|
@@ -0,0 +1,663 @@
|
|
|
|
|
+/** BEGIN COPYRIGHT BLOCK
|
|
|
|
|
+ * This Program is free software; you can redistribute it and/or modify it under
|
|
|
|
|
+ * the terms of the GNU General Public License as published by the Free Software
|
|
|
|
|
+ * Foundation; version 2 of the License.
|
|
|
|
|
+ *
|
|
|
|
|
+ * This Program is distributed in the hope that it will be useful, but WITHOUT
|
|
|
|
|
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
|
|
|
|
|
+ * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
+ *
|
|
|
|
|
+ * You should have received a copy of the GNU General Public License along with
|
|
|
|
|
+ * this Program; if not, write to the Free Software Foundation, Inc., 59 Temple
|
|
|
|
|
+ * Place, Suite 330, Boston, MA 02111-1307 USA.
|
|
|
|
|
+ *
|
|
|
|
|
+ * In addition, as a special exception, Red Hat, Inc. gives You the additional
|
|
|
|
|
+ * right to link the code of this Program with code not covered under the GNU
|
|
|
|
|
+ * General Public License ("Non-GPL Code") and to distribute linked combinations
|
|
|
|
|
+ * including the two, subject to the limitations in this paragraph. Non-GPL Code
|
|
|
|
|
+ * permitted under this exception must only link to the code of this Program
|
|
|
|
|
+ * through those well defined interfaces identified in the file named EXCEPTION
|
|
|
|
|
+ * found in the source code files (the "Approved Interfaces"). The files of
|
|
|
|
|
+ * Non-GPL Code may instantiate templates or use macros or inline functions from
|
|
|
|
|
+ * the Approved Interfaces without causing the resulting work to be covered by
|
|
|
|
|
+ * the GNU General Public License. Only Red Hat, Inc. may make changes or
|
|
|
|
|
+ * additions to the list of Approved Interfaces. You must obey the GNU General
|
|
|
|
|
+ * Public License in all respects for all of the Program code and other code used
|
|
|
|
|
+ * in conjunction with the Program except the Non-GPL Code covered by this
|
|
|
|
|
+ * exception. If you modify this file, you may extend this exception to your
|
|
|
|
|
+ * version of the file, but you are not obligated to do so. If you do not wish to
|
|
|
|
|
+ * provide this exception without modification, you must delete this exception
|
|
|
|
|
+ * statement from your version and license this file solely under the GPL without
|
|
|
|
|
+ * exception.
|
|
|
|
|
+ *
|
|
|
|
|
+ *
|
|
|
|
|
+ * Copyright (C) 2012 Red Hat, Inc.
|
|
|
|
|
+ * All rights reserved.
|
|
|
|
|
+ * END COPYRIGHT BLOCK **/
|
|
|
|
|
+
|
|
|
|
|
+#ifdef HAVE_CONFIG_H
|
|
|
|
|
+# include <config.h>
|
|
|
|
|
+#endif
|
|
|
|
|
+
|
|
|
|
|
+/*
|
|
|
|
|
+ * Root DN Access Control plug-in
|
|
|
|
|
+ */
|
|
|
|
|
+#include "rootdn_access.h"
|
|
|
|
|
+#include <nspr.h>
|
|
|
|
|
+#include <time.h>
|
|
|
|
|
+#include <ctype.h>
|
|
|
|
|
+
|
|
|
|
|
+/*
|
|
|
|
|
+ * Add an entry like the following to dse.ldif to enable this plugin:
|
|
|
|
|
+ *
|
|
|
|
|
+ * dn: cn=RootDN Access Control,cn=plugins,cn=config
|
|
|
|
|
+ * objectclass: top
|
|
|
|
|
+ * objectclass: nsSlapdPlugin
|
|
|
|
|
+ * objectclass: extensibleObject
|
|
|
|
|
+ * cn: RootDN Access Control
|
|
|
|
|
+ * nsslapd-pluginpath: librootdn-access-plugin.so
|
|
|
|
|
+ * nsslapd-plugininitfunc: rootdn_init
|
|
|
|
|
+ * nsslapd-plugintype: rootdnpreoperation
|
|
|
|
|
+ * nsslapd-pluginenabled: on
|
|
|
|
|
+ * nsslapd-plugin-depends-on-type: database
|
|
|
|
|
+ * nsslapd-pluginid: rootdn-access-control
|
|
|
|
|
+ * rootdn-open-time: 0800
|
|
|
|
|
+ * rootdn-close-time: 1700
|
|
|
|
|
+ * rootdn-days-allowed: Mon, Tue, Wed, Thu, Fri
|
|
|
|
|
+ * rootdn-allow-host: *.redhat.com
|
|
|
|
|
+ * rootdn-allow-host: *.fedora.com
|
|
|
|
|
+ * rootdn-deny-host: dangerous.boracle.com
|
|
|
|
|
+ * rootdn-allow-ip: 127.0.0.1
|
|
|
|
|
+ * rootdn-allow-ip: 2000:db8:de30::11
|
|
|
|
|
+ * rootdn-deny-ip: 192.168.1.*
|
|
|
|
|
+ *
|
|
|
|
|
+ */
|
|
|
|
|
+
|
|
|
|
|
+/*
|
|
|
|
|
+ * Plugin Functions
|
|
|
|
|
+ */
|
|
|
|
|
+int rootdn_init(Slapi_PBlock *pb);
|
|
|
|
|
+static int rootdn_start(Slapi_PBlock *pb);
|
|
|
|
|
+static int rootdn_load_config(Slapi_PBlock *pb);
|
|
|
|
|
+static int rootdn_check_access(Slapi_PBlock *pb);
|
|
|
|
|
+static int rootdn_check_host_wildcard(char *host, char *client_host);
|
|
|
|
|
+static int rootdn_check_ip_wildcard(char *ip, char *client_ip);
|
|
|
|
|
+static int rootdn_preop_bind_init(Slapi_PBlock *pb);
|
|
|
|
|
+char * strToLower(char *str);
|
|
|
|
|
+
|
|
|
|
|
+/*
|
|
|
|
|
+ * Plug-in globals
|
|
|
|
|
+ */
|
|
|
|
|
+static void *_PluginID = NULL;
|
|
|
|
|
+static char *_PluginDN = NULL;
|
|
|
|
|
+static int g_plugin_started = 0;
|
|
|
|
|
+static int open_time = 0;
|
|
|
|
|
+static int close_time = 0;
|
|
|
|
|
+static char *daysAllowed = NULL;
|
|
|
|
|
+static char **hosts = NULL;
|
|
|
|
|
+static char **hosts_to_deny = NULL;
|
|
|
|
|
+static char **ips = NULL;
|
|
|
|
|
+static char **ips_to_deny = NULL;
|
|
|
|
|
+
|
|
|
|
|
+static Slapi_PluginDesc pdesc = { ROOTDN_FEATURE_DESC,
|
|
|
|
|
+ VENDOR,
|
|
|
|
|
+ DS_PACKAGE_VERSION,
|
|
|
|
|
+ ROOTDN_PLUGIN_DESC };
|
|
|
|
|
+
|
|
|
|
|
+/*
|
|
|
|
|
+ * Plugin identity functions
|
|
|
|
|
+ */
|
|
|
|
|
+void
|
|
|
|
|
+rootdn_set_plugin_id(void *pluginID)
|
|
|
|
|
+{
|
|
|
|
|
+ _PluginID = pluginID;
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+void *
|
|
|
|
|
+rootdn_get_plugin_id()
|
|
|
|
|
+{
|
|
|
|
|
+ return _PluginID;
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+void
|
|
|
|
|
+rootdn_set_plugin_dn(char *pluginDN)
|
|
|
|
|
+{
|
|
|
|
|
+ _PluginDN = pluginDN;
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+char *
|
|
|
|
|
+rootdn_get_plugin_dn()
|
|
|
|
|
+{
|
|
|
|
|
+ return _PluginDN;
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+
|
|
|
|
|
+int
|
|
|
|
|
+rootdn_init(Slapi_PBlock *pb){
|
|
|
|
|
+ int status = 0;
|
|
|
|
|
+ char *plugin_identity = NULL;
|
|
|
|
|
+
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_TRACE, ROOTDN_PLUGIN_SUBSYSTEM,
|
|
|
|
|
+ "--> rootdn_init\n");
|
|
|
|
|
+
|
|
|
|
|
+ /* Store the plugin identity for later use. Used for internal operations. */
|
|
|
|
|
+ slapi_pblock_get(pb, SLAPI_PLUGIN_IDENTITY, &plugin_identity);
|
|
|
|
|
+ PR_ASSERT(plugin_identity);
|
|
|
|
|
+ rootdn_set_plugin_id(plugin_identity);
|
|
|
|
|
+
|
|
|
|
|
+ /* Register callbacks */
|
|
|
|
|
+ if(slapi_pblock_set(pb, SLAPI_PLUGIN_VERSION, SLAPI_PLUGIN_VERSION_01) != 0 ||
|
|
|
|
|
+ slapi_pblock_set(pb, SLAPI_PLUGIN_START_FN, (void *) rootdn_start) != 0 ||
|
|
|
|
|
+ slapi_pblock_set(pb, SLAPI_PLUGIN_DESCRIPTION, (void *) &pdesc) != 0 )
|
|
|
|
|
+ {
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_init: failed to register plugin\n");
|
|
|
|
|
+ status = -1;
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ /* for this plugin we don't want to skip over root dn's when binding */
|
|
|
|
|
+ slapi_set_plugin_open_rootdn_bind(pb);
|
|
|
|
|
+
|
|
|
|
|
+ if (!status &&
|
|
|
|
|
+ slapi_register_plugin("internalpreoperation", /* op type */
|
|
|
|
|
+ 1, /* Enabled */
|
|
|
|
|
+ "rootdn_preop_bind_init", /* this function desc */
|
|
|
|
|
+ rootdn_preop_bind_init, /* init func */
|
|
|
|
|
+ ROOTDN_PLUGIN_DESC, /* plugin desc */
|
|
|
|
|
+ NULL, /* ? */
|
|
|
|
|
+ plugin_identity /* access control */
|
|
|
|
|
+ )) {
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM,
|
|
|
|
|
+ "rootdn_init: failed to register rootdn preoperation plugin\n");
|
|
|
|
|
+ status = -1;
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ /*
|
|
|
|
|
+ * Load the config
|
|
|
|
|
+ */
|
|
|
|
|
+ if(rootdn_load_config(pb) != 0){
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM,
|
|
|
|
|
+ "rootdn_start: unable to load plug-in configuration\n");
|
|
|
|
|
+ return -1;
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_PLUGIN, ROOTDN_PLUGIN_SUBSYSTEM,"<-- rootdn_init\n");
|
|
|
|
|
+ return status;
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+static int
|
|
|
|
|
+rootdn_preop_bind_init(Slapi_PBlock *pb)
|
|
|
|
|
+{
|
|
|
|
|
+ if(slapi_pblock_set(pb, SLAPI_PLUGIN_INTERNAL_PRE_BIND_FN, (void *) rootdn_check_access) != 0){
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM,"rootdn_preop_bind_init: "
|
|
|
|
|
+ "failed to register function\n");
|
|
|
|
|
+ return -1;
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ return 0;
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+static int
|
|
|
|
|
+rootdn_start(Slapi_PBlock *pb){
|
|
|
|
|
+ /* Check if we're already started */
|
|
|
|
|
+ if (g_plugin_started) {
|
|
|
|
|
+ goto done;
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_PLUGIN, ROOTDN_PLUGIN_SUBSYSTEM, "--> rootdn_start\n");
|
|
|
|
|
+
|
|
|
|
|
+ g_plugin_started = 1;
|
|
|
|
|
+
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_PLUGIN, ROOTDN_PLUGIN_SUBSYSTEM, "<-- rootdn_start\n");
|
|
|
|
|
+
|
|
|
|
|
+done:
|
|
|
|
|
+ return 0;
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+static int
|
|
|
|
|
+rootdn_load_config(Slapi_PBlock *pb)
|
|
|
|
|
+{
|
|
|
|
|
+ Slapi_Entry *e = NULL;
|
|
|
|
|
+ char *openTime, *closeTime;
|
|
|
|
|
+ char hour[3], min[3];
|
|
|
|
|
+ int result = 0;
|
|
|
|
|
+ int i;
|
|
|
|
|
+
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_PLUGIN, ROOTDN_PLUGIN_SUBSYSTEM, "--> rootdn_load_config\n");
|
|
|
|
|
+
|
|
|
|
|
+ if ((slapi_pblock_get(pb, SLAPI_PLUGIN_CONFIG_ENTRY, &e) == 0) && e){
|
|
|
|
|
+ /*
|
|
|
|
|
+ * Grab our plugin settings
|
|
|
|
|
+ */
|
|
|
|
|
+ openTime = slapi_entry_attr_get_charptr(e, "rootdn-open-time");
|
|
|
|
|
+ closeTime = slapi_entry_attr_get_charptr(e, "rootdn-close-time");
|
|
|
|
|
+ daysAllowed = slapi_entry_attr_get_charptr(e, "rootdn-days-allowed");
|
|
|
|
|
+ hosts = slapi_entry_attr_get_charray(e, "rootdn-allow-host");
|
|
|
|
|
+ hosts_to_deny = slapi_entry_attr_get_charray(e, "rootdn-deny-host");
|
|
|
|
|
+ ips = slapi_entry_attr_get_charray(e, "rootdn-allow-ip");
|
|
|
|
|
+ ips_to_deny = slapi_entry_attr_get_charray(e, "rootdn-deny-ip");
|
|
|
|
|
+ /*
|
|
|
|
|
+ * Validate out settings
|
|
|
|
|
+ */
|
|
|
|
|
+ if(daysAllowed){
|
|
|
|
|
+ if(strcspn(daysAllowed, "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz ,")){
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config: "
|
|
|
|
|
+ "invalid rootdn-days-allowed value (%s), must be all letters, and comma separators\n",closeTime);
|
|
|
|
|
+ slapi_ch_free_string(&daysAllowed);
|
|
|
|
|
+ return -1;
|
|
|
|
|
+ }
|
|
|
|
|
+ daysAllowed = strToLower(daysAllowed);
|
|
|
|
|
+ }
|
|
|
|
|
+ if(openTime){
|
|
|
|
|
+ if (strcspn(openTime, "0123456789")){
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config: "
|
|
|
|
|
+ "invalid rootdn-open-time value (%s), must be all digits\n",openTime);
|
|
|
|
|
+ slapi_ch_free_string(&openTime);
|
|
|
|
|
+ return -1;
|
|
|
|
|
+ }
|
|
|
|
|
+ if(strlen(openTime) != 4){
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config: "
|
|
|
|
|
+ "invalid format for rootdn-open-time value (%s). Should be HHMM\n", openTime);
|
|
|
|
|
+ slapi_ch_free_string(&openTime);
|
|
|
|
|
+ return -1;
|
|
|
|
|
+ }
|
|
|
|
|
+ /*
|
|
|
|
|
+ * convert the time to all seconds
|
|
|
|
|
+ */
|
|
|
|
|
+ strncpy(hour, openTime,2);
|
|
|
|
|
+ strncpy(min, openTime+2,2);
|
|
|
|
|
+ open_time = (atoi(hour) * 3600) + (atoi(min) * 60);
|
|
|
|
|
+ }
|
|
|
|
|
+ if(closeTime){
|
|
|
|
|
+ if (strcspn(closeTime, "0123456789")){
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config: "
|
|
|
|
|
+ "invalid rootdn-open-time value (%s), must be all digits, and should be HHMM\n",closeTime);
|
|
|
|
|
+ slapi_ch_free_string(&closeTime);
|
|
|
|
|
+ return -1;
|
|
|
|
|
+ }
|
|
|
|
|
+ if(strlen(closeTime) != 4){
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config: "
|
|
|
|
|
+ "invalid format for rootdn-open-time value (%s), should be HHMM\n", closeTime);
|
|
|
|
|
+ slapi_ch_free_string(&closeTime);
|
|
|
|
|
+ return -1;
|
|
|
|
|
+ }
|
|
|
|
|
+ /*
|
|
|
|
|
+ * convert the time to all seconds
|
|
|
|
|
+ */
|
|
|
|
|
+
|
|
|
|
|
+ strncpy(hour, closeTime,2);
|
|
|
|
|
+ strncpy(min, closeTime+2,2);
|
|
|
|
|
+ close_time = (atoi(hour) * 3600) + (atoi(min) * 60);
|
|
|
|
|
+ }
|
|
|
|
|
+ if((openTime && closeTime == NULL) || (openTime == NULL && closeTime)){
|
|
|
|
|
+ /* If you are using TOD access control, you must have a open and close time */
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config: "
|
|
|
|
|
+ "there must be a open and a close time\n");
|
|
|
|
|
+ slapi_ch_free_string(&closeTime);
|
|
|
|
|
+ slapi_ch_free_string(&openTime);
|
|
|
|
|
+ return -1;
|
|
|
|
|
+ }
|
|
|
|
|
+ if(close_time && open_time && close_time <= open_time){
|
|
|
|
|
+ /* Make sure the closing time is greater than the open time */
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config: "
|
|
|
|
|
+ "the close time must be greater than the open time\n");
|
|
|
|
|
+ result = -1;
|
|
|
|
|
+ }
|
|
|
|
|
+ if(hosts){
|
|
|
|
|
+ for(i = 0; hosts[i] != NULL; i++){
|
|
|
|
|
+ if(strcspn(hosts[i], "0123456789.*-ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz")){
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config: "
|
|
|
|
|
+ "hostname (%s) contians invalid characters, skipping\n",hosts[i]);
|
|
|
|
|
+ slapi_ch_free_string(&hosts[i]);
|
|
|
|
|
+ hosts[i] = slapi_ch_strdup("!invalid");
|
|
|
|
|
+ continue;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ if(hosts_to_deny){
|
|
|
|
|
+ for(i = 0; hosts_to_deny[i] != NULL; i++){
|
|
|
|
|
+ if(strcspn(hosts_to_deny[i], "0123456789.*-ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz")){
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config: "
|
|
|
|
|
+ "hostname (%s) contians invalid characters, skipping\n",hosts_to_deny[i]);
|
|
|
|
|
+ slapi_ch_free_string(&hosts_to_deny[i]);
|
|
|
|
|
+ hosts_to_deny[i] = slapi_ch_strdup("!invalid");
|
|
|
|
|
+ continue;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ if(ips){
|
|
|
|
|
+ for(i = 0; ips[i] != NULL; i++){
|
|
|
|
|
+ if(strcspn(ips[i], "0123456789:ABCDEFabcdef.*")){
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config: "
|
|
|
|
|
+ "IP address contains invalid characters (%s), skipping\n", ips[i]);
|
|
|
|
|
+ slapi_ch_free_string(&ips[i]);
|
|
|
|
|
+ ips[i] = slapi_ch_strdup("!invalid");
|
|
|
|
|
+ continue;
|
|
|
|
|
+ }
|
|
|
|
|
+ if(strstr(ips[i],":") == 0){
|
|
|
|
|
+ /*
|
|
|
|
|
+ * IPv4 - make sure it's just numbers, dots, and wildcard
|
|
|
|
|
+ */
|
|
|
|
|
+ if(strcspn(ips[i], "0123456789.*")){
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config: "
|
|
|
|
|
+ "IPv4 address contains invalid characters (%s), skipping\n", ips[i]);
|
|
|
|
|
+ slapi_ch_free_string(&ips[i]);
|
|
|
|
|
+ ips[i] = slapi_ch_strdup("!invalid");
|
|
|
|
|
+ continue;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ if(ips_to_deny){
|
|
|
|
|
+ for(i = 0; ips_to_deny[i] != NULL; i++){
|
|
|
|
|
+ if(strcspn(ips_to_deny[i], "0123456789:ABCDEFabcdef.*")){
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config: "
|
|
|
|
|
+ "IP address contains invalid characters (%s), skipping\n", ips_to_deny[i]);
|
|
|
|
|
+ slapi_ch_free_string(&ips_to_deny[i]);
|
|
|
|
|
+ ips_to_deny[i] = slapi_ch_strdup("!invalid");
|
|
|
|
|
+ continue;
|
|
|
|
|
+ }
|
|
|
|
|
+ if(strstr(ips_to_deny[i],":") == 0){
|
|
|
|
|
+ /*
|
|
|
|
|
+ * IPv4 - make sure it's just numbers, dots, and wildcard
|
|
|
|
|
+ */
|
|
|
|
|
+ if(strcspn(ips_to_deny[i], "0123456789.*")){
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config: "
|
|
|
|
|
+ "IPv4 address contains invalid characters (%s), skipping\n", ips_to_deny[i]);
|
|
|
|
|
+ slapi_ch_free_string(&ips_to_deny[i]);
|
|
|
|
|
+ ips_to_deny[i] = slapi_ch_strdup("!invalid");
|
|
|
|
|
+ continue;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ slapi_ch_free_string(&openTime);
|
|
|
|
|
+ slapi_ch_free_string(&closeTime);
|
|
|
|
|
+ } else {
|
|
|
|
|
+ /* failed to get the plugin entry */
|
|
|
|
|
+ result = -1;
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_PLUGIN, ROOTDN_PLUGIN_SUBSYSTEM, "<-- rootdn_load_config (%d)\n", result);
|
|
|
|
|
+
|
|
|
|
|
+ return result;
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+
|
|
|
|
|
+static int
|
|
|
|
|
+rootdn_check_access(Slapi_PBlock *pb){
|
|
|
|
|
+ PRNetAddr *client_addr = NULL;
|
|
|
|
|
+ PRHostEnt *host_entry = NULL;
|
|
|
|
|
+ time_t curr_time;
|
|
|
|
|
+ struct tm *timeinfo;
|
|
|
|
|
+ char *dnsName = NULL;
|
|
|
|
|
+ int isRoot = 0;
|
|
|
|
|
+ int rc = 0;
|
|
|
|
|
+ int i;
|
|
|
|
|
+
|
|
|
|
|
+ /*
|
|
|
|
|
+ * Verify this is a root DN
|
|
|
|
|
+ */
|
|
|
|
|
+ slapi_pblock_get ( pb, SLAPI_REQUESTOR_ISROOT, &isRoot );
|
|
|
|
|
+ if(!isRoot){
|
|
|
|
|
+ return 0;
|
|
|
|
|
+ }
|
|
|
|
|
+ /*
|
|
|
|
|
+ * grab the current time/info if we need it
|
|
|
|
|
+ */
|
|
|
|
|
+ if(open_time || daysAllowed){
|
|
|
|
|
+ time(&curr_time);
|
|
|
|
|
+ timeinfo = localtime(&curr_time);
|
|
|
|
|
+ }
|
|
|
|
|
+ /*
|
|
|
|
|
+ * First check TOD restrictions, continue through if we are in the open "window"
|
|
|
|
|
+ */
|
|
|
|
|
+ if(open_time){
|
|
|
|
|
+ int curr_total;
|
|
|
|
|
+
|
|
|
|
|
+ curr_total = (timeinfo->tm_hour * 3600) + (timeinfo->tm_min * 60);
|
|
|
|
|
+
|
|
|
|
|
+ if((curr_total < open_time) || (curr_total >= close_time)){
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_PLUGIN, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_check_access: bind not in the "
|
|
|
|
|
+ "allowed time window\n");
|
|
|
|
|
+ return -1;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ /*
|
|
|
|
|
+ * Check if today is an allowed day
|
|
|
|
|
+ */
|
|
|
|
|
+ if(daysAllowed){
|
|
|
|
|
+ char *timestr;
|
|
|
|
|
+ char day[4];
|
|
|
|
|
+ char *today = day;
|
|
|
|
|
+
|
|
|
|
|
+ timestr = asctime(timeinfo); // DDD MMM dd hh:mm:ss YYYY
|
|
|
|
|
+ memmove(day, timestr, 3); // we only want the day
|
|
|
|
|
+ today = strToLower(today);
|
|
|
|
|
+
|
|
|
|
|
+ if(!strstr(today, daysAllowed)){
|
|
|
|
|
+ slapi_log_error(SLAPI_LOG_PLUGIN, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_check_access: bind not allowed for today\n");
|
|
|
|
|
+ return -1;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ /*
|
|
|
|
|
+ * Check the host restrictions, deny always overrides allow
|
|
|
|
|
+ */
|
|
|
|
|
+ if(hosts || hosts_to_deny){
|
|
|
|
|
+ char buf[PR_NETDB_BUF_SIZE];
|
|
|
|
|
+ char *host;
|
|
|
|
|
+
|
|
|
|
|
+ /*
|
|
|
|
|
+ * Get the client address
|
|
|
|
|
+ */
|
|
|
|
|
+ client_addr = (PRNetAddr *)slapi_ch_malloc(sizeof(PRNetAddr));
|
|
|
|
|
+ if ( slapi_pblock_get( pb, SLAPI_CONN_CLIENTNETADDR, client_addr ) != 0 ) {
|
|
|
|
|
+ slapi_log_error( SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_check_access: Could not get client address for hosts.\n" );
|
|
|
|
|
+ rc = -1;
|
|
|
|
|
+ goto free_and_return;
|
|
|
|
|
+ }
|
|
|
|
|
+ /*
|
|
|
|
|
+ * Get the hostname from the client address
|
|
|
|
|
+ */
|
|
|
|
|
+ host_entry = (PRHostEnt *)slapi_ch_malloc( sizeof(PRHostEnt) );
|
|
|
|
|
+ if ( PR_GetHostByAddr(client_addr, buf, sizeof(buf), host_entry ) == PR_SUCCESS ) {
|
|
|
|
|
+ if ( host_entry->h_name != NULL ) {
|
|
|
|
|
+ /* copy the hostname */
|
|
|
|
|
+ dnsName = slapi_ch_strdup( host_entry->h_name );
|
|
|
|
|
+ } else {
|
|
|
|
|
+ /* no hostname */
|
|
|
|
|
+ slapi_log_error( SLAPI_LOG_PLUGIN, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_check_access: client address missing hostname\n");
|
|
|
|
|
+ rc = -1;
|
|
|
|
|
+ goto free_and_return;
|
|
|
|
|
+ }
|
|
|
|
|
+ } else {
|
|
|
|
|
+ slapi_log_error( SLAPI_LOG_PLUGIN, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_check_access: client IP address could not be resolved\n");
|
|
|
|
|
+ rc = -1;
|
|
|
|
|
+ goto free_and_return;
|
|
|
|
|
+ }
|
|
|
|
|
+ /*
|
|
|
|
|
+ * Now we have our hostname, now do our checks
|
|
|
|
|
+ */
|
|
|
|
|
+ if(hosts_to_deny){
|
|
|
|
|
+ for(i = 0; hosts_to_deny[i] != NULL; i++){
|
|
|
|
|
+ host = hosts_to_deny[i];
|
|
|
|
|
+ /* check for wild cards */
|
|
|
|
|
+ if(host[0] == '*'){
|
|
|
|
|
+ if(rootdn_check_host_wildcard(host, dnsName) == 0){
|
|
|
|
|
+ /* match, return failure */
|
|
|
|
|
+ rc = -1;
|
|
|
|
|
+ goto free_and_return;
|
|
|
|
|
+ }
|
|
|
|
|
+ } else {
|
|
|
|
|
+ if(strcasecmp(host,dnsName) == 0){
|
|
|
|
|
+ /* we have a match, return failure */
|
|
|
|
|
+ rc = -1;
|
|
|
|
|
+ goto free_and_return;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ rc = 0;
|
|
|
|
|
+ }
|
|
|
|
|
+ if(hosts){
|
|
|
|
|
+ for(i = 0; hosts[i] != NULL; i++){
|
|
|
|
|
+ host = hosts[i];
|
|
|
|
|
+ /* check for wild cards */
|
|
|
|
|
+ if(host[0] == '*'){
|
|
|
|
|
+ if(rootdn_check_host_wildcard(host, dnsName) == 0){
|
|
|
|
|
+ /* match */
|
|
|
|
|
+ rc = 0;
|
|
|
|
|
+ goto free_and_return;
|
|
|
|
|
+ }
|
|
|
|
|
+ } else {
|
|
|
|
|
+ if(strcasecmp(host,dnsName) == 0){
|
|
|
|
|
+ /* we have a match, */
|
|
|
|
|
+ rc = 0;
|
|
|
|
|
+ goto free_and_return;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ rc = -1;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ /*
|
|
|
|
|
+ * Check the IP address restrictions, deny always overrides allow
|
|
|
|
|
+ */
|
|
|
|
|
+ if(ips || ips_to_deny){
|
|
|
|
|
+ char ip_str[256];
|
|
|
|
|
+ char *ip;
|
|
|
|
|
+ int ip_len, i;
|
|
|
|
|
+
|
|
|
|
|
+ if(client_addr == NULL){
|
|
|
|
|
+ client_addr = (PRNetAddr *)slapi_ch_malloc(sizeof(PRNetAddr));
|
|
|
|
|
+ if ( slapi_pblock_get( pb, SLAPI_CONN_CLIENTNETADDR, client_addr ) != 0 ) {
|
|
|
|
|
+ slapi_log_error( SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_check_access: Could not get client address for IP.\n" );
|
|
|
|
|
+ rc = -1;
|
|
|
|
|
+ goto free_and_return;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ /*
|
|
|
|
|
+ * Check if we are IPv4, so we can grab the correct IP addr for "ip_str"
|
|
|
|
|
+ */
|
|
|
|
|
+ if ( PR_IsNetAddrType( client_addr, PR_IpAddrV4Mapped ) ) {
|
|
|
|
|
+ PRNetAddr v4addr;
|
|
|
|
|
+ memset( &v4addr, 0, sizeof( v4addr ) );
|
|
|
|
|
+ v4addr.inet.family = PR_AF_INET;
|
|
|
|
|
+ v4addr.inet.ip = client_addr->ipv6.ip.pr_s6_addr32[3];
|
|
|
|
|
+ if( PR_NetAddrToString( &v4addr, ip_str, sizeof( ip_str )) != PR_SUCCESS){
|
|
|
|
|
+ slapi_log_error( SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_check_access: Could not get IPv4 from client address.\n" );
|
|
|
|
|
+ rc = -1;
|
|
|
|
|
+ goto free_and_return;
|
|
|
|
|
+ }
|
|
|
|
|
+ } else {
|
|
|
|
|
+ if( PR_NetAddrToString(client_addr, ip_str, sizeof(ip_str)) != PR_SUCCESS){
|
|
|
|
|
+ slapi_log_error( SLAPI_LOG_FATAL, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_check_access: Could not get IPv6 from client address.\n" );
|
|
|
|
|
+ rc = -1;
|
|
|
|
|
+ goto free_and_return;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ /*
|
|
|
|
|
+ * Now we have our IP address, do our checks
|
|
|
|
|
+ */
|
|
|
|
|
+ if(ips_to_deny){
|
|
|
|
|
+ for(i = 0; ips_to_deny[i] != NULL; i++){
|
|
|
|
|
+ ip = ips_to_deny[i];
|
|
|
|
|
+ ip_len = strlen(ip);
|
|
|
|
|
+ if(ip[ip_len - 1] == '*'){
|
|
|
|
|
+ if(rootdn_check_ip_wildcard(ips_to_deny[i], ip_str) == 0){
|
|
|
|
|
+ /* match, return failure */
|
|
|
|
|
+ rc = -1;
|
|
|
|
|
+ goto free_and_return;
|
|
|
|
|
+ }
|
|
|
|
|
+ } else {
|
|
|
|
|
+ if(strcasecmp(ip_str, ip)==0){
|
|
|
|
|
+ /* match, return failure */
|
|
|
|
|
+ rc = -1;
|
|
|
|
|
+ goto free_and_return;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ rc = 0;
|
|
|
|
|
+ }
|
|
|
|
|
+ if(ips){
|
|
|
|
|
+ for(i = 0; ips[i] != NULL; i++){
|
|
|
|
|
+ ip = ips[i];
|
|
|
|
|
+ ip_len = strlen(ip);
|
|
|
|
|
+ if(ip[ip_len - 1] == '*'){
|
|
|
|
|
+ if(rootdn_check_ip_wildcard(ip, ip_str) == 0){
|
|
|
|
|
+ /* match, return success */
|
|
|
|
|
+ rc = 0;
|
|
|
|
|
+ goto free_and_return;
|
|
|
|
|
+ }
|
|
|
|
|
+ } else {
|
|
|
|
|
+ if(strcasecmp(ip_str, ip)==0){
|
|
|
|
|
+ /* match, return success */
|
|
|
|
|
+ rc = 0;
|
|
|
|
|
+ goto free_and_return;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+ rc = -1;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+free_and_return:
|
|
|
|
|
+ slapi_ch_free((void **)&client_addr);
|
|
|
|
|
+ slapi_ch_free((void **)&host_entry);
|
|
|
|
|
+ slapi_ch_free_string(&dnsName);
|
|
|
|
|
+
|
|
|
|
|
+ return rc;
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+static int
|
|
|
|
|
+rootdn_check_host_wildcard(char *host, char *client_host)
|
|
|
|
|
+{
|
|
|
|
|
+ int host_len = strlen(host);
|
|
|
|
|
+ int client_len = strlen(client_host);
|
|
|
|
|
+ int i, j;
|
|
|
|
|
+ /*
|
|
|
|
|
+ * Start at the end of the string and move backwards, and skip the first char "*"
|
|
|
|
|
+ */
|
|
|
|
|
+ if(client_len < host_len){
|
|
|
|
|
+ /* this can't be a match */
|
|
|
|
|
+ return -1;
|
|
|
|
|
+ }
|
|
|
|
|
+ for(i = host_len - 1, j = client_len - 1; i > 0; i--, j--){
|
|
|
|
|
+ if(host[i] != client_host[j]){
|
|
|
|
|
+ return -1;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ return 0;
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+static int
|
|
|
|
|
+rootdn_check_ip_wildcard(char *ip, char *client_ip)
|
|
|
|
|
+{
|
|
|
|
|
+ int ip_len = strlen(ip);
|
|
|
|
|
+ int i;
|
|
|
|
|
+ /*
|
|
|
|
|
+ * Start at the beginning of the string and move forward, and skip the last char "*"
|
|
|
|
|
+ */
|
|
|
|
|
+ if(strlen(client_ip) < ip_len){
|
|
|
|
|
+ /* this can't be a match */
|
|
|
|
|
+ return -1;
|
|
|
|
|
+ }
|
|
|
|
|
+ for(i = 0; i < ip_len - 1; i++){
|
|
|
|
|
+ if(ip[i] != client_ip[i]){
|
|
|
|
|
+ return -1;
|
|
|
|
|
+ }
|
|
|
|
|
+ }
|
|
|
|
|
+
|
|
|
|
|
+ return 0;
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+char *
|
|
|
|
|
+strToLower(char *str){
|
|
|
|
|
+ int i;
|
|
|
|
|
+
|
|
|
|
|
+ for(i = 0; i < strlen(str); i++){
|
|
|
|
|
+ str[i] = tolower(str[i]);
|
|
|
|
|
+ }
|
|
|
|
|
+ return str;
|
|
|
|
|
+}
|
|
|
|
|
+
|
|
|
|
|
+
|