/* $OpenBSD: kdb_init.c,v 1.5 1999/08/20 11:00:32 art Exp $ */ /* $KTH: kdb_init.c,v 1.23 1997/03/30 17:45:05 assar Exp $ */ /*- * Copyright 1987, 1988 by the Student Information Processing Board * of the Massachusetts Institute of Technology * * Permission to use, copy, modify, and distribute this software * and its documentation for any purpose and without fee is * hereby granted, provided that the above copyright notice * appear in all copies and that both that copyright notice and * this permission notice appear in supporting documentation, * and that the names of M.I.T. and the M.I.T. S.I.P.B. not be * used in advertising or publicity pertaining to distribution * of the software without specific, written prior permission. * M.I.T. and the M.I.T. S.I.P.B. make no representations about * the suitability of this software for any purpose. It is * provided "as is" without express or implied warranty. */ /* * program to initialize the database, reports error if database file * already exists. */ #include "adm_locl.h" enum ap_op { NULL_KEY, /* setup null keys */ MASTER_KEY, /* use master key as new key */ RANDOM_KEY /* choose a random key */ }; static des_cblock master_key; static des_key_schedule master_key_schedule; static char progname[]="kdb_init"; /* use a return code to indicate success or failure. check the return */ /* values of the routines called by this routine. */ static int add_principal(char *name, char *instance, enum ap_op aap_op, int maxlife) { Principal principal; struct tm *tm; des_cblock new_key; memset(&principal, 0, sizeof(principal)); strncpy(principal.name, name, ANAME_SZ - 1); principal.name[ANAME_SZ - 1] = '\0'; strncpy(principal.instance, instance, INST_SZ - 1); principal.instance[INST_SZ - 1] = '\0'; switch (aap_op) { case NULL_KEY: principal.key_low = 0; principal.key_high = 0; break; case RANDOM_KEY: #ifdef NOENCRYPTION memset(new_key, 0, sizeof(des_cblock)); new_key[0] = 127; #else des_new_random_key(&new_key); #endif kdb_encrypt_key (&new_key, &new_key, &master_key, master_key_schedule, DES_ENCRYPT); copy_from_key(new_key, &principal.key_low, &principal.key_high); memset(new_key, 0, sizeof(new_key)); break; case MASTER_KEY: memcpy(new_key, master_key, sizeof (des_cblock)); kdb_encrypt_key (&new_key, &new_key, &master_key, master_key_schedule, DES_ENCRYPT); copy_from_key(new_key, &principal.key_low, &principal.key_high); break; } principal.mod_date = time(0); principal.exp_date = KDBINIT_EXPDATE; strncpy(principal.exp_date_txt, KDBINIT_EXPDATE_TXT, DATE_SZ); tm = k_localtime(&principal.mod_date); principal.attributes = 0; principal.max_life = maxlife; principal.kdc_key_ver = 1; principal.key_version = 1; strncpy(principal.mod_name, "db_creation", ANAME_SZ - 1); principal.mod_name[ANAME_SZ - 1] = '\0'; strncpy(principal.mod_instance, "", INST_SZ - 1); principal.mod_instance[INST_SZ - 1] = '\0'; principal.old = 0; if (kerb_db_put_principal(&principal, 1) != 1) return -1; /* FAIL */ /* let's play it safe */ memset(new_key, 0, sizeof (des_cblock)); memset(&principal.key_low, 0, 4); memset(&principal.key_high, 0, 4); return 0; } int main(int argc, char **argv) { char realm[REALM_SZ]; char *cp; int code; char *database; if (argc > 3) { fprintf(stderr, "Usage: %s [realm-name] [database-name]\n", progname); return 1; } if (argc == 3) { database = argv[2]; --argc; } else database = DBM_FILE; /* Do this first, it'll fail if the database exists */ if ((code = kerb_db_create(database)) != 0) err (1, "Couldn't create database %s", database); kerb_db_set_name(database); if (argc == 2) strncpy(realm, argv[1], REALM_SZ); else { if (krb_get_lrealm(realm, 1) != KSUCCESS) { strncpy(realm, KRB_REALM, REALM_SZ - 1); realm[REALM_SZ - 1] = '\0'; } fprintf(stderr, "Realm name [default %s ]: ", realm); if (fgets(realm, sizeof(realm), stdin) == NULL) errx (1, "\nEOF reading realm"); if ((cp = strchr(realm, '\n'))) *cp = '\0'; if (!*realm) /* no realm given */ if (krb_get_lrealm(realm, 1) != KSUCCESS) { strncpy(realm, KRB_REALM, REALM_SZ - 1); realm[REALM_SZ - 1] = '\0'; } } if (!k_isrealm(realm)) errx (1, "Bad kerberos realm name \"%s\"", realm); #ifndef RANDOM_MKEY printf("You will be prompted for the database Master Password.\n"); printf("It is important that you NOT FORGET this password.\n"); #else printf("To generate a master key, please enter some random data.\n"); printf("You do not have to remember this.\n"); #endif fflush(stdout); if (kdb_get_master_key (KDB_GET_TWICE, &master_key, master_key_schedule) != 0) errx (1, "Couldn't read master key."); #ifdef RANDOM_MKEY if(kdb_kstash(&master_key, MKEYFILE) < 0) err (1, "Error writing master key"); fprintf(stderr, "Wrote master key to %s\n", MKEYFILE); #endif /* Initialize non shared random sequence */ des_init_random_number_generator(&master_key); /* Maximum lifetime for changepw.kerberos (kadmin) tickets, 10 minutes */ #define ADMLIFE (1 + (CLOCK_SKEW/(5*60))) /* Maximum lifetime for ticket granting tickets, 4 days or 21.25h */ #define TGTLIFE ((krb_life_to_time(0, 162) >= 24*60*60) ? 161 : 255) /* This means that default lifetimes have not been initialized */ #define DEFLIFE 255 #define NOLIFE 0 if ( add_principal(KERB_M_NAME, KERB_M_INST, MASTER_KEY, NOLIFE) || add_principal(KERB_DEFAULT_NAME, KERB_DEFAULT_INST, NULL_KEY,DEFLIFE)|| add_principal(KRB_TICKET_GRANTING_TICKET, realm, RANDOM_KEY, TGTLIFE)|| add_principal(PWSERV_NAME, KRB_MASTER, RANDOM_KEY, ADMLIFE) ) { putc ('\n', stderr); errx (1, "couldn't initialize database."); } /* play it safe */ memset(master_key, 0, sizeof (des_cblock)); memset(master_key_schedule, 0, sizeof (des_key_schedule)); return 0; }