#include "config.h" #include "protos.h" RCSID("$Id$"); #include #include #include #include #ifdef HAVE_SYS_FILIO_H #include #endif #include #include #include #include #include #include #include #include #include #include "afssysdefs.h" #define AUTH_SUPERUSER "afs" /* * Here only ASCII characters are relevant. */ #define IsAsciiLower(c) ('a' <= (c) && (c) <= 'z') #define ToAsciiUpper(c) ((c) - 'a' + 'A') static void foldup(char *a, char *b) { for (; *b; a++, b++) if (IsAsciiLower(*b)) *a = ToAsciiUpper(*b); else *a = *b; *a = '\0'; } static int get_cred(char *princ, char *inst, char *krealm, CREDENTIALS *c, KTEXT_ST *tkt) { int k_errno = krb_get_cred(princ, inst, krealm, c); if (k_errno != KSUCCESS) { k_errno = krb_mk_req(tkt, princ, inst, krealm, 0); if (k_errno == KSUCCESS) k_errno = krb_get_cred(princ, inst, krealm, c); } return k_errno; } /* Convert a string to a 32 bit ip number in network byte order. Return 0 on error */ static u_int32_t ip_aton(char *ip) { u_int32_t addr; int a, b, c, d; if(sscanf(ip, "%d.%d.%d.%d", &a, &b, &c, &d) != 4) return 0; if(a < 0 || a > 255 || b < 0 || b > 255 || c < 0 || c > 255 || d < 0 || d > 255) return 0; addr = (a << 24) | (b << 16) | (c << 8) | d; addr = htonl(addr); return addr; } /* Find the realm associated with cell. Do this by opening /usr/vice/etc/CellServDB and getting the realm-of-host for the first VL-server for the cell. This does not work when the VL-server is living in one cell, but the cell it is serving is living in another cell. */ static char* realm_of_cell(char *cell) { FILE *F; char buf[1024]; u_int32_t addr; struct hostent *hp; char *realm = NULL; F = fopen(_PATH_CELLSERVDB, "r"); while(F && !feof(F)){ fgets(buf, 1024, F); if(buf[0] != '>') continue; if(strncmp(buf+1, cell, strlen(cell)) == 0){ fgets(buf, 1024, F); if(feof(F)) break; addr = ip_aton(buf); if(addr == 0) break; hp = gethostbyaddr((char*)&addr, 4, AF_INET); if(hp == NULL) break; strcpy(buf, hp->h_name); realm = krb_realmofhost(buf); break; } } if(F) fclose(F); return realm; } /* * Try to find the cells we should try to klog to. Look at * /usr/vice/etc/TheseCells and /usr/vice/etc/ThisCell, * in that order. */ static int k_afsklog_all_local_cells (char *krealm) { FILE *f; char cell[64]; int err; f = fopen(_PATH_THESECELLS, "r"); if (f == NULL) f = fopen(_PATH_THISCELL, "r"); if (f == NULL) return KSUCCESS; err = KSUCCESS; while(fgets(cell, sizeof(cell), f) && err == KSUCCESS) { char *nl = strchr(cell, '\n'); if (nl != 0) *nl = 0; err = k_afsklog (cell, krealm); } fclose(f); return err; } int k_afsklog(char *cell, char *krealm) { int k_errno; CREDENTIALS c; KTEXT_ST ticket; char realm[REALM_SZ]; char *vl_realm; /* realm of vl-server */ char *lrealm; /* local realm */ char CELL[64]; if (!k_hasafs()) return KSUCCESS; if (cell == 0 || cell[0] == 0) return k_afsklog_all_local_cells (krealm); foldup(CELL, cell); vl_realm = realm_of_cell(cell); k_errno = krb_get_lrealm(realm , 0); if(k_errno == KSUCCESS && (krealm == NULL || strcmp(krealm, realm))) lrealm = realm; else lrealm = NULL; /* We're about to find the the realm that holds the key for afs in * the specified cell. The problem is that null-instance * afs-principals are common and that hitting the wrong realm might * yield the wrong afs key. These thoughts leads to the following * code. * * Any realm passed to us is preferred. * * If there is a realm with the same name as the cell, it is most * likely the correct realm to talk to. * * In most (maybe even all) cases the volume location servers of the * cell will live in the realm we are looking for. * * Try the local realm, but if the previous cases fail, this is * really a long shot. * */ /* comments on the ordering of these tests */ /* If the user passes a realm, she probably knows something we don't * know and we should try afs@krealm (otherwise we're talking with a * blondino and she might as well have it.) */ k_errno = -1; if(krealm){ k_errno = get_cred(AUTH_SUPERUSER, cell, krealm, &c, &ticket); if(k_errno) k_errno = get_cred(AUTH_SUPERUSER, "", krealm, &c, &ticket); } if(k_errno) k_errno = get_cred(AUTH_SUPERUSER, cell, CELL, &c, &ticket); if(k_errno) k_errno = get_cred(AUTH_SUPERUSER, "", CELL, &c, &ticket); /* this might work in some conditions */ if(k_errno && vl_realm){ k_errno = get_cred(AUTH_SUPERUSER, cell, vl_realm, &c, &ticket); if(k_errno) k_errno = get_cred(AUTH_SUPERUSER, "", vl_realm, &c, &ticket); } if(k_errno && lrealm){ k_errno = get_cred(AUTH_SUPERUSER, cell, lrealm, &c, &ticket); #if 0 /* this is most likely never right anyway, but won't fail */ if(k_errno) k_errno = get_cred(AUTH_SUPERUSER, "", lrealm, &c, &ticket); #endif } if (k_errno == KSUCCESS) { struct ViceIoctl parms; struct ClearToken ct; int32_t sizeof_x; char buf[2048], *t; /* * Build a struct ClearToken */ ct.AuthHandle = c.kvno; bcopy((char *)c.session, ct.HandShakeKey, sizeof(c.session)); ct.ViceId = getuid(); /* is this always valid? */ ct.BeginTimestamp = 1 + c.issue_date; ct.EndTimestamp = krb_life_to_time(c.issue_date, c.lifetime); t = buf; /* * length of secret token followed by secret token */ sizeof_x = c.ticket_st.length; bcopy((char *)&sizeof_x, t, sizeof(sizeof_x)); t += sizeof(sizeof_x); bcopy((char *)c.ticket_st.dat, t, sizeof_x); t += sizeof_x; /* * length of clear token followed by clear token */ sizeof_x = sizeof(ct); bcopy((char *)&sizeof_x, t, sizeof(sizeof_x)); t += sizeof(sizeof_x); bcopy((char *)&ct, t, sizeof_x); t += sizeof_x; /* * do *not* mark as primary cell */ sizeof_x = 0; bcopy((char *)&sizeof_x, t, sizeof(sizeof_x)); t += sizeof(sizeof_x); /* * follow with cell name */ sizeof_x = strlen(cell) + 1; bcopy(cell, t, sizeof_x); t += sizeof_x; /* * Build argument block */ parms.in = buf; parms.in_size = t - buf; parms.out = 0; parms.out_size = 0; (void) k_pioctl(0, VIOCSETTOK, &parms, 0); } return k_errno; } #define NO_ENTRY_POINT 0 #define SINGLE_ENTRY_POINT 1 #define MULTIPLE_ENTRY_POINT 2 #define SINGLE_ENTRY_POINT2 3 #define AIX_ENTRY_POINTS 4 #define UNKNOWN_ENTRY_POINT 5 static int afs_entry_point = UNKNOWN_ENTRY_POINT; int k_pioctl(char *a_path, int o_opcode, struct ViceIoctl *a_paramsP, int a_followSymlinks) { #ifdef AFS_SYSCALL if (afs_entry_point == SINGLE_ENTRY_POINT) return syscall(AFS_SYSCALL, AFSCALL_PIOCTL, a_path, o_opcode, a_paramsP, a_followSymlinks); #endif #ifdef AFS_PIOCTL if (afs_entry_point == MULTIPLE_ENTRY_POINT) return syscall(AFS_PIOCTL, a_path, o_opcode, a_paramsP, a_followSymlinks); #endif #ifdef AFS_SYSCALL2 if (afs_entry_point == SINGLE_ENTRY_POINT2) return syscall(AFS_SYSCALL2, AFSCALL_PIOCTL, a_path, o_opcode, a_paramsP, a_followSymlinks); #endif #ifdef _AIX if (afs_entry_point == AIX_ENTRY_POINTS) return lpioctl(a_path, o_opcode, a_paramsP, a_followSymlinks); #endif errno = ENOSYS; kill(getpid(), SIGSYS); /* You loose! */ return -1; } int k_unlog(void) { struct ViceIoctl parms; bzero((char *)&parms, sizeof(parms)); return k_pioctl(0, VIOCUNLOG, &parms, 0); } int k_setpag(void) { #ifdef AFS_SYSCALL if (afs_entry_point == SINGLE_ENTRY_POINT) return syscall(AFS_SYSCALL, AFSCALL_SETPAG); #endif #ifdef AFS_SETPAG if (afs_entry_point == MULTIPLE_ENTRY_POINT) return syscall(AFS_SETPAG); #endif #ifdef AFS_SYSCALL2 if (afs_entry_point == SINGLE_ENTRY_POINT2) return syscall(AFS_SYSCALL2, AFSCALL_SETPAG); #endif #ifdef _AIX if (afs_entry_point == AIX_ENTRY_POINTS) return lsetpag(); #endif errno = ENOSYS; kill(getpid(), SIGSYS); /* You loose! */ return -1; } static jmp_buf catch_SIGSYS; static void SIGSYS_handler(int sig) { errno = 0; signal(SIGSYS, SIGSYS_handler); /* Need to reinstall handler on SYSV */ longjmp(catch_SIGSYS, 1); } int k_hasafs(void) { int saved_errno; RETSIGTYPE (*saved_func)(); struct ViceIoctl parms; /* * Already checked presence of AFS syscalls? */ if (afs_entry_point != UNKNOWN_ENTRY_POINT) return afs_entry_point != NO_ENTRY_POINT; /* * Probe kernel for AFS specific syscalls, * they (currently) come in two flavors. * If the syscall is absent we recive a SIGSYS. */ afs_entry_point = NO_ENTRY_POINT; bzero(&parms, sizeof(parms)); saved_errno = errno; saved_func = signal(SIGSYS, SIGSYS_handler); #ifdef AFS_SYSCALL if (setjmp(catch_SIGSYS) == 0) { syscall(AFS_SYSCALL, AFSCALL_PIOCTL, 0, VIOCSETTOK, &parms, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0); if (errno == EINVAL) { afs_entry_point = SINGLE_ENTRY_POINT; goto done; } } #endif /* AFS_SYSCALL */ #ifdef AFS_PIOCTL if (setjmp(catch_SIGSYS) == 0) { syscall(AFS_PIOCTL, 0, VIOCSETTOK, &parms, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0); if (errno == EINVAL) { afs_entry_point = MULTIPLE_ENTRY_POINT; goto done; } } #endif /* AFS_PIOCTL */ #ifdef AFS_SYSCALL2 if (setjmp(catch_SIGSYS) == 0) { syscall(AFS_SYSCALL2, AFSCALL_PIOCTL, 0, VIOCSETTOK, &parms, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0); if (errno == EINVAL) { afs_entry_point = SINGLE_ENTRY_POINT2; goto done; } } #endif /* AFS_SYSCALL */ #ifdef _AIX if (setjmp(catch_SIGSYS) == 0) { lpioctl(0, 0, 0, 0); if (errno == EINVAL) { afs_entry_point = AIX_ENTRY_POINTS; goto done; } } #endif done: (void) signal(SIGSYS, saved_func); errno = saved_errno; return afs_entry_point != NO_ENTRY_POINT; }