Add Kerberos 5 klist, old patch from Tomas Nyström (remove krb4 support).
Support klist in client for kerberos 5 clase. Clean up delegation of gss tokens and do afslog. git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@15666 ec53bebd-3082-4978-b11e-865c3cabbd6b
This commit is contained in:
@@ -2126,3 +2126,17 @@ newer(int argc, char **argv)
|
||||
printf("Local file \"%s\" is newer than remote file \"%s\"\n",
|
||||
argv[2], argv[1]);
|
||||
}
|
||||
|
||||
void
|
||||
klist(int argc, char **argv)
|
||||
{
|
||||
int ret;
|
||||
if(argc != 1){
|
||||
printf("usage: %s\n", argv[0]);
|
||||
code = -1;
|
||||
return;
|
||||
}
|
||||
|
||||
ret = command("SITE KLIST");
|
||||
code = (ret == COMPLETE);
|
||||
}
|
||||
|
@@ -107,7 +107,11 @@ char verbosehelp[] = "toggle verbose mode";
|
||||
char prothelp[] = "set protection level";
|
||||
#ifdef KRB4
|
||||
char kauthhelp[] = "get remote tokens";
|
||||
#endif
|
||||
#if defined(KRB4) || defined(KRB5)
|
||||
char klisthelp[] = "show remote tickets";
|
||||
#endif
|
||||
#ifdef KRB4
|
||||
char kdestroyhelp[] = "destroy remote tickets";
|
||||
char krbtkfilehelp[] = "set filename of remote tickets";
|
||||
#endif
|
||||
@@ -192,7 +196,11 @@ struct cmd cmdtab[] = {
|
||||
{ "prot", prothelp, 0, 1, 0, sec_prot },
|
||||
#ifdef KRB4
|
||||
{ "kauth", kauthhelp, 0, 1, 0, kauth },
|
||||
#endif
|
||||
#if defined(KRB4) || defined(KRB5)
|
||||
{ "klist", klisthelp, 0, 1, 0, klist },
|
||||
#endif
|
||||
#ifdef KRB4
|
||||
{ "kdestroy", kdestroyhelp, 0, 1, 0, kdestroy },
|
||||
{ "krbtkfile", krbtkfilehelp, 0, 1, 0, krbtkfile },
|
||||
#endif
|
||||
|
@@ -143,20 +143,6 @@ kauth(int argc, char **argv)
|
||||
code = 0;
|
||||
}
|
||||
|
||||
void
|
||||
klist(int argc, char **argv)
|
||||
{
|
||||
int ret;
|
||||
if(argc != 1){
|
||||
printf("usage: %s\n", argv[0]);
|
||||
code = -1;
|
||||
return;
|
||||
}
|
||||
|
||||
ret = command("SITE KLIST");
|
||||
code = (ret == COMPLETE);
|
||||
}
|
||||
|
||||
void
|
||||
kdestroy(int argc, char **argv)
|
||||
{
|
||||
|
@@ -26,6 +26,7 @@ ftpd_SOURCES = \
|
||||
popen.c \
|
||||
security.c \
|
||||
kauth.c \
|
||||
klist.c \
|
||||
$(krb4_sources) \
|
||||
$(krb5_sources)
|
||||
|
||||
|
@@ -107,9 +107,12 @@ void klist(void);
|
||||
void cond_kdestroy(void);
|
||||
void kdestroy(void);
|
||||
void krbtkfile(const char *tkfile);
|
||||
void afslog(const char *cell);
|
||||
void afslog(const char *, int);
|
||||
void afsunlog(void);
|
||||
|
||||
extern int do_destroy_tickets;
|
||||
extern char *k5ccname;
|
||||
|
||||
int find(char *);
|
||||
|
||||
int builtin_ls(FILE*, const char*);
|
||||
|
@@ -524,12 +524,8 @@ cmd
|
||||
}
|
||||
| SITE SP KLIST CRLF check_login
|
||||
{
|
||||
#ifdef KRB4
|
||||
if($5)
|
||||
klist();
|
||||
#else
|
||||
reply(500, "Command not implemented.");
|
||||
#endif
|
||||
}
|
||||
| SITE SP KDESTROY CRLF check_login
|
||||
{
|
||||
@@ -559,7 +555,7 @@ cmd
|
||||
if(guest)
|
||||
reply(500, "Can't be done as guest.");
|
||||
else if($5)
|
||||
afslog(NULL);
|
||||
afslog(NULL, 0);
|
||||
#else
|
||||
reply(500, "Command not implemented.");
|
||||
#endif
|
||||
@@ -570,7 +566,7 @@ cmd
|
||||
if(guest)
|
||||
reply(500, "Can't be done as guest.");
|
||||
else if($7)
|
||||
afslog($5);
|
||||
afslog($5, 0);
|
||||
if($5)
|
||||
free($5);
|
||||
#else
|
||||
@@ -1391,13 +1387,13 @@ help(struct tab *ctab, char *s)
|
||||
{
|
||||
struct tab *c;
|
||||
int width, NCMDS;
|
||||
char *type;
|
||||
char *t;
|
||||
char buf[1024];
|
||||
|
||||
if (ctab == sitetab)
|
||||
type = "SITE ";
|
||||
t = "SITE ";
|
||||
else
|
||||
type = "";
|
||||
t = "";
|
||||
width = 0, NCMDS = 0;
|
||||
for (c = ctab; c->name != NULL; c++) {
|
||||
int len = strlen(c->name);
|
||||
@@ -1412,7 +1408,7 @@ help(struct tab *ctab, char *s)
|
||||
int columns, lines;
|
||||
|
||||
lreply(214, "The following %scommands are recognized %s.",
|
||||
type, "(* =>'s unimplemented)");
|
||||
t, "(* =>'s unimplemented)");
|
||||
columns = 76 / width;
|
||||
if (columns == 0)
|
||||
columns = 1;
|
||||
@@ -1448,9 +1444,9 @@ help(struct tab *ctab, char *s)
|
||||
return;
|
||||
}
|
||||
if (c->implemented)
|
||||
reply(214, "Syntax: %s%s %s", type, c->name, c->help);
|
||||
reply(214, "Syntax: %s%s %s", t, c->name, c->help);
|
||||
else
|
||||
reply(214, "%s%-*s\t%s; unimplemented.", type, width,
|
||||
reply(214, "%s%-*s\t%s; unimplemented.", t, width,
|
||||
c->name, c->help);
|
||||
}
|
||||
|
||||
|
@@ -1891,7 +1891,7 @@ dologout(int status)
|
||||
if (logged_in) {
|
||||
seteuid((uid_t)0);
|
||||
ftpd_logwtmp(ttyline, "", "");
|
||||
#ifdef KRB4
|
||||
#if KRB4 || KRB5
|
||||
cond_kdestroy();
|
||||
#endif
|
||||
}
|
||||
|
@@ -76,23 +76,15 @@ gss_userok(void *app_data, char *username)
|
||||
/* gss_add_cred() ? */
|
||||
if (data->delegated_cred_handle != GSS_C_NO_CREDENTIAL) {
|
||||
krb5_ccache ccache = NULL;
|
||||
char* ticketfile;
|
||||
struct passwd *pw;
|
||||
const char* ticketfile;
|
||||
struct passwd *kpw;
|
||||
|
||||
pw = getpwnam(username);
|
||||
|
||||
if (pw == NULL) {
|
||||
ret = 1;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
asprintf (&ticketfile, "%s%u", KRB5_DEFAULT_CCROOT,
|
||||
(unsigned)pw->pw_uid);
|
||||
|
||||
ret = krb5_cc_resolve(gssapi_krb5_context, ticketfile, &ccache);
|
||||
ret = krb5_cc_gen_new(gssapi_krb5_context, &krb5_fcc_ops, &ccache);
|
||||
if (ret)
|
||||
goto fail;
|
||||
|
||||
goto fail;
|
||||
|
||||
ticketfile = krb5_cc_get_name(gssapi_krb5_context, ccache);
|
||||
|
||||
ret = gss_krb5_copy_ccache(&minor_status,
|
||||
data->delegated_cred_handle,
|
||||
ccache);
|
||||
@@ -101,17 +93,26 @@ gss_userok(void *app_data, char *username)
|
||||
goto fail;
|
||||
}
|
||||
|
||||
chown (ticketfile+5, pw->pw_uid, pw->pw_gid);
|
||||
do_destroy_tickets = 1;
|
||||
|
||||
kpw = getpwnam(username);
|
||||
|
||||
if (k_hasafs()) {
|
||||
krb5_afslog(gssapi_krb5_context, ccache, 0, 0);
|
||||
}
|
||||
esetenv ("KRB5CCNAME", ticketfile, 1);
|
||||
if (kpw == NULL) {
|
||||
unlink(ticketfile);
|
||||
ret = 1;
|
||||
goto fail;
|
||||
}
|
||||
|
||||
chown (ticketfile, kpw->pw_uid, kpw->pw_gid);
|
||||
|
||||
asprintf(&k5ccname, "FILE:%s", ticketfile);
|
||||
if (k5ccname) {
|
||||
esetenv ("KRB5CCNAME", k5ccname, 1);
|
||||
}
|
||||
afslog(NULL, 1);
|
||||
fail:
|
||||
if (ccache)
|
||||
krb5_cc_close(gssapi_krb5_context, ccache);
|
||||
free(ticketfile);
|
||||
}
|
||||
|
||||
gss_release_cred(&minor_status, &data->delegated_cred_handle);
|
||||
|
@@ -35,6 +35,13 @@
|
||||
|
||||
RCSID("$Id$");
|
||||
|
||||
#if defined(KRB4) || defined(KRB5)
|
||||
|
||||
int do_destroy_tickets = 1;
|
||||
char *k5ccname;
|
||||
|
||||
#endif
|
||||
|
||||
#ifdef KRB4
|
||||
|
||||
static KTEXT_ST cip;
|
||||
@@ -43,8 +50,6 @@ static time_t local_time;
|
||||
|
||||
static krb_principal pr;
|
||||
|
||||
static int do_destroy_tickets = 1;
|
||||
|
||||
static int
|
||||
save_tkt(const char *user,
|
||||
const char *instance,
|
||||
@@ -238,108 +243,6 @@ short_date(int32_t dp)
|
||||
return (cp);
|
||||
}
|
||||
|
||||
void
|
||||
klist(void)
|
||||
{
|
||||
int err;
|
||||
|
||||
char *file = tkt_string();
|
||||
|
||||
krb_principal pr;
|
||||
|
||||
char buf1[128], buf2[128];
|
||||
int header = 1;
|
||||
CREDENTIALS c;
|
||||
|
||||
|
||||
|
||||
err = tf_init(file, R_TKT_FIL);
|
||||
if(err != KSUCCESS){
|
||||
reply(500, "%s", krb_get_err_text(err));
|
||||
return;
|
||||
}
|
||||
tf_close();
|
||||
|
||||
/*
|
||||
* We must find the realm of the ticket file here before calling
|
||||
* tf_init because since the realm of the ticket file is not
|
||||
* really stored in the principal section of the file, the
|
||||
* routine we use must itself call tf_init and tf_close.
|
||||
*/
|
||||
err = krb_get_tf_realm(file, pr.realm);
|
||||
if(err != KSUCCESS){
|
||||
reply(500, "%s", krb_get_err_text(err));
|
||||
return;
|
||||
}
|
||||
|
||||
err = tf_init(file, R_TKT_FIL);
|
||||
if(err != KSUCCESS){
|
||||
reply(500, "%s", krb_get_err_text(err));
|
||||
return;
|
||||
}
|
||||
|
||||
err = tf_get_pname(pr.name);
|
||||
if(err != KSUCCESS){
|
||||
reply(500, "%s", krb_get_err_text(err));
|
||||
return;
|
||||
}
|
||||
err = tf_get_pinst(pr.instance);
|
||||
if(err != KSUCCESS){
|
||||
reply(500, "%s", krb_get_err_text(err));
|
||||
return;
|
||||
}
|
||||
|
||||
/*
|
||||
* You may think that this is the obvious place to get the
|
||||
* realm of the ticket file, but it can't be done here as the
|
||||
* routine to do this must open the ticket file. This is why
|
||||
* it was done before tf_init.
|
||||
*/
|
||||
|
||||
lreply(200, "Ticket file: %s", tkt_string());
|
||||
|
||||
lreply(200, "Principal: %s", krb_unparse_name(&pr));
|
||||
while ((err = tf_get_cred(&c)) == KSUCCESS) {
|
||||
if (header) {
|
||||
lreply(200, "%-15s %-15s %s",
|
||||
" Issued", " Expires", " Principal (kvno)");
|
||||
header = 0;
|
||||
}
|
||||
strlcpy(buf1, short_date(c.issue_date), sizeof(buf1));
|
||||
c.issue_date = krb_life_to_time(c.issue_date, c.lifetime);
|
||||
if (time(0) < (unsigned long) c.issue_date)
|
||||
strlcpy(buf2, short_date(c.issue_date), sizeof(buf2));
|
||||
else
|
||||
strlcpy(buf2, ">>> Expired <<< ", sizeof(buf2));
|
||||
lreply(200, "%s %s %s (%d)", buf1, buf2,
|
||||
krb_unparse_name_long(c.service, c.instance, c.realm), c.kvno);
|
||||
}
|
||||
if (header && err == EOF) {
|
||||
lreply(200, "No tickets in file.");
|
||||
}
|
||||
reply(200, " ");
|
||||
}
|
||||
|
||||
/*
|
||||
* Only destroy if we created the tickets
|
||||
*/
|
||||
|
||||
void
|
||||
cond_kdestroy(void)
|
||||
{
|
||||
if (do_destroy_tickets)
|
||||
dest_tkt();
|
||||
afsunlog();
|
||||
}
|
||||
|
||||
void
|
||||
kdestroy(void)
|
||||
{
|
||||
dest_tkt();
|
||||
afsunlog();
|
||||
reply(200, "Tickets destroyed");
|
||||
}
|
||||
|
||||
void
|
||||
krbtkfile(const char *tkfile)
|
||||
{
|
||||
@@ -350,10 +253,68 @@ krbtkfile(const char *tkfile)
|
||||
|
||||
#endif /* KRB4 */
|
||||
|
||||
#ifdef KRB5
|
||||
|
||||
static void
|
||||
dest_cc(void)
|
||||
{
|
||||
krb5_context context;
|
||||
krb5_error_code ret;
|
||||
krb5_ccache id;
|
||||
|
||||
ret = krb5_init_context(&context);
|
||||
if (ret == 0) {
|
||||
if (k5ccname)
|
||||
ret = krb5_cc_resolve(context, k5ccname, &id);
|
||||
else
|
||||
ret = krb5_cc_default (context, &id);
|
||||
if (ret)
|
||||
krb5_free_context(context);
|
||||
}
|
||||
if (ret == 0) {
|
||||
krb5_cc_destroy(context, id);
|
||||
krb5_free_context (context);
|
||||
}
|
||||
}
|
||||
#endif
|
||||
|
||||
#if defined(KRB4) || defined(KRB5)
|
||||
|
||||
/*
|
||||
* Only destroy if we created the tickets
|
||||
*/
|
||||
|
||||
void
|
||||
afslog(const char *cell)
|
||||
cond_kdestroy(void)
|
||||
{
|
||||
if (do_destroy_tickets) {
|
||||
#if KRB4
|
||||
dest_tkt();
|
||||
#endif
|
||||
#if KRB5
|
||||
dest_cc();
|
||||
#endif
|
||||
do_destroy_tickets = 0;
|
||||
}
|
||||
afsunlog();
|
||||
}
|
||||
|
||||
void
|
||||
kdestroy(void)
|
||||
{
|
||||
#if KRB4
|
||||
dest_tkt();
|
||||
#endif
|
||||
#if KRB5
|
||||
dest_cc();
|
||||
#endif
|
||||
afsunlog();
|
||||
reply(200, "Tickets destroyed");
|
||||
}
|
||||
|
||||
|
||||
void
|
||||
afslog(const char *cell, int quiet)
|
||||
{
|
||||
if(k_hasafs()) {
|
||||
#ifdef KRB5
|
||||
@@ -363,7 +324,10 @@ afslog(const char *cell)
|
||||
|
||||
ret = krb5_init_context(&context);
|
||||
if (ret == 0) {
|
||||
ret = krb5_cc_default(context, &id);
|
||||
if (k5ccname)
|
||||
ret = krb5_cc_resolve(context, k5ccname, &id);
|
||||
else
|
||||
ret = krb5_cc_default(context, &id);
|
||||
if (ret)
|
||||
krb5_free_context(context);
|
||||
}
|
||||
@@ -376,9 +340,11 @@ afslog(const char *cell)
|
||||
#ifdef KRB4
|
||||
krb_afslog(cell, 0);
|
||||
#endif
|
||||
reply(200, "afslog done");
|
||||
if (!quiet)
|
||||
reply(200, "afslog done");
|
||||
} else {
|
||||
reply(200, "no AFS present");
|
||||
if (!quiet)
|
||||
reply(200, "no AFS present");
|
||||
}
|
||||
}
|
||||
|
||||
|
Reference in New Issue
Block a user