2003-08-13 01:53:07 +00:00
/*
Unix SMB / CIFS implementation .
handle SMBsessionsetup
2005-04-10 07:39:51 +00:00
Copyright ( C ) Andrew Tridgell 1998 - 2001
Copyright ( C ) Andrew Bartlett < abartlet @ samba . org > 2001 - 2005
Copyright ( C ) Jim McDonough 2002
Copyright ( C ) Luke Howard 2003
2003-08-13 01:53:07 +00:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
2005-01-18 10:10:35 +00:00
# include "version.h"
2004-11-02 02:57:18 +00:00
# include "auth/auth.h"
2004-11-02 07:18:24 +00:00
# include "smb_server/smb_server.h"
2005-01-30 00:54:57 +00:00
# include "smbd/service_stream.h"
2005-04-10 07:39:51 +00:00
# include "libcli/nbt/libnbt.h"
2003-08-13 01:53:07 +00:00
/*
setup the OS , Lanman and domain portions of a session setup reply
*/
2004-06-28 08:39:00 +00:00
static void sesssetup_common_strings ( struct smbsrv_request * req ,
2003-08-13 01:53:07 +00:00
char * * os , char * * lanman , char * * domain )
{
2004-09-08 05:39:06 +00:00
( * os ) = talloc_asprintf ( req , " Unix " ) ;
( * lanman ) = talloc_asprintf ( req , " Samba %s " , SAMBA_VERSION_STRING ) ;
( * domain ) = talloc_asprintf ( req , " %s " , lp_workgroup ( ) ) ;
2003-08-13 01:53:07 +00:00
}
/*
handler for old style session setup
*/
2004-06-28 08:39:00 +00:00
static NTSTATUS sesssetup_old ( struct smbsrv_request * req , union smb_sesssetup * sess )
2003-08-13 01:53:07 +00:00
{
NTSTATUS status ;
2004-06-05 01:39:08 +00:00
struct auth_usersupplied_info * user_info = NULL ;
struct auth_serversupplied_info * server_info = NULL ;
struct auth_session_info * session_info ;
2005-04-10 07:39:51 +00:00
struct smbsrv_session * smb_sess ;
2005-07-22 04:10:07 +00:00
const char * remote_machine = NULL ;
2005-01-09 12:55:25 +00:00
TALLOC_CTX * mem_ctx ;
2005-04-10 07:39:51 +00:00
sess - > old . out . vuid = UID_FIELD_INVALID ;
sess - > old . out . action = 0 ;
2005-01-09 12:55:25 +00:00
mem_ctx = talloc_named ( req , 0 , " OLD session setup " ) ;
NT_STATUS_HAVE_NO_MEMORY ( mem_ctx ) ;
2004-06-29 07:40:14 +00:00
if ( ! req - > smb_conn - > negotiate . done_sesssetup ) {
req - > smb_conn - > negotiate . max_send = sess - > old . in . bufsize ;
2003-08-13 01:53:07 +00:00
}
2004-09-22 23:50:28 +00:00
2005-10-12 22:25:51 +00:00
if ( req - > smb_conn - > negotiate . calling_name ) {
remote_machine = req - > smb_conn - > negotiate . calling_name - > name ;
2005-07-22 04:10:07 +00:00
}
if ( ! remote_machine ) {
remote_machine = socket_get_peer_addr ( req - > smb_conn - > connection - > socket , mem_ctx ) ;
}
user_info = talloc ( req - > smb_conn , struct auth_usersupplied_info ) ;
if ( ! user_info ) {
2004-10-29 09:15:41 +00:00
talloc_free ( mem_ctx ) ;
2005-07-22 04:10:07 +00:00
return NT_STATUS_NO_MEMORY ;
2003-08-13 01:53:07 +00:00
}
2005-07-22 04:10:07 +00:00
user_info - > mapped_state = False ;
user_info - > flags = 0 ;
user_info - > client . account_name = sess - > old . in . user ;
user_info - > client . domain_name = sess - > old . in . domain ;
user_info - > workstation_name = remote_machine ;
user_info - > remote_host = socket_get_peer_addr ( req - > smb_conn - > connection - > socket , mem_ctx ) ;
user_info - > password_state = AUTH_PASSWORD_RESPONSE ;
user_info - > password . response . lanman = sess - > old . in . password ;
user_info - > password . response . lanman . data = talloc_steal ( user_info , sess - > old . in . password . data ) ;
user_info - > password . response . nt = data_blob ( NULL , 0 ) ;
2003-08-13 01:53:07 +00:00
2005-01-09 12:55:25 +00:00
status = auth_check_password ( req - > smb_conn - > negotiate . auth_context ,
mem_ctx , user_info , & server_info ) ;
2003-08-13 01:53:07 +00:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2004-10-29 09:15:41 +00:00
talloc_free ( mem_ctx ) ;
2005-01-09 12:55:25 +00:00
return auth_nt_status_squash ( status ) ;
2004-05-02 08:45:00 +00:00
}
2004-10-25 04:19:02 +00:00
/* This references server_info into session_info */
2005-01-09 12:55:25 +00:00
status = auth_generate_session_info ( req , server_info , & session_info ) ;
2004-10-29 09:15:41 +00:00
talloc_free ( mem_ctx ) ;
2004-06-05 01:39:08 +00:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2005-01-09 12:55:25 +00:00
return auth_nt_status_squash ( status ) ;
2003-08-13 01:53:07 +00:00
}
2005-04-10 07:39:51 +00:00
smb_sess = smbsrv_register_session ( req - > smb_conn , session_info , NULL ) ;
if ( ! smb_sess ) {
2004-07-05 07:29:14 +00:00
return NT_STATUS_ACCESS_DENIED ;
}
2005-04-10 07:39:51 +00:00
/* Ensure this is marked as a 'real' vuid, not one
* simply valid for the session setup leg */
smb_sess - > finished_sesssetup = True ;
/* To correctly process any AndX packet (like a tree connect)
* we need to fill in the session on the request here */
req - > session = smb_sess ;
sess - > old . out . vuid = smb_sess - > vuid ;
2003-08-13 01:53:07 +00:00
sesssetup_common_strings ( req ,
& sess - > old . out . os ,
& sess - > old . out . lanman ,
& sess - > old . out . domain ) ;
return NT_STATUS_OK ;
}
/*
handler for NT1 style session setup
*/
2004-06-28 08:39:00 +00:00
static NTSTATUS sesssetup_nt1 ( struct smbsrv_request * req , union smb_sesssetup * sess )
2003-08-13 01:53:07 +00:00
{
NTSTATUS status ;
2005-07-22 04:10:07 +00:00
const char * remote_machine = NULL ;
2005-07-22 05:04:45 +00:00
struct auth_context * auth_context ;
2005-04-10 07:39:51 +00:00
struct smbsrv_session * smb_sess ;
2004-06-05 01:39:08 +00:00
struct auth_usersupplied_info * user_info = NULL ;
struct auth_serversupplied_info * server_info = NULL ;
struct auth_session_info * session_info ;
2005-01-09 12:55:25 +00:00
TALLOC_CTX * mem_ctx ;
2004-10-29 09:15:41 +00:00
2005-04-10 07:39:51 +00:00
sess - > nt1 . out . vuid = UID_FIELD_INVALID ;
sess - > nt1 . out . action = 0 ;
2005-01-09 12:55:25 +00:00
mem_ctx = talloc_named ( req , 0 , " NT1 session setup " ) ;
NT_STATUS_HAVE_NO_MEMORY ( mem_ctx ) ;
2003-08-13 01:53:07 +00:00
2004-06-29 07:40:14 +00:00
if ( ! req - > smb_conn - > negotiate . done_sesssetup ) {
req - > smb_conn - > negotiate . max_send = sess - > nt1 . in . bufsize ;
req - > smb_conn - > negotiate . client_caps = sess - > nt1 . in . capabilities ;
2003-08-13 01:53:07 +00:00
}
2004-08-11 18:09:40 +00:00
if ( req - > smb_conn - > negotiate . spnego_negotiated ) {
2004-08-12 06:58:10 +00:00
if ( sess - > nt1 . in . user & & * sess - > nt1 . in . user ) {
2004-10-29 09:15:41 +00:00
talloc_free ( mem_ctx ) ;
2005-07-22 04:10:07 +00:00
/* We can't accept a normal login, because we
* don ' t have a challenge */
return NT_STATUS_LOGON_FAILURE ;
2004-08-11 18:09:40 +00:00
}
2005-07-22 05:04:45 +00:00
/* TODO: should we use just "anonymous" here? */
status = auth_context_create ( mem_ctx , lp_auth_methods ( ) ,
& auth_context ,
req - > smb_conn - > connection - > event . ctx ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
talloc_free ( mem_ctx ) ;
return status ;
}
} else {
auth_context = req - > smb_conn - > negotiate . auth_context ;
2003-08-13 01:53:07 +00:00
}
2005-10-12 22:25:51 +00:00
if ( req - > smb_conn - > negotiate . calling_name ) {
remote_machine = req - > smb_conn - > negotiate . calling_name - > name ;
2005-07-22 04:10:07 +00:00
}
if ( ! remote_machine ) {
remote_machine = socket_get_peer_addr ( req - > smb_conn - > connection - > socket , mem_ctx ) ;
}
user_info = talloc ( req - > smb_conn , struct auth_usersupplied_info ) ;
if ( ! user_info ) {
talloc_free ( mem_ctx ) ;
return NT_STATUS_NO_MEMORY ;
}
user_info - > mapped_state = False ;
user_info - > flags = 0 ;
user_info - > client . account_name = sess - > nt1 . in . user ;
user_info - > client . domain_name = sess - > nt1 . in . domain ;
user_info - > workstation_name = remote_machine ;
user_info - > remote_host = socket_get_peer_addr ( req - > smb_conn - > connection - > socket , mem_ctx ) ;
user_info - > password_state = AUTH_PASSWORD_RESPONSE ;
user_info - > password . response . lanman = sess - > nt1 . in . password1 ;
user_info - > password . response . lanman . data = talloc_steal ( user_info , sess - > nt1 . in . password1 . data ) ;
user_info - > password . response . nt = sess - > nt1 . in . password2 ;
user_info - > password . response . nt . data = talloc_steal ( user_info , sess - > nt1 . in . password2 . data ) ;
2005-07-22 05:04:45 +00:00
status = auth_check_password ( auth_context ,
mem_ctx , user_info , & server_info ) ;
2003-08-13 01:53:07 +00:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2004-10-29 09:15:41 +00:00
talloc_free ( mem_ctx ) ;
2005-01-09 12:55:25 +00:00
return auth_nt_status_squash ( status ) ;
2004-05-02 08:45:00 +00:00
}
2004-10-25 04:19:02 +00:00
/* This references server_info into session_info */
2005-01-09 12:55:25 +00:00
status = auth_generate_session_info ( mem_ctx , server_info , & session_info ) ;
2004-06-05 01:39:08 +00:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2004-10-29 09:15:41 +00:00
talloc_free ( mem_ctx ) ;
2005-01-09 12:55:25 +00:00
return auth_nt_status_squash ( status ) ;
2003-08-13 01:53:07 +00:00
}
2004-10-03 07:32:08 +00:00
2005-04-10 07:39:51 +00:00
smb_sess = smbsrv_register_session ( req - > smb_conn , session_info , NULL ) ;
2004-10-29 09:15:41 +00:00
talloc_free ( mem_ctx ) ;
2005-04-10 07:39:51 +00:00
if ( ! smb_sess ) {
2004-06-05 01:39:08 +00:00
return NT_STATUS_ACCESS_DENIED ;
}
2005-04-10 07:39:51 +00:00
/* Ensure this is marked as a 'real' vuid, not one
* simply valid for the session setup leg */
smb_sess - > finished_sesssetup = True ;
/* To correctly process any AndX packet (like a tree connect)
* we need to fill in the session on the request here */
req - > session = smb_sess ;
sess - > nt1 . out . vuid = smb_sess - > vuid ;
2003-08-13 01:53:07 +00:00
sesssetup_common_strings ( req ,
& sess - > nt1 . out . os ,
& sess - > nt1 . out . lanman ,
& sess - > nt1 . out . domain ) ;
2004-06-05 01:39:08 +00:00
2004-07-15 02:11:03 +00:00
req - > session = smbsrv_session_find ( req - > smb_conn , sess - > nt1 . out . vuid ) ;
2005-01-09 12:55:25 +00:00
if ( ! session_info - > server_info - > authenticated ) {
2004-08-13 00:16:57 +00:00
return NT_STATUS_OK ;
2004-08-10 04:56:44 +00:00
}
2005-01-09 12:55:25 +00:00
2005-04-10 07:39:51 +00:00
if ( ! srv_setup_signing ( req - > smb_conn , & session_info - > session_key , & sess - > nt1 . in . password2 ) ) {
2004-08-13 00:16:57 +00:00
/* Already signing, or disabled */
return NT_STATUS_OK ;
}
2005-01-09 12:55:25 +00:00
2004-08-13 00:16:57 +00:00
/* Force check of the request packet, now we know the session key */
req_signing_check_incoming ( req ) ;
2005-04-10 07:39:51 +00:00
/* Unfortunetly win2k3 as a client doesn't sign the request
* packet here , so we have to force signing to start again */
2004-08-13 00:16:57 +00:00
srv_signing_restart ( req - > smb_conn , & session_info - > session_key , & sess - > nt1 . in . password2 ) ;
2004-08-10 04:56:44 +00:00
2003-08-13 01:53:07 +00:00
return NT_STATUS_OK ;
}
/*
handler for SPNEGO style session setup
*/
2004-06-28 08:39:00 +00:00
static NTSTATUS sesssetup_spnego ( struct smbsrv_request * req , union smb_sesssetup * sess )
2003-08-13 01:53:07 +00:00
{
2004-08-11 18:09:40 +00:00
NTSTATUS status = NT_STATUS_ACCESS_DENIED ;
struct smbsrv_session * smb_sess ;
2005-07-20 04:19:45 +00:00
struct gensec_security * gensec_ctx ;
2004-08-11 18:09:40 +00:00
struct auth_session_info * session_info = NULL ;
uint16_t vuid ;
2005-04-10 07:39:51 +00:00
sess - > spnego . out . vuid = UID_FIELD_INVALID ;
sess - > spnego . out . action = 0 ;
sesssetup_common_strings ( req ,
& sess - > spnego . out . os ,
& sess - > spnego . out . lanman ,
& sess - > spnego . out . workgroup ) ;
2004-08-11 18:09:40 +00:00
if ( ! req - > smb_conn - > negotiate . done_sesssetup ) {
req - > smb_conn - > negotiate . max_send = sess - > nt1 . in . bufsize ;
req - > smb_conn - > negotiate . client_caps = sess - > nt1 . in . capabilities ;
}
vuid = SVAL ( req - > in . hdr , HDR_UID ) ;
2005-04-10 07:39:51 +00:00
smb_sess = smbsrv_session_find_sesssetup ( req - > smb_conn , vuid ) ;
if ( smb_sess ) {
gensec_ctx = smb_sess - > gensec_ctx ;
status = gensec_update ( gensec_ctx , req , sess - > spnego . in . secblob , & sess - > spnego . out . secblob ) ;
2004-08-11 18:09:40 +00:00
} else {
2005-07-20 04:19:45 +00:00
status = gensec_server_start ( req , & gensec_ctx ,
2005-06-16 11:36:09 +00:00
req - > smb_conn - > connection - > event . ctx ) ;
2004-08-11 18:09:40 +00:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 1 , ( " Failed to start GENSEC server code: %s \n " , nt_errstr ( status ) ) ) ;
return status ;
}
2005-10-20 03:47:55 +00:00
gensec_set_credentials ( gensec_ctx , req - > smb_conn - > negotiate . server_credentials ) ;
2004-12-24 09:54:23 +00:00
gensec_set_target_service ( gensec_ctx , " cifs " ) ;
2004-12-06 15:44:17 +00:00
gensec_want_feature ( gensec_ctx , GENSEC_FEATURE_SESSION_KEY ) ;
2004-08-25 02:25:20 +00:00
2004-12-05 16:29:27 +00:00
status = gensec_start_mech_by_oid ( gensec_ctx , GENSEC_OID_SPNEGO ) ;
2004-08-11 18:09:40 +00:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 1 , ( " Failed to start GENSEC SPNEGO server code: %s \n " , nt_errstr ( status ) ) ) ;
return status ;
}
2004-09-08 05:39:06 +00:00
status = gensec_update ( gensec_ctx , req , sess - > spnego . in . secblob , & sess - > spnego . out . secblob ) ;
2004-08-12 03:23:19 +00:00
}
2004-08-11 18:09:40 +00:00
if ( NT_STATUS_IS_OK ( status ) ) {
DATA_BLOB session_key ;
2004-08-12 03:23:19 +00:00
2005-04-10 07:39:51 +00:00
status = gensec_session_info ( gensec_ctx , & session_info ) ;
2004-08-12 03:23:19 +00:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2005-04-10 07:39:51 +00:00
talloc_free ( smb_sess ) ;
2004-08-12 03:23:19 +00:00
return status ;
}
2005-04-10 07:39:51 +00:00
status = gensec_session_key ( gensec_ctx ,
2004-08-13 00:16:57 +00:00
& session_key ) ;
2005-04-10 07:39:51 +00:00
2004-08-13 00:16:57 +00:00
if ( NT_STATUS_IS_OK ( status )
2005-04-10 07:39:51 +00:00
& & session_info - > server_info - > authenticated
2004-08-13 00:16:57 +00:00
& & srv_setup_signing ( req - > smb_conn , & session_key , NULL ) ) {
/* Force check of the request packet, now we know the session key */
req_signing_check_incoming ( req ) ;
srv_signing_restart ( req - > smb_conn , & session_key , NULL ) ;
2004-08-11 18:09:40 +00:00
}
2005-04-10 07:39:51 +00:00
} else if ( NT_STATUS_EQUAL ( status , NT_STATUS_MORE_PROCESSING_REQUIRED ) ) {
2004-08-13 00:16:57 +00:00
} else {
2005-01-09 12:55:25 +00:00
status = auth_nt_status_squash ( status ) ;
2005-04-10 07:39:51 +00:00
/* This invalidates the VUID of the failed login */
talloc_free ( smb_sess ) ;
return status ;
}
if ( ! smb_sess ) {
smb_sess = smbsrv_register_session ( req - > smb_conn ,
session_info , gensec_ctx ) ;
if ( ! smb_sess ) {
return NT_STATUS_ACCESS_DENIED ;
2004-09-24 07:08:02 +00:00
}
2005-04-10 07:39:51 +00:00
req - > session = smb_sess ;
2005-07-20 04:19:45 +00:00
talloc_steal ( smb_sess , gensec_ctx ) ;
2005-04-10 07:39:51 +00:00
} else {
smb_sess - > session_info = talloc_reference ( smb_sess , session_info ) ;
2004-08-11 18:09:40 +00:00
}
2005-04-10 07:39:51 +00:00
if ( NT_STATUS_IS_OK ( status ) ) {
/* Ensure this is marked as a 'real' vuid, not one
* simply valid for the session setup leg */
smb_sess - > finished_sesssetup = True ;
}
sess - > spnego . out . vuid = smb_sess - > vuid ;
2004-08-11 18:09:40 +00:00
return status ;
2003-08-13 01:53:07 +00:00
}
/*
2004-06-27 11:06:10 +00:00
backend for sessionsetup call - this takes all 3 variants of the call
2003-08-13 01:53:07 +00:00
*/
2004-06-28 08:39:00 +00:00
NTSTATUS sesssetup_backend ( struct smbsrv_request * req ,
2003-08-13 01:53:07 +00:00
union smb_sesssetup * sess )
{
2004-07-15 02:11:03 +00:00
NTSTATUS status = NT_STATUS_INVALID_LEVEL ;
2005-01-16 11:15:08 +00:00
switch ( sess - > old . level ) {
2003-08-13 01:53:07 +00:00
case RAW_SESSSETUP_OLD :
2004-07-15 02:11:03 +00:00
status = sesssetup_old ( req , sess ) ;
break ;
2003-08-13 01:53:07 +00:00
case RAW_SESSSETUP_NT1 :
2004-07-15 02:11:03 +00:00
status = sesssetup_nt1 ( req , sess ) ;
break ;
2003-08-13 01:53:07 +00:00
case RAW_SESSSETUP_SPNEGO :
2004-07-15 02:11:03 +00:00
status = sesssetup_spnego ( req , sess ) ;
break ;
2003-08-13 01:53:07 +00:00
}
2004-07-15 02:11:03 +00:00
if ( NT_STATUS_IS_OK ( status ) ) {
req - > smb_conn - > negotiate . done_sesssetup = True ;
}
2003-08-13 01:53:07 +00:00
2004-07-15 02:11:03 +00:00
return status ;
2003-08-13 01:53:07 +00:00
}