 a684e001ba
			
		
	
	a684e001ba
	
	
	
		
			
			Our initiator supports configuration-driven delegation of destination
TGTs.
This commit adds acceptor-side handling of destination TGT policy to
reject storing of non-destination TGTs when destination TGTs are
desired.
Currently we use the same appdefault for this.
Background:
    A root TGT is one of the form krbtgt/REALM@SAME-REALM.
    A destination TGT is a root TGT for the same realm as the acceptor
    service's realm.
    Normally clients delegate a root TGT for the client's realm.
    In some deployments clients may want to delegate destination TGTs as
    a form of constrained delegation: so that the destination service
    cannot use the delegated credential to impersonate the client
    principal to services in its home realm (due to KDC lineage/transit
    checks).  In those deployments there may not even be a route back to
    the KDCs of the client's realm, and attempting to use a
    non-destination TGT might even lead to timeouts.
		
	
		
			
				
	
	
		
			142 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			142 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 1997 - 2008 Kungliga Tekniska Högskolan
 | |
|  * (Royal Institute of Technology, Stockholm, Sweden).
 | |
|  * All rights reserved.
 | |
|  *
 | |
|  * Redistribution and use in source and binary forms, with or without
 | |
|  * modification, are permitted provided that the following conditions
 | |
|  * are met:
 | |
|  *
 | |
|  * 1. Redistributions of source code must retain the above copyright
 | |
|  *    notice, this list of conditions and the following disclaimer.
 | |
|  *
 | |
|  * 2. Redistributions in binary form must reproduce the above copyright
 | |
|  *    notice, this list of conditions and the following disclaimer in the
 | |
|  *    documentation and/or other materials provided with the distribution.
 | |
|  *
 | |
|  * 3. Neither the name of the Institute nor the names of its contributors
 | |
|  *    may be used to endorse or promote products derived from this software
 | |
|  *    without specific prior written permission.
 | |
|  *
 | |
|  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
 | |
|  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | |
|  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 | |
|  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
 | |
|  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 | |
|  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 | |
|  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | |
|  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 | |
|  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 | |
|  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 | |
|  * SUCH DAMAGE.
 | |
|  */
 | |
| 
 | |
| /* $Id$ */
 | |
| 
 | |
| #ifndef GSSKRB5_LOCL_H
 | |
| #define GSSKRB5_LOCL_H
 | |
| 
 | |
| #include <config.h>
 | |
| 
 | |
| #include <krb5_locl.h>
 | |
| #include <gkrb5_err.h>
 | |
| #include <gssapi.h>
 | |
| #include <gssapi_mech.h>
 | |
| #include <gssapi_krb5.h>
 | |
| #include <assert.h>
 | |
| #include <mech/utils.h>
 | |
| 
 | |
| #include "cfx.h"
 | |
| 
 | |
| /*
 | |
|  *
 | |
|  */
 | |
| 
 | |
| struct gss_msg_order;
 | |
| 
 | |
| typedef struct gsskrb5_ctx {
 | |
|   struct krb5_auth_context_data *auth_context;
 | |
|   struct krb5_auth_context_data *deleg_auth_context;
 | |
|   krb5_principal source, target;
 | |
| #define IS_DCE_STYLE(ctx) (((ctx)->flags & GSS_C_DCE_STYLE) != 0)
 | |
|   OM_uint32 flags;
 | |
|   enum { LOCAL = 1, OPEN = 2,
 | |
| 	 COMPAT_OLD_DES3 = 4,
 | |
|          COMPAT_OLD_DES3_SELECTED = 8,
 | |
| 	 ACCEPTOR_SUBKEY = 16,
 | |
| 	 RETRIED = 32,
 | |
| 	 CLOSE_CCACHE = 64,
 | |
| 	 IS_CFX = 128
 | |
|   } more_flags;
 | |
|   enum gss_ctx_id_t_state {
 | |
|       /* initiator states */
 | |
|       INITIATOR_START,
 | |
|       INITIATOR_RESTART,
 | |
|       INITIATOR_WAIT_FOR_MUTAL,
 | |
|       INITIATOR_READY,
 | |
|       /* acceptor states */
 | |
|       ACCEPTOR_START,
 | |
|       ACCEPTOR_WAIT_FOR_DCESTYLE,
 | |
|       ACCEPTOR_READY
 | |
|   } state;
 | |
|   krb5_creds *kcred;
 | |
|   krb5_ccache ccache;
 | |
|   struct krb5_ticket *ticket;
 | |
|   time_t endtime;
 | |
|   HEIMDAL_MUTEX ctx_id_mutex;
 | |
|   struct gss_msg_order *order;
 | |
|   krb5_keyblock *service_keyblock;
 | |
|   krb5_data fwd_data;
 | |
|   krb5_crypto crypto;
 | |
| } *gsskrb5_ctx;
 | |
| 
 | |
| typedef struct {
 | |
|   krb5_principal principal;
 | |
|   char *destination_realm;  /* Realm of acceptor service, if delegated */
 | |
|   int cred_flags;
 | |
| #define GSS_CF_DESTROY_CRED_ON_RELEASE	1
 | |
| #define GSS_CF_NO_CI_FLAGS		2
 | |
|   struct krb5_keytab_data *keytab;
 | |
|   time_t endtime;
 | |
|   gss_cred_usage_t usage;
 | |
|   gss_OID_set mechanisms;
 | |
|   struct krb5_ccache_data *ccache;
 | |
|   HEIMDAL_MUTEX cred_id_mutex;
 | |
|   krb5_enctype *enctypes;
 | |
| } *gsskrb5_cred;
 | |
| 
 | |
| typedef struct Principal *gsskrb5_name;
 | |
| 
 | |
| /*
 | |
|  *
 | |
|  */
 | |
| 
 | |
| extern krb5_keytab _gsskrb5_keytab;
 | |
| extern HEIMDAL_MUTEX gssapi_keytab_mutex;
 | |
| 
 | |
| /*
 | |
|  * Prototypes
 | |
|  */
 | |
| 
 | |
| #include "krb5/gsskrb5-private.h"
 | |
| 
 | |
| #define GSSAPI_KRB5_INIT(ctx) do {				\
 | |
|     krb5_error_code kret_gss_init;				\
 | |
|     if((kret_gss_init = _gsskrb5_init (ctx)) != 0) {		\
 | |
| 	*minor_status = kret_gss_init;				\
 | |
| 	return GSS_S_FAILURE;					\
 | |
|     }								\
 | |
| } while (0)
 | |
| 
 | |
| /* sec_context flags */
 | |
| 
 | |
| #define SC_LOCAL_ADDRESS  0x01
 | |
| #define SC_REMOTE_ADDRESS 0x02
 | |
| #define SC_KEYBLOCK	  0x04
 | |
| #define SC_LOCAL_SUBKEY	  0x08
 | |
| #define SC_REMOTE_SUBKEY  0x10
 | |
| #define SC_SOURCE_NAME    0x20
 | |
| #define SC_TARGET_NAME    0x40
 | |
| 
 | |
| #endif
 |