IndependentNTLMAuthenticationProvider.cs 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318
  1. /* Copyright (C) 2014-2017 Tal Aloni <tal.aloni.il@gmail.com>. All rights reserved.
  2. *
  3. * You can redistribute this program and/or modify it under the terms of
  4. * the GNU Lesser Public License as published by the Free Software Foundation,
  5. * either version 3 of the License, or (at your option) any later version.
  6. */
  7. using System;
  8. using System.Collections.Generic;
  9. using System.Security.Cryptography;
  10. using SMBLibrary.Authentication.GSSAPI;
  11. using Utilities;
  12. namespace SMBLibrary.Authentication.NTLM
  13. {
  14. public delegate string GetUserPassword(string userName);
  15. public class IndependentNTLMAuthenticationProvider : NTLMAuthenticationProviderBase
  16. {
  17. public class AuthContext
  18. {
  19. public string WorkStation;
  20. public byte[] ServerChallenge;
  21. public string UserName;
  22. public byte[] SessionKey;
  23. public bool IsGuest;
  24. public AuthContext(string workStation, byte[] serverChallenge)
  25. {
  26. WorkStation = workStation;
  27. ServerChallenge = serverChallenge;
  28. }
  29. }
  30. private GetUserPassword m_GetUserPassword;
  31. /// <param name="getUserPassword">
  32. /// The NTLM challenge response will be compared against the provided password.
  33. /// </param>
  34. public IndependentNTLMAuthenticationProvider(GetUserPassword getUserPassword)
  35. {
  36. m_GetUserPassword = getUserPassword;
  37. }
  38. public override NTStatus GetChallengeMessage(out object context, NegotiateMessage negotiateMessage, out ChallengeMessage challengeMessage)
  39. {
  40. byte[] serverChallenge = GenerateServerChallenge();
  41. context = new AuthContext(negotiateMessage.Workstation, serverChallenge);
  42. challengeMessage = new ChallengeMessage();
  43. // https://msdn.microsoft.com/en-us/library/cc236691.aspx
  44. challengeMessage.NegotiateFlags = NegotiateFlags.TargetTypeServer |
  45. NegotiateFlags.TargetInfo |
  46. NegotiateFlags.TargetNameSupplied |
  47. NegotiateFlags.Version;
  48. // [MS-NLMP] NTLMSSP_NEGOTIATE_NTLM MUST be set in the [..] CHALLENGE_MESSAGE to the client.
  49. challengeMessage.NegotiateFlags |= NegotiateFlags.NTLMSessionSecurity;
  50. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.UnicodeEncoding) > 0)
  51. {
  52. challengeMessage.NegotiateFlags |= NegotiateFlags.UnicodeEncoding;
  53. }
  54. else if ((negotiateMessage.NegotiateFlags & NegotiateFlags.OEMEncoding) > 0)
  55. {
  56. challengeMessage.NegotiateFlags |= NegotiateFlags.OEMEncoding;
  57. }
  58. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.ExtendedSessionSecurity) > 0)
  59. {
  60. challengeMessage.NegotiateFlags |= NegotiateFlags.ExtendedSessionSecurity;
  61. }
  62. else if ((negotiateMessage.NegotiateFlags & NegotiateFlags.LanManagerKey) > 0)
  63. {
  64. challengeMessage.NegotiateFlags |= NegotiateFlags.LanManagerKey;
  65. }
  66. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.Sign) > 0)
  67. {
  68. // [MS-NLMP] If the client sends NTLMSSP_NEGOTIATE_SIGN to the server in the NEGOTIATE_MESSAGE,
  69. // the server MUST return NTLMSSP_NEGOTIATE_SIGN to the client in the CHALLENGE_MESSAGE.
  70. challengeMessage.NegotiateFlags |= NegotiateFlags.Sign;
  71. }
  72. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.Seal) > 0)
  73. {
  74. // [MS-NLMP] If the client sends NTLMSSP_NEGOTIATE_SEAL to the server in the NEGOTIATE_MESSAGE,
  75. // the server MUST return NTLMSSP_NEGOTIATE_SEAL to the client in the CHALLENGE_MESSAGE.
  76. challengeMessage.NegotiateFlags |= NegotiateFlags.Seal;
  77. }
  78. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.Sign) > 0 ||
  79. (negotiateMessage.NegotiateFlags & NegotiateFlags.Seal) > 0)
  80. {
  81. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.Use56BitEncryption) > 0)
  82. {
  83. // [MS-NLMP] If the client sends NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN with
  84. // NTLMSSP_NEGOTIATE_56 to the server in the NEGOTIATE_MESSAGE, the server MUST return
  85. // NTLMSSP_NEGOTIATE_56 to the client in the CHALLENGE_MESSAGE.
  86. challengeMessage.NegotiateFlags |= NegotiateFlags.Use56BitEncryption;
  87. }
  88. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.Use128BitEncryption) > 0)
  89. {
  90. // [MS-NLMP] If the client sends NTLMSSP_NEGOTIATE_128 to the server in the NEGOTIATE_MESSAGE,
  91. // the server MUST return NTLMSSP_NEGOTIATE_128 to the client in the CHALLENGE_MESSAGE only if
  92. // the client sets NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN.
  93. challengeMessage.NegotiateFlags |= NegotiateFlags.Use128BitEncryption;
  94. }
  95. }
  96. if ((negotiateMessage.NegotiateFlags & NegotiateFlags.KeyExchange) > 0)
  97. {
  98. challengeMessage.NegotiateFlags |= NegotiateFlags.KeyExchange;
  99. }
  100. challengeMessage.TargetName = Environment.MachineName;
  101. challengeMessage.ServerChallenge = serverChallenge;
  102. challengeMessage.TargetInfo = AVPairUtils.GetAVPairSequence(Environment.MachineName, Environment.MachineName);
  103. challengeMessage.Version = NTLMVersion.Server2003;
  104. return NTStatus.SEC_I_CONTINUE_NEEDED;
  105. }
  106. public override NTStatus Authenticate(object context, AuthenticateMessage message)
  107. {
  108. AuthContext authContext = context as AuthContext;
  109. if (authContext == null)
  110. {
  111. // There are two possible reasons for authContext to be null:
  112. // 1. We have a bug in our implementation, let's assume that's not the case,
  113. // according to [MS-SMB2] 3.3.5.5.1 we aren't allowed to return SEC_E_INVALID_HANDLE anyway.
  114. // 2. The client sent AuthenticateMessage without sending NegotiateMessage first,
  115. // in this case the correct response is SEC_E_INVALID_TOKEN.
  116. return NTStatus.SEC_E_INVALID_TOKEN;
  117. }
  118. authContext.UserName = message.UserName;
  119. if ((message.NegotiateFlags & NegotiateFlags.Anonymous) > 0)
  120. {
  121. if (this.EnableGuestLogin)
  122. {
  123. authContext.IsGuest = true;
  124. return NTStatus.STATUS_SUCCESS;
  125. }
  126. else
  127. {
  128. return NTStatus.STATUS_LOGON_FAILURE;
  129. }
  130. }
  131. string password = m_GetUserPassword(message.UserName);
  132. if (password == null)
  133. {
  134. if (this.EnableGuestLogin)
  135. {
  136. authContext.IsGuest = true;
  137. return NTStatus.STATUS_SUCCESS;
  138. }
  139. else
  140. {
  141. return NTStatus.STATUS_LOGON_FAILURE;
  142. }
  143. }
  144. bool success;
  145. byte[] serverChallenge = authContext.ServerChallenge;
  146. byte[] sessionBaseKey;
  147. byte[] keyExchangeKey = null;
  148. if ((message.NegotiateFlags & NegotiateFlags.ExtendedSessionSecurity) > 0)
  149. {
  150. if (AuthenticationMessageUtils.IsNTLMv1ExtendedSecurity(message.LmChallengeResponse))
  151. {
  152. // NTLM v1 Extended Security:
  153. success = AuthenticateV1Extended(password, serverChallenge, message.LmChallengeResponse, message.NtChallengeResponse);
  154. if (success)
  155. {
  156. // https://msdn.microsoft.com/en-us/library/cc236699.aspx
  157. sessionBaseKey = new MD4().GetByteHashFromBytes(NTLMCryptography.NTOWFv1(password));
  158. byte[] lmowf = NTLMCryptography.LMOWFv1(password);
  159. keyExchangeKey = NTLMCryptography.KXKey(sessionBaseKey, message.NegotiateFlags, message.LmChallengeResponse, serverChallenge, lmowf);
  160. }
  161. }
  162. else
  163. {
  164. // NTLM v2:
  165. success = AuthenticateV2(message.DomainName, message.UserName, password, serverChallenge, message.LmChallengeResponse, message.NtChallengeResponse);
  166. if (success)
  167. {
  168. // https://msdn.microsoft.com/en-us/library/cc236700.aspx
  169. byte[] responseKeyNT = NTLMCryptography.NTOWFv2(password, message.UserName, message.DomainName);
  170. byte[] ntProofStr = ByteReader.ReadBytes(message.NtChallengeResponse, 0, 16);
  171. sessionBaseKey = new HMACMD5(responseKeyNT).ComputeHash(ntProofStr);
  172. keyExchangeKey = sessionBaseKey;
  173. }
  174. }
  175. }
  176. else
  177. {
  178. success = AuthenticateV1(password, serverChallenge, message.LmChallengeResponse, message.NtChallengeResponse);
  179. if (success)
  180. {
  181. // https://msdn.microsoft.com/en-us/library/cc236699.aspx
  182. sessionBaseKey = new MD4().GetByteHashFromBytes(NTLMCryptography.NTOWFv1(password));
  183. byte[] lmowf = NTLMCryptography.LMOWFv1(password);
  184. keyExchangeKey = NTLMCryptography.KXKey(sessionBaseKey, message.NegotiateFlags, message.LmChallengeResponse, serverChallenge, lmowf);
  185. }
  186. }
  187. if (success)
  188. {
  189. // https://msdn.microsoft.com/en-us/library/cc236676.aspx
  190. // https://blogs.msdn.microsoft.com/openspecification/2010/04/19/ntlm-keys-and-sundry-stuff/
  191. if ((message.NegotiateFlags & NegotiateFlags.KeyExchange) > 0)
  192. {
  193. authContext.SessionKey = RC4.Decrypt(keyExchangeKey, message.EncryptedRandomSessionKey);
  194. }
  195. else
  196. {
  197. authContext.SessionKey = keyExchangeKey;
  198. }
  199. return NTStatus.STATUS_SUCCESS;
  200. }
  201. else
  202. {
  203. return NTStatus.STATUS_LOGON_FAILURE;
  204. }
  205. }
  206. public override void DeleteSecurityContext(ref object context)
  207. {
  208. }
  209. public override object GetContextAttribute(object context, GSSAttributeName attributeName)
  210. {
  211. AuthContext authContext = context as AuthContext;
  212. if (authContext != null)
  213. {
  214. switch (attributeName)
  215. {
  216. case GSSAttributeName.IsGuest:
  217. return authContext.IsGuest;
  218. case GSSAttributeName.MachineName:
  219. return authContext.WorkStation;
  220. case GSSAttributeName.SessionKey:
  221. return authContext.SessionKey;
  222. case GSSAttributeName.UserName:
  223. return authContext.UserName;
  224. }
  225. }
  226. return null;
  227. }
  228. private bool EnableGuestLogin
  229. {
  230. get
  231. {
  232. return (m_GetUserPassword("Guest") == String.Empty);
  233. }
  234. }
  235. /// <summary>
  236. /// LM v1 / NTLM v1
  237. /// </summary>
  238. private static bool AuthenticateV1(string password, byte[] serverChallenge, byte[] lmResponse, byte[] ntResponse)
  239. {
  240. byte[] expectedLMResponse = NTLMCryptography.ComputeLMv1Response(serverChallenge, password);
  241. if (ByteUtils.AreByteArraysEqual(expectedLMResponse, lmResponse))
  242. {
  243. return true;
  244. }
  245. byte[] expectedNTResponse = NTLMCryptography.ComputeNTLMv1Response(serverChallenge, password);
  246. return ByteUtils.AreByteArraysEqual(expectedNTResponse, ntResponse);
  247. }
  248. /// <summary>
  249. /// LM v1 / NTLM v1 Extended Security
  250. /// </summary>
  251. private static bool AuthenticateV1Extended(string password, byte[] serverChallenge, byte[] lmResponse, byte[] ntResponse)
  252. {
  253. byte[] clientChallenge = ByteReader.ReadBytes(lmResponse, 0, 8);
  254. byte[] expectedNTLMv1Response = NTLMCryptography.ComputeNTLMv1ExtendedSecurityResponse(serverChallenge, clientChallenge, password);
  255. return ByteUtils.AreByteArraysEqual(expectedNTLMv1Response, ntResponse);
  256. }
  257. /// <summary>
  258. /// LM v2 / NTLM v2
  259. /// </summary>
  260. private bool AuthenticateV2(string domainName, string accountName, string password, byte[] serverChallenge, byte[] lmResponse, byte[] ntResponse)
  261. {
  262. byte[] _LMv2ClientChallenge = ByteReader.ReadBytes(lmResponse, 16, 8);
  263. byte[] expectedLMv2Response = NTLMCryptography.ComputeLMv2Response(serverChallenge, _LMv2ClientChallenge, password, accountName, domainName);
  264. if (ByteUtils.AreByteArraysEqual(expectedLMv2Response, lmResponse))
  265. {
  266. return true;
  267. }
  268. if (AuthenticationMessageUtils.IsNTLMv2NTResponse(ntResponse))
  269. {
  270. byte[] clientNTProof = ByteReader.ReadBytes(ntResponse, 0, 16);
  271. byte[] clientChallengeStructurePadded = ByteReader.ReadBytes(ntResponse, 16, ntResponse.Length - 16);
  272. byte[] expectedNTProof = NTLMCryptography.ComputeNTLMv2Proof(serverChallenge, clientChallengeStructurePadded, password, accountName, domainName);
  273. return ByteUtils.AreByteArraysEqual(clientNTProof, expectedNTProof);
  274. }
  275. return false;
  276. }
  277. /// <summary>
  278. /// Generate 8-byte server challenge
  279. /// </summary>
  280. private static byte[] GenerateServerChallenge()
  281. {
  282. byte[] serverChallenge = new byte[8];
  283. new Random().NextBytes(serverChallenge);
  284. return serverChallenge;
  285. }
  286. }
  287. }