1184588Sdfr/*- 2184588Sdfr * Copyright (c) 2008 Isilon Inc http://www.isilon.com/ 3184588Sdfr * Authors: Doug Rabson <dfr@rabson.org> 4184588Sdfr * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org> 5184588Sdfr * 6184588Sdfr * Redistribution and use in source and binary forms, with or without 7184588Sdfr * modification, are permitted provided that the following conditions 8184588Sdfr * are met: 9184588Sdfr * 1. Redistributions of source code must retain the above copyright 10184588Sdfr * notice, this list of conditions and the following disclaimer. 11184588Sdfr * 2. Redistributions in binary form must reproduce the above copyright 12184588Sdfr * notice, this list of conditions and the following disclaimer in the 13184588Sdfr * documentation and/or other materials provided with the distribution. 14184588Sdfr * 15184588Sdfr * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16184588Sdfr * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17184588Sdfr * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18184588Sdfr * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19184588Sdfr * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20184588Sdfr * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21184588Sdfr * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22184588Sdfr * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23184588Sdfr * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24184588Sdfr * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25184588Sdfr * SUCH DAMAGE. 26184588Sdfr */ 27184588Sdfr 28184588Sdfr#include <sys/cdefs.h> 29184588Sdfr__FBSDID("$FreeBSD$"); 30184588Sdfr 31184588Sdfr#include <sys/param.h> 32184588Sdfr#include <sys/kernel.h> 33184588Sdfr#include <sys/kobj.h> 34244370Srmacklem#include <sys/lock.h> 35184588Sdfr#include <sys/malloc.h> 36184588Sdfr#include <sys/module.h> 37244370Srmacklem#include <sys/mutex.h> 38184588Sdfr#include <sys/priv.h> 39184588Sdfr#include <sys/syscall.h> 40184588Sdfr#include <sys/sysent.h> 41184588Sdfr#include <sys/sysproto.h> 42184588Sdfr 43184588Sdfr#include <kgssapi/gssapi.h> 44184588Sdfr#include <kgssapi/gssapi_impl.h> 45184588Sdfr#include <rpc/rpc.h> 46184588Sdfr#include <rpc/rpc_com.h> 47223309Srmacklem#include <rpc/rpcsec_gss.h> 48184588Sdfr 49184588Sdfr#include "gssd.h" 50184588Sdfr#include "kgss_if.h" 51184588Sdfr 52184588SdfrMALLOC_DEFINE(M_GSSAPI, "GSS-API", "GSS-API"); 53184588Sdfr 54184588Sdfr/* 55184588Sdfr * Syscall hooks 56184588Sdfr */ 57184588Sdfrstatic int gssd_syscall_offset = SYS_gssd_syscall; 58184588Sdfrstatic struct sysent gssd_syscall_prev_sysent; 59184588SdfrMAKE_SYSENT(gssd_syscall); 60184588Sdfrstatic bool_t gssd_syscall_registered = FALSE; 61184588Sdfr 62184588Sdfrstruct kgss_mech_list kgss_mechs; 63184588SdfrCLIENT *kgss_gssd_handle; 64244370Srmacklemstruct mtx kgss_gssd_lock; 65184588Sdfr 66184588Sdfrstatic void 67184588Sdfrkgss_init(void *dummy) 68184588Sdfr{ 69184588Sdfr int error; 70184588Sdfr 71184588Sdfr LIST_INIT(&kgss_mechs); 72184588Sdfr error = syscall_register(&gssd_syscall_offset, &gssd_syscall_sysent, 73184588Sdfr &gssd_syscall_prev_sysent); 74184588Sdfr if (error) 75184588Sdfr printf("Can't register GSSD syscall\n"); 76184588Sdfr else 77184588Sdfr gssd_syscall_registered = TRUE; 78184588Sdfr} 79184588SdfrSYSINIT(kgss_init, SI_SUB_LOCK, SI_ORDER_FIRST, kgss_init, NULL); 80184588Sdfr 81184588Sdfrstatic void 82184588Sdfrkgss_uninit(void *dummy) 83184588Sdfr{ 84184588Sdfr 85184588Sdfr if (gssd_syscall_registered) 86184588Sdfr syscall_deregister(&gssd_syscall_offset, 87184588Sdfr &gssd_syscall_prev_sysent); 88184588Sdfr} 89184588SdfrSYSUNINIT(kgss_uninit, SI_SUB_LOCK, SI_ORDER_FIRST, kgss_uninit, NULL); 90184588Sdfr 91184588Sdfrint 92225617Skmacysys_gssd_syscall(struct thread *td, struct gssd_syscall_args *uap) 93184588Sdfr{ 94184588Sdfr struct sockaddr_un sun; 95184588Sdfr struct netconfig *nconf; 96184588Sdfr char path[MAXPATHLEN]; 97184588Sdfr int error; 98244370Srmacklem CLIENT *cl, *oldcl; 99184588Sdfr 100184588Sdfr error = priv_check(td, PRIV_NFS_DAEMON); 101184588Sdfr if (error) 102184588Sdfr return (error); 103184588Sdfr 104184588Sdfr error = copyinstr(uap->path, path, sizeof(path), NULL); 105184588Sdfr if (error) 106184588Sdfr return (error); 107184588Sdfr 108184588Sdfr sun.sun_family = AF_LOCAL; 109184588Sdfr strcpy(sun.sun_path, path); 110184588Sdfr sun.sun_len = SUN_LEN(&sun); 111184588Sdfr 112184588Sdfr nconf = getnetconfigent("local"); 113244370Srmacklem cl = clnt_reconnect_create(nconf, 114184588Sdfr (struct sockaddr *) &sun, GSSD, GSSDVERS, 115184588Sdfr RPC_MAXDATASIZE, RPC_MAXDATASIZE); 116184588Sdfr 117244370Srmacklem mtx_lock(&kgss_gssd_lock); 118244370Srmacklem oldcl = kgss_gssd_handle; 119244370Srmacklem kgss_gssd_handle = cl; 120244370Srmacklem mtx_unlock(&kgss_gssd_lock); 121244370Srmacklem 122244370Srmacklem if (oldcl != NULL) { 123244370Srmacklem CLNT_CLOSE(oldcl); 124244370Srmacklem CLNT_RELEASE(oldcl); 125244370Srmacklem } 126244370Srmacklem 127184588Sdfr return (0); 128184588Sdfr} 129184588Sdfr 130184588Sdfrint 131184588Sdfrkgss_oid_equal(const gss_OID oid1, const gss_OID oid2) 132184588Sdfr{ 133184588Sdfr 134184588Sdfr if (oid1 == oid2) 135184588Sdfr return (1); 136184588Sdfr if (!oid1 || !oid2) 137184588Sdfr return (0); 138184588Sdfr if (oid1->length != oid2->length) 139184588Sdfr return (0); 140184588Sdfr if (memcmp(oid1->elements, oid2->elements, oid1->length)) 141184588Sdfr return (0); 142184588Sdfr return (1); 143184588Sdfr} 144184588Sdfr 145184588Sdfrvoid 146184588Sdfrkgss_install_mech(gss_OID mech_type, const char *name, struct kobj_class *cls) 147184588Sdfr{ 148184588Sdfr struct kgss_mech *km; 149184588Sdfr 150184588Sdfr km = malloc(sizeof(struct kgss_mech), M_GSSAPI, M_WAITOK); 151184588Sdfr km->km_mech_type = mech_type; 152184588Sdfr km->km_mech_name = name; 153184588Sdfr km->km_class = cls; 154184588Sdfr LIST_INSERT_HEAD(&kgss_mechs, km, km_link); 155184588Sdfr} 156184588Sdfr 157184588Sdfrvoid 158184588Sdfrkgss_uninstall_mech(gss_OID mech_type) 159184588Sdfr{ 160184588Sdfr struct kgss_mech *km; 161184588Sdfr 162184588Sdfr LIST_FOREACH(km, &kgss_mechs, km_link) { 163184588Sdfr if (kgss_oid_equal(km->km_mech_type, mech_type)) { 164184588Sdfr LIST_REMOVE(km, km_link); 165184588Sdfr free(km, M_GSSAPI); 166184588Sdfr return; 167184588Sdfr } 168184588Sdfr } 169184588Sdfr} 170184588Sdfr 171184588Sdfrgss_OID 172184588Sdfrkgss_find_mech_by_name(const char *name) 173184588Sdfr{ 174184588Sdfr struct kgss_mech *km; 175184588Sdfr 176184588Sdfr LIST_FOREACH(km, &kgss_mechs, km_link) { 177184588Sdfr if (!strcmp(km->km_mech_name, name)) { 178184588Sdfr return (km->km_mech_type); 179184588Sdfr } 180184588Sdfr } 181184588Sdfr return (GSS_C_NO_OID); 182184588Sdfr} 183184588Sdfr 184184588Sdfrconst char * 185184588Sdfrkgss_find_mech_by_oid(const gss_OID oid) 186184588Sdfr{ 187184588Sdfr struct kgss_mech *km; 188184588Sdfr 189184588Sdfr LIST_FOREACH(km, &kgss_mechs, km_link) { 190184588Sdfr if (kgss_oid_equal(km->km_mech_type, oid)) { 191184588Sdfr return (km->km_mech_name); 192184588Sdfr } 193184588Sdfr } 194184588Sdfr return (NULL); 195184588Sdfr} 196184588Sdfr 197184588Sdfrgss_ctx_id_t 198184588Sdfrkgss_create_context(gss_OID mech_type) 199184588Sdfr{ 200184588Sdfr struct kgss_mech *km; 201184588Sdfr gss_ctx_id_t ctx; 202184588Sdfr 203184588Sdfr LIST_FOREACH(km, &kgss_mechs, km_link) { 204184588Sdfr if (kgss_oid_equal(km->km_mech_type, mech_type)) 205184588Sdfr break; 206184588Sdfr } 207184588Sdfr if (!km) 208184588Sdfr return (NULL); 209184588Sdfr 210184588Sdfr ctx = (gss_ctx_id_t) kobj_create(km->km_class, M_GSSAPI, M_WAITOK); 211184588Sdfr KGSS_INIT(ctx); 212184588Sdfr 213184588Sdfr return (ctx); 214184588Sdfr} 215184588Sdfr 216184588Sdfrvoid 217184588Sdfrkgss_delete_context(gss_ctx_id_t ctx, gss_buffer_t output_token) 218184588Sdfr{ 219184588Sdfr 220184588Sdfr KGSS_DELETE(ctx, output_token); 221184588Sdfr kobj_delete((kobj_t) ctx, M_GSSAPI); 222184588Sdfr} 223184588Sdfr 224184588SdfrOM_uint32 225184588Sdfrkgss_transfer_context(gss_ctx_id_t ctx) 226184588Sdfr{ 227184588Sdfr struct export_sec_context_res res; 228184588Sdfr struct export_sec_context_args args; 229184588Sdfr enum clnt_stat stat; 230184588Sdfr OM_uint32 maj_stat; 231184588Sdfr 232184588Sdfr if (!kgss_gssd_handle) 233184588Sdfr return (GSS_S_FAILURE); 234184588Sdfr 235184588Sdfr args.ctx = ctx->handle; 236184588Sdfr bzero(&res, sizeof(res)); 237184588Sdfr stat = gssd_export_sec_context_1(&args, &res, kgss_gssd_handle); 238184588Sdfr if (stat != RPC_SUCCESS) { 239184588Sdfr return (GSS_S_FAILURE); 240184588Sdfr } 241184588Sdfr 242184588Sdfr maj_stat = KGSS_IMPORT(ctx, res.format, &res.interprocess_token); 243184588Sdfr ctx->handle = 0; 244184588Sdfr 245184588Sdfr xdr_free((xdrproc_t) xdr_export_sec_context_res, &res); 246184588Sdfr 247184588Sdfr return (maj_stat); 248184588Sdfr} 249184588Sdfr 250184588Sdfrvoid 251184588Sdfrkgss_copy_buffer(const gss_buffer_t from, gss_buffer_t to) 252184588Sdfr{ 253184588Sdfr to->length = from->length; 254184588Sdfr if (from->length) { 255184588Sdfr to->value = malloc(from->length, M_GSSAPI, M_WAITOK); 256184588Sdfr bcopy(from->value, to->value, from->length); 257184588Sdfr } else { 258184588Sdfr to->value = NULL; 259184588Sdfr } 260184588Sdfr} 261184588Sdfr 262184588Sdfr/* 263244370Srmacklem * Acquire the kgss_gssd_handle and return it with a reference count, 264244370Srmacklem * if it is available. 265244370Srmacklem */ 266244370SrmacklemCLIENT * 267244370Srmacklemkgss_gssd_client(void) 268244370Srmacklem{ 269244370Srmacklem CLIENT *cl; 270244370Srmacklem 271244370Srmacklem mtx_lock(&kgss_gssd_lock); 272244370Srmacklem cl = kgss_gssd_handle; 273244370Srmacklem if (cl != NULL) 274244370Srmacklem CLNT_ACQUIRE(cl); 275244370Srmacklem mtx_unlock(&kgss_gssd_lock); 276244370Srmacklem return (cl); 277244370Srmacklem} 278244370Srmacklem 279244370Srmacklem/* 280184588Sdfr * Kernel module glue 281184588Sdfr */ 282184588Sdfrstatic int 283184588Sdfrkgssapi_modevent(module_t mod, int type, void *data) 284184588Sdfr{ 285223309Srmacklem int error = 0; 286184588Sdfr 287223309Srmacklem switch (type) { 288223309Srmacklem case MOD_LOAD: 289253049Srmacklem rpc_gss_entries.rpc_gss_refresh_auth = rpc_gss_refresh_auth; 290223309Srmacklem rpc_gss_entries.rpc_gss_secfind = rpc_gss_secfind; 291223309Srmacklem rpc_gss_entries.rpc_gss_secpurge = rpc_gss_secpurge; 292223309Srmacklem rpc_gss_entries.rpc_gss_seccreate = rpc_gss_seccreate; 293223309Srmacklem rpc_gss_entries.rpc_gss_set_defaults = rpc_gss_set_defaults; 294223309Srmacklem rpc_gss_entries.rpc_gss_max_data_length = 295223309Srmacklem rpc_gss_max_data_length; 296223309Srmacklem rpc_gss_entries.rpc_gss_get_error = rpc_gss_get_error; 297223309Srmacklem rpc_gss_entries.rpc_gss_mech_to_oid = rpc_gss_mech_to_oid; 298223309Srmacklem rpc_gss_entries.rpc_gss_oid_to_mech = rpc_gss_oid_to_mech; 299223309Srmacklem rpc_gss_entries.rpc_gss_qop_to_num = rpc_gss_qop_to_num; 300223309Srmacklem rpc_gss_entries.rpc_gss_get_mechanisms = rpc_gss_get_mechanisms; 301223309Srmacklem rpc_gss_entries.rpc_gss_get_versions = rpc_gss_get_versions; 302223309Srmacklem rpc_gss_entries.rpc_gss_is_installed = rpc_gss_is_installed; 303223309Srmacklem rpc_gss_entries.rpc_gss_set_svc_name = rpc_gss_set_svc_name; 304223309Srmacklem rpc_gss_entries.rpc_gss_clear_svc_name = rpc_gss_clear_svc_name; 305223309Srmacklem rpc_gss_entries.rpc_gss_getcred = rpc_gss_getcred; 306223309Srmacklem rpc_gss_entries.rpc_gss_set_callback = rpc_gss_set_callback; 307223309Srmacklem rpc_gss_entries.rpc_gss_clear_callback = rpc_gss_clear_callback; 308223309Srmacklem rpc_gss_entries.rpc_gss_get_principal_name = 309223309Srmacklem rpc_gss_get_principal_name; 310223309Srmacklem rpc_gss_entries.rpc_gss_svc_max_data_length = 311223309Srmacklem rpc_gss_svc_max_data_length; 312244370Srmacklem mtx_init(&kgss_gssd_lock, "kgss_gssd_lock", NULL, MTX_DEF); 313223309Srmacklem break; 314223309Srmacklem case MOD_UNLOAD: 315224084Szack /* 316224084Szack * Unloading of the kgssapi module is not currently supported. 317224084Szack * If somebody wants this, we would need to keep track of 318224084Szack * currently executing threads and make sure the count is 0. 319224084Szack */ 320223309Srmacklem /* FALLTHROUGH */ 321223309Srmacklem default: 322223309Srmacklem error = EOPNOTSUPP; 323223309Srmacklem }; 324223309Srmacklem return (error); 325184588Sdfr} 326184588Sdfrstatic moduledata_t kgssapi_mod = { 327184588Sdfr "kgssapi", 328184588Sdfr kgssapi_modevent, 329184588Sdfr NULL, 330184588Sdfr}; 331184588SdfrDECLARE_MODULE(kgssapi, kgssapi_mod, SI_SUB_VFS, SI_ORDER_ANY); 332184588SdfrMODULE_DEPEND(kgssapi, krpc, 1, 1, 1); 333184588SdfrMODULE_VERSION(kgssapi, 1); 334