2 * Copyright (c) 1997-2006 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 static int inetd_flag
= -1;
38 static int version_flag
;
39 static int print_dump
;
40 static const char *database
;
41 static int from_stdin
;
42 static char *local_realm
;
43 static char *ktname
= NULL
;
45 struct getargs args
[] = {
46 { "database", 'd', arg_string
, rk_UNCONST(&database
), "database", "file" },
47 { "stdin", 'n', arg_flag
, &from_stdin
, "read from stdin", NULL
},
48 { "print", 0, arg_flag
, &print_dump
, "print dump to stdout", NULL
},
50 { "inetd", 'i', arg_negative_flag
, &inetd_flag
,
51 "Not started from inetd", NULL
},
53 { "keytab", 'k', arg_string
, &ktname
, "keytab to use for authentication", "keytab" },
54 { "realm", 'r', arg_string
, &local_realm
, "realm to use", NULL
},
55 { "version", 0, arg_flag
, &version_flag
, NULL
, NULL
},
56 { "help", 'h', arg_flag
, &help_flag
, NULL
, NULL
}
59 static int num_args
= sizeof(args
) / sizeof(args
[0]);
60 static char unparseable_name
[] = "unparseable name";
65 arg_printusage (args
, num_args
, NULL
, "");
70 main(int argc
, char **argv
)
74 krb5_auth_context ac
= NULL
;
75 krb5_principal c1
, c2
;
76 krb5_authenticator authent
;
78 krb5_socket_t sock
= rk_INVALID_SOCKET
;
82 krb5_log_facility
*fac
;
87 ret
= krb5_init_context(&context
);
91 ret
= krb5_openlog(context
, "hpropd", &fac
);
93 errx(1, "krb5_openlog");
94 krb5_set_warn_dest(context
, fac
);
96 if (getarg(args
, num_args
, argc
, argv
, &optidx
))
99 if (local_realm
!= NULL
)
100 krb5_set_default_realm(context
, local_realm
);
115 if (database
== NULL
)
116 database
= hdb_default_db(context
);
121 struct sockaddr_storage ss
;
122 struct sockaddr
*sa
= (struct sockaddr
*)&ss
;
123 socklen_t sin_len
= sizeof(ss
);
128 memset(&ss
, 0, sizeof(ss
));
131 if (inetd_flag
== -1) {
132 if (getpeername (sock
, sa
, &sin_len
) < 0) {
142 mini_inetd (krb5_getportbyname (context
, "hprop", "tcp",
145 socket_set_keepalive(sock
, 1);
146 sin_len
= sizeof(ss
);
147 if (getpeername(sock
, sa
, &sin_len
) < 0)
148 krb5_err(context
, 1, errno
, "getpeername");
150 if (inet_ntop(sa
->sa_family
,
151 socket_get_address (sa
),
153 sizeof(addr_name
)) == NULL
)
154 strlcpy (addr_name
, "unknown address",
157 krb5_log(context
, fac
, 0, "Connection from %s", addr_name
);
159 ret
= krb5_kt_register(context
, &hdb_get_kt_ops
);
161 krb5_err(context
, 1, ret
, "krb5_kt_register");
163 if (ktname
!= NULL
) {
164 ret
= krb5_kt_resolve(context
, ktname
, &keytab
);
166 krb5_err (context
, 1, ret
, "krb5_kt_resolve %s", ktname
);
168 ret
= krb5_kt_default (context
, &keytab
);
170 krb5_err (context
, 1, ret
, "krb5_kt_default");
173 ret
= krb5_recvauth(context
, &ac
, &sock
, HPROP_VERSION
, NULL
,
176 krb5_err(context
, 1, ret
, "krb5_recvauth");
178 ret
= krb5_unparse_name(context
, ticket
->server
, &server
);
180 krb5_err(context
, 1, ret
, "krb5_unparse_name");
181 if (strncmp(server
, "hprop/", 6) != 0)
182 krb5_errx(context
, 1, "ticket not for hprop (%s)", server
);
185 krb5_free_ticket (context
, ticket
);
187 ret
= krb5_auth_con_getauthenticator(context
, ac
, &authent
);
189 krb5_err(context
, 1, ret
, "krb5_auth_con_getauthenticator");
191 ret
= krb5_make_principal(context
, &c1
, NULL
, "kadmin", "hprop", NULL
);
193 krb5_err(context
, 1, ret
, "krb5_make_principal");
194 _krb5_principalname2krb5_principal(context
, &c2
,
195 authent
->cname
, authent
->crealm
);
196 if (!krb5_principal_compare(context
, c1
, c2
)) {
198 ret
= krb5_unparse_name(context
, c2
, &s
);
200 s
= unparseable_name
;
201 krb5_errx(context
, 1, "Unauthorized connection from %s", s
);
203 krb5_free_principal(context
, c1
);
204 krb5_free_principal(context
, c2
);
206 ret
= krb5_kt_close(context
, keytab
);
208 krb5_err(context
, 1, ret
, "krb5_kt_close");
211 if (asprintf(&tmp_db
, "%s~", database
) < 0 || tmp_db
== NULL
)
212 krb5_errx(context
, 1, "hdb_create: out of memory");
214 ret
= hdb_create(context
, &db
, tmp_db
);
216 krb5_err(context
, 1, ret
, "hdb_create(%s)", tmp_db
);
217 ret
= db
->hdb_open(context
, db
, O_RDWR
| O_CREAT
| O_TRUNC
, 0600);
219 krb5_err(context
, 1, ret
, "hdb_open(%s)", tmp_db
);
227 ret
= krb5_read_message(context
, &sock
, &data
);
228 if (ret
!= 0 && ret
!= HEIM_ERR_EOF
)
229 krb5_err(context
, 1, ret
, "krb5_read_message");
231 ret
= krb5_read_priv_message(context
, ac
, &sock
, &data
);
233 krb5_err(context
, 1, ret
, "krb5_read_priv_message");
236 if (ret
== HEIM_ERR_EOF
|| data
.length
== 0) {
240 krb5_write_priv_message(context
, ac
, &sock
, &data
);
244 memset(&entry
, 0, sizeof(entry
));
245 ret
= hdb_value2entry(context
, &data
, &entry
);
246 krb5_data_free(&data
);
248 krb5_err(context
, 1, ret
, "hdb_value2entry");
250 struct hdb_print_entry_arg parg
;
253 parg
.fmt
= HDB_DUMP_HEIMDAL
;
254 hdb_print_entry(context
, db
, &entry
, &parg
);
256 ret
= db
->hdb_store(context
, db
, 0, &entry
);
257 if (ret
== HDB_ERR_EXISTS
) {
259 ret
= krb5_unparse_name(context
, entry
.principal
, &s
);
261 s
= strdup(unparseable_name
);
262 krb5_warnx(context
, "Entry exists: %s", s
);
265 krb5_err(context
, 1, ret
, "db_store");
269 hdb_free_entry(context
, db
, &entry
);
272 krb5_log(context
, fac
, 0, "Received %d principals", nprincs
);
274 ret
= db
->hdb_close(context
, db
);
276 krb5_err(context
, 1, ret
, "db_close");
277 ret
= db
->hdb_rename(context
, db
, database
);
279 krb5_err(context
, 1, ret
, "db_rename");
282 rk_closesocket(sock
);