mirror of
https://git.hardenedbsd.org/hardenedbsd/HardenedBSD.git
synced 2024-12-21 16:32:25 +01:00
60643d379b
(Including all changes for FreeBSD - importing the original eBones distribution would be too complex at this stage, since I don't have access to Piero's CVS.) (If you want to include eBones in your system, don't forget to include MAKE_EBONES in /etc/make.conf.) (This stuff is now also suppable from braae.ru.ac.za.) Bones originally from MIT SIPB. Original port to FreeBSD 1.x by Piero Serini. Moved to FreeBSD 2.0 by Doug Rabson and Geoff Rehmet. Nice bug fixes from Doug Rabson.
179 lines
4.6 KiB
C
179 lines
4.6 KiB
C
/*
|
|
* Copyright 1987, 1988 by the Massachusetts Institute of Technology.
|
|
* For copying and distribution information, please see the file
|
|
* <Copyright.MIT>.
|
|
*
|
|
* program to initialize the database, reports error if database file
|
|
* already exists.
|
|
*
|
|
* from: kdb_init.c,v 4.0 89/01/24 21:50:45 jtkohl Exp $
|
|
* $Id: kdb_init.c,v 1.3 1994/09/24 14:04:17 g89r4222 Exp $
|
|
*/
|
|
|
|
#ifndef lint
|
|
static char rcsid[] =
|
|
"$Id: kdb_init.c,v 1.3 1994/09/24 14:04:17 g89r4222 Exp $";
|
|
#endif lint
|
|
|
|
#include <stdio.h>
|
|
#include <sys/types.h>
|
|
#include <sys/file.h>
|
|
#include <sys/time.h>
|
|
#include <des.h>
|
|
#include <krb.h>
|
|
#include <krb_db.h>
|
|
#include <string.h>
|
|
|
|
#define TRUE 1
|
|
|
|
enum ap_op {
|
|
NULL_KEY, /* setup null keys */
|
|
MASTER_KEY, /* use master key as new key */
|
|
RANDOM_KEY, /* choose a random key */
|
|
};
|
|
|
|
int debug = 0;
|
|
char *progname, *rindex();
|
|
C_Block master_key;
|
|
Key_schedule master_key_schedule;
|
|
|
|
main(argc, argv)
|
|
char *argv[];
|
|
{
|
|
char realm[REALM_SZ];
|
|
char *cp;
|
|
int code;
|
|
char *database;
|
|
|
|
progname = (cp = rindex(*argv, '/')) ? cp + 1 : *argv;
|
|
|
|
if (argc > 3) {
|
|
fprintf(stderr, "Usage: %s [realm-name] [database-name]\n", argv[0]);
|
|
exit(1);
|
|
}
|
|
if (argc == 3) {
|
|
database = argv[2];
|
|
--argc;
|
|
} else
|
|
database = DBM_FILE;
|
|
|
|
/* Do this first, it'll fail if the database exists */
|
|
if ((code = kerb_db_create(database)) != 0) {
|
|
fprintf(stderr, "Couldn't create database: %s\n",
|
|
sys_errlist[code]);
|
|
exit(1);
|
|
}
|
|
kerb_db_set_name(database);
|
|
|
|
if (argc == 2)
|
|
strncpy(realm, argv[1], REALM_SZ);
|
|
else {
|
|
fprintf(stderr, "Realm name [default %s ]: ", KRB_REALM);
|
|
if (fgets(realm, sizeof(realm), stdin) == NULL) {
|
|
fprintf(stderr, "\nEOF reading realm\n");
|
|
exit(1);
|
|
}
|
|
if (cp = index(realm, '\n'))
|
|
*cp = '\0';
|
|
if (!*realm) /* no realm given */
|
|
strcpy(realm, KRB_REALM);
|
|
}
|
|
if (!k_isrealm(realm)) {
|
|
fprintf(stderr, "%s: Bad kerberos realm name \"%s\"\n",
|
|
progname, realm);
|
|
exit(1);
|
|
}
|
|
printf("You will be prompted for the database Master Password.\n");
|
|
printf("It is important that you NOT FORGET this password.\n");
|
|
fflush(stdout);
|
|
|
|
if (kdb_get_master_key (TRUE, master_key, master_key_schedule) != 0) {
|
|
fprintf (stderr, "Couldn't read master key.\n");
|
|
exit (-1);
|
|
}
|
|
|
|
if (
|
|
add_principal(KERB_M_NAME, KERB_M_INST, MASTER_KEY) ||
|
|
add_principal(KERB_DEFAULT_NAME, KERB_DEFAULT_INST, NULL_KEY) ||
|
|
add_principal("krbtgt", realm, RANDOM_KEY) ||
|
|
add_principal("changepw", KRB_MASTER, RANDOM_KEY)
|
|
) {
|
|
fprintf(stderr, "\n%s: couldn't initialize database.\n",
|
|
progname);
|
|
exit(1);
|
|
}
|
|
|
|
/* play it safe */
|
|
bzero (master_key, sizeof (C_Block));
|
|
bzero (master_key_schedule, sizeof (Key_schedule));
|
|
exit(0);
|
|
}
|
|
|
|
/* use a return code to indicate success or failure. check the return */
|
|
/* values of the routines called by this routine. */
|
|
|
|
add_principal(name, instance, aap_op)
|
|
char *name, *instance;
|
|
enum ap_op aap_op;
|
|
{
|
|
Principal principal;
|
|
char datestring[50];
|
|
char pw_str[255];
|
|
void read_pw_string();
|
|
void string_to_key();
|
|
void random_key();
|
|
struct tm *tm, *localtime();
|
|
C_Block new_key;
|
|
|
|
bzero(&principal, sizeof(principal));
|
|
strncpy(principal.name, name, ANAME_SZ);
|
|
strncpy(principal.instance, instance, INST_SZ);
|
|
switch (aap_op) {
|
|
case NULL_KEY:
|
|
principal.key_low = 0;
|
|
principal.key_high = 0;
|
|
break;
|
|
case RANDOM_KEY:
|
|
#ifdef NOENCRYPTION
|
|
bzero(new_key, sizeof(C_Block));
|
|
new_key[0] = 127;
|
|
#else
|
|
random_key(new_key);
|
|
#endif
|
|
kdb_encrypt_key (new_key, new_key, master_key, master_key_schedule,
|
|
ENCRYPT);
|
|
bcopy(new_key, &principal.key_low, 4);
|
|
bcopy(((long *) new_key) + 1, &principal.key_high, 4);
|
|
break;
|
|
case MASTER_KEY:
|
|
bcopy (master_key, new_key, sizeof (C_Block));
|
|
kdb_encrypt_key (new_key, new_key, master_key, master_key_schedule,
|
|
ENCRYPT);
|
|
bcopy(new_key, &principal.key_low, 4);
|
|
bcopy(((long *) new_key) + 1, &principal.key_high, 4);
|
|
break;
|
|
}
|
|
principal.exp_date = 946702799; /* Happy new century */
|
|
strncpy(principal.exp_date_txt, "12/31/99", DATE_SZ);
|
|
principal.mod_date = time(0);
|
|
|
|
tm = localtime(&principal.mod_date);
|
|
principal.attributes = 0;
|
|
principal.max_life = 255;
|
|
|
|
principal.kdc_key_ver = 1;
|
|
principal.key_version = 1;
|
|
|
|
strncpy(principal.mod_name, "db_creation", ANAME_SZ);
|
|
strncpy(principal.mod_instance, "", INST_SZ);
|
|
principal.old = 0;
|
|
|
|
kerb_db_put_principal(&principal, 1);
|
|
|
|
/* let's play it safe */
|
|
bzero (new_key, sizeof (C_Block));
|
|
bzero (&principal.key_low, 4);
|
|
bzero (&principal.key_high, 4);
|
|
return 0;
|
|
}
|