s3: smbd: Remove unused and commented out check_path_syntax_smb2_msdfs().
[Samba.git] / auth / ntlmssp / ntlmssp_util.c
blob6f3b474fd713d2be213acc8c93201d9dd4b3de0e
1 /*
2 Unix SMB/Netbios implementation.
3 Version 3.0
4 handle NLTMSSP, server side
6 Copyright (C) Andrew Tridgell 2001
7 Copyright (C) Andrew Bartlett 2001-2003
8 Copyright (C) Andrew Bartlett 2005 (Updated from gensec).
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "includes.h"
25 #include "../auth/ntlmssp/ntlmssp.h"
26 #include "../auth/ntlmssp/ntlmssp_private.h"
28 #undef DBGC_CLASS
29 #define DBGC_CLASS DBGC_AUTH
31 static void debug_ntlmssp_flags_raw(int level, uint32_t flags)
33 #define _PRINT_FLAG_LINE(v) do { \
34 if (flags & (v)) { \
35 DEBUGADD(level, (" " #v "\n")); \
36 } \
37 } while (0)
38 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_UNICODE);
39 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_OEM);
40 _PRINT_FLAG_LINE(NTLMSSP_REQUEST_TARGET);
41 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_SIGN);
42 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_SEAL);
43 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_DATAGRAM);
44 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_LM_KEY);
45 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_NETWARE);
46 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_NTLM);
47 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_NT_ONLY);
48 _PRINT_FLAG_LINE(NTLMSSP_ANONYMOUS);
49 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED);
50 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED);
51 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL);
52 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_ALWAYS_SIGN);
53 _PRINT_FLAG_LINE(NTLMSSP_TARGET_TYPE_DOMAIN);
54 _PRINT_FLAG_LINE(NTLMSSP_TARGET_TYPE_SERVER);
55 _PRINT_FLAG_LINE(NTLMSSP_TARGET_TYPE_SHARE);
56 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY);
57 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_IDENTIFY);
58 _PRINT_FLAG_LINE(NTLMSSP_REQUEST_NON_NT_SESSION_KEY);
59 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_TARGET_INFO);
60 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_VERSION);
61 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_128);
62 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_KEY_EXCH);
63 _PRINT_FLAG_LINE(NTLMSSP_NEGOTIATE_56);
66 /**
67 * Print out the NTLMSSP flags for debugging
68 * @param neg_flags The flags from the packet
70 void debug_ntlmssp_flags(uint32_t neg_flags)
72 DEBUG(3,("Got NTLMSSP neg_flags=0x%08x\n", neg_flags));
73 debug_ntlmssp_flags_raw(4, neg_flags);
76 NTSTATUS ntlmssp_handle_neg_flags(struct ntlmssp_state *ntlmssp_state,
77 uint32_t flags, const char *name)
79 uint32_t missing_flags = ntlmssp_state->required_flags;
81 if (ntlmssp_state->use_ntlmv2) {
83 * Using NTLMv2 as a client implies
84 * using NTLMSSP_NEGOTIATE_NTLM2
85 * (NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY)
87 * Note that 'use_ntlmv2' is only set
88 * true in the client case.
90 * Even if the server has a bug and does not announce
91 * it, we need to assume it's present.
93 * Note that we also have the flag
94 * in ntlmssp_state->required_flags,
95 * see gensec_ntlmssp_client_start().
97 * See bug #12862.
99 flags |= NTLMSSP_NEGOTIATE_NTLM2;
102 if (flags & NTLMSSP_NEGOTIATE_UNICODE) {
103 ntlmssp_state->neg_flags |= NTLMSSP_NEGOTIATE_UNICODE;
104 ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_OEM;
105 ntlmssp_state->unicode = true;
106 } else {
107 ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_UNICODE;
108 ntlmssp_state->neg_flags |= NTLMSSP_NEGOTIATE_OEM;
109 ntlmssp_state->unicode = false;
113 * NTLMSSP_NEGOTIATE_NTLM2 (NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY)
114 * has priority over NTLMSSP_NEGOTIATE_LM_KEY
116 if (!(flags & NTLMSSP_NEGOTIATE_NTLM2)) {
117 ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_NTLM2;
120 if (ntlmssp_state->neg_flags & NTLMSSP_NEGOTIATE_NTLM2) {
121 ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_LM_KEY;
124 if (!(flags & NTLMSSP_NEGOTIATE_LM_KEY)) {
125 ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_LM_KEY;
128 if (!(flags & NTLMSSP_NEGOTIATE_ALWAYS_SIGN)) {
129 ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_ALWAYS_SIGN;
132 if (!(flags & NTLMSSP_NEGOTIATE_128)) {
133 ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_128;
136 if (!(flags & NTLMSSP_NEGOTIATE_56)) {
137 ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_56;
140 if (!(flags & NTLMSSP_NEGOTIATE_KEY_EXCH)) {
141 ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_KEY_EXCH;
144 if (!(flags & NTLMSSP_NEGOTIATE_SIGN)) {
145 ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_SIGN;
148 if (!(flags & NTLMSSP_NEGOTIATE_SEAL)) {
149 ntlmssp_state->neg_flags &= ~NTLMSSP_NEGOTIATE_SEAL;
152 if ((flags & NTLMSSP_REQUEST_TARGET)) {
153 ntlmssp_state->neg_flags |= NTLMSSP_REQUEST_TARGET;
156 missing_flags &= ~ntlmssp_state->neg_flags;
157 if (missing_flags != 0) {
158 HRESULT hres = HRES_SEC_E_UNSUPPORTED_FUNCTION;
159 NTSTATUS status = NT_STATUS(HRES_ERROR_V(hres));
160 DEBUG(1, ("%s: Got %s flags[0x%08x] "
161 "- possible downgrade detected! "
162 "missing_flags[0x%08x] - %s\n",
163 __func__, name,
164 (unsigned)flags,
165 (unsigned)missing_flags,
166 nt_errstr(status)));
167 debug_ntlmssp_flags_raw(1, missing_flags);
168 DEBUGADD(4, ("neg_flags[0x%08x]\n",
169 (unsigned)ntlmssp_state->neg_flags));
170 debug_ntlmssp_flags_raw(4, ntlmssp_state->neg_flags);
171 return status;
174 return NT_STATUS_OK;
177 /* Does this blob looks like it could be NTLMSSP? */
178 bool ntlmssp_blob_matches_magic(const DATA_BLOB *blob)
180 if (blob->length > 8 && memcmp("NTLMSSP\0", blob->data, 8) == 0) {
181 return true;
182 } else {
183 return false;
187 const DATA_BLOB ntlmssp_version_blob(void)
190 * This is a simplified version of
192 * enum ndr_err_code err;
193 * struct ntlmssp_VERSION vers;
195 * ZERO_STRUCT(vers);
196 * vers.ProductMajorVersion = NTLMSSP_WINDOWS_MAJOR_VERSION_6;
197 * vers.ProductMinorVersion = NTLMSSP_WINDOWS_MINOR_VERSION_1;
198 * vers.ProductBuild = 0;
199 * vers.NTLMRevisionCurrent = NTLMSSP_REVISION_W2K3;
201 * err = ndr_push_struct_blob(&version_blob,
202 * ntlmssp_state,
203 * &vers,
204 * (ndr_push_flags_fn_t)ndr_push_ntlmssp_VERSION);
206 * if (!NDR_ERR_CODE_IS_SUCCESS(err)) {
207 * data_blob_free(&struct_blob);
208 * return NT_STATUS_NO_MEMORY;
211 static const uint8_t version_buffer[8] = {
212 NTLMSSP_WINDOWS_MAJOR_VERSION_6,
213 NTLMSSP_WINDOWS_MINOR_VERSION_1,
214 0x00, 0x00, /* product build */
215 0x00, 0x00, 0x00, /* reserved */
216 NTLMSSP_REVISION_W2K3
219 return data_blob_const(version_buffer, ARRAY_SIZE(version_buffer));