pgreco / rpms / ipa

Forked from forks/areguera/rpms/ipa 4 years ago
Clone

Blame SOURCES/0027-ipaserver-dcerpc-fix-exclusion-entry-with-a-forest-t.patch

6d47df
From e5471e66c6a718ffa28433813b8a8d7896b16d9e Mon Sep 17 00:00:00 2001
6d47df
From: Alexander Bokovoy <abokovoy@redhat.com>
6d47df
Date: Mon, 7 Jan 2019 15:28:29 +0200
6d47df
Subject: [PATCH] ipaserver/dcerpc: fix exclusion entry with a forest trust
6d47df
 domain info returned
6d47df
6d47df
When looking through the topology of a trusted forest, we should support
6d47df
all types of forest trust records. Since Samba Python bindings parse the
6d47df
data into a typed structure, a type of the record has to be taken into
6d47df
account or there will be type mismatch when accessing elements of the
6d47df
union:
6d47df
6d47df
        typedef [switch_type(lsa_ForestTrustRecordType)] union {
6d47df
                [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME)] lsa_StringLarge top_level_name;
6d47df
                [case(LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX)] lsa_StringLarge top_level_name_ex;
6d47df
                [case(LSA_FOREST_TRUST_DOMAIN_INFO)] lsa_ForestTrustDomainInfo domain_info;
6d47df
                [default] lsa_ForestTrustBinaryData data;
6d47df
        } lsa_ForestTrustData;
6d47df
6d47df
        typedef struct {
6d47df
                lsa_ForestTrustRecordFlags flags;
6d47df
                lsa_ForestTrustRecordType type;
6d47df
                NTTIME_hyper time;
6d47df
                [switch_is(type)] lsa_ForestTrustData forest_trust_data;
6d47df
        } lsa_ForestTrustRecord;
6d47df
6d47df
        typedef [public] struct {
6d47df
                [range(0,4000)] uint32 count;
6d47df
                [size_is(count)] lsa_ForestTrustRecord **entries;
6d47df
        } lsa_ForestTrustInformation;
6d47df
6d47df
Each entry in the lsa_ForestTrustInformation has forest_trust_data
6d47df
member but its content depends on the value of a type member
6d47df
(forest_trust_data is a union of all possible structures).
6d47df
6d47df
Previously we assumed only TLN or TLN exclusion record which were
6d47df
of the same type (lsa_StringLarge). Access to forest_trust_data.string
6d47df
fails when forest_trust_data's type is lsa_ForestTrustDomainInfo as it
6d47df
has no string member.
6d47df
6d47df
Fix the code by properly accessing the dns_domain_name from the
6d47df
lsa_ForestTrustDomainInfo structure.
6d47df
6d47df
Fixes: https://pagure.io/freeipa/issue/7828
6d47df
Reviewed-By: Christian Heimes <cheimes@redhat.com>
6d47df
---
6d47df
 ipaserver/dcerpc.py | 64 ++++++++++++++++++++++++++++++++++++++-------
6d47df
 1 file changed, 55 insertions(+), 9 deletions(-)
6d47df
6d47df
diff --git a/ipaserver/dcerpc.py b/ipaserver/dcerpc.py
6d47df
index 125493657..51a8e82e7 100644
6d47df
--- a/ipaserver/dcerpc.py
6d47df
+++ b/ipaserver/dcerpc.py
6d47df
@@ -51,6 +51,7 @@ from samba.dcerpc import security, lsa, drsblobs, nbt, netlogon
6d47df
 from samba.ndr import ndr_pack, ndr_print
6d47df
 from samba import net
6d47df
 from samba import arcfour_encrypt
6d47df
+from samba import ntstatus
6d47df
 import samba
6d47df
 
6d47df
 import ldap as _ldap
6d47df
@@ -1105,6 +1106,25 @@ class TrustDomainInstance(object):
6d47df
         original forest.
6d47df
         """
6d47df
 
6d47df
+        def domain_name_from_ftinfo(ftinfo):
6d47df
+            """
6d47df
+            Returns a domain name string from a ForestTrustRecord
6d47df
+
6d47df
+            :param ftinfo: LSA ForestTrustRecord to parse
6d47df
+            """
6d47df
+            if ftinfo.type == lsa.LSA_FOREST_TRUST_DOMAIN_INFO:
6d47df
+                return ftinfo.forest_trust_data.dns_domain_name.string
6d47df
+            elif ftinfo.type == lsa.LSA_FOREST_TRUST_TOP_LEVEL_NAME:
6d47df
+                return ftinfo.forest_trust_data.string
6d47df
+            elif ftinfo.type == lsa.LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX:
6d47df
+                # We should ignore TLN exclusion record because it
6d47df
+                # is already an exclusion so we aren't going to
6d47df
+                # change anything here
6d47df
+                return None
6d47df
+            else:
6d47df
+                # Ignore binary blobs we don't know about
6d47df
+                return None
6d47df
+
6d47df
         # List of entries for unsolved conflicts
6d47df
         result = []
6d47df
 
6d47df
@@ -1145,18 +1165,26 @@ class TrustDomainInstance(object):
6d47df
                     e1.time = e.time
6d47df
                     e1.forest_trust_data = e.forest_trust_data
6d47df
 
6d47df
+                    # We either have a domain struct, a TLN name,
6d47df
+                    # or a TLN exclusion name in the list.
6d47df
+                    # The rest we should skip, those are binary blobs
6d47df
+                    dns_domain_name = domain_name_from_ftinfo(e)
6d47df
+
6d47df
                     # Search for a match in the topology of another domain
6d47df
                     # if there is a match, we have to convert a record
6d47df
                     # into a TLN exclusion to allow its routing to the
6d47df
                     # another domain
6d47df
                     for r in another_domain.ftinfo_records:
6d47df
-                        if r['rec_name'] == e.forest_trust_data.string:
6d47df
+                        # r['rec_name'] cannot be None, thus we can ignore
6d47df
+                        # the case when dns_domain_name is None
6d47df
+                        if r['rec_name'] == dns_domain_name:
6d47df
                             is_our_record = True
6d47df
 
6d47df
                             # Convert e1 into an exclusion record
6d47df
                             e1.type = lsa.LSA_FOREST_TRUST_TOP_LEVEL_NAME_EX
6d47df
                             e1.flags = 0
6d47df
                             e1.time = trust_timestamp
6d47df
+                            e1.forest_trust_data.string = dns_domain_name
6d47df
                             break
6d47df
                     entries.append(e1)
6d47df
 
6d47df
@@ -1180,11 +1208,29 @@ class TrustDomainInstance(object):
6d47df
                 # Update the forest trust information now
6d47df
                 ldname = lsa.StringLarge()
6d47df
                 ldname.string = rec.name.string
6d47df
-                cninfo = self._pipe.lsaRSetForestTrustInformation(
6d47df
-                             self._policy_handle,
6d47df
-                             ldname,
6d47df
-                             lsa.LSA_FOREST_TRUST_DOMAIN_INFO,
6d47df
-                             fti, 0)
6d47df
+                cninfo = None
6d47df
+                try:
6d47df
+                    cninfo = self._pipe.lsaRSetForestTrustInformation(
6d47df
+                        self._policy_handle,
6d47df
+                        ldname,
6d47df
+                        lsa.LSA_FOREST_TRUST_DOMAIN_INFO,
6d47df
+                        fti, 0)
6d47df
+                except samba.NTSTATUSError as error:
6d47df
+                    # Handle NT_STATUS_INVALID_PARAMETER separately
6d47df
+                    if ntstatus.NT_STATUS_INVALID_PARAMETER == error.args[0]:
6d47df
+                        result.append(rec)
6d47df
+                        logger.error("Unable to resolve conflict for "
6d47df
+                                     "DNS domain %s in the forest %s "
6d47df
+                                     "for in-forest domain %s. Trust cannot "
6d47df
+                                     "be established unless this conflict "
6d47df
+                                     "is fixed manually.",
6d47df
+                                     another_domain.info['dns_domain'],
6d47df
+                                     self.info['dns_domain'],
6d47df
+                                     rec.name.string)
6d47df
+                    else:
6d47df
+                        raise assess_dcerpc_error(error)
6d47df
+
6d47df
+
6d47df
                 if cninfo:
6d47df
                     result.append(rec)
6d47df
                     logger.error("When defining exception for DNS "
6d47df
@@ -1213,9 +1259,9 @@ class TrustDomainInstance(object):
6d47df
         # Otherwise, raise TrustTopologyConflictError() exception
6d47df
         domains = [x.name.string for x in result]
6d47df
         raise errors.TrustTopologyConflictError(
6d47df
-                              target=self.info['dns_domain'],
6d47df
-                              conflict=another_domain.info['dns_domain'],
6d47df
-                              domains=domains)
6d47df
+            forest=self.info['dns_domain'],
6d47df
+            conflict=another_domain.info['dns_domain'],
6d47df
+            domains=domains)
6d47df
 
6d47df
 
6d47df
 
6d47df
-- 
6d47df
2.20.1
6d47df