|
Packit |
fd8b60 |
/* -*- mode: c; c-basic-offset: 4; indent-tabs-mode: nil -*- */
|
|
Packit |
fd8b60 |
/*
|
|
Packit |
fd8b60 |
* Copyright 2009 by the Massachusetts Institute of Technology.
|
|
Packit |
fd8b60 |
* All Rights Reserved.
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* Export of this software from the United States of America may
|
|
Packit |
fd8b60 |
* require a specific license from the United States Government.
|
|
Packit |
fd8b60 |
* It is the responsibility of any person or organization contemplating
|
|
Packit |
fd8b60 |
* export to obtain such a license before exporting.
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
|
|
Packit |
fd8b60 |
* distribute this software and its documentation for any purpose and
|
|
Packit |
fd8b60 |
* without fee is hereby granted, provided that the above copyright
|
|
Packit |
fd8b60 |
* notice appear in all copies and that both that copyright notice and
|
|
Packit |
fd8b60 |
* this permission notice appear in supporting documentation, and that
|
|
Packit |
fd8b60 |
* the name of M.I.T. not be used in advertising or publicity pertaining
|
|
Packit |
fd8b60 |
* to distribution of the software without specific, written prior
|
|
Packit |
fd8b60 |
* permission. Furthermore if you modify this software you must label
|
|
Packit |
fd8b60 |
* your software as modified software and not distribute it in such a
|
|
Packit |
fd8b60 |
* fashion that it might be confused with the original M.I.T. software.
|
|
Packit |
fd8b60 |
* M.I.T. makes no representations about the suitability of
|
|
Packit |
fd8b60 |
* this software for any purpose. It is provided "as is" without express
|
|
Packit |
fd8b60 |
* or implied warranty.
|
|
Packit |
fd8b60 |
*/
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
#include <stdio.h>
|
|
Packit |
fd8b60 |
#include <stdlib.h>
|
|
Packit |
fd8b60 |
#include <string.h>
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
#include "common.h"
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/*
|
|
Packit |
fd8b60 |
* Test program for protocol transition (S4U2Self) and constrained delegation
|
|
Packit |
fd8b60 |
* (S4U2Proxy)
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* Note: because of name canonicalization, the following tips may help
|
|
Packit |
fd8b60 |
* when configuring with Active Directory:
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* - Create a computer account FOO$
|
|
Packit |
fd8b60 |
* - Set the UPN to host/foo.domain (no suffix); this is necessary to
|
|
Packit |
fd8b60 |
* be able to send an AS-REQ as this principal, otherwise you would
|
|
Packit |
fd8b60 |
* need to use the canonical name (FOO$), which will cause principal
|
|
Packit |
fd8b60 |
* comparison errors in gss_accept_sec_context().
|
|
Packit |
fd8b60 |
* - Add a SPN of host/foo.domain
|
|
Packit |
fd8b60 |
* - Configure the computer account to support constrained delegation with
|
|
Packit |
fd8b60 |
* protocol transition (Trust this computer for delegation to specified
|
|
Packit |
fd8b60 |
* services only / Use any authentication protocol)
|
|
Packit |
fd8b60 |
* - Add host/foo.domain to the keytab (possibly easiest to do this
|
|
Packit |
fd8b60 |
* with ktadd)
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* For S4U2Proxy to work the TGT must be forwardable too.
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* Usage eg:
|
|
Packit |
fd8b60 |
*
|
|
Packit |
fd8b60 |
* kinit -k -t test.keytab -f 'host/test.win.mit.edu@WIN.MIT.EDU'
|
|
Packit |
fd8b60 |
* ./t_s4u p:delegtest@WIN.MIT.EDU p:HOST/WIN-EQ7E4AA2WR8.win.mit.edu@WIN.MIT.EDU test.keytab
|
|
Packit |
fd8b60 |
*/
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
static int use_spnego = 0;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
static void
|
|
Packit |
fd8b60 |
test_prf(gss_ctx_id_t initiatorContext, gss_ctx_id_t acceptorContext,
|
|
Packit |
fd8b60 |
int flags)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
gss_buffer_desc constant;
|
|
Packit |
fd8b60 |
OM_uint32 major, minor;
|
|
Packit |
fd8b60 |
unsigned int i;
|
|
Packit |
fd8b60 |
gss_buffer_desc initiatorPrf;
|
|
Packit |
fd8b60 |
gss_buffer_desc acceptorPrf;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
constant.value = "gss prf test";
|
|
Packit |
fd8b60 |
constant.length = strlen((char *)constant.value);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
initiatorPrf.value = NULL;
|
|
Packit |
fd8b60 |
acceptorPrf.value = NULL;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
major = gss_pseudo_random(&minor, initiatorContext, flags, &constant, 19,
|
|
Packit |
fd8b60 |
&initiatorPrf);
|
|
Packit |
fd8b60 |
check_gsserr("gss_pseudo_random", major, minor);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
printf("%s\n", flags == GSS_C_PRF_KEY_FULL ?
|
|
Packit |
fd8b60 |
"PRF_KEY_FULL" : "PRF_KEY_PARTIAL");
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
printf("Initiator PRF: ");
|
|
Packit |
fd8b60 |
for (i = 0; i < initiatorPrf.length; i++)
|
|
Packit |
fd8b60 |
printf("%02x ", ((char *)initiatorPrf.value)[i] & 0xFF);
|
|
Packit |
fd8b60 |
printf("\n");
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
major = gss_pseudo_random(&minor, acceptorContext, flags, &constant, 19,
|
|
Packit |
fd8b60 |
&acceptorPrf);
|
|
Packit |
fd8b60 |
check_gsserr("gss_pseudo_random", major, minor);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
printf("Acceptor PRF: ");
|
|
Packit |
fd8b60 |
for (i = 0; i < acceptorPrf.length; i++)
|
|
Packit |
fd8b60 |
printf("%02x ", ((char *)acceptorPrf.value)[i] & 0xFF);
|
|
Packit |
fd8b60 |
printf("\n");
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
if (acceptorPrf.length != initiatorPrf.length ||
|
|
Packit |
fd8b60 |
memcmp(acceptorPrf.value, initiatorPrf.value, initiatorPrf.length)) {
|
|
Packit |
fd8b60 |
fprintf(stderr, "Initiator and acceptor PRF output does not match\n");
|
|
Packit |
fd8b60 |
exit(1);
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
(void)gss_release_buffer(&minor, &initiatorPrf);
|
|
Packit |
fd8b60 |
(void)gss_release_buffer(&minor, &acceptorPrf);
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
static void
|
|
Packit |
fd8b60 |
init_accept_sec_context(gss_cred_id_t claimant_cred_handle,
|
|
Packit |
fd8b60 |
gss_cred_id_t verifier_cred_handle,
|
|
Packit |
fd8b60 |
gss_cred_id_t *deleg_cred_handle)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
OM_uint32 major, minor, flags;
|
|
Packit |
fd8b60 |
gss_name_t source_name = GSS_C_NO_NAME, target_name = GSS_C_NO_NAME;
|
|
Packit |
fd8b60 |
gss_ctx_id_t initiator_context, acceptor_context;
|
|
Packit |
fd8b60 |
gss_OID mech;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
*deleg_cred_handle = GSS_C_NO_CREDENTIAL;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
major = gss_inquire_cred(&minor, verifier_cred_handle, &target_name, NULL,
|
|
Packit |
fd8b60 |
NULL, NULL);
|
|
Packit |
fd8b60 |
check_gsserr("gss_inquire_cred", major, minor);
|
|
Packit |
fd8b60 |
display_canon_name("Target name", target_name, &mech_krb5);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
mech = use_spnego ? &mech_spnego : &mech_krb5;
|
|
Packit |
fd8b60 |
display_oid("Target mech", mech);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
flags = GSS_C_REPLAY_FLAG | GSS_C_SEQUENCE_FLAG;
|
|
Packit |
fd8b60 |
establish_contexts(mech, claimant_cred_handle, verifier_cred_handle,
|
|
Packit |
fd8b60 |
target_name, flags, &initiator_context,
|
|
Packit |
fd8b60 |
&acceptor_context, &source_name, NULL,
|
|
Packit |
fd8b60 |
deleg_cred_handle);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
test_prf(initiator_context, acceptor_context, GSS_C_PRF_KEY_FULL);
|
|
Packit |
fd8b60 |
test_prf(initiator_context, acceptor_context, GSS_C_PRF_KEY_PARTIAL);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
(void)gss_release_name(&minor, &source_name);
|
|
Packit |
fd8b60 |
(void)gss_delete_sec_context(&minor, &acceptor_context, NULL);
|
|
Packit |
fd8b60 |
(void)gss_delete_sec_context(&minor, &initiator_context, NULL);
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
static void
|
|
Packit |
fd8b60 |
get_default_cred(const char *keytab_name, gss_OID_set mechs,
|
|
Packit |
fd8b60 |
gss_cred_id_t *impersonator_cred_handle)
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
OM_uint32 major = GSS_S_FAILURE, minor;
|
|
Packit |
fd8b60 |
krb5_error_code ret;
|
|
Packit |
fd8b60 |
krb5_context context = NULL;
|
|
Packit |
fd8b60 |
krb5_keytab keytab = NULL;
|
|
Packit |
fd8b60 |
krb5_principal keytab_principal = NULL;
|
|
Packit |
fd8b60 |
krb5_ccache ccache = NULL;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
if (keytab_name != NULL) {
|
|
Packit |
fd8b60 |
ret = krb5_init_context(&context);
|
|
Packit |
fd8b60 |
check_k5err(context, "krb5_init_context", ret);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
ret = krb5_kt_resolve(context, keytab_name, &keytab);
|
|
Packit |
fd8b60 |
check_k5err(context, "krb5_kt_resolve", ret);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
ret = krb5_cc_default(context, &ccache);
|
|
Packit |
fd8b60 |
check_k5err(context, "krb5_cc_default", ret);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
ret = krb5_cc_get_principal(context, ccache, &keytab_principal);
|
|
Packit |
fd8b60 |
check_k5err(context, "krb5_cc_get_principal", ret);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
major = gss_krb5_import_cred(&minor, ccache, keytab_principal, keytab,
|
|
Packit |
fd8b60 |
impersonator_cred_handle);
|
|
Packit |
fd8b60 |
check_gsserr("gss_krb5_import_cred", major, minor);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
krb5_free_principal(context, keytab_principal);
|
|
Packit |
fd8b60 |
krb5_cc_close(context, ccache);
|
|
Packit |
fd8b60 |
krb5_kt_close(context, keytab);
|
|
Packit |
fd8b60 |
krb5_free_context(context);
|
|
Packit |
fd8b60 |
} else {
|
|
Packit |
fd8b60 |
major = gss_acquire_cred(&minor, GSS_C_NO_NAME, GSS_C_INDEFINITE,
|
|
Packit |
fd8b60 |
mechs, GSS_C_BOTH, impersonator_cred_handle,
|
|
Packit |
fd8b60 |
NULL, NULL);
|
|
Packit |
fd8b60 |
check_gsserr("gss_acquire_cred", major, minor);
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
int
|
|
Packit |
fd8b60 |
main(int argc, char *argv[])
|
|
Packit |
fd8b60 |
{
|
|
Packit |
fd8b60 |
OM_uint32 minor, major;
|
|
Packit |
fd8b60 |
gss_cred_id_t impersonator_cred_handle = GSS_C_NO_CREDENTIAL;
|
|
Packit |
fd8b60 |
gss_cred_id_t user_cred_handle = GSS_C_NO_CREDENTIAL;
|
|
Packit |
fd8b60 |
gss_cred_id_t delegated_cred_handle = GSS_C_NO_CREDENTIAL;
|
|
Packit |
fd8b60 |
gss_name_t user = GSS_C_NO_NAME, target = GSS_C_NO_NAME;
|
|
Packit |
fd8b60 |
gss_OID_set mechs, actual_mechs = GSS_C_NO_OID_SET;
|
|
Packit |
fd8b60 |
uid_t uid;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
if (argc < 2 || argc > 5) {
|
|
Packit |
fd8b60 |
fprintf(stderr, "Usage: %s [--spnego] [user] "
|
|
Packit |
fd8b60 |
"[proxy-target] [keytab]\n", argv[0]);
|
|
Packit |
fd8b60 |
fprintf(stderr, " proxy-target and keytab are optional\n");
|
|
Packit |
fd8b60 |
exit(1);
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
if (strcmp(argv[1], "--spnego") == 0) {
|
|
Packit |
fd8b60 |
use_spnego++;
|
|
Packit |
fd8b60 |
argc--;
|
|
Packit |
fd8b60 |
argv++;
|
|
Packit |
fd8b60 |
}
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
user = import_name(argv[1]);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
major = gss_pname_to_uid(&minor, user, NULL, &uid);
|
|
Packit |
fd8b60 |
check_gsserr("gss_pname_to_uid(user)", major, minor);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
if (argc > 2 && strcmp(argv[2], "-") != 0)
|
|
Packit |
fd8b60 |
target = import_name(argv[2]);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
mechs = use_spnego ? &mechset_spnego : &mechset_krb5;
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
get_default_cred((argc > 3) ? argv[3] : NULL, mechs,
|
|
Packit |
fd8b60 |
&impersonator_cred_handle);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
printf("Protocol transition tests follow\n");
|
|
Packit |
fd8b60 |
printf("-----------------------------------\n\n");
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* get S4U2Self cred */
|
|
Packit |
fd8b60 |
major = gss_acquire_cred_impersonate_name(&minor, impersonator_cred_handle,
|
|
Packit |
fd8b60 |
user, GSS_C_INDEFINITE, mechs,
|
|
Packit |
fd8b60 |
GSS_C_INITIATE,
|
|
Packit |
fd8b60 |
&user_cred_handle, &actual_mechs,
|
|
Packit |
fd8b60 |
NULL);
|
|
Packit |
fd8b60 |
check_gsserr("gss_acquire_cred_impersonate_name", major, minor);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
/* Try to store it in default ccache */
|
|
Packit |
fd8b60 |
major = gss_store_cred(&minor, user_cred_handle, GSS_C_INITIATE,
|
|
Packit |
fd8b60 |
&mechs->elements[0], 1, 1, NULL, NULL);
|
|
Packit |
fd8b60 |
check_gsserr("gss_store_cred", major, minor);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
init_accept_sec_context(user_cred_handle, impersonator_cred_handle,
|
|
Packit |
fd8b60 |
&delegated_cred_handle);
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
printf("\n");
|
|
Packit |
fd8b60 |
|
|
Packit |
fd8b60 |
(void)gss_release_name(&minor, &user);
|
|
Packit |
fd8b60 |
(void)gss_release_name(&minor, &target);
|
|
Packit |
fd8b60 |
(void)gss_release_cred(&minor, &delegated_cred_handle);
|
|
Packit |
fd8b60 |
(void)gss_release_cred(&minor, &impersonator_cred_handle);
|
|
Packit |
fd8b60 |
(void)gss_release_cred(&minor, &user_cred_handle);
|
|
Packit |
fd8b60 |
(void)gss_release_oid_set(&minor, &actual_mechs);
|
|
Packit |
fd8b60 |
return 0;
|
|
Packit |
fd8b60 |
}
|