SMBServer.cs 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341
  1. /* Copyright (C) 2014-2017 Tal Aloni <tal.aloni.il@gmail.com>. All rights reserved.
  2. *
  3. * You can redistribute this program and/or modify it under the terms of
  4. * the GNU Lesser Public License as published by the Free Software Foundation,
  5. * either version 3 of the License, or (at your option) any later version.
  6. */
  7. using System;
  8. using System.Collections.Generic;
  9. using System.Net;
  10. using System.Net.Sockets;
  11. using SMBLibrary.Authentication.GSSAPI;
  12. using SMBLibrary.NetBios;
  13. using SMBLibrary.Services;
  14. using SMBLibrary.SMB1;
  15. using SMBLibrary.SMB2;
  16. using Utilities;
  17. namespace SMBLibrary.Server
  18. {
  19. public partial class SMBServer
  20. {
  21. public const int NetBiosOverTCPPort = 139;
  22. public const int DirectTCPPort = 445;
  23. public const string NTLanManagerDialect = "NT LM 0.12";
  24. public const bool EnableExtendedSecurity = true;
  25. private ShareCollection m_shares; // e.g. Shared folders
  26. private GSSProvider m_securityProvider;
  27. private NamedPipeShare m_services; // Named pipes
  28. private IPAddress m_serverAddress;
  29. private SMBTransportType m_transport;
  30. private bool m_enableSMB1;
  31. private bool m_enableSMB2;
  32. private Socket m_listenerSocket;
  33. private bool m_listening;
  34. private Guid m_serverGuid;
  35. private DateTime m_serverStartTime;
  36. public event EventHandler<LogEntry> OnLogEntry;
  37. public SMBServer(ShareCollection shares, GSSProvider securityProvider, IPAddress serverAddress, SMBTransportType transport) : this(shares, securityProvider, serverAddress, transport, true, true)
  38. {
  39. }
  40. public SMBServer(ShareCollection shares, GSSProvider securityProvider, IPAddress serverAddress, SMBTransportType transport, bool enableSMB1, bool enableSMB2)
  41. {
  42. m_shares = shares;
  43. m_securityProvider = securityProvider;
  44. m_serverAddress = serverAddress;
  45. m_serverGuid = Guid.NewGuid();
  46. m_serverStartTime = DateTime.Now;
  47. m_transport = transport;
  48. m_enableSMB1 = enableSMB1;
  49. m_enableSMB2 = enableSMB2;
  50. m_services = new NamedPipeShare(shares.ListShares());
  51. }
  52. public void Start()
  53. {
  54. if (!m_listening)
  55. {
  56. m_listening = true;
  57. m_listenerSocket = new Socket(m_serverAddress.AddressFamily, SocketType.Stream, ProtocolType.Tcp);
  58. int port = (m_transport == SMBTransportType.DirectTCPTransport ? DirectTCPPort : NetBiosOverTCPPort);
  59. m_listenerSocket.Bind(new IPEndPoint(m_serverAddress, port));
  60. m_listenerSocket.Listen((int)SocketOptionName.MaxConnections);
  61. m_listenerSocket.BeginAccept(ConnectRequestCallback, m_listenerSocket);
  62. }
  63. }
  64. public void Stop()
  65. {
  66. m_listening = false;
  67. SocketUtils.ReleaseSocket(m_listenerSocket);
  68. }
  69. // This method Accepts new connections
  70. private void ConnectRequestCallback(IAsyncResult ar)
  71. {
  72. Socket listenerSocket = (Socket)ar.AsyncState;
  73. Socket clientSocket;
  74. try
  75. {
  76. clientSocket = listenerSocket.EndAccept(ar);
  77. }
  78. catch (ObjectDisposedException)
  79. {
  80. return;
  81. }
  82. catch (SocketException ex)
  83. {
  84. const int WSAECONNRESET = 10054;
  85. // Client may have closed the connection before we start to process the connection request.
  86. // When we get this error, we have to continue to accept other requests.
  87. // See http://stackoverflow.com/questions/7704417/socket-endaccept-error-10054
  88. if (ex.ErrorCode == WSAECONNRESET)
  89. {
  90. listenerSocket.BeginAccept(ConnectRequestCallback, listenerSocket);
  91. }
  92. Log(Severity.Debug, "Connection request error {0}", ex.ErrorCode);
  93. return;
  94. }
  95. ConnectionState state = new ConnectionState(Log);
  96. // Disable the Nagle Algorithm for this tcp socket:
  97. clientSocket.NoDelay = true;
  98. state.ClientSocket = clientSocket;
  99. state.ClientEndPoint = clientSocket.RemoteEndPoint as IPEndPoint;
  100. state.LogToServer(Severity.Verbose, "New connection request");
  101. try
  102. {
  103. // Direct TCP transport packet is actually an NBT Session Message Packet,
  104. // So in either case (NetBios over TCP or Direct TCP Transport) we will receive an NBT packet.
  105. clientSocket.BeginReceive(state.ReceiveBuffer.Buffer, state.ReceiveBuffer.WriteOffset, state.ReceiveBuffer.AvailableLength, 0, ReceiveCallback, state);
  106. }
  107. catch (ObjectDisposedException)
  108. {
  109. }
  110. catch (SocketException)
  111. {
  112. }
  113. listenerSocket.BeginAccept(ConnectRequestCallback, listenerSocket);
  114. }
  115. private void ReceiveCallback(IAsyncResult result)
  116. {
  117. ConnectionState state = (ConnectionState)result.AsyncState;
  118. Socket clientSocket = state.ClientSocket;
  119. if (!m_listening)
  120. {
  121. clientSocket.Close();
  122. return;
  123. }
  124. int numberOfBytesReceived;
  125. try
  126. {
  127. numberOfBytesReceived = clientSocket.EndReceive(result);
  128. }
  129. catch (ObjectDisposedException)
  130. {
  131. return;
  132. }
  133. catch (SocketException)
  134. {
  135. return;
  136. }
  137. if (numberOfBytesReceived == 0)
  138. {
  139. // The other side has closed the connection
  140. state.LogToServer(Severity.Debug, "The other side closed the connection");
  141. clientSocket.Close();
  142. return;
  143. }
  144. NBTConnectionReceiveBuffer receiveBuffer = state.ReceiveBuffer;
  145. receiveBuffer.SetNumberOfBytesReceived(numberOfBytesReceived);
  146. ProcessConnectionBuffer(ref state);
  147. if (clientSocket.Connected)
  148. {
  149. try
  150. {
  151. clientSocket.BeginReceive(state.ReceiveBuffer.Buffer, state.ReceiveBuffer.WriteOffset, state.ReceiveBuffer.AvailableLength, 0, ReceiveCallback, state);
  152. }
  153. catch (ObjectDisposedException)
  154. {
  155. }
  156. catch (SocketException)
  157. {
  158. }
  159. }
  160. }
  161. public void ProcessConnectionBuffer(ref ConnectionState state)
  162. {
  163. Socket clientSocket = state.ClientSocket;
  164. NBTConnectionReceiveBuffer receiveBuffer = state.ReceiveBuffer;
  165. while (receiveBuffer.HasCompletePacket())
  166. {
  167. SessionPacket packet = null;
  168. try
  169. {
  170. packet = receiveBuffer.DequeuePacket();
  171. }
  172. catch (Exception ex)
  173. {
  174. state.ClientSocket.Close();
  175. Log(Severity.Warning, "Rejected Invalid NetBIOS session packet: " + ex.Message);
  176. break;
  177. }
  178. if (packet != null)
  179. {
  180. ProcessPacket(packet, ref state);
  181. }
  182. }
  183. }
  184. public void ProcessPacket(SessionPacket packet, ref ConnectionState state)
  185. {
  186. if (packet is SessionRequestPacket && m_transport == SMBTransportType.NetBiosOverTCP)
  187. {
  188. PositiveSessionResponsePacket response = new PositiveSessionResponsePacket();
  189. TrySendPacket(state, response);
  190. }
  191. else if (packet is SessionKeepAlivePacket && m_transport == SMBTransportType.NetBiosOverTCP)
  192. {
  193. // [RFC 1001] NetBIOS session keep alives do not require a response from the NetBIOS peer
  194. }
  195. else if (packet is SessionMessagePacket)
  196. {
  197. // Note: To be compatible with SMB2 specifications, we must accept SMB_COM_NEGOTIATE.
  198. // We will disconnect the connection if m_enableSMB1 == false and the client does not support SMB2.
  199. bool acceptSMB1 = (state.ServerDialect == SMBDialect.NotSet || state.ServerDialect == SMBDialect.NTLM012);
  200. bool acceptSMB2 = (m_enableSMB2 && (state.ServerDialect == SMBDialect.NotSet || state.ServerDialect == SMBDialect.SMB202 || state.ServerDialect == SMBDialect.SMB210));
  201. if (SMB1Header.IsValidSMB1Header(packet.Trailer))
  202. {
  203. if (!acceptSMB1)
  204. {
  205. state.LogToServer(Severity.Verbose, "Rejected SMB1 message");
  206. state.ClientSocket.Close();
  207. return;
  208. }
  209. SMB1Message message = null;
  210. try
  211. {
  212. message = SMB1Message.GetSMB1Message(packet.Trailer);
  213. }
  214. catch (Exception ex)
  215. {
  216. state.LogToServer(Severity.Warning, "Invalid SMB1 message: " + ex.Message);
  217. state.ClientSocket.Close();
  218. return;
  219. }
  220. state.LogToServer(Severity.Verbose, "SMB1 message received: {0} requests, First request: {1}, Packet length: {2}", message.Commands.Count, message.Commands[0].CommandName.ToString(), packet.Length);
  221. if (state.ServerDialect == SMBDialect.NotSet && m_enableSMB2)
  222. {
  223. // Check if the client supports SMB 2
  224. List<string> smb2Dialects = SMB2.NegotiateHelper.FindSMB2Dialects(message);
  225. if (smb2Dialects.Count > 0)
  226. {
  227. SMB2Command response = SMB2.NegotiateHelper.GetNegotiateResponse(smb2Dialects, m_securityProvider, state, m_serverGuid, m_serverStartTime);
  228. if (state.ServerDialect != SMBDialect.NotSet)
  229. {
  230. state = new SMB2ConnectionState(state, AllocatePersistentFileID);
  231. }
  232. TrySendResponse(state, response);
  233. return;
  234. }
  235. }
  236. if (m_enableSMB1)
  237. {
  238. ProcessSMB1Message(message, ref state);
  239. }
  240. else
  241. {
  242. // [MS-SMB2] 3.3.5.3.2 If the string is not present in the dialect list and the server does not implement SMB,
  243. // the server MUST disconnect the connection [..] without sending a response.
  244. state.LogToServer(Severity.Verbose, "Rejected SMB1 message");
  245. state.ClientSocket.Close();
  246. }
  247. }
  248. else if (SMB2Header.IsValidSMB2Header(packet.Trailer))
  249. {
  250. if (!acceptSMB2)
  251. {
  252. state.LogToServer(Severity.Verbose, "Rejected SMB2 message");
  253. state.ClientSocket.Close();
  254. return;
  255. }
  256. List<SMB2Command> requestChain;
  257. try
  258. {
  259. requestChain = SMB2Command.ReadRequestChain(packet.Trailer, 0);
  260. }
  261. catch (Exception ex)
  262. {
  263. state.LogToServer(Severity.Warning, "Invalid SMB2 request chain: " + ex.Message);
  264. state.ClientSocket.Close();
  265. return;
  266. }
  267. state.LogToServer(Severity.Verbose, "SMB2 request chain received: {0} requests, First request: {1}, Packet length: {2}", requestChain.Count, requestChain[0].CommandName.ToString(), packet.Length);
  268. ProcessSMB2RequestChain(requestChain, ref state);
  269. }
  270. else
  271. {
  272. state.LogToServer(Severity.Warning, "Invalid SMB message");
  273. state.ClientSocket.Close();
  274. }
  275. }
  276. else
  277. {
  278. state.LogToServer(Severity.Warning, "Invalid NetBIOS packet");
  279. state.ClientSocket.Close();
  280. return;
  281. }
  282. }
  283. public static void TrySendPacket(ConnectionState state, SessionPacket response)
  284. {
  285. Socket clientSocket = state.ClientSocket;
  286. try
  287. {
  288. clientSocket.Send(response.GetBytes());
  289. }
  290. catch (SocketException)
  291. {
  292. }
  293. catch (ObjectDisposedException)
  294. {
  295. }
  296. }
  297. public void Log(Severity severity, string message)
  298. {
  299. // To be thread-safe we must capture the delegate reference first
  300. EventHandler<LogEntry> handler = OnLogEntry;
  301. if (handler != null)
  302. {
  303. handler(this, new LogEntry(DateTime.Now, severity, "SMB Server", message));
  304. }
  305. }
  306. public void Log(Severity severity, string message, params object[] args)
  307. {
  308. Log(severity, String.Format(message, args));
  309. }
  310. }
  311. }