SMB1Client.cs 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419
  1. /* Copyright (C) 2014-2017 Tal Aloni <tal.aloni.il@gmail.com>. All rights reserved.
  2. *
  3. * You can redistribute this program and/or modify it under the terms of
  4. * the GNU Lesser Public License as published by the Free Software Foundation,
  5. * either version 3 of the License, or (at your option) any later version.
  6. */
  7. using System;
  8. using System.Collections.Generic;
  9. using System.Diagnostics;
  10. using System.Net;
  11. using System.Net.Sockets;
  12. using System.Threading;
  13. using SMBLibrary.Authentication.NTLM;
  14. using SMBLibrary.NetBios;
  15. using SMBLibrary.SMB1;
  16. using Utilities;
  17. namespace SMBLibrary.Client
  18. {
  19. public class SMB1Client
  20. {
  21. public const int NetBiosOverTCPPort = 139;
  22. public const int DirectTCPPort = 445;
  23. public const string NTLanManagerDialect = "NT LM 0.12";
  24. public const int MaxBufferSize = 65535; // Valid range: 512 - 65535
  25. public const int MaxMpxCount = 1;
  26. private SMBTransportType m_transport;
  27. private bool m_isConnected;
  28. private Socket m_clientSocket;
  29. private IAsyncResult m_currentAsyncResult;
  30. private bool m_forceExtendedSecurity;
  31. private object m_incomingQueueLock = new object();
  32. private List<SMB1Message> m_incomingQueue = new List<SMB1Message>();
  33. private EventWaitHandle m_incomingQueueEventHandle = new EventWaitHandle(false, EventResetMode.AutoReset);
  34. private ushort m_userID;
  35. private byte[] m_serverChallenge;
  36. private byte[] m_securityBlob;
  37. private byte[] m_sessionKey;
  38. public SMB1Client()
  39. {
  40. }
  41. public bool Connect(IPAddress serverAddress, SMBTransportType transport)
  42. {
  43. return Connect(serverAddress, transport, true);
  44. }
  45. public bool Connect(IPAddress serverAddress, SMBTransportType transport, bool forceExtendedSecurity)
  46. {
  47. m_transport = transport;
  48. if (!m_isConnected)
  49. {
  50. m_forceExtendedSecurity = forceExtendedSecurity;
  51. m_clientSocket = new Socket(AddressFamily.InterNetwork, SocketType.Stream, ProtocolType.Tcp);
  52. int port;
  53. if (transport == SMBTransportType.DirectTCPTransport)
  54. {
  55. port = DirectTCPPort;
  56. }
  57. else
  58. {
  59. port = NetBiosOverTCPPort;
  60. }
  61. try
  62. {
  63. m_clientSocket.Connect(serverAddress, port);
  64. }
  65. catch (SocketException)
  66. {
  67. return false;
  68. }
  69. ConnectionState state = new ConnectionState();
  70. NBTConnectionReceiveBuffer buffer = state.ReceiveBuffer;
  71. m_currentAsyncResult = m_clientSocket.BeginReceive(buffer.Buffer, buffer.WriteOffset, buffer.AvailableLength, SocketFlags.None, new AsyncCallback(OnServerSocketReceive), state);
  72. bool supportsCIFS = NegotiateNTLanManagerDialect(m_forceExtendedSecurity);
  73. if (!supportsCIFS)
  74. {
  75. m_clientSocket.Close();
  76. }
  77. else
  78. {
  79. m_isConnected = true;
  80. }
  81. }
  82. return m_isConnected;
  83. }
  84. public void Disconnect()
  85. {
  86. if (m_isConnected)
  87. {
  88. m_clientSocket.Disconnect(false);
  89. m_isConnected = false;
  90. }
  91. }
  92. private bool NegotiateNTLanManagerDialect(bool forceExtendedSecurity)
  93. {
  94. if (m_transport == SMBTransportType.NetBiosOverTCP)
  95. {
  96. SessionRequestPacket sessionRequest = new SessionRequestPacket();
  97. sessionRequest.CalledName = NetBiosUtils.GetMSNetBiosName("*SMBSERVER", NetBiosSuffix.FileServiceService); ;
  98. sessionRequest.CallingName = NetBiosUtils.GetMSNetBiosName(Environment.MachineName, NetBiosSuffix.WorkstationService);
  99. TrySendPacket(m_clientSocket, sessionRequest);
  100. }
  101. NegotiateRequest request = new NegotiateRequest();
  102. request.Dialects.Add(NTLanManagerDialect);
  103. TrySendMessage(request);
  104. SMB1Message reply = WaitForMessage(CommandName.SMB_COM_NEGOTIATE);
  105. if (reply == null)
  106. {
  107. return false;
  108. }
  109. if (reply.Commands[0] is NegotiateResponse && !forceExtendedSecurity)
  110. {
  111. NegotiateResponse response = (NegotiateResponse)reply.Commands[0];
  112. m_serverChallenge = response.Challenge;
  113. return true;
  114. }
  115. else if (reply.Commands[0] is NegotiateResponseExtended)
  116. {
  117. NegotiateResponseExtended response = (NegotiateResponseExtended)reply.Commands[0];
  118. m_securityBlob = response.SecurityBlob;
  119. return true;
  120. }
  121. else
  122. {
  123. return false;
  124. }
  125. }
  126. public NTStatus Login(string domainName, string userName, string password)
  127. {
  128. return Login(domainName, userName, password, AuthenticationMethod.NTLMv2);
  129. }
  130. public NTStatus Login(string domainName, string userName, string password, AuthenticationMethod authenticationMethod)
  131. {
  132. if (!m_isConnected)
  133. {
  134. throw new InvalidOperationException("A connection must be successfully established before attempting login");
  135. }
  136. if (m_serverChallenge != null)
  137. {
  138. SessionSetupAndXRequest request = new SessionSetupAndXRequest();
  139. request.MaxBufferSize = MaxBufferSize;
  140. request.MaxMpxCount = MaxMpxCount;
  141. request.Capabilities = Capabilities.Unicode | Capabilities.NTStatusCode;
  142. request.AccountName = userName;
  143. request.PrimaryDomain = domainName;
  144. byte[] clientChallenge = new byte[8];
  145. new Random().NextBytes(clientChallenge);
  146. if (authenticationMethod == AuthenticationMethod.NTLMv1)
  147. {
  148. request.OEMPassword = NTLMCryptography.ComputeLMv1Response(m_serverChallenge, password);
  149. request.UnicodePassword = NTLMCryptography.ComputeNTLMv1Response(m_serverChallenge, password);
  150. }
  151. else if (authenticationMethod == AuthenticationMethod.NTLMv1ExtendedSessionSecurity)
  152. {
  153. // [MS-CIFS] CIFS does not support Extended Session Security because there is no mechanism in CIFS to negotiate Extended Session Security
  154. throw new ArgumentException("SMB Extended Security must be negotiated in order for NTLMv1 Extended Session Security to be used");
  155. }
  156. else // NTLMv2
  157. {
  158. // Note: NTLMv2 over non-extended security session setup is not supported under Windows Vista and later which will return STATUS_INVALID_PARAMETER.
  159. // https://msdn.microsoft.com/en-us/library/ee441701.aspx
  160. // https://msdn.microsoft.com/en-us/library/cc236700.aspx
  161. request.OEMPassword = NTLMCryptography.ComputeLMv2Response(m_serverChallenge, clientChallenge, password, userName, domainName);
  162. NTLMv2ClientChallenge clientChallengeStructure = new NTLMv2ClientChallenge(DateTime.UtcNow, clientChallenge, AVPairUtils.GetAVPairSequence(domainName, Environment.MachineName));
  163. byte[] temp = clientChallengeStructure.GetBytesPadded();
  164. byte[] proofStr = NTLMCryptography.ComputeNTLMv2Proof(m_serverChallenge, temp, password, userName, domainName);
  165. request.UnicodePassword = ByteUtils.Concatenate(proofStr, temp);
  166. }
  167. TrySendMessage(request);
  168. SMB1Message reply = WaitForMessage(CommandName.SMB_COM_SESSION_SETUP_ANDX);
  169. if (reply != null)
  170. {
  171. return reply.Header.Status;
  172. }
  173. return NTStatus.STATUS_INVALID_SMB;
  174. }
  175. else // m_securityBlob != null
  176. {
  177. SessionSetupAndXRequestExtended request = new SessionSetupAndXRequestExtended();
  178. request.MaxBufferSize = MaxBufferSize;
  179. request.MaxMpxCount = MaxMpxCount;
  180. request.Capabilities = Capabilities.Unicode | Capabilities.NTStatusCode;
  181. request.SecurityBlob = NTLMAuthenticationHelper.GetNegotiateMessage(m_securityBlob, domainName, authenticationMethod);
  182. TrySendMessage(request);
  183. SMB1Message reply = WaitForMessage(CommandName.SMB_COM_SESSION_SETUP_ANDX);
  184. if (reply != null)
  185. {
  186. if (reply.Header.Status == NTStatus.STATUS_MORE_PROCESSING_REQUIRED && reply.Commands[0] is SessionSetupAndXResponseExtended)
  187. {
  188. SessionSetupAndXResponseExtended response = (SessionSetupAndXResponseExtended)reply.Commands[0];
  189. m_userID = reply.Header.UID;
  190. request = new SessionSetupAndXRequestExtended();
  191. request.MaxBufferSize = MaxBufferSize;
  192. request.MaxMpxCount = MaxMpxCount;
  193. request.Capabilities = Capabilities.Unicode | Capabilities.NTStatusCode | Capabilities.ExtendedSecurity;
  194. request.SecurityBlob = NTLMAuthenticationHelper.GetAuthenticateMessage(response.SecurityBlob, domainName, userName, password, authenticationMethod, out m_sessionKey);
  195. TrySendMessage(request);
  196. reply = WaitForMessage(CommandName.SMB_COM_SESSION_SETUP_ANDX);
  197. if (reply != null)
  198. {
  199. return reply.Header.Status;
  200. }
  201. }
  202. else
  203. {
  204. return reply.Header.Status;
  205. }
  206. }
  207. return NTStatus.STATUS_INVALID_SMB;
  208. }
  209. }
  210. private void OnServerSocketReceive(IAsyncResult ar)
  211. {
  212. if (ar != m_currentAsyncResult)
  213. {
  214. // We ignore calls for old sockets which we no longer use
  215. // See: http://rajputyh.blogspot.co.il/2010/04/solve-exception-message-iasyncresult.html
  216. return;
  217. }
  218. ConnectionState state = (ConnectionState)ar.AsyncState;
  219. if (!m_clientSocket.Connected)
  220. {
  221. return;
  222. }
  223. int numberOfBytesReceived = 0;
  224. try
  225. {
  226. numberOfBytesReceived = m_clientSocket.EndReceive(ar);
  227. }
  228. catch (ObjectDisposedException)
  229. {
  230. Log("[ReceiveCallback] EndReceive ObjectDisposedException");
  231. return;
  232. }
  233. catch (SocketException ex)
  234. {
  235. Log("[ReceiveCallback] EndReceive SocketException: " + ex.Message);
  236. return;
  237. }
  238. if (numberOfBytesReceived == 0)
  239. {
  240. m_isConnected = false;
  241. }
  242. else
  243. {
  244. NBTConnectionReceiveBuffer buffer = state.ReceiveBuffer;
  245. buffer.SetNumberOfBytesReceived(numberOfBytesReceived);
  246. ProcessConnectionBuffer(state);
  247. try
  248. {
  249. m_currentAsyncResult = m_clientSocket.BeginReceive(buffer.Buffer, buffer.WriteOffset, buffer.AvailableLength, SocketFlags.None, new AsyncCallback(OnServerSocketReceive), state);
  250. }
  251. catch (ObjectDisposedException)
  252. {
  253. m_isConnected = false;
  254. Log("[ReceiveCallback] BeginReceive ObjectDisposedException");
  255. }
  256. catch (SocketException ex)
  257. {
  258. m_isConnected = false;
  259. Log("[ReceiveCallback] BeginReceive SocketException: " + ex.Message);
  260. }
  261. }
  262. }
  263. private void ProcessConnectionBuffer(ConnectionState state)
  264. {
  265. NBTConnectionReceiveBuffer receiveBuffer = state.ReceiveBuffer;
  266. while (receiveBuffer.HasCompletePacket())
  267. {
  268. SessionPacket packet = null;
  269. try
  270. {
  271. packet = receiveBuffer.DequeuePacket();
  272. }
  273. catch (Exception)
  274. {
  275. m_clientSocket.Close();
  276. break;
  277. }
  278. if (packet != null)
  279. {
  280. ProcessPacket(packet, state);
  281. }
  282. }
  283. }
  284. private void ProcessPacket(SessionPacket packet, ConnectionState state)
  285. {
  286. if (packet is SessionKeepAlivePacket && m_transport == SMBTransportType.NetBiosOverTCP)
  287. {
  288. // [RFC 1001] NetBIOS session keep alives do not require a response from the NetBIOS peer
  289. }
  290. else if (packet is PositiveSessionResponsePacket && m_transport == SMBTransportType.NetBiosOverTCP)
  291. {
  292. }
  293. else if (packet is NegativeSessionResponsePacket && m_transport == SMBTransportType.NetBiosOverTCP)
  294. {
  295. m_clientSocket.Close();
  296. m_isConnected = false;
  297. }
  298. else if (packet is SessionMessagePacket)
  299. {
  300. SMB1Message message;
  301. try
  302. {
  303. message = SMB1Message.GetSMB1Message(packet.Trailer);
  304. }
  305. catch (Exception ex)
  306. {
  307. Log("Invalid SMB1 message: " + ex.Message);
  308. m_clientSocket.Close();
  309. m_isConnected = false;
  310. return;
  311. }
  312. lock (m_incomingQueueLock)
  313. {
  314. m_incomingQueue.Add(message);
  315. m_incomingQueueEventHandle.Set();
  316. }
  317. }
  318. }
  319. internal SMB1Message WaitForMessage(CommandName commandName)
  320. {
  321. const int TimeOut = 5000;
  322. Stopwatch stopwatch = new Stopwatch();
  323. stopwatch.Start();
  324. while (stopwatch.ElapsedMilliseconds < TimeOut)
  325. {
  326. lock (m_incomingQueueLock)
  327. {
  328. for (int index = 0; index < m_incomingQueue.Count; index++)
  329. {
  330. SMB1Message message = m_incomingQueue[index];
  331. if (message.Commands[0].CommandName == commandName)
  332. {
  333. m_incomingQueue.RemoveAt(index);
  334. return message;
  335. }
  336. }
  337. }
  338. m_incomingQueueEventHandle.WaitOne(100);
  339. }
  340. return null;
  341. }
  342. private void Log(string message)
  343. {
  344. System.Diagnostics.Debug.Print(message);
  345. }
  346. internal void TrySendMessage(SMB1Command request)
  347. {
  348. TrySendMessage(request, 0);
  349. }
  350. internal void TrySendMessage(SMB1Command request, ushort treeID)
  351. {
  352. SMB1Message message = new SMB1Message();
  353. message.Header.UnicodeFlag = true;
  354. message.Header.ExtendedSecurityFlag = m_forceExtendedSecurity;
  355. message.Header.Flags2 |= HeaderFlags2.LongNamesAllowed | HeaderFlags2.LongNameUsed | HeaderFlags2.NTStatusCode;
  356. message.Header.UID = m_userID;
  357. message.Header.TID = treeID;
  358. message.Commands.Add(request);
  359. TrySendMessage(m_clientSocket, message);
  360. }
  361. public static void TrySendMessage(Socket socket, SMB1Message message)
  362. {
  363. SessionMessagePacket packet = new SessionMessagePacket();
  364. packet.Trailer = message.GetBytes();
  365. TrySendPacket(socket, packet);
  366. }
  367. public static void TrySendPacket(Socket socket, SessionPacket response)
  368. {
  369. try
  370. {
  371. socket.Send(response.GetBytes());
  372. }
  373. catch (SocketException)
  374. {
  375. }
  376. catch (ObjectDisposedException)
  377. {
  378. }
  379. }
  380. }
  381. }