Find below a small test program to create a token. Run a kinit as a user and then ./squid_kerb_auth_test proxy_fqdn. It creates a token like:

./squid_kerb_auth_test opensuse.suse.home
Token: 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

Then set the keytab with export KRB5_KTNAME=FILE:/etc/squid/squid.keytab and run ./squid_kerb_auth -d -i -s HTTP/proxy_fqdn and enter the token starting with YR as follows (in one line)

./squid_kerb_auth -d -i -s HTTP/[EMAIL PROTECTED]
YR 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 2008/06/07 22:52:11| squid_kerb_auth: Got 'YR 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' from squid (length: 691).
2008/06/07 22:52:12| squid_kerb_auth: parseNegTokenInit failed with rc=109
2008/06/07 22:52:12| squid_kerb_auth: Token is possibly a GSSAPI token
AF AA== [EMAIL PROTECTED]
2008/06/07 22:52:12| squid_kerb_auth: AF AA== [EMAIL PROTECTED]
2008/06/07 22:52:12| squid_kerb_auth: User [EMAIL PROTECTED] authenticated


Regards
Markus

Compile gcc -o squid_kerb_auth_test squid_kerb_auth_test.c -lgssapi_krb5 -lkrb5

/*
* -----------------------------------------------------------------------------
*
* Author: Markus Moeller (markus_moeller at compuserve.com)
*
* Copyright (C) 2007 Markus Moeller. All rights reserved.
*
*   This program is free software; you can redistribute it and/or modify
*   it under the terms of the GNU General Public License as published by
*   the Free Software Foundation; either version 2 of the License, or
*   (at your option) any later version.
*
*   This program is distributed in the hope that it will be useful,
*   but WITHOUT ANY WARRANTY; without even the implied warranty of
*   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
*   GNU General Public License for more details.
*
*   You should have received a copy of the GNU General Public License
*   along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307, USA.
*
* -----------------------------------------------------------------------------
*/
/*
* Hosted at http://sourceforge.net/projects/squidkerbauth
*/

#ifndef HEIMDAL
#include <profile.h>
#endif
#include <krb5.h>

#include <unistd.h>
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
#include <errno.h>
#include <time.h>
#include <sys/time.h>

#ifdef HEIMDAL
#include <gssapi.h>
#define gss_nt_service_name GSS_C_NT_HOSTBASED_SERVICE
#else
#include <gssapi/gssapi.h>
#ifndef SOLARIS_11
#include <gssapi/gssapi_generic.h>
#else
#define gss_nt_service_name GSS_C_NT_HOSTBASED_SERVICE
#endif
#endif

static const char *LogTime(void);

int check_gss_err(OM_uint32 major_status, OM_uint32 minor_status, const char* function);

#define PROGRAM "squid_kerb_auth_test"

static const char *LogTime()
{
   struct tm *tm;
   struct timeval now;
   static time_t last_t = 0;
   static char buf[128];

   gettimeofday(&now, NULL);
   if (now.tv_sec != last_t) {
       tm = localtime(&now.tv_sec);
       strftime(buf, 127, "%Y/%m/%d %H:%M:%S", tm);
       last_t = now.tv_sec;
   }
   return buf;
}

#ifdef HAVE_SPNEGO
#ifndef gss_mech_spnego
static gss_OID_desc _gss_mech_spnego = {6, (void *)"\x2b\x06\x01\x05\x05\x02"};
gss_OID gss_mech_spnego = &_gss_mech_spnego;
#endif
#endif

int check_gss_err(OM_uint32 major_status, OM_uint32 minor_status, const char* function){
 if (GSS_ERROR(major_status)) {
   OM_uint32 maj_stat,min_stat;
   OM_uint32 msg_ctx = 0;
   gss_buffer_desc status_string;
   char buf[1024];
   size_t len;

   len = 0;
   msg_ctx = 0;
   while (!msg_ctx) {
     /* convert major status code (GSS-API error) to text */
     maj_stat = gss_display_status(&min_stat, major_status,
                                   GSS_C_GSS_CODE,
                                   GSS_C_NULL_OID,
                                   &msg_ctx, &status_string);
     if (maj_stat == GSS_S_COMPLETE) {
       if (sizeof(buf) > len + status_string.length + 1) {
         sprintf(buf+len, "%s", (char*) status_string.value);
         len += status_string.length;
       }
       gss_release_buffer(&min_stat, &status_string);
       break;
     }
     gss_release_buffer(&min_stat, &status_string);
   }
   if (sizeof(buf) > len + 2) {
     sprintf(buf+len, "%s", ". ");
     len += 2;
   }
   msg_ctx = 0;
   while (!msg_ctx) {
     /* convert minor status code (underlying routine error) to text */
     maj_stat = gss_display_status(&min_stat, minor_status,
                                   GSS_C_MECH_CODE,
                                   GSS_C_NULL_OID,
                                   &msg_ctx, &status_string);
     if (maj_stat == GSS_S_COMPLETE) {
       if (sizeof(buf) > len + status_string.length ) {
         sprintf(buf+len, "%s", (char*) status_string.value);
         len += status_string.length;
       }
       gss_release_buffer(&min_stat, &status_string);
       break;
     }
     gss_release_buffer(&min_stat, &status_string);
   }
fprintf(stderr, "%s| %s: %s failed: %s\n", LogTime(), PROGRAM, function, buf);
   return(1);
 }
 return(0);
}

static void base64_init(void);

static int base64_initialized = 0;
#define BASE64_VALUE_SZ 256
#define BASE64_RESULT_SZ 8192
int base64_value[BASE64_VALUE_SZ];
const char base64_code[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";

static void
base64_init(void)
{
   int i;

   for (i = 0; i < BASE64_VALUE_SZ; i++)
       base64_value[i] = -1;

   for (i = 0; i < 64; i++)
       base64_value[(int) base64_code[i]] = i;
   base64_value['='] = 0;

   base64_initialized = 1;
}

char *
base64_decode(const char *p)
{
   static char result[BASE64_RESULT_SZ];
   int j;
   int c;
   long val;
   if (!p)
       return NULL;
   if (!base64_initialized)
       base64_init();
   val = c = 0;
   for (j = 0; *p && j + 4 < BASE64_RESULT_SZ; p++) {
       unsigned int k = ((unsigned char) *p) % BASE64_VALUE_SZ;
       if (base64_value[k] < 0)
           continue;
       val <<= 6;
       val += base64_value[k];
       if (++c < 4)
           continue;
       /* One quantum of four encoding characters/24 bit */
       result[j++] = val >> 16;        /* High 8 bits */
       result[j++] = (val >> 8) & 0xff;        /* Mid 8 bits */
       result[j++] = val & 0xff;       /* Low 8 bits */
       val = c = 0;
   }
   result[j] = 0;
   return result;
}

/* adopted from http://ftp.sunet.se/pub2/gnu/vm/base64-encode.c with adjustments */
const char *
base64_encode(const char *decoded_str)
{
   static char result[BASE64_RESULT_SZ];
   int bits = 0;
   int char_count = 0;
   int out_cnt = 0;
   int c;

   if (!decoded_str)
       return decoded_str;

   if (!base64_initialized)
       base64_init();

while ((c = (unsigned char) *decoded_str++) && out_cnt < sizeof(result) - 5) {
       bits += c;
       char_count++;
       if (char_count == 3) {
           result[out_cnt++] = base64_code[bits >> 18];
           result[out_cnt++] = base64_code[(bits >> 12) & 0x3f];
           result[out_cnt++] = base64_code[(bits >> 6) & 0x3f];
           result[out_cnt++] = base64_code[bits & 0x3f];
           bits = 0;
           char_count = 0;
       } else {
           bits <<= 8;
       }
   }
   if (char_count != 0) {
       bits <<= 16 - (8 * char_count);
       result[out_cnt++] = base64_code[bits >> 18];
       result[out_cnt++] = base64_code[(bits >> 12) & 0x3f];
       if (char_count == 1) {
           result[out_cnt++] = '=';
           result[out_cnt++] = '=';
       } else {
           result[out_cnt++] = base64_code[(bits >> 6) & 0x3f];
           result[out_cnt++] = '=';
       }
   }
   result[out_cnt] = '\0';     /* terminate */
   return result;
}

/* adopted from http://ftp.sunet.se/pub2/gnu/vm/base64-encode.c with adjustments */
const char *
base64_encode_bin(const char *data, int len)
{
   static char result[BASE64_RESULT_SZ];
   int bits = 0;
   int char_count = 0;
   int out_cnt = 0;

   if (!data)
       return data;

   if (!base64_initialized)
       base64_init();

   while (len-- && out_cnt < sizeof(result) - 5) {
       int c = (unsigned char) *data++;
       bits += c;
       char_count++;
       if (char_count == 3) {
           result[out_cnt++] = base64_code[bits >> 18];
           result[out_cnt++] = base64_code[(bits >> 12) & 0x3f];
           result[out_cnt++] = base64_code[(bits >> 6) & 0x3f];
           result[out_cnt++] = base64_code[bits & 0x3f];
           bits = 0;
           char_count = 0;
       } else {
           bits <<= 8;
       }
   }
   if (char_count != 0) {
       bits <<= 16 - (8 * char_count);
       result[out_cnt++] = base64_code[bits >> 18];
       result[out_cnt++] = base64_code[(bits >> 12) & 0x3f];
       if (char_count == 1) {
           result[out_cnt++] = '=';
           result[out_cnt++] = '=';
       } else {
           result[out_cnt++] = base64_code[(bits >> 6) & 0x3f];
           result[out_cnt++] = '=';
       }
   }
   result[out_cnt] = '\0';     /* terminate */
   return result;
}
const char *squid_kerb_proxy_auth(char* principal_name, char *proxy) {
int rc=0;
OM_uint32 major_status, minor_status;
gss_ctx_id_t          gss_context = GSS_C_NO_CONTEXT;
gss_name_t            server_name = GSS_C_NO_NAME;
gss_buffer_desc       service = GSS_C_EMPTY_BUFFER;
gss_buffer_desc       input_token = GSS_C_EMPTY_BUFFER;
gss_buffer_desc       output_token = GSS_C_EMPTY_BUFFER;
const char   *token = NULL;

 setbuf(stdout,NULL);
 setbuf(stdin,NULL);

 if (!proxy ) {
fprintf(stderr, "%s| %s: Error: No proxy server name\n", LogTime(), PROGRAM);
    return NULL;
 }

 service.value = malloc(strlen("HTTP")+strlen(proxy)+2);
 snprintf(service.value,strlen("HTTP")+strlen(proxy)+2,"[EMAIL 
PROTECTED]","HTTP",proxy);
 service.length = strlen((char *)service.value);

 major_status = gss_import_name(&minor_status, &service,
                                gss_nt_service_name, &server_name);

 if (check_gss_err(major_status,minor_status,"gss_import_name()") )
     goto cleanup;

 major_status = gss_init_sec_context(&minor_status,
                                     GSS_C_NO_CREDENTIAL,
                                     &gss_context,
                                     server_name,
#ifdef HAVE_SPNEGO
                                     gss_mech_spnego,
#else
                                     0,
#endif
                                     0,
                                     0,
                                     GSS_C_NO_CHANNEL_BINDINGS,
                                     &input_token,
                                     NULL,
                                     &output_token,
                                     NULL,
                                     NULL);

 if (check_gss_err(major_status,minor_status,"gss_init_sec_context()") )
     goto cleanup;

 if (output_token.length) {

token = (const char*)base64_encode_bin((const char*)output_token.value,output_token.length);
 }


cleanup:
 gss_delete_sec_context(&minor_status, &gss_context, NULL);
 gss_release_buffer(&minor_status, &service);
 gss_release_buffer(&minor_status, &input_token);
 gss_release_buffer(&minor_status, &output_token);
 gss_release_name(&minor_status, &server_name);

 return token;
}

int main(int argc, char *argv[]) {

  const char *Token;

  if (argc < 1) {
fprintf(stderr, "%s| %s: Error: No proxy server name given\n", LogTime(), PROGRAM);
      exit(99);
  }
  Token = (const char *)squid_kerb_proxy_auth(NULL,argv[1]);
  fprintf(stdout,"Token: %s\n",Token?Token:"NULL");

  exit(0);
}







"Markus Moeller" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED]
I can create a simple test tool to create blobs. I will post it later next week.

Markus

"Henrik Nordstrom" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED]
On ons, 2008-06-04 at 15:41 -0700, Alex Morken wrote:

Thank you Henrik.  I kind of figured it needed something else, but I
wasn't sure what to put there.  Where can I get or generate the
Kerberos GSSAPI blob I need for the input?  I have been digging
around kerberos docs and haven't found what I needed.

Not sure. It's a kerberos authentication handshake, and initially
depends on a challenge sent by the helper...

Regards
Henrik







Reply via email to