Commit Graph

42 Commits

Author SHA1 Message Date
Joseph Sutton
96a5c0b82a hdb: Make maximum ticket lifetime and renew time signed integers
This allows for negative lifetimes to be encoded, and fits in better
with our use elsewhere of time_t, which in POSIX is a signed integer
type.

Signed-off-by: Joseph Sutton <josephsutton@catalyst.net.nz>
2026-01-22 11:39:05 -06:00
Nicolas Williams
3c4548025c hdb: Add auth-data-reqd flag 2023-06-23 13:44:13 -05:00
Nicolas Williams
dcf2bdfb20 hdb: Distinguish soft and hard principal aliases
We introduce a notion of soft vs. hard aliases.

Soft aliases are aliases of WELLKNOWN/REFERRALS/TARGET@$some_realm,
where $some_realm is the realm we want the KDC to issue referrals to.

Hard aliases are all other aliases, where if the client requested
canonicalization then the KDC should update the names in the responses,
or else if the client did not request canonicalization, then the KDC
should treat the alias as a distinct principal with the same keys as the
alias' canonical name.

The logic for dealing with these is entirely located in the HDB
backends.

An HDB backend can implement hard aliases by replacing a found
HDB_entry's principal with the name used to look it up.

An HDB backend can implement soft aliases by returning
HDB_ERR_WRONG_REALM to trigger the AS or TGS to return a referral.

Currently only in-tree HDB backends support this feature that use
_hdb_fetch_kvno() as their hdb_fetch_kvno() method implementation.
That's all HDB backends other than SQLite3.

Out-of-tree backends should be unaffected.

We've added a decoration field to HDB_entry: aliased -- an int
(boolean).  This is only used internally in libhdb at this time.
Out-of-tree HDB backends could have a use for this decoration, but we
have not decided whether it is a public interface yet.
2022-03-17 20:43:32 -05:00
Nicolas Williams
f0f6bb03f4 hdb: Lower-case HDB_DB_FORMAT to make it valid ASN.1
In order to resolve some shift/reduce conflicts in the ASn.1 compiler's
grammar we need to be strict about value names starting with lower case
and type names starting with upper-case.
2022-01-21 22:37:05 -06:00
Luke Howard
0165633964 hdb: add no-auth-data-reqd flag to HDB entry
Add a new flag, no-auth-data-reqd, to the HDB entry which indicates that a PAC
should not be included on issued service tickets.
2021-12-23 13:52:12 +11:00
Nicolas Williams
00358252d3 kdc: Add synthetic PKINIT principals option 2021-06-29 14:52:07 -05:00
Nicolas Williams
db7763ca7b asn1: X.681/682/683 magic handling of open types
Status:

 - And it works!

 - We have an extensive test based on decoding a rich EK certficate.

   This test exercises all of:

    - decoding
    - encoding with and without decoded open types
    - copying of decoded values with decoded open types
    - freeing of decoded values with decoded open types

   Valgrind finds no memory errors.

 - Added a manual page for the compiler.

 - rfc2459.asn1 now has all three primary PKIX types that we care about
   defined as in RFC5912, with IOS constraints and parameterization:

    - `Extension`       (embeds open type in an `OCTET STRING`)
    - `OtherName`       (embeds open type in an        `ANY`-like type)
    - `SingleAttribute` (embeds open type in an        `ANY`-like type)
    - `AttributeSet`    (embeds open type in a  `SET OF ANY`-like type)

   All of these use OIDs as the open type type ID field, but integer
   open type type ID fields are also supported (and needed, for
   Kerberos).

   That will cover every typed hole pattern in all our ASN.1 modules.

   With this we'll be able to automatically and recursively decode
   through all subject DN attributes even when the subject DN is a
   directoryName SAN, and subjectDirectoryAttributes, and all
   extensions, and all SANs, and all authorization-data elements, and
   PA-data, and...

   We're not really using `SingleAttribute` and `AttributeSet` yet
   because various changes are needed in `lib/hx509` for that.

 - `asn1_compile` builds and recognizes the subset of X.681/682/683 that
   we need for, and now use in, rfc2459.asn1.  It builds the necessary
   AST, generates the correct C types, and generates templating for
   object sets and open types!

 - See READMEs for details.

 - Codegen backend not tested; I won't make it implement automatic open
   type handling, but it should at least not crash by substituting
   `heim_any` for open types not embedded in `OCTET STRING`.

 - We're _really_ starting to have problems with the ITU-T ASN.1
   grammar and our version of it...

   Type names have to start with upper-case, value names with
   lower-case, but it's not enough to disambiguate.

   The fact the we've allowed value and type names to violate their
   respective start-with case rules is causing us trouble now that we're
   adding grammar from X.681/682/683, and we're going to have to undo
   that.

   In preparation for that I'm capitalizing the `heim_any` and
   `heim_any_set` types, and doing some additional cleanup, which
   requires changes to other parts of Heimdal (all in this same commit
   for now).

   Problems we have because of this:

    - We cannot IMPORT values into modules because we have no idea if a
      symbol being imported refers to a value or a type because the only
      clue we would have is the symbol's name, so we assume IMPORTed
      symbols are for types.

      This means we can't import OIDs, for example, which is super
      annoying.

      One thing we might be able to do here is mark imported symbols as
      being of an undetermined-but-not-undefined type, then coerce the
      symbol's type the first time it's used in a context where its type
      is inferred as type, value, object, object set, or class.  (Though
      since we don't generate C symbols for objects or classes, we won't
      be able to import them, especially since we need to know them at
      compile time and cannot defer their handling to link- or
      run-time.)

    - The `NULL` type name, and the `NULL` value name now cause two
      reduce/reduce conflicts via the `FieldSetting` production.

    - Various shift/reduce conflicts involving `NULL` values in
      non-top-level contexts (in constraints, for example).

 - Currently I have a bug where to disambiguate the grammar I have a
   CLASS_IDENTIFIER token that is all caps, while TYPE_IDENTIFIER must
   start with a capital but not be all caps, but this breaks Kerberos
   since all its types are all capitalized -- oof!

   To fix this I made it so class names have to be all caps and
   start with an underscore (ick).

TBD:

 - Check all the XXX comments and address them
 - Apply this treatment to Kerberos!  Automatic handling of authz-data
   sounds useful :)
 - Apply this treatment to PKCS#10 (CSRs) and other ASN.1 modules too.
 - Replace various bits of code in `lib/hx509/` with uses of this
   feature.
 - Add JER.
 - Enhance `hxtool` and `asn1_print`.

Getting there!
2021-02-28 18:13:08 -06:00
Nicolas Williams
6aeab13f06 hdb: Use a CHOICE instead of ASN1_BAD_ID
Checking the error code of decoding a blob as an hdb_entry or
hdb_entry_alias to determine which of those the blob is depends on a
detail of the Heimdal ASN.1 compiler and library that shouldn't be
depended on.  Using a CHOICE adds no octets to the encoding:

    HDB-EntryOrAlias ::= CHOICE {
            entry       hdb_entry,
            alias       hdb_entry_alias
    }

since we're adding no additional tags and the two arms of the CHOICE
already differ in tag (hdb_entry's tag is a [UNIVERSAL Sequence] tag,
while hdb_entry_alias's is an [APPLICATION 0] tag).
2021-01-15 13:21:18 -06:00
Nicolas Williams
5447b81fb1 hdb: Move virtual principals into HDB layer
This is a large commit that adds several features:

 - Revamps and moves virtual host-based service principal functionality
   from kdc/ to lib/hdb/ so that it may be automatically visible to
   lib/kadm5/, as well as kadmin(1)/kadmind(8) and ktutil(1).

   The changes are backwards-incompatible.

 - Completes support for documenting a service principal's supported
   enctypes in its HDB entry independently of its long-term keys.  This
   will reduce HDB bloat by not requiring that service principals have
   more long-term keys than they need just to document the service's
   supported enctypes.

 - Adds support for storing krb5.conf content in principals' HDB
   entries.  This may eventually be used for causing Heimdal KDC
   services to reconfigure primary/secondary roles automatically by
   discovering the configured primary in an HDB entry for the realm.

   For now this will be used to help reduce the amount of configuration
   needed by clients of an upcoming HTTP binding of the kadmin service.
2020-09-08 00:25:36 -05:00
Luke Howard
6bb8eaca20 hdb: dereference principal aliases in all KDC lookups (#452)
e11abf41 added support in libhdb for always dereferencing principal aliases
during an AS-REQ (where dereferencing refers to enabling alias lookups, and
rewriting the returned entry with the alias name unless canonicalization was
enabled).

Due to the KDC setting HDB_F_FOR_AS_REQ for all lookups from the AS, this
allowed aliases on the TGS itself to be dereferenced during an AS-REQ; however,
on presenting the TGT, the TGS would fail to resolve. Creating an explicit TGS
principal for the aliased realm would work (at least prior to c555ed6a), but
this could be confusing to deploy.

This commit changes enables alias dereferencing when HDB_F_GET_ANY is set,
which essentially means dereference whenever the request is coming from the KDC
(as opposed to, say, kadmin).

We also backout c555ed6a, which changed the TGS to always canonicalize the
server realm, as this breaks serving multiple realms from a single KDC, where
server principals in different realms share a single canonical entry.
HDB_F_CANON is now passed to the backend as a hint only, and per RFC 6806 the
principal name is never changed in TGS replies. (However, for Samba interop,
backends can override this by setting the force-canonicalize HDB flag.)
2019-01-05 14:01:26 +11:00
Roland C. Dowdeswell
0da84c0c3a Add require-pwchange flag to HDB and honour it if present in mit-db:. 2012-02-27 10:19:54 +00:00
Nicolas Williams
19d378f44d Add 64-bit integer support to ASN.1 compiler
ASN.1 INTEGERs will now compile to C int64_t or uint64_t, depending
    on whether the constraint ranges include numbers that cannot be
    represented in 32-bit ints and whether they include negative
    numbers.

    Template backend support included.  check-template is now built with
    --template, so we know we're testing it.

    Tests included.
2011-12-12 20:01:20 -06:00
Nicolas Williams
1eb56edd86 Introduce Keys ::= SEQUENCE OF Key in hdb.asn1 so we can get convenience utils. 2011-07-22 16:07:08 -05:00
Nicolas Williams
0674e4b13a Ooops! Mind those tags when re-ordering ASN.1 SEQUENCEs! (hdb_keyset) 2011-07-22 16:07:05 -05:00
Nicolas Williams
53ea8ac59b Make changes to hdb_keyset type be backward-compatible. 2011-07-22 16:06:01 -05:00
Nicolas Williams
355ae357eb Moved set_time field of hdb_keyset to end and add extensibility marker. 2011-07-22 16:06:01 -05:00
Nicolas Williams
c2ec368c36 Add HDB extension for storing policy regarding what historic keys may be used for 2011-07-22 16:06:00 -05:00
Nicolas Williams
a04721b737 Added basic policy support, w/ policy names listed in krb5.conf 2011-07-22 16:05:21 -05:00
Nicolas Williams
34189a23fe Added a flag to ensure that we don't mod/store hdb entries fetched with specified kvno. 2011-07-22 16:04:51 -05:00
Nicolas Williams
a095933ee0 We want the time that a keyset was set, not the time it was replaced. 2011-07-22 16:04:51 -05:00
Nicolas Williams
fca53990e4 Initial commit for second approach for multiple kvno. NOT TESTED! 2011-07-22 16:04:51 -05:00
Love Hörnquist Åstrand
f65f1f26ef add HDBFlags: locked-out
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@25297 ec53bebd-3082-4978-b11e-865c3cabbd6b
2009-07-03 04:25:01 +00:00
Love Hörnquist Åstrand
15d6e41dea add pkinit-cert
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@24980 ec53bebd-3082-4978-b11e-865c3cabbd6b
2009-03-29 09:01:25 +00:00
Love Hörnquist Åstrand
95f39b1cc0 add hdb_keyset and opaque
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@24903 ec53bebd-3082-4978-b11e-865c3cabbd6b
2009-03-22 17:20:37 +00:00
Love Hörnquist Åstrand
9f106cf20a add simple alias support to the database backends
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@20236 ec53bebd-3082-4978-b11e-865c3cabbd6b
2007-02-16 23:52:29 +00:00
Love Hörnquist Åstrand
db091f2134 (HDBFlags): Add allow-digest
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@17925 ec53bebd-3082-4978-b11e-865c3cabbd6b
2006-08-24 10:45:19 +00:00
Love Hörnquist Åstrand
c0c59a96f2 Rename HDB-Ext-PKINIT-certificate to HDB-Ext-PKINIT-hash.
Add trust anchor to HDB-Ext-PKINIT-acl.


git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@17829 ec53bebd-3082-4978-b11e-865c3cabbd6b
2006-07-13 18:22:22 +00:00
Love Hörnquist Åstrand
ce2f8d406f (HDBFlags): Add allow-kerberos4
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@17648 ec53bebd-3082-4978-b11e-865c3cabbd6b
2006-06-14 18:28:14 +00:00
Love Hörnquist Åstrand
f90b31406f (HDBFlags): add trusted-for-delegation
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@17614 ec53bebd-3082-4978-b11e-865c3cabbd6b
2006-06-06 14:53:23 +00:00
Love Hörnquist Åstrand
90f0c3cff0 Add support for HDB-extension.
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@15875 ec53bebd-3082-4978-b11e-865c3cabbd6b
2005-08-11 13:15:44 +00:00
Love Hörnquist Åstrand
9fd91474ad use constrained integers
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@14344 ec53bebd-3082-4978-b11e-865c3cabbd6b
2004-11-10 18:50:27 +00:00
Love Hörnquist Åstrand
708a148e91 remove enforce-transited-policy, its no longer used
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@13224 ec53bebd-3082-4978-b11e-865c3cabbd6b
2003-12-16 16:53:37 +00:00
Johan Danielsson
cf7d2c2fb1 add flag to enforce transited policy
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@13035 ec53bebd-3082-4978-b11e-865c3cabbd6b
2003-10-21 11:09:59 +00:00
Johan Danielsson
4c1667b6be add generation number
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@10162 ec53bebd-3082-4978-b11e-865c3cabbd6b
2001-06-21 14:56:29 +00:00
Johan Danielsson
791745e94d use new import syntax
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@8399 ec53bebd-3082-4978-b11e-865c3cabbd6b
2000-06-19 15:22:22 +00:00
Johan Danielsson
0db75ae2dd make mkvno optional, update version to 2
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@6086 ec53bebd-3082-4978-b11e-865c3cabbd6b
1999-05-03 16:48:52 +00:00
Johan Danielsson
9799799e42 Add list of etypes to hdb_entry.
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@4724 ec53bebd-3082-4978-b11e-865c3cabbd6b
1998-04-05 05:20:22 +00:00
Johan Danielsson
3c04febb46 Add some more flags.
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@4644 ec53bebd-3082-4978-b11e-865c3cabbd6b
1998-03-21 23:46:44 +00:00
Johan Danielsson
0305bed653 Include salt type in salt.
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@3317 ec53bebd-3082-4978-b11e-865c3cabbd6b
1997-08-31 19:30:29 +00:00
Johan Danielsson
14f6dc9063 Version number.
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@3168 ec53bebd-3082-4978-b11e-865c3cabbd6b
1997-08-26 22:27:09 +00:00
Assar Westerlund
ef61ce3ee6 new flags require_preauth' and change_pw'
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@2680 ec53bebd-3082-4978-b11e-865c3cabbd6b
1997-08-01 15:29:54 +00:00
Johan Danielsson
9a16c79d62 Database definitions.
git-svn-id: svn://svn.h5l.se/heimdal/trunk/heimdal@2513 ec53bebd-3082-4978-b11e-865c3cabbd6b
1997-07-23 02:04:14 +00:00