6 * Copyright (C) 1987 by the Massachusetts Institute of Technology
8 * Server for user registration with SMS and Kerberos.
10 * This program is a client of the SMS server and the Kerberos
11 * admin_server, and is a server for the userreg program.
14 * Revision 1.5 1987-09-10 22:18:32 wesommer
15 * Clean up output format.
17 * Revision 1.4 87/09/04 23:33:19 wesommer
18 * Deleted test scaffolding (second oops.)
20 * Revision 1.3 87/09/03 03:05:18 wesommer
21 * Version used for userreg tests.
23 * Revision 1.2 87/08/22 18:39:45 wesommer
24 * User registration server.
26 * Revision 1.1 87/07/31 15:48:13 wesommer
32 static char *rcsid_reg_svr_c = "$Header$";
36 #include <sys/types.h>
38 #include <sys/socket.h>
39 #include <netinet/in.h>
45 #include "ureg_proto.h"
46 #include "../../include/sms.h"
47 #include "admin_server.h"
48 #include "admin_err.h"
52 extern char *strdup();
53 extern char *malloc();
54 extern int krb_err_base;
55 extern char admin_errmsg[];
68 static char retval[BUFSIZ];
72 struct sockaddr_in sin;
89 sp = getservbyname("sms_ureg", "udp");
91 fprintf(stderr, "Unknown service sms_ureg/udp\n");
94 s = socket(AF_INET, SOCK_DGRAM, 0);
99 bzero((char *)&sin, sizeof(sin));
101 sin.sin_family = AF_INET;
102 sin.sin_port = sp->s_port;
103 sin.sin_addr.s_addr = INADDR_ANY;
105 if (bind(s, &sin, sizeof(sin)) < 0) {
110 status = sms_connect();
112 com_err("reg_svr", status, " on connect");
117 com_err("reg_svr", status, " on auth");
122 com_err("reg_svr", 0, "Ready for next request");
123 addrlen = sizeof(sin);
124 bzero(retval, BUFSIZ);
125 len = recvfrom(s, buf, BUFSIZ, 0, &sin, &addrlen);
128 if (errno == EINTR) continue;
132 /* Parse a request packet */
133 status = parse_pkt(buf, len, &seqno, &message);
136 format_pkt(buf, &len, seqno, status, (char *)NULL);
137 (void) sendto(s, buf, len, 0, &sin, addrlen);
141 switch((int)message.request) {
142 case UREG_VERIFY_USER:
143 status = verify_user(&message);
145 case UREG_RESERVE_LOGIN:
146 status = reserve_user(&message);
148 case UREG_SET_PASSWORD:
149 status = set_password(&message);
153 status = UREG_UNKNOWN_REQUEST;
157 format_pkt(buf, &len, seqno, status, retval);
159 sendto(s, buf, len, 0, &sin, addrlen);
170 #define min(a,b) ((a)>(b)?(b):(a))
172 int validate_idno(message, db_mit_id, first, last)
179 static char decrypt[BUFSIZ];
181 static char hashid[14];
182 char idnumber[BUFSIZ];
189 string_to_key(db_mit_id, key);
190 key_sched(key, sched);
191 pcbc_encrypt(message->sealed, decrypt, message->sealed_len, sched, key, 0);
193 (void) strncpy(idnumber, decrypt, message->sealed_len);
194 temp = decrypt + strlen(idnumber) + 1;
195 len = message->sealed_len - (temp - decrypt);
197 (void) strncpy(hashid, temp, min(len, 14));
198 temp += strlen(hashid) + 1;
199 len = message->sealed_len - (temp - decrypt);
201 if (strcmp(hashid, db_mit_id)) return 1;
202 encrypt_mitid(recrypt, idnumber, first, last);
203 if (strcmp(recrypt, db_mit_id)) return 1;
211 static int status_in_db;
213 vfy_callbk(argc, argv, p_message)
214 int argc; /* Should sanity check this.. */
218 struct msg *message = (struct msg *)p_message;
220 char *firstname, *lastname;
223 if (got_one) return 0;
230 status = validate_idno(message, db_mit_id, firstname, lastname);
231 if (status) return 0; /* Nope; decryption failed */
233 status_in_db = atoi(argv[7]);
234 reg_status = status_in_db;
236 if (status_in_db != 0) {
237 (void) strcpy(retval, argv[0]);
239 user_id = atoi(argv[1]);
244 encrypt_mitid(buf, idnumber, first, last)
245 char *buf, *idnumber, *first, *last;
248 extern char *crypt();
250 #define _tolower(c) ((c)|0x60)
252 salt[0] = _tolower(last[0]);
253 salt[1] = _tolower(first[0]);
256 (void) strcpy(buf, crypt(&idnumber[2], salt));
259 int verify_user(message)
266 com_err("reg_svr", 0, " verify_user %s %s\n",
267 message->first, message->last);
268 argv[0] = "get_user_by_first_and_last";
269 argv[1] = message->first;
270 argv[2] = message->last;
273 status = sms_query_internal(3, argv, vfy_callbk, (char *)message);
275 if (status == SMS_NO_MATCH) status = UREG_USER_NOT_FOUND;
276 if (!got_one && !status)
277 status = UREG_USER_NOT_FOUND;
279 if (status != 0) goto punt;
281 if (reg_status == 1) status = UREG_ALREADY_REGISTERED;
282 if (reg_status == 2) status = UREG_NO_PASSWD_YET;
288 reserve_user(message)
297 com_err("reg_svr", 0, " reserve_user %s %s\n",
298 message->first, message->last);
300 argv[0] = "gufl"; /* get_user_by_first_and_last */
301 argv[1] = message->first;
302 argv[2] = message->last;
305 status = sms_query_internal(3, argv, vfy_callbk, (char *)message);
307 if (status == SMS_NO_MATCH) status = UREG_USER_NOT_FOUND;
308 if (!got_one && !status)
309 status = UREG_USER_NOT_FOUND;
311 if (status != 0) goto punt;
312 if (reg_status != 0) {
313 status = UREG_ALREADY_REGISTERED;
317 * He's made it past this phase already.
319 if (status_in_db == 2) {
324 for (i = 0; i < reg_misc_len && reg_misc[i]; i++) {
325 if (!islower(reg_misc[i])) {
326 status = UREG_INVALID_UNAME;
330 if (i < 3 || i > 8) {
331 status = UREG_INVALID_UNAME;
336 /* Send request to kerberos admin_server for login name */
338 status = get_svc_in_tkt("register", "sms", "ATHENA.MIT.EDU",
339 "changepw", "kerberos",
342 status += krb_err_base;
346 /* send set password request to kerberos admin_server */
347 (void) sprintf(uid_buf, "%013d", user_id); /* 13 chars of placebo */
348 /* for backwards-compat. */
350 status = admin_call(ADMIN_ADD_NEW_KEY_ATTR, login, "",
354 if (status == ADMIN_SERVER_ERROR) {
355 printf("Server error: %s\n", admin_errmsg);
357 if (strcmp(admin_errmsg,
358 "Principal already in kerberos database.") ==0)
359 status = UREG_LOGIN_USED;
368 status = set_login(login, mit_id);
372 com_err("set_login", status, 0);
375 /* choose post office */
377 status = choose_pobox(login);
379 com_err("choose_pobox", status, 0);
384 status = create_group(login);
385 if (status == SMS_LIST) status = UREG_LOGIN_USED;
388 com_err("create_group", status, 0);
391 /* set quota entry, create filsys */
393 status = alloc_filsys(login, SMS_FS_STUDENT, 0, 0);
394 if (status == SMS_FILESYS_EXISTS) status = UREG_LOGIN_USED;
396 com_err("alloc_filsys", status, 0);
399 /* set filsys and status in SMS database */
401 status = set_status_filsys(reg_misc, mit_id);
403 com_err("set_filsys", status, 0);
409 com_err("reg_svr", status, " returned from reserve_user");
413 set_password(message)
420 com_err("reg_svr", 0, " set_password %s %s\n",
421 message->first, message->last);
423 /* validate that user is who he claims to be */
425 argv[0] = "get_user_by_first_and_last";
426 argv[1] = message->first;
427 argv[2] = message->last;
430 status = sms_query_internal(3, argv, vfy_callbk, (char *)message);
432 if (status == SMS_NO_MATCH) status = UREG_USER_NOT_FOUND;
433 if (!got_one && !status)
434 status = UREG_USER_NOT_FOUND;
436 if (status != 0) goto punt;
438 /* validate that state is equal to '2' (login, but no password) */
440 if (reg_status != 2) {
441 status = UREG_NO_LOGIN_YET;
446 status = get_svc_in_tkt("register", "sms", "ATHENA.MIT.EDU",
447 "changepw", "kerberos",
450 status += krb_err_base;
454 (void) sprintf(uid_buf, "%013d", user_id); /* 13 chars of placebo */
455 /* for backwards-compat. */
456 /* send set password request to kerberos admin_server */
457 status = admin_call(ADMIN_ADD_NEW_KEY_ATTR, retval, "",
460 if (status) goto punt;
463 status = set_final_status(retval, mit_id);
465 /* reflect reply to client */
471 parse_pkt(buf, len, seqnop, messagep)
475 struct msg *messagep;
477 if (len < 4) return UREG_BROKEN_PACKET;
478 bcopy(buf, (char *)&messagep->version, sizeof(long));
479 messagep->version = ntohl(messagep->version);
480 if (messagep->version != 1) return UREG_WRONG_VERSION;
485 if (len < 4) return UREG_BROKEN_PACKET;
486 bcopy(buf, (char *)seqnop, sizeof(long));
491 if (len < 4) return UREG_BROKEN_PACKET;
492 bcopy(buf, (char *)(&messagep->request), sizeof(long));
493 messagep->request = ntohl(messagep->request);
497 messagep->first = buf;
499 for (; *buf && len > 0; --len, ++buf) continue;
500 if (len <= 0) return UREG_BROKEN_PACKET;
504 messagep->last = buf;
506 for (; *buf && len > 0; --len, ++buf) continue;
507 if (len <= 0) return UREG_BROKEN_PACKET;
511 if (len <= 0) return UREG_BROKEN_PACKET;
513 messagep->sealed = buf;
514 messagep->sealed_len = len;
519 format_pkt(buf, lenp, seqno, status, message)
526 u_long vers = htonl((u_long)1);
527 status = htonl((u_long)status);
529 bcopy((char *)&vers, buf, sizeof(long));
530 bcopy((char *)&seqno, buf+sizeof(long), sizeof(long));
531 bcopy((char *)&status, buf+ 2*sizeof(long), sizeof(long));
532 *lenp = sizeof(long) * 3;
533 (void) strcpy(buf+3*sizeof(long), message);
534 (*lenp) += strlen(message);
537 store_user(argc, argv, argp)
542 char **retv = (char **) argp;
545 for (i = 0; i < argc; i++) {
550 retv[i] = strdup(argv[i]);
557 * Set login name of user with "idnumber" to be "username"
560 set_login(username, idnumber)
568 argv[0] = "get_user_by_mitid";
571 for (i=0; i<13; i++) {
575 status = sms_query_internal(2, argv, store_user, (char *)(retv+1));
576 if (status) return status;
580 if (retv[4]) free(retv[4]);
581 retv[4] = "null"; /* No such filesystem */
583 printf("Update_user(%s, %s)\n", retv[0], retv[1]);
585 status = sms_query("update_user", 12, retv, abort, 0);
589 for (i=1; i<12; i++) {
590 if (retv[i]) free(retv[i]);
598 * Set the status and filsys of user with username "uname" and filesys filsys.
601 set_status_filsys(username, idnumber)
609 argv[0] = "get_user_by_mitid";
612 for (i=0; i<13; i++) {
616 status = sms_query_internal(2, argv, store_user, (char *)(retv+1));
617 if (status) return status;
627 printf("Update_user(%s, %s)\n", retv[0], retv[1]);
629 status = sms_query("update_user", 12, retv, abort, 0);
632 for (i=1; i<12; i++) {
633 if (retv[i]) free(retv[i]);
639 * Set the status and filsys of user with username "uname" and filesys filsys.
642 set_final_status(username, idnumber)
650 argv[0] = "get_user_by_mitid";
653 for (i=0; i<13; i++) {
657 status = sms_query_internal(2, argv, store_user, (char *)(retv+1));
658 if (status) return status;
665 printf("Update_user(%s, %s)\n", retv[0], retv[1]);
667 status = sms_query("update_user", 12, retv, abort, 0);
669 for (i=1; i<12; i++) {
670 if (retv[i]) free(retv[i]);
680 static char *cr[] = {
687 return sms_query_internal(2, cr, abort, 0);
693 * c-continued-statement-offset: 4
695 * c-argdecl-indent: 4