GSSProvider.cs 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248
  1. /* Copyright (C) 2017 Tal Aloni <tal.aloni.il@gmail.com>. All rights reserved.
  2. *
  3. * You can redistribute this program and/or modify it under the terms of
  4. * the GNU Lesser Public License as published by the Free Software Foundation,
  5. * either version 3 of the License, or (at your option) any later version.
  6. */
  7. using System;
  8. using System.Collections.Generic;
  9. using SMBLibrary.Authentication.NTLM;
  10. using Utilities;
  11. namespace SMBLibrary.Authentication.GSSAPI
  12. {
  13. public class GSSContext
  14. {
  15. internal IGSSMechanism Mechanism;
  16. internal object MechanismContext;
  17. internal GSSContext(IGSSMechanism mechanism, object mechanismContext)
  18. {
  19. Mechanism = mechanism;
  20. MechanismContext = mechanismContext;
  21. }
  22. }
  23. public class GSSProvider
  24. {
  25. public static readonly byte[] NTLMSSPIdentifier = new byte[] { 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x02, 0x02, 0x0a };
  26. private List<IGSSMechanism> m_mechanisms;
  27. public GSSProvider(IGSSMechanism mechanism)
  28. {
  29. m_mechanisms = new List<IGSSMechanism>();
  30. m_mechanisms.Add(mechanism);
  31. }
  32. public GSSProvider(List<IGSSMechanism> mechanisms)
  33. {
  34. m_mechanisms = mechanisms;
  35. }
  36. public byte[] GetSPNEGOTokenInitBytes()
  37. {
  38. SimpleProtectedNegotiationTokenInit token = new SimpleProtectedNegotiationTokenInit();
  39. token.MechanismTypeList = new List<byte[]>();
  40. foreach (IGSSMechanism mechanism in m_mechanisms)
  41. {
  42. token.MechanismTypeList.Add(mechanism.Identifier);
  43. }
  44. return SimpleProtectedNegotiationToken.GetTokenBytes(token);
  45. }
  46. public virtual NTStatus AcceptSecurityContext(ref GSSContext context, byte[] inputToken, out byte[] outputToken)
  47. {
  48. outputToken = null;
  49. SimpleProtectedNegotiationToken spnegoToken = SimpleProtectedNegotiationToken.ReadToken(inputToken, 0);
  50. if (spnegoToken != null)
  51. {
  52. if (spnegoToken is SimpleProtectedNegotiationTokenInit)
  53. {
  54. SimpleProtectedNegotiationTokenInit tokenInit = (SimpleProtectedNegotiationTokenInit)spnegoToken;
  55. if (tokenInit.MechanismTypeList.Count == 0)
  56. {
  57. return NTStatus.SEC_E_INVALID_TOKEN;
  58. }
  59. // RFC 4178: Note that in order to avoid an extra round trip, the first context establishment token
  60. // of the initiator's preferred mechanism SHOULD be embedded in the initial negotiation message.
  61. byte[] preferredMechanism = tokenInit.MechanismTypeList[0];
  62. IGSSMechanism mechanism = FindMechanism(preferredMechanism);
  63. bool isPreferredMechanism = (mechanism != null);
  64. if (!isPreferredMechanism)
  65. {
  66. mechanism = FindMechanism(tokenInit.MechanismTypeList);
  67. }
  68. if (mechanism != null)
  69. {
  70. NTStatus status;
  71. context = new GSSContext(mechanism, null);
  72. if (isPreferredMechanism)
  73. {
  74. byte[] mechanismOutput;
  75. status = mechanism.AcceptSecurityContext(ref context.MechanismContext, tokenInit.MechanismToken, out mechanismOutput);
  76. outputToken = GetSPNEGOTokenResponseBytes(mechanismOutput, status, mechanism.Identifier);
  77. }
  78. else
  79. {
  80. status = NTStatus.SEC_I_CONTINUE_NEEDED;
  81. outputToken = GetSPNEGOTokenResponseBytes(null, status, mechanism.Identifier);
  82. }
  83. return status;
  84. }
  85. return NTStatus.SEC_E_SECPKG_NOT_FOUND;
  86. }
  87. else // SimpleProtectedNegotiationTokenResponse
  88. {
  89. if (context == null)
  90. {
  91. return NTStatus.SEC_E_INVALID_TOKEN;
  92. }
  93. IGSSMechanism mechanism = context.Mechanism;
  94. SimpleProtectedNegotiationTokenResponse tokenResponse = (SimpleProtectedNegotiationTokenResponse)spnegoToken;
  95. byte[] mechanismOutput;
  96. NTStatus status = mechanism.AcceptSecurityContext(ref context.MechanismContext, tokenResponse.ResponseToken, out mechanismOutput);
  97. outputToken = GetSPNEGOTokenResponseBytes(mechanismOutput, status, null);
  98. return status;
  99. }
  100. }
  101. else
  102. {
  103. // [MS-SMB] The Windows GSS implementation supports raw Kerberos / NTLM messages in the SecurityBlob.
  104. // [MS-SMB2] Windows [..] will also accept raw Kerberos messages and implicit NTLM messages as part of GSS authentication.
  105. if (AuthenticationMessageUtils.IsSignatureValid(inputToken))
  106. {
  107. MessageTypeName messageType = AuthenticationMessageUtils.GetMessageType(inputToken);
  108. IGSSMechanism ntlmAuthenticationProvider = FindMechanism(NTLMSSPIdentifier);
  109. if (ntlmAuthenticationProvider != null)
  110. {
  111. if (messageType == MessageTypeName.Negotiate)
  112. {
  113. context = new GSSContext(ntlmAuthenticationProvider, null);
  114. }
  115. if (context == null)
  116. {
  117. return NTStatus.SEC_E_INVALID_TOKEN;
  118. }
  119. NTStatus status = ntlmAuthenticationProvider.AcceptSecurityContext(ref context.MechanismContext, inputToken, out outputToken);
  120. return status;
  121. }
  122. else
  123. {
  124. return NTStatus.SEC_E_SECPKG_NOT_FOUND;
  125. }
  126. }
  127. }
  128. return NTStatus.SEC_E_INVALID_TOKEN;
  129. }
  130. public virtual object GetContextAttribute(GSSContext context, GSSAttributeName attributeName)
  131. {
  132. if (context == null)
  133. {
  134. return null;
  135. }
  136. IGSSMechanism mechanism = context.Mechanism;
  137. return mechanism.GetContextAttribute(context.MechanismContext, attributeName);
  138. }
  139. public virtual bool DeleteSecurityContext(ref GSSContext context)
  140. {
  141. if (context != null)
  142. {
  143. IGSSMechanism mechanism = context.Mechanism;
  144. return mechanism.DeleteSecurityContext(ref context.MechanismContext);
  145. }
  146. return false;
  147. }
  148. /// <summary>
  149. /// Helper method for legacy implementation.
  150. /// </summary>
  151. public virtual NTStatus GetNTLMChallengeMessage(out GSSContext context, NegotiateMessage negotiateMessage, out ChallengeMessage challengeMessage)
  152. {
  153. IGSSMechanism ntlmAuthenticationProvider = FindMechanism(NTLMSSPIdentifier);
  154. if (ntlmAuthenticationProvider != null)
  155. {
  156. context = new GSSContext(ntlmAuthenticationProvider, null);
  157. byte[] outputToken;
  158. NTStatus result = ntlmAuthenticationProvider.AcceptSecurityContext(ref context.MechanismContext, negotiateMessage.GetBytes(), out outputToken);
  159. challengeMessage = new ChallengeMessage(outputToken);
  160. return result;
  161. }
  162. else
  163. {
  164. context = null;
  165. challengeMessage = null;
  166. return NTStatus.SEC_E_SECPKG_NOT_FOUND;
  167. }
  168. }
  169. /// <summary>
  170. /// Helper method for legacy implementation.
  171. /// </summary>
  172. public virtual NTStatus NTLMAuthenticate(GSSContext context, AuthenticateMessage authenticateMessage)
  173. {
  174. if (context != null && ByteUtils.AreByteArraysEqual(context.Mechanism.Identifier, NTLMSSPIdentifier))
  175. {
  176. IGSSMechanism mechanism = context.Mechanism;
  177. byte[] outputToken;
  178. NTStatus result = mechanism.AcceptSecurityContext(ref context.MechanismContext, authenticateMessage.GetBytes(), out outputToken);
  179. return result;
  180. }
  181. else
  182. {
  183. return NTStatus.SEC_E_SECPKG_NOT_FOUND;
  184. }
  185. }
  186. public IGSSMechanism FindMechanism(List<byte[]> mechanismIdentifiers)
  187. {
  188. foreach (byte[] identifier in mechanismIdentifiers)
  189. {
  190. IGSSMechanism mechanism = FindMechanism(identifier);
  191. if (mechanism != null)
  192. {
  193. return mechanism;
  194. }
  195. }
  196. return null;
  197. }
  198. public IGSSMechanism FindMechanism(byte[] mechanismIdentifier)
  199. {
  200. foreach (IGSSMechanism mechanism in m_mechanisms)
  201. {
  202. if (ByteUtils.AreByteArraysEqual(mechanism.Identifier, mechanismIdentifier))
  203. {
  204. return mechanism;
  205. }
  206. }
  207. return null;
  208. }
  209. private static byte[] GetSPNEGOTokenResponseBytes(byte[] mechanismOutput, NTStatus status, byte[] mechanismIdentifier)
  210. {
  211. SimpleProtectedNegotiationTokenResponse tokenResponse = new SimpleProtectedNegotiationTokenResponse();
  212. if (status == NTStatus.STATUS_SUCCESS)
  213. {
  214. tokenResponse.NegState = NegState.AcceptCompleted;
  215. }
  216. else if (status == NTStatus.SEC_I_CONTINUE_NEEDED)
  217. {
  218. tokenResponse.NegState = NegState.AcceptIncomplete;
  219. }
  220. else
  221. {
  222. tokenResponse.NegState = NegState.Reject;
  223. }
  224. tokenResponse.SupportedMechanism = mechanismIdentifier;
  225. tokenResponse.ResponseToken = mechanismOutput;
  226. return tokenResponse.GetBytes();
  227. }
  228. }
  229. }