xref: /netbsd-src/crypto/external/bsd/heimdal/dist/lib/kadm5/acl.c (revision d3273b5b76f5afaafe308cead5511dbb8df8c5e9)
1*d3273b5bSchristos /*	$NetBSD: acl.c,v 1.2 2017/01/28 21:31:49 christos Exp $	*/
2ca1c9b0cSelric 
3ca1c9b0cSelric /*
4ca1c9b0cSelric  * Copyright (c) 1997 - 2001 Kungliga Tekniska Högskolan
5ca1c9b0cSelric  * (Royal Institute of Technology, Stockholm, Sweden).
6ca1c9b0cSelric  * All rights reserved.
7ca1c9b0cSelric  *
8ca1c9b0cSelric  * Redistribution and use in source and binary forms, with or without
9ca1c9b0cSelric  * modification, are permitted provided that the following conditions
10ca1c9b0cSelric  * are met:
11ca1c9b0cSelric  *
12ca1c9b0cSelric  * 1. Redistributions of source code must retain the above copyright
13ca1c9b0cSelric  *    notice, this list of conditions and the following disclaimer.
14ca1c9b0cSelric  *
15ca1c9b0cSelric  * 2. Redistributions in binary form must reproduce the above copyright
16ca1c9b0cSelric  *    notice, this list of conditions and the following disclaimer in the
17ca1c9b0cSelric  *    documentation and/or other materials provided with the distribution.
18ca1c9b0cSelric  *
19ca1c9b0cSelric  * 3. Neither the name of the Institute nor the names of its contributors
20ca1c9b0cSelric  *    may be used to endorse or promote products derived from this software
21ca1c9b0cSelric  *    without specific prior written permission.
22ca1c9b0cSelric  *
23ca1c9b0cSelric  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24ca1c9b0cSelric  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25ca1c9b0cSelric  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26ca1c9b0cSelric  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27ca1c9b0cSelric  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28ca1c9b0cSelric  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29ca1c9b0cSelric  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30ca1c9b0cSelric  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31ca1c9b0cSelric  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32ca1c9b0cSelric  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33ca1c9b0cSelric  * SUCH DAMAGE.
34ca1c9b0cSelric  */
35ca1c9b0cSelric 
36ca1c9b0cSelric #include "kadm5_locl.h"
37ca1c9b0cSelric 
38*d3273b5bSchristos __RCSID("$NetBSD: acl.c,v 1.2 2017/01/28 21:31:49 christos Exp $");
39ca1c9b0cSelric 
40ca1c9b0cSelric static struct units acl_units[] = {
41ca1c9b0cSelric     { "all",		KADM5_PRIV_ALL },
42ca1c9b0cSelric     { "change-password",KADM5_PRIV_CPW },
43ca1c9b0cSelric     { "cpw",		KADM5_PRIV_CPW },
44ca1c9b0cSelric     { "list",		KADM5_PRIV_LIST },
45ca1c9b0cSelric     { "delete",		KADM5_PRIV_DELETE },
46ca1c9b0cSelric     { "modify",		KADM5_PRIV_MODIFY },
47ca1c9b0cSelric     { "add",		KADM5_PRIV_ADD },
48ca1c9b0cSelric     { "get", 		KADM5_PRIV_GET },
49b9d004c6Schristos     { "get-keys",	KADM5_PRIV_GET_KEYS },
504f77a458Spettai     { NULL,		0 }
51ca1c9b0cSelric };
52ca1c9b0cSelric 
53ca1c9b0cSelric kadm5_ret_t
_kadm5_string_to_privs(const char * s,uint32_t * privs)54ca1c9b0cSelric _kadm5_string_to_privs(const char *s, uint32_t* privs)
55ca1c9b0cSelric {
56ca1c9b0cSelric     int flags;
57ca1c9b0cSelric     flags = parse_flags(s, acl_units, 0);
58ca1c9b0cSelric     if(flags < 0)
59ca1c9b0cSelric 	return KADM5_FAILURE;
60ca1c9b0cSelric     *privs = flags;
61ca1c9b0cSelric     return 0;
62ca1c9b0cSelric }
63ca1c9b0cSelric 
64ca1c9b0cSelric kadm5_ret_t
_kadm5_privs_to_string(uint32_t privs,char * string,size_t len)65ca1c9b0cSelric _kadm5_privs_to_string(uint32_t privs, char *string, size_t len)
66ca1c9b0cSelric {
67ca1c9b0cSelric     if(privs == 0)
68ca1c9b0cSelric 	strlcpy(string, "none", len);
69ca1c9b0cSelric     else
70ca1c9b0cSelric 	unparse_flags(privs, acl_units + 1, string, len);
71ca1c9b0cSelric     return 0;
72ca1c9b0cSelric }
73ca1c9b0cSelric 
74ca1c9b0cSelric /*
75ca1c9b0cSelric  * retrieve the right for the current caller on `princ' (NULL means all)
76ca1c9b0cSelric  * and store them in `ret_flags'
77ca1c9b0cSelric  * return 0 or an error.
78ca1c9b0cSelric  */
79ca1c9b0cSelric 
80ca1c9b0cSelric static kadm5_ret_t
fetch_acl(kadm5_server_context * context,krb5_const_principal princ,unsigned * ret_flags)81ca1c9b0cSelric fetch_acl (kadm5_server_context *context,
82ca1c9b0cSelric 	   krb5_const_principal princ,
83ca1c9b0cSelric 	   unsigned *ret_flags)
84ca1c9b0cSelric {
85ca1c9b0cSelric     FILE *f;
86ca1c9b0cSelric     krb5_error_code ret = 0;
87ca1c9b0cSelric     char buf[256];
88ca1c9b0cSelric 
89ca1c9b0cSelric     *ret_flags = 0;
90ca1c9b0cSelric 
91ca1c9b0cSelric     /* no acl file -> no rights */
92ca1c9b0cSelric     f = fopen(context->config.acl_file, "r");
93ca1c9b0cSelric     if (f == NULL)
94ca1c9b0cSelric 	return 0;
95ca1c9b0cSelric 
96ca1c9b0cSelric     while(fgets(buf, sizeof(buf), f) != NULL) {
97ca1c9b0cSelric 	char *foo = NULL, *p;
98ca1c9b0cSelric 	krb5_principal this_princ;
99ca1c9b0cSelric 	unsigned flags = 0;
100ca1c9b0cSelric 
101ca1c9b0cSelric 	p = strtok_r(buf, " \t\n", &foo);
102ca1c9b0cSelric 	if(p == NULL)
103ca1c9b0cSelric 	    continue;
104ca1c9b0cSelric 	if (*p == '#')		/* comment */
105ca1c9b0cSelric 	    continue;
106ca1c9b0cSelric 	ret = krb5_parse_name(context->context, p, &this_princ);
107ca1c9b0cSelric 	if(ret)
108ca1c9b0cSelric 	    break;
109ca1c9b0cSelric 	if(!krb5_principal_compare(context->context,
110ca1c9b0cSelric 				   context->caller, this_princ)) {
111ca1c9b0cSelric 	    krb5_free_principal(context->context, this_princ);
112ca1c9b0cSelric 	    continue;
113ca1c9b0cSelric 	}
114ca1c9b0cSelric 	krb5_free_principal(context->context, this_princ);
115ca1c9b0cSelric 	p = strtok_r(NULL, " \t\n", &foo);
116ca1c9b0cSelric 	if(p == NULL)
117ca1c9b0cSelric 	    continue;
118ca1c9b0cSelric 	ret = _kadm5_string_to_privs(p, &flags);
119ca1c9b0cSelric 	if (ret)
120ca1c9b0cSelric 	    break;
121ca1c9b0cSelric 	p = strtok_r(NULL, " \t\n", &foo);
122ca1c9b0cSelric 	if (p == NULL) {
123ca1c9b0cSelric 	    *ret_flags = flags;
124ca1c9b0cSelric 	    break;
125ca1c9b0cSelric 	}
126ca1c9b0cSelric 	if (princ != NULL) {
127ca1c9b0cSelric 	    krb5_principal pattern_princ;
128ca1c9b0cSelric 	    krb5_boolean match;
129ca1c9b0cSelric 
130ca1c9b0cSelric 	    ret = krb5_parse_name (context->context, p, &pattern_princ);
131ca1c9b0cSelric 	    if (ret)
132ca1c9b0cSelric 		break;
133ca1c9b0cSelric 	    match = krb5_principal_match (context->context,
134ca1c9b0cSelric 					  princ, pattern_princ);
135ca1c9b0cSelric 	    krb5_free_principal (context->context, pattern_princ);
136ca1c9b0cSelric 	    if (match) {
137ca1c9b0cSelric 		*ret_flags = flags;
138ca1c9b0cSelric 		break;
139ca1c9b0cSelric 	    }
140ca1c9b0cSelric 	}
141ca1c9b0cSelric     }
142ca1c9b0cSelric     fclose(f);
143ca1c9b0cSelric     return ret;
144ca1c9b0cSelric }
145ca1c9b0cSelric 
146ca1c9b0cSelric /*
147ca1c9b0cSelric  * set global acl flags in `context' for the current caller.
148ca1c9b0cSelric  * return 0 on success or an error
149ca1c9b0cSelric  */
150ca1c9b0cSelric 
151ca1c9b0cSelric kadm5_ret_t
_kadm5_acl_init(kadm5_server_context * context)152ca1c9b0cSelric _kadm5_acl_init(kadm5_server_context *context)
153ca1c9b0cSelric {
154ca1c9b0cSelric     krb5_principal princ;
155ca1c9b0cSelric     krb5_error_code ret;
156ca1c9b0cSelric 
157ca1c9b0cSelric     ret = krb5_parse_name(context->context, KADM5_ADMIN_SERVICE, &princ);
158ca1c9b0cSelric     if (ret)
159ca1c9b0cSelric 	return ret;
160ca1c9b0cSelric     ret = krb5_principal_compare(context->context, context->caller, princ);
161ca1c9b0cSelric     krb5_free_principal(context->context, princ);
162ca1c9b0cSelric     if(ret != 0) {
163ca1c9b0cSelric 	context->acl_flags = KADM5_PRIV_ALL;
164ca1c9b0cSelric 	return 0;
165ca1c9b0cSelric     }
166ca1c9b0cSelric 
167ca1c9b0cSelric     return fetch_acl (context, NULL, &context->acl_flags);
168ca1c9b0cSelric }
169ca1c9b0cSelric 
170ca1c9b0cSelric /*
171ca1c9b0cSelric  * check if `flags' allows `op'
172ca1c9b0cSelric  * return 0 if OK or an error
173ca1c9b0cSelric  */
174ca1c9b0cSelric 
175ca1c9b0cSelric static kadm5_ret_t
check_flags(unsigned op,unsigned flags)176ca1c9b0cSelric check_flags (unsigned op,
177ca1c9b0cSelric 	     unsigned flags)
178ca1c9b0cSelric {
179ca1c9b0cSelric     unsigned res = ~flags & op;
180ca1c9b0cSelric 
181ca1c9b0cSelric     if(res & KADM5_PRIV_GET)
182ca1c9b0cSelric 	return KADM5_AUTH_GET;
183b9d004c6Schristos     if(res & KADM5_PRIV_GET_KEYS)
184b9d004c6Schristos 	return KADM5_AUTH_GET_KEYS;
185ca1c9b0cSelric     if(res & KADM5_PRIV_ADD)
186ca1c9b0cSelric 	return KADM5_AUTH_ADD;
187ca1c9b0cSelric     if(res & KADM5_PRIV_MODIFY)
188ca1c9b0cSelric 	return KADM5_AUTH_MODIFY;
189ca1c9b0cSelric     if(res & KADM5_PRIV_DELETE)
190ca1c9b0cSelric 	return KADM5_AUTH_DELETE;
191ca1c9b0cSelric     if(res & KADM5_PRIV_CPW)
192ca1c9b0cSelric 	return KADM5_AUTH_CHANGEPW;
193ca1c9b0cSelric     if(res & KADM5_PRIV_LIST)
194ca1c9b0cSelric 	return KADM5_AUTH_LIST;
195ca1c9b0cSelric     if(res)
196ca1c9b0cSelric 	return KADM5_AUTH_INSUFFICIENT;
197ca1c9b0cSelric     return 0;
198ca1c9b0cSelric }
199ca1c9b0cSelric 
200ca1c9b0cSelric /*
201ca1c9b0cSelric  * return 0 if the current caller in `context' is allowed to perform
202ca1c9b0cSelric  * `op' on `princ' and otherwise an error
203ca1c9b0cSelric  * princ == NULL if it's not relevant.
204ca1c9b0cSelric  */
205ca1c9b0cSelric 
206ca1c9b0cSelric kadm5_ret_t
_kadm5_acl_check_permission(kadm5_server_context * context,unsigned op,krb5_const_principal princ)207ca1c9b0cSelric _kadm5_acl_check_permission(kadm5_server_context *context,
208ca1c9b0cSelric 			    unsigned op,
209ca1c9b0cSelric 			    krb5_const_principal princ)
210ca1c9b0cSelric {
211ca1c9b0cSelric     kadm5_ret_t ret;
212ca1c9b0cSelric     unsigned princ_flags;
213ca1c9b0cSelric 
214ca1c9b0cSelric     ret = check_flags (op, context->acl_flags);
215ca1c9b0cSelric     if (ret == 0)
216ca1c9b0cSelric 	return ret;
217ca1c9b0cSelric     ret = fetch_acl (context, princ, &princ_flags);
218ca1c9b0cSelric     if (ret)
219ca1c9b0cSelric 	return ret;
220ca1c9b0cSelric     return check_flags (op, princ_flags);
221ca1c9b0cSelric }
222