Source code of Windows XP (NT5)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

744 lines
15 KiB

/*++
Copyright (c) 1994-1999 Microsoft Corporation
Module Name :
sitesecu.cpp
Abstract:
Site Security property page
Author:
Ronald Meijer (ronaldm)
Project:
Internet Services Manager (cluster edition)
Revision History:
--*/
//
// Include Files
//
#include "stdafx.h"
#include "common.h"
#undef dllexp
#include <tcpdllp.hxx>
#define _RDNS_STANDALONE
#include <rdns.hxx>
#ifdef _DEBUG
#undef THIS_FILE
static char BASED_CODE THIS_FILE[] = __FILE__;
#endif // _DEBUG
//#ifdef _DEBUG
//
// Careful here... This may cause build failure
//
extern "C" DEBUG_PRINTS * g_pDebug = NULL;
//#endif // _DEBUG
#define new DEBUG_NEW
CIPAccessDescriptor::CIPAccessDescriptor(
IN BOOL fGranted
)
/*++
Routine Description:
Dummy Constructor for access description object. Assumes a single IP
address of 0.0.0.0
Arguments:
BOOL fGranted : TRUE for 'grant' access, FALSE for 'deny' access
Return Value:
N/A
--*/
: m_fGranted(fGranted),
m_adtType(CIPAccessDescriptor::ADT_SINGLE),
m_iaIPAddress(NULL_IP_ADDRESS),
m_iaSubnetMask(NULL_IP_MASK),
m_strDomain()
{
}
CIPAccessDescriptor::CIPAccessDescriptor(
IN const CIPAccessDescriptor & ac
)
/*++
Routine Description:
Copy constructor for access description object
Arguments:
const CIPAccessDescriptor & ac : Source access description object
Return Value:
N/A
--*/
: m_fGranted(ac.m_fGranted),
m_adtType(ac.m_adtType),
m_iaIPAddress(ac.m_iaIPAddress),
m_iaSubnetMask(ac.m_iaSubnetMask),
m_strDomain(ac.m_strDomain)
{
}
CIPAccessDescriptor::CIPAccessDescriptor(
IN BOOL fGranted,
IN DWORD dwIPAddress,
IN DWORD dwSubnetMask, OPTIONAL
IN BOOL fNetworkByteOrder OPTIONAL
)
/*++
Routine Description:
Constructor for ip range (ip address/subnet mask pair)
access description object.
Arguments:
BOOL fGranted : TRUE for 'grant' access, FALSE for 'deny' access
DWORD dwIPAddress : IP Address
DWORD dwSubnetMask : The subnet mask or 0xffffffff
BOOL fNetworkByteOrder : If TRUE, the ip address and subnet mask are in
network byte order
Return Value:
N/A
--*/
{
SetValues(fGranted, dwIPAddress, dwSubnetMask, fNetworkByteOrder);
}
CIPAccessDescriptor::CIPAccessDescriptor(
IN BOOL fGranted,
IN LPCTSTR lpstrDomain
)
/*++
Routine Description:
Constructor for domain name access description object.
Arguments:
BOOL fGranted : TRUE for 'grant' access, FALSE for 'deny' access
LPCTSTR lpstrDomain : The domain name
Return Value:
N/A
--*/
{
SetValues(fGranted, lpstrDomain);
}
void
CIPAccessDescriptor::SetValues(
IN BOOL fGranted,
IN DWORD dwIPAddress,
IN DWORD dwSubnetMask,
IN BOOL fNetworkByteOrder OPTIONAL
)
/*++
Routine Description:
Set values for 'ip range (ip address and subnet mask)' access descriptor,
or a single ip address if the mask is 0xffffffff
Arguments:
BOOL fGranted : TRUE for 'grant' access, FALSE for 'deny' access
DWORD dwIPAddress : IP Address
DWORD dwSubnetMask : The subnet mask or ffffffff
BOOL fNetworkByteOrder : If TRUE, the ip address and subnet mask are in
network byte order
Return Value:
None
Notes:
If the subnetmask is 0xffffffff this describes a single ip address.
--*/
{
m_fGranted = fGranted;
m_adtType = (dwSubnetMask == NULL_IP_MASK) ? ADT_SINGLE : ADT_MULTIPLE;
m_iaIPAddress = CIPAddress(dwIPAddress, fNetworkByteOrder);
m_iaSubnetMask = CIPAddress(dwSubnetMask, fNetworkByteOrder);
//
// Not used:
//
m_strDomain.Empty();
}
void
CIPAccessDescriptor::SetValues(
IN BOOL fGranted,
IN LPCTSTR lpstrDomain
)
/*++
Routine Description:
Set values for 'domain name' access descriptor
Arguments:
BOOL fGranted : TRUE for 'grant' access, FALSE for 'deny' access
LPCTSTR lpstrDomain : The domain name
Return Value:
None
--*/
{
m_fGranted = fGranted;
m_adtType = ADT_DOMAIN;
try
{
m_strDomain = lpstrDomain;
}
catch(CMemoryException * e)
{
TRACEEOLID("!!!exception assigning domain name");
e->ReportError();
e->Delete();
}
//
// Not used:
//
m_iaIPAddress.SetZeroValue();
m_iaSubnetMask.SetZeroValue();
}
BOOL
CIPAccessDescriptor::DuplicateInList(
IN CObListPlus & oblList
)
/*++
Routine Description:
Check to see if a duplicate exists in the provided oblist
Arguments:
CObListPlus & oblList
Return Value:
TRUE if a duplicate exists, FALSE otherwise.
Notes:
As there's no information how this list might be sorted at this point,
and the list is likely to be small, the search is sequential.
--*/
{
CObListIter obli(oblList);
CIPAccessDescriptor * pAccess;
TRACEEOLID("Looking for duplicate access descriptors");
while (pAccess = (CIPAccessDescriptor *)obli.Next())
{
ASSERT_READ_PTR(pAccess);
//
// Eliminate the item itself from the list, and look
// only for duplicates.
//
if (pAccess != this && *this == *pAccess)
{
TRACEEOLID("Duplicate access descriptor found");
return TRUE;
}
}
TRACEEOLID("No duplicate access descriptor found");
return FALSE;
}
BOOL
CIPAccessDescriptor::operator ==(
IN const CIPAccessDescriptor & ac
) const
/*++
Routine Description:
Compare against another access descriptor.
Arguments:
const CIPAccessDescriptor & ac : Object to be compared against
Return Value:
TRUE if the two are identical
--*/
{
if ( m_fGranted != ac.m_fGranted
|| m_adtType != ac.m_adtType)
{
return FALSE;
}
if (IsDomainName())
{
return m_strDomain.CompareNoCase(ac.m_strDomain) == 0;
}
return m_iaIPAddress == ac.m_iaIPAddress
&& m_iaSubnetMask == ac.m_iaSubnetMask;
}
int
CIPAccessDescriptor::OrderByAddress(
IN const CObjectPlus * pobAccess
) const
/*++
Routine Description:
Compare two access descriptors against each other.
Sorting criteria are in the following order:
1) 'Granted' sorts before 'Denied'
2) Domain names are sorted before ip addresses, and are
sorted alphabetically.
3) IP Address and IP Address/subnet mask pairs are sorted
by ip address.
Arguments:
const CObjectPlus * pobAccess : This really refers to another
CIPAccessDescriptor to be compared to.
Return Value:
Sort (+1, 0, -1) return value
--*/
{
const CIPAccessDescriptor * pob = (CIPAccessDescriptor *)pobAccess;
//
// First sort by access/denied
//
int n1 = HasAccess() ? 1 : 0;
int n2 = pob->HasAccess() ? 1 : 0;
if (n2 != n1)
{
//
// Grant sorts before denied
//
return n2 - n1;
}
//
// Secondly, try to sort by domain name (domain name sorts before
// ip address and ip address/subnet mask objects)
//
n1 = IsDomainName() ? 1 : 0;
n2 = pob->IsDomainName() ? 1 : 0;
if (n1 != n2)
{
//
// Domain names sort before ip addresses
//
return n2 - n1;
}
if (n1 && n2)
{
//
// Both are domain names. Sort alphabetically
//
return ::lstrcmpi(QueryDomainName(), pob->QueryDomainName());
}
//
// IP address is the third key.
//
return QueryIPAddress().CompareItem(pob->QueryIPAddress());
}
DWORD
AddAccessEntries(
IN ADDRESS_CHECK & ac,
IN BOOL fName,
IN BOOL fGrant,
OUT CObListPlus & oblAccessList,
OUT DWORD & cEntries
)
/*++
Routine Description:
Add specific kind of addresses from the list to the oblist of
access entries
Arguments:
ADDRESS_CHECK & ac : Address list input object
BOOL fName : TRUE for names, FALSE for ip
BOOL fGrant : TRUE for granted, FALSE for denied
CObListPlus & oblAccessList : ObList to add access entries to
int & cEntries : Returns the number of entries
Return Value:
Error code
Notes:
Sentinel entries (ip 0.0.0.0) are not added to the oblist, but
are reflected in the cEntries return value
--*/
{
DWORD i;
DWORD dwFlags;
if (fName)
{
//
// Domain names
//
LPSTR lpName;
cEntries = ac.GetNbName(fGrant);
for (i = 0L; i < cEntries; ++i)
{
if (ac.GetName(fGrant, i, &lpName, &dwFlags))
{
CString strDomain(lpName);
if (!(dwFlags & DNSLIST_FLAG_NOSUBDOMAIN))
{
strDomain = _T("*.") + strDomain;
}
oblAccessList.AddTail(new CIPAccessDescriptor(fGrant, strDomain));
}
}
}
else
{
//
// IP Addresses
//
LPBYTE lpMask;
LPBYTE lpAddr;
cEntries = ac.GetNbAddr(fGrant);
for (i = 0L; i < cEntries; ++i)
{
if (ac.GetAddr(fGrant, i, &dwFlags, &lpMask, &lpAddr))
{
DWORD dwIP = MAKEIPADDRESS(lpAddr[0], lpAddr[1], lpAddr[2], lpAddr[3]);
DWORD dwMask = MAKEIPADDRESS(lpMask[0], lpMask[1], lpMask[2], lpMask[3]);
if (dwIP == NULL_IP_ADDRESS && dwMask == NULL_IP_MASK)
{
//
// Sentinel in the grant list is not added, but
// also not subtracted from the count of entries,
// which is correct behaviour, since this is
// how default grant/deny by default is determined.
//
TRACEEOLID("Ignoring sentinel");
}
else
{
oblAccessList.AddTail(
new CIPAccessDescriptor(
fGrant,
dwIP,
dwMask,
FALSE
)
);
}
}
}
}
return ERROR_SUCCESS;
}
DWORD
BuildIplOblistFromBlob(
IN CBlob & blob,
OUT CObListPlus & oblAccessList,
OUT BOOL & fGrantByDefault
)
/*++
Routine Description:
Convert a blob to an oblist of access descriptors.
Arguments:
CBlob & blob : Input binary large object(blob)
CObListPlus & oblAccessList : Output oblist of access descriptors
BOOL & fGrantByDefault : Returns TRUE if access is granted
by default, FALSE otherwise
Return Value:
Error Return Code
--*/
{
oblAccessList.RemoveAll();
if (blob.IsEmpty())
{
return ERROR_SUCCESS;
}
ADDRESS_CHECK ac;
ac.BindCheckList(blob.GetData(), blob.GetSize());
DWORD cGrantAddr, cGrantName, cDenyAddr, cDenyName;
// Name/IP Granted/Deny
// ============================================================
AddAccessEntries(ac, TRUE, TRUE, oblAccessList, cGrantName);
AddAccessEntries(ac, FALSE, TRUE, oblAccessList, cGrantAddr);
AddAccessEntries(ac, TRUE, FALSE, oblAccessList, cDenyName);
AddAccessEntries(ac, FALSE, FALSE, oblAccessList, cDenyAddr);
ac.UnbindCheckList();
fGrantByDefault = (cDenyAddr + cDenyName != 0L)
|| (cGrantAddr + cGrantName == 0L);
return ERROR_SUCCESS;
}
LPSTR
PrepareDomainName(
IN LPSTR lpName,
OUT DWORD * pdwFlags
)
/*++
Routine Description:
Check to see if the domain name contains a wild card,
if so remove it. Set the flags based on the domain name
Arguments:
LPSTR lpName : Input domain name
DWORD * pdwFlags : Return the flags for AddName
Return:
Pointer to the cleaned up domain name
--*/
{
*pdwFlags = 0L;
if (!strncmp(lpName, "*.", 2))
{
return lpName + 2;
}
*pdwFlags |= DNSLIST_FLAG_NOSUBDOMAIN;
return lpName;
}
void
BuildIplBlob(
IN CObListPlus & oblAccessList,
IN BOOL fGrantByDefault,
OUT CBlob & blob
)
/*++
Routine Description:
Build a blob from an oblist of access descriptors
Arguments:
CObListPlus & oblAccessList : Input oblist of access descriptors
BOOL fGrantByDefault : TRUE if access is granted by default
CBlob & blob : Output blob
Return Value:
None
Notes:
If fGrantByDefault is FALSE, e.g. access is to be denied by
default, but nobody is specifically granted access, then add
a dummy entry 0.0.0.0 to the grant list.
If grant by default is on, then granted entries will not be
added to the blob. Similart for denied entries if deny by
default is on.
--*/
{
ADDRESS_CHECK ac;
ac.BindCheckList();
int cItems = 0;
CObListIter obli(oblAccessList);
const CIPAccessDescriptor * pAccess;
//
// Should be empty to start with.
//
ASSERT(blob.IsEmpty());
blob.CleanUp();
BYTE bMask[4];
BYTE bIp[4];
while (pAccess = (CIPAccessDescriptor *)obli.Next())
{
ASSERT_READ_PTR(pAccess);
if (pAccess->HasAccess() == fGrantByDefault)
{
//
// Skip this entry -- it's irrelevant
//
continue;
}
if (pAccess->IsDomainName())
{
LPSTR lpName = AllocAnsiString(pAccess->QueryDomainName());
if (lpName)
{
DWORD dwFlags;
LPSTR lpDomain = PrepareDomainName(lpName, &dwFlags);
ac.AddName(
pAccess->HasAccess(),
lpDomain,
dwFlags
);
FreeMem(lpName);
}
}
else
{
//
// Build with network byte order
//
ac.AddAddr(
pAccess->HasAccess(),
AF_INET,
CIPAddress::DWORDtoLPBYTE(pAccess->QuerySubnetMask(FALSE), bMask),
CIPAddress::DWORDtoLPBYTE(pAccess->QueryIPAddress(FALSE), bIp)
);
}
++cItems;
}
if (cItems == 0 && !fGrantByDefault)
{
//
// List is empty. If deny by default is on, create
// a dummy sentinel entry to grant access to single
// address 0.0.0.0, otherwise we're ok.
//
ac.AddAddr(
TRUE,
AF_INET,
CIPAddress::DWORDtoLPBYTE(NULL_IP_MASK, bMask),
CIPAddress::DWORDtoLPBYTE(NULL_IP_ADDRESS, bIp)
);
++cItems;
}
if (cItems > 0)
{
blob.SetValue(ac.QueryCheckListSize(), ac.QueryCheckListPtr(), TRUE);
}
ac.UnbindCheckList();
}