2 * Copyright (c) 2000-2001 Boris Popov
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by Boris Popov.
16 * 4. Neither the name of the author nor the names of any co-contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 * Copyright (c) 2009, 2010, Oracle and/or its affiliates. All rights reserved.
35 * Copyright 2013 Nexenta Systems, Inc. All rights reserved.
39 * SMB Negotiate Protocol, and related.
52 #include <sys/types.h>
54 #include <sys/byteorder.h>
55 #include <sys/socket.h>
56 #include <sys/fcntl.h>
58 #include <netinet/in.h>
59 #include <netinet/tcp.h>
60 #include <arpa/inet.h>
62 #include <netsmb/smb.h>
63 #include <netsmb/smb_lib.h>
64 #include <netsmb/netbios.h>
65 #include <netsmb/nb_lib.h>
66 #include <netsmb/smb_dev.h>
69 #include "smb_crypt.h"
73 * SMB dialects that we know about.
79 static struct smb_dialect smb_dialects
[] = {
80 {SMB_DIALECT_CORE
, "PC NETWORK PROGRAM 1.0"},
81 {SMB_DIALECT_LANMAN1_0
, "LANMAN1.0"},
82 {SMB_DIALECT_LANMAN2_0
, "LM1.2X002"},
83 {SMB_DIALECT_LANMAN2_1
, "LANMAN2.1"},
84 {SMB_DIALECT_NTLM0_12
, "NT LM 0.12"},
88 #define SMB_DIALECT_MAX \
89 (sizeof (smb_dialects) / sizeof (struct smb_dialect) - 2)
91 static const uint32_t smb_clnt_caps_mask
=
99 * SMB Negotiate Protocol
100 * Based on code from the driver: smb_smb.c
102 * If using Extended Security, oblob (output)
103 * will hold the initial security "hint".
106 smb_negprot(struct smb_ctx
*ctx
, struct mbdata
*oblob
)
108 struct smb_sopt
*sv
= &ctx
->ct_sopt
;
109 struct smb_iods
*is
= &ctx
->ct_iods
;
112 struct smb_dialect
*dp
;
119 * Initialize: vc_hflags and vc_hflags2.
120 * Note: ctx->ct_hflags* are copied into the
121 * (per request) rqp->rq_hflags* by smb_rq_init.
123 * Like Windows, set FLAGS2_UNICODE in our first request,
124 * even though technically we don't yet know whether the
125 * server supports Unicode. Will clear this flag below
126 * if we find out it doesn't. Need to do this because
127 * some servers reject all non-Unicode requests.
131 SMB_FLAGS_CANONICAL_PATHNAMES
;
133 SMB_FLAGS2_KNOWS_LONG_NAMES
|
134 SMB_FLAGS2_KNOWS_EAS
|
135 /* SMB_FLAGS2_IS_LONG_NAME |? */
136 /* EXT_SEC (see below) */
137 SMB_FLAGS2_ERR_STATUS
|
141 * Sould we offer extended security?
142 * We'll turn this back off below if
143 * the server doesn't support it.
145 if (ctx
->ct_vopt
& SMBVOPT_EXT_SEC
)
146 ctx
->ct_hflags2
|= SMB_FLAGS2_EXT_SEC
;
149 * The initial UID needs to be zero,
150 * or Windows XP says "bad user".
151 * The initial TID is all ones, but
152 * we don't use it or store it here
153 * because the driver handles that.
158 * In case we're reconnecting,
159 * free previous stuff.
161 ctx
->ct_mac_seqno
= 0;
162 if (ctx
->ct_mackey
!= NULL
) {
163 free(ctx
->ct_mackey
);
164 ctx
->ct_mackey
= NULL
;
165 ctx
->ct_mackeylen
= 0;
169 bzero(sv
, sizeof (struct smb_sopt
));
171 err
= smb_rq_init(ctx
, SMB_COM_NEGOTIATE
, &rqp
);
176 * Build the SMB request.
179 mb_put_uint8(mbp
, 0); /* word count */
181 for (dp
= smb_dialects
; dp
->d_id
!= -1; dp
++) {
182 mb_put_uint8(mbp
, SMB_DT_DIALECT
);
183 mb_put_astring(mbp
, dp
->d_name
);
188 * This does the OTW call
190 err
= smb_rq_internal(ctx
, rqp
);
192 DPRINT("call failed, err %d", err
);
195 if (rqp
->rq_status
!= 0) {
196 DPRINT("nt status 0x%x", rqp
->rq_status
);
202 * Decode the response
204 * Comments to right show names as described in
205 * The Microsoft SMB Protocol spec. [MS-SMB]
209 (void) md_get_uint8(mbp
, &wc
);
210 err
= md_get_uint16le(mbp
, &dindex
);
211 if (err
|| dindex
> SMB_DIALECT_MAX
) {
212 DPRINT("err %d dindex %d", err
, (int)dindex
);
215 dp
= smb_dialects
+ dindex
;
216 sv
->sv_proto
= dp
->d_id
;
217 DPRINT("Dialect %s", dp
->d_name
);
218 if (dp
->d_id
< SMB_DIALECT_NTLM0_12
) {
219 /* XXX: User-visible warning too? */
220 DPRINT("old dialect %s", dp
->d_name
);
224 DPRINT("bad wc %d", (int)wc
);
227 md_get_uint8(mbp
, &sv
->sv_sm
); /* SecurityMode */
228 md_get_uint16le(mbp
, &sv
->sv_maxmux
); /* MaxMpxCount */
229 md_get_uint16le(mbp
, &sv
->sv_maxvcs
); /* MaxCountVCs */
230 md_get_uint32le(mbp
, &sv
->sv_maxtx
); /* MaxBufferSize */
231 md_get_uint32le(mbp
, &sv
->sv_maxraw
); /* MaxRawSize */
232 md_get_uint32le(mbp
, &sv
->sv_skey
); /* SessionKey */
233 md_get_uint32le(mbp
, &sv
->sv_caps
); /* Capabilities */
234 md_get_mem(mbp
, NULL
, 8, MB_MSYSTEM
); /* SystemTime(s) */
235 md_get_uint16le(mbp
, (uint16_t *)&sv
->sv_tz
);
236 md_get_uint8(mbp
, &eklen
); /* EncryptionKeyLength */
237 err
= md_get_uint16le(mbp
, &bc
); /* ByteCount */
243 * Will we do SMB signing? Or block the connection?
244 * The table below describes this logic. References:
245 * [Windows Server Protocols: MS-SMB, sec. 3.2.4.2.3]
246 * http://msdn.microsoft.com/en-us/library/cc212511.aspx
247 * http://msdn.microsoft.com/en-us/library/cc212929.aspx
249 * Srv/Cli | Required | Enabled | If Required | Disabled
250 * ------------+----------+------------+-------------+-----------
251 * Required | Signed | Signed | Signed | Blocked [1]
252 * ------------+----------+------------+-------------+-----------
253 * Enabled | Signed | Signed | Not Signed | Not Signed
254 * ------------+----------+------------+-------------+-----------
255 * If Required | Signed | Not Signed | Not Signed | Not Signed
256 * ------------+----------+------------+-------------+-----------
257 * Disabled | Blocked | Not Signed | Not Signed | Not Signed
259 * [1] Like Windows 2003 and later, we don't really implement
260 * the "Disabled" setting. Instead we implement "If Required",
261 * so we always sign if the server requires signing.
265 if (sv
->sv_sm
& SMB_SM_SIGS_REQUIRE
) {
267 * Server requires signing. We will sign,
268 * even if local setting is "disabled".
271 } else if (sv
->sv_sm
& SMB_SM_SIGS
) {
273 * Server enables signing (client's option).
274 * If enabled locally, do signing.
276 if (ctx
->ct_vopt
& SMBVOPT_SIGNING_ENABLED
)
278 /* else not signing. */
281 * Server does not support signing.
282 * If we "require" it, bail now.
284 if (ctx
->ct_vopt
& SMBVOPT_SIGNING_REQUIRED
) {
285 DPRINT("Client requires signing "
286 "but server has it disabled.");
293 ctx
->ct_vcflags
|= SMBV_WILL_SIGN
;
295 DPRINT("Security signatures: %d", will_sign
);
297 /* See comment above re. FLAGS2_UNICODE */
298 if (sv
->sv_caps
& SMB_CAP_UNICODE
)
299 ctx
->ct_vcflags
|= SMBV_UNICODE
;
301 ctx
->ct_hflags2
&= ~SMB_FLAGS2_UNICODE
;
303 if ((sv
->sv_caps
& SMB_CAP_STATUS32
) == 0) {
305 * They don't do NT error codes.
307 * If we send requests with
308 * SMB_FLAGS2_ERR_STATUS set in
309 * Flags2, Windows 98, at least,
310 * appears to send replies with that
311 * bit set even though it sends back
312 * DOS error codes. (They probably
313 * just use the request header as
314 * a template for the reply header,
315 * and don't bother clearing that bit.)
317 * Therefore, we clear that bit in
318 * our vc_hflags2 field.
320 ctx
->ct_hflags2
&= ~SMB_FLAGS2_ERR_STATUS
;
322 if (dp
->d_id
== SMB_DIALECT_NTLM0_12
&&
323 sv
->sv_maxtx
< 4096 &&
324 (sv
->sv_caps
& SMB_CAP_NT_SMBS
) == 0) {
325 ctx
->ct_vcflags
|= SMBV_WIN95
;
326 DPRINT("Win95 detected");
330 * The rest of the message varies depending on
331 * whether we've negotiated "extended security".
333 * With extended security, we have:
334 * Server_GUID (length 16)
337 * EncryptionKey (length is eklen)
340 if (sv
->sv_caps
& SMB_CAP_EXT_SECURITY
) {
342 DPRINT("Ext.Security: yes");
345 * Skip the server GUID.
347 err
= md_get_mem(mbp
, NULL
, SMB_GUIDLEN
, MB_MSYSTEM
);
351 * Remainder is the security blob.
352 * Note: eklen "must be ignored" [MS-SMB]
354 len
= (int)bc
- SMB_GUIDLEN
;
359 * Get the (optional) SPNEGO "hint".
361 err
= md_get_mbuf(mbp
, len
, &m
);
365 oblob
->mb_count
= len
;
367 DPRINT("Ext.Security: no");
368 ctx
->ct_hflags2
&= ~SMB_FLAGS2_EXT_SEC
;
371 * Save the "Encryption Key" (the challenge).
373 * Sanity check: make sure the sec. blob length
374 * isn't bigger than the byte count.
376 if (bc
< eklen
|| eklen
< NTLM_CHAL_SZ
) {
380 err
= md_get_mem(mbp
, ctx
->ct_srv_chal
,
381 NTLM_CHAL_SZ
, MB_MSYSTEM
);
383 * Server domain follows (ignored)
384 * Note: NOT aligned(2) - unusual!
391 * A few sanity checks on what we received,
392 * becuse we will send these in ssnsetup.
394 * Maximum outstanding requests (we care),
395 * and Max. VCs (we only use one). Also,
396 * MaxBufferSize lower limit per spec.
398 if (sv
->sv_maxmux
< 1)
400 if (sv
->sv_maxvcs
< 1)
402 if (sv
->sv_maxtx
< 1024)
406 * Maximum transfer size.
409 * Let's be conservative about an upper limit here.
410 * Win2k uses 16644 (and others) so 32k should be a
411 * reasonable sanity limit for this value.
413 * Note that this limit does NOT affect READX/WRITEX
414 * with CAP_LARGE_..., which we nearly always use.
416 is
->is_txmax
= sv
->sv_maxtx
;
417 if (is
->is_txmax
> 0x8000)
418 is
->is_txmax
= 0x8000;
421 * Max read/write sizes, WITHOUT overhead.
422 * This is just the payload size, so we must
423 * leave room for the SMB headers, etc.
424 * This is just the ct_txmax value, but
425 * reduced and rounded down. Tricky bit:
427 * Servers typically give us a value that's
428 * some nice "round" number, i.e 0x4000 plus
429 * some overhead, i.e. Win2k: 16644==0x4104
430 * Subtract for the SMB header (32) and the
431 * SMB command word and byte vectors (34?),
432 * then round down to a 512 byte multiple.
434 len
= is
->is_txmax
- 68;
436 /* XXX: Not sure yet which of these to keep. */
442 * Most of the "capability" bits we offer in session setup
443 * are just copied from those offered by the server.
445 ctx
->ct_clnt_caps
= sv
->sv_caps
& smb_clnt_caps_mask
;
447 /* Get the client nonce. */
448 (void) smb_get_urandom(ctx
->ct_clnonce
, NTLM_CHAL_SZ
);