blob: 93a672aef8a5127bde5b410f9a8b5b87946f70d3 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*
*/
package org.apache.directory.server.kerberos.changepwd.service;
import java.net.InetAddress;
import java.nio.ByteBuffer;
import javax.security.auth.kerberos.KerberosPrincipal;
import org.apache.directory.api.asn1.ber.Asn1Decoder;
import org.apache.directory.api.util.Network;
import org.apache.directory.api.util.Strings;
import org.apache.directory.server.i18n.I18n;
import org.apache.directory.server.kerberos.ChangePasswordConfig;
import org.apache.directory.server.kerberos.changepwd.exceptions.ChangePasswdErrorType;
import org.apache.directory.server.kerberos.changepwd.exceptions.ChangePasswordException;
import org.apache.directory.server.kerberos.changepwd.messages.AbstractPasswordMessage;
import org.apache.directory.server.kerberos.changepwd.messages.ChangePasswordReply;
import org.apache.directory.server.kerberos.changepwd.messages.ChangePasswordRequest;
import org.apache.directory.server.kerberos.shared.crypto.encryption.CipherTextHandler;
import org.apache.directory.server.kerberos.shared.crypto.encryption.KeyUsage;
import org.apache.directory.server.kerberos.shared.replay.ReplayCache;
import org.apache.directory.server.kerberos.shared.store.PrincipalStore;
import org.apache.directory.server.kerberos.shared.store.PrincipalStoreEntry;
import org.apache.directory.shared.kerberos.KerberosUtils;
import org.apache.directory.shared.kerberos.codec.KerberosDecoder;
import org.apache.directory.shared.kerberos.codec.changePwdData.ChangePasswdDataContainer;
import org.apache.directory.shared.kerberos.codec.types.EncryptionType;
import org.apache.directory.shared.kerberos.codec.types.PrincipalNameType;
import org.apache.directory.shared.kerberos.components.EncKrbPrivPart;
import org.apache.directory.shared.kerberos.components.EncryptedData;
import org.apache.directory.shared.kerberos.components.EncryptionKey;
import org.apache.directory.shared.kerberos.components.HostAddress;
import org.apache.directory.shared.kerberos.components.HostAddresses;
import org.apache.directory.shared.kerberos.components.PrincipalName;
import org.apache.directory.shared.kerberos.exceptions.ErrorType;
import org.apache.directory.shared.kerberos.exceptions.KerberosException;
import org.apache.directory.shared.kerberos.messages.ApRep;
import org.apache.directory.shared.kerberos.messages.ApReq;
import org.apache.directory.shared.kerberos.messages.Authenticator;
import org.apache.directory.shared.kerberos.messages.ChangePasswdData;
import org.apache.directory.shared.kerberos.messages.EncApRepPart;
import org.apache.directory.shared.kerberos.messages.KrbPriv;
import org.apache.directory.shared.kerberos.messages.Ticket;
import org.apache.mina.core.session.IoSession;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
public final class ChangePasswordService
{
/** the logger for this class */
private static final Logger LOG = LoggerFactory.getLogger( ChangePasswordService.class );
private static final CipherTextHandler CIPHER_TEXT_HANDLER = new CipherTextHandler();
private ChangePasswordService()
{
}
public static void execute( IoSession session, ChangePasswordContext changepwContext ) throws Exception
{
if ( LOG.isDebugEnabled() )
{
monitorRequest( changepwContext );
}
configureChangePassword( changepwContext );
getAuthHeader( changepwContext );
verifyServiceTicket( changepwContext );
getServerEntry( changepwContext );
verifyServiceTicketAuthHeader( changepwContext );
extractPassword( changepwContext );
if ( LOG.isDebugEnabled() )
{
monitorContext( changepwContext );
}
processPasswordChange( changepwContext );
buildReply( changepwContext );
if ( LOG.isDebugEnabled() )
{
monitorReply( changepwContext );
}
}
private static void processPasswordChange( ChangePasswordContext changepwContext ) throws KerberosException
{
PrincipalStore store = changepwContext.getStore();
Authenticator authenticator = changepwContext.getAuthenticator();
String newPassword = Strings.utf8ToString( changepwContext.getPasswordData().getNewPasswd() );
KerberosPrincipal byPrincipal = KerberosUtils.getKerberosPrincipal(
authenticator.getCName(),
authenticator.getCRealm() );
KerberosPrincipal targetPrincipal = null;
PrincipalName targName = changepwContext.getPasswordData().getTargName();
if ( targName != null )
{
targetPrincipal = new KerberosPrincipal( targName.getNameString(), PrincipalNameType.KRB_NT_PRINCIPAL.getValue() );
}
else
{
targetPrincipal = byPrincipal;
}
// usec and seq-number must be present per MS but aren't in legacy kpasswd
// seq-number must have same value as authenticator
// ignore r-address
store.changePassword( byPrincipal, targetPrincipal, newPassword, changepwContext.getTicket().getEncTicketPart().getFlags().isInitial() );
LOG.debug( "Successfully modified password for {} BY {}.", targetPrincipal, byPrincipal );
}
private static void monitorRequest( ChangePasswordContext changepwContext )
{
try
{
ChangePasswordRequest request = ( ChangePasswordRequest ) changepwContext.getRequest();
short versionNumber = request.getVersionNumber();
if ( LOG.isDebugEnabled() )
{
LOG.debug( "Responding to change password request:\\n\\tversionNumber {}", versionNumber );
}
}
catch ( Exception e )
{
// This is a monitor. No exceptions should bubble up.
LOG.error( I18n.err( I18n.ERR_152 ), e );
}
}
private static void configureChangePassword( ChangePasswordContext changepwContext )
{
changepwContext.setCipherTextHandler( CIPHER_TEXT_HANDLER );
}
private static void getAuthHeader( ChangePasswordContext changepwContext ) throws KerberosException
{
ChangePasswordRequest request = ( ChangePasswordRequest ) changepwContext.getRequest();
short pvno = request.getVersionNumber();
if ( ( pvno != AbstractPasswordMessage.PVNO ) && ( pvno != AbstractPasswordMessage.OLD_PVNO ) )
{
throw new ChangePasswordException( ChangePasswdErrorType.KRB5_KPASSWD_BAD_VERSION );
}
if ( request.getAuthHeader() == null || request.getAuthHeader().getTicket() == null )
{
throw new ChangePasswordException( ChangePasswdErrorType.KRB5_KPASSWD_AUTHERROR );
}
ApReq authHeader = request.getAuthHeader();
Ticket ticket = authHeader.getTicket();
changepwContext.setAuthHeader( authHeader );
changepwContext.setTicket( ticket );
}
private static void verifyServiceTicket( ChangePasswordContext changepwContext ) throws KerberosException
{
ChangePasswordConfig config = changepwContext.getConfig();
Ticket ticket = changepwContext.getTicket();
String primaryRealm = config.getPrimaryRealm();
KerberosPrincipal changepwPrincipal = config.getServicePrincipal();
KerberosPrincipal serverPrincipal = KerberosUtils.getKerberosPrincipal( ticket.getSName(), ticket.getRealm() );
// for some reason kpassword is setting the pricnipaltype value as 1 for ticket.getSName()
// hence changing to string based comparison for server and changepw principals
// instead of serverPrincipal.equals( changepwPrincipal )
if ( !ticket.getRealm().equals( primaryRealm ) || !serverPrincipal.getName().equals( changepwPrincipal.getName() ) )
{
throw new KerberosException( org.apache.directory.shared.kerberos.exceptions.ErrorType.KRB_AP_ERR_NOT_US );
}
}
private static void getServerEntry( ChangePasswordContext changepwContext ) throws KerberosException
{
Ticket ticket = changepwContext.getTicket();
KerberosPrincipal principal = KerberosUtils.getKerberosPrincipal( ticket.getSName(), ticket.getRealm() );
PrincipalStore store = changepwContext.getStore();
changepwContext.setServerEntry( KerberosUtils.getEntry( principal, store, ErrorType.KDC_ERR_S_PRINCIPAL_UNKNOWN ) );
}
private static void verifyServiceTicketAuthHeader( ChangePasswordContext changepwContext ) throws KerberosException
{
ApReq authHeader = changepwContext.getAuthHeader();
Ticket ticket = changepwContext.getTicket();
EncryptionType encryptionType = ticket.getEncPart().getEType();
EncryptionKey serverKey = changepwContext.getServerEntry().getKeyMap().get( encryptionType );
long clockSkew = changepwContext.getConfig().getAllowableClockSkew();
ReplayCache replayCache = changepwContext.getReplayCache();
boolean emptyAddressesAllowed = changepwContext.getConfig().isEmptyAddressesAllowed();
InetAddress clientAddress = changepwContext.getClientAddress();
CipherTextHandler cipherTextHandler = changepwContext.getCipherTextHandler();
Authenticator authenticator = KerberosUtils.verifyAuthHeader( authHeader, ticket, serverKey, clockSkew, replayCache,
emptyAddressesAllowed, clientAddress, cipherTextHandler, KeyUsage.AP_REQ_AUTHNT_SESS_KEY, false );
changepwContext.setAuthenticator( authenticator );
}
private static void extractPassword( ChangePasswordContext changepwContext ) throws Exception
{
ChangePasswordRequest request = ( ChangePasswordRequest ) changepwContext.getRequest();
Authenticator authenticator = changepwContext.getAuthenticator();
CipherTextHandler cipherTextHandler = changepwContext.getCipherTextHandler();
// get the subsession key from the Authenticator
EncryptionKey subSessionKey = authenticator.getSubKey();
// decrypt the request's private message with the subsession key
EncryptedData encReqPrivPart = request.getPrivateMessage().getEncPart();
ChangePasswdData passwordData = null;
try
{
byte[] decryptedData = cipherTextHandler.decrypt( subSessionKey, encReqPrivPart, KeyUsage.KRB_PRIV_ENC_PART_CHOSEN_KEY );
EncKrbPrivPart privatePart = KerberosDecoder.decodeEncKrbPrivPart( decryptedData );
if ( ( authenticator.getSeqNumber() != null ) && ( authenticator.getSeqNumber() != privatePart.getSeqNumber() ) )
{
throw new ChangePasswordException( ChangePasswdErrorType.KRB5_KPASSWD_MALFORMED );
}
if ( request.getVersionNumber() == AbstractPasswordMessage.OLD_PVNO )
{
passwordData = new ChangePasswdData();
passwordData.setNewPasswd( privatePart.getUserData() );
}
else
{
ByteBuffer stream = ByteBuffer.wrap( privatePart.getUserData() );
ChangePasswdDataContainer container = new ChangePasswdDataContainer( stream );
Asn1Decoder.decode( stream, container );
passwordData = container.getChngPwdData();
}
}
catch ( KerberosException ke )
{
throw new ChangePasswordException( ChangePasswdErrorType.KRB5_KPASSWD_SOFTERROR, ke );
}
changepwContext.setChngPwdData( passwordData );
}
private static void monitorContext( ChangePasswordContext changepwContext )
{
try
{
PrincipalStore store = changepwContext.getStore();
ApReq authHeader = changepwContext.getAuthHeader();
Ticket ticket = changepwContext.getTicket();
ReplayCache replayCache = changepwContext.getReplayCache();
long clockSkew = changepwContext.getConfig().getAllowableClockSkew();
Authenticator authenticator = changepwContext.getAuthenticator();
KerberosPrincipal clientPrincipal = KerberosUtils.getKerberosPrincipal(
authenticator.getCName(), authenticator.getCRealm() );
InetAddress clientAddress = changepwContext.getClientAddress();
HostAddresses clientAddresses = ticket.getEncTicketPart().getClientAddresses();
boolean caddrContainsSender = false;
if ( ticket.getEncTicketPart().getClientAddresses() != null )
{
caddrContainsSender = ticket.getEncTicketPart().getClientAddresses().contains( new HostAddress( clientAddress ) );
}
if ( LOG.isDebugEnabled() )
{
StringBuilder sb = new StringBuilder();
sb.append( "Monitoring context:" );
sb.append( "\n\tstore " ).append( store );
sb.append( "\n\tauthHeader " ).append( authHeader );
sb.append( "\n\tticket " ).append( ticket );
sb.append( "\n\treplayCache " ).append( replayCache );
sb.append( "\n\tclockSkew " ).append( clockSkew );
sb.append( "\n\tclientPrincipal " ).append( clientPrincipal );
sb.append( "\n\tChangePasswdData " ).append( changepwContext.getPasswordData() );
sb.append( "\n\tclientAddress " ).append( clientAddress );
sb.append( "\n\tclientAddresses " ).append( clientAddresses );
sb.append( "\n\tcaddr contains sender " ).append( caddrContainsSender );
sb.append( "\n\tTicket principal " ).append( ticket.getSName() );
PrincipalStoreEntry ticketPrincipal = changepwContext.getServerEntry();
sb.append( "\n\tcn " ).append( ticketPrincipal.getCommonName() );
sb.append( "\n\trealm " ).append( ticketPrincipal.getRealmName() );
sb.append( "\n\tService principal " ).append( ticketPrincipal.getPrincipal() );
sb.append( "\n\tSAM type " ).append( ticketPrincipal.getSamType() );
EncryptionType encryptionType = ticket.getEncPart().getEType();
int keyVersion = ticketPrincipal.getKeyMap().get( encryptionType ).getKeyVersion();
sb.append( "\n\tTicket key type " ).append( encryptionType );
sb.append( "\n\tService key version " ).append( keyVersion );
LOG.debug( sb.toString() );
}
}
catch ( Exception e )
{
// This is a monitor. No exceptions should bubble up.
LOG.error( I18n.err( I18n.ERR_154 ), e );
}
}
private static void buildReply( ChangePasswordContext changepwContext ) throws KerberosException
{
Authenticator authenticator = changepwContext.getAuthenticator();
Ticket ticket = changepwContext.getTicket();
CipherTextHandler cipherTextHandler = changepwContext.getCipherTextHandler();
// begin building reply
// create priv message
// user-data component is short result code
EncKrbPrivPart privPart = new EncKrbPrivPart();
// first two bytes are the result code, rest is the string 'Password Changed' followed by a null char
byte[] resultCode =
{ ( byte ) 0x00, ( byte ) 0x00, ( byte ) 0x50, ( byte ) 0x61, ( byte ) 0x73, ( byte ) 0x73, ( byte ) 0x77,
( byte ) 0x6F, ( byte ) 0x72, ( byte ) 0x64, ( byte ) 0x20, ( byte ) 0x63, ( byte ) 0x68,
( byte ) 0x61, ( byte ) 0x6E, ( byte ) 0x67, ( byte ) 0x65, ( byte ) 0x64, ( byte ) 0x00 };
privPart.setUserData( resultCode );
privPart.setSenderAddress( new HostAddress( Network.LOOPBACK ) );
// get the subsession key from the Authenticator
EncryptionKey subSessionKey = authenticator.getSubKey();
EncryptedData encPrivPart;
try
{
encPrivPart = cipherTextHandler.seal( subSessionKey, privPart, KeyUsage.KRB_PRIV_ENC_PART_CHOSEN_KEY );
}
catch ( KerberosException ke )
{
throw new ChangePasswordException( ChangePasswdErrorType.KRB5_KPASSWD_SOFTERROR, ke );
}
KrbPriv privateMessage = new KrbPriv();
privateMessage.setEncPart( encPrivPart );
// Begin AP_REP generation
EncApRepPart repPart = new EncApRepPart();
repPart.setCTime( authenticator.getCtime() );
repPart.setCusec( authenticator.getCusec() );
if ( authenticator.getSeqNumber() != null )
{
repPart.setSeqNumber( authenticator.getSeqNumber() );
}
repPart.setSubkey( subSessionKey );
EncryptedData encRepPart;
try
{
encRepPart = cipherTextHandler.seal( ticket.getEncTicketPart().getKey(), repPart, KeyUsage.AP_REP_ENC_PART_SESS_KEY );
}
catch ( KerberosException ke )
{
throw new ChangePasswordException( ChangePasswdErrorType.KRB5_KPASSWD_SOFTERROR, ke );
}
ApRep appReply = new ApRep();
appReply.setEncPart( encRepPart );
// return status message value object, the version number
changepwContext.setReply( new ChangePasswordReply( AbstractPasswordMessage.OLD_PVNO, appReply, privateMessage ) );
}
private static void monitorReply( ChangePasswordContext changepwContext )
{
try
{
ChangePasswordReply reply = ( ChangePasswordReply ) changepwContext.getReply();
ApRep appReply = reply.getApplicationReply();
KrbPriv priv = reply.getPrivateMessage();
LOG.debug( "Responding with change password reply:\\n\\tappReply {}\\n\\tpriv {}",
appReply, priv );
}
catch ( Exception e )
{
// This is a monitor. No exceptions should bubble up.
LOG.error( I18n.err( I18n.ERR_155 ), e );
}
}
}