IndependentNTLMAuthenticationProvider.cs 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332
  1. /* Copyright (C) 2014-2017 Tal Aloni <tal.aloni.il@gmail.com>. All rights reserved.
  2. *
  3. * You can redistribute this program and/or modify it under the terms of
  4. * the GNU Lesser Public License as published by the Free Software Foundation,
  5. * either version 3 of the License, or (at your option) any later version.
  6. */
  7. using System;
  8. using System.Collections.Generic;
  9. using System.Security.Cryptography;
  10. using SMBLibrary.Authentication.GSSAPI;
  11. using Utilities;
  12. namespace SMBLibrary.Authentication.NTLM
  13. {
  14. public delegate string GetUserPassword(string userName);
  15. public class IndependentNTLMAuthenticationProvider : NTLMAuthenticationProviderBase
  16. {
  17. public class AuthContext
  18. {
  19. public byte[] ServerChallenge;
  20. public string DomainName;
  21. public string UserName;
  22. public string WorkStation;
  23. public string OSVersion;
  24. public byte[] SessionKey;
  25. public bool IsGuest;
  26. public AuthContext(byte[] serverChallenge)
  27. {
  28. ServerChallenge = serverChallenge;
  29. }
  30. }
  31. private GetUserPassword m_GetUserPassword;
  32. /// <param name="getUserPassword">
  33. /// The NTLM challenge response will be compared against the provided password.
  34. /// </param>
  35. public IndependentNTLMAuthenticationProvider(GetUserPassword getUserPassword)
  36. {
  37. m_GetUserPassword = getUserPassword;
  38. }
  39. public override NTStatus GetChallengeMessage(out object context, NegotiateMessage negotiateMessage, out ChallengeMessage challengeMessage)
  40. {
  41. byte[] serverChallenge = GenerateServerChallenge();
  42. context = new AuthContext(serverChallenge);
  43. challengeMessage = new ChallengeMessage();
  44. // https://msdn.microsoft.com/en-us/library/cc236691.aspx
  45. challengeMessage.NegotiateFlags = NegotiateFlags.TargetTypeServer |
  46. NegotiateFlags.TargetInfo |
  47. NegotiateFlags.TargetNameSupplied |
  48. NegotiateFlags.Version;
  49. // [MS-NLMP] NTLMSSP_NEGOTIATE_NTLM MUST be set in the [..] CHALLENGE_MESSAGE to the client.
  50. challengeMessage.NegotiateFlags |= NegotiateFlags.NTLMSessionSecurity;
  51. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.UnicodeEncoding) > 0)
  52. {
  53. challengeMessage.NegotiateFlags |= NegotiateFlags.UnicodeEncoding;
  54. }
  55. else if ((negotiateMessage.NegotiateFlags & NegotiateFlags.OEMEncoding) > 0)
  56. {
  57. challengeMessage.NegotiateFlags |= NegotiateFlags.OEMEncoding;
  58. }
  59. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.ExtendedSessionSecurity) > 0)
  60. {
  61. challengeMessage.NegotiateFlags |= NegotiateFlags.ExtendedSessionSecurity;
  62. }
  63. else if ((negotiateMessage.NegotiateFlags & NegotiateFlags.LanManagerKey) > 0)
  64. {
  65. challengeMessage.NegotiateFlags |= NegotiateFlags.LanManagerKey;
  66. }
  67. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.Sign) > 0)
  68. {
  69. // [MS-NLMP] If the client sends NTLMSSP_NEGOTIATE_SIGN to the server in the NEGOTIATE_MESSAGE,
  70. // the server MUST return NTLMSSP_NEGOTIATE_SIGN to the client in the CHALLENGE_MESSAGE.
  71. challengeMessage.NegotiateFlags |= NegotiateFlags.Sign;
  72. }
  73. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.Seal) > 0)
  74. {
  75. // [MS-NLMP] If the client sends NTLMSSP_NEGOTIATE_SEAL to the server in the NEGOTIATE_MESSAGE,
  76. // the server MUST return NTLMSSP_NEGOTIATE_SEAL to the client in the CHALLENGE_MESSAGE.
  77. challengeMessage.NegotiateFlags |= NegotiateFlags.Seal;
  78. }
  79. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.Sign) > 0 ||
  80. (negotiateMessage.NegotiateFlags & NegotiateFlags.Seal) > 0)
  81. {
  82. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.Use56BitEncryption) > 0)
  83. {
  84. // [MS-NLMP] If the client sends NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN with
  85. // NTLMSSP_NEGOTIATE_56 to the server in the NEGOTIATE_MESSAGE, the server MUST return
  86. // NTLMSSP_NEGOTIATE_56 to the client in the CHALLENGE_MESSAGE.
  87. challengeMessage.NegotiateFlags |= NegotiateFlags.Use56BitEncryption;
  88. }
  89. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.Use128BitEncryption) > 0)
  90. {
  91. // [MS-NLMP] If the client sends NTLMSSP_NEGOTIATE_128 to the server in the NEGOTIATE_MESSAGE,
  92. // the server MUST return NTLMSSP_NEGOTIATE_128 to the client in the CHALLENGE_MESSAGE only if
  93. // the client sets NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN.
  94. challengeMessage.NegotiateFlags |= NegotiateFlags.Use128BitEncryption;
  95. }
  96. }
  97. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.KeyExchange) > 0)
  98. {
  99. challengeMessage.NegotiateFlags |= NegotiateFlags.KeyExchange;
  100. }
  101. challengeMessage.TargetName = Environment.MachineName;
  102. challengeMessage.ServerChallenge = serverChallenge;
  103. challengeMessage.TargetInfo = AVPairUtils.GetAVPairSequence(Environment.MachineName, Environment.MachineName);
  104. challengeMessage.Version = NTLMVersion.Server2003;
  105. return NTStatus.SEC_I_CONTINUE_NEEDED;
  106. }
  107. public override NTStatus Authenticate(object context, AuthenticateMessage message)
  108. {
  109. AuthContext authContext = context as AuthContext;
  110. if (authContext == null)
  111. {
  112. // There are two possible reasons for authContext to be null:
  113. // 1. We have a bug in our implementation, let's assume that's not the case,
  114. // according to [MS-SMB2] 3.3.5.5.1 we aren't allowed to return SEC_E_INVALID_HANDLE anyway.
  115. // 2. The client sent AuthenticateMessage without sending NegotiateMessage first,
  116. // in this case the correct response is SEC_E_INVALID_TOKEN.
  117. return NTStatus.SEC_E_INVALID_TOKEN;
  118. }
  119. authContext.DomainName = message.DomainName;
  120. authContext.UserName = message.UserName;
  121. authContext.WorkStation = message.WorkStation;
  122. if (message.Version != null)
  123. {
  124. authContext.OSVersion = message.Version.ToString();
  125. }
  126. if ((message.NegotiateFlags & NegotiateFlags.Anonymous) > 0)
  127. {
  128. if (this.EnableGuestLogin)
  129. {
  130. authContext.IsGuest = true;
  131. return NTStatus.STATUS_SUCCESS;
  132. }
  133. else
  134. {
  135. return NTStatus.STATUS_LOGON_FAILURE;
  136. }
  137. }
  138. string password = m_GetUserPassword(message.UserName);
  139. if (password == null)
  140. {
  141. if (this.EnableGuestLogin)
  142. {
  143. authContext.IsGuest = true;
  144. return NTStatus.STATUS_SUCCESS;
  145. }
  146. else
  147. {
  148. return NTStatus.STATUS_LOGON_FAILURE;
  149. }
  150. }
  151. bool success;
  152. byte[] serverChallenge = authContext.ServerChallenge;
  153. byte[] sessionBaseKey;
  154. byte[] keyExchangeKey = null;
  155. if ((message.NegotiateFlags & NegotiateFlags.ExtendedSessionSecurity) > 0)
  156. {
  157. if (AuthenticationMessageUtils.IsNTLMv1ExtendedSecurity(message.LmChallengeResponse))
  158. {
  159. // NTLM v1 Extended Security:
  160. success = AuthenticateV1Extended(password, serverChallenge, message.LmChallengeResponse, message.NtChallengeResponse);
  161. if (success)
  162. {
  163. // https://msdn.microsoft.com/en-us/library/cc236699.aspx
  164. sessionBaseKey = new MD4().GetByteHashFromBytes(NTLMCryptography.NTOWFv1(password));
  165. byte[] lmowf = NTLMCryptography.LMOWFv1(password);
  166. keyExchangeKey = NTLMCryptography.KXKey(sessionBaseKey, message.NegotiateFlags, message.LmChallengeResponse, serverChallenge, lmowf);
  167. }
  168. }
  169. else
  170. {
  171. // NTLM v2:
  172. success = AuthenticateV2(message.DomainName, message.UserName, password, serverChallenge, message.LmChallengeResponse, message.NtChallengeResponse);
  173. if (success)
  174. {
  175. // https://msdn.microsoft.com/en-us/library/cc236700.aspx
  176. byte[] responseKeyNT = NTLMCryptography.NTOWFv2(password, message.UserName, message.DomainName);
  177. byte[] ntProofStr = ByteReader.ReadBytes(message.NtChallengeResponse, 0, 16);
  178. sessionBaseKey = new HMACMD5(responseKeyNT).ComputeHash(ntProofStr);
  179. keyExchangeKey = sessionBaseKey;
  180. }
  181. }
  182. }
  183. else
  184. {
  185. success = AuthenticateV1(password, serverChallenge, message.LmChallengeResponse, message.NtChallengeResponse);
  186. if (success)
  187. {
  188. // https://msdn.microsoft.com/en-us/library/cc236699.aspx
  189. sessionBaseKey = new MD4().GetByteHashFromBytes(NTLMCryptography.NTOWFv1(password));
  190. byte[] lmowf = NTLMCryptography.LMOWFv1(password);
  191. keyExchangeKey = NTLMCryptography.KXKey(sessionBaseKey, message.NegotiateFlags, message.LmChallengeResponse, serverChallenge, lmowf);
  192. }
  193. }
  194. if (success)
  195. {
  196. // https://msdn.microsoft.com/en-us/library/cc236676.aspx
  197. // https://blogs.msdn.microsoft.com/openspecification/2010/04/19/ntlm-keys-and-sundry-stuff/
  198. if ((message.NegotiateFlags & NegotiateFlags.KeyExchange) > 0)
  199. {
  200. authContext.SessionKey = RC4.Decrypt(keyExchangeKey, message.EncryptedRandomSessionKey);
  201. }
  202. else
  203. {
  204. authContext.SessionKey = keyExchangeKey;
  205. }
  206. return NTStatus.STATUS_SUCCESS;
  207. }
  208. else
  209. {
  210. return NTStatus.STATUS_LOGON_FAILURE;
  211. }
  212. }
  213. public override bool DeleteSecurityContext(ref object context)
  214. {
  215. context = null;
  216. return true;
  217. }
  218. public override object GetContextAttribute(object context, GSSAttributeName attributeName)
  219. {
  220. AuthContext authContext = context as AuthContext;
  221. if (authContext != null)
  222. {
  223. switch (attributeName)
  224. {
  225. case GSSAttributeName.DomainName:
  226. return authContext.DomainName;
  227. case GSSAttributeName.IsGuest:
  228. return authContext.IsGuest;
  229. case GSSAttributeName.MachineName:
  230. return authContext.WorkStation;
  231. case GSSAttributeName.OSVersion:
  232. return authContext.OSVersion;
  233. case GSSAttributeName.SessionKey:
  234. return authContext.SessionKey;
  235. case GSSAttributeName.UserName:
  236. return authContext.UserName;
  237. }
  238. }
  239. return null;
  240. }
  241. private bool EnableGuestLogin
  242. {
  243. get
  244. {
  245. return (m_GetUserPassword("Guest") == String.Empty);
  246. }
  247. }
  248. /// <summary>
  249. /// LM v1 / NTLM v1
  250. /// </summary>
  251. private static bool AuthenticateV1(string password, byte[] serverChallenge, byte[] lmResponse, byte[] ntResponse)
  252. {
  253. byte[] expectedLMResponse = NTLMCryptography.ComputeLMv1Response(serverChallenge, password);
  254. if (ByteUtils.AreByteArraysEqual(expectedLMResponse, lmResponse))
  255. {
  256. return true;
  257. }
  258. byte[] expectedNTResponse = NTLMCryptography.ComputeNTLMv1Response(serverChallenge, password);
  259. return ByteUtils.AreByteArraysEqual(expectedNTResponse, ntResponse);
  260. }
  261. /// <summary>
  262. /// LM v1 / NTLM v1 Extended Security
  263. /// </summary>
  264. private static bool AuthenticateV1Extended(string password, byte[] serverChallenge, byte[] lmResponse, byte[] ntResponse)
  265. {
  266. byte[] clientChallenge = ByteReader.ReadBytes(lmResponse, 0, 8);
  267. byte[] expectedNTLMv1Response = NTLMCryptography.ComputeNTLMv1ExtendedSecurityResponse(serverChallenge, clientChallenge, password);
  268. return ByteUtils.AreByteArraysEqual(expectedNTLMv1Response, ntResponse);
  269. }
  270. /// <summary>
  271. /// LM v2 / NTLM v2
  272. /// </summary>
  273. private bool AuthenticateV2(string domainName, string accountName, string password, byte[] serverChallenge, byte[] lmResponse, byte[] ntResponse)
  274. {
  275. byte[] _LMv2ClientChallenge = ByteReader.ReadBytes(lmResponse, 16, 8);
  276. byte[] expectedLMv2Response = NTLMCryptography.ComputeLMv2Response(serverChallenge, _LMv2ClientChallenge, password, accountName, domainName);
  277. if (ByteUtils.AreByteArraysEqual(expectedLMv2Response, lmResponse))
  278. {
  279. return true;
  280. }
  281. if (AuthenticationMessageUtils.IsNTLMv2NTResponse(ntResponse))
  282. {
  283. byte[] clientNTProof = ByteReader.ReadBytes(ntResponse, 0, 16);
  284. byte[] clientChallengeStructurePadded = ByteReader.ReadBytes(ntResponse, 16, ntResponse.Length - 16);
  285. byte[] expectedNTProof = NTLMCryptography.ComputeNTLMv2Proof(serverChallenge, clientChallengeStructurePadded, password, accountName, domainName);
  286. return ByteUtils.AreByteArraysEqual(clientNTProof, expectedNTProof);
  287. }
  288. return false;
  289. }
  290. /// <summary>
  291. /// Generate 8-byte server challenge
  292. /// </summary>
  293. private static byte[] GenerateServerChallenge()
  294. {
  295. byte[] serverChallenge = new byte[8];
  296. new Random().NextBytes(serverChallenge);
  297. return serverChallenge;
  298. }
  299. }
  300. }