/* $OpenLDAP$ */ /* This work is part of OpenLDAP Software . * * Copyright 1998-2004 The OpenLDAP Foundation. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted only as authorized by the OpenLDAP * Public License. * * A copy of this license is available in the file LICENSE in the * top-level directory of the distribution or, alternatively, at * . */ /* Portions Copyright (c) 1993 Regents of the University of Michigan. * All rights reserved. */ /* Portions Copyright (C) The Internet Society (1997) * ASN.1 fragments are from RFC 2251; see RFC for full legal notices. */ /* * BindRequest ::= SEQUENCE { * version INTEGER, * name DistinguishedName, -- who * authentication CHOICE { * simple [0] OCTET STRING -- passwd #ifdef LDAP_API_FEATURE_X_OPENLDAP_V2_KBIND * krbv42ldap [1] OCTET STRING * krbv42dsa [2] OCTET STRING #endif * sasl [3] SaslCredentials -- LDAPv3 * } * } * * BindResponse ::= SEQUENCE { * COMPONENTS OF LDAPResult, * serverSaslCreds OCTET STRING OPTIONAL -- LDAPv3 * } * */ #include "portable.h" #ifdef LDAP_API_FEATURE_X_OPENLDAP_V2_KBIND #include #include #include #include #include #include #include "ldap-int.h" /* * ldap_kerberos_bind1 - initiate a bind to the ldap server using * kerberos authentication. The dn is supplied. It is assumed the user * already has a valid ticket granting ticket. The msgid of the * request is returned on success (suitable for passing to ldap_result()), * -1 is returned if there's trouble. * * Example: * ldap_kerberos_bind1( ld, "cn=manager, o=university of michigan, c=us" ) */ int ldap_kerberos_bind1( LDAP *ld, LDAP_CONST char *dn ) { BerElement *ber; char *cred; int rc; ber_len_t credlen; ber_int_t id; #ifdef NEW_LOGGING LDAP_LOG ( OPERATION, ENTRY, "ldap_kerberos_bind1\n", 0, 0, 0 ); #else Debug( LDAP_DEBUG_TRACE, "ldap_kerberos_bind1\n", 0, 0, 0 ); #endif if( ld->ld_version > LDAP_VERSION2 ) { ld->ld_errno = LDAP_NOT_SUPPORTED; return -1; } if ( dn == NULL ) dn = ""; if ( (cred = ldap_get_kerberosv4_credentials( ld, dn, "ldapserver", &credlen )) == NULL ) { return( -1 ); /* ld_errno should already be set */ } /* create a message to send */ if ( (ber = ldap_alloc_ber_with_options( ld )) == NULL ) { LDAP_FREE( cred ); return( -1 ); } LDAP_NEXT_MSGID( ld, id ); /* fill it in */ rc = ber_printf( ber, "{it{istoN}N}", id, LDAP_REQ_BIND, ld->ld_version, dn, LDAP_AUTH_KRBV41, cred, credlen ); if ( rc == -1 ) { LDAP_FREE( cred ); ber_free( ber, 1 ); ld->ld_errno = LDAP_ENCODING_ERROR; return( -1 ); } LDAP_FREE( cred ); /* send the message */ return ( ldap_send_initial_request( ld, LDAP_REQ_BIND, dn, ber, id )); } int ldap_kerberos_bind1_s( LDAP *ld, LDAP_CONST char *dn ) { int msgid; LDAPMessage *res; #ifdef NEW_LOGGING LDAP_LOG ( OPERATION, ENTRY, "ldap_kerberos_bind1_s\n", 0, 0, 0 ); #else Debug( LDAP_DEBUG_TRACE, "ldap_kerberos_bind1_s\n", 0, 0, 0 ); #endif /* initiate the bind */ if ( (msgid = ldap_kerberos_bind1( ld, dn )) == -1 ) return( ld->ld_errno ); /* wait for a result */ if ( ldap_result( ld, msgid, 1, (struct timeval *) 0, &res ) == -1 ) { return( ld->ld_errno ); /* ldap_result sets ld_errno */ } return( ldap_result2error( ld, res, 1 ) ); } /* * ldap_kerberos_bind2 - initiate a bind to the X.500 server using * kerberos authentication. The dn is supplied. It is assumed the user * already has a valid ticket granting ticket. The msgid of the * request is returned on success (suitable for passing to ldap_result()), * -1 is returned if there's trouble. * * Example: * ldap_kerberos_bind2( ld, "cn=manager, o=university of michigan, c=us" ) */ int ldap_kerberos_bind2( LDAP *ld, LDAP_CONST char *dn ) { BerElement *ber; char *cred; int rc; ber_len_t credlen; ber_int_t id; #ifdef NEW_LOGGING LDAP_LOG ( OPERATION, ENTRY, "ldap_kerberos_bind2\n", 0, 0, 0 ); #else Debug( LDAP_DEBUG_TRACE, "ldap_kerberos_bind2\n", 0, 0, 0 ); #endif if( ld->ld_version > LDAP_VERSION2 ) { ld->ld_errno = LDAP_NOT_SUPPORTED; return -1; } if ( dn == NULL ) dn = ""; if ( (cred = ldap_get_kerberosv4_credentials( ld, dn, "x500dsa", &credlen )) == NULL ) { return( -1 ); /* ld_errno should already be set */ } /* create a message to send */ if ( (ber = ldap_alloc_ber_with_options( ld )) == NULL ) { LDAP_FREE( cred ); return( -1 ); } LDAP_NEXT_MSGID( ld, id ); /* fill it in */ rc = ber_printf( ber, "{it{istoN}N}", id, LDAP_REQ_BIND, ld->ld_version, dn, LDAP_AUTH_KRBV42, cred, credlen ); LDAP_FREE( cred ); if ( rc == -1 ) { ber_free( ber, 1 ); ld->ld_errno = LDAP_ENCODING_ERROR; return( -1 ); } /* send the message */ return ( ldap_send_initial_request( ld, LDAP_REQ_BIND, dn, ber, id )); } /* synchronous bind to DSA using kerberos */ int ldap_kerberos_bind2_s( LDAP *ld, LDAP_CONST char *dn ) { int msgid; LDAPMessage *res; #ifdef NEW_LOGGING LDAP_LOG ( OPERATION, ENTRY, "ldap_kerberos_bind2_s\n" , 0, 0, 0); #else Debug( LDAP_DEBUG_TRACE, "ldap_kerberos_bind2_s\n", 0, 0, 0 ); #endif /* initiate the bind */ if ( (msgid = ldap_kerberos_bind2( ld, dn )) == -1 ) return( ld->ld_errno ); /* wait for a result */ if ( ldap_result( ld, msgid, 1, (struct timeval *) 0, &res ) == -1 ) { return( ld->ld_errno ); /* ldap_result sets ld_errno */ } return( ldap_result2error( ld, res, 1 ) ); } /* synchronous bind to ldap and DSA using kerberos */ int ldap_kerberos_bind_s( LDAP *ld, LDAP_CONST char *dn ) { int err; #ifdef NEW_LOGGING LDAP_LOG ( OPERATION, ENTRY, "ldap_kerberos_bind_s\n", 0, 0, 0 ); #else Debug( LDAP_DEBUG_TRACE, "ldap_kerberos_bind_s\n", 0, 0, 0 ); #endif if ( (err = ldap_kerberos_bind1_s( ld, dn )) != LDAP_SUCCESS ) return( err ); return( ldap_kerberos_bind2_s( ld, dn ) ); } #ifndef AUTHMAN /* * ldap_get_kerberosv4_credentials - obtain kerberos v4 credentials for ldap. * The dn of the entry to which to bind is supplied. It's assumed the * user already has a tgt. */ char * ldap_get_kerberosv4_credentials( LDAP *ld, LDAP_CONST char *who, LDAP_CONST char *service, ber_len_t *len ) { KTEXT_ST ktxt; int err; char realm[REALM_SZ], *cred, *krbinstance; #ifdef NEW_LOGGING LDAP_LOG ( OPERATION, ENTRY, "ldap_get_kerberosv4_credentials\n", 0, 0, 0 ); #else Debug( LDAP_DEBUG_TRACE, "ldap_get_kerberosv4_credentials\n", 0, 0, 0 ); #endif if ( (err = krb_get_tf_realm( tkt_string(), realm )) != KSUCCESS ) { #ifdef NEW_LOGGING LDAP_LOG ( OPERATION, ERR, "ldap_get_kerberosv4_credentials: krb_get_tf_realm failed: %s\n", krb_err_txt[err], 0, 0 ); #else Debug( LDAP_DEBUG_ANY, "ldap_get_kerberosv4_credentials: " "krb_get_tf_realm failed: %s\n", krb_err_txt[err], 0, 0 ); #endif ld->ld_errno = LDAP_AUTH_UNKNOWN; return( NULL ); } if ( ber_sockbuf_ctrl( ld->ld_sb, LBER_SB_OPT_GET_FD, NULL ) == -1 ) { /* not connected yet */ int rc = ldap_open_defconn( ld ); if( rc < 0 ) return NULL; } krbinstance = ld->ld_defconn->lconn_krbinstance; if ( (err = krb_mk_req( &ktxt, service, krbinstance, realm, 0 )) != KSUCCESS ) { #ifdef NEW_LOGGING LDAP_LOG ( OPERATION, ERR, "ldap_get_kerberosv4_credentials: krb_mk_req failed: %s\n", krb_err_txt[err], 0, 0 ); #else Debug( LDAP_DEBUG_ANY, "ldap_get_kerberosv4_credentials: " "krb_mk_req failed (%s)\n", krb_err_txt[err], 0, 0 ); #endif ld->ld_errno = LDAP_AUTH_UNKNOWN; return( NULL ); } if ( ( cred = LDAP_MALLOC( ktxt.length )) == NULL ) { ld->ld_errno = LDAP_NO_MEMORY; return( NULL ); } *len = ktxt.length; AC_MEMCPY( cred, ktxt.dat, ktxt.length ); return( cred ); } #endif /* !AUTHMAN */ #endif /* LDAP_API_FEATURE_X_OPENLDAP_V2_KBIND */