| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282 |
- /** BEGIN COPYRIGHT BLOCK
- * This Program is free software; you can redistribute it and/or modify it under
- * the terms of the GNU General Public License as published by the Free Software
- * Foundation; version 2 of the License.
- *
- * This Program is distributed in the hope that it will be useful, but WITHOUT
- * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
- * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License along with
- * this Program; if not, write to the Free Software Foundation, Inc., 59 Temple
- * Place, Suite 330, Boston, MA 02111-1307 USA.
- *
- * In addition, as a special exception, Red Hat, Inc. gives You the additional
- * right to link the code of this Program with code not covered under the GNU
- * General Public License ("Non-GPL Code") and to distribute linked combinations
- * including the two, subject to the limitations in this paragraph. Non-GPL Code
- * permitted under this exception must only link to the code of this Program
- * through those well defined interfaces identified in the file named EXCEPTION
- * found in the source code files (the "Approved Interfaces"). The files of
- * Non-GPL Code may instantiate templates or use macros or inline functions from
- * the Approved Interfaces without causing the resulting work to be covered by
- * the GNU General Public License. Only Red Hat, Inc. may make changes or
- * additions to the list of Approved Interfaces. You must obey the GNU General
- * Public License in all respects for all of the Program code and other code used
- * in conjunction with the Program except the Non-GPL Code covered by this
- * exception. If you modify this file, you may extend this exception to your
- * version of the file, but you are not obligated to do so. If you do not wish to
- * provide this exception without modification, you must delete this exception
- * statement from your version and license this file solely under the GPL without
- * exception.
- *
- *
- * Copyright (C) 2001 Sun Microsystems, Inc. Used by permission.
- * Copyright (C) 2005 Red Hat, Inc.
- * All rights reserved.
- * END COPYRIGHT BLOCK **/
- #ifdef HAVE_CONFIG_H
- # include <config.h>
- #endif
- /* bind.c - ldbm backend bind and unbind routines */
- #include "back-ldbm.h"
- #if defined( XP_WIN32 )
- typedef enum LDAPWAEnum {
- LDAPWA_NoDomainAttr = -3,
- LDAPWA_InvalidCredentials = -2,
- LDAPWA_Failure = -1,
- LDAPWA_Success= 0
- } LDAPWAStatus;
- int
- GetDomainUsername(
- char *pszNTuserdomainid,
- char *pszNTDomain,
- char *pszNTUsername
- )
- {
- char *pszAttr, *pDomain, *pUsername;
- if( !pszNTuserdomainid )
- return( 1 );
- // Split the specially constructed attribute.
- pszAttr = slapi_ch_strdup( pszNTuserdomainid );
- pDomain = pszAttr;
- pUsername = strchr( pszAttr, ':' );
- if( pUsername == NULL )
- return( 1 );
- // Set the end of the NT Domain name,
- // and the start of the NT username.
- *pUsername = (char)NULL;
- pUsername++;
- strcpy( pszNTDomain, pDomain);
- strcpy( pszNTUsername, pUsername);
- slapi_ch_free( (void**)&pszAttr );
- return( 0 );
- }
- /* Attempt Windows NT Authentication, using the password from the client app,
- with the NT Domain and NT username, both stored in the entry.
- If successful, the ldap_bind() is completed successsfully. */
- LDAPWAStatus
- WindowsAuthentication(
- struct backentry *e,
- struct berval *cred
- )
- {
- Slapi_Attr *a;
- Slapi_Value *sval = NULL;
- int iStatus;
- char szNTDomain[MAX_PATH], szNTUsername[MAX_PATH];
- HANDLE hToken = NULL;
- BOOL bLogonStatus = FALSE;
- int i= -1;
-
- /* Get the NT Domain and username - if the entry has such an attribute */
- if( !e || !e->ep_entry ||
- slapi_entry_attr_find( e->ep_entry, "ntuserdomainid", &a ) != 0)
- {
- return( LDAPWA_NoDomainAttr );
- }
- i= slapi_attr_first_value( a, &sval );
- if(sval==NULL)
- {
- return( LDAPWA_NoDomainAttr );
- }
- while(i != -1)
- {
- const struct berval *val = slapi_value_get_berval(sval);
- char * colon = NULL;
- if (!val->bv_val || (strlen(val->bv_val) > (MAX_PATH<<1))) {
- LDAPDebug( LDAP_DEBUG_TRACE,
- "WindowsAuthentication => validation FAILED for \"%s\" on NT Domain : "
- "ntuserdomainid attr value too long\n",
- val->bv_val, 0, 0);
- i= slapi_attr_next_value(a, i, &sval);
- continue;
- }
- colon = strchr( val->bv_val, ':' );
- if (!colon || ((colon - val->bv_val)/sizeof(char) > MAX_PATH)) {
- if (!colon) {
- LDAPDebug( LDAP_DEBUG_TRACE,
- "WindowsAuthentication => validation FAILED for \"%s\" on NT Domain : "
- "a colon is missing in ntuserdomainid attr value\n",
- val->bv_val, 0, 0);
- }
- else {
- LDAPDebug( LDAP_DEBUG_TRACE,
- "WindowsAuthentication => validation FAILED for \"%s\" on NT Domain : "
- "domain in ntuserdomainid attr value too long\n",
- val->bv_val, 0, 0);
- }
- i= slapi_attr_next_value(a, i, &sval);
- continue;
- }
- if(( iStatus = GetDomainUsername( val->bv_val,
- szNTDomain,
- szNTUsername )) != 0)
- {
- i= slapi_attr_next_value(a, i, &sval);
- continue;
- }
- #if !defined( LOGON32_LOGON_NETWORK )
- /* This is specified in the WIn32 LogonUser() documentation, but not defined
- in the Visual C++ 4.2 include file winbase.h. A search of the lastest version
- of this file at www.microsoft.com finds that LOGON32_LOGON_NETWORK == 3.
- */
- #define LOGON32_LOGON_NETWORK 3
- #endif
- /* Now do the Logon attempt */
- bLogonStatus = LogonUser( szNTUsername, // string that specifies the user name
- szNTDomain, // string that specifies the domain or server
- cred->bv_val, // string that specifies the password
- LOGON32_LOGON_NETWORK, // the type of logon operation,
- LOGON32_PROVIDER_DEFAULT, // specifies the logon provider
- &hToken ); // pointer to variable to receive token handle
- if( bLogonStatus && hToken )
- CloseHandle( hToken );
-
- if( bLogonStatus )
- {
- // Successful validation
- LDAPDebug( LDAP_DEBUG_TRACE,
- "WindowsAuthentication => validated \"%s\" on NT Domain \"%s\"\n",
- szNTUsername, szNTDomain, 0 );
- return( LDAPWA_Success );
- }
- else
- {
- LDAPDebug( LDAP_DEBUG_TRACE,
- "WindowsAuthentication => validation FAILED for \"%s\" on NT Domain \"%s\", reason %d\n",
- szNTUsername, szNTDomain, GetLastError() );
- return( LDAPWA_InvalidCredentials );
- }
- i= slapi_attr_next_value(a, i, &sval);
- }
-
- return( LDAPWA_Failure );
- }
- #endif
- int
- ldbm_back_bind( Slapi_PBlock *pb )
- {
- backend *be;
- ldbm_instance *inst;
- int method;
- struct berval *cred;
- struct ldbminfo *li;
- struct backentry *e;
- Slapi_Attr *attr;
- Slapi_Value **bvals;
- entry_address *addr;
- /* get parameters */
- slapi_pblock_get( pb, SLAPI_BACKEND, &be );
- slapi_pblock_get( pb, SLAPI_PLUGIN_PRIVATE, &li );
- slapi_pblock_get( pb, SLAPI_TARGET_ADDRESS, &addr );
- slapi_pblock_get( pb, SLAPI_BIND_METHOD, &method );
- slapi_pblock_get( pb, SLAPI_BIND_CREDENTIALS, &cred );
-
- inst = (ldbm_instance *) be->be_instance_info;
- /* always allow noauth simple binds (front end will send the result) */
- if ( method == LDAP_AUTH_SIMPLE && cred->bv_len == 0 ) {
- return( SLAPI_BIND_ANONYMOUS );
- }
- /*
- * find the target entry. find_entry() takes care of referrals
- * and sending errors if the entry does not exist.
- */
- if (( e = find_entry( pb, be, addr, NULL /* no txn */ )) == NULL ) {
- return( SLAPI_BIND_FAIL );
- }
- switch ( method ) {
- case LDAP_AUTH_SIMPLE:
- {
- Slapi_Value cv;
- if ( slapi_entry_attr_find( e->ep_entry, "userpassword", &attr ) != 0 ) {
- #if defined( XP_WIN32 )
- if( WindowsAuthentication( e, cred ) == LDAPWA_Success ) {
- break;
- }
- #endif
- slapi_send_ldap_result( pb, LDAP_INAPPROPRIATE_AUTH, NULL,
- NULL, 0, NULL );
- cache_return( &inst->inst_cache, &e );
- return( SLAPI_BIND_FAIL );
- }
- bvals= attr_get_present_values(attr);
- slapi_value_init_berval(&cv,cred);
- if ( slapi_pw_find_sv( bvals, &cv ) != 0 ) {
- #if defined( XP_WIN32 )
- /* One last try - attempt Windows authentication,
- if the user has a Windows account. */
- if( WindowsAuthentication( e, cred ) == LDAPWA_Success ) {
- break;
- }
- #endif
- slapi_send_ldap_result( pb, LDAP_INVALID_CREDENTIALS, NULL,
- NULL, 0, NULL );
- cache_return( &inst->inst_cache, &e );
- value_done(&cv);
- return( SLAPI_BIND_FAIL );
- }
- value_done(&cv);
- }
- break;
- default:
- slapi_send_ldap_result( pb, LDAP_STRONG_AUTH_NOT_SUPPORTED, NULL,
- "auth method not supported", 0, NULL );
- cache_return( &inst->inst_cache, &e );
- return( SLAPI_BIND_FAIL );
- }
- cache_return( &inst->inst_cache, &e );
- /* success: front end will send result */
- return( SLAPI_BIND_SUCCESS );
- }
|