2012-01-30 22:42:39 +11:00
/*
2005-04-25 05:03:50 +00:00
Unix SMB / Netbios implementation .
Version 3.0
handle NLTMSSP , client server side parsing
Copyright ( C ) Andrew Tridgell 2001
Copyright ( C ) Andrew Bartlett < abartlet @ samba . org > 2001 - 2005
Copyright ( C ) Stefan Metzmacher 2005
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-10 02:07:03 +00:00
the Free Software Foundation ; either version 3 of the License , or
2005-04-25 05:03:50 +00:00
( at your option ) any later version .
2012-01-30 22:42:39 +11:00
2005-04-25 05:03:50 +00:00
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
2012-01-30 22:42:39 +11:00
2005-04-25 05:03:50 +00:00
You should have received a copy of the GNU General Public License
2007-07-10 02:07:03 +00:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2005-04-25 05:03:50 +00:00
*/
2011-07-25 16:04:38 +10:00
struct auth_session_info ;
2005-04-25 05:03:50 +00:00
# include "includes.h"
# include "auth/ntlmssp/ntlmssp.h"
2012-01-30 22:42:39 +11:00
# include "auth/ntlmssp/ntlmssp_private.h"
2009-04-16 10:17:17 +10:00
# include "../libcli/auth/libcli_auth.h"
2006-03-18 15:42:57 +00:00
# include "librpc/gen_ndr/ndr_dcerpc.h"
2006-11-07 00:48:36 +00:00
# include "auth/gensec/gensec.h"
2005-04-25 05:03:50 +00:00
/**
* Callbacks for NTLMSSP - for both client and server operating modes
2012-01-30 22:42:39 +11:00
*
2005-04-25 05:03:50 +00:00
*/
static const struct ntlmssp_callbacks {
enum ntlmssp_role role ;
2006-07-27 19:33:15 +00:00
enum ntlmssp_message_type command ;
NTSTATUS ( * sync_fn ) ( struct gensec_security * gensec_security ,
TALLOC_CTX * out_mem_ctx ,
DATA_BLOB in , DATA_BLOB * out ) ;
2005-04-25 05:03:50 +00:00
} ntlmssp_callbacks [ ] = {
2006-07-27 19:33:15 +00:00
{
. role = NTLMSSP_CLIENT ,
. command = NTLMSSP_INITIAL ,
. sync_fn = ntlmssp_client_initial ,
} , {
. role = NTLMSSP_SERVER ,
. command = NTLMSSP_NEGOTIATE ,
2010-08-06 17:53:44 +10:00
. sync_fn = gensec_ntlmssp_server_negotiate ,
2006-07-27 19:33:15 +00:00
} , {
. role = NTLMSSP_CLIENT ,
. command = NTLMSSP_CHALLENGE ,
. sync_fn = ntlmssp_client_challenge ,
} , {
. role = NTLMSSP_SERVER ,
. command = NTLMSSP_AUTH ,
2010-08-06 17:53:44 +10:00
. sync_fn = gensec_ntlmssp_server_auth ,
2006-07-27 19:33:15 +00:00
}
2005-04-25 05:03:50 +00:00
} ;
2012-03-09 14:28:46 +11:00
static NTSTATUS gensec_ntlmssp_update_find ( struct gensec_security * gensec_security ,
struct gensec_ntlmssp_context * gensec_ntlmssp ,
2006-07-27 19:20:57 +00:00
const DATA_BLOB input , uint32_t * idx )
2005-04-25 05:03:50 +00:00
{
uint32_t ntlmssp_command ;
2006-07-27 19:20:57 +00:00
uint32_t i ;
2005-04-25 05:03:50 +00:00
2012-02-07 17:47:42 +11:00
if ( gensec_ntlmssp - > ntlmssp_state - > expected_state = = NTLMSSP_DONE ) {
2005-08-23 05:29:37 +00:00
/* We are strict here because other modules, which we
* don ' t fully control ( such as GSSAPI ) are also
* strict , but are tested less often */
DEBUG ( 1 , ( " Called NTLMSSP after state machine was 'done' \n " ) ) ;
return NT_STATUS_INVALID_PARAMETER ;
2005-04-25 05:03:50 +00:00
}
if ( ! input . length ) {
2012-02-07 17:47:42 +11:00
switch ( gensec_ntlmssp - > ntlmssp_state - > role ) {
2005-04-25 05:03:50 +00:00
case NTLMSSP_CLIENT :
ntlmssp_command = NTLMSSP_INITIAL ;
break ;
case NTLMSSP_SERVER :
2005-08-20 04:42:19 +00:00
if ( gensec_security - > want_features & GENSEC_FEATURE_DATAGRAM_MODE ) {
/* 'datagram' mode - no neg packet */
ntlmssp_command = NTLMSSP_NEGOTIATE ;
} else {
/* This is normal in SPNEGO mech negotiation fallback */
DEBUG ( 2 , ( " Failed to parse NTLMSSP packet: zero length \n " ) ) ;
return NT_STATUS_INVALID_PARAMETER ;
}
2005-04-25 05:03:50 +00:00
break ;
}
} else {
2012-02-07 17:47:42 +11:00
if ( ! msrpc_parse ( gensec_ntlmssp - > ntlmssp_state ,
2005-04-25 05:03:50 +00:00
& input , " Cd " ,
" NTLMSSP " ,
& ntlmssp_command ) ) {
DEBUG ( 1 , ( " Failed to parse NTLMSSP packet, could not extract NTLMSSP command \n " ) ) ;
dump_data ( 2 , input . data , input . length ) ;
return NT_STATUS_INVALID_PARAMETER ;
}
}
2012-02-07 17:47:42 +11:00
if ( ntlmssp_command ! = gensec_ntlmssp - > ntlmssp_state - > expected_state ) {
DEBUG ( 2 , ( " got NTLMSSP command %u, expected %u \n " , ntlmssp_command ,
gensec_ntlmssp - > ntlmssp_state - > expected_state ) ) ;
2005-04-25 05:03:50 +00:00
return NT_STATUS_INVALID_PARAMETER ;
}
for ( i = 0 ; i < ARRAY_SIZE ( ntlmssp_callbacks ) ; i + + ) {
2012-02-07 17:47:42 +11:00
if ( ntlmssp_callbacks [ i ] . role = = gensec_ntlmssp - > ntlmssp_state - > role & &
2006-07-27 19:33:15 +00:00
ntlmssp_callbacks [ i ] . command = = ntlmssp_command ) {
2006-07-27 19:20:57 +00:00
* idx = i ;
return NT_STATUS_OK ;
2005-04-25 05:03:50 +00:00
}
}
2012-01-30 22:42:39 +11:00
DEBUG ( 1 , ( " failed to find NTLMSSP callback for NTLMSSP mode %u, command %u \n " ,
2012-02-07 17:47:42 +11:00
gensec_ntlmssp - > ntlmssp_state - > role , ntlmssp_command ) ) ;
2012-01-30 22:42:39 +11:00
2006-07-27 19:20:57 +00:00
return NT_STATUS_INVALID_PARAMETER ;
}
/**
* Next state function for the wrapped NTLMSSP state machine
2012-01-30 22:42:39 +11:00
*
2006-07-27 19:20:57 +00:00
* @ param gensec_security GENSEC state , initialised to NTLMSSP
* @ param out_mem_ctx The TALLOC_CTX for * out to be allocated on
* @ param in The request , as a DATA_BLOB
* @ param out The reply , as an talloc ( ) ed DATA_BLOB , on * out_mem_ctx
2012-01-30 22:42:39 +11:00
* @ return Error , MORE_PROCESSING_REQUIRED if a reply is sent ,
* or NT_STATUS_OK if the user is authenticated .
2006-07-27 19:20:57 +00:00
*/
2005-04-25 05:03:50 +00:00
2012-01-31 14:43:25 +11:00
NTSTATUS gensec_ntlmssp_update ( struct gensec_security * gensec_security ,
TALLOC_CTX * out_mem_ctx ,
struct tevent_context * ev ,
const DATA_BLOB input , DATA_BLOB * out )
2006-07-27 19:20:57 +00:00
{
2009-12-30 08:23:13 +01:00
struct gensec_ntlmssp_context * gensec_ntlmssp =
talloc_get_type_abort ( gensec_security - > private_data ,
struct gensec_ntlmssp_context ) ;
2009-12-30 17:57:54 +01:00
struct ntlmssp_state * ntlmssp_state = gensec_ntlmssp - > ntlmssp_state ;
2006-07-27 19:20:57 +00:00
NTSTATUS status ;
uint32_t i ;
* out = data_blob ( NULL , 0 ) ;
if ( ! out_mem_ctx ) {
2012-01-30 22:42:39 +11:00
/* if the caller doesn't want to manage/own the memory,
2006-07-27 19:20:57 +00:00
we can put it on our context */
2009-12-30 17:57:54 +01:00
out_mem_ctx = ntlmssp_state ;
2005-04-25 05:03:50 +00:00
}
2006-07-27 19:20:57 +00:00
2012-03-09 14:28:46 +11:00
status = gensec_ntlmssp_update_find ( gensec_security , gensec_ntlmssp , input , & i ) ;
2006-07-27 19:20:57 +00:00
NT_STATUS_NOT_OK_RETURN ( status ) ;
2006-07-27 19:33:15 +00:00
status = ntlmssp_callbacks [ i ] . sync_fn ( gensec_security , out_mem_ctx , input , out ) ;
2006-07-27 19:20:57 +00:00
NT_STATUS_NOT_OK_RETURN ( status ) ;
2012-01-30 22:42:39 +11:00
2006-07-27 19:20:57 +00:00
return NT_STATUS_OK ;
2005-04-25 05:03:50 +00:00
}
2012-01-30 22:42:39 +11:00
static const char * gensec_ntlmssp_oids [ ] = {
GENSEC_OID_NTLMSSP ,
2005-05-15 23:42:11 +00:00
NULL
} ;
2005-04-25 05:03:50 +00:00
static const struct gensec_security_ops gensec_ntlmssp_security_ops = {
. name = " ntlmssp " ,
2010-06-01 19:12:29 +10:00
. sasl_name = GENSEC_SASL_NAME_NTLMSSP , /* "NTLM" */
2005-04-25 05:03:50 +00:00
. auth_type = DCERPC_AUTH_TYPE_NTLMSSP ,
2005-05-15 23:42:11 +00:00
. oid = gensec_ntlmssp_oids ,
2005-04-25 05:03:50 +00:00
. client_start = gensec_ntlmssp_client_start ,
. server_start = gensec_ntlmssp_server_start ,
2005-06-22 02:12:26 +00:00
. magic = gensec_ntlmssp_magic ,
2005-04-25 05:03:50 +00:00
. update = gensec_ntlmssp_update ,
. sig_size = gensec_ntlmssp_sig_size ,
. sign_packet = gensec_ntlmssp_sign_packet ,
. check_packet = gensec_ntlmssp_check_packet ,
. seal_packet = gensec_ntlmssp_seal_packet ,
. unseal_packet = gensec_ntlmssp_unseal_packet ,
. wrap = gensec_ntlmssp_wrap ,
. unwrap = gensec_ntlmssp_unwrap ,
. session_key = gensec_ntlmssp_session_key ,
. session_info = gensec_ntlmssp_session_info ,
. have_feature = gensec_ntlmssp_have_feature ,
2007-10-06 22:16:19 +00:00
. enabled = true ,
2006-09-08 06:57:01 +00:00
. priority = GENSEC_NTLMSSP
2005-04-25 05:03:50 +00:00
} ;
2008-02-20 19:40:20 +01:00
_PUBLIC_ NTSTATUS gensec_ntlmssp_init ( void )
2005-04-25 05:03:50 +00:00
{
NTSTATUS ret ;
2006-04-06 16:08:46 +00:00
2005-04-25 05:03:50 +00:00
ret = gensec_register ( & gensec_ntlmssp_security_ops ) ;
if ( ! NT_STATUS_IS_OK ( ret ) ) {
DEBUG ( 0 , ( " Failed to register '%s' gensec backend! \n " ,
gensec_ntlmssp_security_ops . name ) ) ;
return ret ;
}
return ret ;
}
2012-02-07 17:02:14 +11:00
uint32_t gensec_ntlmssp_neg_flags ( struct gensec_security * gensec_security )
{
struct gensec_ntlmssp_context * gensec_ntlmssp ;
if ( gensec_security - > ops ! = & gensec_ntlmssp_security_ops ) {
return 0 ;
}
gensec_ntlmssp = talloc_get_type_abort ( gensec_security - > private_data ,
struct gensec_ntlmssp_context ) ;
return gensec_ntlmssp - > ntlmssp_state - > neg_flags ;
}