/*********************************************************************** * * winbind.c * * WINBIND plugin for pppd. Performs PAP, CHAP, MS-CHAP, MS-CHAPv2 * authentication using WINBIND to contact a NT-style PDC. * * Based on the structure of the radius module. * * Copyright (C) 2003 Andrew Bartlet * * Copyright 1999 Paul Mackerras, Alan Curry. * (pipe read code from passpromt.c) * * Copyright (C) 2002 Roaring Penguin Software Inc. * * Based on a patch for ipppd, which is: * Copyright (C) 1996, Matjaz Godec * Copyright (C) 1996, Lars Fenneberg * Copyright (C) 1997, Miguel A.L. Paraz * * Uses radiusclient library, which is: * Copyright (C) 1995,1996,1997,1998 Lars Fenneberg * Copyright (C) 2002 Roaring Penguin Software Inc. * * MPPE support is by Ralf Hofmann, , with * modification from Frank Cusack, . * * Updated on 2003-12-12 to support updated PPP plugin API from latest CVS * Copyright (C) 2003, Sean E. Millichamp * * This plugin may be distributed according to the terms of the GNU * General Public License, version 2 or (at your option) any later version. * ***********************************************************************/ #include "pppd.h" #include "chap-new.h" #include "chap_ms.h" #ifdef MPPE #include "md5.h" #endif #include "fsm.h" #include "ipcp.h" #include #include #include #include #include #include #include #include #include #include #include #define BUF_LEN 1024 #define NOT_AUTHENTICATED 0 #define AUTHENTICATED 1 static char *ntlm_auth = NULL; static int set_ntlm_auth(char **argv) { char *p; p = argv[0]; if (p[0] != '/') { option_error("ntlm_auth-helper argument must be full path"); return 0; } p = strdup(p); if (p == NULL) { novm("ntlm_auth-helper argument"); return 0; } if (ntlm_auth != NULL) free(ntlm_auth); ntlm_auth = p; return 1; } static option_t Options[] = { { "ntlm_auth-helper", o_special, (void *) &set_ntlm_auth, "Path to ntlm_auth executable", OPT_PRIV }, { NULL } }; static int winbind_secret_check(void); static int winbind_pap_auth(char *user, char *passwd, char **msgp, struct wordlist **paddrs, struct wordlist **popts); static int winbind_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space); static int winbind_allowed_address(u_int32_t addr); char pppd_version[] = VERSION; /********************************************************************** * %FUNCTION: plugin_init * %ARGUMENTS: * None * %RETURNS: * Nothing * %DESCRIPTION: * Initializes WINBIND plugin. ***********************************************************************/ void plugin_init(void) { pap_check_hook = winbind_secret_check; pap_auth_hook = winbind_pap_auth; chap_check_hook = winbind_secret_check; chap_verify_hook = winbind_chap_verify; allowed_address_hook = winbind_allowed_address; /* Don't ask the peer for anything other than MS-CHAP or MS-CHAP V2 */ chap_mdtype_all &= (MDTYPE_MICROSOFT_V2 | MDTYPE_MICROSOFT); add_options(Options); info("WINBIND plugin initialized."); } /** Routine to get hex characters and turn them into a 16 byte array. the array can be variable length, and any non-hex-numeric characters are skipped. "0xnn" or "0Xnn" is specially catered for. valid examples: "0A5D15"; "0x15, 0x49, 0xa2"; "59\ta9\te3\n" **/ /* Unix SMB/CIFS implementation. Samba utility functions Copyright (C) Andrew Tridgell 1992-2001 Copyright (C) Simo Sorce 2001-2002 Copyright (C) Martin Pool 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ size_t strhex_to_str(char *p, size_t len, const char *strhex) { size_t i; size_t num_chars = 0; unsigned char lonybble, hinybble; const char *hexchars = "0123456789ABCDEF"; char *p1 = NULL, *p2 = NULL; for (i = 0; i < len && strhex[i] != 0; i++) { if (strncmp(hexchars, "0x", 2) == 0) { i++; /* skip two chars */ continue; } if (!(p1 = strchr(hexchars, toupper(strhex[i])))) break; i++; /* next hex digit */ if (!(p2 = strchr(hexchars, toupper(strhex[i])))) break; /* get the two nybbles */ hinybble = (p1 - hexchars); lonybble = (p2 - hexchars); p[num_chars] = (hinybble << 4) | lonybble; num_chars++; p1 = NULL; p2 = NULL; } return num_chars; } static const char *b64 = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"; /** * Encode a base64 string into a malloc()ed string caller to free. * *From SQUID: adopted from http://ftp.sunet.se/pub2/gnu/vm/base64-encode.c with adjustments **/ char * base64_encode(const char *data) { size_t out_cnt = 0; size_t len = strlen(data); size_t output_len = 4 * ((len + 2) / 3) + 2; const unsigned char *ptr = (const unsigned char *) data; char *result = malloc(output_len); /* get us plenty of space */ unsigned int bits; for (; len >= 3; len -= 3) { bits = (ptr[0] << 16) + (ptr[1] << 8) + ptr[2]; ptr += 3; result[out_cnt++] = b64[bits >> 18]; result[out_cnt++] = b64[(bits >> 12) & 0x3f]; result[out_cnt++] = b64[(bits >> 6) & 0x3f]; result[out_cnt++] = b64[bits & 0x3f]; } if (len != 0) { bits = ptr[0] << 16; if (len > 1) bits |= ptr[1] << 8; result[out_cnt++] = b64[bits >> 18]; result[out_cnt++] = b64[(bits >> 12) & 0x3f]; result[out_cnt++] = (len > 1)? b64[(bits >> 6) & 0x3f]: '='; result[out_cnt++] = '='; } result[out_cnt] = '\0'; /* terminate */ return result; } unsigned int run_ntlm_auth(const char *username, const char *domain, const char *full_username, const char *plaintext_password, const u_char *challenge, size_t challenge_length, const u_char *lm_response, size_t lm_response_length, const u_char *nt_response, size_t nt_response_length, u_char nt_key[16], char **error_string) { pid_t forkret; int child_in[2]; int child_out[2]; int status; int authenticated = NOT_AUTHENTICATED; /* not auth */ int got_user_session_key = 0; /* not got key */ char buffer[1024]; FILE *pipe_in; FILE *pipe_out; int i; char *challenge_hex; char *lm_hex_hash; char *nt_hex_hash; /* First see if we have a program to run... */ if (ntlm_auth == NULL) return NOT_AUTHENTICATED; /* Make first child */ if (pipe(child_out) == -1) { error("pipe creation failed for child OUT!"); return NOT_AUTHENTICATED; } if (pipe(child_in) == -1) { error("pipe creation failed for child IN!"); return NOT_AUTHENTICATED; } forkret = safe_fork(child_in[0], child_out[1], 2); if (forkret == -1) { if (error_string) { *error_string = strdup("fork failed!"); } return NOT_AUTHENTICATED; } if (forkret == 0) { /* child process */ uid_t uid; close(child_out[0]); close(child_in[1]); /* run winbind as the user that invoked pppd */ setgid(getgid()); uid = getuid(); if (setuid(uid) == -1 || getuid() != uid) fatal("pppd/winbind: could not setuid to %d: %m", uid); execl("/bin/sh", "sh", "-c", ntlm_auth, NULL); fatal("pppd/winbind: could not exec /bin/sh: %m"); } /* parent */ close(child_out[1]); close(child_in[0]); /* Need to write the User's info onto the pipe */ pipe_in = fdopen(child_in[1], "w"); pipe_out = fdopen(child_out[0], "r"); /* look for session key coming back */ if (username) { char *b64_username = base64_encode(username); fprintf(pipe_in, "Username:: %s\n", b64_username); free(b64_username); } if (domain) { char *b64_domain = base64_encode(domain); fprintf(pipe_in, "NT-Domain:: %s\n", b64_domain); free(b64_domain); } if (full_username) { char *b64_full_username = base64_encode(full_username); fprintf(pipe_in, "Full-Username:: %s\n", b64_full_username); free(b64_full_username); } if (plaintext_password) { char *b64_plaintext_password = base64_encode(plaintext_password); fprintf(pipe_in, "Password:: %s\n", b64_plaintext_password); free(b64_plaintext_password); } if (challenge_length) { fprintf(pipe_in, "Request-User-Session-Key: yes\n"); challenge_hex = malloc(challenge_length*2+1); for (i = 0; i < challenge_length; i++) sprintf(challenge_hex + i * 2, "%02X", challenge[i]); fprintf(pipe_in, "LANMAN-Challenge: %s\n", challenge_hex); free(challenge_hex); } if (lm_response_length) { lm_hex_hash = malloc(lm_response_length*2+1); for (i = 0; i < lm_response_length; i++) sprintf(lm_hex_hash + i * 2, "%02X", lm_response[i]); fprintf(pipe_in, "LANMAN-response: %s\n", lm_hex_hash); free(lm_hex_hash); } if (nt_response_length) { nt_hex_hash = malloc(nt_response_length*2+1); for (i = 0; i < nt_response_length; i++) sprintf(nt_hex_hash + i * 2, "%02X", nt_response[i]); fprintf(pipe_in, "NT-response: %s\n", nt_hex_hash); free(nt_hex_hash); } fprintf(pipe_in, ".\n"); fflush(pipe_in); while (fgets(buffer, sizeof(buffer)-1, pipe_out) != NULL) { char *message, *parameter; if (buffer[strlen(buffer)-1] != '\n') { break; } buffer[strlen(buffer)-1] = '\0'; message = buffer; if (!(parameter = strstr(buffer, ": "))) { break; } parameter[0] = '\0'; parameter++; parameter[0] = '\0'; parameter++; if (strcmp(message, ".") == 0) { /* end of sequence */ break; } else if (strcasecmp(message, "Authenticated") == 0) { if (strcasecmp(parameter, "Yes") == 0) { authenticated = AUTHENTICATED; } else { notice("Winbind has declined authentication for user!"); authenticated = NOT_AUTHENTICATED; } } else if (strcasecmp(message, "User-session-key") == 0) { /* length is the number of characters to parse */ if (nt_key) { if (strhex_to_str(nt_key, 32, parameter) == 16) { got_user_session_key = 1; } else { notice("NT session key for user was not 16 bytes!"); } } } else if (strcasecmp(message, "Error") == 0) { authenticated = NOT_AUTHENTICATED; if (error_string) *error_string = strdup(parameter); } else if (strcasecmp(message, "Authentication-Error") == 0) { authenticated = NOT_AUTHENTICATED; if (error_string) *error_string = strdup(parameter); } else { notice("unrecognised input from ntlm_auth helper - %s: %s", message, parameter); } } /* parent */ if (close(child_out[0]) == -1) { notice("error closing pipe?!? for child OUT[0]"); return NOT_AUTHENTICATED; } /* parent */ if (close(child_in[1]) == -1) { notice("error closing pipe?!? for child IN[1]"); return NOT_AUTHENTICATED; } while ((wait(&status) == -1) && errno == EINTR) ; if ((authenticated == AUTHENTICATED) && nt_key && !got_user_session_key) { notice("Did not get user session key, despite being authenticated!"); return NOT_AUTHENTICATED; } return authenticated; } /********************************************************************** * %FUNCTION: winbind_secret_check * %ARGUMENTS: * None * %RETURNS: * 0 if we don't have an ntlm_auth program to run, otherwise 1. * %DESCRIPTION: * Tells pppd that we will try to authenticate the peer, and not to * worry about looking in /etc/ppp/ *-secrets ***********************************************************************/ static int winbind_secret_check(void) { return ntlm_auth != NULL; } /********************************************************************** * %FUNCTION: winbind_pap_auth * %ARGUMENTS: * user -- user-name of peer * passwd -- password supplied by peer * msgp -- Message which will be sent in PAP response * paddrs -- set to a list of possible peer IP addresses * popts -- set to a list of additional pppd options * %RETURNS: * 1 if we can authenticate, -1 if we cannot. * %DESCRIPTION: * Performs PAP authentication using WINBIND ***********************************************************************/ static int winbind_pap_auth(char *user, char *password, char **msgp, struct wordlist **paddrs, struct wordlist **popts) { if (run_ntlm_auth(NULL, NULL, user, password, NULL, 0, NULL, 0, NULL, 0, NULL, msgp) == AUTHENTICATED) { return 1; } return -1; } /********************************************************************** * %FUNCTION: winbind_chap_auth * %ARGUMENTS: * user -- user-name of peer * remmd -- hash received from peer * remmd_len -- length of remmd * cstate -- pppd's chap_state structure * %RETURNS: * AUTHENTICATED (1) if we can authenticate, NOT_AUTHENTICATED (0) if we cannot. * %DESCRIPTION: * Performs MS-CHAP and MS-CHAPv2 authentication using WINBIND. ***********************************************************************/ static int winbind_chap_verify(char *user, char *ourname, int id, struct chap_digest_type *digest, unsigned char *challenge, unsigned char *response, char *message, int message_space) { int challenge_len, response_len; char domainname[256]; char *domain; char *username; char *p; char saresponse[MS_AUTH_RESPONSE_LENGTH+1]; /* The first byte of each of these strings contains their length */ challenge_len = *challenge++; response_len = *response++; /* remove domain from "domain\username" */ if ((username = strrchr(user, '\\')) != NULL) ++username; else username = user; strlcpy(domainname, user, sizeof(domainname)); /* remove domain from "domain\username" */ if ((p = strrchr(domainname, '\\')) != NULL) { *p = '\0'; domain = domainname; } else { domain = NULL; } /* generate MD based on negotiated type */ switch (digest->code) { case CHAP_MICROSOFT: { char *error_string = NULL; u_char *nt_response = NULL; u_char *lm_response = NULL; int nt_response_size = 0; int lm_response_size = 0; u_char session_key[16]; if (response_len != MS_CHAP_RESPONSE_LEN) break; /* not even the right length */ /* Determine which part of response to verify against */ if (response[MS_CHAP_USENT]) { nt_response = &response[MS_CHAP_NTRESP]; nt_response_size = MS_CHAP_NTRESP_LEN; } else { #ifdef MSLANMAN lm_response = &response[MS_CHAP_LANMANRESP]; lm_response_size = MS_CHAP_LANMANRESP_LEN; #else /* Should really propagate this into the error packet. */ notice("Peer request for LANMAN auth not supported"); return NOT_AUTHENTICATED; #endif /* MSLANMAN */ } /* ship off to winbind, and check */ if (run_ntlm_auth(username, domain, NULL, NULL, challenge, challenge_len, lm_response, lm_response_size, nt_response, nt_response_size, session_key, &error_string) == AUTHENTICATED) { mppe_set_keys(challenge, session_key); slprintf(message, message_space, "Access granted"); return AUTHENTICATED; } else { if (error_string) { notice(error_string); free(error_string); } slprintf(message, message_space, "E=691 R=1 C=%0.*B V=0", challenge_len, challenge); return NOT_AUTHENTICATED; } break; } case CHAP_MICROSOFT_V2: { u_char Challenge[8]; u_char session_key[MD4_SIGNATURE_SIZE]; char *error_string = NULL; if (response_len != MS_CHAP2_RESPONSE_LEN) break; /* not even the right length */ ChallengeHash(&response[MS_CHAP2_PEER_CHALLENGE], challenge, user, Challenge); /* ship off to winbind, and check */ if (run_ntlm_auth(username, domain, NULL, NULL, Challenge, 8, NULL, 0, &response[MS_CHAP2_NTRESP], MS_CHAP2_NTRESP_LEN, session_key, &error_string) == AUTHENTICATED) { GenerateAuthenticatorResponse(session_key, &response[MS_CHAP2_NTRESP], &response[MS_CHAP2_PEER_CHALLENGE], challenge, user, saresponse); mppe_set_keys2(session_key, &response[MS_CHAP2_NTRESP], MS_CHAP2_AUTHENTICATOR); if (response[MS_CHAP2_FLAGS]) { slprintf(message, message_space, "S=%s", saresponse); } else { slprintf(message, message_space, "S=%s M=%s", saresponse, "Access granted"); } return AUTHENTICATED; } else { if (error_string) { notice(error_string); slprintf(message, message_space, "E=691 R=1 C=%0.*B V=0 M=%s", challenge_len, challenge, error_string); free(error_string); } else { slprintf(message, message_space, "E=691 R=1 C=%0.*B V=0 M=%s", challenge_len, challenge, "Access denied"); } return NOT_AUTHENTICATED; } break; } default: error("WINBIND: Challenge type %u unsupported", digest->code); } return NOT_AUTHENTICATED; } static int winbind_allowed_address(u_int32_t addr) { ipcp_options *wo = &ipcp_wantoptions[0]; if (wo->hisaddr !=0 && wo->hisaddr == addr) { return 1; } return -1; }