//+--------------------------------------------------------------------------- // // Microsoft Windows // Copyright (C) Microsoft Corporation, 1992 - 1993. // // File: events.cxx // // Contents: // // Classes: // // Functions: // // History: 1-03-95 RichardW Created // //---------------------------------------------------------------------------- #include #include #include "krbevent.h" #include "kerbevt.h" #include #ifdef DEBUG_SUPPORT static TCHAR THIS_FILE[]=TEXT(__FILE__); #endif HANDLE KerbEventLogHandle = NULL; WCHAR KerbEventSourceName[] = L"Kerberos"; LONG KerbUdpTimeoutEvents = 0; TimeStamp KerbUdpNextUpdate; RTL_RESOURCE KerbUdpLock; #define UDPTIMEOUT_LOGGING_THRESHHOLD 20 #define UDPTIMEOUT_LOGGING_INTERVAL 30 #define KerbWriteLockUdpStats() RtlAcquireResourceExclusive(&KerbUdpLock, TRUE) #define KerbReadLockUdpStats() RtlAcquireResourceShared(&KerbUdpLock, TRUE) #define KerbReadToWriteLockUdpStats() RtlConvertSharedToExclusive(&KerbUdpLock); #define KerbUnlockUdpStats() RtlReleaseResource(&KerbUdpLock) //+------------------------------------------------------------------------- // // Function: KerbInitUdpStatistics // // Synopsis: returns a string from the data segment pointing to the name // of an error // // Effects: // // Arguments: // // Requires: // // Returns: // // Notes: // // //- NTSTATUS KerbInitUdpStatistics() { NTSTATUS Status = STATUS_SUCCESS; TimeStamp CurrentTime, Delta; GetSystemTimeAsFileTime((LPFILETIME) &CurrentTime ); KerbSetTimeInMinutes(&Delta, UDPTIMEOUT_LOGGING_INTERVAL); __try { RtlInitializeResource(&KerbUdpLock); } __except(EXCEPTION_EXECUTE_HANDLER) { Status = STATUS_INSUFFICIENT_RESOURCES; return Status; } KerbWriteLockUdpStats(); KerbSetTime(&KerbUdpNextUpdate,(KerbGetTime(CurrentTime) + KerbGetTime(Delta))); KerbUdpTimeoutEvents = 0; KerbUnlockUdpStats(); return Status; } //+------------------------------------------------------------------------- // // Function: KerbErrorToString // // Synopsis: returns a string from the data segment pointing to the name // of an error // // Effects: // // Arguments: // // Requires: // // Returns: // // Notes: // // //-------------------------------------------------------------------------- LPWSTR KerbErrorToString( IN KERBERR KerbErr ) { LPWSTR String; switch (KerbErr) { case KDC_ERR_NONE : String = L"KDC_ERR_NONE"; break; case KDC_ERR_NAME_EXP : String = L"KDC_ERR_NAME_EXP"; break; case KDC_ERR_SERVICE_EXP : String = L"KDC_ERR_SERVICE_EXP"; break; case KDC_ERR_BAD_PVNO : String = L"KDC_ERR_BAD_PVNO"; break; case KDC_ERR_C_OLD_MAST_KVNO : String = L"KDC_ERR_C_OLD_MAST_KVNO"; break; case KDC_ERR_S_OLD_MAST_KVNO : String = L"KDC_ERR_S_OLD_MAST_KVNO"; break; case KDC_ERR_C_PRINCIPAL_UNKNOWN : String = L"KDC_ERR_C_PRINCIPAL_UNKNOWN"; break; case KDC_ERR_S_PRINCIPAL_UNKNOWN : String = L" KDC_ERR_S_PRINCIPAL_UNKNOWN"; break; case KDC_ERR_PRINCIPAL_NOT_UNIQUE : String = L"KDC_ERR_PRINCIPAL_NOT_UNIQUE"; break; case KDC_ERR_NULL_KEY : String = L"KDC_ERR_NULL_KEY"; break; case KDC_ERR_CANNOT_POSTDATE : String = L"KDC_ERR_CANNOT_POSTDATE"; break; case KDC_ERR_NEVER_VALID : String = L"KDC_ERR_NEVER_VALID"; break; case KDC_ERR_POLICY : String = L"KDC_ERR_POLICY"; break; case KDC_ERR_BADOPTION : String = L"KDC_ERR_BADOPTION"; break; case KDC_ERR_ETYPE_NOTSUPP : String = L"KDC_ERR_ETYPE_NOTSUPP"; break; case KDC_ERR_SUMTYPE_NOSUPP : String = L"KDC_ERR_SUMTYPE_NOSUPP"; break; case KDC_ERR_PADATA_TYPE_NOSUPP : String = L"KDC_ERR_PADATA_TYPE_NOSUPP"; break; case KDC_ERR_TRTYPE_NO_SUPP : String = L"KDC_ERR_TRTYPE_NO_SUPP"; break; case KDC_ERR_CLIENT_REVOKED : String = L"KDC_ERR_CLIENT_REVOKED"; break; case KDC_ERR_SERVICE_REVOKED : String = L"KDC_ERR_SERVICE_REVOKED"; break; case KDC_ERR_TGT_REVOKED : String = L"KDC_ERR_TGT_REVOKED"; break; case KDC_ERR_CLIENT_NOTYET : String = L"KDC_ERR_CLIENT_NOTYET"; break; case KDC_ERR_SERVICE_NOTYET : String = L"KDC_ERR_SERVICE_NOTYET"; break; case KDC_ERR_KEY_EXPIRED : String = L"KDC_ERR_KEY_EXPIRED"; break; case KDC_ERR_PREAUTH_FAILED : String = L"KDC_ERR_PREAUTH_FAILED"; break; case KDC_ERR_PREAUTH_REQUIRED : String = L"KDC_ERR_PREAUTH_REQUIRED"; break; case KDC_ERR_SERVER_NOMATCH : String = L"KDC_ERR_SERVER_NOMATCH"; break; case KDC_ERR_SVC_UNAVAILABLE : String = L"KDC_ERR_SVC_UNAVAILABLE"; break; case KRB_AP_ERR_BAD_INTEGRITY : String = L"KRB_AP_ERR_BAD_INTEGRITY"; break; case KRB_AP_ERR_TKT_EXPIRED : String = L"KRB_AP_ERR_TKT_EXPIRED"; break; case KRB_AP_ERR_TKT_NYV : String = L"KRB_AP_ERR_TKT_NYV"; break; case KRB_AP_ERR_REPEAT : String = L"KRB_AP_ERR_REPEAT"; break; case KRB_AP_ERR_NOT_US : String = L"KRB_AP_ERR_NOT_US"; break; case KRB_AP_ERR_BADMATCH : String = L"KRB_AP_ERR_BADMATCH"; break; case KRB_AP_ERR_SKEW : String = L"KRB_AP_ERR_SKEW"; break; case KRB_AP_ERR_BADADDR : String = L"KRB_AP_ERR_BADADDR"; break; case KRB_AP_ERR_BADVERSION : String = L"KRB_AP_ERR_BADVERSION"; break; case KRB_AP_ERR_MSG_TYPE : String = L"KRB_AP_ERR_MSG_TYPE"; break; case KRB_AP_ERR_MODIFIED : String = L"KRB_AP_ERR_MODIFIED"; break; case KRB_AP_ERR_BADORDER : String = L"KRB_AP_ERR_BADORDER"; break; case KRB_AP_ERR_BADKEYVER : String = L"KRB_AP_ERR_BADKEYVER"; break; case KRB_AP_ERR_NOKEY : String = L"KRB_AP_ERR_NOKEY"; break; case KRB_AP_ERR_MUT_FAIL : String = L"KRB_AP_ERR_MUT_FAIL"; break; case KRB_AP_ERR_BADDIRECTION : String = L"KRB_AP_ERR_BADDIRECTION"; break; case KRB_AP_ERR_METHOD : String = L"KRB_AP_ERR_METHOD"; break; case KRB_AP_ERR_BADSEQ : String = L"KRB_AP_ERR_BADSEQ"; break; case KRB_AP_ERR_INAPP_CKSUM : String = L"KRB_AP_ERR_INAPP_CKSUM"; break; case KRB_AP_PATH_NOT_ACCEPTED : String = L"KRB_AP_PATH_NOT_ACCEPTED"; break; case KRB_ERR_RESPONSE_TOO_BIG : String = L"KRB_ERR_RESPONSE_TOO_BIG"; break; case KRB_ERR_GENERIC : String = L"KRB_ERR_GENERIC"; break; case KRB_ERR_FIELD_TOOLONG : String = L"KRB_ERR_FIELD_TOOLONG"; break; case KDC_ERR_CLIENT_NOT_TRUSTED : String = L"KDC_ERR_CLIENT_NOT_TRUSTED"; break; case KDC_ERR_KDC_NOT_TRUSTED : String = L"KDC_ERR_KDC_NOT_TRUSTED"; break; case KDC_ERR_INVALID_SIG : String = L"KDC_ERR_INVALID_SIG"; break; case KDC_ERR_KEY_TOO_WEAK : String = L"KDC_ERR_KEY_TOO_WEAK"; break; case KRB_AP_ERR_USER_TO_USER_REQUIRED : String = L"KRB_AP_ERR_USER_TO_USER_REQUIRED"; break; case KRB_AP_ERR_NO_TGT : String = L"KRB_AP_ERR_NO_TGT"; break; case KDC_ERR_WRONG_REALM : String = L"KDC_ERR_WRONG_REALM"; break; default : String = L"Unknown Error"; break; } return(String); } //+--------------------------------------------------------------------------- // // Function: InitializeEvents // // Synopsis: Connects to event log service // // Arguments: (none) // // History: 1-03-95 RichardW Created // // Notes: // //---------------------------------------------------------------------------- NTSTATUS KerbInitializeEvents( VOID ) { return STATUS_SUCCESS; } //+------------------------------------------------------------------------- // // Function: KerbInitEventLogHandle // // Synopsis: // // Effects: // // Arguments: // // Requires: // // Returns: // // Notes: // // //-------------------------------------------------------------------------- NTSTATUS KerbInitEventLogHandle() { NTSTATUS Status = STATUS_SUCCESS; if (KerbEventLogHandle == NULL) { HANDLE EventLogHandle; // // open an instance of kerb event sources, that discards duplicate // events in a one hour window. // EventLogHandle = NetpEventlogOpen( KerbEventSourceName, 60000*60 ); if (EventLogHandle != NULL) { // // atomically store the new handle value. If there was a race, // free the one we just created. // if(InterlockedCompareExchangePointer( &KerbEventLogHandle, EventLogHandle, NULL ) != NULL) { NetpEventlogClose( EventLogHandle ); } } if (KerbEventLogHandle == NULL) { D_DebugLog((DEB_ERROR, "Could not open event log, error %d. %ws, line %d - %x\n", GetLastError(), THIS_FILE, __LINE__, Status)); return STATUS_EVENTLOG_CANT_START; } } return Status; } //+------------------------------------------------------------------------- // // Function: KerbReportNtstatus // // Synopsis: // // Effects: // // Arguments: // // Requires: // // Returns: // // Notes: // // //-------------------------------------------------------------------------- #define MAX_NTSTATUS_STRINGS 10 #define MAX_ULONG_STRING 20 VOID KerbReportNtstatus( IN ULONG ErrorClass, IN NTSTATUS Status, IN LPWSTR* ErrorStrings, IN ULONG NumberOfStrings, IN PULONG Data, IN ULONG NumberOfUlong ) { ULONG StringCount, i, j, allocstart = 0; LPWSTR Strings[MAX_NTSTATUS_STRINGS]; StringCount = NumberOfUlong + NumberOfStrings; if (StringCount > MAX_NTSTATUS_STRINGS) { return; } // // Validate params // switch (ErrorClass) { case KERBEVT_INSUFFICIENT_TOKEN_SIZE: if ((NumberOfStrings != 0) || (NumberOfUlong > 3)) { DsysAssert(FALSE); return; } break; default: return; } if (KerbEventLogHandle == NULL) { NTSTATUS TmpStatus; TmpStatus = KerbInitEventLogHandle(); if (TmpStatus != STATUS_SUCCESS) { return; } } ZeroMemory( Strings, (StringCount * sizeof(Strings[0])) ); for (i = 0; i < NumberOfStrings; i++) { Strings[i] = ErrorStrings[i]; } allocstart = i; // save for cleanup for (j = 0; j < NumberOfUlong; j++) { UNICODE_STRING DummyString = { MAX_ULONG_STRING, MAX_ULONG_STRING, NULL}; DummyString.Buffer = (LPWSTR) LsaFunctions->AllocatePrivateHeap(MAX_ULONG_STRING); if ( DummyString.Buffer == NULL ) { goto Cleanup; } // // Use this since they don't export // RtlIntegerToUnicode(), and we don't want to // bring in _itow. // RtlIntegerToUnicodeString( Data[j], 16, &DummyString ); Strings[i] = DummyString.Buffer; i++; } if (ERROR_SUCCESS != NetpEventlogWriteEx( KerbEventLogHandle, EVENTLOG_WARNING_TYPE, 0, ErrorClass, (WORD) StringCount, sizeof(NTSTATUS), Strings, &Status )) { D_DebugLog((DEB_ERROR,"Failed to report event: %d. %ws, line %d\n",GetLastError(), THIS_FILE, __LINE__)); } Cleanup: for (i = allocstart ; i < (allocstart+NumberOfUlong) ; i++) { if (Strings[i] != NULL) { LsaFunctions->FreePrivateHeap(Strings[i]); } } return; } //+------------------------------------------------------------------------- // // Function: KerbReportKerbError // // Synopsis: // // Effects: // // Arguments: // // Requires: // // Returns: // // Notes: // // //-------------------------------------------------------------------------- VOID KerbReportKerbError( IN OPTIONAL PKERB_INTERNAL_NAME PrincipalName, IN OPTIONAL PUNICODE_STRING PrincipalRealm, IN OPTIONAL PKERB_LOGON_SESSION LogonSession, IN OPTIONAL PKERB_CREDENTIAL Credential, IN ULONG KlinInfo, IN OPTIONAL PKERB_ERROR ErrorMsg, IN ULONG KerbError, IN OPTIONAL PKERB_EXT_ERROR pExtendedError, IN BOOLEAN RequiredEvent ) { #ifdef WIN32_CHICAGO return; #else UNICODE_STRING ClientRealm = {0}; UNICODE_STRING ClientName = {0}; UNICODE_STRING ServerRealm = {0}; UNICODE_STRING ServerName = {0}; UNICODE_STRING ErrorText = {0}; UNICODE_STRING LogonSessionName = {0}; UNICODE_STRING TargetFullName = {0}; WCHAR ClientTime[50] = {0}; WCHAR ServerTime[50] = {0}; WCHAR LineString[12] = {0}; WCHAR FileString[12] = {0}; WCHAR ErrorCode[12] = {0}; WCHAR ExtendedError[128] = {0}; KERBERR KerbErr; ULONG NameType; NTSTATUS Status = STATUS_SUCCESS; STRING KerbString = {0}; #define KERB_ERROR_STRING_COUNT 14 LPWSTR Strings[KERB_ERROR_STRING_COUNT]; ULONG RawDataSize = 0; PVOID RawData = NULL; ULONG Index; if ( !RequiredEvent && (KerbGlobalLoggingLevel == 0) ) { return; } if (KerbEventLogHandle == NULL) { Status = KerbInitEventLogHandle(); if (Status != STATUS_SUCCESS) { return; } } // // Get the user name from the logon session // if (ARGUMENT_PRESENT(LogonSession)) { KerbReadLockLogonSessions( LogonSession ); KerbErr = KerbBuildFullServiceName( &LogonSession->PrimaryCredentials.DomainName, &LogonSession->PrimaryCredentials.UserName, &LogonSessionName ); KerbUnlockLogonSessions( LogonSession ); if (!KERB_SUCCESS(KerbErr)) { goto Cleanup; } } if (ARGUMENT_PRESENT(pExtendedError)) { swprintf(ExtendedError, L"0x%x KLIN(%x)", pExtendedError->status, pExtendedError->klininfo); } if (ARGUMENT_PRESENT(PrincipalName) && ARGUMENT_PRESENT(PrincipalRealm)) { KerbConvertKdcNameToString( &TargetFullName, PrincipalName, PrincipalRealm ); } swprintf(LineString, L"%x", (KlinInfo & 0xFFFF)); swprintf(FileString, L"%x", (KlinInfo >> 16)); if (ARGUMENT_PRESENT(ErrorMsg)) { swprintf(ErrorCode, L"0x%x", ErrorMsg->error_code); // // Get the client and server realms // if ((ErrorMsg->bit_mask & client_realm_present) != 0) { KerbErr = KerbConvertRealmToUnicodeString( &ClientRealm, &ErrorMsg->client_realm ); if (!KERB_SUCCESS(KerbErr)) { goto Cleanup; } } if (ErrorMsg->realm != NULL) { KerbErr = KerbConvertRealmToUnicodeString( &ServerRealm, &ErrorMsg->realm ); if (!KERB_SUCCESS(KerbErr)) { goto Cleanup; } } if ((ErrorMsg->bit_mask & KERB_ERROR_client_name_present) != 0) { KerbErr = KerbConvertPrincipalNameToString( &ClientName, &NameType, &ErrorMsg->KERB_ERROR_client_name ); if (!KERB_SUCCESS(KerbErr)) { goto Cleanup; } } KerbErr = KerbConvertPrincipalNameToString( &ServerName, &NameType, &ErrorMsg->server_name ); if (!KERB_SUCCESS(KerbErr)) { goto Cleanup; } if ((ErrorMsg->bit_mask & client_time_present) != 0) { swprintf(ClientTime,L"%d:%d:%d.%04d %d/%d/%d %ws", ErrorMsg->client_time.hour, ErrorMsg->client_time.minute, ErrorMsg->client_time.second, ErrorMsg->client_time.millisecond, ErrorMsg->client_time.month, ErrorMsg->client_time.day, ErrorMsg->client_time.year, (ErrorMsg->client_time.universal) ? L"Z" : L"" ); } swprintf(ServerTime,L"%d:%d:%d.%04d %d/%d/%d %ws", ErrorMsg->server_time.hour, ErrorMsg->server_time.minute, ErrorMsg->server_time.second, ErrorMsg->server_time.millisecond, ErrorMsg->server_time.month, ErrorMsg->server_time.day, ErrorMsg->server_time.year, (ErrorMsg->server_time.universal) ? L"Z" : L"" ); if (((ErrorMsg->bit_mask & error_text_present) != 0) && (ErrorMsg->error_text.length < SHRT_MAX)) { KerbString.Buffer = ErrorMsg->error_text.value; KerbString.Length = (USHORT) ErrorMsg->error_text.length; KerbErr = KerbStringToUnicodeString( &ErrorText, &KerbString ); if (!KERB_SUCCESS(KerbErr)) { goto Cleanup; } } if ((ErrorMsg->bit_mask & error_data_present) != 0) { RawDataSize = ErrorMsg->error_data.length; RawData = ErrorMsg->error_data.value; } } else { swprintf(ErrorCode, L"0x%x", KerbError); } // // Build the array of strings // Strings[0] = LogonSessionName.Buffer; Strings[1] = ClientTime; Strings[2] = ServerTime; Strings[3] = ErrorCode; Strings[4] = (ARGUMENT_PRESENT(ErrorMsg) ? KerbErrorToString(ErrorMsg->error_code) : KerbErrorToString(KerbError)); Strings[5] = ExtendedError; Strings[6] = ClientRealm.Buffer; Strings[7] = ClientName.Buffer; Strings[8] = ServerRealm.Buffer; Strings[9] = ServerName.Buffer; Strings[10] = TargetFullName.Buffer; Strings[11] = ErrorText.Buffer; Strings[12] = FileString; Strings[13] = LineString; // // Replace NULLs with an empty string. // for (Index = 0; Index < KERB_ERROR_STRING_COUNT ; Index++ ) { if (Strings[Index] == NULL) { Strings[Index] = L""; } } if (ERROR_SUCCESS != NetpEventlogWriteEx( KerbEventLogHandle, EVENTLOG_ERROR_TYPE, 0, KERBEVT_KERB_ERROR_MSG, KERB_ERROR_STRING_COUNT, RawDataSize, Strings, RawData )) { D_DebugLog((DEB_ERROR,"Failed to report event: %d. %ws, line %d\n",GetLastError(), THIS_FILE, __LINE__)); } Cleanup: KerbFreeString( &LogonSessionName ); KerbFreeString( &ClientRealm ); KerbFreeString( &ClientName ); KerbFreeString( &ServerRealm ); KerbFreeString( &ServerName ); KerbFreeString( &ErrorText ); KerbFreeString( &TargetFullName ); } //+------------------------------------------------------------------------- // // Function: KerbReportApModifiedError // // Synopsis: Reports error of type KRB_AP_ERR_MODIFIED // // Effects: // // Arguments: // // Requires: // // Returns: // // Notes: // // //-------------------------------------------------------------------------- #define MAX_STRINGS 3 VOID KerbReportApError( PKERB_ERROR ErrorMsg, IN OPTIONAL PUNICODE_STRING TargetName ) { KERBERR KerbErr; LPWSTR Strings[MAX_STRINGS] = {NULL, NULL, NULL}; DWORD EventId = 0, dwDataSize = 0; WORD StringCount = 2; LPVOID lpRawData = NULL; UNICODE_STRING ServerName = {0}; UNICODE_STRING ServerRealm = {0}; UNICODE_STRING NewTargetName = {0}; ULONG NameType; NTSTATUS Status; if (KerbEventLogHandle == NULL) { Status = KerbInitEventLogHandle(); if (Status != STATUS_SUCCESS) { return; } } KerbErr = KerbConvertPrincipalNameToString( &ServerName, &NameType, &ErrorMsg->server_name ); if (!KERB_SUCCESS(KerbErr)) { goto Cleanup; } if (ErrorMsg->realm != NULL) { KerbErr = KerbConvertRealmToUnicodeString( &ServerRealm, &ErrorMsg->realm ); if (!KERB_SUCCESS(KerbErr)) { goto Cleanup; } } Strings[0] = ServerName.Buffer; Strings[1] = ServerRealm.Buffer; switch (ErrorMsg->error_code) { case KRB_AP_ERR_MODIFIED: EventId = KERBEVT_KRB_AP_ERR_MODIFIED; // not sure if this is always null terminated, so do it. Status = KerbDuplicateString( &NewTargetName, TargetName ); if (Status != STATUS_SUCCESS) { return; } Strings[2] = NewTargetName.Buffer; StringCount++; break; case KRB_AP_ERR_TKT_NYV: EventId = KERBEVT_KRB_AP_ERR_TKT_NYV; break; default: D_DebugLog((DEB_ERROR, "Unknown error to KerbReportApError %x\n", ErrorMsg->error_code)); goto Cleanup; } if (ERROR_SUCCESS != NetpEventlogWriteEx( KerbEventLogHandle, EVENTLOG_ERROR_TYPE, 0, EventId, StringCount, dwDataSize, Strings, lpRawData )) { D_DebugLog((DEB_ERROR,"Failed to report event: %d. %ws, line %d\n",GetLastError(), THIS_FILE, __LINE__)); } Cleanup: KerbFreeString( &ServerRealm ); KerbFreeString( &ServerName ); KerbFreeString( &NewTargetName ); } #endif // WIN32_CHICAGO //+------------------------------------------------------------------------- // // Function: KerbShutdownEvents // // Synopsis: Shutsdown event log reporting // // Effects: // // Arguments: // // Requires: // // Returns: // // Notes: // // //-------------------------------------------------------------------------- VOID KerbShutdownEvents( VOID ) { HANDLE EventLogHandle; EventLogHandle = InterlockedExchangePointer( &KerbEventLogHandle, NULL ); if( EventLogHandle ) { NetpEventlogClose( EventLogHandle ); } } //+------------------------------------------------------------------------- // // Function: KerbReportPACError // // Synopsis: Reports error of type KERBEVT_KRB_PAC_VERIFICATION_FAILURE // // Effects: // // Arguments: // // Requires: // // Returns: // // Notes: // // //-------------------------------------------------------------------------- VOID KerbReportPACError( PUNICODE_STRING ClientName, PUNICODE_STRING ClientDomain, NTSTATUS FailureStatus ) { LPWSTR Strings[MAX_STRINGS] = {NULL, NULL}; NTSTATUS Status; if (KerbEventLogHandle == NULL) { Status = KerbInitEventLogHandle(); if (Status != STATUS_SUCCESS) { return; } } // // There's a small window of oppty when KDCs might try to validate // the PAC locally, even though the kdcsvc.dll hasn't been loaded into // lsass.exe yet. // if ( FailureStatus == STATUS_MUST_BE_KDC ) { return; } Strings[0] = ClientName->Buffer; // this is null terminated in this case Strings[1] = ClientDomain->Buffer; // this is null terminated in this case if (ERROR_SUCCESS != NetpEventlogWriteEx( KerbEventLogHandle, EVENTLOG_ERROR_TYPE, 0, KERBEVT_KRB_PAC_VERIFICATION_FAILURE, 2, sizeof(NTSTATUS), Strings, &FailureStatus )) { D_DebugLog((DEB_ERROR,"Failed to report event: %d. %ws, line %d\n",GetLastError(), THIS_FILE, __LINE__)); } } //+------------------------------------------------------------------------- // // Function: KerbReportUdpEvent // // Synopsis: See if its time to log an event. // // Effects: // // Arguments: // // Requires: // // Returns: // // Notes: // // //-------------------------------------------------------------------------- BOOLEAN KerbReportUdpEvent() { TimeStamp CurrentTime; BOOLEAN fRet = FALSE; GetSystemTimeAsFileTime((LPFILETIME) &CurrentTime); InterlockedIncrement(&KerbUdpTimeoutEvents); KerbReadLockUdpStats(); if (( KerbUdpTimeoutEvents > UDPTIMEOUT_LOGGING_THRESHHOLD ) && ( KerbGetTime(CurrentTime) < KerbGetTime( KerbUdpNextUpdate ))) { fRet = TRUE; KerbReadToWriteLockUdpStats(); KerbUdpTimeoutEvents = 0; } else if ( KerbGetTime( CurrentTime ) > KerbGetTime( KerbUdpNextUpdate )) { // // Time to reset our counter, and our time // KerbReadToWriteLockUdpStats(); TimeStamp Delta; KerbSetTimeInMinutes(&Delta, UDPTIMEOUT_LOGGING_INTERVAL); KerbSetTime(&KerbUdpNextUpdate,(KerbGetTime(CurrentTime) + KerbGetTime(Delta))); KerbUdpTimeoutEvents = 0; } KerbUnlockUdpStats(); return fRet; } //+------------------------------------------------------------------------- // // Function: KerbReportMissingRDN. // // Synopsis: Reports error when we don't have enough information in the // subject RDN. // Effects: // // Arguments: // // Requires: // // Returns: // // Notes: // // //-------------------------------------------------------------------------- VOID KerbReportMissingRDN() { NTSTATUS Status; if (KerbEventLogHandle == NULL) { Status = KerbInitEventLogHandle(); if (Status != STATUS_SUCCESS) { return; } } if (ERROR_SUCCESS != NetpEventlogWriteEx( KerbEventLogHandle, EVENTLOG_ERROR_TYPE, 0, KERBEVT_NO_RDN, 0, 0, NULL, NULL )) { D_DebugLog((DEB_TRACE,"Failed to report event: %d. %ws, line %d\n",GetLastError(), THIS_FILE, __LINE__)); } } //+------------------------------------------------------------------------- // // Function: KerbReportTransportError. // // Synopsis: Reports warning when we're hitting UDP timeouts. // // Effects: // // Arguments: // // Requires: // // Returns: // // Notes: // // //-------------------------------------------------------------------------- VOID KerbReportTransportError( NTSTATUS FailureStatus ) { NTSTATUS Status; if (KerbEventLogHandle == NULL) { Status = KerbInitEventLogHandle(); if (Status != STATUS_SUCCESS) { return; } } // // Only log every 20th event. // if (!KerbReportUdpEvent()) { return; } D_DebugLog((DEB_TRACE, "Logging UDP event\n")); if (ERROR_SUCCESS != NetpEventlogWriteEx( KerbEventLogHandle, EVENTLOG_WARNING_TYPE, 0, KERBEVT_UDP_TIMEOUT, 0, sizeof(NTSTATUS), NULL, &FailureStatus )) { D_DebugLog((DEB_TRACE,"Failed to report event: %d. %ws, line %d\n",GetLastError(), THIS_FILE, __LINE__)); } } //+------------------------------------------------------------------------- // // Function: KerbResetTransmissionCounter // // Synopsis: Don't log UDP problems if we have no network, or can't // reach a DC. // // Effects: // // Arguments: // // Requires: // // Returns: // // Notes: // // //-------------------------------------------------------------------------- VOID KerbResetTransportCounter() { KerbReadLockUdpStats(); if (KerbUdpTimeoutEvents != 0) { // // Avoid taking write lock unless needed. // D_DebugLog((DEB_ERROR, "Resetting transmission counter. Current (%x)\n", KerbUdpTimeoutEvents)); KerbReadToWriteLockUdpStats(); KerbUdpTimeoutEvents = 0; } KerbUnlockUdpStats(); } //+------------------------------------------------------------------------- // // Function: KerbReportPkinit // // Synopsis: Reports errors generated by invalid client certificates // // Effects: // // Arguments: // // Requires: // // Returns: // // Notes: // // //-------------------------------------------------------------------------- VOID KerbReportPkinitError( IN ULONG PolicyStatus, IN OPTIONAL PCCERT_CONTEXT KdcCert ) { LPWSTR Strings[MAX_STRINGS] = {NULL, NULL, NULL}; WCHAR SubjectName[DNS_MAX_NAME_LENGTH + 1]; DWORD NameMaxLength = DNS_MAX_NAME_LENGTH + 1; DWORD SubjectLength; NTSTATUS Status; ULONG StringCount = 1; LPWSTR MessageBuffer = NULL; DWORD MessageSize = 0; if (KerbEventLogHandle == NULL) { Status = KerbInitEventLogHandle(); if (Status != STATUS_SUCCESS) { return; } } MessageSize = FormatMessageW( FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_FROM_SYSTEM, NULL, PolicyStatus, 0, (WCHAR*) &MessageBuffer, MessageSize, NULL ); if ( MessageSize != 0 ) { Strings[0] = MessageBuffer; if (ARGUMENT_PRESENT(KdcCert)) { RtlZeroMemory( SubjectName, NameMaxLength ); SubjectLength = CertGetNameString( KdcCert, CERT_NAME_DNS_TYPE, 0, NULL, SubjectName, NameMaxLength ); if (SubjectLength != 0) { Strings[1] = SubjectName; StringCount++; } else { Strings[1] = L""; StringCount++; } } if (ERROR_SUCCESS != NetpEventlogWriteEx( KerbEventLogHandle, EVENTLOG_ERROR_TYPE, 0, (ARGUMENT_PRESENT(KdcCert) ? KERBEVT_BAD_KDC_CERTIFICATE : KERBEVT_BAD_CLIENT_CERTIFICATE), StringCount, sizeof(ULONG), Strings, &PolicyStatus )) { D_DebugLog((DEB_ERROR,"Failed to report event: %d. %ws, line %d\n",GetLastError(), THIS_FILE, __LINE__)); } LocalFree(MessageBuffer); } else { D_DebugLog((DEB_ERROR, "Formatmessage failed %x\n", GetLastError())); DsysAssert(FALSE); } } //+------------------------------------------------------------------------- // // Function: KerbReportRasCardError // // Synopsis: Problem w/ *Session && Smartcard error. // // Effects: // // Arguments: // // Requires: // // Returns: // // Notes: // // //--------------------------------------------------------------------------- VOID KerbReportRasCardError( NTSTATUS CardStatus ) { NTSTATUS Status; if (KerbEventLogHandle == NULL) { Status = KerbInitEventLogHandle(); if (Status != STATUS_SUCCESS) { return; } } NetpEventlogWriteEx( KerbEventLogHandle, EVENTLOG_WARNING_TYPE, 0, KERBEVT_RAS_CARD_ERROR, 0, sizeof(NTSTATUS), NULL, &CardStatus ); } //+------------------------------------------------------------------------- // // Function: KerbReportCredmanError // // Synopsis: Problem w/ credman creds // // Effects: // // Arguments: // // Requires: // // Returns: // // Notes: // // //--------------------------------------------------------------------------- VOID KerbReportCredmanError( IN PUNICODE_STRING UserName, IN PUNICODE_STRING Domain, IN BOOLEAN Pkinit, IN NTSTATUS CardStatus ) { NTSTATUS Status; ULONG StringCount = 1; LPWSTR Strings[3] ={0}; if (KerbEventLogHandle == NULL) { Status = KerbInitEventLogHandle(); if (Status != STATUS_SUCCESS) { return; } } Strings[0] = UserName->Buffer; if (( Domain->Length > 0 ) && ( Domain->Buffer )) { Strings[0] = Domain->Buffer; Strings[1] = L"\\"; Strings[2] = UserName->Buffer; StringCount = 3; } NetpEventlogWriteEx( KerbEventLogHandle, EVENTLOG_WARNING_TYPE, 0, (Pkinit ? KERBEVT_CREDMAN_CARD_ERROR : KERBEVT_CREDMAN_PWD_ERROR), StringCount, sizeof(NTSTATUS), Strings, &CardStatus ); }