1*d3273b5bSchristos /* $NetBSD: acl.c,v 1.2 2017/01/28 21:31:49 christos Exp $ */
2ca1c9b0cSelric
3ca1c9b0cSelric /*
4ca1c9b0cSelric * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan
5ca1c9b0cSelric * (Royal Institute of Technology, Stockholm, Sweden).
6ca1c9b0cSelric * All rights reserved.
7ca1c9b0cSelric *
8ca1c9b0cSelric * Redistribution and use in source and binary forms, with or without
9ca1c9b0cSelric * modification, are permitted provided that the following conditions
10ca1c9b0cSelric * are met:
11ca1c9b0cSelric *
12ca1c9b0cSelric * 1. Redistributions of source code must retain the above copyright
13ca1c9b0cSelric * notice, this list of conditions and the following disclaimer.
14ca1c9b0cSelric *
15ca1c9b0cSelric * 2. Redistributions in binary form must reproduce the above copyright
16ca1c9b0cSelric * notice, this list of conditions and the following disclaimer in the
17ca1c9b0cSelric * documentation and/or other materials provided with the distribution.
18ca1c9b0cSelric *
19ca1c9b0cSelric * 3. Neither the name of the Institute nor the names of its contributors
20ca1c9b0cSelric * may be used to endorse or promote products derived from this software
21ca1c9b0cSelric * without specific prior written permission.
22ca1c9b0cSelric *
23ca1c9b0cSelric * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24ca1c9b0cSelric * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25ca1c9b0cSelric * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26ca1c9b0cSelric * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27ca1c9b0cSelric * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28ca1c9b0cSelric * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29ca1c9b0cSelric * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30ca1c9b0cSelric * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31ca1c9b0cSelric * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32ca1c9b0cSelric * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33ca1c9b0cSelric * SUCH DAMAGE.
34ca1c9b0cSelric */
35ca1c9b0cSelric
36ca1c9b0cSelric #include "kadm5_locl.h"
37ca1c9b0cSelric
38*d3273b5bSchristos __RCSID("$NetBSD: acl.c,v 1.2 2017/01/28 21:31:49 christos Exp $");
39ca1c9b0cSelric
40ca1c9b0cSelric static struct units acl_units[] = {
41ca1c9b0cSelric { "all", KADM5_PRIV_ALL },
42ca1c9b0cSelric { "change-password",KADM5_PRIV_CPW },
43ca1c9b0cSelric { "cpw", KADM5_PRIV_CPW },
44ca1c9b0cSelric { "list", KADM5_PRIV_LIST },
45ca1c9b0cSelric { "delete", KADM5_PRIV_DELETE },
46ca1c9b0cSelric { "modify", KADM5_PRIV_MODIFY },
47ca1c9b0cSelric { "add", KADM5_PRIV_ADD },
48ca1c9b0cSelric { "get", KADM5_PRIV_GET },
49b9d004c6Schristos { "get-keys", KADM5_PRIV_GET_KEYS },
504f77a458Spettai { NULL, 0 }
51ca1c9b0cSelric };
52ca1c9b0cSelric
53ca1c9b0cSelric kadm5_ret_t
_kadm5_string_to_privs(const char * s,uint32_t * privs)54ca1c9b0cSelric _kadm5_string_to_privs(const char *s, uint32_t* privs)
55ca1c9b0cSelric {
56ca1c9b0cSelric int flags;
57ca1c9b0cSelric flags = parse_flags(s, acl_units, 0);
58ca1c9b0cSelric if(flags < 0)
59ca1c9b0cSelric return KADM5_FAILURE;
60ca1c9b0cSelric *privs = flags;
61ca1c9b0cSelric return 0;
62ca1c9b0cSelric }
63ca1c9b0cSelric
64ca1c9b0cSelric kadm5_ret_t
_kadm5_privs_to_string(uint32_t privs,char * string,size_t len)65ca1c9b0cSelric _kadm5_privs_to_string(uint32_t privs, char *string, size_t len)
66ca1c9b0cSelric {
67ca1c9b0cSelric if(privs == 0)
68ca1c9b0cSelric strlcpy(string, "none", len);
69ca1c9b0cSelric else
70ca1c9b0cSelric unparse_flags(privs, acl_units + 1, string, len);
71ca1c9b0cSelric return 0;
72ca1c9b0cSelric }
73ca1c9b0cSelric
74ca1c9b0cSelric /*
75ca1c9b0cSelric * retrieve the right for the current caller on `princ' (NULL means all)
76ca1c9b0cSelric * and store them in `ret_flags'
77ca1c9b0cSelric * return 0 or an error.
78ca1c9b0cSelric */
79ca1c9b0cSelric
80ca1c9b0cSelric static kadm5_ret_t
fetch_acl(kadm5_server_context * context,krb5_const_principal princ,unsigned * ret_flags)81ca1c9b0cSelric fetch_acl (kadm5_server_context *context,
82ca1c9b0cSelric krb5_const_principal princ,
83ca1c9b0cSelric unsigned *ret_flags)
84ca1c9b0cSelric {
85ca1c9b0cSelric FILE *f;
86ca1c9b0cSelric krb5_error_code ret = 0;
87ca1c9b0cSelric char buf[256];
88ca1c9b0cSelric
89ca1c9b0cSelric *ret_flags = 0;
90ca1c9b0cSelric
91ca1c9b0cSelric /* no acl file -> no rights */
92ca1c9b0cSelric f = fopen(context->config.acl_file, "r");
93ca1c9b0cSelric if (f == NULL)
94ca1c9b0cSelric return 0;
95ca1c9b0cSelric
96ca1c9b0cSelric while(fgets(buf, sizeof(buf), f) != NULL) {
97ca1c9b0cSelric char *foo = NULL, *p;
98ca1c9b0cSelric krb5_principal this_princ;
99ca1c9b0cSelric unsigned flags = 0;
100ca1c9b0cSelric
101ca1c9b0cSelric p = strtok_r(buf, " \t\n", &foo);
102ca1c9b0cSelric if(p == NULL)
103ca1c9b0cSelric continue;
104ca1c9b0cSelric if (*p == '#') /* comment */
105ca1c9b0cSelric continue;
106ca1c9b0cSelric ret = krb5_parse_name(context->context, p, &this_princ);
107ca1c9b0cSelric if(ret)
108ca1c9b0cSelric break;
109ca1c9b0cSelric if(!krb5_principal_compare(context->context,
110ca1c9b0cSelric context->caller, this_princ)) {
111ca1c9b0cSelric krb5_free_principal(context->context, this_princ);
112ca1c9b0cSelric continue;
113ca1c9b0cSelric }
114ca1c9b0cSelric krb5_free_principal(context->context, this_princ);
115ca1c9b0cSelric p = strtok_r(NULL, " \t\n", &foo);
116ca1c9b0cSelric if(p == NULL)
117ca1c9b0cSelric continue;
118ca1c9b0cSelric ret = _kadm5_string_to_privs(p, &flags);
119ca1c9b0cSelric if (ret)
120ca1c9b0cSelric break;
121ca1c9b0cSelric p = strtok_r(NULL, " \t\n", &foo);
122ca1c9b0cSelric if (p == NULL) {
123ca1c9b0cSelric *ret_flags = flags;
124ca1c9b0cSelric break;
125ca1c9b0cSelric }
126ca1c9b0cSelric if (princ != NULL) {
127ca1c9b0cSelric krb5_principal pattern_princ;
128ca1c9b0cSelric krb5_boolean match;
129ca1c9b0cSelric
130ca1c9b0cSelric ret = krb5_parse_name (context->context, p, &pattern_princ);
131ca1c9b0cSelric if (ret)
132ca1c9b0cSelric break;
133ca1c9b0cSelric match = krb5_principal_match (context->context,
134ca1c9b0cSelric princ, pattern_princ);
135ca1c9b0cSelric krb5_free_principal (context->context, pattern_princ);
136ca1c9b0cSelric if (match) {
137ca1c9b0cSelric *ret_flags = flags;
138ca1c9b0cSelric break;
139ca1c9b0cSelric }
140ca1c9b0cSelric }
141ca1c9b0cSelric }
142ca1c9b0cSelric fclose(f);
143ca1c9b0cSelric return ret;
144ca1c9b0cSelric }
145ca1c9b0cSelric
146ca1c9b0cSelric /*
147ca1c9b0cSelric * set global acl flags in `context' for the current caller.
148ca1c9b0cSelric * return 0 on success or an error
149ca1c9b0cSelric */
150ca1c9b0cSelric
151ca1c9b0cSelric kadm5_ret_t
_kadm5_acl_init(kadm5_server_context * context)152ca1c9b0cSelric _kadm5_acl_init(kadm5_server_context *context)
153ca1c9b0cSelric {
154ca1c9b0cSelric krb5_principal princ;
155ca1c9b0cSelric krb5_error_code ret;
156ca1c9b0cSelric
157ca1c9b0cSelric ret = krb5_parse_name(context->context, KADM5_ADMIN_SERVICE, &princ);
158ca1c9b0cSelric if (ret)
159ca1c9b0cSelric return ret;
160ca1c9b0cSelric ret = krb5_principal_compare(context->context, context->caller, princ);
161ca1c9b0cSelric krb5_free_principal(context->context, princ);
162ca1c9b0cSelric if(ret != 0) {
163ca1c9b0cSelric context->acl_flags = KADM5_PRIV_ALL;
164ca1c9b0cSelric return 0;
165ca1c9b0cSelric }
166ca1c9b0cSelric
167ca1c9b0cSelric return fetch_acl (context, NULL, &context->acl_flags);
168ca1c9b0cSelric }
169ca1c9b0cSelric
170ca1c9b0cSelric /*
171ca1c9b0cSelric * check if `flags' allows `op'
172ca1c9b0cSelric * return 0 if OK or an error
173ca1c9b0cSelric */
174ca1c9b0cSelric
175ca1c9b0cSelric static kadm5_ret_t
check_flags(unsigned op,unsigned flags)176ca1c9b0cSelric check_flags (unsigned op,
177ca1c9b0cSelric unsigned flags)
178ca1c9b0cSelric {
179ca1c9b0cSelric unsigned res = ~flags & op;
180ca1c9b0cSelric
181ca1c9b0cSelric if(res & KADM5_PRIV_GET)
182ca1c9b0cSelric return KADM5_AUTH_GET;
183b9d004c6Schristos if(res & KADM5_PRIV_GET_KEYS)
184b9d004c6Schristos return KADM5_AUTH_GET_KEYS;
185ca1c9b0cSelric if(res & KADM5_PRIV_ADD)
186ca1c9b0cSelric return KADM5_AUTH_ADD;
187ca1c9b0cSelric if(res & KADM5_PRIV_MODIFY)
188ca1c9b0cSelric return KADM5_AUTH_MODIFY;
189ca1c9b0cSelric if(res & KADM5_PRIV_DELETE)
190ca1c9b0cSelric return KADM5_AUTH_DELETE;
191ca1c9b0cSelric if(res & KADM5_PRIV_CPW)
192ca1c9b0cSelric return KADM5_AUTH_CHANGEPW;
193ca1c9b0cSelric if(res & KADM5_PRIV_LIST)
194ca1c9b0cSelric return KADM5_AUTH_LIST;
195ca1c9b0cSelric if(res)
196ca1c9b0cSelric return KADM5_AUTH_INSUFFICIENT;
197ca1c9b0cSelric return 0;
198ca1c9b0cSelric }
199ca1c9b0cSelric
200ca1c9b0cSelric /*
201ca1c9b0cSelric * return 0 if the current caller in `context' is allowed to perform
202ca1c9b0cSelric * `op' on `princ' and otherwise an error
203ca1c9b0cSelric * princ == NULL if it's not relevant.
204ca1c9b0cSelric */
205ca1c9b0cSelric
206ca1c9b0cSelric kadm5_ret_t
_kadm5_acl_check_permission(kadm5_server_context * context,unsigned op,krb5_const_principal princ)207ca1c9b0cSelric _kadm5_acl_check_permission(kadm5_server_context *context,
208ca1c9b0cSelric unsigned op,
209ca1c9b0cSelric krb5_const_principal princ)
210ca1c9b0cSelric {
211ca1c9b0cSelric kadm5_ret_t ret;
212ca1c9b0cSelric unsigned princ_flags;
213ca1c9b0cSelric
214ca1c9b0cSelric ret = check_flags (op, context->acl_flags);
215ca1c9b0cSelric if (ret == 0)
216ca1c9b0cSelric return ret;
217ca1c9b0cSelric ret = fetch_acl (context, princ, &princ_flags);
218ca1c9b0cSelric if (ret)
219ca1c9b0cSelric return ret;
220ca1c9b0cSelric return check_flags (op, princ_flags);
221ca1c9b0cSelric }
222