svn commit: samba r18155 - in branches/SAMBA_4_0/source/auth: . gensec

abartlet at samba.org abartlet at samba.org
Wed Sep 6 10:34:18 GMT 2006


Author: abartlet
Date: 2006-09-06 10:34:18 +0000 (Wed, 06 Sep 2006)
New Revision: 18155

WebSVN: http://websvn.samba.org/cgi-bin/viewcvs.cgi?view=rev&root=samba&rev=18155

Log:
Add my work in progress, a module to link with Cyrus-SASL, for a
DIGEST-MD5 implemenation in particular.

However, I can't make this work:  Cyrus-SASL isn't loading the mech...

Andrew Bartlett

Added:
   branches/SAMBA_4_0/source/auth/gensec/cyrus_sasl.c
Modified:
   branches/SAMBA_4_0/source/auth/config.m4
   branches/SAMBA_4_0/source/auth/gensec/config.mk
   branches/SAMBA_4_0/source/auth/gensec/gensec.c


Changeset:
Modified: branches/SAMBA_4_0/source/auth/config.m4
===================================================================
--- branches/SAMBA_4_0/source/auth/config.m4	2006-09-06 10:30:17 UTC (rev 18154)
+++ branches/SAMBA_4_0/source/auth/config.m4	2006-09-06 10:34:18 UTC (rev 18155)
@@ -17,3 +17,13 @@
 SMB_EXT_LIB(CRYPT, $CRYPT_LIBS)
 
 AC_CHECK_FUNCS(crypt16 getauthuid getpwanam)
+
+AC_CHECK_HEADERS(sasl/sasl.h)
+AC_CHECK_LIB_EXT(sasl2, SASL_LIBS, sasl_client_init)
+SMB_EXT_LIB(SASL, $SASL_LIBS)
+
+if test x"$ac_cv_header_sasl_sasl_h" = x"yes" -a x"$ac_cv_lib_ext_sasl2_sasl_client_init" = x"yes";then
+	SMB_ENABLE(cyrus_sasl,YES)
+else
+	SMB_ENABLE(cyrus_sasl, NO)
+fi

Modified: branches/SAMBA_4_0/source/auth/gensec/config.mk
===================================================================
--- branches/SAMBA_4_0/source/auth/gensec/config.mk	2006-09-06 10:30:17 UTC (rev 18154)
+++ branches/SAMBA_4_0/source/auth/gensec/config.mk	2006-09-06 10:34:18 UTC (rev 18155)
@@ -33,6 +33,16 @@
 ################################################
 
 ################################################
+# Start MODULE cyrus_sasl
+[MODULE::cyrus_sasl]
+SUBSYSTEM = gensec
+INIT_FUNCTION = gensec_sasl_init
+OBJ_FILES = cyrus_sasl.o 
+PUBLIC_DEPENDENCIES = SASL auth
+# End MODULE cyrus_sasl
+################################################
+
+################################################
 # Start MODULE gensec_spnego
 [MODULE::gensec_spnego]
 SUBSYSTEM = gensec

Added: branches/SAMBA_4_0/source/auth/gensec/cyrus_sasl.c
===================================================================
--- branches/SAMBA_4_0/source/auth/gensec/cyrus_sasl.c	2006-09-06 10:30:17 UTC (rev 18154)
+++ branches/SAMBA_4_0/source/auth/gensec/cyrus_sasl.c	2006-09-06 10:34:18 UTC (rev 18155)
@@ -0,0 +1,413 @@
+/* 
+   Unix SMB/CIFS implementation.
+ 
+   Connect GENSEC to an external SASL lib
+
+   Copyright (C) Andrew Bartlett <abartlet at samba.org> 2006
+   
+   This program is free software; you can redistribute it and/or modify
+   it under the terms of the GNU General Public License as published by
+   the Free Software Foundation; either version 2 of the License, or
+   (at your option) any later version.
+   
+   This program is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+   GNU General Public License for more details.
+   
+   You should have received a copy of the GNU General Public License
+   along with this program; if not, write to the Free Software
+   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
+*/
+
+#include "includes.h"
+#include "auth/auth.h"
+#include "lib/socket/socket.h"
+#include <sasl/sasl.h>
+
+struct gensec_sasl_state {
+	sasl_conn_t *conn;
+	int step;
+};
+
+static NTSTATUS sasl_nt_status(int sasl_ret) 
+{
+	switch (sasl_ret) {
+	case SASL_CONTINUE:
+		return NT_STATUS_MORE_PROCESSING_REQUIRED;
+	case SASL_NOMEM:
+		return NT_STATUS_NO_MEMORY;
+	case SASL_BADPARAM:
+	case SASL_NOMECH:
+		return NT_STATUS_INVALID_PARAMETER;
+	case SASL_BADMAC:
+		return NT_STATUS_ACCESS_DENIED;
+	case SASL_OK:
+		return NT_STATUS_OK;
+	default:
+		return NT_STATUS_UNSUCCESSFUL;
+	}
+}
+
+static int gensec_sasl_get_user(void *context, int id,
+				const char **result, unsigned *len)
+{
+	struct gensec_security *gensec_security = talloc_get_type(context, struct gensec_security);
+	const char *username = cli_credentials_get_username(gensec_get_credentials(gensec_security));
+	if (id != SASL_CB_USER && id != SASL_CB_AUTHNAME) {
+		return SASL_FAIL;
+	}
+	
+	*result = username;
+	return SASL_OK;
+}
+
+static int gensec_sasl_get_realm(void *context, int id,
+				 const char **availrealms,
+				 const char **result)
+{
+	struct gensec_security *gensec_security = talloc_get_type(context, struct gensec_security);
+	const char *realm = cli_credentials_get_realm(gensec_get_credentials(gensec_security));
+	int i;
+	if (id != SASL_CB_GETREALM) {
+		return SASL_FAIL;
+	}
+
+	for (i=0; availrealms && availrealms[i]; i++) {
+		if (strcasecmp_m(realm, availrealms[i]) == 0) {
+			result[i] = availrealms[i];
+			return SASL_OK;
+		}
+	}
+	/* None of the realms match, so lets not specify one */
+	*result = "";
+	return SASL_OK;
+}
+
+static int gensec_sasl_get_password(sasl_conn_t *conn, void *context, int id,
+			     sasl_secret_t **psecret)
+{
+	struct gensec_security *gensec_security = talloc_get_type(context, struct gensec_security);
+	const char *password = cli_credentials_get_password(gensec_get_credentials(gensec_security));
+	
+	sasl_secret_t *secret;
+	if (!password) {
+		*psecret = NULL;
+		return SASL_OK;
+	}
+	secret = talloc_size(gensec_security, sizeof(sasl_secret_t)+strlen(password));
+	if (!secret) {
+		return SASL_NOMEM;
+	}
+	secret->len = strlen(password);
+	safe_strcpy(secret->data, password, secret->len+1);
+	return SASL_OK;
+}
+
+static int gensec_sasl_dispose(struct gensec_sasl_state *gensec_sasl_state)
+{
+	sasl_dispose(&gensec_sasl_state->conn);
+	return 0;
+}
+
+static NTSTATUS gensec_sasl_client_start(struct gensec_security *gensec_security)
+{
+	struct gensec_sasl_state *gensec_sasl_state;
+	const char *service = gensec_get_target_service(gensec_security);
+	const char *target_name = gensec_get_target_hostname(gensec_security);
+	struct socket_address *local_socket_addr = gensec_get_my_addr(gensec_security);
+	struct socket_address *remote_socket_addr = gensec_get_peer_addr(gensec_security);
+	char *local_addr = NULL;
+	char *remote_addr = NULL;
+	sasl_callback_t callbacks[5];
+	int sasl_ret;
+
+	callbacks[0].id = SASL_CB_USER;
+	callbacks[0].proc = gensec_sasl_get_user;
+	callbacks[0].context = gensec_security;
+
+	callbacks[1].id =  SASL_CB_AUTHNAME;
+	callbacks[1].proc = gensec_sasl_get_user;
+	callbacks[1].context = gensec_security;
+
+	callbacks[2].id = SASL_CB_GETREALM;
+	callbacks[2].proc = gensec_sasl_get_realm;
+	callbacks[2].context = gensec_security;
+
+	callbacks[3].id = SASL_CB_PASS;
+	callbacks[3].proc = gensec_sasl_get_password;
+	callbacks[3].context = gensec_security;
+
+	callbacks[4].id = SASL_CB_LIST_END;
+	callbacks[4].proc = NULL;
+	callbacks[4].context = NULL;
+
+	gensec_sasl_state = talloc(gensec_security, struct gensec_sasl_state);
+	if (!gensec_sasl_state) {
+		return NT_STATUS_NO_MEMORY;
+	}
+
+	gensec_security->private_data = gensec_sasl_state;
+
+	if (local_socket_addr) {
+		local_addr = talloc_asprintf(gensec_sasl_state, 
+					     "%s;%d",
+					     local_socket_addr->addr, 
+					     local_socket_addr->port);
+	}
+
+	if (remote_socket_addr) {
+		remote_addr = talloc_asprintf(gensec_sasl_state, 
+					     "%s;%d",
+					     remote_socket_addr->addr, 
+					     remote_socket_addr->port);
+	}
+	gensec_sasl_state->step = 0;
+
+	sasl_ret = sasl_client_new(service,
+				   target_name,
+				   local_addr, remote_addr, callbacks, 0,
+				   &gensec_sasl_state->conn);
+	
+	if (sasl_ret == SASL_OK || sasl_ret == SASL_CONTINUE) {
+		sasl_security_properties_t props;
+		talloc_set_destructor(gensec_sasl_state, gensec_sasl_dispose);
+
+		ZERO_STRUCT(props);
+		if (gensec_security->want_features & GENSEC_FEATURE_SIGN) {
+			props.min_ssf = 1;
+		}
+		if (gensec_security->want_features & GENSEC_FEATURE_SEAL) {
+			props.min_ssf = 40;
+		}
+		
+		props.max_ssf = UINT_MAX;
+		props.maxbufsize = 65536;
+		sasl_ret = sasl_setprop(gensec_sasl_state->conn, SASL_SEC_PROPS, &props);
+		if (sasl_ret != SASL_OK) {
+			return sasl_nt_status(sasl_ret);
+		}
+
+	} else {
+		DEBUG(1, ("GENSEC SASL: client_new failed: %s\n", sasl_errdetail(gensec_sasl_state->conn)));
+	}
+	return sasl_nt_status(sasl_ret);
+}
+
+static NTSTATUS gensec_sasl_update(struct gensec_security *gensec_security, 
+				   TALLOC_CTX *out_mem_ctx, 
+				   const DATA_BLOB in, DATA_BLOB *out) 
+{
+	struct gensec_sasl_state *gensec_sasl_state = talloc_get_type(gensec_security->private_data,
+								      struct gensec_sasl_state);
+	int sasl_ret;
+	const char *out_data;
+	unsigned int out_len;
+
+	if (gensec_sasl_state->step == 0) {
+		const char *mech;
+		sasl_ret = sasl_client_start(gensec_sasl_state->conn, gensec_security->ops->sasl_name, 
+					     NULL, &out_data, &out_len, &mech);
+	} else {
+		sasl_ret = sasl_client_step(gensec_sasl_state->conn, 
+					    in.data, in.length, NULL, &out_data, &out_len);
+	}
+	if (sasl_ret == SASL_OK || sasl_ret == SASL_CONTINUE) {
+		*out = data_blob_talloc(out_mem_ctx, out_data, out_len);
+	} else {
+		DEBUG(1, ("GENSEC SASL: step %d update failed: %s\n", gensec_sasl_state->step, 
+			  sasl_errdetail(gensec_sasl_state->conn)));
+	}
+	gensec_sasl_state->step++;
+	return sasl_nt_status(sasl_ret);
+}
+
+static NTSTATUS gensec_sasl_unwrap_packets(struct gensec_security *gensec_security, 
+					TALLOC_CTX *out_mem_ctx, 
+					const DATA_BLOB *in, 
+					DATA_BLOB *out,
+					size_t *len_processed) 
+{
+	struct gensec_sasl_state *gensec_sasl_state = talloc_get_type(gensec_security->private_data,
+								      struct gensec_sasl_state);
+	const char *out_data;
+	unsigned int out_len;
+
+	int sasl_ret = sasl_decode(gensec_sasl_state->conn, 
+				   in->data, in->length, &out_data, &out_len);
+	if (sasl_ret == SASL_OK) {
+		*out = data_blob_talloc(out_mem_ctx, out_data, out_len);
+	} else {
+		DEBUG(1, ("GENSEC SASL: unwrap failed: %s\n", sasl_errdetail(gensec_sasl_state->conn)));
+	}
+	return sasl_nt_status(sasl_ret);
+
+}
+static NTSTATUS gensec_sasl_wrap_packets(struct gensec_security *gensec_security, 
+					TALLOC_CTX *out_mem_ctx, 
+					const DATA_BLOB *in, 
+					DATA_BLOB *out,
+					size_t *len_processed) 
+{
+	struct gensec_sasl_state *gensec_sasl_state = talloc_get_type(gensec_security->private_data,
+								      struct gensec_sasl_state);
+	const char *out_data;
+	unsigned int out_len;
+
+	int sasl_ret = sasl_encode(gensec_sasl_state->conn, 
+				   in->data, in->length, &out_data, &out_len);
+	if (sasl_ret == SASL_OK) {
+		*out = data_blob_talloc(out_mem_ctx, out_data, out_len);
+	} else {
+		DEBUG(1, ("GENSEC SASL: wrap failed: %s\n", sasl_errdetail(gensec_sasl_state->conn)));
+	}
+	return sasl_nt_status(sasl_ret);
+}
+
+/* Try to figure out what features we actually got on the connection */
+static BOOL gensec_sasl_have_feature(struct gensec_security *gensec_security, 
+				     uint32_t feature) 
+{
+	struct gensec_sasl_state *gensec_sasl_state = talloc_get_type(gensec_security->private_data,
+								      struct gensec_sasl_state);
+	sasl_ssf_t ssf;
+	int sasl_ret = sasl_getprop(gensec_sasl_state->conn, SASL_SSF, &ssf);
+	if (sasl_ret != SASL_OK) {
+		return False;
+	}
+	if (feature & GENSEC_FEATURE_SIGN) {
+		if (ssf == 0) {
+			return False;
+		}
+		if (ssf >= 1) {
+			return True;
+		}
+	}
+	if (feature & GENSEC_FEATURE_SEAL) {
+		if (ssf <= 1) {
+			return False;
+		}
+		if (ssf > 1) {
+			return True;
+		}
+	}
+	return False;
+}
+
+/* This could in theory work with any SASL mech */
+static const struct gensec_security_ops gensec_sasl_security_ops = {
+	.name             = "sasl-DIGEST-MD5",
+	.sasl_name        = "DIGEST-MD5",
+	.client_start     = gensec_sasl_client_start,
+	.update 	  = gensec_sasl_update,
+	.wrap_packets     = gensec_sasl_wrap_packets,
+	.unwrap_packets   = gensec_sasl_unwrap_packets,
+	.have_feature     = gensec_sasl_have_feature,
+	.enabled          = False,
+};
+
+int gensec_sasl_log(void *context, 
+		    int sasl_log_level,
+		    const char *message) 
+{
+	int debug_level;
+	switch (sasl_log_level) {
+	case SASL_LOG_NONE:
+		debug_level = 0;
+		break;
+	case SASL_LOG_ERR:
+		debug_level = 1;
+		break;
+	case SASL_LOG_FAIL:
+		debug_level = 2;
+		break;
+	case SASL_LOG_WARN:
+		debug_level = 3;
+		break;
+	case SASL_LOG_NOTE:
+		debug_level = 5;
+		break;
+	case SASL_LOG_DEBUG:
+		debug_level = 10;
+		break;
+	case SASL_LOG_TRACE:
+		debug_level = 11;
+		break;
+#if DEBUG_PASSWORD
+	case SASL_LOG_PASS:
+		debug_level = 100;
+		break;
+#endif
+	default:
+		debug_level = 0;
+		break;
+	}
+	DEBUG(debug_level, ("gensec_sasl: %s", message));
+
+	return SASL_OK;
+}
+
+NTSTATUS gensec_sasl_init(void)
+{
+	NTSTATUS ret;
+	int sasl_ret, i;
+	sasl_callback_t callbacks[2];
+	const char **sasl_mechs;
+	
+	callbacks[0].id = SASL_CB_LOG;
+	callbacks[0].proc = gensec_sasl_log;
+	callbacks[0].context = NULL;
+
+	callbacks[1].id = SASL_CB_LIST_END;
+	callbacks[1].proc = gensec_sasl_log;
+	callbacks[1].context = NULL;
+
+	sasl_ret = sasl_client_init(callbacks);
+	
+	if (sasl_ret == SASL_NOMECH) {
+		/* Nothing to do here */
+		return NT_STATUS_OK;
+	}
+
+	if (sasl_ret != SASL_OK) {
+		return sasl_nt_status(sasl_ret);
+	}
+
+	/* For now, we just register DIGEST-MD5 */
+#if 1
+	ret = gensec_register(&gensec_sasl_security_ops);
+	if (!NT_STATUS_IS_OK(ret)) {
+		DEBUG(0,("Failed to register '%s' gensec backend!\n",
+			 gensec_sasl_security_ops.name));
+		return ret;
+	}
+#else
+	sasl_mechs = sasl_global_listmech();
+	for (i = 0; sasl_mechs && sasl_mechs[i]; i++) {
+		const struct gensec_security_ops *oldmech;
+		struct gensec_security_ops *newmech;
+		oldmech = gensec_security_by_sasl_name(NULL, sasl_mechs[i]);
+		if (oldmech) {
+			continue;
+		}
+		newmech = talloc(NULL, struct gensec_security_ops);
+		if (!newmech) {
+			return NT_STATUS_NO_MEMORY;
+		}
+		*newmech = gensec_sasl_security_ops;
+		newmech->sasl_name = talloc_strdup(newmech, sasl_mechs[i]);
+		newmech->name = talloc_asprintf(newmech, "sasl-%s", sasl_mechs[i]);
+		if (!newmech->sasl_name || !newmech->name) {
+			return NT_STATUS_NO_MEMORY;
+		}
+
+		ret = gensec_register(newmech);
+		if (!NT_STATUS_IS_OK(ret)) {
+			DEBUG(0,("Failed to register '%s' gensec backend!\n",
+				 gensec_sasl_security_ops.name));
+			return ret;
+		}
+	}
+#endif
+	return NT_STATUS_OK;
+}

Modified: branches/SAMBA_4_0/source/auth/gensec/gensec.c
===================================================================
--- branches/SAMBA_4_0/source/auth/gensec/gensec.c	2006-09-06 10:30:17 UTC (rev 18154)
+++ branches/SAMBA_4_0/source/auth/gensec/gensec.c	2006-09-06 10:34:18 UTC (rev 18155)
@@ -174,8 +174,8 @@
 	return NULL;
 }
 
-static const struct gensec_security_ops *gensec_security_by_sasl_name(struct gensec_security *gensec_security,
-								      const char *sasl_name)
+const struct gensec_security_ops *gensec_security_by_sasl_name(struct gensec_security *gensec_security,
+							       const char *sasl_name)
 {
 	int i;
 	struct gensec_security_ops **backends;



More information about the samba-cvs mailing list