2
0
mirror of https://gitlab.isc.org/isc-projects/bind9 synced 2025-08-28 21:17:54 +00:00

3000. [bug] More TKEY/GSS fixes:

- nsupdate can now get the default realm from
			   the user's Kerberos principal
			 - corrected gsstest compilation flags
			 - improved documentation
			 - fixed some NULL dereferences
			[RT #22795]
This commit is contained in:
Evan Hunt 2010-12-24 02:20:47 +00:00
parent 988e9fd7c0
commit d9ad0a55bb
8 changed files with 86 additions and 99 deletions

View File

@ -1,3 +1,11 @@
3000. [bug] More TKEY/GSS fixes:
- nsupdate can now get the default realm from
the user's Kerberos principal
- corrected gsstest compilation flags
- improved documentation
- fixed some NULL dereferences
[RT #22795]
2999. [func] Add GOST support (RFC 5933). [RT #20639] 2999. [func] Add GOST support (RFC 5933). [RT #20639]
2998. [func] Add isc_task_beginexclusive and isc_task_endexclusive 2998. [func] Add isc_task_beginexclusive and isc_task_endexclusive

View File

@ -15,7 +15,7 @@
* PERFORMANCE OF THIS SOFTWARE. * PERFORMANCE OF THIS SOFTWARE.
*/ */
/* $Id: query.c,v 1.349 2010/12/16 09:51:27 jinmei Exp $ */ /* $Id: query.c,v 1.350 2010/12/24 02:20:47 each Exp $ */
/*! \file */ /*! \file */
@ -4342,7 +4342,7 @@ query_find(ns_client_t *client, dns_fetchevent_t *event, dns_rdatatype_t qtype)
} }
is_staticstub_zone = ISC_FALSE; is_staticstub_zone = ISC_FALSE;
if (is_zone) { if (is_zone && zone != NULL) {
authoritative = ISC_TRUE; authoritative = ISC_TRUE;
if (dns_zone_gettype(zone) == dns_zone_staticstub) if (dns_zone_gettype(zone) == dns_zone_staticstub)
is_staticstub_zone = ISC_TRUE; is_staticstub_zone = ISC_TRUE;

View File

@ -15,7 +15,7 @@
* PERFORMANCE OF THIS SOFTWARE. * PERFORMANCE OF THIS SOFTWARE.
*/ */
/* $Id: nsupdate.c,v 1.187 2010/12/18 01:56:19 each Exp $ */ /* $Id: nsupdate.c,v 1.188 2010/12/24 02:20:47 each Exp $ */
/*! \file */ /*! \file */
@ -2431,6 +2431,58 @@ sendrequest(isc_sockaddr_t *srcaddr, isc_sockaddr_t *destaddr,
} }
#ifdef GSSAPI #ifdef GSSAPI
/*
* Get the realm from the users kerberos ticket if possible
*/
static void
get_ticket_realm(isc_mem_t *mctx)
{
krb5_context ctx;
krb5_error_code rc;
krb5_ccache ccache;
krb5_principal princ;
char *name, *ticket_realm;
rc = krb5_init_context(&ctx);
if (rc != 0)
return;
rc = krb5_cc_default(ctx, &ccache);
if (rc != 0) {
krb5_free_context(ctx);
return;
}
rc = krb5_cc_get_principal(ctx, ccache, &princ);
if (rc != 0) {
krb5_cc_close(ctx, ccache);
krb5_free_context(ctx);
return;
}
rc = krb5_unparse_name(ctx, princ, &name);
if (rc != 0) {
krb5_free_principal(ctx, princ);
krb5_cc_close(ctx, ccache);
krb5_free_context(ctx);
return;
}
ticket_realm = strrchr(name, '@');
if (ticket_realm != NULL) {
realm = isc_mem_strdup(mctx, ticket_realm);
}
free(name);
krb5_free_principal(ctx, princ);
krb5_cc_close(ctx, ccache);
krb5_free_context(ctx);
if (realm != NULL && debugging)
fprintf(stderr, "Found realm from ticket: %s\n", realm+1);
}
static void static void
start_gssrequest(dns_name_t *master, dns_name_t *zone) start_gssrequest(dns_name_t *master, dns_name_t *zone)
{ {
@ -2472,6 +2524,9 @@ start_gssrequest(dns_name_t *master, dns_name_t *zone)
dns_fixedname_init(&fname); dns_fixedname_init(&fname);
servname = dns_fixedname_name(&fname); servname = dns_fixedname_name(&fname);
if (realm == NULL)
get_ticket_realm(mctx);
result = isc_string_printf(servicename, sizeof(servicename), result = isc_string_printf(servicename, sizeof(servicename),
"DNS/%s%s", namestr, realm ? realm : ""); "DNS/%s%s", namestr, realm ? realm : "");
if (result != ISC_R_SUCCESS) if (result != ISC_R_SUCCESS)

View File

@ -13,7 +13,7 @@
# OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR # OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
# PERFORMANCE OF THIS SOFTWARE. # PERFORMANCE OF THIS SOFTWARE.
# $Id: Makefile.in,v 1.50 2009/12/05 23:31:40 each Exp $ # $Id: Makefile.in,v 1.51 2010/12/24 02:20:47 each Exp $
srcdir = @srcdir@ srcdir = @srcdir@
VPATH = @srcdir@ VPATH = @srcdir@
@ -24,7 +24,7 @@ top_srcdir = @top_srcdir@
CINCLUDES = ${TEST_INCLUDES} ${DNS_INCLUDES} \ CINCLUDES = ${TEST_INCLUDES} ${DNS_INCLUDES} \
${ISC_INCLUDES} @DST_GSSAPI_INC@ ${ISC_INCLUDES} @DST_GSSAPI_INC@
CDEFINES = CDEFINES = @USE_GSSAPI@
CWARNINGS = CWARNINGS =
DNSLIBS = ../../../lib/dns/libdns.@A@ @DNS_CRYPTO_LIBS@ DNSLIBS = ../../../lib/dns/libdns.@A@ @DNS_CRYPTO_LIBS@

View File

@ -14,7 +14,7 @@
* PERFORMANCE OF THIS SOFTWARE. * PERFORMANCE OF THIS SOFTWARE.
*/ */
/* $Id: gsstest.c,v 1.10 2010/12/20 23:47:20 tbox Exp $ */ /* $Id: gsstest.c,v 1.11 2010/12/24 02:20:47 each Exp $ */
#include <config.h> #include <config.h>
@ -359,7 +359,7 @@ initctx1(isc_task_t *task, isc_event_t *event) {
printf("Initctx - context name we're using: %s\n", contextname); printf("Initctx - context name we're using: %s\n", contextname);
printf("Negotiating GSSAPI context: "); printf("Negotiating GSSAPI context: ");
printf(gssid); printf("%s", gssid);
printf("\n"); printf("\n");
/* /*
@ -388,7 +388,8 @@ initctx1(isc_task_t *task, isc_event_t *event) {
gssctx = GSS_C_NO_CONTEXT; gssctx = GSS_C_NO_CONTEXT;
result = dns_tkey_buildgssquery(query, dns_fixedname_name(&servername), result = dns_tkey_buildgssquery(query, dns_fixedname_name(&servername),
dns_fixedname_name(&gssname), dns_fixedname_name(&gssname),
NULL, 36000, &gssctx, ISC_TRUE); NULL, 36000, &gssctx, ISC_TRUE,
NULL, mctx, NULL);
CHECK("dns_tkey_buildgssquery", result); CHECK("dns_tkey_buildgssquery", result);
printf("Sending context token to server\n"); printf("Sending context token to server\n");

View File

@ -18,7 +18,7 @@
- PERFORMANCE OF THIS SOFTWARE. - PERFORMANCE OF THIS SOFTWARE.
--> -->
<!-- File: $Id: Bv9ARM-book.xml,v 1.469 2010/12/21 22:40:55 jreed Exp $ --> <!-- File: $Id: Bv9ARM-book.xml,v 1.470 2010/12/24 02:20:47 each Exp $ -->
<book xmlns:xi="http://www.w3.org/2001/XInclude"> <book xmlns:xi="http://www.w3.org/2001/XInclude">
<title>BIND 9 Administrator Reference Manual</title> <title>BIND 9 Administrator Reference Manual</title>
@ -1792,13 +1792,14 @@ controls {
</para> </para>
<para> <para>
The <command>tkey-gssapi-credential</command>, Dynamic updates using Kerberos signed requests can be made
<command>tkey-gssapi-keytab</command> using the TKEY/GSS protocol by setting either the
and <command>tkey-domain</command> clauses in the <command>tkey-gssapi-keytab</command> option, or alternatively
<command>options</command> statement enable the by setting both the <command>tkey-gssapi-credential<command/>
server to negotiate keys that can be matched against those and <command>tkey-domain<command/> options. Once enabled,
in <command>update-policy</command> or Kerberos signed requests will be matched against the update
<command>allow-update</command>. policies for the zone, using the Kerberos principal as the
signer for the request.
</para> </para>
<para> <para>

View File

@ -15,7 +15,7 @@
* PERFORMANCE OF THIS SOFTWARE. * PERFORMANCE OF THIS SOFTWARE.
*/ */
/* $Id: gssapictx.c,v 1.22 2010/12/22 02:33:12 marka Exp $ */ /* $Id: gssapictx.c,v 1.23 2010/12/24 02:20:47 each Exp $ */
#include <config.h> #include <config.h>
@ -516,82 +516,6 @@ dst_gssapi_releasecred(gss_cred_id_t *cred) {
} }
#ifdef GSSAPI #ifdef GSSAPI
/*
* GSSAPI with krb5 doesn't have a way to set the default realm, as it
* doesn't offer any access to the krb5 context that it uses. The only
* way to do an nsupdate call on a realm that isn't the default realm in
* /etc/krb5.conf is to create a temporary krb5.conf and put the right
* realm in there as the default realm, then set KRB5_CONFIG to point
* at that temporary krb5.conf. This is a disgusting hack, but it is
* the best we can do with GSSAPI.
*
* To try to reduce the impact, this routine checks if the default
* realm is already correct. If it is, then we don't need to do
* anything. If not, then we create the temporary krb5.conf.
*/
static void
check_zone(dns_name_t *zone, isc_mem_t *mctx, char **tmpfile) {
krb5_context ctx;
int kret;
char *realm;
char buf[1024];
isc_result_t ret;
FILE *fp = NULL;
char *p, *template;
if (getenv("KRB5_CONFIG") != NULL) {
/* the user has specifically set a KRB5_CONFIG to
use. Don't override it, as they may know what they are
doing */
return;
}
dns_name_format(zone, buf, sizeof(buf));
/* gssapi wants the realm in upper case */
for (p=buf; *p; p++) {
if (islower((int)*p))
*p = toupper((int)*p);
}
kret = krb5_init_context(&ctx);
if (kret != 0)
return;
kret = krb5_get_default_realm(ctx, &realm);
if (kret == 0 && strcmp(buf, realm) == 0) {
/* the krb5.conf is correct. */
krb5_free_context(ctx);
return;
}
gss_log(3, "zone '%s' doesn't match KRB5 default realm '%s'",
buf, realm);
template = isc_mem_strdup(mctx, "/tmp/krb5.conf.XXXXXX");
if (template == NULL) {
krb5_free_context(ctx);
return;
}
ret = isc_file_openunique(template, &fp);
if (ret != ISC_R_SUCCESS) {
krb5_free_context(ctx);
return;
}
fprintf(fp, "[libdefaults]\n");
fprintf(fp, "\tdefault_realm = %s\n", buf);
fprintf(fp, "\tdns_lookup_kdc = true\n");
fclose(fp);
setenv("KRB5_CONFIG", template, 1);
*tmpfile = template;
krb5_free_context(ctx);
}
/* /*
* Format a gssapi error message info into a char ** on the given memory * Format a gssapi error message info into a char ** on the given memory
* context. This is used to return gssapi error messages back up the * context. This is used to return gssapi error messages back up the
@ -635,10 +559,6 @@ dst_gssapi_initctx(dns_name_t *name, isc_buffer_t *intoken,
REQUIRE(gssctx != NULL); REQUIRE(gssctx != NULL);
REQUIRE(mctx != NULL); REQUIRE(mctx != NULL);
if (zone != NULL && mctx != NULL) {
check_zone(zone, mctx, &tmpfile);
}
isc_buffer_init(&namebuf, array, sizeof(array)); isc_buffer_init(&namebuf, array, sizeof(array));
name_to_gbuffer(name, &namebuf, &gnamebuf); name_to_gbuffer(name, &namebuf, &gnamebuf);

View File

@ -16,7 +16,7 @@
*/ */
/* /*
* $Id: tsig.c,v 1.143 2010/12/09 00:54:34 marka Exp $ * $Id: tsig.c,v 1.144 2010/12/24 02:20:47 each Exp $
*/ */
/*! \file */ /*! \file */
#include <config.h> #include <config.h>
@ -203,8 +203,10 @@ tsig_log(dns_tsigkey_t *key, int level, const char *fmt, ...) {
else else
strcpy(namestr, "<null>"); strcpy(namestr, "<null>");
if (key != NULL && key->generated) if (key != NULL && key->generated && key->creator)
dns_name_format(key->creator, creatorstr, sizeof(creatorstr)); dns_name_format(key->creator, creatorstr, sizeof(creatorstr));
else
strcpy(creatorstr, "<null>");
va_start(ap, fmt); va_start(ap, fmt);
vsnprintf(message, sizeof(message), fmt, ap); vsnprintf(message, sizeof(message), fmt, ap);