LCOV - code coverage report
Current view: top level - source4/rpc_server/drsuapi - drsutil.c (source / functions) Hit Total Coverage
Test: coverage report for master 2f515e9b Lines: 61 87 70.1 %
Date: 2024-04-21 15:09:00 Functions: 6 6 100.0 %

          Line data    Source code
       1             : /* 
       2             :    Unix SMB/CIFS implementation.
       3             : 
       4             :    useful utilities for the DRS server
       5             : 
       6             :    Copyright (C) Andrew Tridgell 2009
       7             :    
       8             :    This program is free software; you can redistribute it and/or modify
       9             :    it under the terms of the GNU General Public License as published by
      10             :    the Free Software Foundation; either version 3 of the License, or
      11             :    (at your option) any later version.
      12             :    
      13             :    This program is distributed in the hope that it will be useful,
      14             :    but WITHOUT ANY WARRANTY; without even the implied warranty of
      15             :    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
      16             :    GNU General Public License for more details.
      17             :    
      18             :    You should have received a copy of the GNU General Public License
      19             :    along with this program.  If not, see <http://www.gnu.org/licenses/>.
      20             : */
      21             : 
      22             : #include "includes.h"
      23             : #include "rpc_server/dcerpc_server.h"
      24             : #include "dsdb/samdb/samdb.h"
      25             : #include "libcli/security/security.h"
      26             : #include "libcli/security/session.h"
      27             : #include "param/param.h"
      28             : #include "auth/session.h"
      29             : #include "rpc_server/drsuapi/dcesrv_drsuapi.h"
      30             : 
      31             : #undef DBGC_CLASS
      32             : #define DBGC_CLASS            DBGC_DRS_REPL
      33             : 
      34      654213 : int drsuapi_search_with_extended_dn(struct ldb_context *ldb,
      35             :                                     TALLOC_CTX *mem_ctx,
      36             :                                     struct ldb_result **_res,
      37             :                                     struct ldb_dn *basedn,
      38             :                                     enum ldb_scope scope,
      39             :                                     const char * const *attrs,
      40             :                                     const char *filter)
      41             : {
      42           0 :         int ret;
      43           0 :         struct ldb_request *req;
      44           0 :         TALLOC_CTX *tmp_ctx;
      45           0 :         struct ldb_result *res;
      46             : 
      47      654213 :         tmp_ctx = talloc_new(mem_ctx);
      48             : 
      49      654213 :         res = talloc_zero(tmp_ctx, struct ldb_result);
      50      654213 :         if (!res) {
      51           0 :                 return LDB_ERR_OPERATIONS_ERROR;
      52             :         }
      53             : 
      54      654213 :         ret = ldb_build_search_req(&req, ldb, tmp_ctx,
      55             :                                    basedn,
      56             :                                    scope,
      57             :                                    filter,
      58             :                                    attrs,
      59             :                                    NULL,
      60             :                                    res,
      61             :                                    ldb_search_default_callback,
      62             :                                    NULL);
      63      654213 :         if (ret != LDB_SUCCESS) {
      64           0 :                 talloc_free(tmp_ctx);
      65           0 :                 return ret;
      66             :         }
      67             : 
      68      654213 :         ret = ldb_request_add_control(req, LDB_CONTROL_EXTENDED_DN_OID, true, NULL);
      69      654213 :         if (ret != LDB_SUCCESS) {
      70           0 :                 return ret;
      71             :         }
      72             : 
      73      654213 :         ret = ldb_request_add_control(req, LDB_CONTROL_SHOW_RECYCLED_OID, true, NULL);
      74      654213 :         if (ret != LDB_SUCCESS) {
      75           0 :                 return ret;
      76             :         }
      77             : 
      78      654213 :         ret = ldb_request_add_control(req, LDB_CONTROL_REVEAL_INTERNALS, false, NULL);
      79      654213 :         if (ret != LDB_SUCCESS) {
      80           0 :                 return ret;
      81             :         }
      82             : 
      83      654213 :         ret = ldb_request(ldb, req);
      84      654213 :         if (ret == LDB_SUCCESS) {
      85      654213 :                 ret = ldb_wait(req->handle, LDB_WAIT_ALL);
      86             :         }
      87             : 
      88      654213 :         talloc_free(req);
      89      654213 :         *_res = talloc_steal(mem_ctx, res);
      90      654213 :         return ret;
      91             : }
      92             : 
      93        4476 : WERROR drs_security_level_check(struct dcesrv_call_state *dce_call,
      94             :                                 const char* call,
      95             :                                 enum security_user_level minimum_level,
      96             :                                 const struct dom_sid *domain_sid)
      97             : {
      98          73 :         struct auth_session_info *session_info =
      99        4476 :                 dcesrv_call_session_info(dce_call);
     100          73 :         enum security_user_level level;
     101             : 
     102        4476 :         if (lpcfg_parm_bool(dce_call->conn->dce_ctx->lp_ctx, NULL,
     103             :                          "drs", "disable_sec_check", false)) {
     104           0 :                 return WERR_OK;
     105             :         }
     106             : 
     107        4476 :         level = security_session_user_level(session_info, domain_sid);
     108        4476 :         if (level < minimum_level) {
     109          77 :                 if (call) {
     110           0 :                         DEBUG(0,("%s refused for security token (level=%u)\n",
     111             :                                  call, (unsigned)level));
     112           0 :                         security_token_debug(DBGC_DRS_REPL, 2, session_info->security_token);
     113             :                 }
     114          77 :                 return WERR_DS_DRA_ACCESS_DENIED;
     115             :         }
     116             : 
     117        4399 :         return WERR_OK;
     118             : }
     119             : 
     120     1191086 : void drsuapi_process_secret_attribute(struct drsuapi_DsReplicaAttribute *attr,
     121             :                                       struct drsuapi_DsReplicaMetaData *meta_data)
     122             : {
     123     1191086 :         if (attr->value_ctr.num_values == 0) {
     124           0 :                 return;
     125             :         }
     126             : 
     127     1191086 :         switch (attr->attid) {
     128        1083 :         case DRSUAPI_ATTID_dBCSPwd:
     129             :         case DRSUAPI_ATTID_unicodePwd:
     130             :         case DRSUAPI_ATTID_ntPwdHistory:
     131             :         case DRSUAPI_ATTID_lmPwdHistory:
     132             :         case DRSUAPI_ATTID_supplementalCredentials:
     133             :         case DRSUAPI_ATTID_priorValue:
     134             :         case DRSUAPI_ATTID_currentValue:
     135             :         case DRSUAPI_ATTID_trustAuthOutgoing:
     136             :         case DRSUAPI_ATTID_trustAuthIncoming:
     137             :         case DRSUAPI_ATTID_initialAuthOutgoing:
     138             :         case DRSUAPI_ATTID_initialAuthIncoming:
     139             :                 /*set value to null*/
     140        1083 :                 attr->value_ctr.num_values = 0;
     141        1083 :                 talloc_free(attr->value_ctr.values);
     142        1083 :                 attr->value_ctr.values = NULL;
     143        1083 :                 meta_data->originating_change_time = 0;
     144        1083 :                 return;
     145     1190003 :         default:
     146     1190003 :                 return;
     147             :         }
     148             : }
     149             : 
     150             : 
     151             : /*
     152             :   check security on a DN, with logging of errors
     153             :  */
     154       19400 : static WERROR drs_security_access_check_log(struct ldb_context *sam_ctx,
     155             :                                             TALLOC_CTX *mem_ctx,
     156             :                                             struct security_token *token,
     157             :                                             struct ldb_dn *dn,
     158             :                                             const char *ext_right)
     159             : {
     160           0 :         int ret;
     161       19400 :         if (!dn) {
     162           0 :                 DEBUG(3,("drs_security_access_check: Null dn provided, access is denied for %s\n",
     163             :                               ext_right));
     164           0 :                 return WERR_DS_DRA_ACCESS_DENIED;
     165             :         }
     166       19400 :         ret = dsdb_check_access_on_dn(sam_ctx,
     167             :                                       mem_ctx,
     168             :                                       dn,
     169             :                                       token,
     170             :                                       SEC_ADS_CONTROL_ACCESS,
     171             :                                       ext_right);
     172       19400 :         if (ret == LDB_ERR_INSUFFICIENT_ACCESS_RIGHTS) {
     173        1408 :                 DEBUG(3,("%s refused for security token on %s\n",
     174             :                          ext_right, ldb_dn_get_linearized(dn)));
     175        1408 :                 security_token_debug(DBGC_DRS_REPL, 3, token);
     176        1408 :                 return WERR_DS_DRA_ACCESS_DENIED;
     177       17992 :         } else if (ret != LDB_SUCCESS) {
     178           0 :                 DEBUG(1,("Failed to perform access check on %s: %s\n", ldb_dn_get_linearized(dn), ldb_strerror(ret)));
     179           0 :                 return WERR_DS_DRA_INTERNAL_ERROR;
     180             :         }
     181       17992 :         return WERR_OK;
     182             : }
     183             : 
     184             : 
     185             : /*
     186             :   check security on a object identifier
     187             :  */
     188        1619 : WERROR drs_security_access_check(struct ldb_context *sam_ctx,
     189             :                                  TALLOC_CTX *mem_ctx,
     190             :                                  struct security_token *token,
     191             :                                  struct drsuapi_DsReplicaObjectIdentifier *nc,
     192             :                                  const char *ext_right)
     193             : {
     194           0 :         struct ldb_dn *dn;
     195           0 :         WERROR werr;
     196           0 :         int ret;
     197             : 
     198        1619 :         ret = drs_ObjectIdentifier_to_dn_and_nc_root(mem_ctx,
     199             :                                                      sam_ctx,
     200             :                                                      nc,
     201             :                                                      &dn,
     202             :                                                      NULL);
     203        1619 :         if (ret != LDB_SUCCESS) {
     204           0 :                 return WERR_DS_DRA_BAD_DN;
     205             :         }
     206             : 
     207        1619 :         werr = drs_security_access_check_log(sam_ctx, mem_ctx, token, dn, ext_right);
     208        1619 :         talloc_free(dn);
     209        1619 :         return werr;
     210             : }
     211             : 
     212             : /*
     213             :   check security on the NC root of a object identifier
     214             :  */
     215       17789 : WERROR drs_security_access_check_nc_root(struct ldb_context *sam_ctx,
     216             :                                          TALLOC_CTX *mem_ctx,
     217             :                                          struct security_token *token,
     218             :                                          struct drsuapi_DsReplicaObjectIdentifier *nc,
     219             :                                          const char *ext_right)
     220             : {
     221           0 :         struct ldb_dn *nc_root;
     222           0 :         WERROR werr;
     223           0 :         int ret;
     224             : 
     225       17789 :         ret = drs_ObjectIdentifier_to_dn_and_nc_root(mem_ctx,
     226             :                                                      sam_ctx,
     227             :                                                      nc,
     228             :                                                      NULL,
     229             :                                                      &nc_root);
     230       17789 :         if (ret != LDB_SUCCESS) {
     231           8 :                 return WERR_DS_DRA_BAD_NC;
     232             :         }
     233             : 
     234       17781 :         werr = drs_security_access_check_log(sam_ctx, mem_ctx, token, nc_root, ext_right);
     235       17781 :         talloc_free(nc_root);
     236       17781 :         return werr;
     237             : }

Generated by: LCOV version 1.14