/* * Copyright 1989 by the Massachusetts Institute of Technology. * * For copying and distribution information, please see the file * Copyright.MIT. * * list and update contents of srvtab files */ #if 0 #ifndef lint static char rcsid_ksrvutil_c[] = "BonesHeader: /afs/athena.mit.edu/astaff/project/kerberos/src/kadmin/RCS/ksrvutil.c,v 4.1 89/09/26 09:33:49 jtkohl Exp "; static const char rcsid[] = "$Id$"; #endif lint #endif /* * ksrvutil * list and update the contents of srvtab files */ #ifndef FALSE #define FALSE 0 #endif #ifndef TRUE #define TRUE 1 #endif #include #include #include #include #include #include #include #include #include #include #include #ifdef NOENCRYPTION #define read_long_pw_string placebo_read_pw_string #else /* NOENCRYPTION */ #define read_long_pw_string des_read_pw_string #endif /* NOENCRYPTION */ int read_long_pw_string(); #define SRVTAB_MODE 0600 /* rw------- */ #define PAD " " #define VNO_HEADER "Version" #define VNO_FORMAT "%4d " #define KEY_HEADER " Key " /* 17 characters long */ #define PRINC_HEADER " Principal\n" #define PRINC_FORMAT "%s" void usage(void); void leave(char *str, int x); void get_key_from_password(des_cblock key); void print_name(char *name, char *inst, char *realm); void print_key(des_cblock key); unsigned short get_mode(char *filename); int get_svc_new_key(des_cblock new_key, char *sname, char *sinst, char *srealm, char *keyfile); void copy_keyfile(progname, keyfile, backup_keyfile) char *progname; char *keyfile; char *backup_keyfile; { int keyfile_fd; int backup_keyfile_fd; int keyfile_mode; char buf[BUFSIZ]; /* for copying keyfiles */ int rcount; /* for copying keyfiles */ int try_again; bzero((char *)buf, sizeof(buf)); do { try_again = FALSE; if ((keyfile_fd = open(keyfile, O_RDONLY, 0)) < 0) { if (errno != ENOENT) { err(1, "unable to read %s", keyfile); } else { try_again = TRUE; if ((keyfile_fd = open(keyfile, O_WRONLY | O_TRUNC | O_CREAT, SRVTAB_MODE)) < 0) { err(1, "unable to create %s", keyfile); } else if (close(keyfile_fd) < 0) { err(1, "failure closing %s", keyfile); } } } } while(try_again); keyfile_mode = get_mode(keyfile); if ((backup_keyfile_fd = open(backup_keyfile, O_WRONLY | O_TRUNC | O_CREAT, keyfile_mode)) < 0) { err(1, "unable to write %s", backup_keyfile); } do { if ((rcount = read(keyfile_fd, (char *)buf, sizeof(buf))) < 0) { err(1, "error reading %s", keyfile); } if (rcount && (write(backup_keyfile_fd, buf, rcount) != rcount)) { err(1, "error writing %s", backup_keyfile); } } while (rcount); if (close(backup_keyfile_fd) < 0) { err(1, "error closing %s", backup_keyfile); } if (close(keyfile_fd) < 0) { err(1, "error closing %s", keyfile); } } void safe_read_stdin(prompt, buf, size) char *prompt; char *buf; int size; { printf(prompt); fflush(stdout); bzero(buf, size); if (read(0, buf, size - 1) < 0) { warn("failure reading from stdin"); leave((char *)NULL, 1); } fflush(stdin); buf[strlen(buf)-1] = 0; } void safe_write(progname, filename, fd, buf, len) char *progname; char *filename; int fd; char *buf; int len; { if (write(fd, buf, len) != len) { warn("failure writing %s", filename); close(fd); leave("In progress srvtab in this file.", 1); } } int yn(string) char *string; { char ynbuf[5]; printf("%s (y,n) [y] ", string); for (;;) { safe_read_stdin("", ynbuf, sizeof(ynbuf)); if ((ynbuf[0] == 'n') || (ynbuf[0] == 'N')) return(0); else if ((ynbuf[0] == 'y') || (ynbuf[0] == 'Y') || (ynbuf[0] == 0)) return(1); else { printf("Please enter 'y' or 'n': "); fflush(stdout); } } } void append_srvtab(progname, filename, fd, sname, sinst, srealm, key_vno, key) char *progname; char *filename; int fd; char *sname; char *sinst; char *srealm; unsigned char key_vno; des_cblock key; { /* Add one to append null */ safe_write(progname, filename, fd, sname, strlen(sname) + 1); safe_write(progname, filename, fd, sinst, strlen(sinst) + 1); safe_write(progname, filename, fd, srealm, strlen(srealm) + 1); safe_write(progname, filename, fd, (char *)&key_vno, 1); safe_write(progname, filename, fd, (char *)key, sizeof(des_cblock)); fsync(fd); } unsigned short get_mode(filename) char *filename; { struct stat statbuf; unsigned short mode; bzero((char *)&statbuf, sizeof(statbuf)); if (stat(filename, &statbuf) < 0) mode = SRVTAB_MODE; else mode = statbuf.st_mode; return(mode); } int main(argc,argv) int argc; char *argv[]; { char sname[ANAME_SZ]; /* name of service */ char sinst[INST_SZ]; /* instance of service */ char srealm[REALM_SZ]; /* realm of service */ unsigned char key_vno; /* key version number */ int status; /* general purpose error status */ des_cblock new_key; des_cblock old_key; char change_tkt[MAXPATHLEN]; /* Ticket to use for key change */ char keyfile[MAXPATHLEN]; /* Original keyfile */ char work_keyfile[MAXPATHLEN]; /* Working copy of keyfile */ char backup_keyfile[MAXPATHLEN]; /* Backup copy of keyfile */ unsigned short keyfile_mode; /* Protections on keyfile */ int work_keyfile_fd = -1; /* Initialize so that */ int backup_keyfile_fd = -1; /* compiler doesn't complain */ char local_realm[REALM_SZ]; /* local kerberos realm */ int i; int interactive = FALSE; int list = FALSE; int change = FALSE; int add = FALSE; int key = FALSE; /* do we show keys? */ int arg_entered = FALSE; int change_this_key = FALSE; char databuf[BUFSIZ]; int first_printed = FALSE; /* have we printed the first item? */ bzero((char *)sname, sizeof(sname)); bzero((char *)sinst, sizeof(sinst)); bzero((char *)srealm, sizeof(srealm)); bzero((char *)change_tkt, sizeof(change_tkt)); bzero((char *)keyfile, sizeof(keyfile)); bzero((char *)work_keyfile, sizeof(work_keyfile)); bzero((char *)backup_keyfile, sizeof(backup_keyfile)); bzero((char *)local_realm, sizeof(local_realm)); sprintf(change_tkt, "/tmp/tkt_ksrvutil.%d", getpid()); krb_set_tkt_string(change_tkt); /* This is used only as a default for adding keys */ if (krb_get_lrealm(local_realm, 1) != KSUCCESS) strcpy(local_realm, KRB_REALM); for (i = 1; i < argc; i++) { if (strcmp(argv[i], "-i") == 0) interactive++; else if (strcmp(argv[i], "-k") == 0) key++; else if (strcmp(argv[i], "list") == 0) { if (arg_entered) usage(); else { arg_entered++; list++; } } else if (strcmp(argv[i], "change") == 0) { if (arg_entered) usage(); else { arg_entered++; change++; } } else if (strcmp(argv[i], "add") == 0) { if (arg_entered) usage(); else { arg_entered++; add++; } } else if (strcmp(argv[i], "-f") == 0) { if (++i == argc) usage(); else strcpy(keyfile, argv[i]); } else usage(); } if (!arg_entered) usage(); if (!keyfile[0]) strcpy(keyfile, KEYFILE); strcpy(work_keyfile, keyfile); strcpy(backup_keyfile, keyfile); if (change || add) { strcat(work_keyfile, ".work"); strcat(backup_keyfile, ".old"); copy_keyfile(argv[0], keyfile, backup_keyfile); } if (add) copy_keyfile(argv[0], backup_keyfile, work_keyfile); keyfile_mode = get_mode(keyfile); if (change || list) { if ((backup_keyfile_fd = open(backup_keyfile, O_RDONLY, 0)) < 0) { err(1, "unable to read %s", backup_keyfile); } } if (change) { if ((work_keyfile_fd = open(work_keyfile, O_WRONLY | O_CREAT | O_TRUNC, SRVTAB_MODE)) < 0) { err(1, "unable to write %s", work_keyfile); } } else if (add) { if ((work_keyfile_fd = open(work_keyfile, O_APPEND | O_WRONLY, SRVTAB_MODE)) < 0) { err(1, "unable to append to %s", work_keyfile); } } if (change || list) { while ((getst(backup_keyfile_fd, sname, SNAME_SZ) > 0) && (getst(backup_keyfile_fd, sinst, INST_SZ) > 0) && (getst(backup_keyfile_fd, srealm, REALM_SZ) > 0) && (read(backup_keyfile_fd, &key_vno, 1) > 0) && (read(backup_keyfile_fd,(char *)old_key,sizeof(old_key)) > 0)) { if (list) { if (!first_printed) { printf(VNO_HEADER); printf(PAD); if (key) { printf(KEY_HEADER); printf(PAD); } printf(PRINC_HEADER); first_printed = 1; } printf(VNO_FORMAT, key_vno); printf(PAD); if (key) { print_key(old_key); printf(PAD); } print_name(sname, sinst, srealm); printf("\n"); } else if (change) { printf("\nPrincipal: "); print_name(sname, sinst, srealm); printf("; version %d\n", key_vno); if (interactive) change_this_key = yn("Change this key?"); else if (change) change_this_key = 1; else change_this_key = 0; if (change_this_key) printf("Changing to version %d.\n", key_vno + 1); else if (change) printf("Not changing this key.\n"); if (change_this_key) { /* * Pick a new key and determine whether or not * it is safe to change */ if ((status = get_svc_new_key(new_key, sname, sinst, srealm, keyfile)) == KADM_SUCCESS) key_vno++; else { bcopy(old_key, new_key, sizeof(new_key)); com_err(argv[0], status, ": key NOT changed"); change_this_key = FALSE; } } else bcopy(old_key, new_key, sizeof(new_key)); append_srvtab(argv[0], work_keyfile, work_keyfile_fd, sname, sinst, srealm, key_vno, new_key); if (key && change_this_key) { printf("Old key: "); print_key(old_key); printf("; new key: "); print_key(new_key); printf("\n"); } if (change_this_key) { if ((status = kadm_change_pw(new_key)) == KADM_SUCCESS) { printf("Key changed.\n"); dest_tkt(); } else { com_err(argv[0], status, " attempting to change password."); dest_tkt(); /* XXX This knows the format of a keyfile */ if (lseek(work_keyfile_fd, -9, L_INCR) >= 0) { key_vno--; safe_write(argv[0], work_keyfile, work_keyfile_fd, (char *)&key_vno, 1); safe_write(argv[0], work_keyfile, work_keyfile_fd, (char *)old_key, sizeof(des_cblock)); fsync(work_keyfile_fd); fprintf(stderr,"Key NOT changed.\n"); } else { warn("unable to revert keyfile"); leave("", 1); } } } } bzero((char *)old_key, sizeof(des_cblock)); bzero((char *)new_key, sizeof(des_cblock)); } } else if (add) { do { do { safe_read_stdin("Name: ", databuf, sizeof(databuf)); strncpy(sname, databuf, sizeof(sname) - 1); safe_read_stdin("Instance: ", databuf, sizeof(databuf)); strncpy(sinst, databuf, sizeof(sinst) - 1); safe_read_stdin("Realm: ", databuf, sizeof(databuf)); strncpy(srealm, databuf, sizeof(srealm) - 1); safe_read_stdin("Version number: ", databuf, sizeof(databuf)); key_vno = atoi(databuf); if (!srealm[0]) strcpy(srealm, local_realm); printf("New principal: "); print_name(sname, sinst, srealm); printf("; version %d\n", key_vno); } while (!yn("Is this correct?")); get_key_from_password(new_key); if (key) { printf("Key: "); print_key(new_key); printf("\n"); } append_srvtab(argv[0], work_keyfile, work_keyfile_fd, sname, sinst, srealm, key_vno, new_key); printf("Key successfully added.\n"); } while (yn("Would you like to add another key?")); } if (change || list) if (close(backup_keyfile_fd) < 0) { warn("failure closing %s, continuing", backup_keyfile); } if (change || add) { if (close(work_keyfile_fd) < 0) { err(1, "failure closing %s", work_keyfile); } if (rename(work_keyfile, keyfile) < 0) { err(1, "failure renaming %s to %s", work_keyfile, keyfile); } chmod(backup_keyfile, keyfile_mode); chmod(keyfile, keyfile_mode); printf("Old keyfile in %s.\n", backup_keyfile); } exit(0); } void print_key(key) des_cblock key; { int i; for (i = 0; i < 4; i++) printf("%02x", key[i]); printf(" "); for (i = 4; i < 8; i++) printf("%02x", key[i]); } void print_name(name, inst, realm) char *name; char *inst; char *realm; { printf("%s%s%s%s%s", name, inst[0] ? "." : "", inst, realm[0] ? "@" : "", realm); } int get_svc_new_key(new_key, sname, sinst, srealm, keyfile) des_cblock new_key; char *sname; char *sinst; char *srealm; char *keyfile; { int status = KADM_SUCCESS; CREDENTIALS c; if (((status = krb_get_svc_in_tkt(sname, sinst, srealm, PWSERV_NAME, KADM_SINST, 1, keyfile)) == KSUCCESS) && ((status = krb_get_cred(PWSERV_NAME, KADM_SINST, srealm, &c)) == KSUCCESS) && ((status = kadm_init_link("changepw", KRB_MASTER, srealm)) == KADM_SUCCESS)) { #ifdef NOENCRYPTION bzero((char *) new_key, sizeof(des_cblock)); new_key[0] = (unsigned char) 1; #else /* NOENCRYPTION */ des_init_random_number_generator(c.session); (void) des_new_random_key(new_key); #endif /* NOENCRYPTION */ return(KADM_SUCCESS); } return(status); } void get_key_from_password(key) des_cblock key; { char password[MAX_KPW_LEN]; /* storage for the password */ if (read_long_pw_string(password, sizeof(password)-1, "Password: ", 1)) leave("Error reading password.", 1); #ifdef NOENCRYPTION bzero((char *) key, sizeof(des_cblock)); key[0] = (unsigned char) 1; #else /* NOENCRYPTION */ des_string_to_key(password, (des_cblock *)key); #endif /* NOENCRYPTION */ bzero((char *)password, sizeof(password)); } void usage() { fprintf(stderr, "Usage: ksrvutil [-f keyfile] [-i] [-k] "); fprintf(stderr, "{list | change | add}\n"); fprintf(stderr, " -i causes the program to ask for "); fprintf(stderr, "confirmation before changing keys.\n"); fprintf(stderr, " -k causes the key to printed for list or "); fprintf(stderr, "change.\n"); exit(1); } void leave(str,x) char *str; int x; { if (str) fprintf(stderr, "%s\n", str); dest_tkt(); exit(x); }