kdc: add PA PAC finalize callback

Note the selected pre-authentication mechanism, and add a callback to allow the
pre-authentication mechanism to update the PAC immediately prior to signing.
This commit is contained in:
Luke Howard
2021-12-20 16:40:35 +11:00
parent f7964251ff
commit a2c225fe0a
2 changed files with 77 additions and 19 deletions

View File

@@ -64,6 +64,8 @@ struct kdc_request_desc {
HEIM_SVC_REQUEST_DESC_COMMON_ELEMENTS;
};
struct as_request_pa_state;
struct astgs_request_desc {
HEIM_SVC_REQUEST_DESC_COMMON_ELEMENTS;
@@ -73,7 +75,9 @@ struct astgs_request_desc {
/* Only AS */
METHOD_DATA *padata;
METHOD_DATA outpadata;
krb5_preauthtype pa_used;
struct as_request_pa_state *pa_state;
KDC_REP rep;
EncTicketPart et;
EncKDCRepPart ek;
@@ -101,7 +105,6 @@ struct astgs_request_desc {
/* only valid for tgs-req */
unsigned int rk_is_subkey : 1;
unsigned int fast_asserted : 1;
unsigned int replaced_reply_key : 1;
krb5_crypto armor_crypto;
hdb_entry_ex *armor_server;

View File

@@ -957,6 +957,8 @@ struct kdc_patypes {
krb5_error_code (*validate)(astgs_request_t,
const PA_DATA *pa,
struct kdc_pa_auth_status *auth_status);
krb5_error_code (*finalize_pac)(astgs_request_t r, krb5_pac mspac);
void (*cleanup)(astgs_request_t r);
};
static const struct kdc_patypes pat[] = {
@@ -964,40 +966,40 @@ static const struct kdc_patypes pat[] = {
{
KRB5_PADATA_PK_AS_REQ, "PK-INIT(ietf)",
PA_ANNOUNCE | PA_SYNTHETIC_OK | PA_REPLACE_REPLY_KEY,
pa_pkinit_validate
pa_pkinit_validate, NULL, NULL
},
{
KRB5_PADATA_PK_AS_REQ_WIN, "PK-INIT(win2k)", PA_ANNOUNCE | PA_REPLACE_REPLY_KEY,
pa_pkinit_validate
pa_pkinit_validate, NULL, NULL
},
{
KRB5_PADATA_PKINIT_KX, "Anonymous PK-INIT", PA_ANNOUNCE,
NULL
NULL, NULL, NULL
},
#else
{ KRB5_PADATA_PK_AS_REQ, "PK-INIT(ietf)", 0, NULL },
{ KRB5_PADATA_PK_AS_REQ_WIN, "PK-INIT(win2k)", 0, NULL },
{ KRB5_PADATA_PKINIT_KX, "Anonymous PK-INIT", 0, NULL },
{ KRB5_PADATA_PK_AS_REQ, "PK-INIT(ietf)", 0, NULL , NULL, NULL },
{ KRB5_PADATA_PK_AS_REQ_WIN, "PK-INIT(win2k)", 0, NULL, NULL, NULL },
{ KRB5_PADATA_PKINIT_KX, "Anonymous PK-INIT", 0, NULL, NULL, NULL },
#endif
{ KRB5_PADATA_PA_PK_OCSP_RESPONSE , "OCSP", 0, NULL },
{ KRB5_PADATA_PA_PK_OCSP_RESPONSE , "OCSP", 0, NULL, NULL, NULL },
{
KRB5_PADATA_ENC_TIMESTAMP , "ENC-TS",
PA_ANNOUNCE,
pa_enc_ts_validate
pa_enc_ts_validate, NULL, NULL
},
{
KRB5_PADATA_ENCRYPTED_CHALLENGE , "ENC-CHAL",
PA_ANNOUNCE | PA_REQ_FAST,
pa_enc_chal_validate
pa_enc_chal_validate, NULL, NULL
},
{ KRB5_PADATA_REQ_ENC_PA_REP , "REQ-ENC-PA-REP", 0, NULL },
{ KRB5_PADATA_FX_FAST, "FX-FAST", PA_ANNOUNCE, NULL },
{ KRB5_PADATA_FX_ERROR, "FX-ERROR", 0, NULL },
{ KRB5_PADATA_FX_COOKIE, "FX-COOKIE", 0, NULL },
{ KRB5_PADATA_REQ_ENC_PA_REP , "REQ-ENC-PA-REP", 0, NULL, NULL, NULL },
{ KRB5_PADATA_FX_FAST, "FX-FAST", PA_ANNOUNCE, NULL, NULL, NULL },
{ KRB5_PADATA_FX_ERROR, "FX-ERROR", 0, NULL, NULL, NULL },
{ KRB5_PADATA_FX_COOKIE, "FX-COOKIE", 0, NULL, NULL, NULL },
{
KRB5_PADATA_GSS , "GSS",
PA_ANNOUNCE | PA_SYNTHETIC_OK | PA_REPLACE_REPLY_KEY,
pa_gss_validate
pa_gss_validate, NULL, NULL
},
};
@@ -1035,6 +1037,51 @@ log_patypes(astgs_request_t r, METHOD_DATA *padata)
free(str);
}
static krb5_boolean
pa_replaced_reply_key_p(astgs_request_t r)
{
size_t n;
for (n = 0; n < sizeof(pat) / sizeof(pat[0]); n++) {
if (pat[n].type == r->pa_used &&
(pat[n].flags & PA_REPLACE_REPLY_KEY))
return TRUE;
}
return FALSE;
}
static krb5_error_code
pa_finalize_pac(astgs_request_t r, krb5_pac mspac)
{
krb5_error_code ret = 0;
size_t n;
for (n = 0; n < sizeof(pat) / sizeof(pat[0]); n++) {
if (pat[n].type == r->pa_used) {
if (pat[n].finalize_pac)
ret = pat[n].finalize_pac(r, mspac);
break;
}
}
return ret;
}
static void
pa_cleanup(astgs_request_t r)
{
size_t n;
for (n = 0; n < sizeof(pat) / sizeof(pat[0]); n++) {
if (pat[n].type == r->pa_used) {
if (pat[n].cleanup)
pat[n].cleanup(r);
break;
}
}
}
/*
*
*/
@@ -1837,7 +1884,7 @@ generate_pac(astgs_request_t r, const Key *skey, const Key *tkey)
ret = _kdc_pac_generate(r->context,
r->client,
r->server,
r->replaced_reply_key ? &r->reply_key : NULL,
pa_replaced_reply_key_p(r) ? &r->reply_key : NULL,
r->pac_attributes,
&p);
if (ret) {
@@ -1875,6 +1922,12 @@ generate_pac(astgs_request_t r, const Key *skey, const Key *tkey)
krb5_xfree(cpn);
}
ret = pa_finalize_pac(r, p);
if (ret) {
krb5_pac_free(r->context, p);
return ret;
}
ret = _krb5_pac_sign(r->context, p, r->et.authtime,
client,
&skey->key, /* Server key */
@@ -2246,7 +2299,7 @@ _kdc_as_rep(astgs_request_t r)
pat[n].name, r->cname);
found_pa = 1;
r->replaced_reply_key = (pat[n].flags & PA_REPLACE_REPLY_KEY) != 0;
r->pa_used = pat[n].type;
if (auth_status.auth_status == HDB_AUTHSTATUS_INVALID)
auth_status.auth_status = HDB_AUTHSTATUS_GENERIC_SUCCESS;
@@ -2702,7 +2755,7 @@ _kdc_as_rep(astgs_request_t r)
r, req->req_body.nonce,
&rep, &r->et, &r->ek, setype,
r->server->entry.kvno, &skey->key,
r->replaced_reply_key ? 0 : r->client->entry.kvno,
pa_replaced_reply_key_p(r) ? 0 : r->client->entry.kvno,
0, &r->e_text, r->reply);
if (ret)
goto out;
@@ -2733,6 +2786,8 @@ out:
NULL, NULL,
r->reply);
pa_cleanup(r);
free_EncTicketPart(&r->et);
free_EncKDCRepPart(&r->ek);
_kdc_free_fast_state(&r->fast);