1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-23 17:34:34 +03:00
samba-mirror/python/samba/lsa_utils.py
Douglas Bagnall f8fb9f19bc python:lsa_utils: avoid useless use of py2-compat string_to_byte_array
`pw.encode('utf-16-le')` is always bytes.

Signed-off-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
Reviewed-by: Andrew Bartlett <abartlet@samba.org>
2024-06-12 08:14:34 +00:00

193 lines
5.3 KiB
Python

# trust utils
#
# Copyright Isaac Boukris 2020
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
from samba.dcerpc import lsa, drsblobs, misc
from samba.ndr import ndr_pack
from samba import (
NTSTATUSError,
aead_aes_256_cbc_hmac_sha512,
arcfour_encrypt,
)
from samba.ntstatus import (
NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE
)
from samba import crypto
from secrets import token_bytes
def OpenPolicyFallback(
conn: lsa.lsarpc,
system_name: str,
in_version: int,
in_revision_info: lsa.revision_info1,
sec_qos: bool = False,
access_mask: int = 0,
):
attr = lsa.ObjectAttribute()
if sec_qos:
qos = lsa.QosInfo()
qos.len = 0xc
qos.impersonation_level = 2
qos.context_mode = 1
qos.effective_only = 0
attr.sec_qos = qos
try:
out_version, out_rev_info, policy = conn.OpenPolicy3(
system_name,
attr,
access_mask,
in_version,
in_revision_info
)
except NTSTATUSError as e:
if e.args[0] == NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE:
out_version = 1
out_rev_info = lsa.revision_info1()
out_rev_info.revision = 1
out_rev_info.supported_features = 0
policy = conn.OpenPolicy2(system_name, attr, access_mask)
else:
raise
return out_version, out_rev_info, policy
def CreateTrustedDomainRelax(
lsaconn: lsa.lsarpc,
policy: misc.policy_handle,
trust_info: lsa.TrustDomainInfoInfoEx,
mask: int,
in_blob: drsblobs.trustAuthInOutBlob,
out_blob: drsblobs.trustAuthInOutBlob
):
def generate_AuthInfoInternal(session_key, incoming=None, outgoing=None):
confounder = list(token_bytes(512))
trustpass = drsblobs.trustDomainPasswords()
trustpass.confounder = confounder
trustpass.outgoing = outgoing
trustpass.incoming = incoming
trustpass_blob = ndr_pack(trustpass)
encrypted_trustpass = arcfour_encrypt(session_key, trustpass_blob)
auth_blob = lsa.DATA_BUF2()
auth_blob.size = len(encrypted_trustpass)
auth_blob.data = list(encrypted_trustpass)
auth_info = lsa.TrustDomainInfoAuthInfoInternal()
auth_info.auth_blob = auth_blob
return auth_info
session_key = lsaconn.session_key
try:
if lsaconn.transport_encrypted():
crypto.set_relax_mode()
auth_info = generate_AuthInfoInternal(session_key,
incoming=in_blob,
outgoing=out_blob)
finally:
crypto.set_strict_mode()
return lsaconn.CreateTrustedDomainEx2(policy, trust_info, auth_info, mask)
def CreateTrustedDomainFallback(
conn: lsa.lsarpc,
policy_handle: misc.policy_handle,
trust_info: lsa.TrustDomainInfoInfoEx,
access_mask: int,
srv_version: int,
srv_revision_info1: lsa.revision_info1,
in_blob: drsblobs.trustAuthInOutBlob,
out_blob: drsblobs.trustAuthInOutBlob
):
def generate_AuthInfoInternalAES(
session_key,
incoming=None,
outgoing=None
):
trustpass = drsblobs.trustDomainPasswords()
trustpass.outgoing = outgoing
trustpass.incoming = incoming
trustpass_blob = ndr_pack(trustpass)
lsa_aes256_enc_key = (
"Microsoft LSAD encryption key AEAD-AES-256-CBC-HMAC-SHA512 16".encode()
+ b'\x00'
)
lsa_aes256_mac_key = (
"Microsoft LSAD MAC key AEAD-AES-256-CBC-HMAC-SHA512 16".encode()
+ b'\x00'
)
iv = token_bytes(16)
ciphertext, auth_data = aead_aes_256_cbc_hmac_sha512(
trustpass_blob,
session_key,
lsa_aes256_enc_key,
lsa_aes256_mac_key,
iv,
)
return ciphertext, iv, auth_data
if (srv_version == 1
and srv_revision_info1.revision == 1
and (srv_revision_info1.supported_features
& lsa.LSA_FEATURE_TDO_AUTH_INFO_AES_CIPHER)):
ciphertext, iv, auth_data = generate_AuthInfoInternalAES(
conn.session_key, in_blob, out_blob
)
auth_blob = lsa.DATA_BUF2()
auth_blob.size = len(ciphertext)
auth_blob.data = list(ciphertext)
auth_info = lsa.TrustDomainInfoAuthInfoInternalAES()
auth_info.cipher = auth_blob
auth_info.salt = list(iv)
auth_info.auth_data = list(auth_data)
return conn.CreateTrustedDomainEx3(
policy_handle,
trust_info,
auth_info,
access_mask
)
return CreateTrustedDomainRelax(
conn,
policy_handle,
trust_info,
access_mask,
in_blob,
out_blob
)