]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - crypto/heimdal/kdc/krb5tgs.c
Heimdal: Fix transit path validation CVE-2017-6594
[FreeBSD/FreeBSD.git] / crypto / heimdal / kdc / krb5tgs.c
1 /*
2  * Copyright (c) 1997-2008 Kungliga Tekniska Högskolan
3  * (Royal Institute of Technology, Stockholm, Sweden).
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  *
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  *
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  *
17  * 3. Neither the name of the Institute nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33
34 #include "kdc_locl.h"
35
36 /*
37  * return the realm of a krbtgt-ticket or NULL
38  */
39
40 static Realm
41 get_krbtgt_realm(const PrincipalName *p)
42 {
43     if(p->name_string.len == 2
44        && strcmp(p->name_string.val[0], KRB5_TGS_NAME) == 0)
45         return p->name_string.val[1];
46     else
47         return NULL;
48 }
49
50 /*
51  * The KDC might add a signed path to the ticket authorization data
52  * field. This is to avoid server impersonating clients and the
53  * request constrained delegation.
54  *
55  * This is done by storing a KRB5_AUTHDATA_IF_RELEVANT with a single
56  * entry of type KRB5SignedPath.
57  */
58
59 static krb5_error_code
60 find_KRB5SignedPath(krb5_context context,
61                     const AuthorizationData *ad,
62                     krb5_data *data)
63 {
64     AuthorizationData child;
65     krb5_error_code ret;
66     int pos;
67
68     if (ad == NULL || ad->len == 0)
69         return KRB5KDC_ERR_PADATA_TYPE_NOSUPP;
70
71     pos = ad->len - 1;
72
73     if (ad->val[pos].ad_type != KRB5_AUTHDATA_IF_RELEVANT)
74         return KRB5KDC_ERR_PADATA_TYPE_NOSUPP;
75
76     ret = decode_AuthorizationData(ad->val[pos].ad_data.data,
77                                    ad->val[pos].ad_data.length,
78                                    &child,
79                                    NULL);
80     if (ret) {
81         krb5_set_error_message(context, ret, "Failed to decode "
82                                "IF_RELEVANT with %d", ret);
83         return ret;
84     }
85
86     if (child.len != 1) {
87         free_AuthorizationData(&child);
88         return KRB5KDC_ERR_PADATA_TYPE_NOSUPP;
89     }
90
91     if (child.val[0].ad_type != KRB5_AUTHDATA_SIGNTICKET) {
92         free_AuthorizationData(&child);
93         return KRB5KDC_ERR_PADATA_TYPE_NOSUPP;
94     }
95
96     if (data)
97         ret = der_copy_octet_string(&child.val[0].ad_data, data);
98     free_AuthorizationData(&child);
99     return ret;
100 }
101
102 krb5_error_code
103 _kdc_add_KRB5SignedPath(krb5_context context,
104                         krb5_kdc_configuration *config,
105                         hdb_entry_ex *krbtgt,
106                         krb5_enctype enctype,
107                         krb5_principal client,
108                         krb5_const_principal server,
109                         krb5_principals principals,
110                         EncTicketPart *tkt)
111 {
112     krb5_error_code ret;
113     KRB5SignedPath sp;
114     krb5_data data;
115     krb5_crypto crypto = NULL;
116     size_t size = 0;
117
118     if (server && principals) {
119         ret = add_Principals(principals, server);
120         if (ret)
121             return ret;
122     }
123
124     {
125         KRB5SignedPathData spd;
126
127         spd.client = client;
128         spd.authtime = tkt->authtime;
129         spd.delegated = principals;
130         spd.method_data = NULL;
131
132         ASN1_MALLOC_ENCODE(KRB5SignedPathData, data.data, data.length,
133                            &spd, &size, ret);
134         if (ret)
135             return ret;
136         if (data.length != size)
137             krb5_abortx(context, "internal asn.1 encoder error");
138     }
139
140     {
141         Key *key;
142         ret = hdb_enctype2key(context, &krbtgt->entry, enctype, &key);
143         if (ret == 0)
144             ret = krb5_crypto_init(context, &key->key, 0, &crypto);
145         if (ret) {
146             free(data.data);
147             return ret;
148         }
149     }
150
151     /*
152      * Fill in KRB5SignedPath
153      */
154
155     sp.etype = enctype;
156     sp.delegated = principals;
157     sp.method_data = NULL;
158
159     ret = krb5_create_checksum(context, crypto, KRB5_KU_KRB5SIGNEDPATH, 0,
160                                data.data, data.length, &sp.cksum);
161     krb5_crypto_destroy(context, crypto);
162     free(data.data);
163     if (ret)
164         return ret;
165
166     ASN1_MALLOC_ENCODE(KRB5SignedPath, data.data, data.length, &sp, &size, ret);
167     free_Checksum(&sp.cksum);
168     if (ret)
169         return ret;
170     if (data.length != size)
171         krb5_abortx(context, "internal asn.1 encoder error");
172
173
174     /*
175      * Add IF-RELEVANT(KRB5SignedPath) to the last slot in
176      * authorization data field.
177      */
178
179     ret = _kdc_tkt_add_if_relevant_ad(context, tkt,
180                                       KRB5_AUTHDATA_SIGNTICKET, &data);
181     krb5_data_free(&data);
182
183     return ret;
184 }
185
186 static krb5_error_code
187 check_KRB5SignedPath(krb5_context context,
188                      krb5_kdc_configuration *config,
189                      hdb_entry_ex *krbtgt,
190                      krb5_principal cp,
191                      EncTicketPart *tkt,
192                      krb5_principals *delegated,
193                      int *signedpath)
194 {
195     krb5_error_code ret;
196     krb5_data data;
197     krb5_crypto crypto = NULL;
198
199     if (delegated)
200         *delegated = NULL;
201
202     ret = find_KRB5SignedPath(context, tkt->authorization_data, &data);
203     if (ret == 0) {
204         KRB5SignedPathData spd;
205         KRB5SignedPath sp;
206         size_t size = 0;
207
208         ret = decode_KRB5SignedPath(data.data, data.length, &sp, NULL);
209         krb5_data_free(&data);
210         if (ret)
211             return ret;
212
213         spd.client = cp;
214         spd.authtime = tkt->authtime;
215         spd.delegated = sp.delegated;
216         spd.method_data = sp.method_data;
217
218         ASN1_MALLOC_ENCODE(KRB5SignedPathData, data.data, data.length,
219                            &spd, &size, ret);
220         if (ret) {
221             free_KRB5SignedPath(&sp);
222             return ret;
223         }
224         if (data.length != size)
225             krb5_abortx(context, "internal asn.1 encoder error");
226
227         {
228             Key *key;
229             ret = hdb_enctype2key(context, &krbtgt->entry, sp.etype, &key);
230             if (ret == 0)
231                 ret = krb5_crypto_init(context, &key->key, 0, &crypto);
232             if (ret) {
233                 free(data.data);
234                 free_KRB5SignedPath(&sp);
235                 return ret;
236             }
237         }
238         ret = krb5_verify_checksum(context, crypto, KRB5_KU_KRB5SIGNEDPATH,
239                                    data.data, data.length,
240                                    &sp.cksum);
241         krb5_crypto_destroy(context, crypto);
242         free(data.data);
243         if (ret) {
244             free_KRB5SignedPath(&sp);
245             kdc_log(context, config, 5,
246                     "KRB5SignedPath not signed correctly, not marking as signed");
247             return 0;
248         }
249
250         if (delegated && sp.delegated) {
251
252             *delegated = malloc(sizeof(*sp.delegated));
253             if (*delegated == NULL) {
254                 free_KRB5SignedPath(&sp);
255                 return ENOMEM;
256             }
257
258             ret = copy_Principals(*delegated, sp.delegated);
259             if (ret) {
260                 free_KRB5SignedPath(&sp);
261                 free(*delegated);
262                 *delegated = NULL;
263                 return ret;
264             }
265         }
266         free_KRB5SignedPath(&sp);
267
268         *signedpath = 1;
269     }
270
271     return 0;
272 }
273
274 /*
275  *
276  */
277
278 static krb5_error_code
279 check_PAC(krb5_context context,
280           krb5_kdc_configuration *config,
281           const krb5_principal client_principal,
282           const krb5_principal delegated_proxy_principal,
283           hdb_entry_ex *client,
284           hdb_entry_ex *server,
285           hdb_entry_ex *krbtgt,
286           const EncryptionKey *server_check_key,
287           const EncryptionKey *krbtgt_check_key,
288           const EncryptionKey *server_sign_key,
289           const EncryptionKey *krbtgt_sign_key,
290           EncTicketPart *tkt,
291           krb5_data *rspac,
292           int *signedpath)
293 {
294     AuthorizationData *ad = tkt->authorization_data;
295     unsigned i, j;
296     krb5_error_code ret;
297
298     if (ad == NULL || ad->len == 0)
299         return 0;
300
301     for (i = 0; i < ad->len; i++) {
302         AuthorizationData child;
303
304         if (ad->val[i].ad_type != KRB5_AUTHDATA_IF_RELEVANT)
305             continue;
306
307         ret = decode_AuthorizationData(ad->val[i].ad_data.data,
308                                        ad->val[i].ad_data.length,
309                                        &child,
310                                        NULL);
311         if (ret) {
312             krb5_set_error_message(context, ret, "Failed to decode "
313                                    "IF_RELEVANT with %d", ret);
314             return ret;
315         }
316         for (j = 0; j < child.len; j++) {
317
318             if (child.val[j].ad_type == KRB5_AUTHDATA_WIN2K_PAC) {
319                 int signed_pac = 0;
320                 krb5_pac pac;
321
322                 /* Found PAC */
323                 ret = krb5_pac_parse(context,
324                                      child.val[j].ad_data.data,
325                                      child.val[j].ad_data.length,
326                                      &pac);
327                 free_AuthorizationData(&child);
328                 if (ret)
329                     return ret;
330
331                 ret = krb5_pac_verify(context, pac, tkt->authtime,
332                                       client_principal,
333                                       server_check_key, krbtgt_check_key);
334                 if (ret) {
335                     krb5_pac_free(context, pac);
336                     return ret;
337                 }
338
339                 ret = _kdc_pac_verify(context, client_principal,
340                                       delegated_proxy_principal,
341                                       client, server, krbtgt, &pac, &signed_pac);
342                 if (ret) {
343                     krb5_pac_free(context, pac);
344                     return ret;
345                 }
346
347                 /*
348                  * Only re-sign PAC if we could verify it with the PAC
349                  * function. The no-verify case happens when we get in
350                  * a PAC from cross realm from a Windows domain and
351                  * that there is no PAC verification function.
352                  */
353                 if (signed_pac) {
354                     *signedpath = 1;
355                     ret = _krb5_pac_sign(context, pac, tkt->authtime,
356                                          client_principal,
357                                          server_sign_key, krbtgt_sign_key, rspac);
358                 }
359                 krb5_pac_free(context, pac);
360
361                 return ret;
362             }
363         }
364         free_AuthorizationData(&child);
365     }
366     return 0;
367 }
368
369 /*
370  *
371  */
372
373 static krb5_error_code
374 check_tgs_flags(krb5_context context,
375                 krb5_kdc_configuration *config,
376                 KDC_REQ_BODY *b, const EncTicketPart *tgt, EncTicketPart *et)
377 {
378     KDCOptions f = b->kdc_options;
379
380     if(f.validate){
381         if(!tgt->flags.invalid || tgt->starttime == NULL){
382             kdc_log(context, config, 0,
383                     "Bad request to validate ticket");
384             return KRB5KDC_ERR_BADOPTION;
385         }
386         if(*tgt->starttime > kdc_time){
387             kdc_log(context, config, 0,
388                     "Early request to validate ticket");
389             return KRB5KRB_AP_ERR_TKT_NYV;
390         }
391         /* XXX  tkt = tgt */
392         et->flags.invalid = 0;
393     }else if(tgt->flags.invalid){
394         kdc_log(context, config, 0,
395                 "Ticket-granting ticket has INVALID flag set");
396         return KRB5KRB_AP_ERR_TKT_INVALID;
397     }
398
399     if(f.forwardable){
400         if(!tgt->flags.forwardable){
401             kdc_log(context, config, 0,
402                     "Bad request for forwardable ticket");
403             return KRB5KDC_ERR_BADOPTION;
404         }
405         et->flags.forwardable = 1;
406     }
407     if(f.forwarded){
408         if(!tgt->flags.forwardable){
409             kdc_log(context, config, 0,
410                     "Request to forward non-forwardable ticket");
411             return KRB5KDC_ERR_BADOPTION;
412         }
413         et->flags.forwarded = 1;
414         et->caddr = b->addresses;
415     }
416     if(tgt->flags.forwarded)
417         et->flags.forwarded = 1;
418
419     if(f.proxiable){
420         if(!tgt->flags.proxiable){
421             kdc_log(context, config, 0,
422                     "Bad request for proxiable ticket");
423             return KRB5KDC_ERR_BADOPTION;
424         }
425         et->flags.proxiable = 1;
426     }
427     if(f.proxy){
428         if(!tgt->flags.proxiable){
429             kdc_log(context, config, 0,
430                     "Request to proxy non-proxiable ticket");
431             return KRB5KDC_ERR_BADOPTION;
432         }
433         et->flags.proxy = 1;
434         et->caddr = b->addresses;
435     }
436     if(tgt->flags.proxy)
437         et->flags.proxy = 1;
438
439     if(f.allow_postdate){
440         if(!tgt->flags.may_postdate){
441             kdc_log(context, config, 0,
442                     "Bad request for post-datable ticket");
443             return KRB5KDC_ERR_BADOPTION;
444         }
445         et->flags.may_postdate = 1;
446     }
447     if(f.postdated){
448         if(!tgt->flags.may_postdate){
449             kdc_log(context, config, 0,
450                     "Bad request for postdated ticket");
451             return KRB5KDC_ERR_BADOPTION;
452         }
453         if(b->from)
454             *et->starttime = *b->from;
455         et->flags.postdated = 1;
456         et->flags.invalid = 1;
457     }else if(b->from && *b->from > kdc_time + context->max_skew){
458         kdc_log(context, config, 0, "Ticket cannot be postdated");
459         return KRB5KDC_ERR_CANNOT_POSTDATE;
460     }
461
462     if(f.renewable){
463         if(!tgt->flags.renewable || tgt->renew_till == NULL){
464             kdc_log(context, config, 0,
465                     "Bad request for renewable ticket");
466             return KRB5KDC_ERR_BADOPTION;
467         }
468         et->flags.renewable = 1;
469         ALLOC(et->renew_till);
470         _kdc_fix_time(&b->rtime);
471         *et->renew_till = *b->rtime;
472     }
473     if(f.renew){
474         time_t old_life;
475         if(!tgt->flags.renewable || tgt->renew_till == NULL){
476             kdc_log(context, config, 0,
477                     "Request to renew non-renewable ticket");
478             return KRB5KDC_ERR_BADOPTION;
479         }
480         old_life = tgt->endtime;
481         if(tgt->starttime)
482             old_life -= *tgt->starttime;
483         else
484             old_life -= tgt->authtime;
485         et->endtime = *et->starttime + old_life;
486         if (et->renew_till != NULL)
487             et->endtime = min(*et->renew_till, et->endtime);
488     }
489
490 #if 0
491     /* checks for excess flags */
492     if(f.request_anonymous && !config->allow_anonymous){
493         kdc_log(context, config, 0,
494                 "Request for anonymous ticket");
495         return KRB5KDC_ERR_BADOPTION;
496     }
497 #endif
498     return 0;
499 }
500
501 /*
502  * Determine if constrained delegation is allowed from this client to this server
503  */
504
505 static krb5_error_code
506 check_constrained_delegation(krb5_context context,
507                              krb5_kdc_configuration *config,
508                              HDB *clientdb,
509                              hdb_entry_ex *client,
510                              hdb_entry_ex *server,
511                              krb5_const_principal target)
512 {
513     const HDB_Ext_Constrained_delegation_acl *acl;
514     krb5_error_code ret;
515     size_t i;
516
517     /*
518      * constrained_delegation (S4U2Proxy) only works within
519      * the same realm. We use the already canonicalized version
520      * of the principals here, while "target" is the principal
521      * provided by the client.
522      */
523     if(!krb5_realm_compare(context, client->entry.principal, server->entry.principal)) {
524         ret = KRB5KDC_ERR_BADOPTION;
525         kdc_log(context, config, 0,
526             "Bad request for constrained delegation");
527         return ret;
528     }
529
530     if (clientdb->hdb_check_constrained_delegation) {
531         ret = clientdb->hdb_check_constrained_delegation(context, clientdb, client, target);
532         if (ret == 0)
533             return 0;
534     } else {
535         /* if client delegates to itself, that ok */
536         if (krb5_principal_compare(context, client->entry.principal, server->entry.principal) == TRUE)
537             return 0;
538
539         ret = hdb_entry_get_ConstrainedDelegACL(&client->entry, &acl);
540         if (ret) {
541             krb5_clear_error_message(context);
542             return ret;
543         }
544
545         if (acl) {
546             for (i = 0; i < acl->len; i++) {
547                 if (krb5_principal_compare(context, target, &acl->val[i]) == TRUE)
548                     return 0;
549             }
550         }
551         ret = KRB5KDC_ERR_BADOPTION;
552     }
553     kdc_log(context, config, 0,
554             "Bad request for constrained delegation");
555     return ret;
556 }
557
558 /*
559  * Determine if s4u2self is allowed from this client to this server
560  *
561  * For example, regardless of the principal being impersonated, if the
562  * 'client' and 'server' are the same, then it's safe.
563  */
564
565 static krb5_error_code
566 check_s4u2self(krb5_context context,
567                krb5_kdc_configuration *config,
568                HDB *clientdb,
569                hdb_entry_ex *client,
570                krb5_const_principal server)
571 {
572     krb5_error_code ret;
573
574     /* if client does a s4u2self to itself, that ok */
575     if (krb5_principal_compare(context, client->entry.principal, server) == TRUE)
576         return 0;
577
578     if (clientdb->hdb_check_s4u2self) {
579         ret = clientdb->hdb_check_s4u2self(context, clientdb, client, server);
580         if (ret == 0)
581             return 0;
582     } else {
583         ret = KRB5KDC_ERR_BADOPTION;
584     }
585     return ret;
586 }
587
588 /*
589  *
590  */
591
592 static krb5_error_code
593 verify_flags (krb5_context context,
594               krb5_kdc_configuration *config,
595               const EncTicketPart *et,
596               const char *pstr)
597 {
598     if(et->endtime < kdc_time){
599         kdc_log(context, config, 0, "Ticket expired (%s)", pstr);
600         return KRB5KRB_AP_ERR_TKT_EXPIRED;
601     }
602     if(et->flags.invalid){
603         kdc_log(context, config, 0, "Ticket not valid (%s)", pstr);
604         return KRB5KRB_AP_ERR_TKT_NYV;
605     }
606     return 0;
607 }
608
609 /*
610  *
611  */
612
613 static krb5_error_code
614 fix_transited_encoding(krb5_context context,
615                        krb5_kdc_configuration *config,
616                        krb5_boolean check_policy,
617                        const TransitedEncoding *tr,
618                        EncTicketPart *et,
619                        const char *client_realm,
620                        const char *server_realm,
621                        const char *tgt_realm)
622 {
623     krb5_error_code ret = 0;
624     char **realms, **tmp;
625     unsigned int num_realms;
626     size_t i;
627
628     switch (tr->tr_type) {
629     case DOMAIN_X500_COMPRESS:
630         break;
631     case 0:
632         /*
633          * Allow empty content of type 0 because that is was Microsoft
634          * generates in their TGT.
635          */
636         if (tr->contents.length == 0)
637             break;
638         kdc_log(context, config, 0,
639                 "Transited type 0 with non empty content");
640         return KRB5KDC_ERR_TRTYPE_NOSUPP;
641     default:
642         kdc_log(context, config, 0,
643                 "Unknown transited type: %u", tr->tr_type);
644         return KRB5KDC_ERR_TRTYPE_NOSUPP;
645     }
646
647     ret = krb5_domain_x500_decode(context,
648                                   tr->contents,
649                                   &realms,
650                                   &num_realms,
651                                   client_realm,
652                                   server_realm);
653     if(ret){
654         krb5_warn(context, ret,
655                   "Decoding transited encoding");
656         return ret;
657     }
658
659     /*
660      * If the realm of the presented tgt is neither the client nor the server
661      * realm, it is a transit realm and must be added to transited set.
662      */     
663     if(strcmp(client_realm, tgt_realm) && strcmp(server_realm, tgt_realm)) {
664         if (num_realms + 1 > UINT_MAX/sizeof(*realms)) {
665             ret = ERANGE;
666             goto free_realms;
667         }
668         tmp = realloc(realms, (num_realms + 1) * sizeof(*realms));
669         if(tmp == NULL){
670             ret = ENOMEM;
671             goto free_realms;
672         }
673         realms = tmp;
674         realms[num_realms] = strdup(tgt_realm);
675         if(realms[num_realms] == NULL){
676             ret = ENOMEM;
677             goto free_realms;
678         }
679         num_realms++;
680     }
681     if(num_realms == 0) {
682         if(strcmp(client_realm, server_realm))
683             kdc_log(context, config, 0,
684                     "cross-realm %s -> %s", client_realm, server_realm);
685     } else {
686         size_t l = 0;
687         char *rs;
688         for(i = 0; i < num_realms; i++)
689             l += strlen(realms[i]) + 2;
690         rs = malloc(l);
691         if(rs != NULL) {
692             *rs = '\0';
693             for(i = 0; i < num_realms; i++) {
694                 if(i > 0)
695                     strlcat(rs, ", ", l);
696                 strlcat(rs, realms[i], l);
697             }
698             kdc_log(context, config, 0,
699                     "cross-realm %s -> %s via [%s]",
700                     client_realm, server_realm, rs);
701             free(rs);
702         }
703     }
704     if(check_policy) {
705         ret = krb5_check_transited(context, client_realm,
706                                    server_realm,
707                                    realms, num_realms, NULL);
708         if(ret) {
709             krb5_warn(context, ret, "cross-realm %s -> %s",
710                       client_realm, server_realm);
711             goto free_realms;
712         }
713         et->flags.transited_policy_checked = 1;
714     }
715     et->transited.tr_type = DOMAIN_X500_COMPRESS;
716     ret = krb5_domain_x500_encode(realms, num_realms, &et->transited.contents);
717     if(ret)
718         krb5_warn(context, ret, "Encoding transited encoding");
719   free_realms:
720     for(i = 0; i < num_realms; i++)
721         free(realms[i]);
722     free(realms);
723     return ret;
724 }
725
726
727 static krb5_error_code
728 tgs_make_reply(krb5_context context,
729                krb5_kdc_configuration *config,
730                KDC_REQ_BODY *b,
731                krb5_const_principal tgt_name,
732                const EncTicketPart *tgt,
733                const krb5_keyblock *replykey,
734                int rk_is_subkey,
735                const EncryptionKey *serverkey,
736                const krb5_keyblock *sessionkey,
737                krb5_kvno kvno,
738                AuthorizationData *auth_data,
739                hdb_entry_ex *server,
740                krb5_principal server_principal,
741                const char *server_name,
742                hdb_entry_ex *client,
743                krb5_principal client_principal,
744                const char *tgt_realm,
745                hdb_entry_ex *krbtgt,
746                krb5_enctype krbtgt_etype,
747                krb5_principals spp,
748                const krb5_data *rspac,
749                const METHOD_DATA *enc_pa_data,
750                const char **e_text,
751                krb5_data *reply)
752 {
753     KDC_REP rep;
754     EncKDCRepPart ek;
755     EncTicketPart et;
756     KDCOptions f = b->kdc_options;
757     krb5_error_code ret;
758     int is_weak = 0;
759
760     memset(&rep, 0, sizeof(rep));
761     memset(&et, 0, sizeof(et));
762     memset(&ek, 0, sizeof(ek));
763
764     rep.pvno = 5;
765     rep.msg_type = krb_tgs_rep;
766
767     et.authtime = tgt->authtime;
768     _kdc_fix_time(&b->till);
769     et.endtime = min(tgt->endtime, *b->till);
770     ALLOC(et.starttime);
771     *et.starttime = kdc_time;
772
773     ret = check_tgs_flags(context, config, b, tgt, &et);
774     if(ret)
775         goto out;
776
777     /* We should check the transited encoding if:
778        1) the request doesn't ask not to be checked
779        2) globally enforcing a check
780        3) principal requires checking
781        4) we allow non-check per-principal, but principal isn't marked as allowing this
782        5) we don't globally allow this
783     */
784
785 #define GLOBAL_FORCE_TRANSITED_CHECK            \
786     (config->trpolicy == TRPOLICY_ALWAYS_CHECK)
787 #define GLOBAL_ALLOW_PER_PRINCIPAL                      \
788     (config->trpolicy == TRPOLICY_ALLOW_PER_PRINCIPAL)
789 #define GLOBAL_ALLOW_DISABLE_TRANSITED_CHECK                    \
790     (config->trpolicy == TRPOLICY_ALWAYS_HONOUR_REQUEST)
791
792 /* these will consult the database in future release */
793 #define PRINCIPAL_FORCE_TRANSITED_CHECK(P)              0
794 #define PRINCIPAL_ALLOW_DISABLE_TRANSITED_CHECK(P)      0
795
796     ret = fix_transited_encoding(context, config,
797                                  !f.disable_transited_check ||
798                                  GLOBAL_FORCE_TRANSITED_CHECK ||
799                                  PRINCIPAL_FORCE_TRANSITED_CHECK(server) ||
800                                  !((GLOBAL_ALLOW_PER_PRINCIPAL &&
801                                     PRINCIPAL_ALLOW_DISABLE_TRANSITED_CHECK(server)) ||
802                                    GLOBAL_ALLOW_DISABLE_TRANSITED_CHECK),
803                                  &tgt->transited, &et,
804                                  krb5_principal_get_realm(context, client_principal),
805                                  krb5_principal_get_realm(context, server->entry.principal),
806                                  tgt_realm);
807     if(ret)
808         goto out;
809
810     copy_Realm(&server_principal->realm, &rep.ticket.realm);
811     _krb5_principal2principalname(&rep.ticket.sname, server_principal);
812     copy_Realm(&tgt_name->realm, &rep.crealm);
813 /*
814     if (f.request_anonymous)
815         _kdc_make_anonymous_principalname (&rep.cname);
816     else */
817
818     copy_PrincipalName(&tgt_name->name, &rep.cname);
819     rep.ticket.tkt_vno = 5;
820
821     ek.caddr = et.caddr;
822     if(et.caddr == NULL)
823         et.caddr = tgt->caddr;
824
825     {
826         time_t life;
827         life = et.endtime - *et.starttime;
828         if(client && client->entry.max_life)
829             life = min(life, *client->entry.max_life);
830         if(server->entry.max_life)
831             life = min(life, *server->entry.max_life);
832         et.endtime = *et.starttime + life;
833     }
834     if(f.renewable_ok && tgt->flags.renewable &&
835        et.renew_till == NULL && et.endtime < *b->till &&
836        tgt->renew_till != NULL)
837     {
838         et.flags.renewable = 1;
839         ALLOC(et.renew_till);
840         *et.renew_till = *b->till;
841     }
842     if(et.renew_till){
843         time_t renew;
844         renew = *et.renew_till - et.authtime;
845         if(client && client->entry.max_renew)
846             renew = min(renew, *client->entry.max_renew);
847         if(server->entry.max_renew)
848             renew = min(renew, *server->entry.max_renew);
849         *et.renew_till = et.authtime + renew;
850     }
851
852     if(et.renew_till){
853         *et.renew_till = min(*et.renew_till, *tgt->renew_till);
854         *et.starttime = min(*et.starttime, *et.renew_till);
855         et.endtime = min(et.endtime, *et.renew_till);
856     }
857
858     *et.starttime = min(*et.starttime, et.endtime);
859
860     if(*et.starttime == et.endtime){
861         ret = KRB5KDC_ERR_NEVER_VALID;
862         goto out;
863     }
864     if(et.renew_till && et.endtime == *et.renew_till){
865         free(et.renew_till);
866         et.renew_till = NULL;
867         et.flags.renewable = 0;
868     }
869
870     et.flags.pre_authent = tgt->flags.pre_authent;
871     et.flags.hw_authent  = tgt->flags.hw_authent;
872     et.flags.anonymous   = tgt->flags.anonymous;
873     et.flags.ok_as_delegate = server->entry.flags.ok_as_delegate;
874
875     if(rspac->length) {
876         /*
877          * No not need to filter out the any PAC from the
878          * auth_data since it's signed by the KDC.
879          */
880         ret = _kdc_tkt_add_if_relevant_ad(context, &et,
881                                           KRB5_AUTHDATA_WIN2K_PAC, rspac);
882         if (ret)
883             goto out;
884     }
885
886     if (auth_data) {
887         unsigned int i = 0;
888
889         /* XXX check authdata */
890
891         if (et.authorization_data == NULL) {
892             et.authorization_data = calloc(1, sizeof(*et.authorization_data));
893             if (et.authorization_data == NULL) {
894                 ret = ENOMEM;
895                 krb5_set_error_message(context, ret, "malloc: out of memory");
896                 goto out;
897             }
898         }
899         for(i = 0; i < auth_data->len ; i++) {
900             ret = add_AuthorizationData(et.authorization_data, &auth_data->val[i]);
901             if (ret) {
902                 krb5_set_error_message(context, ret, "malloc: out of memory");
903                 goto out;
904             }
905         }
906
907         /* Filter out type KRB5SignedPath */
908         ret = find_KRB5SignedPath(context, et.authorization_data, NULL);
909         if (ret == 0) {
910             if (et.authorization_data->len == 1) {
911                 free_AuthorizationData(et.authorization_data);
912                 free(et.authorization_data);
913                 et.authorization_data = NULL;
914             } else {
915                 AuthorizationData *ad = et.authorization_data;
916                 free_AuthorizationDataElement(&ad->val[ad->len - 1]);
917                 ad->len--;
918             }
919         }
920     }
921
922     ret = krb5_copy_keyblock_contents(context, sessionkey, &et.key);
923     if (ret)
924         goto out;
925     et.crealm = tgt_name->realm;
926     et.cname = tgt_name->name;
927
928     ek.key = et.key;
929     /* MIT must have at least one last_req */
930     ek.last_req.len = 1;
931     ek.last_req.val = calloc(1, sizeof(*ek.last_req.val));
932     if (ek.last_req.val == NULL) {
933         ret = ENOMEM;
934         goto out;
935     }
936     ek.nonce = b->nonce;
937     ek.flags = et.flags;
938     ek.authtime = et.authtime;
939     ek.starttime = et.starttime;
940     ek.endtime = et.endtime;
941     ek.renew_till = et.renew_till;
942     ek.srealm = rep.ticket.realm;
943     ek.sname = rep.ticket.sname;
944
945     _kdc_log_timestamp(context, config, "TGS-REQ", et.authtime, et.starttime,
946                        et.endtime, et.renew_till);
947
948     /* Don't sign cross realm tickets, they can't be checked anyway */
949     {
950         char *r = get_krbtgt_realm(&ek.sname);
951
952         if (r == NULL || strcmp(r, ek.srealm) == 0) {
953             ret = _kdc_add_KRB5SignedPath(context,
954                                           config,
955                                           krbtgt,
956                                           krbtgt_etype,
957                                           client_principal,
958                                           NULL,
959                                           spp,
960                                           &et);
961             if (ret)
962                 goto out;
963         }
964     }
965
966     if (enc_pa_data->len) {
967         rep.padata = calloc(1, sizeof(*rep.padata));
968         if (rep.padata == NULL) {
969             ret = ENOMEM;
970             goto out;
971         }
972         ret = copy_METHOD_DATA(enc_pa_data, rep.padata);
973         if (ret)
974             goto out;
975     }
976
977     if (krb5_enctype_valid(context, et.key.keytype) != 0
978         && _kdc_is_weak_exception(server->entry.principal, et.key.keytype))
979     {
980         krb5_enctype_enable(context, et.key.keytype);
981         is_weak = 1;
982     }
983
984
985     /* It is somewhat unclear where the etype in the following
986        encryption should come from. What we have is a session
987        key in the passed tgt, and a list of preferred etypes
988        *for the new ticket*. Should we pick the best possible
989        etype, given the keytype in the tgt, or should we look
990        at the etype list here as well?  What if the tgt
991        session key is DES3 and we want a ticket with a (say)
992        CAST session key. Should the DES3 etype be added to the
993        etype list, even if we don't want a session key with
994        DES3? */
995     ret = _kdc_encode_reply(context, config,
996                             &rep, &et, &ek, et.key.keytype,
997                             kvno,
998                             serverkey, 0, replykey, rk_is_subkey,
999                             e_text, reply);
1000     if (is_weak)
1001         krb5_enctype_disable(context, et.key.keytype);
1002
1003 out:
1004     free_TGS_REP(&rep);
1005     free_TransitedEncoding(&et.transited);
1006     if(et.starttime)
1007         free(et.starttime);
1008     if(et.renew_till)
1009         free(et.renew_till);
1010     if(et.authorization_data) {
1011         free_AuthorizationData(et.authorization_data);
1012         free(et.authorization_data);
1013     }
1014     free_LastReq(&ek.last_req);
1015     memset(et.key.keyvalue.data, 0, et.key.keyvalue.length);
1016     free_EncryptionKey(&et.key);
1017     return ret;
1018 }
1019
1020 static krb5_error_code
1021 tgs_check_authenticator(krb5_context context,
1022                         krb5_kdc_configuration *config,
1023                         krb5_auth_context ac,
1024                         KDC_REQ_BODY *b,
1025                         const char **e_text,
1026                         krb5_keyblock *key)
1027 {
1028     krb5_authenticator auth;
1029     size_t len = 0;
1030     unsigned char *buf;
1031     size_t buf_size;
1032     krb5_error_code ret;
1033     krb5_crypto crypto;
1034
1035     krb5_auth_con_getauthenticator(context, ac, &auth);
1036     if(auth->cksum == NULL){
1037         kdc_log(context, config, 0, "No authenticator in request");
1038         ret = KRB5KRB_AP_ERR_INAPP_CKSUM;
1039         goto out;
1040     }
1041     /*
1042      * according to RFC1510 it doesn't need to be keyed,
1043      * but according to the latest draft it needs to.
1044      */
1045     if (
1046 #if 0
1047 !krb5_checksum_is_keyed(context, auth->cksum->cksumtype)
1048         ||
1049 #endif
1050  !krb5_checksum_is_collision_proof(context, auth->cksum->cksumtype)) {
1051         kdc_log(context, config, 0, "Bad checksum type in authenticator: %d",
1052                 auth->cksum->cksumtype);
1053         ret =  KRB5KRB_AP_ERR_INAPP_CKSUM;
1054         goto out;
1055     }
1056
1057     /* XXX should not re-encode this */
1058     ASN1_MALLOC_ENCODE(KDC_REQ_BODY, buf, buf_size, b, &len, ret);
1059     if(ret){
1060         const char *msg = krb5_get_error_message(context, ret);
1061         kdc_log(context, config, 0, "Failed to encode KDC-REQ-BODY: %s", msg);
1062         krb5_free_error_message(context, msg);
1063         goto out;
1064     }
1065     if(buf_size != len) {
1066         free(buf);
1067         kdc_log(context, config, 0, "Internal error in ASN.1 encoder");
1068         *e_text = "KDC internal error";
1069         ret = KRB5KRB_ERR_GENERIC;
1070         goto out;
1071     }
1072     ret = krb5_crypto_init(context, key, 0, &crypto);
1073     if (ret) {
1074         const char *msg = krb5_get_error_message(context, ret);
1075         free(buf);
1076         kdc_log(context, config, 0, "krb5_crypto_init failed: %s", msg);
1077         krb5_free_error_message(context, msg);
1078         goto out;
1079     }
1080     ret = krb5_verify_checksum(context,
1081                                crypto,
1082                                KRB5_KU_TGS_REQ_AUTH_CKSUM,
1083                                buf,
1084                                len,
1085                                auth->cksum);
1086     free(buf);
1087     krb5_crypto_destroy(context, crypto);
1088     if(ret){
1089         const char *msg = krb5_get_error_message(context, ret);
1090         kdc_log(context, config, 0,
1091                 "Failed to verify authenticator checksum: %s", msg);
1092         krb5_free_error_message(context, msg);
1093     }
1094 out:
1095     free_Authenticator(auth);
1096     free(auth);
1097     return ret;
1098 }
1099
1100 /*
1101  *
1102  */
1103
1104 static const char *
1105 find_rpath(krb5_context context, Realm crealm, Realm srealm)
1106 {
1107     const char *new_realm = krb5_config_get_string(context,
1108                                                    NULL,
1109                                                    "capaths",
1110                                                    crealm,
1111                                                    srealm,
1112                                                    NULL);
1113     return new_realm;
1114 }
1115
1116
1117 static krb5_boolean
1118 need_referral(krb5_context context, krb5_kdc_configuration *config,
1119               const KDCOptions * const options, krb5_principal server,
1120               krb5_realm **realms)
1121 {
1122     const char *name;
1123
1124     if(!options->canonicalize && server->name.name_type != KRB5_NT_SRV_INST)
1125         return FALSE;
1126
1127     if (server->name.name_string.len == 1)
1128         name = server->name.name_string.val[0];
1129     else if (server->name.name_string.len > 1)
1130         name = server->name.name_string.val[1];
1131     else
1132         return FALSE;
1133
1134     kdc_log(context, config, 0, "Searching referral for %s", name);
1135
1136     return _krb5_get_host_realm_int(context, name, FALSE, realms) == 0;
1137 }
1138
1139 static krb5_error_code
1140 tgs_parse_request(krb5_context context,
1141                   krb5_kdc_configuration *config,
1142                   KDC_REQ_BODY *b,
1143                   const PA_DATA *tgs_req,
1144                   hdb_entry_ex **krbtgt,
1145                   krb5_enctype *krbtgt_etype,
1146                   krb5_ticket **ticket,
1147                   const char **e_text,
1148                   const char *from,
1149                   const struct sockaddr *from_addr,
1150                   time_t **csec,
1151                   int **cusec,
1152                   AuthorizationData **auth_data,
1153                   krb5_keyblock **replykey,
1154                   int *rk_is_subkey)
1155 {
1156     static char failed[] = "<unparse_name failed>";
1157     krb5_ap_req ap_req;
1158     krb5_error_code ret;
1159     krb5_principal princ;
1160     krb5_auth_context ac = NULL;
1161     krb5_flags ap_req_options;
1162     krb5_flags verify_ap_req_flags;
1163     krb5_crypto crypto;
1164     Key *tkey;
1165     krb5_keyblock *subkey = NULL;
1166     unsigned usage;
1167
1168     *auth_data = NULL;
1169     *csec  = NULL;
1170     *cusec = NULL;
1171     *replykey = NULL;
1172
1173     memset(&ap_req, 0, sizeof(ap_req));
1174     ret = krb5_decode_ap_req(context, &tgs_req->padata_value, &ap_req);
1175     if(ret){
1176         const char *msg = krb5_get_error_message(context, ret);
1177         kdc_log(context, config, 0, "Failed to decode AP-REQ: %s", msg);
1178         krb5_free_error_message(context, msg);
1179         goto out;
1180     }
1181
1182     if(!get_krbtgt_realm(&ap_req.ticket.sname)){
1183         /* XXX check for ticket.sname == req.sname */
1184         kdc_log(context, config, 0, "PA-DATA is not a ticket-granting ticket");
1185         ret = KRB5KDC_ERR_POLICY; /* ? */
1186         goto out;
1187     }
1188
1189     _krb5_principalname2krb5_principal(context,
1190                                        &princ,
1191                                        ap_req.ticket.sname,
1192                                        ap_req.ticket.realm);
1193
1194     ret = _kdc_db_fetch(context, config, princ, HDB_F_GET_KRBTGT, ap_req.ticket.enc_part.kvno, NULL, krbtgt);
1195
1196     if(ret == HDB_ERR_NOT_FOUND_HERE) {
1197         char *p;
1198         ret = krb5_unparse_name(context, princ, &p);
1199         if (ret != 0)
1200             p = failed;
1201         krb5_free_principal(context, princ);
1202         kdc_log(context, config, 5, "Ticket-granting ticket account %s does not have secrets at this KDC, need to proxy", p);
1203         if (ret == 0)
1204             free(p);
1205         ret = HDB_ERR_NOT_FOUND_HERE;
1206         goto out;
1207     } else if(ret){
1208         const char *msg = krb5_get_error_message(context, ret);
1209         char *p;
1210         ret = krb5_unparse_name(context, princ, &p);
1211         if (ret != 0)
1212             p = failed;
1213         krb5_free_principal(context, princ);
1214         kdc_log(context, config, 0,
1215                 "Ticket-granting ticket not found in database: %s", msg);
1216         krb5_free_error_message(context, msg);
1217         if (ret == 0)
1218             free(p);
1219         ret = KRB5KRB_AP_ERR_NOT_US;
1220         goto out;
1221     }
1222
1223     if(ap_req.ticket.enc_part.kvno &&
1224        *ap_req.ticket.enc_part.kvno != (*krbtgt)->entry.kvno){
1225         char *p;
1226
1227         ret = krb5_unparse_name (context, princ, &p);
1228         krb5_free_principal(context, princ);
1229         if (ret != 0)
1230             p = failed;
1231         kdc_log(context, config, 0,
1232                 "Ticket kvno = %d, DB kvno = %d (%s)",
1233                 *ap_req.ticket.enc_part.kvno,
1234                 (*krbtgt)->entry.kvno,
1235                 p);
1236         if (ret == 0)
1237             free (p);
1238         ret = KRB5KRB_AP_ERR_BADKEYVER;
1239         goto out;
1240     }
1241
1242     *krbtgt_etype = ap_req.ticket.enc_part.etype;
1243
1244     ret = hdb_enctype2key(context, &(*krbtgt)->entry,
1245                           ap_req.ticket.enc_part.etype, &tkey);
1246     if(ret){
1247         char *str = NULL, *p = NULL;
1248
1249         krb5_enctype_to_string(context, ap_req.ticket.enc_part.etype, &str);
1250         krb5_unparse_name(context, princ, &p);
1251         kdc_log(context, config, 0,
1252                 "No server key with enctype %s found for %s",
1253                 str ? str : "<unknown enctype>",
1254                 p ? p : "<unparse_name failed>");
1255         free(str);
1256         free(p);
1257         ret = KRB5KRB_AP_ERR_BADKEYVER;
1258         goto out;
1259     }
1260
1261     if (b->kdc_options.validate)
1262         verify_ap_req_flags = KRB5_VERIFY_AP_REQ_IGNORE_INVALID;
1263     else
1264         verify_ap_req_flags = 0;
1265
1266     ret = krb5_verify_ap_req2(context,
1267                               &ac,
1268                               &ap_req,
1269                               princ,
1270                               &tkey->key,
1271                               verify_ap_req_flags,
1272                               &ap_req_options,
1273                               ticket,
1274                               KRB5_KU_TGS_REQ_AUTH);
1275
1276     krb5_free_principal(context, princ);
1277     if(ret) {
1278         const char *msg = krb5_get_error_message(context, ret);
1279         kdc_log(context, config, 0, "Failed to verify AP-REQ: %s", msg);
1280         krb5_free_error_message(context, msg);
1281         goto out;
1282     }
1283
1284     {
1285         krb5_authenticator auth;
1286
1287         ret = krb5_auth_con_getauthenticator(context, ac, &auth);
1288         if (ret == 0) {
1289             *csec   = malloc(sizeof(**csec));
1290             if (*csec == NULL) {
1291                 krb5_free_authenticator(context, &auth);
1292                 kdc_log(context, config, 0, "malloc failed");
1293                 goto out;
1294             }
1295             **csec  = auth->ctime;
1296             *cusec  = malloc(sizeof(**cusec));
1297             if (*cusec == NULL) {
1298                 krb5_free_authenticator(context, &auth);
1299                 kdc_log(context, config, 0, "malloc failed");
1300                 goto out;
1301             }
1302             **cusec  = auth->cusec;
1303             krb5_free_authenticator(context, &auth);
1304         }
1305     }
1306
1307     ret = tgs_check_authenticator(context, config,
1308                                   ac, b, e_text, &(*ticket)->ticket.key);
1309     if (ret) {
1310         krb5_auth_con_free(context, ac);
1311         goto out;
1312     }
1313
1314     usage = KRB5_KU_TGS_REQ_AUTH_DAT_SUBKEY;
1315     *rk_is_subkey = 1;
1316
1317     ret = krb5_auth_con_getremotesubkey(context, ac, &subkey);
1318     if(ret){
1319         const char *msg = krb5_get_error_message(context, ret);
1320         krb5_auth_con_free(context, ac);
1321         kdc_log(context, config, 0, "Failed to get remote subkey: %s", msg);
1322         krb5_free_error_message(context, msg);
1323         goto out;
1324     }
1325     if(subkey == NULL){
1326         usage = KRB5_KU_TGS_REQ_AUTH_DAT_SESSION;
1327         *rk_is_subkey = 0;
1328
1329         ret = krb5_auth_con_getkey(context, ac, &subkey);
1330         if(ret) {
1331             const char *msg = krb5_get_error_message(context, ret);
1332             krb5_auth_con_free(context, ac);
1333             kdc_log(context, config, 0, "Failed to get session key: %s", msg);
1334             krb5_free_error_message(context, msg);
1335             goto out;
1336         }
1337     }
1338     if(subkey == NULL){
1339         krb5_auth_con_free(context, ac);
1340         kdc_log(context, config, 0,
1341                 "Failed to get key for enc-authorization-data");
1342         ret = KRB5KRB_AP_ERR_BAD_INTEGRITY; /* ? */
1343         goto out;
1344     }
1345
1346     *replykey = subkey;
1347
1348     if (b->enc_authorization_data) {
1349         krb5_data ad;
1350
1351         ret = krb5_crypto_init(context, subkey, 0, &crypto);
1352         if (ret) {
1353             const char *msg = krb5_get_error_message(context, ret);
1354             krb5_auth_con_free(context, ac);
1355             kdc_log(context, config, 0, "krb5_crypto_init failed: %s", msg);
1356             krb5_free_error_message(context, msg);
1357             goto out;
1358         }
1359         ret = krb5_decrypt_EncryptedData (context,
1360                                           crypto,
1361                                           usage,
1362                                           b->enc_authorization_data,
1363                                           &ad);
1364         krb5_crypto_destroy(context, crypto);
1365         if(ret){
1366             krb5_auth_con_free(context, ac);
1367             kdc_log(context, config, 0,
1368                     "Failed to decrypt enc-authorization-data");
1369             ret = KRB5KRB_AP_ERR_BAD_INTEGRITY; /* ? */
1370             goto out;
1371         }
1372         ALLOC(*auth_data);
1373         if (*auth_data == NULL) {
1374             krb5_auth_con_free(context, ac);
1375             ret = KRB5KRB_AP_ERR_BAD_INTEGRITY; /* ? */
1376             goto out;
1377         }
1378         ret = decode_AuthorizationData(ad.data, ad.length, *auth_data, NULL);
1379         if(ret){
1380             krb5_auth_con_free(context, ac);
1381             free(*auth_data);
1382             *auth_data = NULL;
1383             kdc_log(context, config, 0, "Failed to decode authorization data");
1384             ret = KRB5KRB_AP_ERR_BAD_INTEGRITY; /* ? */
1385             goto out;
1386         }
1387     }
1388
1389     krb5_auth_con_free(context, ac);
1390
1391 out:
1392     free_AP_REQ(&ap_req);
1393
1394     return ret;
1395 }
1396
1397 static krb5_error_code
1398 build_server_referral(krb5_context context,
1399                       krb5_kdc_configuration *config,
1400                       krb5_crypto session,
1401                       krb5_const_realm referred_realm,
1402                       const PrincipalName *true_principal_name,
1403                       const PrincipalName *requested_principal,
1404                       krb5_data *outdata)
1405 {
1406     PA_ServerReferralData ref;
1407     krb5_error_code ret;
1408     EncryptedData ed;
1409     krb5_data data;
1410     size_t size = 0;
1411
1412     memset(&ref, 0, sizeof(ref));
1413
1414     if (referred_realm) {
1415         ALLOC(ref.referred_realm);
1416         if (ref.referred_realm == NULL)
1417             goto eout;
1418         *ref.referred_realm = strdup(referred_realm);
1419         if (*ref.referred_realm == NULL)
1420             goto eout;
1421     }
1422     if (true_principal_name) {
1423         ALLOC(ref.true_principal_name);
1424         if (ref.true_principal_name == NULL)
1425             goto eout;
1426         ret = copy_PrincipalName(true_principal_name, ref.true_principal_name);
1427         if (ret)
1428             goto eout;
1429     }
1430     if (requested_principal) {
1431         ALLOC(ref.requested_principal_name);
1432         if (ref.requested_principal_name == NULL)
1433             goto eout;
1434         ret = copy_PrincipalName(requested_principal,
1435                                  ref.requested_principal_name);
1436         if (ret)
1437             goto eout;
1438     }
1439
1440     ASN1_MALLOC_ENCODE(PA_ServerReferralData,
1441                        data.data, data.length,
1442                        &ref, &size, ret);
1443     free_PA_ServerReferralData(&ref);
1444     if (ret)
1445         return ret;
1446     if (data.length != size)
1447         krb5_abortx(context, "internal asn.1 encoder error");
1448
1449     ret = krb5_encrypt_EncryptedData(context, session,
1450                                      KRB5_KU_PA_SERVER_REFERRAL,
1451                                      data.data, data.length,
1452                                      0 /* kvno */, &ed);
1453     free(data.data);
1454     if (ret)
1455         return ret;
1456
1457     ASN1_MALLOC_ENCODE(EncryptedData,
1458                        outdata->data, outdata->length,
1459                        &ed, &size, ret);
1460     free_EncryptedData(&ed);
1461     if (ret)
1462         return ret;
1463     if (outdata->length != size)
1464         krb5_abortx(context, "internal asn.1 encoder error");
1465
1466     return 0;
1467 eout:
1468     free_PA_ServerReferralData(&ref);
1469     krb5_set_error_message(context, ENOMEM, "malloc: out of memory");
1470     return ENOMEM;
1471 }
1472
1473 static krb5_error_code
1474 tgs_build_reply(krb5_context context,
1475                 krb5_kdc_configuration *config,
1476                 KDC_REQ *req,
1477                 KDC_REQ_BODY *b,
1478                 hdb_entry_ex *krbtgt,
1479                 krb5_enctype krbtgt_etype,
1480                 const krb5_keyblock *replykey,
1481                 int rk_is_subkey,
1482                 krb5_ticket *ticket,
1483                 krb5_data *reply,
1484                 const char *from,
1485                 const char **e_text,
1486                 AuthorizationData **auth_data,
1487                 const struct sockaddr *from_addr)
1488 {
1489     krb5_error_code ret;
1490     krb5_principal cp = NULL, sp = NULL, rsp = NULL, tp = NULL, dp = NULL;
1491     krb5_principal krbtgt_principal = NULL;
1492     char *spn = NULL, *cpn = NULL, *tpn = NULL, *dpn = NULL;
1493     hdb_entry_ex *server = NULL, *client = NULL, *s4u2self_impersonated_client = NULL;
1494     HDB *clientdb, *s4u2self_impersonated_clientdb;
1495     krb5_realm ref_realm = NULL;
1496     EncTicketPart *tgt = &ticket->ticket;
1497     krb5_principals spp = NULL;
1498     const EncryptionKey *ekey;
1499     krb5_keyblock sessionkey;
1500     krb5_kvno kvno;
1501     krb5_data rspac;
1502     const char *tgt_realm = /* Realm of TGT issuer */
1503         krb5_principal_get_realm(context, krbtgt->entry.principal);
1504
1505     hdb_entry_ex *krbtgt_out = NULL;
1506
1507     METHOD_DATA enc_pa_data;
1508
1509     PrincipalName *s;
1510     Realm r;
1511     int nloop = 0;
1512     EncTicketPart adtkt;
1513     char opt_str[128];
1514     int signedpath = 0;
1515
1516     Key *tkey_check;
1517     Key *tkey_sign;
1518     int flags = HDB_F_FOR_TGS_REQ;
1519
1520     memset(&sessionkey, 0, sizeof(sessionkey));
1521     memset(&adtkt, 0, sizeof(adtkt));
1522     krb5_data_zero(&rspac);
1523     memset(&enc_pa_data, 0, sizeof(enc_pa_data));
1524
1525     s = b->sname;
1526     r = b->realm;
1527
1528     /* 
1529      * Always to do CANON, see comment below about returned server principal (rsp).
1530      */
1531     flags |= HDB_F_CANON;
1532
1533     if(b->kdc_options.enc_tkt_in_skey){
1534         Ticket *t;
1535         hdb_entry_ex *uu;
1536         krb5_principal p;
1537         Key *uukey;
1538
1539         if(b->additional_tickets == NULL ||
1540            b->additional_tickets->len == 0){
1541             ret = KRB5KDC_ERR_BADOPTION; /* ? */
1542             kdc_log(context, config, 0,
1543                     "No second ticket present in request");
1544             goto out;
1545         }
1546         t = &b->additional_tickets->val[0];
1547         if(!get_krbtgt_realm(&t->sname)){
1548             kdc_log(context, config, 0,
1549                     "Additional ticket is not a ticket-granting ticket");
1550             ret = KRB5KDC_ERR_POLICY;
1551             goto out;
1552         }
1553         _krb5_principalname2krb5_principal(context, &p, t->sname, t->realm);
1554         ret = _kdc_db_fetch(context, config, p,
1555                             HDB_F_GET_KRBTGT, t->enc_part.kvno,
1556                             NULL, &uu);
1557         krb5_free_principal(context, p);
1558         if(ret){
1559             if (ret == HDB_ERR_NOENTRY)
1560                 ret = KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN;
1561             goto out;
1562         }
1563         ret = hdb_enctype2key(context, &uu->entry,
1564                               t->enc_part.etype, &uukey);
1565         if(ret){
1566             _kdc_free_ent(context, uu);
1567             ret = KRB5KDC_ERR_ETYPE_NOSUPP; /* XXX */
1568             goto out;
1569         }
1570         ret = krb5_decrypt_ticket(context, t, &uukey->key, &adtkt, 0);
1571         _kdc_free_ent(context, uu);
1572         if(ret)
1573             goto out;
1574
1575         ret = verify_flags(context, config, &adtkt, spn);
1576         if (ret)
1577             goto out;
1578
1579         s = &adtkt.cname;
1580         r = adtkt.crealm;
1581     }
1582
1583     _krb5_principalname2krb5_principal(context, &sp, *s, r);
1584     ret = krb5_unparse_name(context, sp, &spn);
1585     if (ret)
1586         goto out;
1587     _krb5_principalname2krb5_principal(context, &cp, tgt->cname, tgt->crealm);
1588     ret = krb5_unparse_name(context, cp, &cpn);
1589     if (ret)
1590         goto out;
1591     unparse_flags (KDCOptions2int(b->kdc_options),
1592                    asn1_KDCOptions_units(),
1593                    opt_str, sizeof(opt_str));
1594     if(*opt_str)
1595         kdc_log(context, config, 0,
1596                 "TGS-REQ %s from %s for %s [%s]",
1597                 cpn, from, spn, opt_str);
1598     else
1599         kdc_log(context, config, 0,
1600                 "TGS-REQ %s from %s for %s", cpn, from, spn);
1601
1602     /*
1603      * Fetch server
1604      */
1605
1606 server_lookup:
1607     ret = _kdc_db_fetch(context, config, sp, HDB_F_GET_SERVER | flags,
1608                         NULL, NULL, &server);
1609
1610     if(ret == HDB_ERR_NOT_FOUND_HERE) {
1611         kdc_log(context, config, 5, "target %s does not have secrets at this KDC, need to proxy", sp);
1612         goto out;
1613     } else if(ret){
1614         const char *new_rlm, *msg;
1615         Realm req_rlm;
1616         krb5_realm *realms;
1617
1618         if ((req_rlm = get_krbtgt_realm(&sp->name)) != NULL) {
1619             if(nloop++ < 2) {
1620                 new_rlm = find_rpath(context, tgt->crealm, req_rlm);
1621                 if(new_rlm) {
1622                     kdc_log(context, config, 5, "krbtgt for realm %s "
1623                             "not found, trying %s",
1624                             req_rlm, new_rlm);
1625                     krb5_free_principal(context, sp);
1626                     free(spn);
1627                     krb5_make_principal(context, &sp, r,
1628                                         KRB5_TGS_NAME, new_rlm, NULL);
1629                     ret = krb5_unparse_name(context, sp, &spn);
1630                     if (ret)
1631                         goto out;
1632
1633                     if (ref_realm)
1634                         free(ref_realm);
1635                     ref_realm = strdup(new_rlm);
1636                     goto server_lookup;
1637                 }
1638             }
1639         } else if(need_referral(context, config, &b->kdc_options, sp, &realms)) {
1640             if (strcmp(realms[0], sp->realm) != 0) {
1641                 kdc_log(context, config, 5,
1642                         "Returning a referral to realm %s for "
1643                         "server %s that was not found",
1644                         realms[0], spn);
1645                 krb5_free_principal(context, sp);
1646                 free(spn);
1647                 krb5_make_principal(context, &sp, r, KRB5_TGS_NAME,
1648                                     realms[0], NULL);
1649                 ret = krb5_unparse_name(context, sp, &spn);
1650                 if (ret)
1651                     goto out;
1652
1653                 if (ref_realm)
1654                     free(ref_realm);
1655                 ref_realm = strdup(realms[0]);
1656
1657                 krb5_free_host_realm(context, realms);
1658                 goto server_lookup;
1659             }
1660             krb5_free_host_realm(context, realms);
1661         }
1662         msg = krb5_get_error_message(context, ret);
1663         kdc_log(context, config, 0,
1664                 "Server not found in database: %s: %s", spn, msg);
1665         krb5_free_error_message(context, msg);
1666         if (ret == HDB_ERR_NOENTRY)
1667             ret = KRB5KDC_ERR_S_PRINCIPAL_UNKNOWN;
1668         goto out;
1669     }
1670
1671     /* the name returned to the client depend on what was asked for,
1672      * return canonical name if kdc_options.canonicalize was set, the
1673      * client wants the true name of the principal, if not it just
1674      * wants the name its asked for.
1675      */
1676
1677     if (b->kdc_options.canonicalize)
1678         rsp = server->entry.principal;
1679     else
1680         rsp = sp;
1681
1682
1683     /*
1684      * Select enctype, return key and kvno.
1685      */
1686
1687     {
1688         krb5_enctype etype;
1689
1690         if(b->kdc_options.enc_tkt_in_skey) {
1691             size_t i;
1692             ekey = &adtkt.key;
1693             for(i = 0; i < b->etype.len; i++)
1694                 if (b->etype.val[i] == adtkt.key.keytype)
1695                     break;
1696             if(i == b->etype.len) {
1697                 kdc_log(context, config, 0,
1698                         "Addition ticket have not matching etypes");
1699                 krb5_clear_error_message(context);
1700                 ret = KRB5KDC_ERR_ETYPE_NOSUPP;
1701                 goto out;
1702             }
1703             etype = b->etype.val[i];
1704             kvno = 0;
1705         } else {
1706             Key *skey;
1707
1708             ret = _kdc_find_etype(context,
1709                                   krb5_principal_is_krbtgt(context, sp) ?
1710                                   config->tgt_use_strongest_session_key :
1711                                   config->svc_use_strongest_session_key, FALSE,
1712                                   server, b->etype.val, b->etype.len, NULL,
1713                                   &skey);
1714             if(ret) {
1715                 kdc_log(context, config, 0,
1716                         "Server (%s) has no support for etypes", spn);
1717                 goto out;
1718             }
1719             ekey = &skey->key;
1720             etype = skey->key.keytype;
1721             kvno = server->entry.kvno;
1722         }
1723
1724         ret = krb5_generate_random_keyblock(context, etype, &sessionkey);
1725         if (ret)
1726             goto out;
1727     }
1728
1729     /*
1730      * Check that service is in the same realm as the krbtgt. If it's
1731      * not the same, it's someone that is using a uni-directional trust
1732      * backward.
1733      */
1734
1735     /*
1736      * Validate authoriation data
1737      */
1738
1739     ret = hdb_enctype2key(context, &krbtgt->entry,
1740                           krbtgt_etype, &tkey_check);
1741     if(ret) {
1742         kdc_log(context, config, 0,
1743                     "Failed to find key for krbtgt PAC check");
1744         goto out;
1745     }
1746
1747     /* Now refetch the primary krbtgt, and get the current kvno (the
1748      * sign check may have been on an old kvno, and the server may
1749      * have been an incoming trust) */
1750     ret = krb5_make_principal(context, &krbtgt_principal,
1751                               krb5_principal_get_comp_string(context,
1752                                                              krbtgt->entry.principal,
1753                                                              1),
1754                               KRB5_TGS_NAME,
1755                               krb5_principal_get_comp_string(context,
1756                                                              krbtgt->entry.principal,
1757                                                              1), NULL);
1758     if(ret) {
1759         kdc_log(context, config, 0,
1760                     "Failed to generate krbtgt principal");
1761         goto out;
1762     }
1763
1764     ret = _kdc_db_fetch(context, config, krbtgt_principal, HDB_F_GET_KRBTGT, NULL, NULL, &krbtgt_out);
1765     krb5_free_principal(context, krbtgt_principal);
1766     if (ret) {
1767         krb5_error_code ret2;
1768         char *ktpn, *ktpn2;
1769         ret = krb5_unparse_name(context, krbtgt->entry.principal, &ktpn);
1770         ret2 = krb5_unparse_name(context, krbtgt_principal, &ktpn2);
1771         kdc_log(context, config, 0,
1772                 "Request with wrong krbtgt: %s, %s not found in our database",
1773                 (ret == 0) ? ktpn : "<unknown>", (ret2 == 0) ? ktpn2 : "<unknown>");
1774         if(ret == 0)
1775             free(ktpn);
1776         if(ret2 == 0)
1777             free(ktpn2);
1778         ret = KRB5KRB_AP_ERR_NOT_US;
1779         goto out;
1780     }
1781
1782     /* The first realm is the realm of the service, the second is
1783      * krbtgt/<this>/@REALM component of the krbtgt DN the request was
1784      * encrypted to.  The redirection via the krbtgt_out entry allows
1785      * the DB to possibly correct the case of the realm (Samba4 does
1786      * this) before the strcmp() */
1787     if (strcmp(krb5_principal_get_realm(context, server->entry.principal),
1788                krb5_principal_get_realm(context, krbtgt_out->entry.principal)) != 0) {
1789         char *ktpn;
1790         ret = krb5_unparse_name(context, krbtgt_out->entry.principal, &ktpn);
1791         kdc_log(context, config, 0,
1792                 "Request with wrong krbtgt: %s",
1793                 (ret == 0) ? ktpn : "<unknown>");
1794         if(ret == 0)
1795             free(ktpn);
1796         ret = KRB5KRB_AP_ERR_NOT_US;
1797     }
1798
1799     ret = hdb_enctype2key(context, &krbtgt_out->entry,
1800                           krbtgt_etype, &tkey_sign);
1801     if(ret) {
1802         kdc_log(context, config, 0,
1803                     "Failed to find key for krbtgt PAC signature");
1804         goto out;
1805     }
1806
1807     ret = _kdc_db_fetch(context, config, cp, HDB_F_GET_CLIENT | flags,
1808                         NULL, &clientdb, &client);
1809     if(ret == HDB_ERR_NOT_FOUND_HERE) {
1810         /* This is OK, we are just trying to find out if they have
1811          * been disabled or deleted in the meantime, missing secrets
1812          * is OK */
1813     } else if(ret){
1814         const char *krbtgt_realm, *msg;
1815
1816         /*
1817          * If the client belongs to the same realm as our krbtgt, it
1818          * should exist in the local database.
1819          *
1820          */
1821
1822         krbtgt_realm = krb5_principal_get_realm(context, krbtgt_out->entry.principal);
1823
1824         if(strcmp(krb5_principal_get_realm(context, cp), krbtgt_realm) == 0) {
1825             if (ret == HDB_ERR_NOENTRY)
1826                 ret = KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN;
1827             kdc_log(context, config, 1, "Client no longer in database: %s",
1828                     cpn);
1829             goto out;
1830         }
1831
1832         msg = krb5_get_error_message(context, ret);
1833         kdc_log(context, config, 1, "Client not found in database: %s", msg);
1834         krb5_free_error_message(context, msg);
1835     }
1836
1837     ret = check_PAC(context, config, cp, NULL,
1838                     client, server, krbtgt,
1839                     &tkey_check->key, &tkey_check->key,
1840                     ekey, &tkey_sign->key,
1841                     tgt, &rspac, &signedpath);
1842     if (ret) {
1843         const char *msg = krb5_get_error_message(context, ret);
1844         kdc_log(context, config, 0,
1845                 "Verify PAC failed for %s (%s) from %s with %s",
1846                 spn, cpn, from, msg);
1847         krb5_free_error_message(context, msg);
1848         goto out;
1849     }
1850
1851     /* also check the krbtgt for signature */
1852     ret = check_KRB5SignedPath(context,
1853                                config,
1854                                krbtgt,
1855                                cp,
1856                                tgt,
1857                                &spp,
1858                                &signedpath);
1859     if (ret) {
1860         const char *msg = krb5_get_error_message(context, ret);
1861         kdc_log(context, config, 0,
1862                 "KRB5SignedPath check failed for %s (%s) from %s with %s",
1863                 spn, cpn, from, msg);
1864         krb5_free_error_message(context, msg);
1865         goto out;
1866     }
1867
1868     /*
1869      * Process request
1870      */
1871
1872     /* by default the tgt principal matches the client principal */
1873     tp = cp;
1874     tpn = cpn;
1875
1876     if (client) {
1877         const PA_DATA *sdata;
1878         int i = 0;
1879
1880         sdata = _kdc_find_padata(req, &i, KRB5_PADATA_FOR_USER);
1881         if (sdata) {
1882             krb5_crypto crypto;
1883             krb5_data datack;
1884             PA_S4U2Self self;
1885             const char *str;
1886
1887             ret = decode_PA_S4U2Self(sdata->padata_value.data,
1888                                      sdata->padata_value.length,
1889                                      &self, NULL);
1890             if (ret) {
1891                 kdc_log(context, config, 0, "Failed to decode PA-S4U2Self");
1892                 goto out;
1893             }
1894
1895             ret = _krb5_s4u2self_to_checksumdata(context, &self, &datack);
1896             if (ret)
1897                 goto out;
1898
1899             ret = krb5_crypto_init(context, &tgt->key, 0, &crypto);
1900             if (ret) {
1901                 const char *msg = krb5_get_error_message(context, ret);
1902                 free_PA_S4U2Self(&self);
1903                 krb5_data_free(&datack);
1904                 kdc_log(context, config, 0, "krb5_crypto_init failed: %s", msg);
1905                 krb5_free_error_message(context, msg);
1906                 goto out;
1907             }
1908
1909             ret = krb5_verify_checksum(context,
1910                                        crypto,
1911                                        KRB5_KU_OTHER_CKSUM,
1912                                        datack.data,
1913                                        datack.length,
1914                                        &self.cksum);
1915             krb5_data_free(&datack);
1916             krb5_crypto_destroy(context, crypto);
1917             if (ret) {
1918                 const char *msg = krb5_get_error_message(context, ret);
1919                 free_PA_S4U2Self(&self);
1920                 kdc_log(context, config, 0,
1921                         "krb5_verify_checksum failed for S4U2Self: %s", msg);
1922                 krb5_free_error_message(context, msg);
1923                 goto out;
1924             }
1925
1926             ret = _krb5_principalname2krb5_principal(context,
1927                                                      &tp,
1928                                                      self.name,
1929                                                      self.realm);
1930             free_PA_S4U2Self(&self);
1931             if (ret)
1932                 goto out;
1933
1934             ret = krb5_unparse_name(context, tp, &tpn);
1935             if (ret)
1936                 goto out;
1937
1938             ret = _kdc_db_fetch(context, config, tp, HDB_F_GET_CLIENT | flags,
1939                                 NULL, &s4u2self_impersonated_clientdb,
1940                                 &s4u2self_impersonated_client);
1941             if (ret) {
1942                 const char *msg;
1943
1944                 /*
1945                  * If the client belongs to the same realm as our krbtgt, it
1946                  * should exist in the local database.
1947                  *
1948                  */
1949
1950                 if (ret == HDB_ERR_NOENTRY)
1951                     ret = KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN;
1952                 msg = krb5_get_error_message(context, ret);
1953                 kdc_log(context, config, 2,
1954                         "S4U2Self principal to impersonate %s not found in database: %s",
1955                         tpn, msg);
1956                 krb5_free_error_message(context, msg);
1957                 goto out;
1958             }
1959
1960             free(s4u2self_impersonated_client->entry.pw_end);
1961             s4u2self_impersonated_client->entry.pw_end = NULL;
1962
1963             ret = kdc_check_flags(context, config, s4u2self_impersonated_client, tpn,
1964                                   NULL, NULL, FALSE);
1965             if (ret)
1966                 goto out;
1967
1968             /* If we were about to put a PAC into the ticket, we better fix it to be the right PAC */
1969             if(rspac.data) {
1970                 krb5_pac p = NULL;
1971                 krb5_data_free(&rspac);
1972                 ret = _kdc_pac_generate(context, s4u2self_impersonated_client, &p);
1973                 if (ret) {
1974                     kdc_log(context, config, 0, "PAC generation failed for -- %s",
1975                             tpn);
1976                     goto out;
1977                 }
1978                 if (p != NULL) {
1979                     ret = _krb5_pac_sign(context, p, ticket->ticket.authtime,
1980                                          s4u2self_impersonated_client->entry.principal,
1981                                          ekey, &tkey_sign->key,
1982                                          &rspac);
1983                     krb5_pac_free(context, p);
1984                     if (ret) {
1985                         kdc_log(context, config, 0, "PAC signing failed for -- %s",
1986                                 tpn);
1987                         goto out;
1988                     }
1989                 }
1990             }
1991
1992             /*
1993              * Check that service doing the impersonating is
1994              * requesting a ticket to it-self.
1995              */
1996             ret = check_s4u2self(context, config, clientdb, client, sp);
1997             if (ret) {
1998                 kdc_log(context, config, 0, "S4U2Self: %s is not allowed "
1999                         "to impersonate to service "
2000                         "(tried for user %s to service %s)",
2001                         cpn, tpn, spn);
2002                 goto out;
2003             }
2004
2005             /*
2006              * If the service isn't trusted for authentication to
2007              * delegation or if the impersonate client is disallowed
2008              * forwardable, remove the forwardable flag.
2009              */
2010
2011             if (client->entry.flags.trusted_for_delegation &&
2012                 s4u2self_impersonated_client->entry.flags.forwardable) {
2013                 str = "[forwardable]";
2014             } else {
2015                 b->kdc_options.forwardable = 0;
2016                 str = "";
2017             }
2018             kdc_log(context, config, 0, "s4u2self %s impersonating %s to "
2019                     "service %s %s", cpn, tpn, spn, str);
2020         }
2021     }
2022
2023     /*
2024      * Constrained delegation
2025      */
2026
2027     if (client != NULL
2028         && b->additional_tickets != NULL
2029         && b->additional_tickets->len != 0
2030         && b->kdc_options.enc_tkt_in_skey == 0)
2031     {
2032         int ad_signedpath = 0;
2033         Key *clientkey;
2034         Ticket *t;
2035
2036         /*
2037          * Require that the KDC have issued the service's krbtgt (not
2038          * self-issued ticket with kimpersonate(1).
2039          */
2040         if (!signedpath) {
2041             ret = KRB5KDC_ERR_BADOPTION;
2042             kdc_log(context, config, 0,
2043                     "Constrained delegation done on service ticket %s/%s",
2044                     cpn, spn);
2045             goto out;
2046         }
2047
2048         t = &b->additional_tickets->val[0];
2049
2050         ret = hdb_enctype2key(context, &client->entry,
2051                               t->enc_part.etype, &clientkey);
2052         if(ret){
2053             ret = KRB5KDC_ERR_ETYPE_NOSUPP; /* XXX */
2054             goto out;
2055         }
2056
2057         ret = krb5_decrypt_ticket(context, t, &clientkey->key, &adtkt, 0);
2058         if (ret) {
2059             kdc_log(context, config, 0,
2060                     "failed to decrypt ticket for "
2061                     "constrained delegation from %s to %s ", cpn, spn);
2062             goto out;
2063         }
2064
2065         ret = _krb5_principalname2krb5_principal(context,
2066                                                  &tp,
2067                                                  adtkt.cname,
2068                                                  adtkt.crealm);
2069         if (ret)
2070             goto out;
2071
2072         ret = krb5_unparse_name(context, tp, &tpn);
2073         if (ret)
2074             goto out;
2075
2076         ret = _krb5_principalname2krb5_principal(context,
2077                                                  &dp,
2078                                                  t->sname,
2079                                                  t->realm);
2080         if (ret)
2081             goto out;
2082
2083         ret = krb5_unparse_name(context, dp, &dpn);
2084         if (ret)
2085             goto out;
2086
2087         /* check that ticket is valid */
2088         if (adtkt.flags.forwardable == 0) {
2089             kdc_log(context, config, 0,
2090                     "Missing forwardable flag on ticket for "
2091                     "constrained delegation from %s (%s) as %s to %s ",
2092                     cpn, dpn, tpn, spn);
2093             ret = KRB5KDC_ERR_BADOPTION;
2094             goto out;
2095         }
2096
2097         ret = check_constrained_delegation(context, config, clientdb,
2098                                            client, server, sp);
2099         if (ret) {
2100             kdc_log(context, config, 0,
2101                     "constrained delegation from %s (%s) as %s to %s not allowed",
2102                     cpn, dpn, tpn, spn);
2103             goto out;
2104         }
2105
2106         ret = verify_flags(context, config, &adtkt, tpn);
2107         if (ret) {
2108             goto out;
2109         }
2110
2111         krb5_data_free(&rspac);
2112
2113         /*
2114          * generate the PAC for the user.
2115          *
2116          * TODO: pass in t->sname and t->realm and build
2117          * a S4U_DELEGATION_INFO blob to the PAC.
2118          */
2119         ret = check_PAC(context, config, tp, dp,
2120                         client, server, krbtgt,
2121                         &clientkey->key, &tkey_check->key,
2122                         ekey, &tkey_sign->key,
2123                         &adtkt, &rspac, &ad_signedpath);
2124         if (ret) {
2125             const char *msg = krb5_get_error_message(context, ret);
2126             kdc_log(context, config, 0,
2127                     "Verify delegated PAC failed to %s for client"
2128                     "%s (%s) as %s from %s with %s",
2129                     spn, cpn, dpn, tpn, from, msg);
2130             krb5_free_error_message(context, msg);
2131             goto out;
2132         }
2133
2134         /*
2135          * Check that the KDC issued the user's ticket.
2136          */
2137         ret = check_KRB5SignedPath(context,
2138                                    config,
2139                                    krbtgt,
2140                                    cp,
2141                                    &adtkt,
2142                                    NULL,
2143                                    &ad_signedpath);
2144         if (ret) {
2145             const char *msg = krb5_get_error_message(context, ret);
2146             kdc_log(context, config, 0,
2147                     "KRB5SignedPath check from service %s failed "
2148                     "for delegation to %s for client %s (%s)"
2149                     "from %s failed with %s",
2150                     spn, tpn, dpn, cpn, from, msg);
2151             krb5_free_error_message(context, msg);
2152             goto out;
2153         }
2154
2155         if (!ad_signedpath) {
2156             ret = KRB5KDC_ERR_BADOPTION;
2157             kdc_log(context, config, 0,
2158                     "Ticket not signed with PAC nor SignedPath service %s failed "
2159                     "for delegation to %s for client %s (%s)"
2160                     "from %s",
2161                     spn, tpn, dpn, cpn, from);
2162             goto out;
2163         }
2164
2165         kdc_log(context, config, 0, "constrained delegation for %s "
2166                 "from %s (%s) to %s", tpn, cpn, dpn, spn);
2167     }
2168
2169     /*
2170      * Check flags
2171      */
2172
2173     ret = kdc_check_flags(context, config,
2174                           client, cpn,
2175                           server, spn,
2176                           FALSE);
2177     if(ret)
2178         goto out;
2179
2180     if((b->kdc_options.validate || b->kdc_options.renew) &&
2181        !krb5_principal_compare(context,
2182                                krbtgt->entry.principal,
2183                                server->entry.principal)){
2184         kdc_log(context, config, 0, "Inconsistent request.");
2185         ret = KRB5KDC_ERR_SERVER_NOMATCH;
2186         goto out;
2187     }
2188
2189     /* check for valid set of addresses */
2190     if(!_kdc_check_addresses(context, config, tgt->caddr, from_addr)) {
2191         ret = KRB5KRB_AP_ERR_BADADDR;
2192         kdc_log(context, config, 0, "Request from wrong address");
2193         goto out;
2194     }
2195
2196     /*
2197      * If this is an referral, add server referral data to the
2198      * auth_data reply .
2199      */
2200     if (ref_realm) {
2201         PA_DATA pa;
2202         krb5_crypto crypto;
2203
2204         kdc_log(context, config, 0,
2205                 "Adding server referral to %s", ref_realm);
2206
2207         ret = krb5_crypto_init(context, &sessionkey, 0, &crypto);
2208         if (ret)
2209             goto out;
2210
2211         ret = build_server_referral(context, config, crypto, ref_realm,
2212                                     NULL, s, &pa.padata_value);
2213         krb5_crypto_destroy(context, crypto);
2214         if (ret) {
2215             kdc_log(context, config, 0,
2216                     "Failed building server referral");
2217             goto out;
2218         }
2219         pa.padata_type = KRB5_PADATA_SERVER_REFERRAL;
2220
2221         ret = add_METHOD_DATA(&enc_pa_data, &pa);
2222         krb5_data_free(&pa.padata_value);
2223         if (ret) {
2224             kdc_log(context, config, 0,
2225                     "Add server referral METHOD-DATA failed");
2226             goto out;
2227         }
2228     }
2229
2230     /*
2231      *
2232      */
2233
2234     ret = tgs_make_reply(context,
2235                          config,
2236                          b,
2237                          tp,
2238                          tgt,
2239                          replykey,
2240                          rk_is_subkey,
2241                          ekey,
2242                          &sessionkey,
2243                          kvno,
2244                          *auth_data,
2245                          server,
2246                          rsp,
2247                          spn,
2248                          client,
2249                          cp,
2250                          tgt_realm,
2251                          krbtgt_out,
2252                          krbtgt_etype,
2253                          spp,
2254                          &rspac,
2255                          &enc_pa_data,
2256                          e_text,
2257                          reply);
2258
2259 out:
2260     if (tpn != cpn)
2261             free(tpn);
2262     free(spn);
2263     free(cpn);
2264     if (dpn)
2265         free(dpn);
2266
2267     krb5_data_free(&rspac);
2268     krb5_free_keyblock_contents(context, &sessionkey);
2269     if(krbtgt_out)
2270         _kdc_free_ent(context, krbtgt_out);
2271     if(server)
2272         _kdc_free_ent(context, server);
2273     if(client)
2274         _kdc_free_ent(context, client);
2275     if(s4u2self_impersonated_client)
2276         _kdc_free_ent(context, s4u2self_impersonated_client);
2277
2278     if (tp && tp != cp)
2279         krb5_free_principal(context, tp);
2280     if (cp)
2281         krb5_free_principal(context, cp);
2282     if (dp)
2283         krb5_free_principal(context, dp);
2284     if (sp)
2285         krb5_free_principal(context, sp);
2286     if (ref_realm)
2287         free(ref_realm);
2288     free_METHOD_DATA(&enc_pa_data);
2289
2290     free_EncTicketPart(&adtkt);
2291
2292     return ret;
2293 }
2294
2295 /*
2296  *
2297  */
2298
2299 krb5_error_code
2300 _kdc_tgs_rep(krb5_context context,
2301              krb5_kdc_configuration *config,
2302              KDC_REQ *req,
2303              krb5_data *data,
2304              const char *from,
2305              struct sockaddr *from_addr,
2306              int datagram_reply)
2307 {
2308     AuthorizationData *auth_data = NULL;
2309     krb5_error_code ret;
2310     int i = 0;
2311     const PA_DATA *tgs_req;
2312
2313     hdb_entry_ex *krbtgt = NULL;
2314     krb5_ticket *ticket = NULL;
2315     const char *e_text = NULL;
2316     krb5_enctype krbtgt_etype = ETYPE_NULL;
2317
2318     krb5_keyblock *replykey = NULL;
2319     int rk_is_subkey = 0;
2320     time_t *csec = NULL;
2321     int *cusec = NULL;
2322
2323     if(req->padata == NULL){
2324         ret = KRB5KDC_ERR_PREAUTH_REQUIRED; /* XXX ??? */
2325         kdc_log(context, config, 0,
2326                 "TGS-REQ from %s without PA-DATA", from);
2327         goto out;
2328     }
2329
2330     tgs_req = _kdc_find_padata(req, &i, KRB5_PADATA_TGS_REQ);
2331
2332     if(tgs_req == NULL){
2333         ret = KRB5KDC_ERR_PADATA_TYPE_NOSUPP;
2334
2335         kdc_log(context, config, 0,
2336                 "TGS-REQ from %s without PA-TGS-REQ", from);
2337         goto out;
2338     }
2339     ret = tgs_parse_request(context, config,
2340                             &req->req_body, tgs_req,
2341                             &krbtgt,
2342                             &krbtgt_etype,
2343                             &ticket,
2344                             &e_text,
2345                             from, from_addr,
2346                             &csec, &cusec,
2347                             &auth_data,
2348                             &replykey,
2349                             &rk_is_subkey);
2350     if (ret == HDB_ERR_NOT_FOUND_HERE) {
2351         /* kdc_log() is called in tgs_parse_request() */
2352         goto out;
2353     }
2354     if (ret) {
2355         kdc_log(context, config, 0,
2356                 "Failed parsing TGS-REQ from %s", from);
2357         goto out;
2358     }
2359
2360     ret = tgs_build_reply(context,
2361                           config,
2362                           req,
2363                           &req->req_body,
2364                           krbtgt,
2365                           krbtgt_etype,
2366                           replykey,
2367                           rk_is_subkey,
2368                           ticket,
2369                           data,
2370                           from,
2371                           &e_text,
2372                           &auth_data,
2373                           from_addr);
2374     if (ret) {
2375         kdc_log(context, config, 0,
2376                 "Failed building TGS-REP to %s", from);
2377         goto out;
2378     }
2379
2380     /* */
2381     if (datagram_reply && data->length > config->max_datagram_reply_length) {
2382         krb5_data_free(data);
2383         ret = KRB5KRB_ERR_RESPONSE_TOO_BIG;
2384         e_text = "Reply packet too large";
2385     }
2386
2387 out:
2388     if (replykey)
2389         krb5_free_keyblock(context, replykey);
2390     if(ret && ret != HDB_ERR_NOT_FOUND_HERE && data->data == NULL){
2391         krb5_mk_error(context,
2392                       ret,
2393                       NULL,
2394                       NULL,
2395                       NULL,
2396                       NULL,
2397                       csec,
2398                       cusec,
2399                       data);
2400         ret = 0;
2401     }
2402     free(csec);
2403     free(cusec);
2404     if (ticket)
2405         krb5_free_ticket(context, ticket);
2406     if(krbtgt)
2407         _kdc_free_ent(context, krbtgt);
2408
2409     if (auth_data) {
2410         free_AuthorizationData(auth_data);
2411         free(auth_data);
2412     }
2413
2414     return ret;
2415 }