/* * Copyright (c) 2010, 2019, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Oracle designates this * particular file as subject to the "Classpath" exception as provided * by Oracle in the LICENSE file that accompanied this code. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ package sun.security.krb5; import java.io.IOException; import java.util.Arrays; import javax.security.auth.kerberos.KeyTab; import sun.security.jgss.krb5.Krb5Util; import sun.security.krb5.internal.HostAddresses; import sun.security.krb5.internal.KDCOptions; import sun.security.krb5.internal.KRBError; import sun.security.krb5.internal.KerberosTime; import sun.security.krb5.internal.Krb5; import sun.security.krb5.internal.PAData; import sun.security.krb5.internal.crypto.EType; /** * A manager class for AS-REQ communications. * * This class does: * 1. Gather information to create AS-REQ * 2. Create and send AS-REQ * 3. Receive AS-REP and KRB-ERROR (-KRB_ERR_RESPONSE_TOO_BIG) and parse them * 4. Emit credentials and secret keys (for JAAS storeKey=true with password) * * This class does not: * 1. Deal with real communications (KdcComm does it, and TGS-REQ) * a. Name of KDCs for a realm * b. Server availability, timeout, UDP or TCP * d. KRB_ERR_RESPONSE_TOO_BIG * 2. Stores its own copy of password, this means: * a. Do not change/wipe it before Builder finish * b. Builder will not wipe it for you * * With this class: * 1. KrbAsReq has only one constructor * 2. Krb5LoginModule and Kinit call a single builder * 3. Better handling of sensitive info * * @since 1.7 */ public final class KrbAsReqBuilder { // Common data for AS-REQ fields private KDCOptions options; private PrincipalName cname; private PrincipalName sname; private KerberosTime from; private KerberosTime till; private KerberosTime rtime; private HostAddresses addresses; // Secret source: can't be changed once assigned, only one (of the two // sources) can be set to non-null private final char[] password; private final KeyTab ktab; // Used to create a ENC-TIMESTAMP in the 2nd AS-REQ private PAData[] paList; // PA-DATA from both KRB-ERROR and AS-REP. // Used by getKeys() only. // Only AS-REP should be enough per RFC, // combined in case etypes are different. // The generated and received: private KrbAsReq req; private KrbAsRep rep; private static enum State { INIT, // Initialized, can still add more initialization info REQ_OK, // AS-REQ performed DESTROYED, // Destroyed, not usable anymore } private State state; // Called by other constructors private void init(PrincipalName cname) throws KrbException { this.cname = cname; state = State.INIT; } /** * Creates a builder to be used by {@code cname} with existing keys. * * @param cname the client of the AS-REQ. Must not be null. Might have no * realm, where default realm will be used. This realm will be the target * realm for AS-REQ. I believe a client should only get initial TGT from * its own realm. * @param ktab must not be null. If empty, might be quite useless. * This argument will neither be modified nor stored by the method. * @throws KrbException */ public KrbAsReqBuilder(PrincipalName cname, KeyTab ktab) throws KrbException { init(cname); this.ktab = ktab; this.password = null; } /** * Creates a builder to be used by {@code cname} with a known password. * * @param cname the client of the AS-REQ. Must not be null. Might have no * realm, where default realm will be used. This realm will be the target * realm for AS-REQ. I believe a client should only get initial TGT from * its own realm. * @param pass must not be null. This argument will neither be modified * nor stored by the method. * @throws KrbException */ public KrbAsReqBuilder(PrincipalName cname, char[] pass) throws KrbException { init(cname); this.password = pass.clone(); this.ktab = null; } /** * Retrieves an array of secret keys for the client. This is used when * the client supplies password but need keys to act as an acceptor. For * an initiator, it must be called after AS-REQ is performed (state is OK). * For an acceptor, it can be called when this KrbAsReqBuilder object is * constructed (state is INIT). * @param isInitiator if the caller is an initiator * @return generated keys from password. PA-DATA from server might be used. * All "default_tkt_enctypes" keys will be generated, Never null. * @throws IllegalStateException if not constructed from a password * @throws KrbException */ public EncryptionKey[] getKeys(boolean isInitiator) throws KrbException { checkState(isInitiator?State.REQ_OK:State.INIT, "Cannot get keys"); if (password != null) { int[] eTypes = EType.getDefaults("default_tkt_enctypes"); EncryptionKey[] result = new EncryptionKey[eTypes.length]; /* * Returns an array of keys. Before KrbAsReqBuilder, all etypes * use the same salt which is either the default one or a new salt * coming from PA-DATA. After KrbAsReqBuilder, each etype uses its * own new salt from PA-DATA. For an etype with no PA-DATA new salt * at all, what salt should it use? * * Commonly, the stored keys are only to be used by an acceptor to * decrypt service ticket in AP-REQ. Most impls only allow keys * from a keytab on acceptor, but unfortunately (?) Java supports * acceptor using password. In this case, if the service ticket is * encrypted using an etype which we don't have PA-DATA new salt, * using the default salt might be wrong (say, case-insensitive * user name). Instead, we would use the new salt of another etype. */ String salt = null; // the saved new salt try { for (int i=0; i 0) { int oldLen = paList.length; paList = Arrays.copyOf(paList, paList.length + extraLen); System.arraycopy(rep.getPA(), 0, paList, oldLen, extraLen); } } } return this; } /** * Communication until AS-REP or non preauth-related KRB-ERROR received * @throws KrbException * @throws IOException */ private KrbAsReqBuilder send() throws KrbException, IOException { boolean preAuthFailedOnce = false; KdcComm comm = null; EncryptionKey pakey = null; ReferralsState referralsState = new ReferralsState(); while (true) { if (referralsState.refreshComm()) { comm = new KdcComm(cname.getRealmAsString()); } try { req = build(pakey, referralsState); rep = new KrbAsRep(comm.send(req.encoding())); return this; } catch (KrbException ke) { if (!preAuthFailedOnce && ( ke.returnCode() == Krb5.KDC_ERR_PREAUTH_FAILED || ke.returnCode() == Krb5.KDC_ERR_PREAUTH_REQUIRED)) { if (Krb5.DEBUG) { System.out.println("KrbAsReqBuilder: " + "PREAUTH FAILED/REQ, re-send AS-REQ"); } preAuthFailedOnce = true; KRBError kerr = ke.getError(); int paEType = PAData.getPreferredEType(kerr.getPA(), EType.getDefaults("default_tkt_enctypes")[0]); if (password == null) { EncryptionKey[] ks = Krb5Util.keysFromJavaxKeyTab(ktab, cname); pakey = EncryptionKey.findKey(paEType, ks); if (pakey != null) pakey = (EncryptionKey)pakey.clone(); for (EncryptionKey k: ks) k.destroy(); } else { pakey = EncryptionKey.acquireSecretKey(cname, password, paEType, PAData.getSaltAndParams( paEType, kerr.getPA())); } paList = kerr.getPA(); // Update current paList } else { if (referralsState.handleError(ke)) { continue; } throw ke; } } } } private final class ReferralsState { private boolean enabled; private int count; private boolean refreshComm; ReferralsState() throws KrbException { if (Config.DISABLE_REFERRALS) { if (cname.getNameType() == PrincipalName.KRB_NT_ENTERPRISE) { throw new KrbException("NT-ENTERPRISE principals only allowed" + " when referrals are enabled."); } enabled = false; } else { enabled = true; } refreshComm = true; } boolean handleError(KrbException ke) throws RealmException { if (enabled) { if (ke.returnCode() == Krb5.KRB_ERR_WRONG_REALM) { Realm referredRealm = ke.getError().getClientRealm(); if (req.getMessage().reqBody.kdcOptions.get(KDCOptions.CANONICALIZE) && referredRealm != null && referredRealm.toString().length() > 0 && count < Config.MAX_REFERRALS) { cname = new PrincipalName(cname.getNameString().replaceAll( PrincipalName.NAME_REALM_SEPARATOR + "", "\\\\" + PrincipalName.NAME_REALM_SEPARATOR), cname.getNameType(), referredRealm.toString()); refreshComm = true; count++; return true; } } if (count < Config.MAX_REFERRALS && cname.getNameType() != PrincipalName.KRB_NT_ENTERPRISE) { // Server may raise an error if CANONICALIZE is true. // Try CANONICALIZE false. enabled = false; return true; } } return false; } boolean refreshComm() { boolean retRefreshComm = refreshComm; refreshComm = false; return retRefreshComm; } boolean isEnabled() { return enabled; } } /** * Performs AS-REQ send and AS-REP receive. * Maybe a state is needed here, to divide prepare process and getCreds. * @throws KrbException * @throws Asn1Exception * @throws IOException */ public KrbAsReqBuilder action() throws KrbException, Asn1Exception, IOException { checkState(State.INIT, "Cannot call action"); state = State.REQ_OK; return send().resolve(); } /** * Gets Credentials object after action */ public Credentials getCreds() { checkState(State.REQ_OK, "Cannot retrieve creds"); return rep.getCreds(); } /** * Gets another type of Credentials after action */ public sun.security.krb5.internal.ccache.Credentials getCCreds() { checkState(State.REQ_OK, "Cannot retrieve CCreds"); return rep.getCCreds(); } /** * Destroys the object and clears keys and password info. */ public void destroy() { state = State.DESTROYED; if (password != null) { Arrays.fill(password, (char)0); } } /** * Checks if the current state is the specified one. * @param st the expected state * @param msg error message if state is not correct * @throws IllegalStateException if state is not correct */ private void checkState(State st, String msg) { if (state != st) { throw new IllegalStateException(msg + " at " + st + " state"); } } }