssapi_server_start,
1462         .magic          = gensec_magic_check_krb5_oid,
1463         .update         = gensec_gssapi_update,
1464         .session_key    = gensec_gssapi_session_key,
1465         .session_info   = gensec_gssapi_session_info,
1466         .sign_packet    = gensec_gssapi_sign_packet,
1467         .check_packet   = gensec_gssapi_check_packet,
1468         .seal_packet    = gensec_gssapi_seal_packet,
1469         .unseal_packet  = gensec_gssapi_unseal_packet,
1470         .wrap           = gensec_gssapi_wrap,
1471         .unwrap         = gensec_gssapi_unwrap,
1472         .have_feature   = gensec_gssapi_have_feature,
1473         .enabled        = false,
1474         .kerberos       = true,
1475         .priority       = GENSEC_GSSAPI
1476 };
1477
1478 /* As a server, this could in theory accept any GSSAPI mech */
1479 static const struct gensec_security_ops gensec_gssapi_krb5_security_ops = {
1480         .name           = "gssapi_krb5",
1481         .auth_type      = DCERPC_AUTH_TYPE_KRB5,
1482         .oid            = gensec_gssapi_krb5_oids,
1483         .client_start   = gensec_gssapi_client_start,
1484         .server_start   = gensec_gssapi_server_start,
1485         .magic          = gensec_magic_check_krb5_oid,
1486         .update         = gensec_gssapi_update,
1487         .session_key    = gensec_gssapi_session_key,
1488         .session_info   = gensec_gssapi_session_info,
1489         .sig_size       = gensec_gssapi_sig_size,
1490         .sign_packet    = gensec_gssapi_sign_packet,
1491         .check_packet   = gensec_gssapi_check_packet,
1492         .seal_packet    = gensec_gssapi_seal_packet,
1493         .unseal_packet  = gensec_gssapi_unseal_packet,
1494         .wrap           = gensec_gssapi_wrap,
1495         .unwrap         = gensec_gssapi_unwrap,
1496         .have_feature   = gensec_gssapi_have_feature,
1497         .enabled        = true,
1498         .kerberos       = true,
1499         .priority       = GENSEC_GSSAPI
1500 };
1501
1502 /* As a server, this could in theory accept any GSSAPI mech */
1503 static const struct gensec_security_ops gensec_gssapi_sasl_krb5_security_ops = {
1504         .name             = "gssapi_krb5_sasl",
1505         .sasl_name        = "GSSAPI",
1506         .client_start     = gensec_gssapi_sasl_client_start,
1507         .server_start     = gensec_gssapi_sasl_server_start,
1508         .update           = gensec_gssapi_update,
1509         .session_key      = gensec_gssapi_session_key,
1510         .session_info     = gensec_gssapi_session_info,
1511         .max_input_size   = gensec_gssapi_max_input_size,
1512         .max_wrapped_size = gensec_gssapi_max_wrapped_size,
1513         .wrap             = gensec_gssapi_wrap,
1514         .unwrap           = gensec_gssapi_unwrap,
1515         .have_feature     = gensec_gssapi_have_feature,
1516         .enabled          = true,
1517         .kerberos         = true,
1518         .priority         = GENSEC_GSSAPI
1519 };
1520
1521 _PUBLIC_ NTSTATUS gensec_gssapi_init(void)
1522 {
1523         NTSTATUS ret;
1524
1525         ret = gensec_register(&gensec_gssapi_spnego_security_ops);
1526         if (!NT_STATUS_IS_OK(ret)) {
1527                 DEBUG(0,("Failed to register '%s' gensec backend!\n",
1528                         gensec_gssapi_spnego_security_ops.name));
1529                 return ret;
1530         }
1531
1532         ret = gensec_register(&gensec_gssapi_krb5_security_ops);
1533         if (!NT_STATUS_IS_OK(ret)) {
1534                 DEBUG(0,("Failed to register '%s' gensec backend!\n",
1535                         gensec_gssapi_krb5_security_ops.name));
1536                 return ret;
1537         }
1538
1539         ret = gensec_register(&gensec_gssapi_sasl_krb5_security_ops);
1540         if (!NT_STATUS_IS_OK(ret)) {
1541                 DEBUG(0,("Failed to register '%s' gensec backend!\n",
1542                         gensec_gssapi_sasl_krb5_security_ops.name));
1543                 return ret;
1544         }
1545
1546         return ret;
1547 }