mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-22 11:17:19 +00:00
838d985825
NGROUPS_MAX, eliminate ABI dependencies on them, and raise the to 1024 and 1023 respectively. (Previously they were equal, but under a close reading of POSIX, NGROUPS_MAX was defined to be too large by 1 since it is the number of supplemental groups, not total number of groups.) The bulk of the change consists of converting the struct ucred member cr_groups from a static array to a pointer. Do the equivalent in kinfo_proc. Introduce new interfaces crcopysafe() and crsetgroups() for duplicating a process credential before modifying it and for setting group lists respectively. Both interfaces take care for the details of allocating groups array. crsetgroups() takes care of truncating the group list to the current maximum (NGROUPS) if necessary. In the future, crsetgroups() may be responsible for insuring invariants such as sorting the supplemental groups to allow groupmember() to be implemented as a binary search. Because we can not change struct xucred without breaking application ABIs, we leave it alone and introduce a new XU_NGROUPS value which is always 16 and is to be used or NGRPS as appropriate for things such as NFS which need to use no more than 16 groups. When feasible, truncate the group list rather than generating an error. Minor changes: - Reduce the number of hand rolled versions of groupmember(). - Do not assign to both cr_gid and cr_groups[0]. - Modify ipfw to cache ucreds instead of part of their contents since they are immutable once referenced by more than one entity. Submitted by: Isilon Systems (initial implementation) X-MFC after: never PR: bin/113398 kern/133867
198 lines
5.0 KiB
C
198 lines
5.0 KiB
C
/* $NetBSD: svc_auth.c,v 1.12 2000/07/06 03:10:35 christos Exp $ */
|
|
|
|
/*
|
|
* Sun RPC is a product of Sun Microsystems, Inc. and is provided for
|
|
* unrestricted use provided that this legend is included on all tape
|
|
* media and as a part of the software program in whole or part. Users
|
|
* may copy or modify Sun RPC without charge, but are not authorized
|
|
* to license or distribute it to anyone else except as part of a product or
|
|
* program developed by the user.
|
|
*
|
|
* SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
|
|
* WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
|
|
* PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
|
|
*
|
|
* Sun RPC is provided with no support and without any obligation on the
|
|
* part of Sun Microsystems, Inc. to assist in its use, correction,
|
|
* modification or enhancement.
|
|
*
|
|
* SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
|
|
* INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
|
|
* OR ANY PART THEREOF.
|
|
*
|
|
* In no event will Sun Microsystems, Inc. be liable for any lost revenue
|
|
* or profits or other special, indirect and consequential damages, even if
|
|
* Sun has been advised of the possibility of such damages.
|
|
*
|
|
* Sun Microsystems, Inc.
|
|
* 2550 Garcia Avenue
|
|
* Mountain View, California 94043
|
|
*/
|
|
/*
|
|
* Copyright (c) 1986-1991 by Sun Microsystems Inc.
|
|
*/
|
|
|
|
#if defined(LIBC_SCCS) && !defined(lint)
|
|
#ident "@(#)svc_auth.c 1.16 94/04/24 SMI"
|
|
static char sccsid[] = "@(#)svc_auth.c 1.26 89/02/07 Copyr 1984 Sun Micro";
|
|
#endif
|
|
#include <sys/cdefs.h>
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
/*
|
|
* svc_auth.c, Server-side rpc authenticator interface.
|
|
*
|
|
*/
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/lock.h>
|
|
#include <sys/mutex.h>
|
|
#include <sys/systm.h>
|
|
#include <sys/jail.h>
|
|
#include <sys/ucred.h>
|
|
|
|
#include <rpc/rpc.h>
|
|
|
|
static enum auth_stat (*_svcauth_rpcsec_gss)(struct svc_req *,
|
|
struct rpc_msg *) = NULL;
|
|
static int (*_svcauth_rpcsec_gss_getcred)(struct svc_req *,
|
|
struct ucred **, int *);
|
|
|
|
static struct svc_auth_ops svc_auth_null_ops;
|
|
|
|
/*
|
|
* The call rpc message, msg has been obtained from the wire. The msg contains
|
|
* the raw form of credentials and verifiers. authenticate returns AUTH_OK
|
|
* if the msg is successfully authenticated. If AUTH_OK then the routine also
|
|
* does the following things:
|
|
* set rqst->rq_xprt->verf to the appropriate response verifier;
|
|
* sets rqst->rq_client_cred to the "cooked" form of the credentials.
|
|
*
|
|
* NB: rqst->rq_cxprt->verf must be pre-alloctaed;
|
|
* its length is set appropriately.
|
|
*
|
|
* The caller still owns and is responsible for msg->u.cmb.cred and
|
|
* msg->u.cmb.verf. The authentication system retains ownership of
|
|
* rqst->rq_client_cred, the cooked credentials.
|
|
*
|
|
* There is an assumption that any flavour less than AUTH_NULL is
|
|
* invalid.
|
|
*/
|
|
enum auth_stat
|
|
_authenticate(struct svc_req *rqst, struct rpc_msg *msg)
|
|
{
|
|
int cred_flavor;
|
|
enum auth_stat dummy;
|
|
|
|
rqst->rq_cred = msg->rm_call.cb_cred;
|
|
rqst->rq_auth.svc_ah_ops = &svc_auth_null_ops;
|
|
rqst->rq_auth.svc_ah_private = NULL;
|
|
cred_flavor = rqst->rq_cred.oa_flavor;
|
|
switch (cred_flavor) {
|
|
case AUTH_NULL:
|
|
dummy = _svcauth_null(rqst, msg);
|
|
return (dummy);
|
|
case AUTH_SYS:
|
|
dummy = _svcauth_unix(rqst, msg);
|
|
return (dummy);
|
|
case AUTH_SHORT:
|
|
dummy = _svcauth_short(rqst, msg);
|
|
return (dummy);
|
|
case RPCSEC_GSS:
|
|
if (!_svcauth_rpcsec_gss)
|
|
return (AUTH_REJECTEDCRED);
|
|
dummy = _svcauth_rpcsec_gss(rqst, msg);
|
|
return (dummy);
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return (AUTH_REJECTEDCRED);
|
|
}
|
|
|
|
/*
|
|
* A set of null auth methods used by any authentication protocols
|
|
* that don't need to inspect or modify the message body.
|
|
*/
|
|
static bool_t
|
|
svcauth_null_wrap(SVCAUTH *auth, struct mbuf **mp)
|
|
{
|
|
|
|
return (TRUE);
|
|
}
|
|
|
|
static bool_t
|
|
svcauth_null_unwrap(SVCAUTH *auth, struct mbuf **mp)
|
|
{
|
|
|
|
return (TRUE);
|
|
}
|
|
|
|
static void
|
|
svcauth_null_release(SVCAUTH *auth)
|
|
{
|
|
|
|
}
|
|
|
|
static struct svc_auth_ops svc_auth_null_ops = {
|
|
svcauth_null_wrap,
|
|
svcauth_null_unwrap,
|
|
svcauth_null_release,
|
|
};
|
|
|
|
/*ARGSUSED*/
|
|
enum auth_stat
|
|
_svcauth_null(struct svc_req *rqst, struct rpc_msg *msg)
|
|
{
|
|
|
|
rqst->rq_verf = _null_auth;
|
|
return (AUTH_OK);
|
|
}
|
|
|
|
int
|
|
svc_auth_reg(int flavor,
|
|
enum auth_stat (*svcauth)(struct svc_req *, struct rpc_msg *),
|
|
int (*getcred)(struct svc_req *, struct ucred **, int *))
|
|
{
|
|
|
|
if (flavor == RPCSEC_GSS) {
|
|
_svcauth_rpcsec_gss = svcauth;
|
|
_svcauth_rpcsec_gss_getcred = getcred;
|
|
}
|
|
return (TRUE);
|
|
}
|
|
|
|
int
|
|
svc_getcred(struct svc_req *rqst, struct ucred **crp, int *flavorp)
|
|
{
|
|
struct ucred *cr = NULL;
|
|
int flavor;
|
|
struct xucred *xcr;
|
|
|
|
flavor = rqst->rq_cred.oa_flavor;
|
|
if (flavorp)
|
|
*flavorp = flavor;
|
|
|
|
switch (flavor) {
|
|
case AUTH_UNIX:
|
|
xcr = (struct xucred *) rqst->rq_clntcred;
|
|
cr = crget();
|
|
cr->cr_uid = cr->cr_ruid = cr->cr_svuid = xcr->cr_uid;
|
|
crsetgroups(cr, xcr->cr_ngroups, xcr->cr_groups);
|
|
cr->cr_rgid = cr->cr_svgid = cr->cr_groups[0];
|
|
cr->cr_prison = &prison0;
|
|
prison_hold(cr->cr_prison);
|
|
*crp = cr;
|
|
return (TRUE);
|
|
|
|
case RPCSEC_GSS:
|
|
if (!_svcauth_rpcsec_gss_getcred)
|
|
return (FALSE);
|
|
return (_svcauth_rpcsec_gss_getcred(rqst, crp, flavorp));
|
|
|
|
default:
|
|
return (FALSE);
|
|
}
|
|
}
|
|
|