rootdn_access.c 28 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780
  1. /** BEGIN COPYRIGHT BLOCK
  2. * Copyright (C) 2012 Red Hat, Inc.
  3. * All rights reserved.
  4. *
  5. * License: GPL (version 3 or any later version).
  6. * See LICENSE for details.
  7. * END COPYRIGHT BLOCK **/
  8. #ifdef HAVE_CONFIG_H
  9. #include <config.h>
  10. #endif
  11. /*
  12. * Root DN Access Control plug-in
  13. */
  14. #include "rootdn_access.h"
  15. #include <nspr.h>
  16. #include <time.h>
  17. #include <ctype.h>
  18. #include <string.h>
  19. /*
  20. * Add an entry like the following to dse.ldif to enable this plugin:
  21. *
  22. * dn: cn=RootDN Access Control,cn=plugins,cn=config
  23. * objectclass: top
  24. * objectclass: nsSlapdPlugin
  25. * objectclass: extensibleObject
  26. * cn: RootDN Access Control
  27. * nsslapd-pluginpath: librootdn-access-plugin.so
  28. * nsslapd-plugininitfunc: rootdn_init
  29. * nsslapd-plugintype: rootdnpreoperation
  30. * nsslapd-pluginenabled: on
  31. * nsslapd-plugin-depends-on-type: database
  32. * nsslapd-pluginid: rootdn-access-control
  33. * rootdn-open-time: 0800
  34. * rootdn-close-time: 1700
  35. * rootdn-days-allowed: Mon, Tue, Wed, Thu, Fri
  36. * rootdn-allow-host: *.redhat.com
  37. * rootdn-allow-host: *.fedora.com
  38. * rootdn-deny-host: dangerous.boracle.com
  39. * rootdn-allow-ip: 127.0.0.1
  40. * rootdn-allow-ip: 2000:db8:de30::11
  41. * rootdn-deny-ip: 192.168.1.*
  42. *
  43. */
  44. /*
  45. * Plugin Functions
  46. */
  47. int32_t rootdn_init(Slapi_PBlock *pb);
  48. static int32_t rootdn_start(Slapi_PBlock *pb);
  49. static int32_t rootdn_close(Slapi_PBlock *pb);
  50. static int32_t rootdn_load_config(Slapi_PBlock *pb);
  51. static int32_t rootdn_check_access(Slapi_PBlock *pb);
  52. static int32_t rootdn_check_host_wildcard(char *host, char *client_host);
  53. static int rootdn_check_ip_wildcard(char *ip, char *client_ip);
  54. static int32_t rootdn_preop_bind_init(Slapi_PBlock *pb);
  55. void strToLower(char *str);
  56. /*
  57. * Plug-in globals
  58. */
  59. static void *_PluginID = NULL;
  60. static char *_PluginDN = NULL;
  61. static time_t open_time = 0;
  62. static time_t close_time = 0;
  63. static char *daysAllowed = NULL;
  64. static char **hosts = NULL;
  65. static char **hosts_to_deny = NULL;
  66. static char **ips = NULL;
  67. static char **ips_to_deny = NULL;
  68. static Slapi_PluginDesc pdesc = {ROOTDN_FEATURE_DESC,
  69. VENDOR,
  70. DS_PACKAGE_VERSION,
  71. ROOTDN_PLUGIN_DESC};
  72. /*
  73. * Plugin identity functions
  74. */
  75. void
  76. rootdn_set_plugin_id(void *pluginID)
  77. {
  78. _PluginID = pluginID;
  79. }
  80. void *
  81. rootdn_get_plugin_id(void)
  82. {
  83. return _PluginID;
  84. }
  85. void
  86. rootdn_set_plugin_dn(char *pluginDN)
  87. {
  88. _PluginDN = pluginDN;
  89. }
  90. char *
  91. rootdn_get_plugin_dn(void)
  92. {
  93. return _PluginDN;
  94. }
  95. int32_t
  96. rootdn_init(Slapi_PBlock *pb)
  97. {
  98. int32_t status = 0;
  99. char *plugin_identity = NULL;
  100. slapi_log_err(SLAPI_LOG_TRACE, ROOTDN_PLUGIN_SUBSYSTEM,
  101. "--> rootdn_init\n");
  102. /* Store the plugin identity for later use. Used for internal operations. */
  103. slapi_pblock_get(pb, SLAPI_PLUGIN_IDENTITY, &plugin_identity);
  104. PR_ASSERT(plugin_identity);
  105. rootdn_set_plugin_id(plugin_identity);
  106. /* Register callbacks */
  107. if (slapi_pblock_set(pb, SLAPI_PLUGIN_VERSION, SLAPI_PLUGIN_VERSION_01) != 0 ||
  108. slapi_pblock_set(pb, SLAPI_PLUGIN_START_FN, (void *)rootdn_start) != 0 ||
  109. slapi_pblock_set(pb, SLAPI_PLUGIN_CLOSE_FN, (void *)rootdn_close) != 0 ||
  110. slapi_pblock_set(pb, SLAPI_PLUGIN_DESCRIPTION, (void *)&pdesc) != 0) {
  111. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_init - Failed to register plugin\n");
  112. status = -1;
  113. }
  114. /* for this plugin we don't want to skip over root dn's when binding */
  115. slapi_set_plugin_open_rootdn_bind(pb);
  116. if (!status &&
  117. slapi_register_plugin("internalpreoperation", /* op type */
  118. 1, /* Enabled */
  119. "rootdn_preop_bind_init", /* this function desc */
  120. rootdn_preop_bind_init, /* init func */
  121. ROOTDN_PLUGIN_DESC, /* plugin desc */
  122. NULL, /* ? */
  123. plugin_identity /* access control */
  124. )) {
  125. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM,
  126. "rootdn_init - Failed to register rootdn preoperation plugin\n");
  127. status = -1;
  128. }
  129. /*
  130. * Load the config
  131. */
  132. if (rootdn_load_config(pb) != 0) {
  133. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM,
  134. "rootdn_init - Unable to load plug-in configuration\n");
  135. return -1;
  136. }
  137. slapi_log_err(SLAPI_LOG_PLUGIN, ROOTDN_PLUGIN_SUBSYSTEM, "<-- rootdn_init\n");
  138. return status;
  139. }
  140. static int32_t
  141. rootdn_preop_bind_init(Slapi_PBlock *pb)
  142. {
  143. if (slapi_pblock_set(pb, SLAPI_PLUGIN_INTERNAL_PRE_BIND_FN, (void *)rootdn_check_access) != 0) {
  144. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_preop_bind_init - "
  145. "Failed to register function\n");
  146. return -1;
  147. }
  148. return 0;
  149. }
  150. static int32_t
  151. rootdn_start(Slapi_PBlock *pb __attribute__((unused)))
  152. {
  153. slapi_log_err(SLAPI_LOG_PLUGIN, ROOTDN_PLUGIN_SUBSYSTEM, "--> rootdn_start\n");
  154. rootdn_set_plugin_dn(ROOTDN_PLUGIN_DN);
  155. slapi_log_err(SLAPI_LOG_PLUGIN, ROOTDN_PLUGIN_SUBSYSTEM, "<-- rootdn_start\n");
  156. return 0;
  157. }
  158. static void
  159. rootdn_free(void)
  160. {
  161. slapi_ch_free_string(&daysAllowed);
  162. daysAllowed = NULL;
  163. slapi_ch_array_free(hosts);
  164. hosts = NULL;
  165. slapi_ch_array_free(hosts_to_deny);
  166. hosts_to_deny = NULL;
  167. slapi_ch_array_free(ips);
  168. ips = NULL;
  169. slapi_ch_array_free(ips_to_deny);
  170. ips_to_deny = NULL;
  171. }
  172. static int32_t
  173. rootdn_close(Slapi_PBlock *pb __attribute__((unused)))
  174. {
  175. rootdn_free();
  176. return 0;
  177. }
  178. static int32_t
  179. rootdn_load_config(Slapi_PBlock *pb)
  180. {
  181. Slapi_Entry *e = NULL;
  182. char *daysAllowed_tmp = NULL;
  183. char **hosts_tmp = NULL;
  184. char **hosts_to_deny_tmp = NULL;
  185. char **ips_tmp = NULL;
  186. char **ips_to_deny_tmp = NULL;
  187. const char *openTime = NULL;
  188. const char *closeTime = NULL;
  189. char *token, *iter = NULL, *copy;
  190. char hour[3], min[3];
  191. size_t end;
  192. int32_t result = 0;
  193. int32_t time;
  194. slapi_log_err(SLAPI_LOG_PLUGIN, ROOTDN_PLUGIN_SUBSYSTEM, "--> rootdn_load_config\n");
  195. if ((slapi_pblock_get(pb, SLAPI_PLUGIN_CONFIG_ENTRY, &e) == 0) && e) {
  196. /*
  197. * Grab our plugin settings
  198. */
  199. openTime = slapi_entry_attr_get_ref(e, "rootdn-open-time");
  200. closeTime = slapi_entry_attr_get_ref(e, "rootdn-close-time");
  201. daysAllowed_tmp = slapi_entry_attr_get_charptr(e, "rootdn-days-allowed");
  202. hosts_tmp = slapi_entry_attr_get_charray(e, "rootdn-allow-host");
  203. hosts_to_deny_tmp = slapi_entry_attr_get_charray(e, "rootdn-deny-host");
  204. ips_tmp = slapi_entry_attr_get_charray(e, "rootdn-allow-ip");
  205. ips_to_deny_tmp = slapi_entry_attr_get_charray(e, "rootdn-deny-ip");
  206. /*
  207. * Validate out settings
  208. */
  209. if (daysAllowed_tmp) {
  210. strToLower(daysAllowed_tmp);
  211. end = strspn(daysAllowed_tmp, "abcdefghijklmnopqrstuvwxyz ,");
  212. if (!end || daysAllowed_tmp[end] != '\0') {
  213. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  214. "Invalid rootdn-days-allowed value (%s), must be all letters, and comma separators\n",
  215. daysAllowed_tmp);
  216. result = -1;
  217. goto free_and_return;
  218. }
  219. /* make sure the "days" are valid "days" */
  220. copy = slapi_ch_strdup(daysAllowed_tmp);
  221. token = ldap_utf8strtok_r(copy, ", ", &iter);
  222. while (token) {
  223. if (strstr("mon tue wed thu fri sat sun", token) == 0) {
  224. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  225. "Invalid rootdn-days-allowed day value(%s), must be \"Mon, Tue, Wed, Thu, Fri, Sat, or Sun\".\n",
  226. token);
  227. slapi_ch_free_string(&copy);
  228. result = -1;
  229. goto free_and_return;
  230. }
  231. token = ldap_utf8strtok_r(iter, ", ", &iter);
  232. }
  233. slapi_ch_free_string(&copy);
  234. }
  235. if (openTime) {
  236. end = strspn(openTime, "0123456789");
  237. if (!end || openTime[end] != '\0') {
  238. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  239. "Invalid rootdn-open-time value (%s), must be all digits\n",
  240. openTime);
  241. result = -1;
  242. goto free_and_return;
  243. }
  244. time = atoi(openTime);
  245. if (time > 2359 || time < 0) {
  246. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  247. "Invalid value for rootdn-open-time value (%s), value must be between 0000-2359\n",
  248. openTime);
  249. result = -1;
  250. goto free_and_return;
  251. }
  252. if (strlen(openTime) != 4) {
  253. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  254. "Invalid format for rootdn-open-time value (%s). Should be HHMM\n",
  255. openTime);
  256. result = -1;
  257. goto free_and_return;
  258. }
  259. /*
  260. * convert the time to all seconds
  261. */
  262. strncpy(hour, openTime, 2);
  263. strncpy(min, openTime + 2, 2);
  264. open_time = (time_t)(atoi(hour) * 3600) + (atoi(min) * 60);
  265. }
  266. if (closeTime) {
  267. end = strspn(closeTime, "0123456789");
  268. if (!end || closeTime[end] != '\0') {
  269. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  270. "Invalid rootdn-close-time value (%s), must be all digits, and should be HHMM\n",
  271. closeTime);
  272. result = -1;
  273. goto free_and_return;
  274. }
  275. time = atoi(closeTime);
  276. if (time > 2359 || time < 0) {
  277. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  278. "Invalid value for rootdn-close-time value (%s), value must be between 0000-2359\n",
  279. closeTime);
  280. result = -1;
  281. goto free_and_return;
  282. }
  283. if (strlen(closeTime) != 4) {
  284. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  285. "Invalid format for rootdn-close-time value (%s), should be HHMM\n",
  286. closeTime);
  287. result = -1;
  288. goto free_and_return;
  289. }
  290. /*
  291. * convert the time to all seconds
  292. */
  293. strncpy(hour, closeTime, 2);
  294. strncpy(min, closeTime + 2, 2);
  295. close_time = (time_t)(atoi(hour) * 3600) + (atoi(min) * 60);
  296. }
  297. if ((openTime && closeTime == NULL) || (openTime == NULL && closeTime)) {
  298. /* If you are using TOD access control, you must have a open and close time */
  299. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  300. "There must be a open and a close time. Ignoring time based settings.\n");
  301. open_time = 0;
  302. close_time = 0;
  303. result = -1;
  304. goto free_and_return;
  305. }
  306. if (close_time && open_time && close_time <= open_time) {
  307. /* Make sure the closing time is greater than the open time */
  308. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  309. "The close time must be greater than the open time\n");
  310. result = -1;
  311. goto free_and_return;
  312. }
  313. if (hosts_tmp) {
  314. for (size_t i = 0; hosts_tmp[i] != NULL; i++) {
  315. end = strspn(hosts_tmp[i], "0123456789.*-ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz");
  316. if (!end || hosts_tmp[i][end] != '\0') {
  317. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  318. "Hostname (%s) contains invalid characters, skipping\n",
  319. hosts_tmp[i]);
  320. result = -1;
  321. goto free_and_return;
  322. }
  323. }
  324. }
  325. if (hosts_to_deny_tmp) {
  326. for (size_t i = 0; hosts_to_deny_tmp[i] != NULL; i++) {
  327. end = strspn(hosts_to_deny_tmp[i], "0123456789.*-ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz");
  328. if (!end || hosts_to_deny_tmp[i][end] != '\0') {
  329. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  330. "Hostname (%s) contains invalid characters, skipping\n",
  331. hosts_to_deny_tmp[i]);
  332. result = -1;
  333. goto free_and_return;
  334. }
  335. }
  336. }
  337. if (ips_tmp) {
  338. for (size_t i = 0; ips_tmp[i] != NULL; i++) {
  339. end = strspn(ips_tmp[i], "0123456789:ABCDEFabcdef.*");
  340. if (!end || ips_tmp[i][end] != '\0') {
  341. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  342. "IP address contains invalid characters (%s), skipping\n",
  343. ips_tmp[i]);
  344. result = -1;
  345. goto free_and_return;
  346. }
  347. if (strstr(ips_tmp[i], ":") == 0) {
  348. /*
  349. * IPv4 - make sure it's just numbers, dots, and wildcard
  350. */
  351. end = strspn(ips_tmp[i], "0123456789.*");
  352. if (!end || ips_tmp[i][end] != '\0') {
  353. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  354. "IPv4 address contains invalid characters (%s), skipping\n",
  355. ips_tmp[i]);
  356. result = -1;
  357. goto free_and_return;
  358. }
  359. }
  360. }
  361. }
  362. if (ips_to_deny_tmp) {
  363. for (size_t i = 0; ips_to_deny_tmp[i] != NULL; i++) {
  364. end = strspn(ips_to_deny_tmp[i], "0123456789:ABCDEFabcdef.*");
  365. if (!end || ips_to_deny_tmp[i][end] != '\0') {
  366. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  367. "IP address contains invalid characters (%s), skipping\n",
  368. ips_to_deny_tmp[i]);
  369. result = -1;
  370. goto free_and_return;
  371. }
  372. if (strstr(ips_to_deny_tmp[i], ":") == 0) {
  373. /*
  374. * IPv4 - make sure it's just numbers, dots, and wildcard
  375. */
  376. end = strspn(ips_to_deny_tmp[i], "0123456789.*");
  377. if (!end || ips_to_deny_tmp[i][end] != '\0') {
  378. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  379. "IPv4 address contains invalid characters (%s), skipping\n",
  380. ips_to_deny_tmp[i]);
  381. result = -1;
  382. goto free_and_return;
  383. }
  384. }
  385. }
  386. }
  387. } else {
  388. /* failed to get the plugin entry */
  389. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_load_config - "
  390. "Failed to get plugin entry\n");
  391. result = -1;
  392. }
  393. if (result == 0) {
  394. /*
  395. * Free the existing global vars, and move the new ones over
  396. */
  397. rootdn_free();
  398. daysAllowed = daysAllowed_tmp;
  399. daysAllowed_tmp = NULL;
  400. hosts = hosts_tmp;
  401. hosts_tmp = NULL;
  402. hosts_to_deny = hosts_to_deny_tmp;
  403. hosts_to_deny_tmp = NULL;
  404. ips = ips_tmp;
  405. ips_tmp = NULL;
  406. ips_to_deny = ips_to_deny_tmp;
  407. ips_to_deny_tmp = NULL;
  408. }
  409. free_and_return:
  410. slapi_log_err(SLAPI_LOG_PLUGIN, ROOTDN_PLUGIN_SUBSYSTEM, "<-- rootdn_load_config (%d)\n", result);
  411. slapi_ch_free_string(&daysAllowed_tmp);
  412. if (hosts_tmp != NULL) {
  413. slapi_ch_array_free(hosts_tmp);
  414. }
  415. if (hosts_to_deny_tmp != NULL) {
  416. slapi_ch_array_free(hosts_to_deny_tmp);
  417. }
  418. if (ips_tmp != NULL) {
  419. slapi_ch_array_free(ips_tmp);
  420. }
  421. if (ips_to_deny_tmp != NULL) {
  422. slapi_ch_array_free(ips_to_deny_tmp);
  423. }
  424. return result;
  425. }
  426. static int32_t
  427. rootdn_check_access(Slapi_PBlock *pb)
  428. {
  429. PRNetAddr *server_addr = NULL;
  430. PRNetAddr *client_addr = NULL;
  431. PRHostEnt *host_entry = NULL;
  432. time_t curr_time;
  433. struct tm *timeinfo = NULL;
  434. char *dnsName = NULL;
  435. int32_t isRoot = 0;
  436. int32_t rc = SLAPI_PLUGIN_SUCCESS;
  437. /*
  438. * Verify this is a root DN
  439. */
  440. slapi_pblock_get(pb, SLAPI_REQUESTOR_ISROOT, &isRoot);
  441. if (!isRoot) {
  442. return SLAPI_PLUGIN_SUCCESS;
  443. }
  444. /*
  445. * grab the current time/info if we need it
  446. */
  447. if (open_time || daysAllowed) {
  448. curr_time = slapi_current_utc_time();
  449. timeinfo = localtime(&curr_time);
  450. if (timeinfo == NULL) {
  451. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM,
  452. "rootdn_check_access - Failed to get localtime\n");
  453. return -1;
  454. }
  455. }
  456. /*
  457. * First check TOD restrictions, continue through if we are in the open "window"
  458. */
  459. if (open_time) {
  460. time_t curr_total;
  461. curr_total = (time_t)(timeinfo->tm_hour * 3600) + (timeinfo->tm_min * 60);
  462. if ((curr_total < open_time) || (curr_total >= close_time)) {
  463. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM,
  464. "rootdn_check_access - Bind not in the allowed time window\n");
  465. return -1;
  466. }
  467. }
  468. /*
  469. * Check if today is an allowed day
  470. */
  471. if (daysAllowed) {
  472. char *timestr;
  473. char today[4] = {0};
  474. timestr = asctime(timeinfo); // DDD MMM dd hh:mm:ss YYYY
  475. memmove(today, timestr, 3); // we only want the day
  476. strToLower(today);
  477. strToLower(daysAllowed);
  478. if (!strstr(daysAllowed, today)) {
  479. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_check_access - "
  480. "Bind not allowed for today(%s), only allowed on days: %s\n",
  481. today, daysAllowed);
  482. return -1;
  483. }
  484. }
  485. server_addr = (PRNetAddr *)slapi_ch_malloc(sizeof(PRNetAddr));
  486. if (slapi_pblock_get(pb, SLAPI_CONN_SERVERNETADDR, server_addr) != 0) {
  487. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM,
  488. "rootdn_check_access - Could not get server address.\n");
  489. rc = -1;
  490. goto free_and_return;
  491. }
  492. /*
  493. * Remaining checks are only relevant for AF_INET/AF_INET6 connections
  494. */
  495. if (PR_NetAddrFamily(server_addr) == PR_AF_LOCAL) {
  496. rc = 0;
  497. goto free_and_return;
  498. }
  499. /*
  500. * Check the host restrictions, deny always overrides allow
  501. */
  502. if (hosts || hosts_to_deny) {
  503. char buf[PR_NETDB_BUF_SIZE] = {0};
  504. char *host;
  505. /*
  506. * Get the client address
  507. */
  508. client_addr = (PRNetAddr *)slapi_ch_malloc(sizeof(PRNetAddr));
  509. if (slapi_pblock_get(pb, SLAPI_CONN_CLIENTNETADDR, client_addr) != 0) {
  510. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM,
  511. "rootdn_check_access - Could not get client address for hosts.\n");
  512. rc = -1;
  513. goto free_and_return;
  514. }
  515. /*
  516. * Get the hostname from the client address
  517. */
  518. host_entry = (PRHostEnt *)slapi_ch_malloc(sizeof(PRHostEnt));
  519. if (PR_GetHostByAddr(client_addr, buf, sizeof(buf), host_entry) == PR_SUCCESS) {
  520. if (host_entry->h_name != NULL) {
  521. /* copy the hostname */
  522. dnsName = slapi_ch_strdup(host_entry->h_name);
  523. } else {
  524. /* no hostname */
  525. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM,
  526. "rootdn_check_access - Client address missing hostname\n");
  527. rc = -1;
  528. goto free_and_return;
  529. }
  530. } else {
  531. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM,
  532. "rootdn_check_access - client IP address could not be resolved\n");
  533. rc = -1;
  534. goto free_and_return;
  535. }
  536. /*
  537. * Now we have our hostname, now do our checks
  538. */
  539. if (hosts_to_deny) {
  540. for (size_t i = 0; hosts_to_deny[i] != NULL; i++) {
  541. host = hosts_to_deny[i];
  542. /* check for wild cards */
  543. if (host[0] == '*') {
  544. if (rootdn_check_host_wildcard(host, dnsName) == 0) {
  545. /* match, return failure */
  546. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_check_access - "
  547. "hostname (%s) matched denied host (%s)\n", dnsName, host);
  548. rc = -1;
  549. goto free_and_return;
  550. }
  551. } else {
  552. if (strcasecmp(host, dnsName) == 0) {
  553. /* we have a match, return failure */
  554. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_check_access - "
  555. "hostname (%s) matched denied host (%s)\n", dnsName, host);
  556. rc = -1;
  557. goto free_and_return;
  558. }
  559. }
  560. }
  561. rc = 0;
  562. }
  563. if (hosts) {
  564. for (size_t i = 0; hosts[i] != NULL; i++) {
  565. host = hosts[i];
  566. /* check for wild cards */
  567. if (host[0] == '*') {
  568. if (rootdn_check_host_wildcard(host, dnsName) == 0) {
  569. /* match */
  570. rc = 0;
  571. goto free_and_return;
  572. }
  573. } else {
  574. if (strcasecmp(host, dnsName) == 0) {
  575. /* we have a match, */
  576. rc = 0;
  577. goto free_and_return;
  578. }
  579. }
  580. }
  581. rc = -1;
  582. }
  583. }
  584. /*
  585. * Check the IP address restrictions, deny always overrides allow
  586. */
  587. if (ips || ips_to_deny) {
  588. char ip_str[256] = {0};
  589. char *ip;
  590. int32_t ip_len;
  591. if (client_addr == NULL) {
  592. client_addr = (PRNetAddr *)slapi_ch_malloc(sizeof(PRNetAddr));
  593. if (slapi_pblock_get(pb, SLAPI_CONN_CLIENTNETADDR, client_addr) != 0) {
  594. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM,
  595. "rootdn_check_access - Could not get client address for IP.\n");
  596. rc = -1;
  597. goto free_and_return;
  598. }
  599. }
  600. /*
  601. * Check if we are IPv4, so we can grab the correct IP addr for "ip_str"
  602. */
  603. if (PR_IsNetAddrType(client_addr, PR_IpAddrV4Mapped)) {
  604. PRNetAddr v4addr = {{0}};
  605. v4addr.inet.family = PR_AF_INET;
  606. v4addr.inet.ip = client_addr->ipv6.ip.pr_s6_addr32[3];
  607. if (PR_NetAddrToString(&v4addr, ip_str, sizeof(ip_str)) != PR_SUCCESS) {
  608. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM,
  609. "rootdn_check_access - Could not get IPv4 from client address.\n");
  610. rc = -1;
  611. goto free_and_return;
  612. }
  613. } else {
  614. if (PR_NetAddrToString(client_addr, ip_str, sizeof(ip_str)) != PR_SUCCESS) {
  615. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM,
  616. "rootdn_check_access - Could not get IPv6 from client address.\n");
  617. rc = -1;
  618. goto free_and_return;
  619. }
  620. }
  621. /*
  622. * Now we have our IP address, do our checks
  623. */
  624. if (ips_to_deny) {
  625. for (size_t i = 0; ips_to_deny[i] != NULL; i++) {
  626. ip = ips_to_deny[i];
  627. ip_len = strlen(ip);
  628. if (ip[ip_len - 1] == '*') {
  629. if (rootdn_check_ip_wildcard(ips_to_deny[i], ip_str) == 0) {
  630. /* match, return failure */
  631. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_check_access - "
  632. "ip address (%s) matched denied IP address (%s)\n", ip_str, ip);
  633. rc = -1;
  634. goto free_and_return;
  635. }
  636. } else {
  637. if (strcasecmp(ip_str, ip) == 0) {
  638. /* match, return failure */
  639. slapi_log_err(SLAPI_LOG_ERR, ROOTDN_PLUGIN_SUBSYSTEM, "rootdn_check_access - "
  640. "ip address (%s) matched denied IP address (%s)\n", ip_str, ip);
  641. rc = -1;
  642. goto free_and_return;
  643. }
  644. }
  645. }
  646. rc = 0;
  647. }
  648. if (ips) {
  649. for (size_t i = 0; ips[i] != NULL; i++) {
  650. ip = ips[i];
  651. ip_len = strlen(ip);
  652. if (ip[ip_len - 1] == '*') {
  653. if (rootdn_check_ip_wildcard(ip, ip_str) == 0) {
  654. /* match, return success */
  655. rc = 0;
  656. goto free_and_return;
  657. }
  658. } else {
  659. if (strcasecmp(ip_str, ip) == 0) {
  660. /* match, return success */
  661. rc = 0;
  662. goto free_and_return;
  663. }
  664. }
  665. }
  666. rc = -1;
  667. }
  668. }
  669. free_and_return:
  670. slapi_ch_free((void **)&server_addr);
  671. slapi_ch_free((void **)&client_addr);
  672. slapi_ch_free((void **)&host_entry);
  673. slapi_ch_free_string(&dnsName);
  674. return rc;
  675. }
  676. static int32_t
  677. rootdn_check_host_wildcard(char *host, char *client_host)
  678. {
  679. size_t host_len = strlen(host);
  680. size_t client_len = strlen(client_host);
  681. size_t i, j;
  682. /*
  683. * Start at the end of the string and move backwards, and skip the first char "*"
  684. */
  685. if (client_len < host_len) {
  686. /* this can't be a match */
  687. return -1;
  688. }
  689. for (i = host_len - 1, j = client_len - 1; i > 0; i--, j--) {
  690. if (host[i] != client_host[j]) {
  691. return -1;
  692. }
  693. }
  694. return 0;
  695. }
  696. static int
  697. rootdn_check_ip_wildcard(char *ip, char *client_ip)
  698. {
  699. size_t ip_len = strlen(ip);
  700. /*
  701. * Start at the beginning of the string and move forward, and skip the last char "*"
  702. */
  703. if (strlen(client_ip) < ip_len) {
  704. /* this can't be a match */
  705. return -1;
  706. }
  707. for (size_t i = 0; i < ip_len - 1; i++) {
  708. if (ip[i] != client_ip[i]) {
  709. return -1;
  710. }
  711. }
  712. return 0;
  713. }
  714. void
  715. strToLower(char *str)
  716. {
  717. #pragma GCC diagnostic push
  718. #pragma GCC diagnostic ignored "-Wanalyzer-out-of-bounds"
  719. if (NULL != str) {
  720. for (char *pt = str; *pt != '\0'; pt++) {
  721. *pt = tolower(*pt);
  722. }
  723. }
  724. #pragma GCC diagnostic pop
  725. }