/* * Copyright (c) 1997, 1998, 1999 Kungliga Tekniska Högskolan * (Royal Institute of Technology, Stockholm, Sweden). * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * This product includes software developed by Kungliga Tekniska * Högskolan and its contributors. * * 4. Neither the name of the Institute nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #include "krb5_locl.h" RCSID("$Id$"); static int send_and_recv (int fd, time_t tmout, int udp, const krb5_data *req, krb5_data *rep) { fd_set fdset; struct timeval timeout; int ret; int nbytes; if (send (fd, req->data, req->length, 0) < 0) return -1; rep->data = NULL; rep->length = 0; do{ FD_ZERO(&fdset); FD_SET(fd, &fdset); timeout.tv_sec = tmout; timeout.tv_usec = 0; ret = select (fd + 1, &fdset, NULL, NULL, &timeout); if (ret <= 0) return -1; else { if (ioctl (fd, FIONREAD, &nbytes) < 0) return -1; if(nbytes == 0) return 0; rep->data = realloc(rep->data, rep->length + nbytes); ret = recv (fd, (char*)rep->data + rep->length, nbytes, 0); if (ret < 0) { free (rep->data); return -1; } rep->length += ret; } }while(!udp); return 0; } static int send_and_recv_udp(int fd, time_t tmout, const krb5_data *send, krb5_data *recv) { return send_and_recv(fd, tmout, 1, send, recv); } static int send_and_recv_tcp(int fd, time_t tmout, const krb5_data *Send, krb5_data *recv) { unsigned char len[4]; k_put_int(len, Send->length, 4); send(fd, len, sizeof(len), 0); if(send_and_recv(fd, tmout, 0, Send, recv)) return -1; if(recv->length < 4) return -1; memmove(recv->data, (char*)recv->data + 4, recv->length - 4); recv->length -= 4; return 0; } static int send_and_recv_http(int fd, time_t tmout, const char *prefix, const krb5_data *send, krb5_data *recv) { char *request; char *str; krb5_data r; int ret; int len = base64_encode(send->data, send->length, &str); if(len < 0) return -1; asprintf(&request, "GET %s%s HTTP/1.0\r\n\r\n", prefix, str); free(str); r.data = request; r.length = strlen(request); ret = send_and_recv(fd, tmout, 0, &r, recv); free(request); if(ret) return ret; { char *s, *p; s = realloc(recv->data, recv->length + 1); s[recv->length] = 0; p = strstr(s, "\r\n\r\n"); if(p == NULL) { free(s); return -1; } p += 4; recv->data = s; recv->length -= p - s; if(recv->length < 4) { /* remove length */ free(s); return -1; } memmove(recv->data, p + 4, recv->length - 4); } return 0; } static int init_port(const char *s, int fallback) { if (s) { int tmp; sscanf (s, "%d", &tmp); return htons(tmp); } else return fallback; } krb5_error_code krb5_sendto_kdc (krb5_context context, const krb5_data *send, const krb5_realm *realm, krb5_data *receive) { krb5_error_code ret; char **hostlist, **hp, *p; struct hostent *hostent; int fd; int port; int i; char *buf; struct sockaddr *sa; port = krb5_getportbyname (context, "kerberos", "udp", 88); if (context->use_admin_kdc) ret = krb5_get_krb_admin_hst (context, realm, &hostlist); else ret = krb5_get_krbhst (context, realm, &hostlist); if (ret) return ret; buf = malloc(krb5_max_sockaddr_size ()); if (buf == NULL) { ret = ENOMEM; goto out; } sa = (struct sockaddr *)buf; for (i = 0; i < context->max_retries; ++i) for (hp = hostlist; (p = *hp); ++hp) { char **addr; char *colon; int http_flag = 0; int tcp_flag = 0; int sa_size; if(strncmp(p, "http://", 7) == 0){ p += 7; http_flag = 1; port = htons(80); } else if(strncmp(p, "http/", 5) == 0) { p += 5; http_flag = 1; port = htons(80); }else if(strncmp(p, "tcp/", 4) == 0){ p += 4; tcp_flag = 1; } else if(strncmp(p, "udp/", 4) == 0) { p += 4; } if(http_flag && context->http_proxy) { char *proxy = strdup(context->http_proxy); char *prefix; struct hostent *hp; colon = strchr(proxy, ':'); if(colon) { *colon = '\0'; } hp = roken_gethostbyname(proxy); if(colon) *colon++ = ':'; if(hp == NULL) { free(proxy); continue; } ret = krb5_h_addr2sockaddr (hp->h_addrtype, hp->h_addr, sa, &sa_size, init_port(colon, htons(80))); free(proxy); if(ret) continue; fd = socket(hp->h_addrtype, SOCK_STREAM, 0); if(fd < 0) continue; if(connect(fd, sa, sa_size) < 0) { close(fd); continue; } asprintf(&prefix, "http://%s/", p); if(prefix == NULL) { close(fd); continue; } ret = send_and_recv_http(fd, context->kdc_timeout, prefix, send, receive); close (fd); free(prefix); if(ret == 0 && receive->length != 0) goto out; continue; } colon = strchr (p, ':'); if (colon) *colon = '\0'; #ifdef HAVE_GETHOSTBYNAME2 #ifdef HAVE_IPV6 hostent = gethostbyname2 (p, AF_INET6); if (hostent == NULL) #endif hostent = gethostbyname2 (p, AF_INET); #else hostent = roken_gethostbyname (p); #endif if(hostent == NULL) continue; if (colon) *colon++ = ':'; for (addr = hostent->h_addr_list; *addr; ++addr) { int family = hostent->h_addrtype; if(http_flag || tcp_flag) fd = socket(family, SOCK_STREAM, 0); else fd = socket(family, SOCK_DGRAM, 0); if(fd < 0) { ret = errno; goto out; } ret = krb5_h_addr2sockaddr (family, *addr, sa, &sa_size, init_port(colon, port)); if (ret) continue; if(connect(fd, sa, sa_size) < 0) { close (fd); continue; } if(http_flag) ret = send_and_recv_http(fd, context->kdc_timeout, "", send, receive); else if(tcp_flag) ret = send_and_recv_tcp (fd, context->kdc_timeout, send, receive); else ret = send_and_recv_udp (fd, context->kdc_timeout, send, receive); close (fd); if(ret == 0 && receive->length != 0) goto out; } } ret = KRB5_KDC_UNREACH; out: krb5_free_krbhst (context, hostlist); free (buf); return ret; }