xref: /netbsd-src/external/mpl/dhcp/dist/server/ldap.c (revision f407d9293b6650aa8c33d6a995f797bb6aaefd90)
1 /*	$NetBSD: ldap.c,v 1.4 2022/04/03 01:10:59 christos Exp $	*/
2 
3 /* ldap.c
4 
5    Routines for reading the configuration from LDAP */
6 
7 /*
8  * Copyright (c) 2010-2022 by Internet Systems Consortium, Inc. ("ISC")
9  * Copyright (c) 2003-2006 Ntelos, Inc.
10  * All rights reserved.
11  *
12  * Redistribution and use in source and binary forms, with or without
13  * modification, are permitted provided that the following conditions
14  * are met:
15  *
16  * 1. Redistributions of source code must retain the above copyright
17  *    notice, this list of conditions and the following disclaimer.
18  * 2. Redistributions in binary form must reproduce the above copyright
19  *    notice, this list of conditions and the following disclaimer in the
20  *    documentation and/or other materials provided with the distribution.
21  * 3. Neither the name of The Internet Software Consortium nor the names
22  *    of its contributors may be used to endorse or promote products derived
23  *    from this software without specific prior written permission.
24  *
25  * THIS SOFTWARE IS PROVIDED BY THE INTERNET SOFTWARE CONSORTIUM AND
26  * CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
27  * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
28  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
29  * DISCLAIMED.  IN NO EVENT SHALL THE INTERNET SOFTWARE CONSORTIUM OR
30  * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
31  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
32  * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
33  * USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
34  * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
35  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
36  * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
37  * SUCH DAMAGE.
38  *
39  * This LDAP module was written by Brian Masney <masneyb@ntelos.net>. Its
40  * development was sponsored by Ntelos, Inc. (www.ntelos.com).
41  */
42 
43 #include <sys/cdefs.h>
44 __RCSID("$NetBSD: ldap.c,v 1.4 2022/04/03 01:10:59 christos Exp $");
45 
46 
47 #include "dhcpd.h"
48 #if defined(LDAP_CONFIGURATION)
49 #include <signal.h>
50 #include <errno.h>
51 #include <ctype.h>
52 #include <netdb.h>
53 #include <net/if.h>
54 #if defined(HAVE_IFADDRS_H)
55 #include <ifaddrs.h>
56 #endif
57 #include <string.h>
58 
59 #if defined(LDAP_CASA_AUTH)
60 #include "ldap_casa.h"
61 #endif
62 
63 #if defined(LDAP_USE_GSSAPI)
64 #include <sasl/sasl.h>
65 #include "ldap_krb_helper.h"
66 #endif
67 
68 static LDAP * ld = NULL;
69 static char *ldap_server = NULL,
70             *ldap_username = NULL,
71             *ldap_password = NULL,
72             *ldap_base_dn = NULL,
73             *ldap_dhcp_server_cn = NULL,
74             *ldap_debug_file = NULL;
75 static int ldap_port = LDAP_PORT,
76            ldap_method = LDAP_METHOD_DYNAMIC,
77            ldap_referrals = -1,
78            ldap_debug_fd = -1,
79            ldap_enable_retry = -1,
80            ldap_init_retry = -1;
81 #if defined (LDAP_USE_SSL)
82 static int ldap_use_ssl = -1,        /* try TLS if possible */
83            ldap_tls_reqcert = -1,
84            ldap_tls_crlcheck = -1;
85 static char *ldap_tls_ca_file = NULL,
86             *ldap_tls_ca_dir = NULL,
87             *ldap_tls_cert = NULL,
88             *ldap_tls_key = NULL,
89             *ldap_tls_ciphers = NULL,
90             *ldap_tls_randfile = NULL;
91 #endif
92 
93 #if defined (LDAP_USE_GSSAPI)
94 static char *ldap_gssapi_keytab = NULL,
95             *ldap_gssapi_principal = NULL;
96 
97 struct ldap_sasl_instance {
98     char        *sasl_mech;
99     char        *sasl_realm;
100     char        *sasl_authz_id;
101     char        *sasl_authc_id;
102     char        *sasl_password;
103 };
104 
105 static struct ldap_sasl_instance *ldap_sasl_inst = NULL;
106 
107 static int
108 _ldap_sasl_interact(LDAP *ld, unsigned flags, void *defaults, void *sin) ;
109 #endif
110 
111 static struct ldap_config_stack *ldap_stack = NULL;
112 
113 typedef struct ldap_dn_node {
114     struct ldap_dn_node *next;
115     size_t refs;
116     char *dn;
117 } ldap_dn_node;
118 
119 static ldap_dn_node *ldap_service_dn_head = NULL;
120 static ldap_dn_node *ldap_service_dn_tail = NULL;
121 
122 static int ldap_read_function (struct parse *cfile);
123 
124 static struct parse *
x_parser_init(const char * name)125 x_parser_init(const char *name)
126 {
127   struct parse *cfile;
128   isc_result_t res;
129   char *inbuf;
130 
131   inbuf = dmalloc (LDAP_BUFFER_SIZE, MDL);
132   if (inbuf == NULL)
133     return NULL;
134 
135   cfile = (struct parse *) NULL;
136   res = new_parse (&cfile, -1, inbuf, LDAP_BUFFER_SIZE, name, 0);
137   if (res != ISC_R_SUCCESS)
138     {
139       dfree(inbuf, MDL);
140       return NULL;
141     }
142   /* the buffer is still empty */
143   cfile->bufsiz = LDAP_BUFFER_SIZE;
144   cfile->buflen = cfile->bufix = 0;
145   /* attach ldap read function */
146   cfile->read_function = ldap_read_function;
147   return cfile;
148 }
149 
150 static isc_result_t
x_parser_free(struct parse ** cfile)151 x_parser_free(struct parse **cfile)
152 {
153   if (cfile && *cfile)
154     {
155       if ((*cfile)->inbuf)
156           dfree((*cfile)->inbuf, MDL);
157       (*cfile)->inbuf = NULL;
158       (*cfile)->bufsiz = 0;
159       return end_parse(cfile);
160     }
161   return ISC_R_SUCCESS;
162 }
163 
164 static int
x_parser_resize(struct parse * cfile,size_t len)165 x_parser_resize(struct parse *cfile, size_t len)
166 {
167   size_t size;
168   char * temp;
169 
170   /* grow by len rounded up at LDAP_BUFFER_SIZE */
171   size = cfile->bufsiz + (len | (LDAP_BUFFER_SIZE-1)) + 1;
172 
173   /* realloc would be better, but there isn't any */
174   if ((temp = dmalloc (size, MDL)) != NULL)
175     {
176 #if defined (DEBUG_LDAP)
177       log_info ("Reallocated %s buffer from %zu to %zu",
178                 cfile->tlname, cfile->bufsiz, size);
179 #endif
180       memcpy(temp, cfile->inbuf, cfile->bufsiz);
181       dfree(cfile->inbuf, MDL);
182       cfile->inbuf  = temp;
183       cfile->bufsiz = size;
184       return 1;
185     }
186 
187   /*
188    * Hmm... what is worser, consider it as fatal error and
189    * bail out completely or discard config data in hope it
190    * is "only" an option in dynamic host lookup?
191    */
192   log_error("Unable to reallocated %s buffer from %zu to %zu",
193             cfile->tlname, cfile->bufsiz, size);
194   return 0;
195 }
196 
197 static char *
x_parser_strcat(struct parse * cfile,const char * str)198 x_parser_strcat(struct parse *cfile, const char *str)
199 {
200   size_t cur = strlen(cfile->inbuf);
201   size_t len = strlen(str);
202   size_t cnt;
203 
204   if (cur + len >= cfile->bufsiz && !x_parser_resize(cfile, len))
205     return NULL;
206 
207   cnt = cfile->bufsiz > cur ? cfile->bufsiz - cur - 1 : 0;
208   return strncat(cfile->inbuf, str, cnt);
209 }
210 
211 static inline void
x_parser_reset(struct parse * cfile)212 x_parser_reset(struct parse *cfile)
213 {
214   cfile->inbuf[0] = '\0';
215   cfile->bufix = cfile->buflen = 0;
216 }
217 
218 static inline size_t
x_parser_length(struct parse * cfile)219 x_parser_length(struct parse *cfile)
220 {
221   cfile->buflen = strlen(cfile->inbuf);
222   return cfile->buflen;
223 }
224 
225 static char *
x_strxform(char * dst,const char * src,size_t dst_size,int (* xform)(int))226 x_strxform(char *dst, const char *src, size_t dst_size,
227            int (*xform)(int))
228 {
229   if(dst && src && dst_size)
230     {
231       size_t len, pos;
232 
233       len = strlen(src);
234       for(pos=0; pos < len && pos + 1 < dst_size; pos++)
235         dst[pos] = xform((int)src[pos]);
236       dst[pos] = '\0';
237 
238       return dst;
239     }
240   return NULL;
241 }
242 
243 static int
get_host_entry(char * fqdnname,size_t fqdnname_size,char * hostaddr,size_t hostaddr_size)244 get_host_entry(char *fqdnname, size_t fqdnname_size,
245                char *hostaddr, size_t hostaddr_size)
246 {
247 #if defined(MAXHOSTNAMELEN)
248   char   hname[MAXHOSTNAMELEN+1];
249 #else
250   char   hname[65];
251 #endif
252   struct hostent *hp;
253 
254   if (NULL == fqdnname || 1 >= fqdnname_size)
255     return -1;
256 
257   memset(hname, 0, sizeof(hname));
258   if (gethostname(hname, sizeof(hname)-1))
259     return -1;
260 
261   if (NULL == (hp = gethostbyname(hname)))
262     return -1;
263 
264   strncpy(fqdnname, hp->h_name, fqdnname_size-1);
265   fqdnname[fqdnname_size-1] = '\0';
266 
267   if (hostaddr != NULL)
268     {
269       if (hp->h_addr != NULL)
270         {
271           struct in_addr *aptr = (struct in_addr *)hp->h_addr;
272 #if defined(HAVE_INET_NTOP)
273           if (hostaddr_size >= INET_ADDRSTRLEN &&
274               inet_ntop(AF_INET, aptr, hostaddr, hostaddr_size) != NULL)
275             {
276               return 0;
277             }
278 #else
279           char  *astr = inet_ntoa(*aptr);
280           size_t alen = strlen(astr);
281           if (astr && alen > 0 && hostaddr_size > alen)
282             {
283               strncpy(hostaddr, astr, hostaddr_size-1);
284               hostaddr[hostaddr_size-1] = '\0';
285               return 0;
286             }
287 #endif
288         }
289       return -1;
290     }
291   return 0;
292 }
293 
294 #if defined(HAVE_IFADDRS_H)
295 static int
is_iface_address(struct ifaddrs * addrs,struct in_addr * addr)296 is_iface_address(struct ifaddrs *addrs, struct in_addr *addr)
297 {
298   struct ifaddrs     *ia;
299   struct sockaddr_in *sa;
300   int                 num = 0;
301 
302   if(addrs == NULL || addr == NULL)
303     return -1;
304 
305   for (ia = addrs; ia != NULL; ia = ia->ifa_next)
306     {
307       ++num;
308       if (ia->ifa_addr && (ia->ifa_flags & IFF_UP) &&
309           ia->ifa_addr->sa_family == AF_INET)
310       {
311         sa = (struct sockaddr_in *)(ia->ifa_addr);
312         if (addr->s_addr == sa->sin_addr.s_addr)
313           return num;
314       }
315     }
316   return 0;
317 }
318 
319 static int
get_host_address(const char * hostname,char * hostaddr,size_t hostaddr_size,struct ifaddrs * addrs)320 get_host_address(const char *hostname, char *hostaddr, size_t hostaddr_size, struct ifaddrs *addrs)
321 {
322   if (hostname && *hostname && hostaddr && hostaddr_size)
323     {
324       struct in_addr addr;
325 
326 #if defined(HAVE_INET_PTON)
327       if (inet_pton(AF_INET, hostname, &addr) == 1)
328 #else
329       if (inet_aton(hostname, &addr) != 0)
330 #endif
331         {
332           /* it is already IP address string */
333           if(strlen(hostname) < hostaddr_size)
334             {
335               strncpy(hostaddr, hostname, hostaddr_size-1);
336               hostaddr[hostaddr_size-1] = '\0';
337 
338               if (addrs != NULL && is_iface_address (addrs, &addr) > 0)
339                 return 1;
340               else
341                 return 0;
342             }
343         }
344       else
345         {
346           struct hostent *hp;
347           if ((hp = gethostbyname(hostname)) != NULL && hp->h_addr != NULL)
348             {
349               struct in_addr *aptr  = (struct in_addr *)hp->h_addr;
350               int             mret = 0;
351 
352               if (addrs != NULL)
353                 {
354                   char **h;
355                   for (h=hp->h_addr_list; *h; h++)
356                     {
357                       struct in_addr *haddr = (struct in_addr *)*h;
358                       if (is_iface_address (addrs, haddr) > 0)
359                         {
360                           aptr = haddr;
361                           mret = 1;
362                         }
363                     }
364                 }
365 
366 #if defined(HAVE_INET_NTOP)
367               if (hostaddr_size >= INET_ADDRSTRLEN &&
368                   inet_ntop(AF_INET, aptr, hostaddr, hostaddr_size) != NULL)
369                 {
370                   return mret;
371                 }
372 #else
373               char  *astr = inet_ntoa(*aptr);
374               size_t alen = strlen(astr);
375               if (astr && alen > 0 && alen < hostaddr_size)
376                 {
377                   strncpy(hostaddr, astr, hostaddr_size-1);
378                   hostaddr[hostaddr_size-1] = '\0';
379                   return mret;
380                 }
381 #endif
382             }
383         }
384     }
385   return -1;
386 }
387 #endif /* HAVE_IFADDRS_H */
388 
389 static void
ldap_parse_class(struct ldap_config_stack * item,struct parse * cfile)390 ldap_parse_class (struct ldap_config_stack *item, struct parse *cfile)
391 {
392   struct berval **tempbv;
393 
394   if ((tempbv = ldap_get_values_len (ld, item->ldent, "cn")) == NULL ||
395       tempbv[0] == NULL)
396     {
397       if (tempbv != NULL)
398         ldap_value_free_len (tempbv);
399 
400       return;
401     }
402 
403   x_parser_strcat (cfile, "class \"");
404   x_parser_strcat (cfile, tempbv[0]->bv_val);
405   x_parser_strcat (cfile, "\" {\n");
406 
407   item->close_brace = 1;
408   ldap_value_free_len (tempbv);
409 }
410 
411 static int
is_hex_string(const char * str)412 is_hex_string(const char *str)
413 {
414   int colon = 1;
415   int xdigit = 0;
416   size_t i;
417 
418   if (!str)
419     return 0;
420 
421   if (*str == '-')
422     str++;
423 
424   for (i=0; str[i]; ++i)
425     {
426       if (str[i] == ':')
427         {
428           xdigit = 0;
429           if(++colon > 1)
430             return 0;
431         }
432       else if(isxdigit((unsigned char)str[i]))
433         {
434           colon = 0;
435           if (++xdigit > 2)
436             return 0;
437         }
438       else
439         return 0;
440     }
441   return i > 0 && !colon;
442 }
443 
444 static void
ldap_parse_subclass(struct ldap_config_stack * item,struct parse * cfile)445 ldap_parse_subclass (struct ldap_config_stack *item, struct parse *cfile)
446 {
447   struct berval **tempbv, **classdata;
448   char *tmp;
449 
450   if ((tempbv = ldap_get_values_len (ld, item->ldent, "cn")) == NULL ||
451       tempbv[0] == NULL)
452     {
453       if (tempbv != NULL)
454         ldap_value_free_len (tempbv);
455 
456       return;
457     }
458 
459   if ((classdata = ldap_get_values_len (ld, item->ldent,
460                                   "dhcpClassData")) == NULL ||
461       classdata[0] == NULL)
462     {
463       if (classdata != NULL)
464         ldap_value_free_len (classdata);
465       ldap_value_free_len (tempbv);
466 
467       return;
468     }
469 
470   x_parser_strcat (cfile, "subclass \"");
471   x_parser_strcat (cfile, classdata[0]->bv_val);
472   if (is_hex_string(tempbv[0]->bv_val))
473     {
474       x_parser_strcat (cfile, "\" ");
475       x_parser_strcat (cfile, tempbv[0]->bv_val);
476       x_parser_strcat (cfile, " {\n");
477     }
478   else
479     {
480       tmp = quotify_string(tempbv[0]->bv_val, MDL);
481       x_parser_strcat (cfile, "\" \"");
482       x_parser_strcat (cfile, tmp);
483       x_parser_strcat (cfile, "\" {\n");
484       dfree(tmp, MDL);
485     }
486 
487   item->close_brace = 1;
488   ldap_value_free_len (tempbv);
489   ldap_value_free_len (classdata);
490 }
491 
492 
493 static void
ldap_parse_host(struct ldap_config_stack * item,struct parse * cfile)494 ldap_parse_host (struct ldap_config_stack *item, struct parse *cfile)
495 {
496   struct berval **tempbv, **hwaddr;
497 
498   if ((tempbv = ldap_get_values_len (ld, item->ldent, "cn")) == NULL ||
499       tempbv[0] == NULL)
500     {
501       if (tempbv != NULL)
502         ldap_value_free_len (tempbv);
503 
504       return;
505     }
506 
507   hwaddr = ldap_get_values_len (ld, item->ldent, "dhcpHWAddress");
508 
509   x_parser_strcat (cfile, "host ");
510   x_parser_strcat (cfile, tempbv[0]->bv_val);
511   x_parser_strcat (cfile, " {\n");
512 
513   if (hwaddr != NULL)
514     {
515       if (hwaddr[0] != NULL)
516         {
517           x_parser_strcat (cfile, "hardware ");
518           x_parser_strcat (cfile, hwaddr[0]->bv_val);
519           x_parser_strcat (cfile, ";\n");
520         }
521       ldap_value_free_len (hwaddr);
522     }
523 
524   item->close_brace = 1;
525   ldap_value_free_len (tempbv);
526 }
527 
528 
529 static void
ldap_parse_shared_network(struct ldap_config_stack * item,struct parse * cfile)530 ldap_parse_shared_network (struct ldap_config_stack *item, struct parse *cfile)
531 {
532   struct berval **tempbv;
533 
534   if ((tempbv = ldap_get_values_len (ld, item->ldent, "cn")) == NULL ||
535       tempbv[0] == NULL)
536     {
537       if (tempbv != NULL)
538         ldap_value_free_len (tempbv);
539 
540       return;
541     }
542 
543   x_parser_strcat (cfile, "shared-network \"");
544   x_parser_strcat (cfile, tempbv[0]->bv_val);
545   x_parser_strcat (cfile, "\" {\n");
546 
547   item->close_brace = 1;
548   ldap_value_free_len (tempbv);
549 }
550 
551 
552 static void
parse_netmask(int netmask,char * netmaskbuf)553 parse_netmask (int netmask, char *netmaskbuf)
554 {
555   unsigned long nm;
556   int i;
557 
558   nm = 0;
559   for (i=1; i <= netmask; i++)
560     {
561       nm |= 1 << (32 - i);
562     }
563 
564   sprintf (netmaskbuf, "%d.%d.%d.%d", (int) (nm >> 24) & 0xff,
565                                       (int) (nm >> 16) & 0xff,
566                                       (int) (nm >> 8) & 0xff,
567                                       (int) nm & 0xff);
568 }
569 
570 
571 static void
ldap_parse_subnet(struct ldap_config_stack * item,struct parse * cfile)572 ldap_parse_subnet (struct ldap_config_stack *item, struct parse *cfile)
573 {
574   struct berval **tempbv, **netmaskstr;
575   char netmaskbuf[sizeof("255.255.255.255")];
576   int i;
577 
578   if ((tempbv = ldap_get_values_len (ld, item->ldent, "cn")) == NULL ||
579       tempbv[0] == NULL)
580     {
581       if (tempbv != NULL)
582         ldap_value_free_len (tempbv);
583 
584       return;
585     }
586 
587   if ((netmaskstr = ldap_get_values_len (ld, item->ldent,
588                                      "dhcpNetmask")) == NULL ||
589       netmaskstr[0] == NULL)
590     {
591       if (netmaskstr != NULL)
592         ldap_value_free_len (netmaskstr);
593       ldap_value_free_len (tempbv);
594 
595       return;
596     }
597 
598   x_parser_strcat (cfile, "subnet ");
599   x_parser_strcat (cfile, tempbv[0]->bv_val);
600 
601   x_parser_strcat (cfile, " netmask ");
602   parse_netmask (strtol (netmaskstr[0]->bv_val, NULL, 10), netmaskbuf);
603   x_parser_strcat (cfile, netmaskbuf);
604 
605   x_parser_strcat (cfile, " {\n");
606 
607   ldap_value_free_len (tempbv);
608   ldap_value_free_len (netmaskstr);
609 
610   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpRange")) != NULL)
611     {
612       for (i=0; tempbv[i] != NULL; i++)
613         {
614           x_parser_strcat (cfile, "range");
615           x_parser_strcat (cfile, " ");
616           x_parser_strcat (cfile, tempbv[i]->bv_val);
617           x_parser_strcat (cfile, ";\n");
618         }
619       ldap_value_free_len (tempbv);
620     }
621 
622   item->close_brace = 1;
623 }
624 
625 static void
ldap_parse_subnet6(struct ldap_config_stack * item,struct parse * cfile)626 ldap_parse_subnet6 (struct ldap_config_stack *item, struct parse *cfile)
627 {
628   struct berval **tempbv;
629   int i;
630 
631   if ((tempbv = ldap_get_values_len (ld, item->ldent, "cn")) == NULL ||
632       tempbv[0] == NULL)
633     {
634       if (tempbv != NULL)
635         ldap_value_free_len (tempbv);
636 
637       return;
638     }
639 
640   x_parser_strcat (cfile, "subnet6 ");
641   x_parser_strcat (cfile, tempbv[0]->bv_val);
642 
643   x_parser_strcat (cfile, " {\n");
644 
645   ldap_value_free_len (tempbv);
646 
647   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpRange6")) != NULL)
648     {
649       for (i=0; tempbv[i] != NULL; i++)
650         {
651           x_parser_strcat (cfile, "range6");
652           x_parser_strcat (cfile, " ");
653           x_parser_strcat (cfile, tempbv[i]->bv_val);
654           x_parser_strcat (cfile, ";\n");
655         }
656       ldap_value_free_len (tempbv);
657     }
658 
659   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpPermitList")) != NULL)
660     {
661       for (i=0; tempbv[i] != NULL; i++)
662         {
663           x_parser_strcat (cfile, tempbv[i]->bv_val);
664           x_parser_strcat (cfile, ";\n");
665         }
666       ldap_value_free_len (tempbv);
667      }
668 
669    item->close_brace = 1;
670 }
671 
672 static void
ldap_parse_pool(struct ldap_config_stack * item,struct parse * cfile)673 ldap_parse_pool (struct ldap_config_stack *item, struct parse *cfile)
674 {
675   struct berval **tempbv;
676   int i;
677 
678   x_parser_strcat (cfile, "pool {\n");
679 
680   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpRange")) != NULL)
681     {
682       x_parser_strcat (cfile, "range");
683       for (i=0; tempbv[i] != NULL; i++)
684         {
685           x_parser_strcat (cfile, " ");
686           x_parser_strcat (cfile, tempbv[i]->bv_val);
687         }
688       x_parser_strcat (cfile, ";\n");
689       ldap_value_free_len (tempbv);
690     }
691 
692   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpPermitList")) != NULL)
693     {
694       for (i=0; tempbv[i] != NULL; i++)
695         {
696           x_parser_strcat (cfile, tempbv[i]->bv_val);
697           x_parser_strcat (cfile, ";\n");
698         }
699       ldap_value_free_len (tempbv);
700     }
701 
702   item->close_brace = 1;
703 }
704 
705 static void
ldap_parse_pool6(struct ldap_config_stack * item,struct parse * cfile)706 ldap_parse_pool6 (struct ldap_config_stack *item, struct parse *cfile)
707 {
708   struct berval **tempbv;
709   int i;
710 
711   x_parser_strcat (cfile, "pool6 {\n");
712 
713   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpRange6")) != NULL)
714     {
715       x_parser_strcat (cfile, "range6");
716       for (i=0; tempbv[i] != NULL; i++)
717         {
718           x_parser_strcat (cfile, " ");
719           x_parser_strcat (cfile, tempbv[i]->bv_val);
720         }
721       x_parser_strcat (cfile, ";\n");
722       ldap_value_free_len (tempbv);
723     }
724 
725   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpPermitList")) != NULL)
726     {
727       for (i=0; tempbv[i] != NULL; i++)
728         {
729           x_parser_strcat(cfile, tempbv[i]->bv_val);
730           x_parser_strcat (cfile, ";\n");
731         }
732       ldap_value_free_len (tempbv);
733     }
734 
735   item->close_brace = 1;
736 }
737 
738 static void
ldap_parse_group(struct ldap_config_stack * item,struct parse * cfile)739 ldap_parse_group (struct ldap_config_stack *item, struct parse *cfile)
740 {
741   x_parser_strcat (cfile, "group {\n");
742   item->close_brace = 1;
743 }
744 
745 
746 static void
ldap_parse_key(struct ldap_config_stack * item,struct parse * cfile)747 ldap_parse_key (struct ldap_config_stack *item, struct parse *cfile)
748 {
749   struct berval **tempbv;
750 
751   if ((tempbv = ldap_get_values_len (ld, item->ldent, "cn")) != NULL)
752     {
753       x_parser_strcat (cfile, "key ");
754       x_parser_strcat (cfile, tempbv[0]->bv_val);
755       x_parser_strcat (cfile, " {\n");
756       ldap_value_free_len (tempbv);
757     }
758 
759   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpKeyAlgorithm")) != NULL)
760     {
761       x_parser_strcat (cfile, "algorithm ");
762       x_parser_strcat (cfile, tempbv[0]->bv_val);
763       x_parser_strcat (cfile, ";\n");
764       ldap_value_free_len (tempbv);
765     }
766 
767   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpKeySecret")) != NULL)
768     {
769       x_parser_strcat (cfile, "secret ");
770       x_parser_strcat (cfile, tempbv[0]->bv_val);
771       x_parser_strcat (cfile, ";\n");
772       ldap_value_free_len (tempbv);
773     }
774 
775   item->close_brace = 1;
776 }
777 
778 
779 static void
ldap_parse_zone(struct ldap_config_stack * item,struct parse * cfile)780 ldap_parse_zone (struct ldap_config_stack *item, struct parse *cfile)
781 {
782   char *cnFindStart, *cnFindEnd;
783   struct berval **tempbv;
784   char *keyCn;
785   size_t len;
786 
787   if ((tempbv = ldap_get_values_len (ld, item->ldent, "cn")) != NULL)
788     {
789       x_parser_strcat (cfile, "zone ");
790       x_parser_strcat (cfile, tempbv[0]->bv_val);
791       x_parser_strcat (cfile, " {\n");
792       ldap_value_free_len (tempbv);
793     }
794 
795   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpDnsZoneServer")) != NULL)
796     {
797       x_parser_strcat (cfile, "primary ");
798       x_parser_strcat (cfile, tempbv[0]->bv_val);
799 
800       x_parser_strcat (cfile, ";\n");
801       ldap_value_free_len (tempbv);
802     }
803 
804   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpKeyDN")) != NULL)
805     {
806       cnFindStart = strchr(tempbv[0]->bv_val,'=');
807       if (cnFindStart != NULL)
808         cnFindEnd = strchr(++cnFindStart,',');
809       else
810         cnFindEnd = NULL;
811 
812       if (cnFindEnd != NULL && cnFindEnd > cnFindStart)
813         {
814           len = cnFindEnd - cnFindStart;
815           keyCn = dmalloc (len + 1, MDL);
816         }
817       else
818         {
819           len = 0;
820           keyCn = NULL;
821         }
822 
823       if (keyCn != NULL)
824         {
825           strncpy (keyCn, cnFindStart, len);
826           keyCn[len] = '\0';
827 
828           x_parser_strcat (cfile, "key ");
829           x_parser_strcat (cfile, keyCn);
830           x_parser_strcat (cfile, ";\n");
831 
832           dfree (keyCn, MDL);
833         }
834 
835       ldap_value_free_len (tempbv);
836      }
837 
838   item->close_brace = 1;
839 }
840 
841 #if defined(HAVE_IFADDRS_H)
842 static void
ldap_parse_failover(struct ldap_config_stack * item,struct parse * cfile)843 ldap_parse_failover (struct ldap_config_stack *item, struct parse *cfile)
844 {
845   struct berval **tempbv, **peername;
846   struct ifaddrs *addrs = NULL;
847   char srvaddr[2][64] = {"\0", "\0"};
848   int primary, split = 0, match;
849 
850   if ((peername = ldap_get_values_len (ld, item->ldent, "cn")) == NULL ||
851       peername[0] == NULL)
852     {
853       if (peername != NULL)
854         ldap_value_free_len (peername);
855 
856       // ldap with disabled schema checks? fail to avoid syntax error.
857       log_error("Unable to find mandatory failover peering name attribute");
858       return;
859     }
860 
861   /* Get all interface addresses */
862   getifaddrs(&addrs);
863 
864   /*
865   ** when dhcpFailOverPrimaryServer or dhcpFailOverSecondaryServer
866   ** matches one of our IP address, the following valiables are set:
867   ** - primary is 1 when we are primary or 0 when we are secondary
868   ** - srvaddr[0] contains ip address of the primary
869   ** - srvaddr[1] contains ip address of the secondary
870   */
871   primary = -1;
872   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpFailOverPrimaryServer")) != NULL &&
873       tempbv[0] != NULL)
874     {
875       match = get_host_address (tempbv[0]->bv_val, srvaddr[0], sizeof(srvaddr[0]), addrs);
876       if (match >= 0)
877         {
878           /* we are the primary */
879           if (match > 0)
880             primary = 1;
881         }
882       else
883         {
884           log_info("Can't resolve address of the primary failover '%s' server %s",
885                    peername[0]->bv_val, tempbv[0]->bv_val);
886           ldap_value_free_len (tempbv);
887           ldap_value_free_len (peername);
888           if (addrs)
889             freeifaddrs(addrs);
890           return;
891         }
892     }
893   if (tempbv != NULL)
894     ldap_value_free_len (tempbv);
895 
896   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpFailOverSecondaryServer")) != NULL &&
897       tempbv[0] != NULL)
898     {
899       match = get_host_address (tempbv[0]->bv_val, srvaddr[1], sizeof(srvaddr[1]), addrs);
900       if (match >= 0)
901         {
902           if (match > 0)
903             {
904               if (primary == 1)
905                 {
906                   log_info("Both, primary and secondary failover '%s' server"
907                            " attributes match our local address", peername[0]->bv_val);
908                   ldap_value_free_len (tempbv);
909                   ldap_value_free_len (peername);
910                   if (addrs)
911                     freeifaddrs(addrs);
912                   return;
913                 }
914 
915               /* we are the secondary */
916               primary = 0;
917             }
918         }
919       else
920         {
921           log_info("Can't resolve address of the secondary failover '%s' server %s",
922                    peername[0]->bv_val, tempbv[0]->bv_val);
923           ldap_value_free_len (tempbv);
924           ldap_value_free_len (peername);
925           if (addrs)
926             freeifaddrs(addrs);
927           return;
928         }
929     }
930   if (tempbv != NULL)
931     ldap_value_free_len (tempbv);
932 
933 
934   if (primary == -1 || *srvaddr[0] == '\0' || *srvaddr[1] == '\0')
935     {
936       log_error("Could not decide if the server type is primary"
937                 " or secondary for failover peering '%s'.", peername[0]->bv_val);
938       ldap_value_free_len (peername);
939       if (addrs)
940         freeifaddrs(addrs);
941       return;
942     }
943 
944   x_parser_strcat (cfile, "failover peer \"");
945   x_parser_strcat (cfile, peername[0]->bv_val);
946   x_parser_strcat (cfile, "\" {\n");
947 
948   if (primary)
949     x_parser_strcat (cfile, "primary;\n");
950   else
951     x_parser_strcat (cfile, "secondary;\n");
952 
953   x_parser_strcat (cfile, "address ");
954   if (primary)
955     x_parser_strcat (cfile, srvaddr[0]);
956   else
957     x_parser_strcat (cfile, srvaddr[1]);
958   x_parser_strcat (cfile, ";\n");
959 
960   x_parser_strcat (cfile, "peer address ");
961   if (primary)
962     x_parser_strcat (cfile, srvaddr[1]);
963   else
964     x_parser_strcat (cfile, srvaddr[0]);
965   x_parser_strcat (cfile, ";\n");
966 
967   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpFailOverPrimaryPort")) != NULL &&
968       tempbv[0] != NULL)
969     {
970       if (primary)
971         x_parser_strcat (cfile, "port ");
972       else
973         x_parser_strcat (cfile, "peer port ");
974       x_parser_strcat (cfile, tempbv[0]->bv_val);
975       x_parser_strcat (cfile, ";\n");
976     }
977   if (tempbv != NULL)
978     ldap_value_free_len (tempbv);
979 
980   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpFailOverSecondaryPort")) != NULL &&
981       tempbv[0] != NULL)
982     {
983       if (primary)
984         x_parser_strcat (cfile, "peer port ");
985       else
986         x_parser_strcat (cfile, "port ");
987       x_parser_strcat (cfile, tempbv[0]->bv_val);
988       x_parser_strcat (cfile, ";\n");
989     }
990   if (tempbv != NULL)
991     ldap_value_free_len (tempbv);
992 
993   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpFailOverResponseDelay")) != NULL &&
994       tempbv[0] != NULL)
995     {
996       x_parser_strcat (cfile, "max-response-delay ");
997       x_parser_strcat (cfile, tempbv[0]->bv_val);
998       x_parser_strcat (cfile, ";\n");
999     }
1000   if (tempbv != NULL)
1001     ldap_value_free_len (tempbv);
1002 
1003   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpFailOverUnackedUpdates")) != NULL &&
1004       tempbv[0] != NULL)
1005     {
1006       x_parser_strcat (cfile, "max-unacked-updates ");
1007       x_parser_strcat (cfile, tempbv[0]->bv_val);
1008       x_parser_strcat (cfile, ";\n");
1009     }
1010   if (tempbv != NULL)
1011     ldap_value_free_len (tempbv);
1012 
1013   if ((tempbv = ldap_get_values_len (ld, item->ldent, "dhcpFailOverLoadBalanceTime")) != NULL &&
1014       tempbv[0] != NULL)
1015     {
1016       x_parser_strcat (cfile, "load balance max seconds ");
1017       x_parser_strcat (cfile, tempbv[0]->bv_val);
1018       x_parser_strcat (cfile, ";\n");
1019     }
1020   if (tempbv != NULL)
1021     ldap_value_free_len (tempbv);
1022 
1023   tempbv = NULL;
1024   if (primary &&
1025       (tempbv = ldap_get_values_len (ld, item->ldent, "dhcpMaxClientLeadTime")) != NULL &&
1026       tempbv[0] != NULL)
1027     {
1028       x_parser_strcat (cfile, "mclt ");
1029       x_parser_strcat (cfile, tempbv[0]->bv_val);
1030       x_parser_strcat (cfile, ";\n");
1031     }
1032   if (tempbv != NULL)
1033     ldap_value_free_len (tempbv);
1034 
1035   tempbv = NULL;
1036   if (primary &&
1037       (tempbv = ldap_get_values_len (ld, item->ldent, "dhcpFailOverSplit")) != NULL &&
1038       tempbv[0] != NULL)
1039     {
1040       x_parser_strcat (cfile, "split ");
1041       x_parser_strcat (cfile, tempbv[0]->bv_val);
1042       x_parser_strcat (cfile, ";\n");
1043       split = 1;
1044     }
1045   if (tempbv != NULL)
1046     ldap_value_free_len (tempbv);
1047 
1048   tempbv = NULL;
1049   if (primary && !split &&
1050       (tempbv = ldap_get_values_len (ld, item->ldent, "dhcpFailOverHashBucketAssignment")) != NULL &&
1051       tempbv[0] != NULL)
1052     {
1053       x_parser_strcat (cfile, "hba ");
1054       x_parser_strcat (cfile, tempbv[0]->bv_val);
1055       x_parser_strcat (cfile, ";\n");
1056     }
1057   if (tempbv != NULL)
1058     ldap_value_free_len (tempbv);
1059 
1060   item->close_brace = 1;
1061 }
1062 #endif /* HAVE_IFADDRS_H */
1063 
1064 static void
add_to_config_stack(LDAPMessage * res,LDAPMessage * ent)1065 add_to_config_stack (LDAPMessage * res, LDAPMessage * ent)
1066 {
1067   struct ldap_config_stack *ns;
1068 
1069   ns = dmalloc (sizeof (*ns), MDL);
1070   if (!ns) {
1071     log_fatal ("no memory for add_to_config_stack()");
1072   }
1073 
1074   ns->res = res;
1075   ns->ldent = ent;
1076   ns->close_brace = 0;
1077   ns->processed = 0;
1078   ns->next = ldap_stack;
1079   ldap_stack = ns;
1080 }
1081 
1082 static void
ldap_stop()1083 ldap_stop()
1084 {
1085   struct sigaction old, new;
1086 
1087   if (ld == NULL)
1088     return;
1089 
1090   /*
1091    ** ldap_unbind after a LDAP_SERVER_DOWN result
1092    ** causes a SIGPIPE and dhcpd gets terminated,
1093    ** since it doesn't handle it...
1094    */
1095 
1096   new.sa_flags   = 0;
1097   new.sa_handler = SIG_IGN;
1098   sigemptyset (&new.sa_mask);
1099   sigaction (SIGPIPE, &new, &old);
1100 
1101   ldap_unbind_ext_s (ld, NULL, NULL);
1102   ld = NULL;
1103 
1104   sigaction (SIGPIPE, &old, &new);
1105 }
1106 
1107 
1108 static char *
_do_lookup_dhcp_string_option(struct option_state * options,int option_name)1109 _do_lookup_dhcp_string_option (struct option_state *options, int option_name)
1110 {
1111   struct option_cache *oc;
1112   struct data_string db;
1113   char *ret;
1114 
1115   memset (&db, 0, sizeof (db));
1116   oc = lookup_option (&server_universe, options, option_name);
1117   if (oc &&
1118       evaluate_option_cache (&db, (struct packet*) NULL,
1119                              (struct lease *) NULL,
1120                              (struct client_state *) NULL, options,
1121                              (struct option_state *) NULL,
1122                              &global_scope, oc, MDL) &&
1123       db.data != NULL && *db.data != '\0')
1124 
1125     {
1126       ret = dmalloc (db.len + 1, MDL);
1127       if (ret == NULL)
1128         log_fatal ("no memory for ldap option %d value", option_name);
1129 
1130       memcpy (ret, db.data, db.len);
1131       ret[db.len] = 0;
1132       data_string_forget (&db, MDL);
1133     }
1134   else
1135     ret = NULL;
1136 
1137   return (ret);
1138 }
1139 
1140 
1141 static int
_do_lookup_dhcp_int_option(struct option_state * options,int option_name)1142 _do_lookup_dhcp_int_option (struct option_state *options, int option_name)
1143 {
1144   struct option_cache *oc;
1145   struct data_string db;
1146   int ret = 0;
1147 
1148   memset (&db, 0, sizeof (db));
1149   oc = lookup_option (&server_universe, options, option_name);
1150   if (oc &&
1151       evaluate_option_cache (&db, (struct packet*) NULL,
1152                              (struct lease *) NULL,
1153                              (struct client_state *) NULL, options,
1154                              (struct option_state *) NULL,
1155                              &global_scope, oc, MDL) &&
1156       db.data != NULL)
1157     {
1158       if (db.len == 4) {
1159          ret = getULong(db.data);
1160       }
1161 
1162       data_string_forget (&db, MDL);
1163     }
1164 
1165   return (ret);
1166 }
1167 
1168 
1169 static int
_do_lookup_dhcp_enum_option(struct option_state * options,int option_name)1170 _do_lookup_dhcp_enum_option (struct option_state *options, int option_name)
1171 {
1172   struct option_cache *oc;
1173   struct data_string db;
1174   int ret = -1;
1175 
1176   memset (&db, 0, sizeof (db));
1177   oc = lookup_option (&server_universe, options, option_name);
1178   if (oc &&
1179       evaluate_option_cache (&db, (struct packet*) NULL,
1180                              (struct lease *) NULL,
1181                              (struct client_state *) NULL, options,
1182                              (struct option_state *) NULL,
1183                              &global_scope, oc, MDL) &&
1184       db.data != NULL && *db.data != '\0')
1185     {
1186       if (db.len == 1)
1187         ret = db.data [0];
1188       else
1189         log_fatal ("invalid option name %d", option_name);
1190 
1191       data_string_forget (&db, MDL);
1192     }
1193   else
1194     ret = 0;
1195 
1196   return (ret);
1197 }
1198 
1199 int
ldap_rebind_cb(LDAP * ld,LDAP_CONST char * url,ber_tag_t request,ber_int_t msgid,void * parms)1200 ldap_rebind_cb (LDAP *ld, LDAP_CONST char *url, ber_tag_t request, ber_int_t msgid, void *parms)
1201 {
1202   int ret;
1203   LDAPURLDesc *ldapurl = NULL;
1204   char *who = NULL;
1205   struct berval creds;
1206 
1207   log_info("LDAP rebind to '%s'", url);
1208   if ((ret = ldap_url_parse(url, &ldapurl)) != LDAP_SUCCESS)
1209     {
1210       log_error ("Error: Can not parse ldap rebind url '%s': %s",
1211                  url, ldap_err2string(ret));
1212       return ret;
1213     }
1214 
1215 
1216 #if defined (LDAP_USE_SSL)
1217   if (strcasecmp(ldapurl->lud_scheme, "ldaps") == 0)
1218     {
1219       int opt = LDAP_OPT_X_TLS_HARD;
1220       if ((ret = ldap_set_option (ld, LDAP_OPT_X_TLS, &opt)) != LDAP_SUCCESS)
1221         {
1222           log_error ("Error: Cannot init LDAPS session to %s:%d: %s",
1223                     ldapurl->lud_host, ldapurl->lud_port, ldap_err2string (ret));
1224           ldap_free_urldesc(ldapurl);
1225           return ret;
1226         }
1227       else
1228         {
1229           log_info ("LDAPS session successfully enabled to %s", ldap_server);
1230         }
1231     }
1232   else
1233   if (strcasecmp(ldapurl->lud_scheme, "ldap") == 0 &&
1234       ldap_use_ssl != LDAP_SSL_OFF)
1235     {
1236       if ((ret = ldap_start_tls_s (ld, NULL, NULL)) != LDAP_SUCCESS)
1237         {
1238           log_error ("Error: Cannot start TLS session to %s:%d: %s",
1239                      ldapurl->lud_host, ldapurl->lud_port, ldap_err2string (ret));
1240           ldap_free_urldesc(ldapurl);
1241           return ret;
1242         }
1243       else
1244         {
1245           log_info ("TLS session successfully started to %s:%d",
1246                     ldapurl->lud_host, ldapurl->lud_port);
1247         }
1248     }
1249 #endif
1250 
1251 #if defined(LDAP_USE_GSSAPI)
1252     if (ldap_gssapi_principal != NULL) {
1253       krb5_get_tgt(ldap_gssapi_principal, ldap_gssapi_keytab);
1254       if ((ret = ldap_sasl_interactive_bind_s(ld, NULL, ldap_sasl_inst->sasl_mech,
1255                                               NULL, NULL, LDAP_SASL_AUTOMATIC,
1256                                               _ldap_sasl_interact, ldap_sasl_inst)
1257           ) != LDAP_SUCCESS)
1258       {
1259         log_error ("Error: Cannot SASL bind to ldap server %s:%d: %s",
1260                    ldap_server, ldap_port, ldap_err2string (ret));
1261         char *msg=NULL;
1262         ldap_get_option( ld, LDAP_OPT_DIAGNOSTIC_MESSAGE, (void*)&msg);
1263         log_error ("\tAdditional info: %s", msg);
1264         ldap_memfree(msg);
1265         ldap_stop();
1266       }
1267 
1268       ldap_free_urldesc(ldapurl);
1269       return ret;
1270     }
1271 #endif
1272 
1273   if (ldap_username != NULL && *ldap_username != '\0' && ldap_password != NULL)
1274     {
1275       who = ldap_username;
1276       creds.bv_val = strdup(ldap_password);
1277       if (creds.bv_val == NULL)
1278           log_fatal ("Error: Unable to allocate memory to duplicate ldap_password");
1279 
1280       creds.bv_len = strlen(ldap_password);
1281 
1282       if ((ret = ldap_sasl_bind_s (ld, who, LDAP_SASL_SIMPLE, &creds,
1283                                NULL, NULL, NULL)) != LDAP_SUCCESS)
1284         {
1285           log_error ("Error: Cannot login into ldap server %s:%d: %s",
1286                      ldapurl->lud_host, ldapurl->lud_port, ldap_err2string (ret));
1287         }
1288 
1289       if (creds.bv_val)
1290         free(creds.bv_val);
1291     }
1292 
1293   ldap_free_urldesc(ldapurl);
1294   return ret;
1295 }
1296 
1297 static int
_do_ldap_retry(int ret,const char * server,int port)1298 _do_ldap_retry(int ret, const char *server, int port)
1299 {
1300   static int inform = 1;
1301 
1302   if (ldap_enable_retry > 0 && ret == LDAP_SERVER_DOWN && ldap_init_retry > 0)
1303     {
1304       if (inform || (ldap_init_retry % 10) == 0)
1305         {
1306           inform = 0;
1307           log_info ("Can't contact LDAP server %s:%d: retrying for %d sec",
1308                     server, port, ldap_init_retry);
1309         }
1310       sleep(1);
1311       return ldap_init_retry--;
1312     }
1313   return 0;
1314 }
1315 
1316 static struct berval *
_do_ldap_str2esc_filter_bv(const char * str,ber_len_t len,struct berval * bv_o)1317 _do_ldap_str2esc_filter_bv(const char *str, ber_len_t len, struct berval *bv_o)
1318 {
1319   struct berval bv_i;
1320 
1321   if (!str || !bv_o || (ber_str2bv(str, len, 0, &bv_i) == NULL) ||
1322      (ldap_bv2escaped_filter_value(&bv_i, bv_o) != 0))
1323     return NULL;
1324   return bv_o;
1325 }
1326 
1327 static void
ldap_start(void)1328 ldap_start (void)
1329 {
1330   struct option_state *options;
1331   int ret, version;
1332   char *uri = NULL;
1333   struct berval creds;
1334 #if defined(LDAP_USE_GSSAPI)
1335   char *gssapi_realm = NULL;
1336   char *gssapi_user = NULL;
1337   char *running = NULL;
1338   const char *gssapi_delim = "@";
1339 #endif
1340 
1341   if (ld != NULL)
1342     return;
1343 
1344   if (ldap_server == NULL)
1345     {
1346       options = NULL;
1347       option_state_allocate (&options, MDL);
1348 
1349       execute_statements_in_scope (NULL, NULL, NULL, NULL, NULL,
1350 				   options, &global_scope, root_group,
1351 				   NULL, NULL);
1352 
1353       ldap_server = _do_lookup_dhcp_string_option (options, SV_LDAP_SERVER);
1354       ldap_dhcp_server_cn = _do_lookup_dhcp_string_option (options,
1355                                                       SV_LDAP_DHCP_SERVER_CN);
1356       ldap_port = _do_lookup_dhcp_int_option (options, SV_LDAP_PORT);
1357       ldap_base_dn = _do_lookup_dhcp_string_option (options, SV_LDAP_BASE_DN);
1358       ldap_method = _do_lookup_dhcp_enum_option (options, SV_LDAP_METHOD);
1359       ldap_debug_file = _do_lookup_dhcp_string_option (options,
1360                                                        SV_LDAP_DEBUG_FILE);
1361       ldap_referrals = _do_lookup_dhcp_enum_option (options, SV_LDAP_REFERRALS);
1362       ldap_init_retry = _do_lookup_dhcp_int_option (options, SV_LDAP_INIT_RETRY);
1363 
1364 #if defined (LDAP_USE_SSL)
1365       ldap_use_ssl = _do_lookup_dhcp_enum_option (options, SV_LDAP_SSL);
1366       if( ldap_use_ssl != LDAP_SSL_OFF)
1367         {
1368           ldap_tls_reqcert = _do_lookup_dhcp_enum_option (options, SV_LDAP_TLS_REQCERT);
1369           ldap_tls_ca_file = _do_lookup_dhcp_string_option (options, SV_LDAP_TLS_CA_FILE);
1370           ldap_tls_ca_dir = _do_lookup_dhcp_string_option (options, SV_LDAP_TLS_CA_DIR);
1371           ldap_tls_cert = _do_lookup_dhcp_string_option (options, SV_LDAP_TLS_CERT);
1372           ldap_tls_key = _do_lookup_dhcp_string_option (options, SV_LDAP_TLS_KEY);
1373           ldap_tls_crlcheck = _do_lookup_dhcp_enum_option (options, SV_LDAP_TLS_CRLCHECK);
1374           ldap_tls_ciphers = _do_lookup_dhcp_string_option (options, SV_LDAP_TLS_CIPHERS);
1375           ldap_tls_randfile = _do_lookup_dhcp_string_option (options, SV_LDAP_TLS_RANDFILE);
1376         }
1377 #endif
1378 
1379 #if defined (LDAP_USE_GSSAPI)
1380       ldap_gssapi_principal = _do_lookup_dhcp_string_option (options,
1381                                                              SV_LDAP_GSSAPI_PRINCIPAL);
1382 
1383       if (ldap_gssapi_principal == NULL) {
1384           log_info("ldap-gssapi-principal is not set,"
1385                    "GSSAPI Authentication for LDAP will not be used");
1386       } else {
1387         ldap_gssapi_keytab = _do_lookup_dhcp_string_option (options,
1388                                                           SV_LDAP_GSSAPI_KEYTAB);
1389         if (ldap_gssapi_keytab == NULL) {
1390           log_fatal("ldap-gssapi-keytab must be specified");
1391         }
1392 
1393       	running = strdup(ldap_gssapi_principal);
1394       	if (running == NULL)
1395           log_fatal("Could not allocate memory  to duplicate gssapi principal");
1396 
1397         gssapi_user = strtok(running, gssapi_delim);
1398         if (!gssapi_user || strlen(gssapi_user) == 0) {
1399           log_fatal ("GSSAPI principal must specify user: user@realm");
1400         }
1401 
1402         gssapi_realm = strtok(NULL, gssapi_delim);
1403         if (!gssapi_realm || strlen(gssapi_realm) == 0) {
1404           log_fatal ("GSSAPI principal must specify realm: user@realm");
1405       	}
1406 
1407         ldap_sasl_inst = malloc(sizeof(struct ldap_sasl_instance));
1408         if (ldap_sasl_inst == NULL)
1409           log_fatal("Could not allocate memory for sasl instance! Can not run!");
1410 
1411         ldap_sasl_inst->sasl_mech = ber_strdup("GSSAPI");
1412         if (ldap_sasl_inst->sasl_mech == NULL)
1413           log_fatal("Could not allocate memory to duplicate gssapi mechanism");
1414 
1415         ldap_sasl_inst->sasl_realm = ber_strdup(gssapi_realm);
1416         if (ldap_sasl_inst->sasl_realm == NULL)
1417           log_fatal("Could not allocate memory  to duplicate gssapi realm");
1418 
1419         ldap_sasl_inst->sasl_authz_id = ber_strdup(gssapi_user);
1420         if (ldap_sasl_inst->sasl_authz_id == NULL)
1421           log_fatal("Could not allocate memory  to duplicate gssapi user");
1422 
1423         ldap_sasl_inst->sasl_authc_id = NULL;
1424         ldap_sasl_inst->sasl_password = NULL; //"" before
1425         free(running);
1426       }
1427 #endif
1428 
1429 #if defined (LDAP_CASA_AUTH)
1430       if (!load_uname_pwd_from_miCASA(&ldap_username,&ldap_password))
1431         {
1432 #if defined (DEBUG_LDAP)
1433           log_info ("Authentication credential taken from file");
1434 #endif
1435 #endif
1436 
1437       ldap_username = _do_lookup_dhcp_string_option (options, SV_LDAP_USERNAME);
1438       ldap_password = _do_lookup_dhcp_string_option (options, SV_LDAP_PASSWORD);
1439 
1440 #if defined (LDAP_CASA_AUTH)
1441       }
1442 #endif
1443 
1444       option_state_dereference (&options, MDL);
1445     }
1446 
1447   if (ldap_server == NULL || ldap_base_dn == NULL)
1448     {
1449       log_info ("Not searching LDAP since ldap-server, ldap-port and ldap-base-dn were not specified in the config file");
1450       ldap_method = LDAP_METHOD_STATIC;
1451       return;
1452     }
1453 
1454   if (ldap_debug_file != NULL && ldap_debug_fd == -1)
1455     {
1456       if ((ldap_debug_fd = open (ldap_debug_file, O_CREAT | O_TRUNC | O_WRONLY,
1457                                  S_IRUSR | S_IWUSR)) < 0)
1458         log_error ("Error opening debug LDAP log file %s: %s", ldap_debug_file,
1459                    strerror (errno));
1460     }
1461 
1462 #if defined (DEBUG_LDAP)
1463   log_info ("Connecting to LDAP server %s:%d", ldap_server, ldap_port);
1464 #endif
1465 
1466 #if defined (LDAP_USE_SSL)
1467   if (ldap_use_ssl == -1)
1468     {
1469       /*
1470       ** There was no "ldap-ssl" option in dhcpd.conf (also not "off").
1471       ** Let's try, if we can use an anonymous TLS session without to
1472       ** verify the server certificate -- if not continue without TLS.
1473       */
1474       int opt = LDAP_OPT_X_TLS_ALLOW;
1475       if ((ret = ldap_set_option (NULL, LDAP_OPT_X_TLS_REQUIRE_CERT,
1476                                   &opt)) != LDAP_SUCCESS)
1477         {
1478           log_error ("Warning: Cannot set LDAP TLS require cert option to 'allow': %s",
1479                      ldap_err2string (ret));
1480         }
1481     }
1482 
1483   if (ldap_use_ssl != LDAP_SSL_OFF)
1484     {
1485       if (ldap_tls_reqcert != -1)
1486         {
1487           if ((ret = ldap_set_option (NULL, LDAP_OPT_X_TLS_REQUIRE_CERT,
1488                                       &ldap_tls_reqcert)) != LDAP_SUCCESS)
1489             {
1490               log_error ("Cannot set LDAP TLS require cert option: %s",
1491                          ldap_err2string (ret));
1492             }
1493         }
1494 
1495       if( ldap_tls_ca_file != NULL)
1496         {
1497           if ((ret = ldap_set_option (NULL, LDAP_OPT_X_TLS_CACERTFILE,
1498                                       ldap_tls_ca_file)) != LDAP_SUCCESS)
1499             {
1500               log_error ("Cannot set LDAP TLS CA certificate file %s: %s",
1501                          ldap_tls_ca_file, ldap_err2string (ret));
1502             }
1503         }
1504       if( ldap_tls_ca_dir != NULL)
1505         {
1506           if ((ret = ldap_set_option (NULL, LDAP_OPT_X_TLS_CACERTDIR,
1507                                       ldap_tls_ca_dir)) != LDAP_SUCCESS)
1508             {
1509               log_error ("Cannot set LDAP TLS CA certificate dir %s: %s",
1510                          ldap_tls_ca_dir, ldap_err2string (ret));
1511             }
1512         }
1513       if( ldap_tls_cert != NULL)
1514         {
1515           if ((ret = ldap_set_option (NULL, LDAP_OPT_X_TLS_CERTFILE,
1516                                       ldap_tls_cert)) != LDAP_SUCCESS)
1517             {
1518               log_error ("Cannot set LDAP TLS client certificate file %s: %s",
1519                          ldap_tls_cert, ldap_err2string (ret));
1520             }
1521         }
1522       if( ldap_tls_key != NULL)
1523         {
1524           if ((ret = ldap_set_option (NULL, LDAP_OPT_X_TLS_KEYFILE,
1525                                       ldap_tls_key)) != LDAP_SUCCESS)
1526             {
1527               log_error ("Cannot set LDAP TLS certificate key file %s: %s",
1528                          ldap_tls_key, ldap_err2string (ret));
1529             }
1530         }
1531       if( ldap_tls_crlcheck != -1)
1532         {
1533           int opt = ldap_tls_crlcheck;
1534           if ((ret = ldap_set_option (NULL, LDAP_OPT_X_TLS_CRLCHECK,
1535                                       &opt)) != LDAP_SUCCESS)
1536             {
1537               log_error ("Cannot set LDAP TLS crl check option: %s",
1538                          ldap_err2string (ret));
1539             }
1540         }
1541       if( ldap_tls_ciphers != NULL)
1542         {
1543           if ((ret = ldap_set_option (NULL, LDAP_OPT_X_TLS_CIPHER_SUITE,
1544                                       ldap_tls_ciphers)) != LDAP_SUCCESS)
1545             {
1546               log_error ("Cannot set LDAP TLS cipher suite %s: %s",
1547                          ldap_tls_ciphers, ldap_err2string (ret));
1548             }
1549         }
1550       if( ldap_tls_randfile != NULL)
1551         {
1552           if ((ret = ldap_set_option (NULL, LDAP_OPT_X_TLS_RANDOM_FILE,
1553                                       ldap_tls_randfile)) != LDAP_SUCCESS)
1554             {
1555               log_error ("Cannot set LDAP TLS random file %s: %s",
1556                          ldap_tls_randfile, ldap_err2string (ret));
1557             }
1558         }
1559     }
1560 #endif
1561 
1562   /* enough for 'ldap://+ + hostname + ':' + port number */
1563   uri = malloc(strlen(ldap_server) + 16);
1564   if (uri == NULL)
1565     {
1566       log_error ("Cannot build ldap init URI %s:%d", ldap_server, ldap_port);
1567       return;
1568     }
1569 
1570   sprintf(uri, "ldap://%s:%d", ldap_server, ldap_port);
1571   ldap_initialize(&ld, uri);
1572 
1573   if (ld == NULL)
1574     {
1575       log_error ("Cannot init ldap session to %s:%d", ldap_server, ldap_port);
1576       return;
1577     }
1578 
1579   free(uri);
1580 
1581   version = LDAP_VERSION3;
1582   if ((ret = ldap_set_option (ld, LDAP_OPT_PROTOCOL_VERSION, &version)) != LDAP_OPT_SUCCESS)
1583     {
1584       log_error ("Cannot set LDAP version to %d: %s", version,
1585                  ldap_err2string (ret));
1586     }
1587 
1588   if (ldap_referrals != -1)
1589     {
1590       if ((ret = ldap_set_option (ld, LDAP_OPT_REFERRALS, ldap_referrals ?
1591                                   LDAP_OPT_ON : LDAP_OPT_OFF)) != LDAP_OPT_SUCCESS)
1592         {
1593           log_error ("Cannot %s LDAP referrals option: %s",
1594                      (ldap_referrals ? "enable" : "disable"),
1595                      ldap_err2string (ret));
1596         }
1597     }
1598 
1599   if ((ret = ldap_set_rebind_proc(ld, ldap_rebind_cb, NULL)) != LDAP_SUCCESS)
1600     {
1601       log_error ("Warning: Cannot set ldap rebind procedure: %s",
1602                  ldap_err2string (ret));
1603     }
1604 
1605 #if defined (LDAP_USE_SSL)
1606   if (ldap_use_ssl == LDAP_SSL_LDAPS ||
1607      (ldap_use_ssl == LDAP_SSL_ON && ldap_port == LDAPS_PORT))
1608     {
1609       int opt = LDAP_OPT_X_TLS_HARD;
1610       if ((ret = ldap_set_option (ld, LDAP_OPT_X_TLS, &opt)) != LDAP_SUCCESS)
1611         {
1612           log_error ("Error: Cannot init LDAPS session to %s:%d: %s",
1613                     ldap_server, ldap_port, ldap_err2string (ret));
1614           ldap_stop();
1615           return;
1616         }
1617       else
1618         {
1619           log_info ("LDAPS session successfully enabled to %s:%d",
1620                     ldap_server, ldap_port);
1621         }
1622     }
1623   else if (ldap_use_ssl != LDAP_SSL_OFF)
1624     {
1625       do
1626         {
1627           ret = ldap_start_tls_s (ld, NULL, NULL);
1628         }
1629       while(_do_ldap_retry(ret, ldap_server, ldap_port) > 0);
1630 
1631       if (ret != LDAP_SUCCESS)
1632         {
1633           log_error ("Error: Cannot start TLS session to %s:%d: %s",
1634                      ldap_server, ldap_port, ldap_err2string (ret));
1635           ldap_stop();
1636           return;
1637         }
1638       else
1639         {
1640           log_info ("TLS session successfully started to %s:%d",
1641                     ldap_server, ldap_port);
1642         }
1643     }
1644 #endif
1645 
1646 #if defined(LDAP_USE_GSSAPI)
1647     if (ldap_gssapi_principal != NULL) {
1648       krb5_get_tgt(ldap_gssapi_principal, ldap_gssapi_keytab);
1649       if ((ret = ldap_sasl_interactive_bind_s(ld, NULL, ldap_sasl_inst->sasl_mech,
1650                                               NULL, NULL, LDAP_SASL_AUTOMATIC,
1651                                               _ldap_sasl_interact, ldap_sasl_inst)
1652           ) != LDAP_SUCCESS)
1653         {
1654         log_error ("Error: Cannot SASL bind to ldap server %s:%d: %s",
1655                    ldap_server, ldap_port, ldap_err2string (ret));
1656         char *msg=NULL;
1657         ldap_get_option( ld, LDAP_OPT_DIAGNOSTIC_MESSAGE, (void*)&msg);
1658           log_error ("\tAdditional info: %s", msg);
1659           ldap_memfree(msg);
1660           ldap_stop();
1661           return;
1662         }
1663       } else
1664 #endif
1665 
1666   if (ldap_username != NULL && *ldap_username != '\0' && ldap_password != NULL)
1667     {
1668       creds.bv_val = strdup(ldap_password);
1669       if (creds.bv_val == NULL)
1670           log_fatal ("Error: Unable to allocate memory to duplicate ldap_password");
1671 
1672       creds.bv_len = strlen(ldap_password);
1673 
1674       do
1675         {
1676           ret = ldap_sasl_bind_s (ld, ldap_username, LDAP_SASL_SIMPLE,
1677                                   &creds, NULL, NULL, NULL);
1678         }
1679       while(_do_ldap_retry(ret, ldap_server, ldap_port) > 0);
1680       free(creds.bv_val);
1681 
1682       if (ret != LDAP_SUCCESS)
1683         {
1684           log_error ("Error: Cannot login into ldap server %s:%d: %s",
1685                      ldap_server, ldap_port, ldap_err2string (ret));
1686           ldap_stop();
1687           return;
1688         }
1689     }
1690 
1691 #if defined (DEBUG_LDAP)
1692   log_info ("Successfully logged into LDAP server %s", ldap_server);
1693 #endif
1694 }
1695 
1696 
1697 static void
parse_external_dns(LDAPMessage * ent)1698 parse_external_dns (LDAPMessage * ent)
1699 {
1700   char *search[] = {"dhcpOptionsDN", "dhcpSharedNetworkDN", "dhcpSubnetDN",
1701                     "dhcpGroupDN", "dhcpHostDN", "dhcpClassesDN",
1702                     "dhcpPoolDN", "dhcpZoneDN", "dhcpFailOverPeerDN", NULL};
1703 
1704   /* TODO: dhcpKeyDN can't be added. It is referenced in dhcpDnsZone to
1705      retrive the key name (cn). Adding keyDN will reflect adding a key
1706      declaration inside the zone configuration.
1707 
1708      dhcpSubClassesDN cant be added. It is also similar to the above.
1709      Needs schema change.
1710    */
1711   LDAPMessage * newres, * newent;
1712   struct berval **tempbv;
1713   int i, j, ret;
1714 #if defined (DEBUG_LDAP)
1715   char *dn;
1716 
1717   dn = ldap_get_dn (ld, ent);
1718   if (dn != NULL)
1719     {
1720       log_info ("Parsing external DNs for '%s'", dn);
1721       ldap_memfree (dn);
1722     }
1723 #endif
1724 
1725   if (ld == NULL)
1726     ldap_start ();
1727   if (ld == NULL)
1728     return;
1729 
1730   for (i=0; search[i] != NULL; i++)
1731     {
1732       if ((tempbv = ldap_get_values_len (ld, ent, search[i])) == NULL)
1733         continue;
1734 
1735       for (j=0; tempbv[j] != NULL; j++)
1736         {
1737           if (*tempbv[j]->bv_val == '\0')
1738             continue;
1739 
1740           if ((ret = ldap_search_ext_s(ld, tempbv[j]->bv_val, LDAP_SCOPE_BASE,
1741                                        "objectClass=*", NULL, 0, NULL,
1742                                        NULL, NULL, 0, &newres)) != LDAP_SUCCESS)
1743             {
1744               ldap_value_free_len (tempbv);
1745               ldap_stop();
1746               return;
1747             }
1748 
1749 #if defined (DEBUG_LDAP)
1750           log_info ("Adding contents of subtree '%s' to config stack from '%s' reference", tempbv[j]->bv_val, search[i]);
1751 #endif
1752           for (newent = ldap_first_entry (ld, newres);
1753                newent != NULL;
1754                newent = ldap_next_entry (ld, newent))
1755             {
1756 #if defined (DEBUG_LDAP)
1757               dn = ldap_get_dn (ld, newent);
1758               if (dn != NULL)
1759                 {
1760                   log_info ("Adding LDAP result set starting with '%s' to config stack", dn);
1761                   ldap_memfree (dn);
1762                 }
1763 #endif
1764 
1765               add_to_config_stack (newres, newent);
1766               /* don't free newres here */
1767             }
1768         }
1769 
1770       ldap_value_free_len (tempbv);
1771     }
1772 }
1773 
1774 
1775 static void
free_stack_entry(struct ldap_config_stack * item)1776 free_stack_entry (struct ldap_config_stack *item)
1777 {
1778   struct ldap_config_stack *look_ahead_pointer = item;
1779   int may_free_msg = 1;
1780 
1781   while (look_ahead_pointer->next != NULL)
1782     {
1783       look_ahead_pointer = look_ahead_pointer->next;
1784       if (look_ahead_pointer->res == item->res)
1785         {
1786           may_free_msg = 0;
1787           break;
1788         }
1789     }
1790 
1791   if (may_free_msg)
1792     ldap_msgfree (item->res);
1793 
1794   dfree (item, MDL);
1795 }
1796 
1797 
1798 static void
next_ldap_entry(struct parse * cfile)1799 next_ldap_entry (struct parse *cfile)
1800 {
1801   struct ldap_config_stack *temp_stack;
1802 
1803   if (ldap_stack != NULL && ldap_stack->close_brace)
1804     {
1805       x_parser_strcat (cfile, "}\n");
1806       ldap_stack->close_brace = 0;
1807     }
1808 
1809   while (ldap_stack != NULL &&
1810          (ldap_stack->ldent == NULL || ( ldap_stack->processed &&
1811           (ldap_stack->ldent = ldap_next_entry (ld, ldap_stack->ldent)) == NULL)))
1812     {
1813       if (ldap_stack->close_brace)
1814         {
1815           x_parser_strcat (cfile, "}\n");
1816           ldap_stack->close_brace = 0;
1817         }
1818 
1819       temp_stack = ldap_stack;
1820       ldap_stack = ldap_stack->next;
1821       free_stack_entry (temp_stack);
1822     }
1823 
1824   if (ldap_stack != NULL && ldap_stack->close_brace)
1825     {
1826       x_parser_strcat (cfile, "}\n");
1827       ldap_stack->close_brace = 0;
1828     }
1829 }
1830 
1831 
1832 static char
check_statement_end(const char * statement)1833 check_statement_end (const char *statement)
1834 {
1835   char *ptr;
1836 
1837   if (statement == NULL || *statement == '\0')
1838     return ('\0');
1839 
1840   /*
1841   ** check if it ends with "}", e.g.:
1842   **   "zone my.domain. { ... }"
1843   ** optionally followed by spaces
1844   */
1845   ptr = strrchr (statement, '}');
1846   if (ptr != NULL)
1847     {
1848       /* skip following white-spaces */
1849       for (++ptr; isspace ((int)*ptr); ptr++);
1850 
1851       /* check if we reached the end */
1852       if (*ptr == '\0')
1853         return ('}'); /* yes, block end */
1854       else
1855         return (*ptr);
1856     }
1857 
1858   /*
1859   ** this should not happen, but...
1860   ** check if it ends with ";", e.g.:
1861   **   "authoritative;"
1862   ** optionally followed by spaces
1863   */
1864   ptr = strrchr (statement, ';');
1865   if (ptr != NULL)
1866     {
1867       /* skip following white-spaces */
1868       for (++ptr; isspace ((int)*ptr); ptr++);
1869 
1870       /* check if we reached the end */
1871       if (*ptr == '\0')
1872         return (';'); /* ends with a ; */
1873       else
1874         return (*ptr);
1875     }
1876 
1877   return ('\0');
1878 }
1879 
1880 
1881 static isc_result_t
ldap_parse_entry_options(LDAPMessage * ent,struct parse * cfile,int * lease_limit)1882 ldap_parse_entry_options (LDAPMessage *ent, struct parse *cfile,
1883                           int *lease_limit)
1884 {
1885   struct berval **tempbv;
1886   int i;
1887 
1888   if (ent == NULL || cfile == NULL)
1889     return (ISC_R_FAILURE);
1890 
1891   if ((tempbv = ldap_get_values_len (ld, ent, "dhcpStatements")) != NULL)
1892     {
1893       for (i=0; tempbv[i] != NULL; i++)
1894         {
1895           if (lease_limit != NULL &&
1896               strncasecmp ("lease limit ", tempbv[i]->bv_val, 12) == 0)
1897             {
1898               *lease_limit = (int) strtol ((tempbv[i]->bv_val) + 12, NULL, 10);
1899               continue;
1900             }
1901 
1902           x_parser_strcat (cfile, tempbv[i]->bv_val);
1903 
1904           switch((int) check_statement_end (tempbv[i]->bv_val))
1905             {
1906               case '}':
1907               case ';':
1908                 x_parser_strcat (cfile, "\n");
1909                 break;
1910               default:
1911                 x_parser_strcat (cfile, ";\n");
1912                 break;
1913             }
1914         }
1915       ldap_value_free_len (tempbv);
1916     }
1917 
1918   if ((tempbv = ldap_get_values_len (ld, ent, "dhcpOption")) != NULL)
1919     {
1920       for (i=0; tempbv[i] != NULL; i++)
1921         {
1922           x_parser_strcat (cfile, "option ");
1923           x_parser_strcat (cfile, tempbv[i]->bv_val);
1924           switch ((int) check_statement_end (tempbv[i]->bv_val))
1925             {
1926               case ';':
1927                 x_parser_strcat (cfile, "\n");
1928                 break;
1929               default:
1930                 x_parser_strcat (cfile, ";\n");
1931                 break;
1932             }
1933         }
1934       ldap_value_free_len (tempbv);
1935     }
1936 
1937   return (ISC_R_SUCCESS);
1938 }
1939 
1940 
1941 static void
ldap_generate_config_string(struct parse * cfile)1942 ldap_generate_config_string (struct parse *cfile)
1943 {
1944   struct berval **objectClass;
1945   char *dn;
1946   struct ldap_config_stack *entry;
1947   LDAPMessage * ent, * res, *entfirst, *resfirst;
1948   int i, ignore, found;
1949   int ret, parsedn = 1;
1950   size_t len = cfile->buflen;
1951 
1952   if (ld == NULL)
1953     ldap_start ();
1954   if (ld == NULL)
1955     return;
1956 
1957   entry = ldap_stack;
1958   if ((objectClass = ldap_get_values_len (ld, entry->ldent,
1959                                       "objectClass")) == NULL)
1960     return;
1961 
1962   entry->processed = 1;
1963   ignore = 0;
1964   found = 1;
1965   for (i=0; objectClass[i] != NULL; i++)
1966     {
1967       if (strcasecmp (objectClass[i]->bv_val, "dhcpSharedNetwork") == 0)
1968         ldap_parse_shared_network (entry, cfile);
1969       else if (strcasecmp (objectClass[i]->bv_val, "dhcpClass") == 0)
1970         ldap_parse_class (entry, cfile);
1971       else if (strcasecmp (objectClass[i]->bv_val, "dhcpSubnet") == 0)
1972         ldap_parse_subnet (entry, cfile);
1973       else if (strcasecmp (objectClass[i]->bv_val, "dhcpSubnet6") == 0)
1974         ldap_parse_subnet6 (entry, cfile);
1975       else if (strcasecmp (objectClass[i]->bv_val, "dhcpPool") == 0)
1976         ldap_parse_pool (entry, cfile);
1977       else if (strcasecmp (objectClass[i]->bv_val, "dhcpPool6") == 0)
1978         ldap_parse_pool6 (entry, cfile);
1979       else if (strcasecmp (objectClass[i]->bv_val, "dhcpGroup") == 0)
1980         ldap_parse_group (entry, cfile);
1981       else if (strcasecmp (objectClass[i]->bv_val, "dhcpTSigKey") == 0)
1982         ldap_parse_key (entry, cfile);
1983       else if (strcasecmp (objectClass[i]->bv_val, "dhcpDnsZone") == 0)
1984         ldap_parse_zone (entry, cfile);
1985 #if defined(HAVE_IFADDRS_H)
1986       else if (strcasecmp (objectClass[i]->bv_val, "dhcpFailOverPeer") == 0)
1987         ldap_parse_failover (entry, cfile);
1988 #endif
1989       else if (strcasecmp (objectClass[i]->bv_val, "dhcpHost") == 0)
1990         {
1991           if (ldap_method == LDAP_METHOD_STATIC)
1992             ldap_parse_host (entry, cfile);
1993           else
1994             {
1995               ignore = 1;
1996               break;
1997             }
1998         }
1999       else if (strcasecmp (objectClass[i]->bv_val, "dhcpSubClass") == 0)
2000         {
2001           if (ldap_method == LDAP_METHOD_STATIC)
2002             ldap_parse_subclass (entry, cfile);
2003           else
2004             {
2005               ignore = 1;
2006               break;
2007             }
2008         }
2009       else
2010         found = 0;
2011 
2012       if (found && x_parser_length(cfile) <= len)
2013         {
2014           ignore = 1;
2015           break;
2016         }
2017     }
2018 
2019   ldap_value_free_len (objectClass);
2020 
2021   if (ignore)
2022     {
2023       next_ldap_entry (cfile);
2024       return;
2025     }
2026 
2027   ldap_parse_entry_options(entry->ldent, cfile, NULL);
2028 
2029   dn = ldap_get_dn (ld, entry->ldent);
2030   if (dn == NULL)
2031     {
2032       ldap_stop();
2033       return;
2034     }
2035 #if defined(DEBUG_LDAP)
2036   log_info ("Found LDAP entry '%s'", dn);
2037 #endif
2038 
2039   if ((ret = ldap_search_ext_s (ld, dn, LDAP_SCOPE_ONELEVEL,
2040                                 "(!(|(|(objectClass=dhcpTSigKey)(objectClass=dhcpClass)) (objectClass=dhcpFailOverPeer)))",
2041                                 NULL, 0, NULL, NULL,
2042                                 NULL, 0, &res)) != LDAP_SUCCESS)
2043     {
2044       ldap_memfree (dn);
2045 
2046       ldap_stop();
2047       return;
2048     }
2049 
2050   if ((ret = ldap_search_ext_s (ld, dn, LDAP_SCOPE_ONELEVEL,
2051                                 "(|(|(objectClass=dhcpTSigKey)(objectClass=dhcpClass)) (objectClass=dhcpFailOverPeer))",
2052                                 NULL, 0, NULL, NULL,
2053                                 NULL, 0, &resfirst)) != LDAP_SUCCESS)
2054     {
2055       ldap_memfree (dn);
2056       ldap_msgfree (res);
2057 
2058       ldap_stop();
2059       return;
2060     }
2061 
2062   ldap_memfree (dn);
2063 
2064   ent = ldap_first_entry(ld, res);
2065   entfirst = ldap_first_entry(ld, resfirst);
2066 
2067   if (ent == NULL && entfirst == NULL)
2068     {
2069       parse_external_dns (entry->ldent);
2070       next_ldap_entry (cfile);
2071     }
2072 
2073   if (ent != NULL)
2074     {
2075       add_to_config_stack (res, ent);
2076       parse_external_dns (entry->ldent);
2077       parsedn = 0;
2078     }
2079   else
2080     ldap_msgfree (res);
2081 
2082   if (entfirst != NULL)
2083     {
2084       add_to_config_stack (resfirst, entfirst);
2085       if(parsedn)
2086         parse_external_dns (entry->ldent);
2087 
2088     }
2089   else
2090     ldap_msgfree (resfirst);
2091 }
2092 
2093 
2094 static void
ldap_close_debug_fd()2095 ldap_close_debug_fd()
2096 {
2097   if (ldap_debug_fd != -1)
2098     {
2099       close (ldap_debug_fd);
2100       ldap_debug_fd = -1;
2101     }
2102 }
2103 
2104 
2105 static void
ldap_write_debug(const void * buff,size_t size)2106 ldap_write_debug (const void *buff, size_t size)
2107 {
2108   if (ldap_debug_fd != -1)
2109     {
2110       if (write (ldap_debug_fd, buff, size) < 0)
2111         {
2112           log_error ("Error writing to LDAP debug file %s: %s."
2113                      " Disabling log file.", ldap_debug_file,
2114                      strerror (errno));
2115           ldap_close_debug_fd();
2116         }
2117     }
2118 }
2119 
2120 static int
ldap_read_function(struct parse * cfile)2121 ldap_read_function (struct parse *cfile)
2122 {
2123   size_t len;
2124 
2125   /* append when in saved state */
2126   if (cfile->saved_state == NULL)
2127     {
2128       cfile->inbuf[0] = '\0';
2129       cfile->bufix = 0;
2130       cfile->buflen = 0;
2131     }
2132   len = cfile->buflen;
2133 
2134   while (ldap_stack != NULL && x_parser_length(cfile) <= len)
2135     ldap_generate_config_string (cfile);
2136 
2137   if (x_parser_length(cfile) <= len && ldap_stack == NULL)
2138     return (EOF);
2139 
2140   if (cfile->buflen > len)
2141     ldap_write_debug (cfile->inbuf + len, cfile->buflen - len);
2142 #if defined (DEBUG_LDAP)
2143   log_info ("Sending config portion '%s'", cfile->inbuf + len);
2144 #endif
2145 
2146   return (cfile->inbuf[cfile->bufix++]);
2147 }
2148 
2149 
2150 static char *
ldap_get_host_name(LDAPMessage * ent)2151 ldap_get_host_name (LDAPMessage * ent)
2152 {
2153   struct berval **name;
2154   char *ret;
2155 
2156   ret = NULL;
2157   if ((name = ldap_get_values_len (ld, ent, "cn")) == NULL || name[0] == NULL)
2158     {
2159       if (name != NULL)
2160         ldap_value_free_len (name);
2161 
2162 #if defined (DEBUG_LDAP)
2163       ret = ldap_get_dn (ld, ent);
2164       if (ret != NULL)
2165         {
2166           log_info ("Cannot get cn attribute for LDAP entry %s", ret);
2167           ldap_memfree(ret);
2168         }
2169 #endif
2170       return (NULL);
2171     }
2172 
2173   ret = dmalloc (strlen (name[0]->bv_val) + 1, MDL);
2174   strcpy (ret, name[0]->bv_val);
2175   ldap_value_free_len (name);
2176 
2177   return (ret);
2178 }
2179 
2180 
2181 isc_result_t
ldap_read_config(void)2182 ldap_read_config (void)
2183 {
2184   LDAPMessage * ldres, * hostres, * ent, * hostent;
2185   char hfilter[1024], sfilter[1024], fqdn[257];
2186   char *hostdn;
2187   ldap_dn_node *curr = NULL;
2188   struct parse *cfile;
2189   struct utsname unme;
2190   isc_result_t res;
2191   size_t length;
2192   int ret, cnt;
2193   struct berval **tempbv = NULL;
2194   struct berval bv_o[2];
2195 
2196   cfile = x_parser_init("LDAP");
2197   if (cfile == NULL)
2198     return (ISC_R_NOMEMORY);
2199 
2200   ldap_enable_retry = 1;
2201   if (ld == NULL)
2202     ldap_start ();
2203   ldap_enable_retry = 0;
2204 
2205   if (ld == NULL)
2206     {
2207       x_parser_free(&cfile);
2208       return (ldap_server == NULL ? ISC_R_SUCCESS : ISC_R_FAILURE);
2209     }
2210 
2211   uname (&unme);
2212   if (ldap_dhcp_server_cn != NULL)
2213     {
2214       if (_do_ldap_str2esc_filter_bv(ldap_dhcp_server_cn, 0, &bv_o[0]) == NULL)
2215         {
2216           log_error ("Cannot escape ldap filter value %s: %m", ldap_dhcp_server_cn);
2217           x_parser_free(&cfile);
2218           return (ISC_R_FAILURE);
2219         }
2220 
2221      snprintf (hfilter, sizeof (hfilter),
2222                 "(&(objectClass=dhcpServer)(cn=%s))", bv_o[0].bv_val);
2223 
2224      ber_memfree(bv_o[0].bv_val);
2225     }
2226   else
2227     {
2228       if (_do_ldap_str2esc_filter_bv(unme.nodename, 0, &bv_o[0]) == NULL)
2229         {
2230           log_error ("Cannot escape ldap filter value %s: %m", unme.nodename);
2231           x_parser_free(&cfile);
2232           return (ISC_R_FAILURE);
2233         }
2234 
2235       *fqdn ='\0';
2236       if(0 == get_host_entry(fqdn, sizeof(fqdn), NULL, 0))
2237         {
2238           if (_do_ldap_str2esc_filter_bv(fqdn, 0, &bv_o[1]) == NULL)
2239             {
2240               log_error ("Cannot escape ldap filter value %s: %m", fqdn);
2241               ber_memfree(bv_o[0].bv_val);
2242               x_parser_free(&cfile);
2243               return (ISC_R_FAILURE);
2244             }
2245         }
2246 
2247        // If we have fqdn and it isn't the same as nodename, use it in filter
2248        // otherwise just use nodename
2249        if ((*fqdn) && (strcmp(unme.nodename, fqdn))) {
2250           snprintf (hfilter, sizeof (hfilter),
2251                     "(&(objectClass=dhcpServer)(|(cn=%s)(cn=%s)))",
2252                     bv_o[0].bv_val, bv_o[1].bv_val);
2253 
2254           ber_memfree(bv_o[1].bv_val);
2255         }
2256       else
2257         {
2258           snprintf (hfilter, sizeof (hfilter),
2259                     "(&(objectClass=dhcpServer)(cn=%s))",
2260                     bv_o[0].bv_val);
2261         }
2262 
2263       ber_memfree(bv_o[0].bv_val);
2264     }
2265 
2266   ldap_enable_retry = 1;
2267   do
2268     {
2269       hostres = NULL;
2270       ret = ldap_search_ext_s (ld, ldap_base_dn, LDAP_SCOPE_SUBTREE,
2271                                 hfilter, NULL, 0, NULL, NULL, NULL, 0,
2272                                 &hostres);
2273     }
2274   while(_do_ldap_retry(ret, ldap_server, ldap_port) > 0);
2275   ldap_enable_retry = 0;
2276 
2277   if(ret != LDAP_SUCCESS)
2278     {
2279       log_error ("Cannot find host LDAP entry %s %s",
2280                  ((ldap_dhcp_server_cn == NULL)?(unme.nodename):(ldap_dhcp_server_cn)), hfilter);
2281       if(NULL != hostres)
2282         ldap_msgfree (hostres);
2283       ldap_stop();
2284       x_parser_free(&cfile);
2285       return (ISC_R_FAILURE);
2286     }
2287 
2288   if ((hostent = ldap_first_entry (ld, hostres)) == NULL)
2289     {
2290       log_error ("Error: Cannot find LDAP entry matching %s", hfilter);
2291       ldap_msgfree (hostres);
2292       ldap_stop();
2293       x_parser_free(&cfile);
2294       return (ISC_R_FAILURE);
2295     }
2296 
2297   hostdn = ldap_get_dn (ld, hostent);
2298 #if defined(DEBUG_LDAP)
2299   if (hostdn != NULL)
2300     log_info ("Found dhcpServer LDAP entry '%s'", hostdn);
2301 #endif
2302 
2303   if (hostdn == NULL ||
2304       (tempbv = ldap_get_values_len (ld, hostent, "dhcpServiceDN")) == NULL ||
2305       tempbv[0] == NULL)
2306     {
2307       log_error ("Error: No dhcp service is associated with the server %s %s",
2308                  (hostdn ? "dn" : "name"), (hostdn ? hostdn :
2309                  (ldap_dhcp_server_cn ? ldap_dhcp_server_cn : unme.nodename)));
2310 
2311       if (tempbv != NULL)
2312         ldap_value_free_len (tempbv);
2313 
2314       if (hostdn)
2315         ldap_memfree (hostdn);
2316       ldap_msgfree (hostres);
2317       ldap_stop();
2318       x_parser_free(&cfile);
2319       return (ISC_R_FAILURE);
2320     }
2321 
2322 #if defined(DEBUG_LDAP)
2323   log_info ("LDAP: Parsing dhcpServer options '%s' ...", hostdn);
2324 #endif
2325 
2326   res = ldap_parse_entry_options(hostent, cfile, NULL);
2327   if (res != ISC_R_SUCCESS)
2328     {
2329       ldap_value_free_len (tempbv);
2330       ldap_msgfree (hostres);
2331       ldap_memfree (hostdn);
2332       ldap_stop();
2333       x_parser_free(&cfile);
2334       return res;
2335     }
2336 
2337   if (x_parser_length(cfile) > 0)
2338     {
2339       ldap_write_debug(cfile->inbuf, cfile->buflen);
2340 
2341       res = conf_file_subparse (cfile, root_group, ROOT_GROUP);
2342       if (res != ISC_R_SUCCESS)
2343         {
2344           log_error ("LDAP: cannot parse dhcpServer entry '%s'", hostdn);
2345           ldap_value_free_len (tempbv);
2346           ldap_msgfree (hostres);
2347           ldap_memfree (hostdn);
2348           ldap_stop();
2349           x_parser_free(&cfile);
2350           return res;
2351         }
2352       x_parser_reset(cfile);
2353     }
2354   ldap_msgfree (hostres);
2355 
2356   res = ISC_R_SUCCESS;
2357   for (cnt=0; tempbv[cnt] != NULL; cnt++)
2358     {
2359 
2360       if (_do_ldap_str2esc_filter_bv(hostdn, 0, &bv_o[0]) == NULL)
2361         {
2362           log_error ("Cannot escape ldap filter value %s: %m", hostdn);
2363           res = ISC_R_FAILURE;
2364           break;
2365         }
2366 
2367       snprintf(sfilter, sizeof(sfilter), "(&(objectClass=dhcpService)"
2368                         "(|(|(dhcpPrimaryDN=%s)(dhcpSecondaryDN=%s))(dhcpServerDN=%s)))",
2369                         bv_o[0].bv_val, bv_o[0].bv_val, bv_o[0].bv_val);
2370 
2371       ber_memfree(bv_o[0].bv_val);
2372 
2373       ldres = NULL;
2374       if ((ret = ldap_search_ext_s (ld, tempbv[cnt]->bv_val, LDAP_SCOPE_BASE,
2375                                     sfilter, NULL, 0, NULL, NULL, NULL,
2376                                     0, &ldres)) != LDAP_SUCCESS)
2377         {
2378           log_error ("Error searching for dhcpServiceDN '%s': %s. Please update the LDAP entry '%s'",
2379                      tempbv[cnt]->bv_val, ldap_err2string (ret), hostdn);
2380           if(NULL != ldres)
2381             ldap_msgfree(ldres);
2382           res = ISC_R_FAILURE;
2383           break;
2384         }
2385 
2386       if ((ent = ldap_first_entry (ld, ldres)) == NULL)
2387         {
2388           log_error ("Error: Cannot find dhcpService DN '%s' with server reference. Please update the LDAP server entry '%s'",
2389                      tempbv[cnt]->bv_val, hostdn);
2390 
2391           ldap_msgfree(ldres);
2392           res = ISC_R_FAILURE;
2393           break;
2394         }
2395 
2396       /*
2397       ** FIXME: how to free the remembered dn's on exit?
2398       **        This should be OK if dmalloc registers the
2399       **        memory it allocated and frees it on exit..
2400       */
2401 
2402       curr = dmalloc (sizeof (*curr), MDL);
2403       if (curr != NULL)
2404         {
2405           length = strlen (tempbv[cnt]->bv_val);
2406           curr->dn = dmalloc (length + 1, MDL);
2407           if (curr->dn == NULL)
2408             {
2409               dfree (curr, MDL);
2410               curr = NULL;
2411             }
2412           else
2413             strcpy (curr->dn, tempbv[cnt]->bv_val);
2414         }
2415 
2416       if (curr != NULL)
2417         {
2418           curr->refs++;
2419 
2420           /* append to service-dn list */
2421           if (ldap_service_dn_tail != NULL)
2422             ldap_service_dn_tail->next = curr;
2423           else
2424             ldap_service_dn_head = curr;
2425 
2426           ldap_service_dn_tail = curr;
2427         }
2428       else
2429         log_fatal ("no memory to remember ldap service dn");
2430 
2431 #if defined (DEBUG_LDAP)
2432       log_info ("LDAP: Parsing dhcpService DN '%s' ...", tempbv[cnt]->bv_val);
2433 #endif
2434       add_to_config_stack (ldres, ent);
2435       res = conf_file_subparse (cfile, root_group, ROOT_GROUP);
2436       if (res != ISC_R_SUCCESS)
2437         {
2438           log_error ("LDAP: cannot parse dhcpService entry '%s'", tempbv[cnt]->bv_val);
2439           break;
2440         }
2441     }
2442 
2443   x_parser_free(&cfile);
2444   ldap_close_debug_fd();
2445 
2446   ldap_memfree (hostdn);
2447   ldap_value_free_len (tempbv);
2448 
2449   if (res != ISC_R_SUCCESS)
2450     {
2451       struct ldap_config_stack *temp_stack;
2452 
2453       while ((curr = ldap_service_dn_head) != NULL)
2454         {
2455           ldap_service_dn_head = curr->next;
2456           dfree (curr->dn, MDL);
2457           dfree (curr, MDL);
2458         }
2459 
2460       ldap_service_dn_tail = NULL;
2461 
2462       while ((temp_stack = ldap_stack) != NULL)
2463         {
2464           ldap_stack = temp_stack->next;
2465           free_stack_entry (temp_stack);
2466         }
2467 
2468       ldap_stop();
2469     }
2470 
2471   /* Unbind from ldap immediately after reading config in static mode. */
2472   if (ldap_method == LDAP_METHOD_STATIC)
2473     ldap_stop();
2474 
2475   return (res);
2476 }
2477 
2478 
2479 /* This function will parse the dhcpOption and dhcpStatements field in the LDAP
2480    entry if it exists. Right now, type will be either HOST_DECL or CLASS_DECL.
2481    If we are parsing a HOST_DECL, this always returns 0. If we are parsing a
2482    CLASS_DECL, this will return what the current lease limit is in LDAP. If
2483    there is no lease limit specified, we return 0 */
2484 
2485 static int
ldap_parse_options(LDAPMessage * ent,struct group * group,int type,struct host_decl * host,struct class ** class)2486 ldap_parse_options (LDAPMessage * ent, struct group *group,
2487                          int type, struct host_decl *host,
2488                          struct class **class)
2489 {
2490   int declaration, lease_limit;
2491   enum dhcp_token token;
2492   struct parse *cfile;
2493   isc_result_t res;
2494   const char *val;
2495 
2496   lease_limit = 0;
2497   cfile = x_parser_init(type == HOST_DECL ? "LDAP-HOST" : "LDAP-SUBCLASS");
2498   if (cfile == NULL)
2499     return (lease_limit);
2500 
2501   /* This block of code will try to find the parent of the host, and
2502      if it is a group object, fetch the options and apply to the host. */
2503   if (type == HOST_DECL)
2504     {
2505       char *hostdn, *basedn, *temp1, *temp2, filter[1024];
2506       LDAPMessage *groupdn, *entry;
2507       int ret;
2508 
2509       hostdn = ldap_get_dn (ld, ent);
2510       if( hostdn != NULL)
2511         {
2512           basedn = NULL;
2513 
2514           temp1 = strchr (hostdn, '=');
2515           if (temp1 != NULL)
2516             temp1 = strchr (++temp1, '=');
2517           if (temp1 != NULL)
2518             temp2 = strchr (++temp1, ',');
2519           else
2520             temp2 = NULL;
2521 
2522           if (temp2 != NULL)
2523             {
2524               struct berval bv_o;
2525 
2526               if (_do_ldap_str2esc_filter_bv(temp1, (temp2 - temp1), &bv_o) == NULL)
2527                 {
2528                   log_error ("Cannot escape ldap filter value %.*s: %m",
2529                               (int)(temp2 - temp1), temp1);
2530                   filter[0] = '\0';
2531                 }
2532               else
2533                 {
2534                   snprintf (filter, sizeof(filter),
2535                             "(&(cn=%s)(objectClass=dhcpGroup))",
2536                             bv_o.bv_val);
2537 
2538                   ber_memfree(bv_o.bv_val);
2539                 }
2540 
2541               basedn = strchr (temp1, ',');
2542               if (basedn != NULL)
2543                 ++basedn;
2544             }
2545 
2546           if (basedn != NULL && *basedn != '\0' && filter[0] != '\0')
2547             {
2548               ret = ldap_search_ext_s (ld, basedn, LDAP_SCOPE_SUBTREE, filter,
2549                                        NULL, 0, NULL, NULL, NULL, 0, &groupdn);
2550               if (ret == LDAP_SUCCESS)
2551                 {
2552                   if ((entry = ldap_first_entry (ld, groupdn)) != NULL)
2553                     {
2554                       res = ldap_parse_entry_options (entry, cfile, &lease_limit);
2555                       if (res != ISC_R_SUCCESS)
2556                         {
2557                           /* reset option buffer discarding any results */
2558                           x_parser_reset(cfile);
2559                           lease_limit = 0;
2560                         }
2561                     }
2562                   ldap_msgfree( groupdn);
2563                 }
2564             }
2565           ldap_memfree( hostdn);
2566         }
2567     }
2568 
2569   res = ldap_parse_entry_options (ent, cfile, &lease_limit);
2570   if (res != ISC_R_SUCCESS)
2571     {
2572       x_parser_free(&cfile);
2573       return (lease_limit);
2574     }
2575 
2576   if (x_parser_length(cfile) == 0)
2577     {
2578       x_parser_free(&cfile);
2579       return (lease_limit);
2580     }
2581 
2582   declaration = 0;
2583   do
2584     {
2585       token = peek_token (&val, NULL, cfile);
2586       if (token == END_OF_FILE)
2587         break;
2588        declaration = parse_statement (cfile, group, type, host, declaration);
2589     } while (1);
2590 
2591   x_parser_free(&cfile);
2592 
2593   return (lease_limit);
2594 }
2595 
2596 
2597 
2598 int
find_haddr_in_ldap(struct host_decl ** hp,int htype,unsigned hlen,const unsigned char * haddr,const char * file,int line)2599 find_haddr_in_ldap (struct host_decl **hp, int htype, unsigned hlen,
2600                     const unsigned char *haddr, const char *file, int line)
2601 {
2602   char buf[128], *type_str;
2603   LDAPMessage * res, *ent;
2604   struct host_decl * host;
2605   isc_result_t status;
2606   ldap_dn_node *curr;
2607   char up_hwaddr[20];
2608   char lo_hwaddr[20];
2609   int ret;
2610   struct berval bv_o[2];
2611 
2612   *hp = NULL;
2613 
2614 
2615   if (ldap_method == LDAP_METHOD_STATIC)
2616     return (0);
2617 
2618   if (ld == NULL)
2619     ldap_start ();
2620   if (ld == NULL)
2621     return (0);
2622 
2623   switch (htype)
2624     {
2625       case HTYPE_ETHER:
2626         type_str = "ethernet";
2627         break;
2628       case HTYPE_IEEE802:
2629         type_str = "token-ring";
2630         break;
2631       case HTYPE_FDDI:
2632         type_str = "fddi";
2633         break;
2634       default:
2635         log_info ("Ignoring unknown type %d", htype);
2636         return (0);
2637     }
2638 
2639   /*
2640   ** FIXME: It is not guaranteed, that the dhcpHWAddress attribute
2641   **        contains _exactly_ "type addr" with one space between!
2642   */
2643   snprintf(lo_hwaddr, sizeof(lo_hwaddr), "%s",
2644            print_hw_addr (htype, hlen, haddr));
2645   x_strxform(up_hwaddr, lo_hwaddr, sizeof(up_hwaddr), toupper);
2646 
2647   if (_do_ldap_str2esc_filter_bv(lo_hwaddr, 0, &bv_o[0]) == NULL)
2648     {
2649       log_error ("Cannot escape ldap filter value %s: %m", lo_hwaddr);
2650       return (0);
2651     }
2652   if (_do_ldap_str2esc_filter_bv(up_hwaddr, 0, &bv_o[1]) == NULL)
2653     {
2654       log_error ("Cannot escape ldap filter value %s: %m", up_hwaddr);
2655       ber_memfree(bv_o[0].bv_val);
2656       return (0);
2657     }
2658 
2659   snprintf (buf, sizeof (buf),
2660             "(&(objectClass=dhcpHost)(|(dhcpHWAddress=%s %s)(dhcpHWAddress=%s %s)))",
2661             type_str, bv_o[0].bv_val, type_str, bv_o[1].bv_val);
2662 
2663   ber_memfree(bv_o[0].bv_val);
2664   ber_memfree(bv_o[1].bv_val);
2665 
2666   res = ent = NULL;
2667   for (curr = ldap_service_dn_head;
2668        curr != NULL && *curr->dn != '\0';
2669        curr = curr->next)
2670     {
2671 #if defined (DEBUG_LDAP)
2672       log_info ("Searching for %s in LDAP tree %s", buf, curr->dn);
2673 #endif
2674       ret = ldap_search_ext_s (ld, curr->dn, LDAP_SCOPE_SUBTREE, buf, NULL, 0,
2675                                NULL, NULL, NULL, 0, &res);
2676 
2677       if(ret == LDAP_SERVER_DOWN)
2678         {
2679           log_info ("LDAP server was down, trying to reconnect...");
2680 
2681           ldap_stop();
2682           ldap_start();
2683           if(ld == NULL)
2684             {
2685               log_info ("LDAP reconnect failed - try again later...");
2686               return (0);
2687             }
2688 
2689           ret = ldap_search_ext_s (ld, curr->dn, LDAP_SCOPE_SUBTREE, buf, NULL,
2690                                    0, NULL, NULL, NULL, 0, &res);
2691         }
2692 
2693       if (ret == LDAP_SUCCESS)
2694         {
2695           ent = ldap_first_entry (ld, res);
2696 #if defined (DEBUG_LDAP)
2697           if (ent == NULL) {
2698             log_info ("No host entry for %s in LDAP tree %s",
2699                       buf, curr->dn);
2700 	  }
2701 #endif
2702           while (ent != NULL) {
2703 #if defined (DEBUG_LDAP)
2704             char *dn = ldap_get_dn (ld, ent);
2705             if (dn != NULL)
2706               {
2707                 log_info ("Found dhcpHWAddress LDAP entry %s", dn);
2708                 ldap_memfree(dn);
2709               }
2710 #endif
2711 
2712             host = (struct host_decl *)0;
2713             status = host_allocate (&host, MDL);
2714             if (status != ISC_R_SUCCESS)
2715               {
2716                 log_fatal ("can't allocate host decl struct: %s",
2717                            isc_result_totext (status));
2718                 ldap_msgfree (res);
2719                 return (0);
2720               }
2721 
2722             host->name = ldap_get_host_name (ent);
2723             if (host->name == NULL)
2724               {
2725                 host_dereference (&host, MDL);
2726                 ldap_msgfree (res);
2727                 return (0);
2728               }
2729 
2730             if (!clone_group (&host->group, root_group, MDL))
2731               {
2732                 log_fatal ("can't clone group for host %s", host->name);
2733                 host_dereference (&host, MDL);
2734                 ldap_msgfree (res);
2735                 return (0);
2736               }
2737 
2738             ldap_parse_options (ent, host->group, HOST_DECL, host, NULL);
2739 
2740             host->n_ipaddr = *hp;
2741             *hp = host;
2742             ent = ldap_next_entry (ld, ent);
2743           }
2744           if(res)
2745             {
2746               ldap_msgfree (res);
2747               res = NULL;
2748             }
2749           return (*hp != NULL);
2750         }
2751       else
2752         {
2753           if(res)
2754             {
2755               ldap_msgfree (res);
2756               res = NULL;
2757             }
2758 
2759           if (ret != LDAP_NO_SUCH_OBJECT && ret != LDAP_SUCCESS)
2760             {
2761               log_error ("Cannot search for %s in LDAP tree %s: %s", buf,
2762                          curr->dn, ldap_err2string (ret));
2763               ldap_stop();
2764               return (0);
2765             }
2766 #if defined (DEBUG_LDAP)
2767           else
2768             {
2769               log_info ("ldap_search_ext_s returned %s when searching for %s in %s",
2770                         ldap_err2string (ret), buf, curr->dn);
2771             }
2772 #endif
2773         }
2774     }
2775 
2776   return (0);
2777 }
2778 
2779 
2780 int
find_subclass_in_ldap(struct class * class,struct class ** newclass,struct data_string * data)2781 find_subclass_in_ldap (struct class *class, struct class **newclass,
2782                        struct data_string *data)
2783 {
2784   LDAPMessage * res, * ent;
2785   int ret, lease_limit;
2786   isc_result_t status;
2787   ldap_dn_node *curr;
2788   char buf[2048];
2789   struct berval bv_class;
2790   struct berval bv_cdata;
2791   char *hex_1;
2792 
2793   if (ldap_method == LDAP_METHOD_STATIC)
2794     return (0);
2795 
2796   if (ld == NULL)
2797     ldap_start ();
2798   if (ld == NULL)
2799     return (0);
2800 
2801   hex_1 = print_hex_1 (data->len, data->data, 1024);
2802   if (*hex_1 == '"')
2803     {
2804       /* result is a quotted not hex string: ldap escape the original string */
2805       if (_do_ldap_str2esc_filter_bv((const char*)data->data, data->len, &bv_cdata) == NULL)
2806         {
2807           log_error ("Cannot escape ldap filter value %s: %m", hex_1);
2808           return (0);
2809         }
2810         hex_1 = NULL;
2811     }
2812   if (_do_ldap_str2esc_filter_bv(class->name, strlen (class->name), &bv_class) == NULL)
2813     {
2814       log_error ("Cannot escape ldap filter value %s: %m", class->name);
2815       if (hex_1 == NULL)
2816         ber_memfree(bv_cdata.bv_val);
2817       return (0);
2818     }
2819 
2820   snprintf (buf, sizeof (buf),
2821             "(&(objectClass=dhcpSubClass)(cn=%s)(dhcpClassData=%s))",
2822             (hex_1 == NULL ? bv_cdata.bv_val : hex_1), bv_class.bv_val);
2823 
2824   if (hex_1 == NULL)
2825     ber_memfree(bv_cdata.bv_val);
2826   ber_memfree(bv_class.bv_val);
2827 
2828 #if defined (DEBUG_LDAP)
2829   log_info ("Searching LDAP for %s", buf);
2830 #endif
2831 
2832   res = ent = NULL;
2833   for (curr = ldap_service_dn_head;
2834        curr != NULL && *curr->dn != '\0';
2835        curr = curr->next)
2836     {
2837 #if defined (DEBUG_LDAP)
2838       log_info ("Searching for %s in LDAP tree %s", buf, curr->dn);
2839 #endif
2840       ret = ldap_search_ext_s (ld, curr->dn, LDAP_SCOPE_SUBTREE, buf, NULL, 0,
2841                                NULL, NULL, NULL, 0, &res);
2842 
2843       if(ret == LDAP_SERVER_DOWN)
2844         {
2845           log_info ("LDAP server was down, trying to reconnect...");
2846 
2847           ldap_stop();
2848           ldap_start();
2849 
2850           if(ld == NULL)
2851             {
2852               log_info ("LDAP reconnect failed - try again later...");
2853               return (0);
2854             }
2855 
2856           ret = ldap_search_ext_s (ld, curr->dn, LDAP_SCOPE_SUBTREE, buf,
2857                                    NULL, 0, NULL, NULL, NULL, 0, &res);
2858         }
2859 
2860       if (ret == LDAP_SUCCESS)
2861         {
2862           if( (ent = ldap_first_entry (ld, res)) != NULL)
2863             break; /* search OK and have entry */
2864 
2865 #if defined (DEBUG_LDAP)
2866           log_info ("No subclass entry for %s in LDAP tree %s",
2867                     buf, curr->dn);
2868 #endif
2869           if(res)
2870             {
2871               ldap_msgfree (res);
2872               res = NULL;
2873             }
2874         }
2875       else
2876         {
2877           if(res)
2878             {
2879               ldap_msgfree (res);
2880               res = NULL;
2881             }
2882 
2883           if (ret != LDAP_NO_SUCH_OBJECT && ret != LDAP_SUCCESS)
2884             {
2885               log_error ("Cannot search for %s in LDAP tree %s: %s", buf,
2886                          curr->dn, ldap_err2string (ret));
2887               ldap_stop();
2888               return (0);
2889             }
2890 #if defined (DEBUG_LDAP)
2891           else
2892             {
2893               log_info ("ldap_search_ext_s returned %s when searching for %s in %s",
2894                         ldap_err2string (ret), buf, curr->dn);
2895             }
2896 #endif
2897         }
2898     }
2899 
2900   if (res && ent)
2901     {
2902 #if defined (DEBUG_LDAP)
2903       char *dn = ldap_get_dn (ld, ent);
2904       if (dn != NULL)
2905         {
2906           log_info ("Found subclass LDAP entry %s", dn);
2907           ldap_memfree(dn);
2908         }
2909 #endif
2910 
2911       status = class_allocate (newclass, MDL);
2912       if (status != ISC_R_SUCCESS)
2913         {
2914           log_error ("Cannot allocate memory for a new class");
2915           ldap_msgfree (res);
2916           return (0);
2917         }
2918 
2919       group_reference (&(*newclass)->group, class->group, MDL);
2920       class_reference (&(*newclass)->superclass, class, MDL);
2921       lease_limit = ldap_parse_options (ent, (*newclass)->group,
2922                                         CLASS_DECL, NULL, newclass);
2923       if (lease_limit == 0)
2924         (*newclass)->lease_limit = class->lease_limit;
2925       else
2926         class->lease_limit = lease_limit;
2927 
2928       if ((*newclass)->lease_limit)
2929         {
2930           (*newclass)->billed_leases =
2931               dmalloc ((*newclass)->lease_limit * sizeof (struct lease *), MDL);
2932           if (!(*newclass)->billed_leases)
2933             {
2934               log_error ("no memory for billing");
2935               class_dereference (newclass, MDL);
2936               ldap_msgfree (res);
2937               return (0);
2938             }
2939           memset ((*newclass)->billed_leases, 0,
2940 		  ((*newclass)->lease_limit * sizeof (struct lease *)));
2941         }
2942 
2943       data_string_copy (&(*newclass)->hash_string, data, MDL);
2944 
2945       ldap_msgfree (res);
2946       return (1);
2947     }
2948 
2949   if(res) ldap_msgfree (res);
2950   return (0);
2951 }
2952 
find_client_in_ldap(struct host_decl ** hp,struct packet * packet,struct option_state * state,const char * file,int line)2953 int find_client_in_ldap (struct host_decl **hp, struct packet *packet,
2954                          struct option_state *state, const char *file, int line)
2955 {
2956   LDAPMessage * res, * ent;
2957   ldap_dn_node *curr;
2958   struct host_decl * host;
2959   isc_result_t status;
2960   struct data_string client_id;
2961   char buf[1024], buf1[1024];
2962   int ret;
2963 
2964   if (ldap_method == LDAP_METHOD_STATIC)
2965     return (0);
2966 
2967   if (ld == NULL)
2968     ldap_start ();
2969   if (ld == NULL)
2970     return (0);
2971 
2972   memset(&client_id, 0, sizeof(client_id));
2973   if (get_client_id(packet, &client_id) != ISC_R_SUCCESS)
2974     return (0);
2975   snprintf(buf, sizeof(buf),
2976            "(&(objectClass=dhcpHost)(dhcpClientId=%s))",
2977            print_hw_addr(0, client_id.len, client_id.data));
2978 
2979   /* log_info ("Searching LDAP for %s (%s)", buf, packet->interface->shared_network->name); */
2980 
2981   res = ent = NULL;
2982   for (curr = ldap_service_dn_head;
2983        curr != NULL && *curr->dn != '\0';
2984        curr = curr->next)
2985     {
2986       snprintf(buf1, sizeof(buf1), "cn=%s,%s", packet->interface->shared_network->name, curr->dn);
2987 #if defined (DEBUG_LDAP)
2988       log_info ("Searching for %s in LDAP tree %s", buf, buf1);
2989 #endif
2990       ret = ldap_search_ext_s (ld, buf1, LDAP_SCOPE_SUBTREE, buf, NULL, 0,
2991                                NULL, NULL, NULL, 0, &res);
2992 
2993       if(ret == LDAP_SERVER_DOWN)
2994         {
2995           log_info ("LDAP server was down, trying to reconnect...");
2996 
2997           ldap_stop();
2998           ldap_start();
2999 
3000           if(ld == NULL)
3001             {
3002               log_info ("LDAP reconnect failed - try again later...");
3003               return (0);
3004             }
3005 
3006           ret = ldap_search_ext_s (ld, buf1, LDAP_SCOPE_SUBTREE, buf,
3007                                    NULL, 0, NULL, NULL, NULL, 0, &res);
3008         }
3009 
3010       if (ret == LDAP_SUCCESS)
3011         {
3012           if( (ent = ldap_first_entry (ld, res)) != NULL) {
3013             log_info ("found entry in search %s", buf1);
3014             break; /* search OK and have entry */
3015         }
3016 
3017 #if defined (DEBUG_LDAP)
3018           log_info ("No subclass entry for %s in LDAP tree %s", buf, curr->dn);
3019 #endif
3020           if(res)
3021             {
3022               ldap_msgfree (res);
3023               res = NULL;
3024             }
3025         }
3026       else
3027         {
3028           if(res)
3029             {
3030               ldap_msgfree (res);
3031               res = NULL;
3032             }
3033 
3034           if (ret != LDAP_NO_SUCH_OBJECT && ret != LDAP_SUCCESS)
3035             {
3036               log_error ("Cannot search for %s in LDAP tree %s: %s", buf,
3037                          curr->dn, ldap_err2string (ret));
3038               ldap_stop();
3039               return (0);
3040             }
3041           else
3042             {
3043               log_info ("did not find: %s", buf);
3044             }
3045         }
3046     }
3047 
3048   if (res && ent)
3049     {
3050 #if defined (DEBUG_LDAP)
3051       log_info ("ldap_get_dn %s", curr->dn);
3052       char *dn = ldap_get_dn (ld, ent);
3053       if (dn != NULL)
3054         {
3055           log_info ("Found subclass LDAP entry %s", dn);
3056           ldap_memfree(dn);
3057         } else {
3058           log_info ("DN is null %s", dn);
3059         }
3060 #endif
3061 
3062       host = (struct host_decl *)0;
3063       status = host_allocate (&host, MDL);
3064       if (status != ISC_R_SUCCESS)
3065         {
3066           log_fatal ("can't allocate host decl struct: %s",
3067                      isc_result_totext (status));
3068           ldap_msgfree (res);
3069           return (0);
3070         }
3071 
3072       host->name = ldap_get_host_name (ent);
3073       if (host->name == NULL)
3074         {
3075           host_dereference (&host, MDL);
3076           ldap_msgfree (res);
3077           return (0);
3078         }
3079       /* log_info ("Host name %s", host->name); */
3080 
3081       if (!clone_group (&host->group, root_group, MDL))
3082         {
3083           log_fatal ("can't clone group for host %s", host->name);
3084           host_dereference (&host, MDL);
3085           ldap_msgfree (res);
3086           return (0);
3087         }
3088 
3089       ldap_parse_options (ent, host->group, HOST_DECL, host, NULL);
3090 
3091       *hp = host;
3092       ldap_msgfree (res);
3093       return (1);
3094     }
3095     else
3096     {
3097        log_info ("did not find clientid: %s", buf);
3098     }
3099 
3100   if(res) ldap_msgfree (res);
3101   return (0);
3102 
3103 }
3104 
3105 #if defined(LDAP_USE_GSSAPI)
3106 static int
_ldap_sasl_interact(LDAP * ld,unsigned flags,void * defaults,void * sin)3107 _ldap_sasl_interact(LDAP *ld, unsigned flags, void *defaults, void *sin)
3108 {
3109   sasl_interact_t *in;
3110   struct ldap_sasl_instance *ldap_inst = defaults;
3111   int ret = LDAP_OTHER;
3112   size_t size;
3113 
3114   if (ld == NULL || sin == NULL)
3115     return LDAP_PARAM_ERROR;
3116 
3117   log_info("doing interactive bind");
3118   for (in = sin; in != NULL && in->id != SASL_CB_LIST_END; in++) {
3119     switch (in->id) {
3120       case SASL_CB_USER:
3121         log_info("got request for SASL_CB_USER %s", ldap_inst->sasl_authz_id);
3122         size = strlen(ldap_inst->sasl_authz_id);
3123         in->result = ldap_inst->sasl_authz_id;
3124         in->len = size;
3125         ret = LDAP_SUCCESS;
3126         break;
3127       case SASL_CB_GETREALM:
3128         log_info("got request for SASL_CB_GETREALM %s", ldap_inst->sasl_realm);
3129         size = strlen(ldap_inst->sasl_realm);
3130         in->result = ldap_inst->sasl_realm;
3131         in->len = size;
3132         ret = LDAP_SUCCESS;
3133         break;
3134       case SASL_CB_AUTHNAME:
3135         log_info("got request for SASL_CB_AUTHNAME %s", ldap_inst->sasl_authc_id);
3136         size = strlen(ldap_inst->sasl_authc_id);
3137         in->result = ldap_inst->sasl_authc_id;
3138         in->len = size;
3139         ret = LDAP_SUCCESS;
3140         break;
3141       case SASL_CB_PASS:
3142         log_info("got request for SASL_CB_PASS %s", ldap_inst->sasl_password);
3143         size = strlen(ldap_inst->sasl_password);
3144         in->result = ldap_inst->sasl_password;
3145         in->len = size;
3146         ret = LDAP_SUCCESS;
3147         break;
3148       default:
3149         goto cleanup;
3150     }
3151   }
3152   return ret;
3153 
3154 cleanup:
3155   in->result = NULL;
3156   in->len = 0;
3157   return LDAP_OTHER;
3158 }
3159 #endif /* LDAP_USE_GSSAPI */
3160 
3161 
3162 #endif
3163