/* * Copyright (c) 2000 - 2007 Kungliga Tekniska Högskolan * (Royal Institute of Technology, Stockholm, Sweden). * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * * 3. Neither the name of the Institute nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #include "kuser_locl.h" #include static char *client_principal_str = NULL; static krb5_principal client_principal; static char *server_principal_str = NULL; static krb5_principal server_principal; static char *ccache_str = NULL; static char *ticket_flags_str = NULL; static TicketFlags ticket_flags; static char *keytab_file = NULL; static char *enctype_string = NULL; static char *session_enctype_string = NULL; static int expiration_time = 3600; static struct getarg_strings client_addresses; static int version_flag = 0; static int help_flag = 0; static int use_krb5 = 1; static int add_to_ccache = 0; static int use_referral_realm = 0; static const char *enc_type = "aes256-cts-hmac-sha1-96"; static const char *session_enc_type = NULL; static void encode_ticket(krb5_context context, EncryptionKey *skey, krb5_enctype etype, int skvno, krb5_creds *cred) { size_t len, size; char *buf; krb5_error_code ret; krb5_crypto crypto; EncryptedData enc_part; EncTicketPart et; Ticket ticket; memset(&enc_part, 0, sizeof(enc_part)); memset(&ticket, 0, sizeof(ticket)); /* * Set up `enc_part' */ et.flags = cred->flags.b; et.key = cred->session; et.crealm = cred->client->realm; et.cname = cred->client->name; { krb5_data empty_string; krb5_data_zero(&empty_string); et.transited.tr_type = domain_X500_Compress; et.transited.contents = empty_string; } et.authtime = cred->times.authtime; et.starttime = NULL; et.endtime = cred->times.endtime; et.renew_till = NULL; et.caddr = &cred->addresses; et.authorization_data = NULL; /* XXX allow random authorization_data */ /* * Encrypt `enc_part' of ticket with service key */ ASN1_MALLOC_ENCODE(EncTicketPart, buf, len, &et, &size, ret); if (ret) krb5_err(context, 1, ret, "EncTicketPart"); ret = krb5_crypto_init(context, skey, etype, &crypto); if (ret) krb5_err(context, 1, ret, "krb5_crypto_init"); ret = krb5_encrypt_EncryptedData(context, crypto, KRB5_KU_TICKET, buf, len, skvno, &ticket.enc_part); if (ret) krb5_err(context, 1, ret, "krb5_encrypt_EncryptedData"); free(buf); krb5_crypto_destroy(context, crypto); /* * Encode ticket */ ticket.tkt_vno = 5; ticket.realm = cred->server->realm; ticket.sname = cred->server->name; ASN1_MALLOC_ENCODE(Ticket, cred->ticket.data, cred->ticket.length, &ticket, &size, ret); free_EncryptedData(&ticket.enc_part); if(ret) krb5_err(context, 1, ret, "encode_Ticket"); } /* * */ static int create_krb5_tickets(krb5_context context, krb5_keytab kt) { krb5_error_code ret; krb5_keytab_entry entry; krb5_creds cred; krb5_enctype etype; krb5_enctype session_etype; krb5_ccache ccache; memset(&cred, 0, sizeof(cred)); ret = krb5_string_to_enctype(context, enc_type, &etype); if (ret) krb5_err (context, 1, ret, "krb5_string_to_enctype (enc-type)"); ret = krb5_string_to_enctype(context, session_enc_type, &session_etype); if (ret) krb5_err (context, 1, ret, "krb5_string_to_enctype (session-enc-type)"); ret = krb5_kt_get_entry(context, kt, server_principal, 0, etype, &entry); if (ret) krb5_err(context, 1, ret, "krb5_kt_get_entry (perhaps use different --enc-type)"); /* * setup cred */ ret = krb5_copy_principal(context, client_principal, &cred.client); if (ret == 0) ret = krb5_copy_principal(context, server_principal, &cred.server); if (ret) krb5_err(context, 1, ret, "krb5_copy_principal"); ret = krb5_generate_random_keyblock(context, session_etype, &cred.session); if (ret) krb5_err(context, 1, ret, "krb5_generate_random_keyblock"); cred.times.authtime = time(NULL); cred.times.starttime = time(NULL); cred.times.endtime = time(NULL) + expiration_time; cred.times.renew_till = 0; krb5_data_zero(&cred.second_ticket); ret = krb5_get_all_client_addrs(context, &cred.addresses); if (ret) krb5_err(context, 1, ret, "krb5_get_all_client_addrs"); cred.flags.b = ticket_flags; /* * Encode encrypted part of ticket */ encode_ticket(context, &entry.keyblock, etype, entry.vno, &cred); krb5_kt_free_entry(context, &entry); /* * Write to cc */ if (ccache_str) { ret = krb5_cc_resolve(context, ccache_str, &ccache); if (ret) krb5_err(context, 1, ret, "krb5_cc_resolve"); } else { ret = krb5_cc_default(context, &ccache); if (ret) krb5_err(context, 1, ret, "krb5_cc_default"); } if (add_to_ccache) { krb5_principal def_princ = NULL; /* * Force fcache to read the ccache header, otherwise the store * will fail. */ ret = krb5_cc_get_principal(context, ccache, &def_princ); if (ret) { krb5_warn(context, ret, "Given ccache appears not to exist; initializing it"); ret = krb5_cc_initialize(context, ccache, cred.client); if (ret) krb5_err(context, 1, ret, "krb5_cc_initialize"); } krb5_free_principal(context, def_princ); } else { ret = krb5_cc_initialize(context, ccache, cred.client); if (ret) krb5_err(context, 1, ret, "krb5_cc_initialize"); } if (use_referral_realm && strcmp(krb5_principal_get_realm(context, cred.server), "") != 0) { krb5_free_principal(context, cred.server); ret = krb5_copy_principal(context, server_principal, &cred.server); if (ret) krb5_err(context, 1, ret, "krb5_copy_principal"); ret = krb5_principal_set_realm(context, cred.server, ""); if (ret) krb5_err(context, 1, ret, "krb5_principal_set_realm"); ret = krb5_cc_store_cred(context, ccache, &cred); if (ret) krb5_err(context, 1, ret, "krb5_cc_store_cred"); krb5_free_principal(context, cred.server); ret = krb5_copy_principal(context, server_principal, &cred.server); if (ret) krb5_err(context, 1, ret, "krb5_copy_principal"); } ret = krb5_cc_store_cred(context, ccache, &cred); if (ret) krb5_err(context, 1, ret, "krb5_cc_store_cred"); krb5_free_cred_contents(context, &cred); krb5_cc_close(context, ccache); return 0; } /* * */ static void setup_env(krb5_context context, krb5_keytab *kt) { krb5_error_code ret; if (keytab_file) ret = krb5_kt_resolve(context, keytab_file, kt); else ret = krb5_kt_default(context, kt); if (ret) krb5_err(context, 1, ret, "resolving keytab"); if (client_principal_str == NULL) krb5_errx(context, 1, "missing client principal"); ret = krb5_parse_name(context, client_principal_str, &client_principal); if (ret) krb5_err(context, 1, ret, "resolving client name"); if (server_principal_str == NULL) krb5_errx(context, 1, "missing server principal"); ret = krb5_parse_name(context, server_principal_str, &server_principal); if (ret) krb5_err(context, 1, ret, "resolving server name"); /* If no session-enc-type specified on command line and this is an afs */ /* service ticket, change default of session_enc_type to DES. */ if (session_enctype_string == NULL && strcmp("afs", *server_principal->name.name_string.val) == 0) session_enc_type = "des-cbc-crc"; if (ticket_flags_str) { int ticket_flags_int; ticket_flags_int = parse_flags(ticket_flags_str, asn1_TicketFlags_units(), 0); if (ticket_flags_int <= 0) { krb5_warnx(context, "bad ticket flags: `%s'", ticket_flags_str); print_flags_table(asn1_TicketFlags_units(), stderr); exit(1); } if (ticket_flags_int) ticket_flags = int2TicketFlags(ticket_flags_int); } } /* * */ struct getargs args[] = { { "ccache", 0, arg_string, &ccache_str, "name of kerberos 5 credential cache", "cache-name"}, { "server", 's', arg_string, &server_principal_str, "name of server principal", NULL }, { "client", 'c', arg_string, &client_principal_str, "name of client principal", NULL }, { "keytab", 'k', arg_string, &keytab_file, "name of keytab file", NULL }, { "krb5", '5', arg_flag, &use_krb5, "create a kerberos 5 ticket", NULL }, { "add", 'A', arg_flag, &add_to_ccache, "add to ccache without re-initializing it", NULL }, { "referral", 'R', arg_flag, &use_referral_realm, "store an additional entry for the service with the empty realm", NULL }, { "expire-time", 'e', arg_integer, &expiration_time, "lifetime of ticket in seconds", NULL }, { "client-addresses", 'a', arg_strings, &client_addresses, "addresses of client", NULL }, { "enc-type", 't', arg_string, &enctype_string, "encryption type", NULL }, { "session-enc-type", 0, arg_string,&session_enctype_string, "encryption type", NULL }, { "ticket-flags", 'f', arg_string, &ticket_flags_str, "ticket flags for krb5 ticket", NULL }, { "version", 0, arg_flag, &version_flag, "Print version", NULL }, { "help", 0, arg_flag, &help_flag, NULL, NULL } }; static void usage(int ret) { arg_printusage(args, sizeof(args) / sizeof(args[0]), NULL, ""); exit(ret); } int main(int argc, char **argv) { int optidx = 0; krb5_error_code ret; krb5_context context; krb5_keytab kt; setprogname(argv[0]); ret = krb5_init_context(&context); if (ret) errx(1, "krb5_init_context failed: %u", ret); if (getarg(args, sizeof(args) / sizeof(args[0]), argc, argv, &optidx)) usage(1); if (help_flag) usage(0); if (version_flag) { print_version(NULL); return 0; } if (enctype_string) enc_type = enctype_string; if (session_enctype_string) session_enc_type = session_enctype_string; else session_enc_type = enc_type; setup_env(context, &kt); if (use_krb5) create_krb5_tickets(context, kt); krb5_kt_close(context, kt); krb5_free_context(context); return 0; }