blob: 7f01c6e607918d4e1356a9e7d305113777910089 [file] [log] [blame]
Steve Frenchf1d662a2007-11-05 14:38:08 +00001/*
2 * fs/cifs/cifs_spnego.c -- SPNEGO upcall management for CIFS
3 *
4 * Copyright (c) 2007 Red Hat, Inc.
5 * Author(s): Jeff Layton (jlayton@redhat.com)
6 *
7 * This library is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU Lesser General Public License as published
9 * by the Free Software Foundation; either version 2.1 of the License, or
10 * (at your option) any later version.
11 *
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
15 * the GNU Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public License
18 * along with this library; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 */
21
22#include <linux/list.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090023#include <linux/slab.h>
Steve Frenchf1d662a2007-11-05 14:38:08 +000024#include <linux/string.h>
25#include <keys/user-type.h>
26#include <linux/key-type.h>
Sachin Prabhub74cb9a2016-05-17 18:20:13 -050027#include <linux/keyctl.h>
Jeff Layton50b64e32009-06-02 06:55:20 -040028#include <linux/inet.h>
Steve Frenchf1d662a2007-11-05 14:38:08 +000029#include "cifsglob.h"
30#include "cifs_spnego.h"
31#include "cifs_debug.h"
Sachin Prabhub74cb9a2016-05-17 18:20:13 -050032#include "cifsproto.h"
33static const struct cred *spnego_cred;
Steve Frenchf1d662a2007-11-05 14:38:08 +000034
35/* create a new cifs key */
36static int
David Howellscf7f6012012-09-13 13:06:29 +010037cifs_spnego_key_instantiate(struct key *key, struct key_preparsed_payload *prep)
Steve Frenchf1d662a2007-11-05 14:38:08 +000038{
39 char *payload;
40 int ret;
41
42 ret = -ENOMEM;
Silviu-Mihai Popescuf7f7c182013-03-11 18:22:32 +020043 payload = kmemdup(prep->data, prep->datalen, GFP_KERNEL);
Steve Frenchf1d662a2007-11-05 14:38:08 +000044 if (!payload)
45 goto error;
46
47 /* attach the data */
David Howells146aa8b2015-10-21 14:04:48 +010048 key->payload.data[0] = payload;
Steve Frenchf1d662a2007-11-05 14:38:08 +000049 ret = 0;
50
51error:
52 return ret;
53}
54
55static void
56cifs_spnego_key_destroy(struct key *key)
57{
David Howells146aa8b2015-10-21 14:04:48 +010058 kfree(key->payload.data[0]);
Steve Frenchf1d662a2007-11-05 14:38:08 +000059}
60
61
62/*
63 * keytype for CIFS spnego keys
64 */
65struct key_type cifs_spnego_key_type = {
66 .name = "cifs.spnego",
67 .instantiate = cifs_spnego_key_instantiate,
Steve Frenchf1d662a2007-11-05 14:38:08 +000068 .destroy = cifs_spnego_key_destroy,
69 .describe = user_describe,
70};
71
Steve French7c9c3762008-09-23 17:23:09 +000072/* length of longest version string e.g. strlen("ver=0xFF") */
73#define MAX_VER_STR_LEN 8
74
75/* length of longest security mechanism name, eg in future could have
76 * strlen(";sec=ntlmsspi") */
77#define MAX_MECH_STR_LEN 13
78
Steve French7c9c3762008-09-23 17:23:09 +000079/* strlen of "host=" */
80#define HOST_KEY_LEN 5
81
82/* strlen of ";ip4=" or ";ip6=" */
83#define IP_KEY_LEN 5
84
85/* strlen of ";uid=0x" */
86#define UID_KEY_LEN 7
87
Jeff Laytonba5dadb2010-08-03 10:19:50 -040088/* strlen of ";creduid=0x" */
89#define CREDUID_KEY_LEN 11
90
Steve French7c9c3762008-09-23 17:23:09 +000091/* strlen of ";user=" */
92#define USER_KEY_LEN 6
93
Jeff Laytonc4c1bff2009-07-09 20:02:48 -040094/* strlen of ";pid=0x" */
95#define PID_KEY_LEN 7
96
Steve Frenchf1d662a2007-11-05 14:38:08 +000097/* get a key struct with a SPNEGO security blob, suitable for session setup */
98struct key *
Steve French96daf2b2011-05-27 04:34:02 +000099cifs_get_spnego_key(struct cifs_ses *sesInfo)
Steve Frenchf1d662a2007-11-05 14:38:08 +0000100{
101 struct TCP_Server_Info *server = sesInfo->server;
Pavel Shilovskya9f1b852010-12-13 19:08:35 +0300102 struct sockaddr_in *sa = (struct sockaddr_in *) &server->dstaddr;
103 struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *) &server->dstaddr;
Steve Frenchf1d662a2007-11-05 14:38:08 +0000104 char *description, *dp;
105 size_t desc_len;
106 struct key *spnego_key;
Jeff Laytond6c2e4d2007-11-16 22:23:17 +0000107 const char *hostname = server->hostname;
Sachin Prabhub74cb9a2016-05-17 18:20:13 -0500108 const struct cred *saved_cred;
Steve Frenchf1d662a2007-11-05 14:38:08 +0000109
Jeff Layton66b8bd32008-08-01 17:54:32 +0000110 /* length of fields (with semicolons): ver=0xyz ip4=ipaddress
111 host=hostname sec=mechanism uid=0xFF user=username */
112 desc_len = MAX_VER_STR_LEN +
Steve French7c9c3762008-09-23 17:23:09 +0000113 HOST_KEY_LEN + strlen(hostname) +
Jeff Layton50b64e32009-06-02 06:55:20 -0400114 IP_KEY_LEN + INET6_ADDRSTRLEN +
Jeff Layton66b8bd32008-08-01 17:54:32 +0000115 MAX_MECH_STR_LEN +
Steve French7c9c3762008-09-23 17:23:09 +0000116 UID_KEY_LEN + (sizeof(uid_t) * 2) +
Jeff Laytonba5dadb2010-08-03 10:19:50 -0400117 CREDUID_KEY_LEN + (sizeof(uid_t) * 2) +
Jeff Laytonc4c1bff2009-07-09 20:02:48 -0400118 PID_KEY_LEN + (sizeof(pid_t) * 2) + 1;
Jeff Layton66b8bd32008-08-01 17:54:32 +0000119
Jeff Layton04febab2012-01-17 16:09:15 -0500120 if (sesInfo->user_name)
121 desc_len += USER_KEY_LEN + strlen(sesInfo->user_name);
122
Steve Frenchf1d662a2007-11-05 14:38:08 +0000123 spnego_key = ERR_PTR(-ENOMEM);
124 description = kzalloc(desc_len, GFP_KERNEL);
125 if (description == NULL)
126 goto out;
127
128 dp = description;
129 /* start with version and hostname portion of UNC string */
130 spnego_key = ERR_PTR(-EINVAL);
Steve French68bf7282007-11-16 18:32:52 +0000131 sprintf(dp, "ver=0x%x;host=%s;", CIFS_SPNEGO_UPCALL_VERSION,
Steve Frenchf1d662a2007-11-05 14:38:08 +0000132 hostname);
133 dp = description + strlen(description);
134
135 /* add the server address */
Pavel Shilovskya9f1b852010-12-13 19:08:35 +0300136 if (server->dstaddr.ss_family == AF_INET)
137 sprintf(dp, "ip4=%pI4", &sa->sin_addr);
138 else if (server->dstaddr.ss_family == AF_INET6)
139 sprintf(dp, "ip6=%pI6", &sa6->sin6_addr);
Steve Frenchf1d662a2007-11-05 14:38:08 +0000140 else
141 goto out;
142
143 dp = description + strlen(description);
144
Steve Frenchc16fefa2008-08-19 19:35:33 +0000145 /* for now, only sec=krb5 and sec=mskrb5 are valid */
Jeff Layton26efa0b2010-04-24 07:57:49 -0400146 if (server->sec_kerberos)
Steve Frenchf1d662a2007-11-05 14:38:08 +0000147 sprintf(dp, ";sec=krb5");
Jeff Layton26efa0b2010-04-24 07:57:49 -0400148 else if (server->sec_mskerberos)
Steve Frenchc16fefa2008-08-19 19:35:33 +0000149 sprintf(dp, ";sec=mskrb5");
Steve French93e2e862018-10-28 13:13:23 -0500150 else {
151 cifs_dbg(VFS, "unknown or missing server auth type, use krb5\n");
152 sprintf(dp, ";sec=krb5");
153 }
Steve Frenchf1d662a2007-11-05 14:38:08 +0000154
Igor Mammedov9eae8a82007-11-08 16:13:31 +0000155 dp = description + strlen(description);
Eric W. Biederman64ed39d2013-02-06 02:30:39 -0800156 sprintf(dp, ";uid=0x%x",
157 from_kuid_munged(&init_user_ns, sesInfo->linux_uid));
Igor Mammedov9eae8a82007-11-08 16:13:31 +0000158
Igor Mammedove4058242008-04-02 17:33:47 +0400159 dp = description + strlen(description);
Eric W. Biederman64ed39d2013-02-06 02:30:39 -0800160 sprintf(dp, ";creduid=0x%x",
161 from_kuid_munged(&init_user_ns, sesInfo->cred_uid));
Jeff Layton3e4b3e12010-07-19 18:00:17 -0400162
Jeff Layton04febab2012-01-17 16:09:15 -0500163 if (sesInfo->user_name) {
164 dp = description + strlen(description);
165 sprintf(dp, ";user=%s", sesInfo->user_name);
166 }
Igor Mammedove4058242008-04-02 17:33:47 +0400167
Jeff Laytonc4c1bff2009-07-09 20:02:48 -0400168 dp = description + strlen(description);
169 sprintf(dp, ";pid=0x%x", current->pid);
170
Joe Perchesf96637b2013-05-04 22:12:25 -0500171 cifs_dbg(FYI, "key description = %s\n", description);
Sachin Prabhub74cb9a2016-05-17 18:20:13 -0500172 saved_cred = override_creds(spnego_cred);
Steve Frenchf1d662a2007-11-05 14:38:08 +0000173 spnego_key = request_key(&cifs_spnego_key_type, description, "");
Sachin Prabhub74cb9a2016-05-17 18:20:13 -0500174 revert_creds(saved_cred);
Steve Frenchf1d662a2007-11-05 14:38:08 +0000175
Jeff Layton05b3de62007-12-31 00:51:45 +0000176#ifdef CONFIG_CIFS_DEBUG2
Steve Frenchf1d662a2007-11-05 14:38:08 +0000177 if (cifsFYI && !IS_ERR(spnego_key)) {
David Howells146aa8b2015-10-21 14:04:48 +0100178 struct cifs_spnego_msg *msg = spnego_key->payload.data[0];
Andrew Mortonead03e32008-02-05 15:51:24 +0000179 cifs_dump_mem("SPNEGO reply blob:", msg->data, min(1024U,
Jeff Layton05b3de62007-12-31 00:51:45 +0000180 msg->secblob_len + msg->sesskey_len));
Steve Frenchf1d662a2007-11-05 14:38:08 +0000181 }
Jeff Layton05b3de62007-12-31 00:51:45 +0000182#endif /* CONFIG_CIFS_DEBUG2 */
Steve Frenchf1d662a2007-11-05 14:38:08 +0000183
184out:
185 kfree(description);
186 return spnego_key;
187}
Sachin Prabhub74cb9a2016-05-17 18:20:13 -0500188
189int
190init_cifs_spnego(void)
191{
192 struct cred *cred;
193 struct key *keyring;
194 int ret;
195
196 cifs_dbg(FYI, "Registering the %s key type\n",
197 cifs_spnego_key_type.name);
198
199 /*
200 * Create an override credential set with special thread keyring for
201 * spnego upcalls.
202 */
203
204 cred = prepare_kernel_cred(NULL);
205 if (!cred)
206 return -ENOMEM;
207
208 keyring = keyring_alloc(".cifs_spnego",
209 GLOBAL_ROOT_UID, GLOBAL_ROOT_GID, cred,
210 (KEY_POS_ALL & ~KEY_POS_SETATTR) |
211 KEY_USR_VIEW | KEY_USR_READ,
212 KEY_ALLOC_NOT_IN_QUOTA, NULL, NULL);
213 if (IS_ERR(keyring)) {
214 ret = PTR_ERR(keyring);
215 goto failed_put_cred;
216 }
217
218 ret = register_key_type(&cifs_spnego_key_type);
219 if (ret < 0)
220 goto failed_put_key;
221
222 /*
223 * instruct request_key() to use this special keyring as a cache for
224 * the results it looks up
225 */
226 set_bit(KEY_FLAG_ROOT_CAN_CLEAR, &keyring->flags);
227 cred->thread_keyring = keyring;
228 cred->jit_keyring = KEY_REQKEY_DEFL_THREAD_KEYRING;
229 spnego_cred = cred;
230
231 cifs_dbg(FYI, "cifs spnego keyring: %d\n", key_serial(keyring));
232 return 0;
233
234failed_put_key:
235 key_put(keyring);
236failed_put_cred:
237 put_cred(cred);
238 return ret;
239}
240
241void
242exit_cifs_spnego(void)
243{
244 key_revoke(spnego_cred->thread_keyring);
245 unregister_key_type(&cifs_spnego_key_type);
246 put_cred(spnego_cred);
247 cifs_dbg(FYI, "Unregistered %s key type\n", cifs_spnego_key_type.name);
248}