Example #1
0
static NTSTATUS check_winbind_security(const struct auth_context *auth_context,
                                       void *my_private_data,
                                       TALLOC_CTX *mem_ctx,
                                       const struct auth_usersupplied_info *user_info,
                                       struct auth_serversupplied_info **server_info)
{
    NTSTATUS nt_status;
    wbcErr wbc_status;
    struct wbcAuthUserParams params;
    struct wbcAuthUserInfo *info = NULL;
    struct wbcAuthErrorInfo *err = NULL;

    ZERO_STRUCT(params);

    if (!user_info) {
        return NT_STATUS_INVALID_PARAMETER;
    }

    DEBUG(10, ("Check auth for: [%s]\n", user_info->mapped.account_name));

    if (!auth_context) {
        DEBUG(3,("Password for user %s cannot be checked because we have no auth_info to get the challenge from.\n",
                 user_info->mapped.account_name));
        return NT_STATUS_INVALID_PARAMETER;
    }

    if (strequal(user_info->mapped.domain_name, get_global_sam_name())) {
        DEBUG(3,("check_winbind_security: Not using winbind, requested domain [%s] was for this SAM.\n",
                 user_info->mapped.domain_name));
        return NT_STATUS_NOT_IMPLEMENTED;
    }

    /* Send off request */
    params.account_name	= user_info->client.account_name;
    /*
     * We need to send the domain name from the client to the DC. With
     * NTLMv2 the domain name is part of the hashed second challenge,
     * if we change the domain name, the DC will fail to verify the
     * challenge cause we changed the domain name, this is like a
     * man in the middle attack.
     */
    params.domain_name	= user_info->client.domain_name;
    params.workstation_name	= user_info->workstation_name;

    params.flags		= 0;
    params.parameter_control= user_info->logon_parameters;

    params.level		= WBC_AUTH_USER_LEVEL_RESPONSE;

    memcpy(params.password.response.challenge,
           auth_context->challenge.data,
           sizeof(params.password.response.challenge));

    if (user_info->password.response.nt.length != 0) {
        params.password.response.nt_length =
            user_info->password.response.nt.length;
        params.password.response.nt_data =
            user_info->password.response.nt.data;
    }
    if (user_info->password.response.lanman.length != 0) {
        params.password.response.lm_length =
            user_info->password.response.lanman.length;
        params.password.response.lm_data =
            user_info->password.response.lanman.data;
    }

    /* we are contacting the privileged pipe */
    become_root();
    wbc_status = wbcAuthenticateUserEx(&params, &info, &err);
    unbecome_root();

    if (!WBC_ERROR_IS_OK(wbc_status)) {
        DEBUG(10,("check_winbind_security: wbcAuthenticateUserEx failed: %s\n",
                  wbcErrorString(wbc_status)));
    }

    if (wbc_status == WBC_ERR_NO_MEMORY) {
        return NT_STATUS_NO_MEMORY;
    }

    if (wbc_status == WBC_ERR_WINBIND_NOT_AVAILABLE) {
        struct auth_methods *auth_method =
            (struct auth_methods *)my_private_data;

        if ( auth_method )
            return auth_method->auth(auth_context, auth_method->private_data,
                                     mem_ctx, user_info, server_info);
        return NT_STATUS_LOGON_FAILURE;
    }

    if (wbc_status == WBC_ERR_AUTH_ERROR) {
        nt_status = NT_STATUS(err->nt_status);
        wbcFreeMemory(err);
        return nt_status;
    }

    if (!WBC_ERROR_IS_OK(wbc_status)) {
        return NT_STATUS_LOGON_FAILURE;
    }

    nt_status = make_server_info_wbcAuthUserInfo(mem_ctx,
                user_info->client.account_name,
                user_info->mapped.domain_name,
                info, server_info);
    wbcFreeMemory(info);
    if (!NT_STATUS_IS_OK(nt_status)) {
        return nt_status;
    }

    (*server_info)->nss_token |= user_info->was_mapped;

    return nt_status;
}
Example #2
0
static NTSTATUS check_wbc_security(const struct auth_context *auth_context,
				       void *my_private_data,
				       TALLOC_CTX *mem_ctx,
				       const struct auth_usersupplied_info *user_info,
				       struct auth_serversupplied_info **server_info)
{
	NTSTATUS nt_status;
	wbcErr wbc_status;
	struct wbcAuthUserParams params;
	struct wbcAuthUserInfo *info = NULL;
	struct wbcAuthErrorInfo *err = NULL;

	if (!user_info || !auth_context || !server_info) {
		return NT_STATUS_INVALID_PARAMETER;
	}
	/* Send off request */

	params.account_name	= user_info->smb_name;
	params.domain_name	= user_info->domain;
	params.workstation_name	= user_info->wksta_name;

	params.flags		= 0;
	params.parameter_control= user_info->logon_parameters;

	/* Handle plaintext */
	if (!user_info->encrypted) {
		DEBUG(3,("Checking plaintext password for %s.\n",
			 user_info->internal_username));
		params.level = WBC_AUTH_USER_LEVEL_PLAIN;

		params.password.plaintext = (char *)user_info->plaintext_password.data;
	} else {
		DEBUG(3,("Checking encrypted password for %s.\n",
			 user_info->internal_username));
		params.level = WBC_AUTH_USER_LEVEL_RESPONSE;

		memcpy(params.password.response.challenge,
		    auth_context->challenge.data,
		    sizeof(params.password.response.challenge));

		params.password.response.nt_length = user_info->nt_resp.length;
		params.password.response.nt_data = user_info->nt_resp.data;
		params.password.response.lm_length = user_info->lm_resp.length;
		params.password.response.lm_data = user_info->lm_resp.data;

	}

	/* we are contacting the privileged pipe */
	become_root();
	wbc_status = wbcAuthenticateUserEx(&params, &info, &err);
	unbecome_root();

	if (!WBC_ERROR_IS_OK(wbc_status)) {
		DEBUG(10,("wbcAuthenticateUserEx failed (%d): %s\n",
			wbc_status, wbcErrorString(wbc_status)));
	}

	if (wbc_status == WBC_ERR_NO_MEMORY) {
		return NT_STATUS_NO_MEMORY;
	}

	if (wbc_status == WBC_ERR_AUTH_ERROR) {
		nt_status = NT_STATUS(err->nt_status);
		wbcFreeMemory(err);
		return nt_status;
	}

	if (!WBC_ERROR_IS_OK(wbc_status)) {
		return NT_STATUS_LOGON_FAILURE;
	}

	DEBUG(10,("wbcAuthenticateUserEx succeeded\n"));

	nt_status = make_server_info_wbcAuthUserInfo(mem_ctx,
						     user_info->smb_name,
						     user_info->domain,
						     info, server_info);
	wbcFreeMemory(info);
	if (!NT_STATUS_IS_OK(nt_status)) {
		return nt_status;
	}

	(*server_info)->nss_token |= user_info->was_mapped;

        return nt_status;
}
Example #3
0
static NTSTATUS check_winbind_security(const struct auth_context *auth_context,
				       void *my_private_data, 
				       TALLOC_CTX *mem_ctx,
				       const auth_usersupplied_info *user_info, 
				       auth_serversupplied_info **server_info)
{
	NTSTATUS nt_status;
	wbcErr wbc_status;
	struct wbcAuthUserParams params;
	struct wbcAuthUserInfo *info = NULL;
	struct wbcAuthErrorInfo *err = NULL;

	if (!user_info) {
		return NT_STATUS_INVALID_PARAMETER;
	}

	if (!auth_context) {
		DEBUG(3,("Password for user %s cannot be checked because we have no auth_info to get the challenge from.\n", 
			 user_info->internal_username));
		return NT_STATUS_INVALID_PARAMETER;
	}		

	if (strequal(user_info->domain, get_global_sam_name())) {
		DEBUG(3,("check_winbind_security: Not using winbind, requested domain [%s] was for this SAM.\n",
			user_info->domain));
		return NT_STATUS_NOT_IMPLEMENTED;
	}

	/* Send off request */

	params.account_name	= user_info->smb_name;
	params.domain_name	= user_info->domain;
	params.workstation_name	= user_info->wksta_name;

	params.flags		= 0;
	params.parameter_control= user_info->logon_parameters;

	params.level		= WBC_AUTH_USER_LEVEL_RESPONSE;

	memcpy(params.password.response.challenge,
	       auth_context->challenge.data,
	       sizeof(params.password.response.challenge));

	params.password.response.nt_length	= user_info->nt_resp.length;
	params.password.response.nt_data	= user_info->nt_resp.data;
	params.password.response.lm_length	= user_info->lm_resp.length;
	params.password.response.lm_data	= user_info->lm_resp.data;

	/* we are contacting the privileged pipe */
	become_root();
	wbc_status = wbcAuthenticateUserEx(&params, &info, &err);
	unbecome_root();

	if (!WBC_ERROR_IS_OK(wbc_status)) {
		DEBUG(10,("check_winbind_security: wbcAuthenticateUserEx failed: %s\n",
			wbcErrorString(wbc_status)));
	}

	if (wbc_status == WBC_ERR_NO_MEMORY) {
		return NT_STATUS_NO_MEMORY;
	}

	if (wbc_status == WBC_ERR_WINBIND_NOT_AVAILABLE) {
		struct auth_methods *auth_method =
			(struct auth_methods *)my_private_data;

		if ( auth_method )
			return auth_method->auth(auth_context, auth_method->private_data, 
				mem_ctx, user_info, server_info);
		else
			/* log an error since this should not happen */
			DEBUG(0,("check_winbind_security: ERROR!  my_private_data == NULL!\n"));
	}

	if (wbc_status == WBC_ERR_AUTH_ERROR) {
		nt_status = NT_STATUS(err->nt_status);
		wbcFreeMemory(err);
		return nt_status;
	}

	if (!WBC_ERROR_IS_OK(wbc_status)) {
		return NT_STATUS_LOGON_FAILURE;
	}

	nt_status = make_server_info_wbcAuthUserInfo(mem_ctx,
						     user_info->smb_name,
						     user_info->domain,
						     info, server_info);
	wbcFreeMemory(info);
	if (!NT_STATUS_IS_OK(nt_status)) {
		return nt_status;
	}

	(*server_info)->nss_token |= user_info->was_mapped;

        return nt_status;
}