Line data Source code
1 : /*
2 : Unix SMB/Netbios implementation.
3 : Version 3.0
4 : handle NLTMSSP, server side
5 :
6 : Copyright (C) Andrew Tridgell 2001
7 : Copyright (C) Andrew Bartlett 2001-2003
8 : Copyright (C) Andrew Bartlett 2005 (Updated from gensec).
9 :
10 : This program is free software; you can redistribute it and/or modify
11 : it under the terms of the GNU General Public License as published by
12 : the Free Software Foundation; either version 3 of the License, or
13 : (at your option) any later version.
14 :
15 : This program is distributed in the hope that it will be useful,
16 : but WITHOUT ANY WARRANTY; without even the implied warranty of
17 : MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 : GNU General Public License for more details.
19 :
20 : You should have received a copy of the GNU General Public License
21 : along with this program. If not, see <http://www.gnu.org/licenses/>.
22 : */
23 :
24 : #include "includes.h"
25 : #include "../auth/ntlmssp/ntlmssp.h"
26 : #include "../auth/ntlmssp/ntlmssp_private.h"
27 :
28 : #undef DBGC_CLASS
29 : #define DBGC_CLASS DBGC_AUTH
30 :
31 68777 : static void debug_ntlmssp_flags_raw(int level, uint32_t flags)
32 : {
33 : #define _PRINT_FLAG_LINE(v) do { \
34 : if (flags & (v)) { \
35 : DEBUGADD(level, (" " #v "\n")); \
36 : } \
37 : } while (0)
38 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_UNICODE);
39 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_OEM);
40 68777 : _PRINT_FLAG_LINE(NTLMSSP_REQUEST_TARGET);
41 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_SIGN);
42 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_SEAL);
43 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_DATAGRAM);
44 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_LM_KEY);
45 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_NETWARE);
46 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_NTLM);
47 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_NT_ONLY);
48 68777 : _PRINT_FLAG_LINE(NTLMSSP_ANONYMOUS);
49 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED);
50 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED);
51 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL);
52 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_ALWAYS_SIGN);
53 68777 : _PRINT_FLAG_LINE(NTLMSSP_TARGET_TYPE_DOMAIN);
54 68777 : _PRINT_FLAG_LINE(NTLMSSP_TARGET_TYPE_SERVER);
55 68777 : _PRINT_FLAG_LINE(NTLMSSP_TARGET_TYPE_SHARE);
56 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY);
57 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_IDENTIFY);
58 68777 : _PRINT_FLAG_LINE(NTLMSSP_REQUEST_NON_NT_SESSION_KEY);
59 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_TARGET_INFO);
60 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_VERSION);
61 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_128);
62 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_KEY_EXCH);
63 68777 : _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_56);
64 68777 : }
65 :
66 : /**
67 : * Print out the NTLMSSP flags for debugging
68 : * @param neg_flags The flags from the packet
69 : */
70 68777 : void debug_ntlmssp_flags(uint32_t neg_flags)
71 : {
72 68777 : DEBUG(3,("Got NTLMSSP neg_flags=0x%08x\n", neg_flags));
73 68777 : debug_ntlmssp_flags_raw(4, neg_flags);
74 68777 : }
75 :
76 30545 : NTSTATUS ntlmssp_handle_neg_flags(struct ntlmssp_state *ntlmssp_state,
77 : uint32_t flags, const char *name)
78 : {
79 30545 : uint32_t missing_flags = ntlmssp_state->required_flags;
80 :
81 30545 : if (ntlmssp_state->use_ntlmv2) {
82 : /*
83 : * Using NTLMv2 as a client implies
84 : * using NTLMSSP_NEGOTIATE_NTLM2
85 : * (NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY)
86 : *
87 : * Note that 'use_ntlmv2' is only set
88 : * true in the client case.
89 : *
90 : * Even if the server has a bug and does not announce
91 : * it, we need to assume it's present.
92 : *
93 : * Note that we also have the flag
94 : * in ntlmssp_state->required_flags,
95 : * see gensec_ntlmssp_client_start().
96 : *
97 : * See bug #12862.
98 : */
99 9925 : flags |= NTLMSSP_NEGOTIATE_NTLM2;
100 : }
101 :
102 30545 : if (flags & NTLMSSP_NEGOTIATE_UNICODE) {
103 30545 : ntlmssp_state->neg_flags |= NTLMSSP_NEGOTIATE_UNICODE;
104 30545 : ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_OEM;
105 30545 : ntlmssp_state->unicode = true;
106 : } else {
107 0 : ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_UNICODE;
108 0 : ntlmssp_state->neg_flags |= NTLMSSP_NEGOTIATE_OEM;
109 0 : ntlmssp_state->unicode = false;
110 : }
111 :
112 : /*
113 : * NTLMSSP_NEGOTIATE_NTLM2 (NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY)
114 : * has priority over NTLMSSP_NEGOTIATE_LM_KEY
115 : */
116 30545 : if (!(flags & NTLMSSP_NEGOTIATE_NTLM2)) {
117 1080 : ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_NTLM2;
118 : }
119 :
120 30545 : if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_NTLM2) {
121 29465 : ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_LM_KEY;
122 : }
123 :
124 30545 : if (!(flags & NTLMSSP_NEGOTIATE_LM_KEY)) {
125 30353 : ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_LM_KEY;
126 : }
127 :
128 30545 : if (!(flags & NTLMSSP_NEGOTIATE_ALWAYS_SIGN)) {
129 0 : ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_ALWAYS_SIGN;
130 : }
131 :
132 30545 : if (!(flags & NTLMSSP_NEGOTIATE_128)) {
133 480 : ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_128;
134 : }
135 :
136 30545 : if (!(flags & NTLMSSP_NEGOTIATE_56)) {
137 30257 : ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_56;
138 : }
139 :
140 30545 : if (!(flags & NTLMSSP_NEGOTIATE_KEY_EXCH)) {
141 0 : ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_KEY_EXCH;
142 : }
143 :
144 30545 : if (!(flags & NTLMSSP_NEGOTIATE_SIGN)) {
145 582 : ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_SIGN;
146 : }
147 :
148 30545 : if (!(flags & NTLMSSP_NEGOTIATE_SEAL)) {
149 8496 : ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_SEAL;
150 : }
151 :
152 30545 : if ((flags & NTLMSSP_REQUEST_TARGET)) {
153 30545 : ntlmssp_state->neg_flags |= NTLMSSP_REQUEST_TARGET;
154 : }
155 :
156 30545 : missing_flags &= ~ntlmssp_state->neg_flags;
157 30545 : if (missing_flags != 0) {
158 0 : HRESULT hres = HRES_SEC_E_UNSUPPORTED_FUNCTION;
159 0 : NTSTATUS status = NT_STATUS(HRES_ERROR_V(hres));
160 0 : DEBUG(1, ("%s: Got %s flags[0x%08x] "
161 : "- possible downgrade detected! "
162 : "missing_flags[0x%08x] - %s\n",
163 : __func__, name,
164 : (unsigned)flags,
165 : (unsigned)missing_flags,
166 : nt_errstr(status)));
167 0 : debug_ntlmssp_flags_raw(1, missing_flags);
168 0 : DEBUGADD(4, ("neg_flags[0x%08x]\n",
169 : (unsigned)ntlmssp_state->neg_flags));
170 0 : debug_ntlmssp_flags_raw(4, ntlmssp_state->neg_flags);
171 0 : return status;
172 : }
173 :
174 30545 : return NT_STATUS_OK;
175 : }
176 :
177 : /* Does this blob looks like it could be NTLMSSP? */
178 33 : bool ntlmssp_blob_matches_magic(const DATA_BLOB *blob)
179 : {
180 33 : if (blob->length > 8 && memcmp("NTLMSSP\0", blob->data, 8) == 0) {
181 33 : return true;
182 : } else {
183 0 : return false;
184 : }
185 : }
186 :
187 30572 : const DATA_BLOB ntlmssp_version_blob(void)
188 : {
189 : /*
190 : * This is a simplified version of
191 : *
192 : * enum ndr_err_code err;
193 : * struct ntlmssp_VERSION vers;
194 : *
195 : * ZERO_STRUCT(vers);
196 : * vers.ProductMajorVersion = NTLMSSP_WINDOWS_MAJOR_VERSION_6;
197 : * vers.ProductMinorVersion = NTLMSSP_WINDOWS_MINOR_VERSION_1;
198 : * vers.ProductBuild = 0;
199 : * vers.NTLMRevisionCurrent = NTLMSSP_REVISION_W2K3;
200 : *
201 : * err = ndr_push_struct_blob(&version_blob,
202 : * ntlmssp_state,
203 : * &vers,
204 : * (ndr_push_flags_fn_t)ndr_push_ntlmssp_VERSION);
205 : *
206 : * if (!NDR_ERR_CODE_IS_SUCCESS(err)) {
207 : * data_blob_free(&struct_blob);
208 : * return NT_STATUS_NO_MEMORY;
209 : * }
210 : */
211 : static const uint8_t version_buffer[8] = {
212 : NTLMSSP_WINDOWS_MAJOR_VERSION_6,
213 : NTLMSSP_WINDOWS_MINOR_VERSION_1,
214 : 0x00, 0x00, /* product build */
215 : 0x00, 0x00, 0x00, /* reserved */
216 : NTLMSSP_REVISION_W2K3
217 : };
218 :
219 30572 : return data_blob_const(version_buffer, ARRAY_SIZE(version_buffer));
220 : }
|