mirror of
https://github.com/samba-team/samba.git
synced 2024-12-28 07:21:54 +03:00
dc9f55dbec
This implements gensec for Samba's server side, and brings gensec up
to the standards of a full subsystem.
This means that use of the subsystem is by gensec_* functions, not
function pointers in structures (this is internal). This causes
changes in all the existing gensec users.
Our RPC server no longer contains it's own generalised security
scheme, and now calls gensec directly.
Gensec has also taken over the role of auth/auth_ntlmssp.c
An important part of gensec, is the output of the 'session_info'
struct. This is now reference counted, so that we can correctly free
it when a pipe is closed, no matter if it was inherited, or created by
per-pipe authentication.
The schannel code is reworked, to be in the same file for client and
server.
ntlm_auth is reworked to use gensec.
The major problem with this code is the way it relies on subsystem
auto-initialisation. The primary reason for this commit now.is to
allow these problems to be looked at, and fixed.
There are problems with the new code:
- I've tested it with smbtorture, but currently don't have VMware and
valgrind working (this I'll fix soon).
- The SPNEGO code is client-only at this point.
- We still do not do kerberos.
Andrew Bartlett
(This used to be commit 07fd885fd4
)
1119 lines
29 KiB
C
1119 lines
29 KiB
C
/*
|
|
Unix SMB/CIFS implementation.
|
|
|
|
server side dcerpc core code
|
|
|
|
Copyright (C) Andrew Tridgell 2003
|
|
Copyright (C) Stefan (metze) Metzmacher 2004
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 2 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program; if not, write to the Free Software
|
|
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
/*
|
|
see if two endpoints match
|
|
*/
|
|
static BOOL endpoints_match(const struct dcesrv_ep_description *ep1,
|
|
const struct dcesrv_ep_description *ep2)
|
|
{
|
|
if (ep1->type != ep2->type) {
|
|
return False;
|
|
}
|
|
|
|
switch (ep1->type) {
|
|
case ENDPOINT_SMB:
|
|
if (strcasecmp(ep1->info.smb_pipe,ep2->info.smb_pipe)==0) {
|
|
return True;
|
|
}
|
|
break;
|
|
case ENDPOINT_TCP:
|
|
if (ep1->info.tcp_port == ep2->info.tcp_port) {
|
|
return True;
|
|
}
|
|
break;
|
|
}
|
|
|
|
return False;
|
|
}
|
|
|
|
/*
|
|
find an endpoint in the dcesrv_context
|
|
*/
|
|
static struct dcesrv_endpoint *find_endpoint(struct dcesrv_context *dce_ctx,
|
|
const struct dcesrv_ep_description *ep_description)
|
|
{
|
|
struct dcesrv_endpoint *ep;
|
|
for (ep=dce_ctx->endpoint_list; ep; ep=ep->next) {
|
|
if (endpoints_match(&ep->ep_description, ep_description)) {
|
|
return ep;
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
see if a uuid and if_version match to an interface
|
|
*/
|
|
static BOOL interface_match(const struct dcesrv_interface *if1,
|
|
const struct dcesrv_interface *if2)
|
|
{
|
|
if (if1->ndr->if_version != if2->ndr->if_version) {
|
|
return False;
|
|
}
|
|
|
|
if (strcmp(if1->ndr->uuid, if2->ndr->uuid)==0) {
|
|
return True;
|
|
}
|
|
|
|
return False;
|
|
}
|
|
|
|
/*
|
|
find the interface operations on an endpoint
|
|
*/
|
|
static const struct dcesrv_interface *find_interface(const struct dcesrv_endpoint *endpoint,
|
|
const struct dcesrv_interface *iface)
|
|
{
|
|
struct dcesrv_if_list *ifl;
|
|
for (ifl=endpoint->interface_list; ifl; ifl=ifl->next) {
|
|
if (interface_match(&(ifl->iface), iface)) {
|
|
return &(ifl->iface);
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
see if a uuid and if_version match to an interface
|
|
*/
|
|
static BOOL interface_match_by_uuid(const struct dcesrv_interface *iface,
|
|
const char *uuid, uint32_t if_version)
|
|
{
|
|
if (iface->ndr->if_version != if_version) {
|
|
return False;
|
|
}
|
|
|
|
if (strcmp(iface->ndr->uuid, uuid)==0) {
|
|
return True;
|
|
}
|
|
|
|
return False;
|
|
}
|
|
|
|
/*
|
|
find the interface operations on an endpoint by uuid
|
|
*/
|
|
static const struct dcesrv_interface *find_interface_by_uuid(const struct dcesrv_endpoint *endpoint,
|
|
const char *uuid, uint32_t if_version)
|
|
{
|
|
struct dcesrv_if_list *ifl;
|
|
for (ifl=endpoint->interface_list; ifl; ifl=ifl->next) {
|
|
if (interface_match_by_uuid(&(ifl->iface), uuid, if_version)) {
|
|
return &(ifl->iface);
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
find a call that is pending in our call list
|
|
*/
|
|
static struct dcesrv_call_state *dcesrv_find_call(struct dcesrv_connection *dce_conn, uint16_t call_id)
|
|
{
|
|
struct dcesrv_call_state *c;
|
|
for (c=dce_conn->call_list;c;c=c->next) {
|
|
if (c->pkt.call_id == call_id) {
|
|
return c;
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
register an interface on an endpoint
|
|
*/
|
|
NTSTATUS dcesrv_interface_register(struct dcesrv_context *dce_ctx,
|
|
const char *ep_name,
|
|
const struct dcesrv_interface *iface,
|
|
const struct security_descriptor *sd)
|
|
{
|
|
struct dcesrv_ep_description ep_description;
|
|
struct dcesrv_endpoint *ep;
|
|
struct dcesrv_if_list *ifl;
|
|
BOOL tcp;
|
|
BOOL add_ep = False;
|
|
|
|
tcp = (strncasecmp(ep_name, "TCP-", 4) == 0);
|
|
|
|
if (tcp) {
|
|
ep_description.type = ENDPOINT_TCP;
|
|
ep_description.info.tcp_port = atoi(ep_name+4);
|
|
} else {
|
|
ep_description.type = ENDPOINT_SMB;
|
|
ep_description.info.smb_pipe = ep_name;
|
|
}
|
|
|
|
/* check if this endpoint exists
|
|
*/
|
|
if ((ep=find_endpoint(dce_ctx, &ep_description))==NULL) {
|
|
ep = talloc(dce_ctx->mem_ctx, sizeof(*ep));
|
|
if (!ep) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
ZERO_STRUCTP(ep);
|
|
if (tcp) {
|
|
ep->ep_description.type = ENDPOINT_TCP;
|
|
ep->ep_description.info.tcp_port = atoi(ep_name+4);
|
|
} else {
|
|
ep->ep_description.type = ENDPOINT_SMB;
|
|
ep->ep_description.info.smb_pipe = smb_xstrdup(ep_name);
|
|
}
|
|
add_ep = True;
|
|
}
|
|
|
|
/* see if the interface is already registered on te endpoint */
|
|
if (find_interface(ep, iface)!=NULL) {
|
|
DEBUG(0,("dcesrv_interface_register: interface '%s' already registered on endpoint '%s'\n",
|
|
iface->ndr->name, ep_name));
|
|
return NT_STATUS_OBJECT_NAME_COLLISION;
|
|
}
|
|
|
|
/* talloc a new interface list element */
|
|
ifl = talloc(dce_ctx->mem_ctx, sizeof(*ifl));
|
|
if (!ifl) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
/* copy the given interface struct to the one on the endpoints interface list */
|
|
memcpy(&(ifl->iface),iface, sizeof(struct dcesrv_interface));
|
|
|
|
/* if we have a security descriptor given,
|
|
* we should see if we can set it up on the endpoint
|
|
*/
|
|
if (sd != NULL) {
|
|
/* if there's currently no security descriptor given on the endpoint
|
|
* we try to set it
|
|
*/
|
|
if (ep->sd == NULL) {
|
|
ep->sd = copy_security_descriptor(dce_ctx->mem_ctx, sd);
|
|
}
|
|
|
|
/* if now there's no security descriptor given on the endpoint
|
|
* something goes wrong, either we failed to copy the security descriptor
|
|
* or there was already one on the endpoint
|
|
*/
|
|
if (ep->sd != NULL) {
|
|
DEBUG(0,("dcesrv_interface_register: interface '%s' failed to setup a security descriptor\n"
|
|
" on endpoint '%s'\n",
|
|
iface->ndr->name, ep_name));
|
|
if (add_ep) free(ep);
|
|
free(ifl);
|
|
return NT_STATUS_OBJECT_NAME_COLLISION;
|
|
}
|
|
}
|
|
|
|
/* finally add the interface on the endpoint */
|
|
DLIST_ADD(ep->interface_list, ifl);
|
|
|
|
/* if it's a new endpoint add it to the dcesrv_context */
|
|
if (add_ep) {
|
|
DLIST_ADD(dce_ctx->endpoint_list, ep);
|
|
}
|
|
|
|
DEBUG(4,("dcesrv_interface_register: interface '%s' registered on endpoint '%s'\n",
|
|
iface->ndr->name, ep_name));
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/*
|
|
connect to a dcerpc endpoint
|
|
*/
|
|
NTSTATUS dcesrv_endpoint_connect(struct dcesrv_context *dce_ctx,
|
|
const struct dcesrv_endpoint *ep,
|
|
struct dcesrv_connection **p)
|
|
{
|
|
TALLOC_CTX *mem_ctx;
|
|
|
|
mem_ctx = talloc_init("dcesrv_endpoint_connect");
|
|
if (!mem_ctx) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
*p = talloc_p(mem_ctx, struct dcesrv_connection);
|
|
if (! *p) {
|
|
talloc_destroy(mem_ctx);
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
(*p)->dce_ctx = dce_ctx;
|
|
(*p)->mem_ctx = mem_ctx;
|
|
(*p)->endpoint = ep;
|
|
(*p)->iface = NULL;
|
|
(*p)->private = NULL;
|
|
(*p)->call_list = NULL;
|
|
(*p)->cli_max_recv_frag = 0;
|
|
(*p)->handles = NULL;
|
|
(*p)->partial_input = data_blob(NULL, 0);
|
|
(*p)->auth_state.auth_info = NULL;
|
|
(*p)->auth_state.gensec_security = NULL;
|
|
(*p)->auth_state.session_info = NULL;
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/*
|
|
search and connect to a dcerpc endpoint
|
|
*/
|
|
NTSTATUS dcesrv_endpoint_search_connect(struct dcesrv_context *dce_ctx,
|
|
const struct dcesrv_ep_description *ep_description,
|
|
struct auth_session_info *session_info,
|
|
struct dcesrv_connection **dce_conn_p)
|
|
{
|
|
NTSTATUS status;
|
|
const struct dcesrv_endpoint *ep;
|
|
|
|
/* make sure this endpoint exists */
|
|
ep = find_endpoint(dce_ctx, ep_description);
|
|
if (!ep) {
|
|
return NT_STATUS_OBJECT_NAME_NOT_FOUND;
|
|
}
|
|
|
|
status = dcesrv_endpoint_connect(dce_ctx, ep, dce_conn_p);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return status;
|
|
}
|
|
|
|
session_info->refcount++;
|
|
(*dce_conn_p)->auth_state.session_info = session_info;
|
|
|
|
/* TODO: check security descriptor of the endpoint here
|
|
* if it's a smb named pipe
|
|
* if it's failed free dce_conn_p
|
|
*/
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
|
|
/*
|
|
disconnect a link to an endpoint
|
|
*/
|
|
void dcesrv_endpoint_disconnect(struct dcesrv_connection *p)
|
|
{
|
|
if (p->iface) {
|
|
p->iface->unbind(p, p->iface);
|
|
}
|
|
|
|
/* destroy any handles */
|
|
while (p->handles) {
|
|
dcesrv_handle_destroy(p, p->handles);
|
|
}
|
|
|
|
if (p->auth_state.gensec_security) {
|
|
gensec_end(&p->auth_state.gensec_security);
|
|
}
|
|
|
|
if (p->auth_state.session_info) {
|
|
free_session_info(&p->auth_state.session_info);
|
|
}
|
|
|
|
talloc_destroy(p->mem_ctx);
|
|
}
|
|
|
|
static void dcesrv_init_hdr(struct dcerpc_packet *pkt)
|
|
{
|
|
pkt->rpc_vers = 5;
|
|
pkt->rpc_vers_minor = 0;
|
|
if (lp_rpc_big_endian()) {
|
|
pkt->drep[0] = 0;
|
|
} else {
|
|
pkt->drep[0] = DCERPC_DREP_LE;
|
|
}
|
|
pkt->drep[1] = 0;
|
|
pkt->drep[2] = 0;
|
|
pkt->drep[3] = 0;
|
|
}
|
|
|
|
/*
|
|
return a dcerpc fault
|
|
*/
|
|
static NTSTATUS dcesrv_fault(struct dcesrv_call_state *call, uint32_t fault_code)
|
|
{
|
|
struct dcerpc_packet pkt;
|
|
struct dcesrv_call_reply *rep;
|
|
NTSTATUS status;
|
|
|
|
/* setup a bind_ack */
|
|
dcesrv_init_hdr(&pkt);
|
|
pkt.auth_length = 0;
|
|
pkt.call_id = call->pkt.call_id;
|
|
pkt.ptype = DCERPC_PKT_FAULT;
|
|
pkt.pfc_flags = DCERPC_PFC_FLAG_FIRST | DCERPC_PFC_FLAG_LAST;
|
|
pkt.u.fault.alloc_hint = 0;
|
|
pkt.u.fault.context_id = 0;
|
|
pkt.u.fault.cancel_count = 0;
|
|
pkt.u.fault.status = fault_code;
|
|
|
|
rep = talloc_p(call->mem_ctx, struct dcesrv_call_reply);
|
|
if (!rep) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
status = dcerpc_push_auth(&rep->data, call->mem_ctx, &pkt, NULL);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return status;
|
|
}
|
|
|
|
dcerpc_set_frag_length(&rep->data, rep->data.length);
|
|
|
|
DLIST_ADD_END(call->replies, rep, struct dcesrv_call_reply *);
|
|
DLIST_ADD_END(call->conn->call_list, call, struct dcesrv_call_state *);
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
|
|
/*
|
|
return a dcerpc bind_nak
|
|
*/
|
|
static NTSTATUS dcesrv_bind_nak(struct dcesrv_call_state *call, uint32_t reason)
|
|
{
|
|
struct dcerpc_packet pkt;
|
|
struct dcesrv_call_reply *rep;
|
|
NTSTATUS status;
|
|
|
|
/* setup a bind_nak */
|
|
dcesrv_init_hdr(&pkt);
|
|
pkt.auth_length = 0;
|
|
pkt.call_id = call->pkt.call_id;
|
|
pkt.ptype = DCERPC_PKT_BIND_NAK;
|
|
pkt.pfc_flags = DCERPC_PFC_FLAG_FIRST | DCERPC_PFC_FLAG_LAST;
|
|
pkt.u.bind_nak.reject_reason = reason;
|
|
pkt.u.bind_nak.num_versions = 0;
|
|
|
|
rep = talloc_p(call->mem_ctx, struct dcesrv_call_reply);
|
|
if (!rep) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
status = dcerpc_push_auth(&rep->data, call->mem_ctx, &pkt, NULL);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return status;
|
|
}
|
|
|
|
dcerpc_set_frag_length(&rep->data, rep->data.length);
|
|
|
|
DLIST_ADD_END(call->replies, rep, struct dcesrv_call_reply *);
|
|
DLIST_ADD_END(call->conn->call_list, call, struct dcesrv_call_state *);
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
|
|
/*
|
|
handle a bind request
|
|
*/
|
|
static NTSTATUS dcesrv_bind(struct dcesrv_call_state *call)
|
|
{
|
|
const char *uuid, *transfer_syntax;
|
|
uint32_t if_version, transfer_syntax_version;
|
|
struct dcerpc_packet pkt;
|
|
struct dcesrv_call_reply *rep;
|
|
NTSTATUS status;
|
|
uint32_t result=0, reason=0;
|
|
|
|
if (call->pkt.u.bind.num_contexts != 1 ||
|
|
call->pkt.u.bind.ctx_list[0].num_transfer_syntaxes < 1) {
|
|
return dcesrv_bind_nak(call, 0);
|
|
}
|
|
|
|
if_version = call->pkt.u.bind.ctx_list[0].abstract_syntax.if_version;
|
|
uuid = GUID_string(call->mem_ctx, &call->pkt.u.bind.ctx_list[0].abstract_syntax.uuid);
|
|
if (!uuid) {
|
|
return dcesrv_bind_nak(call, 0);
|
|
}
|
|
|
|
transfer_syntax_version = call->pkt.u.bind.ctx_list[0].transfer_syntaxes[0].if_version;
|
|
transfer_syntax = GUID_string(call->mem_ctx,
|
|
&call->pkt.u.bind.ctx_list[0].transfer_syntaxes[0].uuid);
|
|
if (!transfer_syntax ||
|
|
strcasecmp(NDR_GUID, transfer_syntax) != 0 ||
|
|
NDR_GUID_VERSION != transfer_syntax_version) {
|
|
/* we only do NDR encoded dcerpc */
|
|
return dcesrv_bind_nak(call, 0);
|
|
}
|
|
|
|
call->conn->iface = find_interface_by_uuid(call->conn->endpoint, uuid, if_version);
|
|
if (!call->conn->iface) {
|
|
DEBUG(2,("Request for unknown dcerpc interface %s/%d\n", uuid, if_version));
|
|
/* we don't know about that interface */
|
|
result = DCERPC_BIND_PROVIDER_REJECT;
|
|
reason = DCERPC_BIND_REASON_ASYNTAX;
|
|
}
|
|
|
|
if (call->conn->cli_max_recv_frag == 0) {
|
|
call->conn->cli_max_recv_frag = call->pkt.u.bind.max_recv_frag;
|
|
}
|
|
|
|
/* handle any authentication that is being requested */
|
|
if (!dcesrv_auth_bind(call)) {
|
|
/* TODO: work out the right reject code */
|
|
return dcesrv_bind_nak(call, 0);
|
|
}
|
|
|
|
/* setup a bind_ack */
|
|
dcesrv_init_hdr(&pkt);
|
|
pkt.auth_length = 0;
|
|
pkt.call_id = call->pkt.call_id;
|
|
pkt.ptype = DCERPC_PKT_BIND_ACK;
|
|
pkt.pfc_flags = DCERPC_PFC_FLAG_FIRST | DCERPC_PFC_FLAG_LAST;
|
|
pkt.u.bind_ack.max_xmit_frag = 0x2000;
|
|
pkt.u.bind_ack.max_recv_frag = 0x2000;
|
|
pkt.u.bind_ack.assoc_group_id = call->pkt.u.bind.assoc_group_id;
|
|
if (call->conn->iface && call->conn->iface->ndr) {
|
|
pkt.u.bind_ack.secondary_address = talloc_asprintf(call->mem_ctx, "\\PIPE\\%s",
|
|
call->conn->iface->ndr->name);
|
|
} else {
|
|
pkt.u.bind_ack.secondary_address = "";
|
|
}
|
|
pkt.u.bind_ack.num_results = 1;
|
|
pkt.u.bind_ack.ctx_list = talloc_p(call->mem_ctx, struct dcerpc_ack_ctx);
|
|
if (!pkt.u.bind_ack.ctx_list) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
pkt.u.bind_ack.ctx_list[0].result = result;
|
|
pkt.u.bind_ack.ctx_list[0].reason = reason;
|
|
GUID_from_string(NDR_GUID, &pkt.u.bind_ack.ctx_list[0].syntax.uuid);
|
|
pkt.u.bind_ack.ctx_list[0].syntax.if_version = NDR_GUID_VERSION;
|
|
pkt.u.bind_ack.auth_info = data_blob(NULL, 0);
|
|
|
|
if (!dcesrv_auth_bind_ack(call, &pkt)) {
|
|
return dcesrv_bind_nak(call, 0);
|
|
}
|
|
|
|
if (call->conn->iface) {
|
|
status = call->conn->iface->bind(call, call->conn->iface);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
DEBUG(2,("Request for dcerpc interface %s/%d rejected\n", uuid, if_version));
|
|
return status;
|
|
}
|
|
}
|
|
|
|
rep = talloc_p(call->mem_ctx, struct dcesrv_call_reply);
|
|
if (!rep) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
status = dcerpc_push_auth(&rep->data, call->mem_ctx, &pkt,
|
|
call->conn->auth_state.auth_info);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return status;
|
|
}
|
|
|
|
dcerpc_set_frag_length(&rep->data, rep->data.length);
|
|
|
|
DLIST_ADD_END(call->replies, rep, struct dcesrv_call_reply *);
|
|
DLIST_ADD_END(call->conn->call_list, call, struct dcesrv_call_state *);
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
|
|
/*
|
|
handle a auth3 request
|
|
*/
|
|
static NTSTATUS dcesrv_auth3(struct dcesrv_call_state *call)
|
|
{
|
|
/* handle the auth3 in the auth code */
|
|
if (!dcesrv_auth_auth3(call)) {
|
|
return dcesrv_fault(call, DCERPC_FAULT_OTHER);
|
|
}
|
|
|
|
talloc_destroy(call->mem_ctx);
|
|
|
|
/* we don't send a reply to a auth3 request, except by a
|
|
fault */
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
|
|
/*
|
|
handle a dcerpc request packet
|
|
*/
|
|
static NTSTATUS dcesrv_request(struct dcesrv_call_state *call)
|
|
{
|
|
struct ndr_pull *pull;
|
|
struct ndr_push *push;
|
|
uint16_t opnum;
|
|
void *r;
|
|
NTSTATUS status;
|
|
DATA_BLOB stub;
|
|
uint32_t total_length;
|
|
|
|
|
|
if (!call->conn->iface) {
|
|
return dcesrv_fault(call, DCERPC_FAULT_UNK_IF);
|
|
}
|
|
|
|
opnum = call->pkt.u.request.opnum;
|
|
|
|
if (opnum >= call->conn->iface->ndr->num_calls) {
|
|
return dcesrv_fault(call, DCERPC_FAULT_OP_RNG_ERROR);
|
|
}
|
|
|
|
pull = ndr_pull_init_blob(&call->pkt.u.request.stub_and_verifier, call->mem_ctx);
|
|
if (!pull) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
r = talloc(call->mem_ctx, call->conn->iface->ndr->calls[opnum].struct_size);
|
|
if (!r) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
if (!(call->pkt.drep[0] & DCERPC_DREP_LE)) {
|
|
pull->flags |= LIBNDR_FLAG_BIGENDIAN;
|
|
}
|
|
|
|
/* unravel the NDR for the packet */
|
|
status = call->conn->iface->ndr->calls[opnum].ndr_pull(pull, NDR_IN, r);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
dcerpc_log_packet(call->conn->iface->ndr, opnum, NDR_IN,
|
|
&call->pkt.u.request.stub_and_verifier);
|
|
return dcesrv_fault(call, DCERPC_FAULT_NDR);
|
|
}
|
|
|
|
call->fault_code = 0;
|
|
|
|
/* call the dispatch function */
|
|
status = call->conn->iface->dispatch(call, call->mem_ctx, r);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
dcerpc_log_packet(call->conn->iface->ndr, opnum, NDR_IN,
|
|
&call->pkt.u.request.stub_and_verifier);
|
|
return dcesrv_fault(call, call->fault_code);
|
|
}
|
|
|
|
/* form the reply NDR */
|
|
push = ndr_push_init_ctx(call->mem_ctx);
|
|
if (!push) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
if (lp_rpc_big_endian()) {
|
|
push->flags |= LIBNDR_FLAG_BIGENDIAN;
|
|
}
|
|
|
|
status = call->conn->iface->ndr->calls[opnum].ndr_push(push, NDR_OUT, r);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return dcesrv_fault(call, DCERPC_FAULT_NDR);
|
|
}
|
|
|
|
stub = ndr_push_blob(push);
|
|
|
|
total_length = stub.length;
|
|
|
|
do {
|
|
uint32_t length;
|
|
struct dcesrv_call_reply *rep;
|
|
struct dcerpc_packet pkt;
|
|
|
|
rep = talloc_p(call->mem_ctx, struct dcesrv_call_reply);
|
|
if (!rep) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
length = stub.length;
|
|
if (length + DCERPC_RESPONSE_LENGTH > call->conn->cli_max_recv_frag) {
|
|
/* the 32 is to cope with signing data */
|
|
length = call->conn->cli_max_recv_frag -
|
|
(DCERPC_MAX_SIGN_SIZE+DCERPC_RESPONSE_LENGTH);
|
|
}
|
|
|
|
/* form the dcerpc response packet */
|
|
dcesrv_init_hdr(&pkt);
|
|
pkt.auth_length = 0;
|
|
pkt.call_id = call->pkt.call_id;
|
|
pkt.ptype = DCERPC_PKT_RESPONSE;
|
|
pkt.pfc_flags = 0;
|
|
if (stub.length == total_length) {
|
|
pkt.pfc_flags |= DCERPC_PFC_FLAG_FIRST;
|
|
}
|
|
if (length == stub.length) {
|
|
pkt.pfc_flags |= DCERPC_PFC_FLAG_LAST;
|
|
}
|
|
pkt.u.response.alloc_hint = stub.length;
|
|
pkt.u.response.context_id = call->pkt.u.request.context_id;
|
|
pkt.u.response.cancel_count = 0;
|
|
pkt.u.response.stub_and_verifier.data = stub.data;
|
|
pkt.u.response.stub_and_verifier.length = length;
|
|
|
|
if (!dcesrv_auth_response(call, &rep->data, &pkt)) {
|
|
return dcesrv_fault(call, DCERPC_FAULT_OTHER);
|
|
}
|
|
|
|
dcerpc_set_frag_length(&rep->data, rep->data.length);
|
|
|
|
DLIST_ADD_END(call->replies, rep, struct dcesrv_call_reply *);
|
|
|
|
stub.data += length;
|
|
stub.length -= length;
|
|
} while (stub.length != 0);
|
|
|
|
DLIST_ADD_END(call->conn->call_list, call, struct dcesrv_call_state *);
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
|
|
/*
|
|
work out if we have a full packet yet
|
|
*/
|
|
static BOOL dce_full_packet(const DATA_BLOB *data)
|
|
{
|
|
if (data->length < DCERPC_FRAG_LEN_OFFSET+2) {
|
|
return False;
|
|
}
|
|
if (dcerpc_get_frag_length(data) > data->length) {
|
|
return False;
|
|
}
|
|
return True;
|
|
}
|
|
|
|
/*
|
|
we might have consumed only part of our input - advance past that part
|
|
*/
|
|
static void dce_partial_advance(struct dcesrv_connection *dce_conn, uint32_t offset)
|
|
{
|
|
DATA_BLOB blob;
|
|
|
|
if (dce_conn->partial_input.length == offset) {
|
|
data_blob_free(&dce_conn->partial_input);
|
|
return;
|
|
}
|
|
|
|
blob = dce_conn->partial_input;
|
|
dce_conn->partial_input = data_blob(blob.data + offset,
|
|
blob.length - offset);
|
|
data_blob_free(&blob);
|
|
}
|
|
|
|
/*
|
|
process some input to a dcerpc endpoint server.
|
|
*/
|
|
NTSTATUS dcesrv_input_process(struct dcesrv_connection *dce_conn)
|
|
{
|
|
struct ndr_pull *ndr;
|
|
TALLOC_CTX *mem_ctx;
|
|
NTSTATUS status;
|
|
struct dcesrv_call_state *call;
|
|
DATA_BLOB blob;
|
|
|
|
mem_ctx = talloc_init("dcesrv_input");
|
|
if (!mem_ctx) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
call = talloc_p(mem_ctx, struct dcesrv_call_state);
|
|
if (!call) {
|
|
talloc_free(dce_conn->mem_ctx, dce_conn->partial_input.data);
|
|
talloc_destroy(mem_ctx);
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
call->mem_ctx = mem_ctx;
|
|
call->conn = dce_conn;
|
|
call->replies = NULL;
|
|
|
|
blob = dce_conn->partial_input;
|
|
blob.length = dcerpc_get_frag_length(&blob);
|
|
|
|
ndr = ndr_pull_init_blob(&blob, mem_ctx);
|
|
if (!ndr) {
|
|
talloc_free(dce_conn->mem_ctx, dce_conn->partial_input.data);
|
|
talloc_destroy(mem_ctx);
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
if (!(CVAL(blob.data, DCERPC_DREP_OFFSET) & DCERPC_DREP_LE)) {
|
|
ndr->flags |= LIBNDR_FLAG_BIGENDIAN;
|
|
}
|
|
|
|
status = ndr_pull_dcerpc_packet(ndr, NDR_SCALARS|NDR_BUFFERS, &call->pkt);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
talloc_free(dce_conn->mem_ctx, dce_conn->partial_input.data);
|
|
talloc_destroy(mem_ctx);
|
|
return status;
|
|
}
|
|
|
|
dce_partial_advance(dce_conn, blob.length);
|
|
|
|
/* we have to check the signing here, before combining the
|
|
pdus */
|
|
if (call->pkt.ptype == DCERPC_PKT_REQUEST &&
|
|
!dcesrv_auth_request(call)) {
|
|
return dcesrv_fault(call, DCERPC_FAULT_OTHER);
|
|
}
|
|
|
|
/* see if this is a continued packet */
|
|
if (!(call->pkt.pfc_flags & DCERPC_PFC_FLAG_FIRST)) {
|
|
struct dcesrv_call_state *call2 = call;
|
|
uint32_t alloc_size;
|
|
|
|
/* we only allow fragmented requests, no other packet types */
|
|
if (call->pkt.ptype != DCERPC_PKT_REQUEST) {
|
|
return dcesrv_fault(call2, DCERPC_FAULT_OTHER);
|
|
}
|
|
|
|
/* this is a continuation of an existing call - find the call then
|
|
tack it on the end */
|
|
call = dcesrv_find_call(dce_conn, call2->pkt.call_id);
|
|
if (!call) {
|
|
return dcesrv_fault(call2, DCERPC_FAULT_OTHER);
|
|
}
|
|
|
|
if (call->pkt.ptype != call2->pkt.ptype) {
|
|
/* trying to play silly buggers are we? */
|
|
return dcesrv_fault(call2, DCERPC_FAULT_OTHER);
|
|
}
|
|
|
|
alloc_size = call->pkt.u.request.stub_and_verifier.length +
|
|
call2->pkt.u.request.stub_and_verifier.length;
|
|
if (call->pkt.u.request.alloc_hint > alloc_size) {
|
|
alloc_size = call->pkt.u.request.alloc_hint;
|
|
}
|
|
|
|
call->pkt.u.request.stub_and_verifier.data =
|
|
talloc_realloc(call->mem_ctx,
|
|
call->pkt.u.request.stub_and_verifier.data, alloc_size);
|
|
if (!call->pkt.u.request.stub_and_verifier.data) {
|
|
return dcesrv_fault(call2, DCERPC_FAULT_OTHER);
|
|
}
|
|
memcpy(call->pkt.u.request.stub_and_verifier.data +
|
|
call->pkt.u.request.stub_and_verifier.length,
|
|
call2->pkt.u.request.stub_and_verifier.data,
|
|
call2->pkt.u.request.stub_and_verifier.length);
|
|
call->pkt.u.request.stub_and_verifier.length +=
|
|
call2->pkt.u.request.stub_and_verifier.length;
|
|
|
|
call->pkt.pfc_flags |= (call2->pkt.pfc_flags & DCERPC_PFC_FLAG_LAST);
|
|
}
|
|
|
|
/* this may not be the last pdu in the chain - if its isn't then
|
|
just put it on the call_list and wait for the rest */
|
|
if (!(call->pkt.pfc_flags & DCERPC_PFC_FLAG_LAST)) {
|
|
DLIST_ADD_END(dce_conn->call_list, call, struct dcesrv_call_state *);
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
switch (call->pkt.ptype) {
|
|
case DCERPC_PKT_BIND:
|
|
status = dcesrv_bind(call);
|
|
break;
|
|
case DCERPC_PKT_AUTH3:
|
|
status = dcesrv_auth3(call);
|
|
break;
|
|
case DCERPC_PKT_REQUEST:
|
|
status = dcesrv_request(call);
|
|
break;
|
|
default:
|
|
status = NT_STATUS_INVALID_PARAMETER;
|
|
break;
|
|
}
|
|
|
|
/* if we are going to be sending a reply then add
|
|
it to the list of pending calls. We add it to the end to keep the call
|
|
list in the order we will answer */
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
talloc_destroy(mem_ctx);
|
|
}
|
|
|
|
return status;
|
|
}
|
|
|
|
|
|
/*
|
|
provide some input to a dcerpc endpoint server. This passes data
|
|
from a dcerpc client into the server
|
|
*/
|
|
NTSTATUS dcesrv_input(struct dcesrv_connection *dce_conn, const DATA_BLOB *data)
|
|
{
|
|
NTSTATUS status;
|
|
|
|
/* handle the very common case that the input contains a full packet and there
|
|
is no partial packet pending. In this case we can avoid a copy of the
|
|
data */
|
|
if (dce_conn->partial_input.length == 0) {
|
|
dce_conn->partial_input = *data;
|
|
/* make sure that dce_partial_advance doesn't free this data */
|
|
dce_conn->partial_input.free = NULL;
|
|
while (dce_full_packet(&dce_conn->partial_input)) {
|
|
status = dcesrv_input_process(dce_conn);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return status;
|
|
}
|
|
}
|
|
if (dce_conn->partial_input.length) {
|
|
/* there was some data left over. We have to copy this
|
|
as the caller may free the data */
|
|
dce_conn->partial_input =
|
|
data_blob(dce_conn->partial_input.data,
|
|
dce_conn->partial_input.length);
|
|
if (!dce_conn->partial_input.data) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
}
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
dce_conn->partial_input.data = Realloc(dce_conn->partial_input.data,
|
|
dce_conn->partial_input.length + data->length);
|
|
if (!dce_conn->partial_input.data) {
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
memcpy(dce_conn->partial_input.data + dce_conn->partial_input.length,
|
|
data->data, data->length);
|
|
dce_conn->partial_input.length += data->length;
|
|
|
|
while (dce_full_packet(&dce_conn->partial_input)) {
|
|
status = dcesrv_input_process(dce_conn);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return status;
|
|
}
|
|
}
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/*
|
|
retrieve some output from a dcerpc server
|
|
The caller supplies a function that will be called to do the
|
|
actual output.
|
|
|
|
The first argument to write_fn() will be 'private', the second will
|
|
be a pointer to a buffer containing the data to be sent and the 3rd
|
|
will be the number of bytes to be sent.
|
|
|
|
write_fn() should return the number of bytes successfully written.
|
|
|
|
this will return STATUS_BUFFER_OVERFLOW if there is more to be read
|
|
from the current fragment
|
|
*/
|
|
NTSTATUS dcesrv_output(struct dcesrv_connection *dce_conn,
|
|
void *private,
|
|
ssize_t (*write_fn)(void *, const void *, size_t))
|
|
{
|
|
struct dcesrv_call_state *call;
|
|
struct dcesrv_call_reply *rep;
|
|
ssize_t nwritten;
|
|
NTSTATUS status = NT_STATUS_OK;
|
|
|
|
call = dce_conn->call_list;
|
|
if (!call || !call->replies) {
|
|
return NT_STATUS_FOOBAR;
|
|
}
|
|
rep = call->replies;
|
|
|
|
nwritten = write_fn(private, rep->data.data, rep->data.length);
|
|
if (nwritten == -1) {
|
|
/* TODO: hmm, how do we cope with this? destroy the
|
|
connection perhaps? */
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
rep->data.length -= nwritten;
|
|
rep->data.data += nwritten;
|
|
|
|
if (rep->data.length == 0) {
|
|
/* we're done with this section of the call */
|
|
DLIST_REMOVE(call->replies, rep);
|
|
} else {
|
|
status = STATUS_BUFFER_OVERFLOW;
|
|
}
|
|
|
|
if (call->replies == NULL) {
|
|
/* we're done with the whole call */
|
|
DLIST_REMOVE(dce_conn->call_list, call);
|
|
talloc_destroy(call->mem_ctx);
|
|
}
|
|
|
|
return status;
|
|
}
|
|
|
|
|
|
/*
|
|
write_fn() for dcesrv_output_blob()
|
|
*/
|
|
static ssize_t dcesrv_output_blob_write_fn(void *private, const void *buf, size_t count)
|
|
{
|
|
DATA_BLOB *blob = private;
|
|
if (count < blob->length) {
|
|
blob->length = count;
|
|
}
|
|
memcpy(blob->data, buf, blob->length);
|
|
return blob->length;
|
|
}
|
|
|
|
/*
|
|
a simple wrapper for dcesrv_output() for when we want to output
|
|
into a data blob
|
|
*/
|
|
NTSTATUS dcesrv_output_blob(struct dcesrv_connection *dce_conn,
|
|
DATA_BLOB *blob)
|
|
{
|
|
return dcesrv_output(dce_conn, blob, dcesrv_output_blob_write_fn);
|
|
}
|
|
|
|
/*
|
|
initialise the dcerpc server context
|
|
*/
|
|
NTSTATUS dcesrv_init_context(struct dcesrv_context *dce_ctx)
|
|
{
|
|
int i;
|
|
const char **endpoint_servers = lp_dcerpc_endpoint_servers();
|
|
|
|
dce_ctx->mem_ctx = talloc_init("struct dcesrv_context");
|
|
if (!dce_ctx->mem_ctx) {
|
|
DEBUG(3,("dcesrv_init_context: talloc_init failed\n"));
|
|
return NT_STATUS_NO_MEMORY;
|
|
}
|
|
|
|
dce_ctx->endpoint_list = NULL;
|
|
|
|
if (!endpoint_servers) {
|
|
DEBUG(3,("dcesrv_init_context: no endpoint servers configured\n"));
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
for (i=0;endpoint_servers[i];i++) {
|
|
NTSTATUS ret;
|
|
const struct dcesrv_endpoint_server *ep_server;
|
|
|
|
ep_server = dcesrv_ep_server_byname(endpoint_servers[i]);
|
|
if (!ep_server) {
|
|
DEBUG(0,("dcesrv_init_context: failed to find endpoint server = '%s'\n", endpoint_servers[i]));
|
|
return NT_STATUS_UNSUCCESSFUL;
|
|
}
|
|
|
|
ret = ep_server->init_server(dce_ctx, ep_server);
|
|
if (!NT_STATUS_IS_OK(ret)) {
|
|
DEBUG(0,("dcesrv_init_context: failed to init endpoint server = '%s'\n", endpoint_servers[i]));
|
|
return ret;
|
|
}
|
|
}
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/* the list of currently registered DCERPC endpoint servers.
|
|
*/
|
|
static struct {
|
|
struct dcesrv_endpoint_server *ep_server;
|
|
} *ep_servers = NULL;
|
|
static int num_ep_servers;
|
|
|
|
/*
|
|
register a DCERPC endpoint server.
|
|
|
|
The 'name' can be later used by other backends to find the operations
|
|
structure for this backend.
|
|
|
|
The 'type' is used to specify whether this is for a disk, printer or IPC$ share
|
|
*/
|
|
static NTSTATUS dcerpc_register_ep_server(const void *_ep_server)
|
|
{
|
|
const struct dcesrv_endpoint_server *ep_server = _ep_server;
|
|
|
|
if (dcesrv_ep_server_byname(ep_server->name) != NULL) {
|
|
/* its already registered! */
|
|
DEBUG(0,("DCERPC endpoint server '%s' already registered\n",
|
|
ep_server->name));
|
|
return NT_STATUS_OBJECT_NAME_COLLISION;
|
|
}
|
|
|
|
ep_servers = Realloc(ep_servers, sizeof(ep_servers[0]) * (num_ep_servers+1));
|
|
if (!ep_servers) {
|
|
smb_panic("out of memory in dcerpc_register");
|
|
}
|
|
|
|
ep_servers[num_ep_servers].ep_server = smb_xmemdup(ep_server, sizeof(*ep_server));
|
|
ep_servers[num_ep_servers].ep_server->name = smb_xstrdup(ep_server->name);
|
|
|
|
num_ep_servers++;
|
|
|
|
DEBUG(3,("DCERPC endpoint server '%s' registered\n",
|
|
ep_server->name));
|
|
|
|
return NT_STATUS_OK;
|
|
}
|
|
|
|
/*
|
|
return the operations structure for a named backend of the specified type
|
|
*/
|
|
const struct dcesrv_endpoint_server *dcesrv_ep_server_byname(const char *name)
|
|
{
|
|
int i;
|
|
|
|
for (i=0;i<num_ep_servers;i++) {
|
|
if (strcmp(ep_servers[i].ep_server->name, name) == 0) {
|
|
return ep_servers[i].ep_server;
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
return the DCERPC module version, and the size of some critical types
|
|
This can be used by endpoint server modules to either detect compilation errors, or provide
|
|
multiple implementations for different smbd compilation options in one module
|
|
*/
|
|
const struct dcesrv_critical_sizes *dcerpc_module_version(void)
|
|
{
|
|
static const struct dcesrv_critical_sizes critical_sizes = {
|
|
DCERPC_MODULE_VERSION,
|
|
sizeof(struct dcesrv_context),
|
|
sizeof(struct dcesrv_endpoint),
|
|
sizeof(struct dcesrv_endpoint_server),
|
|
sizeof(struct dcesrv_ep_description),
|
|
sizeof(struct dcesrv_interface),
|
|
sizeof(struct dcesrv_if_list),
|
|
sizeof(struct dcesrv_connection),
|
|
sizeof(struct dcesrv_call_state),
|
|
sizeof(struct dcesrv_auth),
|
|
sizeof(struct dcesrv_handle)
|
|
};
|
|
|
|
return &critical_sizes;
|
|
}
|
|
|
|
/*
|
|
initialise the DCERPC subsystem
|
|
*/
|
|
BOOL dcesrv_init(void)
|
|
{
|
|
NTSTATUS status;
|
|
|
|
status = register_subsystem("dcerpc", dcerpc_register_ep_server);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
return False;
|
|
}
|
|
|
|
/* FIXME: Perhaps panic if a basic endpoint server, such as EPMAPER, fails to initialise? */
|
|
static_init_dcerpc;
|
|
|
|
DEBUG(3,("DCERPC subsystem version %d initialised\n", DCERPC_MODULE_VERSION));
|
|
return True;
|
|
}
|