// -*- mode:C++; tab-width:8; c-basic-offset:2; indent-tabs-mode:t -*- // vim: ts=8 sw=2 smarttab /* * Ceph - scalable distributed file system * * Copyright (C) 2004-2009 Sage Weil * * This is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License version 2.1, as published by the Free Software * Foundation. See file COPYING. * */ #include "common/config.h" #include "CephxKeyServer.h" #include "common/dout.h" #include #define dout_subsys ceph_subsys_auth #undef dout_prefix #define dout_prefix *_dout << "cephx keyserverdata: " bool KeyServerData::get_service_secret(CephContext *cct, uint32_t service_id, ExpiringCryptoKey& secret, uint64_t& secret_id) const { map::const_iterator iter = rotating_secrets.find(service_id); if (iter == rotating_secrets.end()) { ldout(cct, 10) << "get_service_secret service " << ceph_entity_type_name(service_id) << " not found " << dendl; return false; } const RotatingSecrets& secrets = iter->second; // second to oldest, unless it's expired map::const_iterator riter = secrets.secrets.begin(); if (secrets.secrets.size() > 1) ++riter; if (riter->second.expiration < ceph_clock_now()) ++riter; // "current" key has expired, use "next" key instead secret_id = riter->first; secret = riter->second; ldout(cct, 30) << "get_service_secret service " << ceph_entity_type_name(service_id) << " id " << secret_id << " " << secret << dendl; return true; } bool KeyServerData::get_service_secret(CephContext *cct, uint32_t service_id, CryptoKey& secret, uint64_t& secret_id) const { ExpiringCryptoKey e; if (!get_service_secret(cct, service_id, e, secret_id)) return false; secret = e.key; return true; } bool KeyServerData::get_service_secret(CephContext *cct, uint32_t service_id, uint64_t secret_id, CryptoKey& secret) const { map::const_iterator iter = rotating_secrets.find(service_id); if (iter == rotating_secrets.end()) return false; const RotatingSecrets& secrets = iter->second; map::const_iterator riter = secrets.secrets.find(secret_id); if (riter == secrets.secrets.end()) { ldout(cct, 10) << "get_service_secret service " << ceph_entity_type_name(service_id) << " secret " << secret_id << " not found" << dendl; ldout(cct, 30) << " I have:" << dendl; for (map::const_iterator iter = secrets.secrets.begin(); iter != secrets.secrets.end(); ++iter) ldout(cct, 30) << " id " << iter->first << " " << iter->second << dendl; return false; } secret = riter->second.key; return true; } bool KeyServerData::get_auth(const EntityName& name, EntityAuth& auth) const { map::const_iterator iter = secrets.find(name); if (iter != secrets.end()) { auth = iter->second; return true; } return extra_secrets->get_auth(name, auth); } bool KeyServerData::get_secret(const EntityName& name, CryptoKey& secret) const { map::const_iterator iter = secrets.find(name); if (iter != secrets.end()) { secret = iter->second.key; return true; } return extra_secrets->get_secret(name, secret); } bool KeyServerData::get_caps(CephContext *cct, const EntityName& name, const string& type, AuthCapsInfo& caps_info) const { caps_info.allow_all = false; ldout(cct, 10) << "get_caps: name=" << name.to_str() << dendl; map::const_iterator iter = secrets.find(name); if (iter != secrets.end()) { ldout(cct, 10) << "get_secret: num of caps=" << iter->second.caps.size() << dendl; map::const_iterator capsiter = iter->second.caps.find(type); if (capsiter != iter->second.caps.end()) { caps_info.caps = capsiter->second; } return true; } return extra_secrets->get_caps(name, type, caps_info); } #undef dout_prefix #define dout_prefix *_dout << "cephx keyserver: " KeyServer::KeyServer(CephContext *cct_, KeyRing *extra_secrets) : cct(cct_), data(extra_secrets), lock("KeyServer::lock") { } int KeyServer::start_server() { Mutex::Locker l(lock); _check_rotating_secrets(); _dump_rotating_secrets(); return 0; } bool KeyServer::_check_rotating_secrets() { ldout(cct, 10) << "_check_rotating_secrets" << dendl; int added = 0; added += _rotate_secret(CEPH_ENTITY_TYPE_AUTH); added += _rotate_secret(CEPH_ENTITY_TYPE_MON); added += _rotate_secret(CEPH_ENTITY_TYPE_OSD); added += _rotate_secret(CEPH_ENTITY_TYPE_MDS); added += _rotate_secret(CEPH_ENTITY_TYPE_MGR); if (added) { ldout(cct, 10) << __func__ << " added " << added << dendl; data.rotating_ver++; //data.next_rotating_time = ceph_clock_now(cct); //data.next_rotating_time += MIN(cct->_conf->auth_mon_ticket_ttl, cct->_conf->auth_service_ticket_ttl); _dump_rotating_secrets(); return true; } return false; } void KeyServer::_dump_rotating_secrets() { ldout(cct, 30) << "_dump_rotating_secrets" << dendl; for (map::iterator iter = data.rotating_secrets.begin(); iter != data.rotating_secrets.end(); ++iter) { RotatingSecrets& key = iter->second; for (map::iterator mapiter = key.secrets.begin(); mapiter != key.secrets.end(); ++mapiter) ldout(cct, 30) << "service " << ceph_entity_type_name(iter->first) << " id " << mapiter->first << " key " << mapiter->second << dendl; } } int KeyServer::_rotate_secret(uint32_t service_id) { RotatingSecrets& r = data.rotating_secrets[service_id]; int added = 0; utime_t now = ceph_clock_now(); double ttl = service_id == CEPH_ENTITY_TYPE_AUTH ? cct->_conf->auth_mon_ticket_ttl : cct->_conf->auth_service_ticket_ttl; while (r.need_new_secrets(now)) { ExpiringCryptoKey ek; generate_secret(ek.key); if (r.empty()) { ek.expiration = now; } else { utime_t next_ttl = now; next_ttl += ttl; ek.expiration = MAX(next_ttl, r.next().expiration); } ek.expiration += ttl; uint64_t secret_id = r.add(ek); ldout(cct, 10) << "_rotate_secret adding " << ceph_entity_type_name(service_id) << dendl; ldout(cct, 30) << "_rotate_secret adding " << ceph_entity_type_name(service_id) << " id " << secret_id << " " << ek << dendl; added++; } return added; } bool KeyServer::get_secret(const EntityName& name, CryptoKey& secret) const { Mutex::Locker l(lock); return data.get_secret(name, secret); } bool KeyServer::get_auth(const EntityName& name, EntityAuth& auth) const { Mutex::Locker l(lock); return data.get_auth(name, auth); } bool KeyServer::get_caps(const EntityName& name, const string& type, AuthCapsInfo& caps_info) const { Mutex::Locker l(lock); return data.get_caps(cct, name, type, caps_info); } bool KeyServer::get_service_secret(uint32_t service_id, ExpiringCryptoKey& secret, uint64_t& secret_id) const { Mutex::Locker l(lock); return data.get_service_secret(cct, service_id, secret, secret_id); } bool KeyServer::get_service_secret(uint32_t service_id, CryptoKey& secret, uint64_t& secret_id) const { Mutex::Locker l(lock); return data.get_service_secret(cct, service_id, secret, secret_id); } bool KeyServer::get_service_secret(uint32_t service_id, uint64_t secret_id, CryptoKey& secret) const { Mutex::Locker l(lock); return data.get_service_secret(cct, service_id, secret_id, secret); } bool KeyServer::generate_secret(CryptoKey& secret) { bufferptr bp; CryptoHandler *crypto = cct->get_crypto_handler(CEPH_CRYPTO_AES); if (!crypto) return false; if (crypto->create(bp) < 0) return false; secret.set_secret(CEPH_CRYPTO_AES, bp, ceph_clock_now()); return true; } bool KeyServer::generate_secret(EntityName& name, CryptoKey& secret) { if (!generate_secret(secret)) return false; Mutex::Locker l(lock); EntityAuth auth; auth.key = secret; data.add_auth(name, auth); return true; } bool KeyServer::contains(const EntityName& name) const { Mutex::Locker l(lock); return data.contains(name); } int KeyServer::encode_secrets(Formatter *f, stringstream *ds) const { Mutex::Locker l(lock); map::const_iterator mapiter = data.secrets_begin(); if (mapiter == data.secrets_end()) return -ENOENT; if (f) f->open_array_section("auth_dump"); while (mapiter != data.secrets_end()) { const EntityName& name = mapiter->first; if (ds) { *ds << name.to_str() << std::endl; *ds << "\tkey: " << mapiter->second.key << std::endl; if (mapiter->second.auid != CEPH_AUTH_UID_DEFAULT) *ds << "\tauid: " << mapiter->second.auid << std::endl; } if (f) { f->open_object_section("auth_entities"); f->dump_string("entity", name.to_str()); f->dump_stream("key") << mapiter->second.key; if (mapiter->second.auid != CEPH_AUTH_UID_DEFAULT) f->dump_int("auid", mapiter->second.auid); f->open_object_section("caps"); } map::const_iterator capsiter = mapiter->second.caps.begin(); for (; capsiter != mapiter->second.caps.end(); ++capsiter) { // FIXME: need a const_iterator for bufferlist, but it doesn't exist yet. bufferlist *bl = const_cast(&capsiter->second); bufferlist::iterator dataiter = bl->begin(); string caps; ::decode(caps, dataiter); if (ds) *ds << "\tcaps: [" << capsiter->first << "] " << caps << std::endl; if (f) f->dump_string(capsiter->first.c_str(), caps); } if (f) { f->close_section(); // caps f->close_section(); // auth_entities } ++mapiter; } if (f) f->close_section(); // auth_dump return 0; } void KeyServer::encode_formatted(string label, Formatter *f, bufferlist &bl) { assert(f != NULL); f->open_object_section(label.c_str()); encode_secrets(f, NULL); f->close_section(); f->flush(bl); } void KeyServer::encode_plaintext(bufferlist &bl) { stringstream os; encode_secrets(NULL, &os); bl.append(os.str()); } bool KeyServer::updated_rotating(bufferlist& rotating_bl, version_t& rotating_ver) { Mutex::Locker l(lock); _check_rotating_secrets(); if (data.rotating_ver <= rotating_ver) return false; data.encode_rotating(rotating_bl); rotating_ver = data.rotating_ver; return true; } bool KeyServer::get_rotating_encrypted(const EntityName& name, bufferlist& enc_bl) const { Mutex::Locker l(lock); map::const_iterator mapiter = data.find_name(name); if (mapiter == data.secrets_end()) return false; const CryptoKey& specific_key = mapiter->second.key; map::const_iterator rotate_iter = data.rotating_secrets.find(name.get_type()); if (rotate_iter == data.rotating_secrets.end()) return false; RotatingSecrets secrets = rotate_iter->second; std::string error; if (encode_encrypt(cct, secrets, specific_key, enc_bl, error)) return false; return true; } bool KeyServer::_get_service_caps(const EntityName& name, uint32_t service_id, AuthCapsInfo& caps_info) const { string s = ceph_entity_type_name(service_id); return data.get_caps(cct, name, s, caps_info); } bool KeyServer::get_service_caps(const EntityName& name, uint32_t service_id, AuthCapsInfo& caps_info) const { Mutex::Locker l(lock); return _get_service_caps(name, service_id, caps_info); } int KeyServer::_build_session_auth_info(uint32_t service_id, CephXServiceTicketInfo& auth_ticket_info, CephXSessionAuthInfo& info) { info.service_id = service_id; info.ticket = auth_ticket_info.ticket; info.ticket.init_timestamps(ceph_clock_now(), cct->_conf->auth_service_ticket_ttl); generate_secret(info.session_key); // mon keys are stored externally. and the caps are blank anyway. if (service_id != CEPH_ENTITY_TYPE_MON) { string s = ceph_entity_type_name(service_id); if (!data.get_caps(cct, info.ticket.name, s, info.ticket.caps)) { return -EINVAL; } } return 0; } int KeyServer::build_session_auth_info(uint32_t service_id, CephXServiceTicketInfo& auth_ticket_info, CephXSessionAuthInfo& info) { if (!get_service_secret(service_id, info.service_secret, info.secret_id)) { return -EPERM; } Mutex::Locker l(lock); return _build_session_auth_info(service_id, auth_ticket_info, info); } int KeyServer::build_session_auth_info(uint32_t service_id, CephXServiceTicketInfo& auth_ticket_info, CephXSessionAuthInfo& info, CryptoKey& service_secret, uint64_t secret_id) { info.service_secret = service_secret; info.secret_id = secret_id; Mutex::Locker l(lock); return _build_session_auth_info(service_id, auth_ticket_info, info); }