/* $OpenBSD: kadmin.c,v 1.8 1999/05/23 17:19:24 aaron Exp $ */ /* $KTH: kadmin.c,v 1.50 1997/11/03 19:51:46 assar Exp $ */ /* * Copyright (C) 1989 by the Massachusetts Institute of Technology * * Export of this software from the United States of America is assumed * to require a specific license from the United States Government. * It is the responsibility of any person or organization contemplating * export to obtain such a license before exporting. * * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and * distribute this software and its documentation for any purpose and * without fee is hereby granted, provided that the above copyright * notice appear in all copies and that both that copyright notice and * this permission notice appear in supporting documentation, and that * the name of M.I.T. not be used in advertising or publicity pertaining * to distribution of the software without specific, written prior * permission. M.I.T. makes no representations about the suitability of * this software for any purpose. It is provided "as is" without express * or implied warranty. * */ /* * Kerberos database administrator's tool. * * The default behavior of kadmin is if the -m option is given * on the commandline, multiple requests are allowed to be given * with one entry of the admin password (until the tickets expire). */ #include "kadm_locl.h" static int change_password(int argc, char **argv); static int change_key(int argc, char **argv); static int change_admin_password(int argc, char **argv); static int add_new_key(int argc, char **argv); static int del_entry(int argc, char **argv); static int get_entry(int argc, char **argv); static int mod_entry(int argc, char **argv); static int help(int argc, char **argv); static int clean_up_cmd(int argc, char **argv); static int quit_cmd(int argc, char **argv); static SL_cmd cmds[] = { {"change_password", change_password, "Change a user's password"}, {"cpw"}, {"passwd"}, {"change_key", change_key, "Change a user's password as a DES binary key"}, {"ckey"}, {"change_admin_password", change_admin_password, "Change your admin password"}, {"cap"}, {"add_new_key", add_new_key, "Add new user to kerberos database"}, {"ank"}, {"del_entry", del_entry, "Delete entry from database"}, {"del"}, {"delete"}, {"get_entry", get_entry, "Get entry from kerberos database"}, {"mod_entry", mod_entry, "Modify entry in kerberos database"}, {"destroy_tickets", clean_up_cmd, "Destroy admin tickets"}, {"exit", quit_cmd, "Exit program"}, {"quit"}, {"help", help, "Help"}, {"?"}, {NULL} }; #define BAD_PW 1 #define GOOD_PW 0 #define FUDGE_VALUE 15 /* for ticket expiration time */ #define PE_NO 0 #define PE_YES 1 #define PE_UNSURE 2 /* for get_password, whether it should do the swapping...necessary for using vals structure, unnecessary for change_pw requests */ #define DONTSWAP 0 #define SWAP 1 static krb_principal pr; static char default_realm[REALM_SZ]; /* default kerberos realm */ static char krbrlm[REALM_SZ]; /* current realm being administered */ static int multiple = 0; /* Allow multiple requests per ticket */ #ifdef NOENCRYPTION #define read_long_pw_string placebo_read_pw_string #else #define read_long_pw_string des_read_pw_string #endif time_t tm2time (struct tm tm, int local) { time_t t; tm.tm_isdst = -1; t = mktime (&tm); if (!local) t += t - mktime (gmtime (&t)); return t; } static void get_maxlife(Kadm_vals *vals) { char buff[BUFSIZ]; time_t life; int l; do { printf("Maximum ticket lifetime? (%d) [%s] ", vals->max_life, krb_life_to_atime(vals->max_life)); fflush(stdout); if (fgets(buff, sizeof(buff), stdin) == NULL || *buff == '\n') { clearerr(stdin); return; } life = krb_atime_to_life(buff); } while (life <= 0); l = strlen(buff); if (buff[l-2] == 'm') life = krb_time_to_life(0L, life*60); if (buff[l-2] == 'h') life = krb_time_to_life(0L, life*60*60); vals->max_life = life; SET_FIELD(KADM_MAXLIFE,vals->fields); } static void get_attr(Kadm_vals *vals) { char buff[BUFSIZ], *out; int attr; do { printf("Attributes? [0x%.2x] ", vals->attributes); fflush(stdout); if (fgets(buff, sizeof(buff), stdin) == NULL || *buff == '\n') { clearerr(stdin); return; } attr = strtol(buff, &out, 0); if (attr == 0 && out == buff) attr = -1; } while (attr < 0 || attr > 0xffff); vals->attributes = attr; SET_FIELD(KADM_ATTR,vals->fields); } static void get_expdate(Kadm_vals *vals) { char buff[BUFSIZ]; struct tm edate; memset(&edate, 0, sizeof(edate)); do { printf("Expiration date (enter yyyy-mm-dd) ? [%.24s] ", asctime(k_localtime(&vals->exp_date))); fflush(stdout); if (fgets(buff, sizeof(buff), stdin) == NULL || *buff == '\n') { clearerr(stdin); return; } if (sscanf(buff, "%d-%d-%d", &edate.tm_year, &edate.tm_mon, &edate.tm_mday) == 3) { edate.tm_mon--; /* January is 0, not 1 */ edate.tm_hour = 23; /* nearly midnight at the end of the */ edate.tm_min = 59; /* specified day */ } } while (krb_check_tm (edate)); edate.tm_year -= 1900; vals->exp_date = tm2time (edate, 1); SET_FIELD(KADM_EXPDATE,vals->fields); } static int princ_exists(char *name, char *instance, char *realm) { int status; int old = krb_use_admin_server(1); status = krb_get_pw_in_tkt(name, instance, realm, KRB_TICKET_GRANTING_TICKET, realm, 1, ""); krb_use_admin_server(old); if ((status == KSUCCESS) || (status == INTK_BADPW)) return(PE_YES); else if (status == KDC_PR_UNKNOWN) return(PE_NO); else return(PE_UNSURE); } static int get_password(u_int32_t *low, u_int32_t *high, char *prompt, int byteswap) { char new_passwd[MAX_KPW_LEN]; /* new password */ des_cblock newkey; if (read_long_pw_string(new_passwd, sizeof(new_passwd)-1, prompt, 1)) return(BAD_PW); if (strlen(new_passwd) == 0) { printf("Using random password.\n"); #ifdef NOENCRYPTION memset(newkey, 0, sizeof(newkey)); #else des_new_random_key(&newkey); #endif } else { #ifdef NOENCRYPTION memset(newkey, 0, sizeof(newkey)); #else des_string_to_key(new_passwd, &newkey); #endif memset(new_passwd, 0, sizeof(new_passwd)); } memcpy(low, newkey, 4); memcpy(high, ((char *)newkey) + 4, 4); memset(newkey, 0, sizeof(newkey)); #ifdef NOENCRYPTION *low = 1; #endif if (byteswap != DONTSWAP) { *low = htonl(*low); *high = htonl(*high); } return(GOOD_PW); } static int get_admin_password(void) { int status; char admin_passwd[MAX_KPW_LEN]; /* Admin's password */ int ticket_life = 1; /* minimum ticket lifetime */ CREDENTIALS c; if (multiple) { /* If admin tickets exist and are valid, just exit. */ memset(&c, 0, sizeof(c)); if (krb_get_cred(PWSERV_NAME, KADM_SINST, krbrlm, &c) == KSUCCESS) /* * If time is less than lifetime - FUDGE_VALUE after issue date, * tickets will probably last long enough for the next * transaction. */ if (time(0) < (c.issue_date + (5 * 60 * c.lifetime) - FUDGE_VALUE)) return(KADM_SUCCESS); ticket_life = DEFAULT_TKT_LIFE; } if (princ_exists(pr.name, pr.instance, pr.realm) != PE_NO) { char prompt[256]; snprintf(prompt, sizeof(prompt), "%s's Password: ", krb_unparse_name(&pr)); if (read_long_pw_string(admin_passwd, sizeof(admin_passwd)-1, prompt, 0)) { warnx ("Error reading admin password."); goto bad; } status = krb_get_pw_in_tkt(pr.name, pr.instance, pr.realm, PWSERV_NAME, KADM_SINST, ticket_life, admin_passwd); memset(admin_passwd, 0, sizeof(admin_passwd)); /* Initialize non shared random sequence from session key. */ memset(&c, 0, sizeof(c)); krb_get_cred(PWSERV_NAME, KADM_SINST, krbrlm, &c); des_init_random_number_generator(&c.session); } else status = KDC_PR_UNKNOWN; switch(status) { case GT_PW_OK: return(GOOD_PW); case KDC_PR_UNKNOWN: printf("Principal %s does not exist.\n", krb_unparse_name(&pr)); goto bad; case GT_PW_BADPW: printf("Incorrect admin password.\n"); goto bad; default: com_err("kadmin", status+krb_err_base, "while getting password tickets"); goto bad; } bad: memset(admin_passwd, 0, sizeof(admin_passwd)); dest_tkt(); return(BAD_PW); } static void usage(void) { fprintf (stderr, "Usage: kadmin [[-u|-p] admin_name] [-r default_realm]" " [-m]\n" " -m allows multiple admin requests to be " "serviced with one entry of admin\n" " password.\n"); exit (1); } /* GLOBAL */ static void clean_up() { dest_tkt(); } static int clean_up_cmd (int argc, char **argv) { clean_up(); return 0; } static int quit_cmd (int argc, char **argv) { return 1; } static void do_init(int argc, char **argv) { int c; int tflag = 0; char tktstring[MAXPATHLEN]; int k_errno; memset(&pr, 0, sizeof(pr)); if (krb_get_default_principal(pr.name, pr.instance, default_realm) < 0) errx (1, "I could not even guess who you might be"); while ((c = getopt(argc, argv, "p:u:r:mt")) != -1) switch (c) { case 'p': case 'u': if((k_errno = krb_parse_name(optarg, &pr)) != KSUCCESS) errx (1, "%s", krb_get_err_text(k_errno)); break; case 'r': memset(default_realm, 0, sizeof(default_realm)); strncpy(default_realm, optarg, sizeof(default_realm) - 1); break; case 'm': multiple++; break; case 't': tflag++; break; default: usage(); break; } if (optind < argc) usage(); strncpy(krbrlm, default_realm, REALM_SZ - 1); krbrlm[REALM_SZ - 1] = '\0'; if (kadm_init_link(PWSERV_NAME, KRB_MASTER, krbrlm) != KADM_SUCCESS) krbrlm[0] = '\0'; if (pr.realm[0] == '\0') { strncpy (pr.realm, krbrlm, REALM_SZ - 1); pr.realm[REALM_SZ - 1] = '\0'; } if (pr.instance[0] == '\0') { strncpy(pr.instance, "admin", INST_SZ - 1); pr.instance[INST_SZ - 1] = '\0'; } if (!tflag) { snprintf(tktstring, sizeof(tktstring), TKT_ROOT "_adm_%d",(int)getpid()); krb_set_tkt_string(tktstring); } } int main(int argc, char **argv) { do_init(argc, argv); printf("Welcome to the Kerberos Administration Program, version 2\n"); printf("Type \"help\" if you need it.\n"); sl_loop (cmds, "kadmin: "); printf("\nCleaning up and exiting.\n"); clean_up(); exit(0); } static int setvals(Kadm_vals *vals, char *string) { char realm[REALM_SZ]; int status = KADM_SUCCESS; memset(vals, 0, sizeof(*vals)); memset(realm, 0, sizeof(realm)); SET_FIELD(KADM_NAME,vals->fields); SET_FIELD(KADM_INST,vals->fields); if ((status = kname_parse(vals->name, vals->instance, realm, string))) { printf("kerberos error: %s\n", krb_get_err_text(status)); return status; } if (realm[0] == '\0') { strncpy(realm, default_realm, REALM_SZ - 1); realm[REALM_SZ - 1] = '\0'; } if (strcmp(realm, krbrlm)) { strncpy(krbrlm, realm, REALM_SZ - 1); krbrlm[REALM_SZ - 1] = '\0'; if ((status = kadm_init_link(PWSERV_NAME, KRB_MASTER, krbrlm)) != KADM_SUCCESS) printf("kadm error for realm %s: %s\n", krbrlm, error_message(status)); } if (status) return 1; else return KADM_SUCCESS; } static int change_password(int argc, char **argv) { Kadm_vals old, new; int status; char pw_prompt[BUFSIZ]; if (argc != 2) { printf("Usage: change_password loginname\n"); return 0; } if (setvals(&old, argv[1]) != KADM_SUCCESS) return 0; new = old; SET_FIELD(KADM_DESKEY,new.fields); if (princ_exists(old.name, old.instance, krbrlm) != PE_NO) { /* get the admin's password */ if (get_admin_password() != GOOD_PW) return 0; /* get the new password */ snprintf(pw_prompt, sizeof(pw_prompt), "New password for %s:", argv[1]); if (get_password(&new.key_low, &new.key_high, pw_prompt, SWAP) == GOOD_PW) { status = kadm_mod(&old, &new); if (status == KADM_SUCCESS) { printf("Password changed for %s.\n", argv[1]); } else { printf("kadmin: %s\nwhile changing password for %s", error_message(status), argv[1]); } } else printf("Error reading password; password unchanged\n"); memset(&new, 0, sizeof(new)); if (!multiple) clean_up(); } else printf("kadmin: Principal %s does not exist.\n", krb_unparse_name_long (old.name, old.instance, krbrlm)); return 0; } static int getkey(unsigned char *k) { int i, c; for (i = 0; i < 8; i++) { c = getchar(); if (c == EOF) return 0; else if (c == '\\') { int oct = -1; scanf("%03o", &oct); if (oct < 0 || oct > 255) return 0; k[i] = oct; } else if (!isalpha(c)) return 0; else k[i] = c; } c = getchar(); if (c != '\n') return 0; return 1; /* Success */ } static void printkey(unsigned char *tkey) { int j; for(j = 0; j < 8; j++) if(tkey[j] != '\\' && isalpha(tkey[j]) != 0) printf("%c", tkey[j]); else printf("\\%03o",(unsigned char)tkey[j]); printf("\n"); } static int change_key(int argc, char **argv) { Kadm_vals old, new; unsigned char newkey[8]; int status; if (argc != 2) { printf("Usage: change_key principal-name\n"); return 0; } if (setvals(&old, argv[1]) != KADM_SUCCESS) return 0; new = old; SET_FIELD(KADM_DESKEY,new.fields); if (princ_exists(old.name, old.instance, krbrlm) != PE_NO) { /* get the admin's password */ if (get_admin_password() != GOOD_PW) return 0; /* get the new password */ printf("New DES key for %s: ", argv[1]); if (getkey(newkey)) { memcpy(&new.key_low, newkey, 4); memcpy(&new.key_high, ((char *)newkey) + 4, 4); printf("Entered key for %s: ", argv[1]); printkey(newkey); memset(newkey, 0, sizeof(newkey)); status = kadm_mod(&old, &new); if (status == KADM_SUCCESS) { printf("Key changed for %s.\n", argv[1]); } else { printf("kadmin: %s\nwhile changing key for %s", error_message(status), argv[1]); } } else printf("Error reading key; key unchanged\n"); memset(&new, 0, sizeof(new)); if (!multiple) clean_up(); } else printf("kadmin: Principal %s does not exist.\n", krb_unparse_name_long (old.name, old.instance, krbrlm)); return 0; } static int change_admin_password(int argc, char **argv) { des_cblock newkey; int status; char pword[MAX_KPW_LEN]; char *pw_msg; if (argc != 1) { printf("Usage: change_admin_password\n"); return 0; } if (get_pw_new_pwd(pword, sizeof(pword), &pr, 1) == 0) { des_string_to_key(pword, &newkey); status = kadm_change_pw_plain(newkey, pword, &pw_msg); if(status == KADM_INSECURE_PW) printf("Insecure password: %s\n", pw_msg); else if (status == KADM_SUCCESS) printf("Admin password changed\n"); else printf("kadm error: %s\n",error_message(status)); memset(newkey, 0, sizeof(newkey)); memset(pword, 0, sizeof(pword)); } if (!multiple) clean_up(); return 0; } static int add_new_key(int argc, char **argv) { Kadm_vals new; char pw_prompt[BUFSIZ]; int status; if (argc != 2) { printf("Usage: add_new_key user_name.\n"); return 0; } if (setvals(&new, argv[1]) != KADM_SUCCESS) return 0; SET_FIELD(KADM_EXPDATE,new.fields); SET_FIELD(KADM_ATTR,new.fields); SET_FIELD(KADM_MAXLIFE,new.fields); SET_FIELD(KADM_DESKEY,new.fields); if (princ_exists(new.name, new.instance, krbrlm) != PE_YES) { Kadm_vals vals; u_char fields[4]; char n[ANAME_SZ + INST_SZ + 1]; /* get the admin's password */ if (get_admin_password() != GOOD_PW) return 0; memset(fields, 0, sizeof(fields)); SET_FIELD(KADM_NAME,fields); SET_FIELD(KADM_INST,fields); SET_FIELD(KADM_EXPDATE,fields); SET_FIELD(KADM_ATTR,fields); SET_FIELD(KADM_MAXLIFE,fields); snprintf (n, sizeof(n), "default.%s", new.instance); if (setvals(&vals, n) != KADM_SUCCESS) return 0; if (kadm_get(&vals, fields) != KADM_SUCCESS) { if (setvals(&vals, "default") != KADM_SUCCESS) return 0; if ((status = kadm_get(&vals, fields)) != KADM_SUCCESS) { printf ("kadm error: %s\n", error_message(status)); return 0; } } if (vals.max_life == 255) /* Defaults not set! */ { /* This is the default maximum lifetime for new principals. */ if (strcmp(new.instance, "admin") == 0) vals.max_life = 1 + (CLOCK_SKEW/(5*60)); /* 5+5 minutes */ else if (strcmp(new.instance, "root") == 0) vals.max_life = 96; /* 8 hours */ else if (krb_life_to_time(0, 162) >= 24*60*60) vals.max_life = 162; /* ca 100 hours */ else vals.max_life = 255; /* ca 21 hours (maximum) */ /* Also fix expiration date. */ if (strcmp(new.name, "rcmd") == 0) vals.exp_date = 1104814999; /* Tue Jan 4 06:03:19 2005 */ else vals.exp_date = time(0) + 2*(365*24*60*60); /* + ca 2 years */ } new.max_life = vals.max_life; new.exp_date = vals.exp_date; new.attributes = vals.attributes; get_maxlife(&new); get_attr(&new); get_expdate(&new); /* get the new password */ snprintf(pw_prompt, sizeof(pw_prompt), "Password for %s:", argv[1]); if (get_password(&new.key_low, &new.key_high, pw_prompt, SWAP) == GOOD_PW) { status = kadm_add(&new); if (status == KADM_SUCCESS) { printf("%s added to database.\n", argv[1]); } else { printf("kadm error: %s\n",error_message(status)); } } else printf("Error reading password; %s not added\n",argv[1]); memset(&new, 0, sizeof(new)); if (!multiple) clean_up(); } else printf("kadmin: Principal already exists.\n"); return 0; } static int del_entry(int argc, char **argv) { int status; Kadm_vals vals; if (argc != 2) { printf("Usage: del_entry username\n"); return 0; } if (setvals(&vals, argv[1]) != KADM_SUCCESS) return 0; if (princ_exists(vals.name, vals.instance, krbrlm) != PE_NO) { /* get the admin's password */ if (get_admin_password() != GOOD_PW) return 0; if ((status = kadm_del(&vals)) == KADM_SUCCESS){ printf("%s removed from database.\n", argv[1]); } else { printf("kadm error: %s\n",error_message(status)); } if (!multiple) clean_up(); } else printf("kadmin: Principal %s does not exist.\n", krb_unparse_name_long (vals.name, vals.instance, krbrlm)); return 0; } static int get_entry(int argc, char **argv) { int status; u_char fields[4]; Kadm_vals vals; if (argc != 2) { printf("Usage: get_entry username\n"); return 0; } memset(fields, 0, sizeof(fields)); SET_FIELD(KADM_NAME,fields); SET_FIELD(KADM_INST,fields); SET_FIELD(KADM_EXPDATE,fields); SET_FIELD(KADM_ATTR,fields); SET_FIELD(KADM_MAXLIFE,fields); #if 0 SET_FIELD(KADM_DESKEY,fields); #endif if (setvals(&vals, argv[1]) != KADM_SUCCESS) return 0; if (princ_exists(vals.name, vals.instance, krbrlm) != PE_NO) { /* get the admin's password */ if (get_admin_password() != GOOD_PW) return 0; if ((status = kadm_get(&vals, fields)) == KADM_SUCCESS) prin_vals(&vals); else printf("kadm error: %s\n",error_message(status)); if (!multiple) clean_up(); } else printf("kadmin: Principal %s does not exist.\n", krb_unparse_name_long (vals.name, vals.instance, krbrlm)); return 0; } static int mod_entry(int argc, char **argv) { int status; u_char fields[4]; Kadm_vals ovals, nvals; if (argc != 2) { printf("Usage: mod_entry username\n"); return 0; } memset(fields, 0, sizeof(fields)); SET_FIELD(KADM_NAME,fields); SET_FIELD(KADM_INST,fields); SET_FIELD(KADM_EXPDATE,fields); SET_FIELD(KADM_ATTR,fields); SET_FIELD(KADM_MAXLIFE,fields); if (setvals(&ovals, argv[1]) != KADM_SUCCESS) return 0; nvals = ovals; if (princ_exists(ovals.name, ovals.instance, krbrlm) == PE_NO) { printf("kadmin: Principal %s does not exist.\n", krb_unparse_name_long (ovals.name, ovals.instance, krbrlm)); return 0; } /* get the admin's password */ if (get_admin_password() != GOOD_PW) return 0; if ((status = kadm_get(&ovals, fields)) != KADM_SUCCESS) { printf("[ unable to retrieve current settings: %s ]\n", error_message(status)); nvals.max_life = DEFAULT_TKT_LIFE; nvals.exp_date = 0; nvals.attributes = 0; } else { nvals.max_life = ovals.max_life; nvals.exp_date = ovals.exp_date; nvals.attributes = ovals.attributes; } get_maxlife(&nvals); get_attr(&nvals); get_expdate(&nvals); if (IS_FIELD(KADM_MAXLIFE, nvals.fields) || IS_FIELD(KADM_ATTR, nvals.fields) || IS_FIELD(KADM_EXPDATE, nvals.fields)) { if ((status = kadm_mod(&ovals, &nvals)) != KADM_SUCCESS) { printf("kadm error: %s\n",error_message(status)); goto out; } if ((status = kadm_get(&ovals, fields)) != KADM_SUCCESS) { printf("kadm error: %s\n",error_message(status)); goto out; } } prin_vals(&ovals); out: if (!multiple) clean_up(); return 0; } static int help(int argc, char **argv) { sl_help (cmds, argc, argv); return 0; }