GSSProvider.cs 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242
  1. /* Copyright (C) 2017 Tal Aloni <tal.aloni.il@gmail.com>. All rights reserved.
  2. *
  3. * You can redistribute this program and/or modify it under the terms of
  4. * the GNU Lesser Public License as published by the Free Software Foundation,
  5. * either version 3 of the License, or (at your option) any later version.
  6. */
  7. using System;
  8. using System.Collections.Generic;
  9. using SMBLibrary.Authentication.NTLM;
  10. using Utilities;
  11. namespace SMBLibrary.Authentication.GSSAPI
  12. {
  13. public class GSSProvider
  14. {
  15. public static readonly byte[] NTLMSSPIdentifier = new byte[] { 0x2b, 0x06, 0x01, 0x04, 0x01, 0x82, 0x37, 0x02, 0x02, 0x0a };
  16. private List<IGSSMechanism> m_mechanisms;
  17. private Dictionary<object, IGSSMechanism> m_contextToMechanism = new Dictionary<object, IGSSMechanism>();
  18. public GSSProvider(IGSSMechanism mechanism)
  19. {
  20. m_mechanisms = new List<IGSSMechanism>();
  21. m_mechanisms.Add(mechanism);
  22. }
  23. public GSSProvider(List<IGSSMechanism> mechanisms)
  24. {
  25. m_mechanisms = mechanisms;
  26. }
  27. public byte[] GetSPNEGOTokenInitBytes()
  28. {
  29. SimpleProtectedNegotiationTokenInit token = new SimpleProtectedNegotiationTokenInit();
  30. token.MechanismTypeList = new List<byte[]>();
  31. foreach (IGSSMechanism mechanism in m_mechanisms)
  32. {
  33. token.MechanismTypeList.Add(mechanism.Identifier);
  34. }
  35. return SimpleProtectedNegotiationToken.GetTokenBytes(token);
  36. }
  37. public NTStatus AcceptSecurityContext(ref object context, byte[] inputToken, out byte[] outputToken)
  38. {
  39. outputToken = null;
  40. SimpleProtectedNegotiationToken spnegoToken = SimpleProtectedNegotiationToken.ReadToken(inputToken, 0);
  41. if (spnegoToken != null)
  42. {
  43. if (spnegoToken is SimpleProtectedNegotiationTokenInit)
  44. {
  45. SimpleProtectedNegotiationTokenInit tokenInit = (SimpleProtectedNegotiationTokenInit)spnegoToken;
  46. if (tokenInit.MechanismTypeList.Count == 0)
  47. {
  48. return NTStatus.SEC_E_INVALID_TOKEN;
  49. }
  50. // RFC 4178: Note that in order to avoid an extra round trip, the first context establishment token
  51. // of the initiator's preferred mechanism SHOULD be embedded in the initial negotiation message.
  52. byte[] preferredMechanism = tokenInit.MechanismTypeList[0];
  53. IGSSMechanism mechanism = FindMechanism(preferredMechanism);
  54. bool isPreferredMechanism = (mechanism != null);
  55. if (!isPreferredMechanism)
  56. {
  57. mechanism = FindMechanism(tokenInit.MechanismTypeList);
  58. }
  59. if (mechanism != null)
  60. {
  61. NTStatus status;
  62. if (isPreferredMechanism)
  63. {
  64. byte[] mechanismOutput;
  65. status = mechanism.AcceptSecurityContext(ref context, tokenInit.MechanismToken, out mechanismOutput);
  66. outputToken = GetSPNEGOTokenResponseBytes(mechanismOutput, status, mechanism.Identifier);
  67. }
  68. else
  69. {
  70. status = NTStatus.SEC_I_CONTINUE_NEEDED;
  71. outputToken = GetSPNEGOTokenResponseBytes(null, status, mechanism.Identifier);
  72. }
  73. m_contextToMechanism[context] = mechanism;
  74. return status;
  75. }
  76. return NTStatus.SEC_E_SECPKG_NOT_FOUND;
  77. }
  78. else // SimpleProtectedNegotiationTokenResponse
  79. {
  80. IGSSMechanism mechanism;
  81. if (!m_contextToMechanism.TryGetValue(context, out mechanism))
  82. {
  83. // We assume that the problem is not with our implementation and that the client has sent
  84. // SimpleProtectedNegotiationTokenResponse without first sending SimpleProtectedNegotiationTokenInit.
  85. return NTStatus.SEC_E_INVALID_TOKEN;
  86. }
  87. SimpleProtectedNegotiationTokenResponse tokenResponse = (SimpleProtectedNegotiationTokenResponse)spnegoToken;
  88. byte[] mechanismOutput;
  89. NTStatus status = mechanism.AcceptSecurityContext(ref context, tokenResponse.ResponseToken, out mechanismOutput);
  90. outputToken = GetSPNEGOTokenResponseBytes(mechanismOutput, status, null);
  91. return status;
  92. }
  93. }
  94. else
  95. {
  96. // [MS-SMB] The Windows GSS implementation supports raw Kerberos / NTLM messages in the SecurityBlob.
  97. // [MS-SMB2] Windows [..] will also accept raw Kerberos messages and implicit NTLM messages as part of GSS authentication.
  98. if (AuthenticationMessageUtils.IsSignatureValid(inputToken))
  99. {
  100. MessageTypeName messageType = AuthenticationMessageUtils.GetMessageType(inputToken);
  101. IGSSMechanism ntlmAuthenticationProvider = FindMechanism(NTLMSSPIdentifier);
  102. if (ntlmAuthenticationProvider != null)
  103. {
  104. NTStatus status = ntlmAuthenticationProvider.AcceptSecurityContext(ref context, inputToken, out outputToken);
  105. if (messageType == MessageTypeName.Negotiate)
  106. {
  107. m_contextToMechanism[context] = ntlmAuthenticationProvider;
  108. }
  109. return status;
  110. }
  111. else
  112. {
  113. return NTStatus.SEC_E_SECPKG_NOT_FOUND;
  114. }
  115. }
  116. }
  117. return NTStatus.SEC_E_INVALID_TOKEN;
  118. }
  119. public object GetContextAttribute(object context, GSSAttributeName attributeName)
  120. {
  121. IGSSMechanism mechanism;
  122. if (!m_contextToMechanism.TryGetValue(context, out mechanism))
  123. {
  124. return null;
  125. }
  126. return mechanism.GetContextAttribute(context, attributeName);
  127. }
  128. public bool DeleteSecurityContext(ref object context)
  129. {
  130. bool result = false;
  131. if (context != null)
  132. {
  133. IGSSMechanism mechanism;
  134. if (m_contextToMechanism.TryGetValue(context, out mechanism))
  135. {
  136. object contextReference = context;
  137. result = mechanism.DeleteSecurityContext(ref context);
  138. if (result)
  139. {
  140. m_contextToMechanism.Remove(contextReference);
  141. }
  142. }
  143. }
  144. return result;
  145. }
  146. /// <summary>
  147. /// Helper method for legacy implementation.
  148. /// </summary>
  149. public NTStatus GetNTLMChallengeMessage(out object context, NegotiateMessage negotiateMessage, out ChallengeMessage challengeMessage)
  150. {
  151. context = null;
  152. challengeMessage = null;
  153. IGSSMechanism ntlmAuthenticationProvider = FindMechanism(NTLMSSPIdentifier);
  154. if (ntlmAuthenticationProvider != null)
  155. {
  156. byte[] outputToken;
  157. NTStatus result = ntlmAuthenticationProvider.AcceptSecurityContext(ref context, negotiateMessage.GetBytes(), out outputToken);
  158. challengeMessage = new ChallengeMessage(outputToken);
  159. m_contextToMechanism.Add(context, ntlmAuthenticationProvider);
  160. return result;
  161. }
  162. else
  163. {
  164. return NTStatus.SEC_E_SECPKG_NOT_FOUND;
  165. }
  166. }
  167. /// <summary>
  168. /// Helper method for legacy implementation.
  169. /// </summary>
  170. public NTStatus NTLMAuthenticate(object context, AuthenticateMessage authenticateMessage)
  171. {
  172. IGSSMechanism ntlmAuthenticationProvider = FindMechanism(NTLMSSPIdentifier);
  173. if (ntlmAuthenticationProvider != null)
  174. {
  175. byte[] outputToken;
  176. NTStatus result = ntlmAuthenticationProvider.AcceptSecurityContext(ref context, authenticateMessage.GetBytes(), out outputToken);
  177. return result;
  178. }
  179. else
  180. {
  181. return NTStatus.SEC_E_SECPKG_NOT_FOUND;
  182. }
  183. }
  184. public IGSSMechanism FindMechanism(List<byte[]> mechanismIdentifiers)
  185. {
  186. foreach (byte[] identifier in mechanismIdentifiers)
  187. {
  188. IGSSMechanism mechanism = FindMechanism(identifier);
  189. if (mechanism != null)
  190. {
  191. return mechanism;
  192. }
  193. }
  194. return null;
  195. }
  196. public IGSSMechanism FindMechanism(byte[] mechanismIdentifier)
  197. {
  198. foreach (IGSSMechanism mechanism in m_mechanisms)
  199. {
  200. if (ByteUtils.AreByteArraysEqual(mechanism.Identifier, mechanismIdentifier))
  201. {
  202. return mechanism;
  203. }
  204. }
  205. return null;
  206. }
  207. private static byte[] GetSPNEGOTokenResponseBytes(byte[] mechanismOutput, NTStatus status, byte[] mechanismIdentifier)
  208. {
  209. SimpleProtectedNegotiationTokenResponse tokenResponse = new SimpleProtectedNegotiationTokenResponse();
  210. if (status == NTStatus.STATUS_SUCCESS)
  211. {
  212. tokenResponse.NegState = NegState.AcceptCompleted;
  213. }
  214. else if (status == NTStatus.SEC_I_CONTINUE_NEEDED)
  215. {
  216. tokenResponse.NegState = NegState.AcceptIncomplete;
  217. }
  218. else
  219. {
  220. tokenResponse.NegState = NegState.Reject;
  221. }
  222. tokenResponse.SupportedMechanism = mechanismIdentifier;
  223. tokenResponse.ResponseToken = mechanismOutput;
  224. return tokenResponse.GetBytes();
  225. }
  226. }
  227. }