mirror of
https://github.com/samba-team/samba.git
synced 2025-01-12 09:18:10 +03:00
fcbfc7ad06
- NTLM2 support in the server
- KEY_EXCH support in the server
- variable length session keys.
In detail:
- NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).
* This is known as 'NTLMv2 session security' *
(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes. We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)
This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed. This also needs to be turned off for
'security=server', which does not support this.
- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.
- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.
- There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure. This should help the SPNEGO implementation.
- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.
- The other big change is to allow variable length session keys. We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter. However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.
* This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *
- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe. This
should help reduce some of the 'it just doesn't work' issues.
- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer. (just allocate)
REMEMBER to make clean after this commit - I have changed plenty of data structures...
(This used to be commit f3bbc87b0d
)
172 lines
4.7 KiB
C
172 lines
4.7 KiB
C
#ifndef _SMBAUTH_H_
|
|
#define _SMBAUTH_H_
|
|
/*
|
|
Unix SMB/CIFS implementation.
|
|
Standardised Authentication types
|
|
Copyright (C) Andrew Bartlett 2001
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
/* AUTH_STR - string */
|
|
typedef struct normal_string
|
|
{
|
|
int len;
|
|
char *str;
|
|
} AUTH_STR;
|
|
|
|
/* AUTH_UNISTR - unicode string or buffer */
|
|
typedef struct unicode_string
|
|
{
|
|
int len;
|
|
uchar *unistr;
|
|
} AUTH_UNISTR;
|
|
|
|
typedef struct interactive_password
|
|
{
|
|
OWF_INFO lm_owf; /* LM OWF Password */
|
|
OWF_INFO nt_owf; /* NT OWF Password */
|
|
} auth_interactive_password;
|
|
|
|
#define AUTH_FLAG_NONE 0x000000
|
|
#define AUTH_FLAG_PLAINTEXT 0x000001
|
|
#define AUTH_FLAG_LM_RESP 0x000002
|
|
#define AUTH_FLAG_NTLM_RESP 0x000004
|
|
#define AUTH_FLAG_NTLMv2_RESP 0x000008
|
|
|
|
typedef struct auth_usersupplied_info
|
|
{
|
|
|
|
DATA_BLOB lm_resp;
|
|
DATA_BLOB nt_resp;
|
|
auth_interactive_password * interactive_password;
|
|
DATA_BLOB plaintext_password;
|
|
|
|
BOOL encrypted;
|
|
|
|
uint32 auth_flags;
|
|
|
|
AUTH_STR client_domain; /* domain name string */
|
|
AUTH_STR domain; /* domain name after mapping */
|
|
AUTH_STR internal_username; /* username after mapping */
|
|
AUTH_STR smb_name; /* username before mapping */
|
|
AUTH_STR wksta_name; /* workstation name (netbios calling name) unicode string */
|
|
|
|
} auth_usersupplied_info;
|
|
|
|
#define SAM_FILL_NAME 0x01
|
|
#define SAM_FILL_INFO3 0x02
|
|
#define SAM_FILL_SAM 0x04
|
|
#define SAM_FILL_UNIX 0x08
|
|
#define SAM_FILL_ALL (SAM_FILL_NAME | SAM_FILL_INFO3 | SAM_FILL_SAM | SAM_FILL_UNIX)
|
|
|
|
typedef struct auth_serversupplied_info
|
|
{
|
|
BOOL guest;
|
|
|
|
uid_t uid;
|
|
gid_t gid;
|
|
|
|
/* This groups info is needed for when we become_user() for this uid */
|
|
int n_groups;
|
|
gid_t *groups;
|
|
|
|
/* NT group information taken from the info3 structure */
|
|
|
|
NT_USER_TOKEN *ptok;
|
|
|
|
DATA_BLOB nt_session_key;
|
|
DATA_BLOB lm_session_key;
|
|
|
|
uint32 sam_fill_level; /* How far is this structure filled? */
|
|
|
|
SAM_ACCOUNT *sam_account;
|
|
|
|
void *pam_handle;
|
|
|
|
char *unix_name;
|
|
|
|
} auth_serversupplied_info;
|
|
|
|
struct auth_context {
|
|
DATA_BLOB challenge;
|
|
|
|
/* Who set this up in the first place? */
|
|
const char *challenge_set_by;
|
|
|
|
BOOL challenge_may_be_modified;
|
|
|
|
struct auth_methods *challenge_set_method;
|
|
/* What order are the various methods in? Try to stop it changing under us */
|
|
struct auth_methods *auth_method_list;
|
|
|
|
TALLOC_CTX *mem_ctx;
|
|
const uint8 *(*get_ntlm_challenge)(struct auth_context *auth_context);
|
|
NTSTATUS (*check_ntlm_password)(const struct auth_context *auth_context,
|
|
const struct auth_usersupplied_info *user_info,
|
|
struct auth_serversupplied_info **server_info);
|
|
NTSTATUS (*nt_status_squash)(NTSTATUS nt_status);
|
|
void (*free)(struct auth_context **auth_context);
|
|
};
|
|
|
|
typedef struct auth_methods
|
|
{
|
|
struct auth_methods *prev, *next;
|
|
const char *name; /* What name got this module */
|
|
|
|
NTSTATUS (*auth)(const struct auth_context *auth_context,
|
|
void *my_private_data,
|
|
TALLOC_CTX *mem_ctx,
|
|
const struct auth_usersupplied_info *user_info,
|
|
auth_serversupplied_info **server_info);
|
|
|
|
DATA_BLOB (*get_chal)(const struct auth_context *auth_context,
|
|
void **my_private_data,
|
|
TALLOC_CTX *mem_ctx);
|
|
|
|
/* Used to keep tabs on things like the cli for SMB server authentication */
|
|
void *private_data;
|
|
|
|
/* Function to clean up the above arbitary structure */
|
|
void (*free_private_data)(void **private_data);
|
|
|
|
/* Function to send a keepalive message on the above structure */
|
|
void (*send_keepalive)(void **private_data);
|
|
|
|
} auth_methods;
|
|
|
|
typedef NTSTATUS (*auth_init_function)(struct auth_context *, const char *, struct auth_methods **);
|
|
|
|
struct auth_init_function_entry {
|
|
const char *name;
|
|
/* Function to create a member of the authmethods list */
|
|
|
|
auth_init_function init;
|
|
|
|
struct auth_init_function_entry *prev, *next;
|
|
};
|
|
|
|
typedef struct auth_ntlmssp_state
|
|
{
|
|
TALLOC_CTX *mem_ctx;
|
|
struct auth_context *auth_context;
|
|
struct auth_serversupplied_info *server_info;
|
|
struct ntlmssp_state *ntlmssp_state;
|
|
} AUTH_NTLMSSP_STATE;
|
|
|
|
#define AUTH_INTERFACE_VERSION 1
|
|
|
|
#endif /* _SMBAUTH_H_ */
|