1184588Sdfr/*-
2184588Sdfr * Copyright (c) 2008 Isilon Inc http://www.isilon.com/
3184588Sdfr * Authors: Doug Rabson <dfr@rabson.org>
4184588Sdfr * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org>
5184588Sdfr *
6184588Sdfr * Redistribution and use in source and binary forms, with or without
7184588Sdfr * modification, are permitted provided that the following conditions
8184588Sdfr * are met:
9184588Sdfr * 1. Redistributions of source code must retain the above copyright
10184588Sdfr *    notice, this list of conditions and the following disclaimer.
11184588Sdfr * 2. Redistributions in binary form must reproduce the above copyright
12184588Sdfr *    notice, this list of conditions and the following disclaimer in the
13184588Sdfr *    documentation and/or other materials provided with the distribution.
14184588Sdfr *
15184588Sdfr * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16184588Sdfr * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17184588Sdfr * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18184588Sdfr * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19184588Sdfr * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20184588Sdfr * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21184588Sdfr * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22184588Sdfr * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23184588Sdfr * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24184588Sdfr * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25184588Sdfr * SUCH DAMAGE.
26184588Sdfr */
27184588Sdfr
28184588Sdfr#include <sys/cdefs.h>
29184588Sdfr__FBSDID("$FreeBSD$");
30184588Sdfr
31184588Sdfr#include <sys/param.h>
32184588Sdfr#include <sys/kernel.h>
33184588Sdfr#include <sys/kobj.h>
34244370Srmacklem#include <sys/lock.h>
35184588Sdfr#include <sys/malloc.h>
36184588Sdfr#include <sys/module.h>
37244370Srmacklem#include <sys/mutex.h>
38184588Sdfr#include <sys/priv.h>
39184588Sdfr#include <sys/syscall.h>
40184588Sdfr#include <sys/sysent.h>
41184588Sdfr#include <sys/sysproto.h>
42184588Sdfr
43184588Sdfr#include <kgssapi/gssapi.h>
44184588Sdfr#include <kgssapi/gssapi_impl.h>
45184588Sdfr#include <rpc/rpc.h>
46184588Sdfr#include <rpc/rpc_com.h>
47223309Srmacklem#include <rpc/rpcsec_gss.h>
48184588Sdfr
49184588Sdfr#include "gssd.h"
50184588Sdfr#include "kgss_if.h"
51184588Sdfr
52184588SdfrMALLOC_DEFINE(M_GSSAPI, "GSS-API", "GSS-API");
53184588Sdfr
54184588Sdfr/*
55184588Sdfr * Syscall hooks
56184588Sdfr */
57184588Sdfrstatic int gssd_syscall_offset = SYS_gssd_syscall;
58184588Sdfrstatic struct sysent gssd_syscall_prev_sysent;
59184588SdfrMAKE_SYSENT(gssd_syscall);
60184588Sdfrstatic bool_t gssd_syscall_registered = FALSE;
61184588Sdfr
62184588Sdfrstruct kgss_mech_list kgss_mechs;
63184588SdfrCLIENT *kgss_gssd_handle;
64244370Srmacklemstruct mtx kgss_gssd_lock;
65184588Sdfr
66184588Sdfrstatic void
67184588Sdfrkgss_init(void *dummy)
68184588Sdfr{
69184588Sdfr	int error;
70184588Sdfr
71184588Sdfr	LIST_INIT(&kgss_mechs);
72184588Sdfr	error = syscall_register(&gssd_syscall_offset, &gssd_syscall_sysent,
73184588Sdfr	    &gssd_syscall_prev_sysent);
74184588Sdfr	if (error)
75184588Sdfr		printf("Can't register GSSD syscall\n");
76184588Sdfr	else
77184588Sdfr		gssd_syscall_registered = TRUE;
78184588Sdfr}
79184588SdfrSYSINIT(kgss_init, SI_SUB_LOCK, SI_ORDER_FIRST, kgss_init, NULL);
80184588Sdfr
81184588Sdfrstatic void
82184588Sdfrkgss_uninit(void *dummy)
83184588Sdfr{
84184588Sdfr
85184588Sdfr	if (gssd_syscall_registered)
86184588Sdfr		syscall_deregister(&gssd_syscall_offset,
87184588Sdfr		    &gssd_syscall_prev_sysent);
88184588Sdfr}
89184588SdfrSYSUNINIT(kgss_uninit, SI_SUB_LOCK, SI_ORDER_FIRST, kgss_uninit, NULL);
90184588Sdfr
91184588Sdfrint
92225617Skmacysys_gssd_syscall(struct thread *td, struct gssd_syscall_args *uap)
93184588Sdfr{
94184588Sdfr        struct sockaddr_un sun;
95184588Sdfr        struct netconfig *nconf;
96184588Sdfr	char path[MAXPATHLEN];
97184588Sdfr	int error;
98244370Srmacklem	CLIENT *cl, *oldcl;
99184588Sdfr
100184588Sdfr	error = priv_check(td, PRIV_NFS_DAEMON);
101184588Sdfr	if (error)
102184588Sdfr		return (error);
103184588Sdfr
104184588Sdfr	error = copyinstr(uap->path, path, sizeof(path), NULL);
105184588Sdfr	if (error)
106184588Sdfr		return (error);
107299617Sngie	if (strlen(path) + 1 > sizeof(sun.sun_path))
108299617Sngie		return (EINVAL);
109184588Sdfr
110293446Sjpaetzel	if (path[0] != '\0') {
111293446Sjpaetzel		sun.sun_family = AF_LOCAL;
112299617Sngie		strlcpy(sun.sun_path, path, sizeof(sun.sun_path));
113293446Sjpaetzel		sun.sun_len = SUN_LEN(&sun);
114293446Sjpaetzel
115293446Sjpaetzel		nconf = getnetconfigent("local");
116293446Sjpaetzel		cl = clnt_reconnect_create(nconf,
117293446Sjpaetzel		    (struct sockaddr *) &sun, GSSD, GSSDVERS,
118293446Sjpaetzel		    RPC_MAXDATASIZE, RPC_MAXDATASIZE);
119293446Sjpaetzel	} else
120293446Sjpaetzel		cl = NULL;
121184588Sdfr
122244370Srmacklem	mtx_lock(&kgss_gssd_lock);
123244370Srmacklem	oldcl = kgss_gssd_handle;
124244370Srmacklem	kgss_gssd_handle = cl;
125244370Srmacklem	mtx_unlock(&kgss_gssd_lock);
126244370Srmacklem
127244370Srmacklem	if (oldcl != NULL) {
128244370Srmacklem		CLNT_CLOSE(oldcl);
129244370Srmacklem		CLNT_RELEASE(oldcl);
130244370Srmacklem	}
131244370Srmacklem
132184588Sdfr	return (0);
133184588Sdfr}
134184588Sdfr
135184588Sdfrint
136184588Sdfrkgss_oid_equal(const gss_OID oid1, const gss_OID oid2)
137184588Sdfr{
138184588Sdfr
139184588Sdfr	if (oid1 == oid2)
140184588Sdfr		return (1);
141184588Sdfr	if (!oid1 || !oid2)
142184588Sdfr		return (0);
143184588Sdfr	if (oid1->length != oid2->length)
144184588Sdfr		return (0);
145184588Sdfr	if (memcmp(oid1->elements, oid2->elements, oid1->length))
146184588Sdfr		return (0);
147184588Sdfr	return (1);
148184588Sdfr}
149184588Sdfr
150184588Sdfrvoid
151184588Sdfrkgss_install_mech(gss_OID mech_type, const char *name, struct kobj_class *cls)
152184588Sdfr{
153184588Sdfr	struct kgss_mech *km;
154184588Sdfr
155184588Sdfr	km = malloc(sizeof(struct kgss_mech), M_GSSAPI, M_WAITOK);
156184588Sdfr	km->km_mech_type = mech_type;
157184588Sdfr	km->km_mech_name = name;
158184588Sdfr	km->km_class = cls;
159184588Sdfr	LIST_INSERT_HEAD(&kgss_mechs, km, km_link);
160184588Sdfr}
161184588Sdfr
162184588Sdfrvoid
163184588Sdfrkgss_uninstall_mech(gss_OID mech_type)
164184588Sdfr{
165184588Sdfr	struct kgss_mech *km;
166184588Sdfr
167184588Sdfr	LIST_FOREACH(km, &kgss_mechs, km_link) {
168184588Sdfr		if (kgss_oid_equal(km->km_mech_type, mech_type)) {
169184588Sdfr			LIST_REMOVE(km, km_link);
170184588Sdfr			free(km, M_GSSAPI);
171184588Sdfr			return;
172184588Sdfr		}
173184588Sdfr	}
174184588Sdfr}
175184588Sdfr
176184588Sdfrgss_OID
177184588Sdfrkgss_find_mech_by_name(const char *name)
178184588Sdfr{
179184588Sdfr	struct kgss_mech *km;
180184588Sdfr
181184588Sdfr	LIST_FOREACH(km, &kgss_mechs, km_link) {
182184588Sdfr		if (!strcmp(km->km_mech_name, name)) {
183184588Sdfr			return (km->km_mech_type);
184184588Sdfr		}
185184588Sdfr	}
186184588Sdfr	return (GSS_C_NO_OID);
187184588Sdfr}
188184588Sdfr
189184588Sdfrconst char *
190184588Sdfrkgss_find_mech_by_oid(const gss_OID oid)
191184588Sdfr{
192184588Sdfr	struct kgss_mech *km;
193184588Sdfr
194184588Sdfr	LIST_FOREACH(km, &kgss_mechs, km_link) {
195184588Sdfr		if (kgss_oid_equal(km->km_mech_type, oid)) {
196184588Sdfr			return (km->km_mech_name);
197184588Sdfr		}
198184588Sdfr	}
199184588Sdfr	return (NULL);
200184588Sdfr}
201184588Sdfr
202184588Sdfrgss_ctx_id_t
203184588Sdfrkgss_create_context(gss_OID mech_type)
204184588Sdfr{
205184588Sdfr	struct kgss_mech *km;
206184588Sdfr	gss_ctx_id_t ctx;
207184588Sdfr
208184588Sdfr	LIST_FOREACH(km, &kgss_mechs, km_link) {
209184588Sdfr		if (kgss_oid_equal(km->km_mech_type, mech_type))
210184588Sdfr			break;
211184588Sdfr	}
212184588Sdfr	if (!km)
213184588Sdfr		return (NULL);
214184588Sdfr
215184588Sdfr	ctx = (gss_ctx_id_t) kobj_create(km->km_class, M_GSSAPI, M_WAITOK);
216184588Sdfr	KGSS_INIT(ctx);
217184588Sdfr
218184588Sdfr	return (ctx);
219184588Sdfr}
220184588Sdfr
221184588Sdfrvoid
222184588Sdfrkgss_delete_context(gss_ctx_id_t ctx, gss_buffer_t output_token)
223184588Sdfr{
224184588Sdfr
225184588Sdfr	KGSS_DELETE(ctx, output_token);
226184588Sdfr	kobj_delete((kobj_t) ctx, M_GSSAPI);
227184588Sdfr}
228184588Sdfr
229184588SdfrOM_uint32
230184588Sdfrkgss_transfer_context(gss_ctx_id_t ctx)
231184588Sdfr{
232184588Sdfr	struct export_sec_context_res res;
233184588Sdfr	struct export_sec_context_args args;
234184588Sdfr	enum clnt_stat stat;
235184588Sdfr	OM_uint32 maj_stat;
236184588Sdfr
237184588Sdfr	if (!kgss_gssd_handle)
238184588Sdfr		return (GSS_S_FAILURE);
239184588Sdfr
240184588Sdfr	args.ctx = ctx->handle;
241184588Sdfr	bzero(&res, sizeof(res));
242184588Sdfr	stat = gssd_export_sec_context_1(&args, &res, kgss_gssd_handle);
243184588Sdfr	if (stat != RPC_SUCCESS) {
244184588Sdfr		return (GSS_S_FAILURE);
245184588Sdfr	}
246184588Sdfr
247184588Sdfr	maj_stat = KGSS_IMPORT(ctx, res.format, &res.interprocess_token);
248184588Sdfr	ctx->handle = 0;
249184588Sdfr
250184588Sdfr	xdr_free((xdrproc_t) xdr_export_sec_context_res, &res);
251184588Sdfr
252184588Sdfr	return (maj_stat);
253184588Sdfr}
254184588Sdfr
255184588Sdfrvoid
256184588Sdfrkgss_copy_buffer(const gss_buffer_t from, gss_buffer_t to)
257184588Sdfr{
258184588Sdfr	to->length = from->length;
259184588Sdfr	if (from->length) {
260184588Sdfr		to->value = malloc(from->length, M_GSSAPI, M_WAITOK);
261184588Sdfr		bcopy(from->value, to->value, from->length);
262184588Sdfr	} else {
263184588Sdfr		to->value = NULL;
264184588Sdfr	}
265184588Sdfr}
266184588Sdfr
267184588Sdfr/*
268244370Srmacklem * Acquire the kgss_gssd_handle and return it with a reference count,
269244370Srmacklem * if it is available.
270244370Srmacklem */
271244370SrmacklemCLIENT *
272244370Srmacklemkgss_gssd_client(void)
273244370Srmacklem{
274244370Srmacklem	CLIENT *cl;
275244370Srmacklem
276244370Srmacklem	mtx_lock(&kgss_gssd_lock);
277244370Srmacklem	cl = kgss_gssd_handle;
278244370Srmacklem	if (cl != NULL)
279244370Srmacklem		CLNT_ACQUIRE(cl);
280244370Srmacklem	mtx_unlock(&kgss_gssd_lock);
281244370Srmacklem	return (cl);
282244370Srmacklem}
283244370Srmacklem
284244370Srmacklem/*
285184588Sdfr * Kernel module glue
286184588Sdfr */
287184588Sdfrstatic int
288184588Sdfrkgssapi_modevent(module_t mod, int type, void *data)
289184588Sdfr{
290223309Srmacklem	int error = 0;
291184588Sdfr
292223309Srmacklem	switch (type) {
293223309Srmacklem	case MOD_LOAD:
294253049Srmacklem		rpc_gss_entries.rpc_gss_refresh_auth = rpc_gss_refresh_auth;
295223309Srmacklem		rpc_gss_entries.rpc_gss_secfind = rpc_gss_secfind;
296223309Srmacklem		rpc_gss_entries.rpc_gss_secpurge = rpc_gss_secpurge;
297223309Srmacklem		rpc_gss_entries.rpc_gss_seccreate = rpc_gss_seccreate;
298223309Srmacklem		rpc_gss_entries.rpc_gss_set_defaults = rpc_gss_set_defaults;
299223309Srmacklem		rpc_gss_entries.rpc_gss_max_data_length =
300223309Srmacklem		    rpc_gss_max_data_length;
301223309Srmacklem		rpc_gss_entries.rpc_gss_get_error = rpc_gss_get_error;
302223309Srmacklem		rpc_gss_entries.rpc_gss_mech_to_oid = rpc_gss_mech_to_oid;
303223309Srmacklem		rpc_gss_entries.rpc_gss_oid_to_mech = rpc_gss_oid_to_mech;
304223309Srmacklem		rpc_gss_entries.rpc_gss_qop_to_num = rpc_gss_qop_to_num;
305223309Srmacklem		rpc_gss_entries.rpc_gss_get_mechanisms = rpc_gss_get_mechanisms;
306223309Srmacklem		rpc_gss_entries.rpc_gss_get_versions = rpc_gss_get_versions;
307223309Srmacklem		rpc_gss_entries.rpc_gss_is_installed = rpc_gss_is_installed;
308223309Srmacklem		rpc_gss_entries.rpc_gss_set_svc_name = rpc_gss_set_svc_name;
309223309Srmacklem		rpc_gss_entries.rpc_gss_clear_svc_name = rpc_gss_clear_svc_name;
310223309Srmacklem		rpc_gss_entries.rpc_gss_getcred = rpc_gss_getcred;
311223309Srmacklem		rpc_gss_entries.rpc_gss_set_callback = rpc_gss_set_callback;
312223309Srmacklem		rpc_gss_entries.rpc_gss_clear_callback = rpc_gss_clear_callback;
313223309Srmacklem		rpc_gss_entries.rpc_gss_get_principal_name =
314223309Srmacklem		    rpc_gss_get_principal_name;
315223309Srmacklem		rpc_gss_entries.rpc_gss_svc_max_data_length =
316223309Srmacklem		    rpc_gss_svc_max_data_length;
317244370Srmacklem		mtx_init(&kgss_gssd_lock, "kgss_gssd_lock", NULL, MTX_DEF);
318223309Srmacklem		break;
319223309Srmacklem	case MOD_UNLOAD:
320224084Szack		/*
321224084Szack		 * Unloading of the kgssapi module is not currently supported.
322224084Szack		 * If somebody wants this, we would need to keep track of
323224084Szack		 * currently executing threads and make sure the count is 0.
324224084Szack		 */
325223309Srmacklem		/* FALLTHROUGH */
326223309Srmacklem	default:
327223309Srmacklem		error = EOPNOTSUPP;
328223309Srmacklem	};
329223309Srmacklem	return (error);
330184588Sdfr}
331184588Sdfrstatic moduledata_t kgssapi_mod = {
332184588Sdfr	"kgssapi",
333184588Sdfr	kgssapi_modevent,
334184588Sdfr	NULL,
335184588Sdfr};
336184588SdfrDECLARE_MODULE(kgssapi, kgssapi_mod, SI_SUB_VFS, SI_ORDER_ANY);
337184588SdfrMODULE_DEPEND(kgssapi, krpc, 1, 1, 1);
338184588SdfrMODULE_VERSION(kgssapi, 1);
339