123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168 |
- /* Copyright (C) 2014-2017 Tal Aloni <tal.aloni.il@gmail.com>. All rights reserved.
- *
- * You can redistribute this program and/or modify it under the terms of
- * the GNU Lesser Public License as published by the Free Software Foundation,
- * either version 3 of the License, or (at your option) any later version.
- */
- using System;
- using System.Collections.Generic;
- using System.Text;
- using SMBLibrary.Authentication.GSSAPI;
- using SMBLibrary.Authentication.NTLM;
- using SMBLibrary.SMB1;
- using Utilities;
- namespace SMBLibrary.Server.SMB1
- {
- /// <summary>
- /// Session Setup helper
- /// </summary>
- internal class SessionSetupHelper
- {
- internal static SMB1Command GetSessionSetupResponse(SMB1Header header, SessionSetupAndXRequest request, GSSProvider securityProvider, SMB1ConnectionState state)
- {
- SessionSetupAndXResponse response = new SessionSetupAndXResponse();
- // The PrimaryDomain field in the request is used to determine with domain controller should authenticate the user credentials,
- // However, the domain controller itself does not use this field.
- // See: http://msdn.microsoft.com/en-us/library/windows/desktop/aa378749%28v=vs.85%29.aspx
- AuthenticateMessage message = CreateAuthenticateMessage(request.AccountName, request.OEMPassword, request.UnicodePassword);
- header.Status = securityProvider.NTLMAuthenticate(state.AuthenticationContext, message);
- if (header.Status != NTStatus.STATUS_SUCCESS)
- {
- state.LogToServer(Severity.Information, "Session Setup: User '{0}' failed authentication (Domain: '{1}', OS: '{2}'), NTStatus: {3}", request.AccountName, request.PrimaryDomain, request.NativeOS, header.Status);
- return new ErrorResponse(request.CommandName);
- }
- string osVersion = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.OSVersion) as string;
- byte[] sessionKey = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.SessionKey) as byte[];
- object accessToken = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.AccessToken);
- bool? isGuest = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.IsGuest) as bool?;
- SMB1Session session;
- if (!isGuest.HasValue || !isGuest.Value)
- {
- state.LogToServer(Severity.Information, "Session Setup: User '{0}' authenticated successfully (Domain: '{1}', Workstation: '{2}', OS version: '{3}').", message.UserName, message.DomainName, message.WorkStation, osVersion);
- session = state.CreateSession(message.UserName, message.WorkStation, sessionKey, accessToken);
- }
- else
- {
- state.LogToServer(Severity.Information, "Session Setup: User '{0}' failed authentication (Domain: '{1}', Workstation: '{2}', OS version: '{3}'), logged in as guest.", message.UserName, message.DomainName, message.WorkStation, osVersion);
- session = state.CreateSession("Guest", message.WorkStation, sessionKey, accessToken);
- response.Action = SessionSetupAction.SetupGuest;
- }
- if (session == null)
- {
- header.Status = NTStatus.STATUS_TOO_MANY_SESSIONS;
- return new ErrorResponse(request.CommandName);
- }
- header.UID = session.UserID;
- response.PrimaryDomain = request.PrimaryDomain;
- if ((request.Capabilities & Capabilities.LargeRead) > 0)
- {
- state.LargeRead = true;
- }
- if ((request.Capabilities & Capabilities.LargeWrite) > 0)
- {
- state.LargeWrite = true;
- }
- response.NativeOS = String.Empty; // "Windows Server 2003 3790 Service Pack 2"
- response.NativeLanMan = String.Empty; // "Windows Server 2003 5.2"
- return response;
- }
- internal static SMB1Command GetSessionSetupResponseExtended(SMB1Header header, SessionSetupAndXRequestExtended request, GSSProvider securityProvider, SMB1ConnectionState state)
- {
- SessionSetupAndXResponseExtended response = new SessionSetupAndXResponseExtended();
- // [MS-SMB] The Windows GSS implementation supports raw Kerberos / NTLM messages in the SecurityBlob
- byte[] outputToken;
- NTStatus status = securityProvider.AcceptSecurityContext(ref state.AuthenticationContext, request.SecurityBlob, out outputToken);
- if (status != NTStatus.STATUS_SUCCESS && status != NTStatus.SEC_I_CONTINUE_NEEDED)
- {
- string userName = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.UserName) as string;
- string domainName = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.DomainName) as string;
- string machineName = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.MachineName) as string;
- string osVersion = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.OSVersion) as string;
- state.LogToServer(Severity.Information, "Session Setup: User '{0}' failed authentication (Domain: '{1}', Workstation: '{2}', OS version: '{3}'), NTStatus: {4}", userName, domainName, machineName, osVersion, status);
- header.Status = status;
- return new ErrorResponse(request.CommandName);
- }
- if (outputToken != null)
- {
- response.SecurityBlob = outputToken;
- }
- // According to [MS-SMB] 3.3.5.3, a UID MUST be allocated if the server returns STATUS_MORE_PROCESSING_REQUIRED
- if (header.UID == 0)
- {
- ushort? userID = state.AllocateUserID();
- if (!userID.HasValue)
- {
- header.Status = NTStatus.STATUS_TOO_MANY_SESSIONS;
- return new ErrorResponse(request.CommandName);
- }
- header.UID = userID.Value;
- }
- if (status == NTStatus.SEC_I_CONTINUE_NEEDED)
- {
- header.Status = NTStatus.STATUS_MORE_PROCESSING_REQUIRED;
- }
- else // header.Status == NTStatus.STATUS_SUCCESS
- {
- string userName = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.UserName) as string;
- string domainName = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.DomainName) as string;
- string machineName = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.MachineName) as string;
- string osVersion = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.OSVersion) as string;
- byte[] sessionKey = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.SessionKey) as byte[];
- object accessToken = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.AccessToken);
- bool? isGuest = securityProvider.GetContextAttribute(state.AuthenticationContext, GSSAttributeName.IsGuest) as bool?;
- if (!isGuest.HasValue || !isGuest.Value)
- {
- state.LogToServer(Severity.Information, "Session Setup: User '{0}' authenticated successfully (Domain: '{1}', Workstation: '{2}', OS version: '{3}').", userName, domainName, machineName, osVersion);
- state.CreateSession(header.UID, userName, machineName, sessionKey, accessToken);
- }
- else
- {
- state.LogToServer(Severity.Information, "Session Setup: User '{0}' failed authentication (Domain: '{1}', Workstation: '{2}', OS version: '{3}'), logged in as guest.", userName, domainName, machineName, osVersion);
- state.CreateSession(header.UID, "Guest", machineName, sessionKey, accessToken);
- response.Action = SessionSetupAction.SetupGuest;
- }
- }
- response.NativeOS = String.Empty; // "Windows Server 2003 3790 Service Pack 2"
- response.NativeLanMan = String.Empty; // "Windows Server 2003 5.2"
- return response;
- }
- private static AuthenticateMessage CreateAuthenticateMessage(string accountNameToAuth, byte[] lmChallengeResponse, byte[] ntChallengeResponse)
- {
- AuthenticateMessage authenticateMessage = new AuthenticateMessage();
- authenticateMessage.NegotiateFlags = NegotiateFlags.UnicodeEncoding |
- NegotiateFlags.OEMEncoding |
- NegotiateFlags.Sign |
- NegotiateFlags.NTLMSessionSecurity |
- NegotiateFlags.AlwaysSign |
- NegotiateFlags.Version |
- NegotiateFlags.Use128BitEncryption |
- NegotiateFlags.Use56BitEncryption;
- if (AuthenticationMessageUtils.IsNTLMv1ExtendedSessionSecurity(lmChallengeResponse) ||
- AuthenticationMessageUtils.IsNTLMv2NTResponse(ntChallengeResponse))
- {
- authenticateMessage.NegotiateFlags |= NegotiateFlags.ExtendedSessionSecurity;
- }
- else
- {
- authenticateMessage.NegotiateFlags |= NegotiateFlags.LanManagerSessionKey;
- }
- authenticateMessage.UserName = accountNameToAuth;
- authenticateMessage.LmChallengeResponse = lmChallengeResponse;
- authenticateMessage.NtChallengeResponse = ntChallengeResponse;
- authenticateMessage.Version = NTLMVersion.Server2003;
- return authenticateMessage;
- }
- }
- }
|