pgreco / rpms / ipa

Forked from forks/areguera/rpms/ipa 4 years ago
Clone

Blame SOURCES/0017-trust-detect-and-error-out-when-non-AD-trust-with-IP.patch

3f51ca
From a4e9e8f368c8a61d539e9da26e4a16a6234c138f Mon Sep 17 00:00:00 2001
3f51ca
From: Alexander Bokovoy <abokovoy@redhat.com>
3f51ca
Date: Fri, 17 Nov 2017 17:19:25 +0200
3f51ca
Subject: [PATCH] trust: detect and error out when non-AD trust with IPA domain
3f51ca
 name exists
3f51ca
3f51ca
Quite often users choose wrong type of trust on Active Directory side
3f51ca
when setting up a trust to freeIPA. The trust type supported by freeIPA
3f51ca
is just a normal forest trust to another Active Directory. However,
3f51ca
some people follow old internet recipes that force using a trust to MIT
3f51ca
Kerberos realm.
3f51ca
3f51ca
This is a wrong type of trust. Unfortunately, when someone used MIT
3f51ca
Kerberos realm trust, there is no way to programmatically remote the
3f51ca
trust from freeIPA side. As result, we have to detect such situation and
3f51ca
report an error.
3f51ca
3f51ca
To do proper reporting, we need reuse some constants and trust type
3f51ca
names we use in IPA CLI/Web UI. These common components were moved to
3f51ca
a separate ipaserver/dcerpc_common.py module that is imported by both
3f51ca
ipaserver/plugins/trust.py and ipaserver/dcerpc.py.
3f51ca
3f51ca
Fixes https://pagure.io/freeipa/issue/7264
3f51ca
3f51ca
Reviewed-By: Christian Heimes <cheimes@redhat.com>
3f51ca
Reviewed-By: Thierry Bordaz <tbordaz@redhat.com>
3f51ca
---
3f51ca
 ipaserver/dcerpc.py        | 37 +++++++++++++++--------
3f51ca
 ipaserver/dcerpc_common.py | 73 ++++++++++++++++++++++++++++++++++++++++++++++
3f51ca
 ipaserver/plugins/trust.py | 65 ++++++++++-------------------------------
3f51ca
 3 files changed, 113 insertions(+), 62 deletions(-)
3f51ca
 create mode 100644 ipaserver/dcerpc_common.py
3f51ca
3f51ca
diff --git a/ipaserver/dcerpc.py b/ipaserver/dcerpc.py
3f51ca
index aa63cd9db0a1d47b5309cc6bed2ff7584760a39d..ac1b2a34784df491a3851aa21bbadbec2297241c 100644
3f51ca
--- a/ipaserver/dcerpc.py
3f51ca
+++ b/ipaserver/dcerpc.py
3f51ca
@@ -31,6 +31,10 @@ from ipapython import ipautil
3f51ca
 from ipapython.ipa_log_manager import root_logger
3f51ca
 from ipapython.dn import DN
3f51ca
 from ipaserver.install import installutils
3f51ca
+from ipaserver.dcerpc_common import (TRUST_BIDIRECTIONAL,
3f51ca
+                                     TRUST_JOIN_EXTERNAL,
3f51ca
+                                     trust_type_string)
3f51ca
+
3f51ca
 from ipalib.util import normalize_name
3f51ca
 
3f51ca
 import os
3f51ca
@@ -77,15 +81,6 @@ The code in this module relies heavily on samba4-python package
3f51ca
 and Samba4 python bindings.
3f51ca
 """)
3f51ca
 
3f51ca
-# Both constants can be used as masks against trust direction
3f51ca
-# because bi-directional has two lower bits set.
3f51ca
-TRUST_ONEWAY = 1
3f51ca
-TRUST_BIDIRECTIONAL = 3
3f51ca
-
3f51ca
-# Trust join behavior
3f51ca
-# External trust -- allow creating trust to a non-root domain in the forest
3f51ca
-TRUST_JOIN_EXTERNAL = 1
3f51ca
-
3f51ca
 
3f51ca
 def is_sid_valid(sid):
3f51ca
     try:
3f51ca
@@ -151,6 +146,7 @@ pysss_type_key_translation_dict = {
3f51ca
     pysss_nss_idmap.ID_BOTH: 'both',
3f51ca
 }
3f51ca
 
3f51ca
+
3f51ca
 class TrustTopologyConflictSolved(Exception):
3f51ca
     """
3f51ca
     Internal trust error: raised when previously detected
3f51ca
@@ -1254,9 +1250,26 @@ class TrustDomainInstance(object):
3f51ca
             dname = lsa.String()
3f51ca
             dname.string = another_domain.info['dns_domain']
3f51ca
             res = self._pipe.QueryTrustedDomainInfoByName(
3f51ca
-                                self._policy_handle,
3f51ca
-                                dname,
3f51ca
-                                lsa.LSA_TRUSTED_DOMAIN_INFO_FULL_INFO)
3f51ca
+                self._policy_handle,
3f51ca
+                dname,
3f51ca
+                lsa.LSA_TRUSTED_DOMAIN_INFO_FULL_INFO
3f51ca
+            )
3f51ca
+            if res.info_ex.trust_type != lsa.LSA_TRUST_TYPE_UPLEVEL:
3f51ca
+                msg = _('There is already a trust to {ipa_domain} with '
3f51ca
+                        'unsupported type {trust_type}. Please remove '
3f51ca
+                        'it manually on AD DC side.')
3f51ca
+                ttype = trust_type_string(
3f51ca
+                    res.info_ex.trust_type, res.info_ex.trust_attributes
3f51ca
+                )
3f51ca
+                err = unicode(msg).format(
3f51ca
+                    ipa_domain=another_domain.info['dns_domain'],
3f51ca
+                    trust_type=ttype)
3f51ca
+
3f51ca
+                raise errors.ValidationError(
3f51ca
+                    name=_('AD domain controller'),
3f51ca
+                    error=err
3f51ca
+                )
3f51ca
+
3f51ca
             self._pipe.DeleteTrustedDomain(self._policy_handle,
3f51ca
                                            res.info_ex.sid)
3f51ca
         except RuntimeError as e:
3f51ca
diff --git a/ipaserver/dcerpc_common.py b/ipaserver/dcerpc_common.py
3f51ca
new file mode 100644
3f51ca
index 0000000000000000000000000000000000000000..526b025e3282c8a556088eb2ed1ba467b889b86c
3f51ca
--- /dev/null
3f51ca
+++ b/ipaserver/dcerpc_common.py
3f51ca
@@ -0,0 +1,73 @@
3f51ca
+import six
3f51ca
+from ipalib import _
3f51ca
+if six.PY3:
3f51ca
+    unicode = six.text_type
3f51ca
+
3f51ca
+# Both constants can be used as masks against trust direction
3f51ca
+# because bi-directional has two lower bits set.
3f51ca
+TRUST_ONEWAY = 1
3f51ca
+TRUST_BIDIRECTIONAL = 3
3f51ca
+
3f51ca
+# Trust join behavior
3f51ca
+# External trust -- allow creating trust to a non-root domain in the forest
3f51ca
+TRUST_JOIN_EXTERNAL = 1
3f51ca
+
3f51ca
+# We don't want to import any of Samba Python code here just for constants
3f51ca
+# Since these constants set in MS-ADTS, we can rely on their stability
3f51ca
+LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE = 0x00000001
3f51ca
+
3f51ca
+_trust_direction_dict = {
3f51ca
+        1: _('Trusting forest'),
3f51ca
+        2: _('Trusted forest'),
3f51ca
+        3: _('Two-way trust')
3f51ca
+}
3f51ca
+
3f51ca
+_trust_status_dict = {
3f51ca
+        True: _('Established and verified'),
3f51ca
+        False: _('Waiting for confirmation by remote side')
3f51ca
+}
3f51ca
+
3f51ca
+_trust_type_dict_unknown = _('Unknown')
3f51ca
+
3f51ca
+# Trust type is a combination of ipanttrusttype and ipanttrustattributes
3f51ca
+# We shift trust attributes by 3 bits to left so bit 0 becomes bit 3 and
3f51ca
+# 2+(1 << 3) becomes 10.
3f51ca
+_trust_type_dict = {
3f51ca
+        1: _('Non-Active Directory domain'),
3f51ca
+        2: _('Active Directory domain'),
3f51ca
+        3: _('RFC4120-compliant Kerberos realm'),
3f51ca
+        10: _('Non-transitive external trust to a domain in '
3f51ca
+              'another Active Directory forest'),
3f51ca
+        11: _('Non-transitive external trust to an RFC4120-'
3f51ca
+              'compliant Kerberos realm')
3f51ca
+}
3f51ca
+
3f51ca
+
3f51ca
+def trust_type_string(level, attrs):
3f51ca
+    """
3f51ca
+    Returns a string representing a type of the trust.
3f51ca
+    The original field is an enum:
3f51ca
+      LSA_TRUST_TYPE_DOWNLEVEL  = 0x00000001,
3f51ca
+      LSA_TRUST_TYPE_UPLEVEL    = 0x00000002,
3f51ca
+      LSA_TRUST_TYPE_MIT        = 0x00000003
3f51ca
+    """
3f51ca
+    transitive = int(attrs) & LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE
3f51ca
+    string = _trust_type_dict.get(int(level) | (transitive << 3),
3f51ca
+                                  _trust_type_dict_unknown)
3f51ca
+    return unicode(string)
3f51ca
+
3f51ca
+
3f51ca
+def trust_direction_string(level):
3f51ca
+    """
3f51ca
+    Returns a string representing a direction of the trust.
3f51ca
+    The original field is a bitmask taking two bits in use
3f51ca
+      LSA_TRUST_DIRECTION_INBOUND  = 0x00000001,
3f51ca
+      LSA_TRUST_DIRECTION_OUTBOUND = 0x00000002
3f51ca
+    """
3f51ca
+    string = _trust_direction_dict.get(int(level), _trust_type_dict_unknown)
3f51ca
+    return unicode(string)
3f51ca
+
3f51ca
+
3f51ca
+def trust_status_string(level):
3f51ca
+    string = _trust_status_dict.get(level, _trust_type_dict_unknown)
3f51ca
+    return unicode(string)
3f51ca
diff --git a/ipaserver/plugins/trust.py b/ipaserver/plugins/trust.py
3f51ca
index d0bbfbc47ca65c9c5229685fc9d202c293fe41cd..ecc5fa0b22f94de05cc5282758be093f0cfca13f 100644
3f51ca
--- a/ipaserver/plugins/trust.py
3f51ca
+++ b/ipaserver/plugins/trust.py
3f51ca
@@ -44,6 +44,13 @@ from ipalib import errors
3f51ca
 from ipalib import output
3f51ca
 from ldap import SCOPE_SUBTREE
3f51ca
 from time import sleep
3f51ca
+from ipaserver.dcerpc_common import (TRUST_ONEWAY,
3f51ca
+                                     TRUST_BIDIRECTIONAL,
3f51ca
+                                     TRUST_JOIN_EXTERNAL,
3f51ca
+                                     LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE,
3f51ca
+                                     trust_type_string,
3f51ca
+                                     trust_direction_string,
3f51ca
+                                     trust_status_string)
3f51ca
 
3f51ca
 if six.PY3:
3f51ca
     unicode = str
3f51ca
@@ -63,9 +70,6 @@ except Exception as e:
3f51ca
 if api.env.in_server and api.env.context in ['lite', 'server']:
3f51ca
     try:
3f51ca
         import ipaserver.dcerpc
3f51ca
-        from ipaserver.dcerpc import (TRUST_ONEWAY,
3f51ca
-                                      TRUST_BIDIRECTIONAL,
3f51ca
-                                      TRUST_JOIN_EXTERNAL)
3f51ca
         import dbus
3f51ca
         import dbus.mainloop.glib
3f51ca
         _bindings_installed = True
3f51ca
@@ -157,28 +161,14 @@ particular type.
3f51ca
 
3f51ca
 register = Registry()
3f51ca
 
3f51ca
-# Trust type is a combination of ipanttrusttype and ipanttrustattributes
3f51ca
-# We shift trust attributes by 3 bits to left so bit 0 becomes bit 3 and
3f51ca
-# 2+(1 << 3) becomes 10.
3f51ca
-_trust_type_dict = {1 : _('Non-Active Directory domain'),
3f51ca
-                    2 : _('Active Directory domain'),
3f51ca
-                    3 : _('RFC4120-compliant Kerberos realm'),
3f51ca
-                    10: _('Non-transitive external trust to a domain in another Active Directory forest')}
3f51ca
-
3f51ca
-_trust_direction_dict = {1 : _('Trusting forest'),
3f51ca
-                         2 : _('Trusted forest'),
3f51ca
-                         3 : _('Two-way trust')}
3f51ca
-_trust_status_dict = {True : _('Established and verified'),
3f51ca
-                 False : _('Waiting for confirmation by remote side')}
3f51ca
-_trust_type_dict_unknown = _('Unknown')
3f51ca
-
3f51ca
-_trust_type_option = StrEnum('trust_type',
3f51ca
-                        cli_name='type',
3f51ca
-                        label=_('Trust type (ad for Active Directory, default)'),
3f51ca
-                        values=(u'ad',),
3f51ca
-                        default=u'ad',
3f51ca
-                        autofill=True,
3f51ca
-                    )
3f51ca
+_trust_type_option = StrEnum(
3f51ca
+         'trust_type',
3f51ca
+         cli_name='type',
3f51ca
+         label=_('Trust type (ad for Active Directory, default)'),
3f51ca
+         values=(u'ad',),
3f51ca
+         default=u'ad',
3f51ca
+         autofill=True,
3f51ca
+        )
3f51ca
 
3f51ca
 DEFAULT_RANGE_SIZE = 200000
3f51ca
 
3f51ca
@@ -187,31 +177,6 @@ DBUS_IFACE_TRUST = 'com.redhat.idm.trust'
3f51ca
 CRED_STYLE_SAMBA = 1
3f51ca
 CRED_STYLE_KERBEROS = 2
3f51ca
 
3f51ca
-LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE = 0x00000001
3f51ca
-
3f51ca
-def trust_type_string(level, attrs):
3f51ca
-    """
3f51ca
-    Returns a string representing a type of the trust. The original field is an enum:
3f51ca
-      LSA_TRUST_TYPE_DOWNLEVEL  = 0x00000001,
3f51ca
-      LSA_TRUST_TYPE_UPLEVEL    = 0x00000002,
3f51ca
-      LSA_TRUST_TYPE_MIT        = 0x00000003
3f51ca
-    """
3f51ca
-    transitive = int(attrs) & LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE
3f51ca
-    string = _trust_type_dict.get(int(level) | (transitive << 3), _trust_type_dict_unknown)
3f51ca
-    return unicode(string)
3f51ca
-
3f51ca
-def trust_direction_string(level):
3f51ca
-    """
3f51ca
-    Returns a string representing a direction of the trust. The original field is a bitmask taking two bits in use
3f51ca
-      LSA_TRUST_DIRECTION_INBOUND  = 0x00000001,
3f51ca
-      LSA_TRUST_DIRECTION_OUTBOUND = 0x00000002
3f51ca
-    """
3f51ca
-    string = _trust_direction_dict.get(int(level), _trust_type_dict_unknown)
3f51ca
-    return unicode(string)
3f51ca
-
3f51ca
-def trust_status_string(level):
3f51ca
-    string = _trust_status_dict.get(level, _trust_type_dict_unknown)
3f51ca
-    return unicode(string)
3f51ca
 
3f51ca
 def make_trust_dn(env, trust_type, dn):
3f51ca
     assert isinstance(dn, DN)
3f51ca
-- 
3f51ca
2.13.6
3f51ca