SessionSetupHelper.cs 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101
  1. /* Copyright (C) 2017 Tal Aloni <tal.aloni.il@gmail.com>. All rights reserved.
  2. *
  3. * You can redistribute this program and/or modify it under the terms of
  4. * the GNU Lesser Public License as published by the Free Software Foundation,
  5. * either version 3 of the License, or (at your option) any later version.
  6. */
  7. using System;
  8. using System.Collections.Generic;
  9. using SMBLibrary.Authentication.GSSAPI;
  10. using SMBLibrary.Authentication.NTLM;
  11. using SMBLibrary.SMB2;
  12. using Utilities;
  13. namespace SMBLibrary.Server.SMB2
  14. {
  15. /// <summary>
  16. /// Session Setup helper
  17. /// </summary>
  18. public class SessionSetupHelper
  19. {
  20. internal static SMB2Command GetSessionSetupResponse(SessionSetupRequest request, NTLMAuthenticationProviderBase securityProvider, SMB2ConnectionState state)
  21. {
  22. // [MS-SMB2] Windows [..] will also accept raw Kerberos messages and implicit NTLM messages as part of GSS authentication.
  23. SessionSetupResponse response = new SessionSetupResponse();
  24. byte[] messageBytes = request.SecurityBuffer;
  25. bool isRawMessage = true;
  26. if (!AuthenticationMessageUtils.IsSignatureValid(messageBytes))
  27. {
  28. messageBytes = GSSAPIHelper.GetNTLMSSPMessage(request.SecurityBuffer);
  29. isRawMessage = false;
  30. }
  31. if (!AuthenticationMessageUtils.IsSignatureValid(messageBytes))
  32. {
  33. return new ErrorResponse(request.CommandName, NTStatus.STATUS_NOT_SUPPORTED);
  34. }
  35. // According to [MS-SMB2] 3.3.5.5.3, response.Header.SessionID must be allocated if the server returns STATUS_MORE_PROCESSING_REQUIRED
  36. if (request.Header.SessionID == 0)
  37. {
  38. ulong? sessionID = state.AllocateSessionID();
  39. if (!sessionID.HasValue)
  40. {
  41. return new ErrorResponse(request.CommandName, NTStatus.STATUS_TOO_MANY_SESSIONS);
  42. }
  43. response.Header.SessionID = sessionID.Value;
  44. }
  45. MessageTypeName messageType = AuthenticationMessageUtils.GetMessageType(messageBytes);
  46. if (messageType == MessageTypeName.Negotiate)
  47. {
  48. NegotiateMessage negotiateMessage = new NegotiateMessage(messageBytes);
  49. ChallengeMessage challengeMessage;
  50. Win32Error status = securityProvider.GetChallengeMessage(out state.AuthenticationContext, negotiateMessage, out challengeMessage);
  51. if (status != Win32Error.ERROR_SUCCESS)
  52. {
  53. return new ErrorResponse(request.CommandName, NTStatus.STATUS_LOGON_FAILURE);
  54. }
  55. if (isRawMessage)
  56. {
  57. response.SecurityBuffer = challengeMessage.GetBytes();
  58. }
  59. else
  60. {
  61. response.SecurityBuffer = GSSAPIHelper.GetGSSTokenResponseBytesFromNTLMSSPMessage(challengeMessage.GetBytes());
  62. }
  63. response.Header.Status = NTStatus.STATUS_MORE_PROCESSING_REQUIRED;
  64. }
  65. else // MessageTypeName.Authenticate
  66. {
  67. AuthenticateMessage authenticateMessage = new AuthenticateMessage(messageBytes);
  68. Win32Error loginStatus = securityProvider.Authenticate(state.AuthenticationContext, authenticateMessage);
  69. if (loginStatus != Win32Error.ERROR_SUCCESS)
  70. {
  71. state.LogToServer(Severity.Information, "User '{0}' failed authentication, Win32 error: {1}", authenticateMessage.UserName, loginStatus);
  72. NTStatus status = LogonHelper.ToNTStatus(loginStatus);
  73. return new ErrorResponse(request.CommandName, status);
  74. }
  75. bool? isGuest = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.IsGuest) as bool?;
  76. if (!isGuest.HasValue || !isGuest.Value)
  77. {
  78. state.LogToServer(Severity.Information, "User '{0}' authenticated successfully.", authenticateMessage.UserName);
  79. state.CreateSession(request.Header.SessionID, authenticateMessage.UserName, authenticateMessage.WorkStation);
  80. }
  81. else
  82. {
  83. state.LogToServer(Severity.Information, "User '{0}' failed authentication, logged in as guest.", authenticateMessage.UserName);
  84. state.CreateSession(request.Header.SessionID, "Guest", authenticateMessage.WorkStation);
  85. response.SessionFlags = SessionFlags.IsGuest;
  86. }
  87. if (!isRawMessage)
  88. {
  89. response.SecurityBuffer = GSSAPIHelper.GetGSSTokenAcceptCompletedResponse();
  90. }
  91. }
  92. return response;
  93. }
  94. }
  95. }