FreeRDP/libfreerdp/core/nla.c

1787 lines
41 KiB
C
Raw Normal View History

/**
2017-05-11 19:51:45 +03:00
* FreeRDP: A Remote Desktop Protocol Implementation
* Network Level Authentication (NLA)
*
* Copyright 2010-2012 Marc-Andre Moreau <marcandre.moreau@gmail.com>
* Copyright 2015 Thincast Technologies GmbH
* Copyright 2015 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
* Copyright 2016 Martin Fleisz <martin.fleisz@thincast.com>
2017-05-11 19:51:45 +03:00
* Copyright 2017 Dorian Ducournau <dorian.ducournau@gmail.com>
2022-02-05 01:59:16 +03:00
* Copyright 2022 David Fort <contact@hardening-consulting.com>
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
2022-02-16 13:20:38 +03:00
#include <freerdp/config.h>
#include <time.h>
2022-02-05 01:59:16 +03:00
#include <ctype.h>
2014-08-19 20:26:39 +04:00
#include <freerdp/log.h>
#include <freerdp/build-config.h>
#include <winpr/crt.h>
#include <winpr/assert.h>
#include <winpr/sam.h>
#include <winpr/sspi.h>
#include <winpr/print.h>
#include <winpr/tchar.h>
2022-02-02 01:23:34 +03:00
#include <winpr/ncrypt.h>
#include <winpr/cred.h>
2022-02-05 01:59:16 +03:00
#include <winpr/debug.h>
2022-07-14 23:19:38 +03:00
#include <winpr/asn1.h>
#include "../crypto/tls.h"
#include "nla.h"
#include "utils.h"
#include "credssp_auth.h"
2022-02-23 18:26:14 +03:00
#include <freerdp/utils/smartcardlogon.h>
2015-02-15 19:10:14 +03:00
#define TAG FREERDP_TAG("core.nla")
2014-08-19 20:26:39 +04:00
2019-11-06 17:24:51 +03:00
#define SERVER_KEY "Software\\" FREERDP_VENDOR_STRING "\\" FREERDP_PRODUCT_STRING "\\Server"
2022-10-07 17:23:30 +03:00
#define NLA_AUTH_PKG NEGO_SSP_NAME
2022-10-07 15:09:44 +03:00
/**
* TSRequest ::= SEQUENCE {
* version [0] INTEGER,
* negoTokens [1] NegoData OPTIONAL,
* authInfo [2] OCTET STRING OPTIONAL,
* pubKeyAuth [3] OCTET STRING OPTIONAL,
* errorCode [4] INTEGER OPTIONAL
* }
*
* NegoData ::= SEQUENCE OF NegoDataItem
*
* NegoDataItem ::= SEQUENCE {
* negoToken [0] OCTET STRING
* }
*
* TSCredentials ::= SEQUENCE {
* credType [0] INTEGER,
* credentials [1] OCTET STRING
* }
*
* TSPasswordCreds ::= SEQUENCE {
* domainName [0] OCTET STRING,
* userName [1] OCTET STRING,
* password [2] OCTET STRING
* }
*
* TSSmartCardCreds ::= SEQUENCE {
* pin [0] OCTET STRING,
* cspData [1] TSCspDataDetail,
* userHint [2] OCTET STRING OPTIONAL,
* domainHint [3] OCTET STRING OPTIONAL
* }
*
* TSCspDataDetail ::= SEQUENCE {
* keySpec [0] INTEGER,
* cardName [1] OCTET STRING OPTIONAL,
* readerName [2] OCTET STRING OPTIONAL,
* containerName [3] OCTET STRING OPTIONAL,
* cspName [4] OCTET STRING OPTIONAL
* }
*
*/
#define NLA_PKG_NAME CREDSSP_AUTH_PKG_SPNEGO
2018-11-20 18:48:59 +03:00
struct rdp_nla
{
BOOL server;
NLA_STATE state;
ULONG sendSeqNum;
ULONG recvSeqNum;
rdpContext* rdpcontext;
2018-11-20 18:48:59 +03:00
rdpTransport* transport;
UINT32 version;
UINT32 peerVersion;
UINT32 errorCode;
/* Lifetime of buffer nla_new -> nla_free */
SecBuffer ClientNonce; /* Depending on protocol version a random nonce or a value read from the
server. */
2018-11-20 18:48:59 +03:00
SecBuffer negoToken;
SecBuffer pubKeyAuth;
SecBuffer authInfo;
SecBuffer PublicKey;
SecBuffer tsCredentials;
2018-11-20 18:48:59 +03:00
SEC_WINNT_AUTH_IDENTITY* identity;
rdpCredsspAuth* auth;
char* pkinitArgs;
SmartcardCertInfo* smartcardCert;
BYTE certSha1[20];
2018-11-20 18:48:59 +03:00
};
static BOOL nla_send(rdpNla* nla);
static int nla_server_recv(rdpNla* nla);
static BOOL nla_encrypt_public_key_echo(rdpNla* nla);
static BOOL nla_encrypt_public_key_hash(rdpNla* nla);
static BOOL nla_decrypt_public_key_echo(rdpNla* nla);
static BOOL nla_decrypt_public_key_hash(rdpNla* nla);
static BOOL nla_encrypt_ts_credentials(rdpNla* nla);
static BOOL nla_decrypt_ts_credentials(rdpNla* nla);
static void nla_buffer_free(rdpNla* nla)
{
WINPR_ASSERT(nla);
sspi_SecBufferFree(&nla->pubKeyAuth);
sspi_SecBufferFree(&nla->authInfo);
sspi_SecBufferFree(&nla->negoToken);
sspi_SecBufferFree(&nla->ClientNonce);
sspi_SecBufferFree(&nla->PublicKey);
}
static BOOL nla_Digest_Update_From_SecBuffer(WINPR_DIGEST_CTX* ctx, const SecBuffer* buffer)
{
if (!buffer)
return FALSE;
return winpr_Digest_Update(ctx, buffer->pvBuffer, buffer->cbBuffer);
}
static BOOL nla_sec_buffer_alloc(SecBuffer* buffer, size_t size)
{
2023-01-26 14:56:42 +03:00
WINPR_ASSERT(buffer);
sspi_SecBufferFree(buffer);
2023-01-26 14:56:42 +03:00
if (size > ULONG_MAX)
return FALSE;
if (!sspi_SecBufferAlloc(buffer, (ULONG)size))
return FALSE;
WINPR_ASSERT(buffer);
buffer->BufferType = SECBUFFER_TOKEN;
return TRUE;
}
static BOOL nla_sec_buffer_alloc_from_data(SecBuffer* buffer, const BYTE* data, size_t offset,
size_t size)
{
if (!nla_sec_buffer_alloc(buffer, offset + size))
return FALSE;
WINPR_ASSERT(buffer);
2023-01-26 14:56:42 +03:00
BYTE* pb = buffer->pvBuffer;
memcpy(&pb[offset], data, size);
return TRUE;
}
2018-03-21 13:30:02 +03:00
/* CredSSP Client-To-Server Binding Hash\0 */
2019-11-06 17:24:51 +03:00
static const BYTE ClientServerHashMagic[] = { 0x43, 0x72, 0x65, 0x64, 0x53, 0x53, 0x50, 0x20,
0x43, 0x6C, 0x69, 0x65, 0x6E, 0x74, 0x2D, 0x54,
0x6F, 0x2D, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72,
0x20, 0x42, 0x69, 0x6E, 0x64, 0x69, 0x6E, 0x67,
0x20, 0x48, 0x61, 0x73, 0x68, 0x00 };
2018-03-21 13:30:02 +03:00
/* CredSSP Server-To-Client Binding Hash\0 */
2019-11-06 17:24:51 +03:00
static const BYTE ServerClientHashMagic[] = { 0x43, 0x72, 0x65, 0x64, 0x53, 0x53, 0x50, 0x20,
0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x2D, 0x54,
0x6F, 0x2D, 0x43, 0x6C, 0x69, 0x65, 0x6E, 0x74,
0x20, 0x42, 0x69, 0x6E, 0x64, 0x69, 0x6E, 0x67,
0x20, 0x48, 0x61, 0x73, 0x68, 0x00 };
2018-03-21 13:30:02 +03:00
static const UINT32 NonceLength = 32;
2022-02-02 01:23:34 +03:00
static BOOL nla_adjust_settings_from_smartcard(rdpNla* nla)
{
2022-02-02 01:23:34 +03:00
BOOL ret = FALSE;
WINPR_ASSERT(nla);
WINPR_ASSERT(nla->rdpcontext);
2023-01-26 14:56:42 +03:00
rdpSettings* settings = nla->rdpcontext->settings;
WINPR_ASSERT(settings);
if (!settings->SmartcardLogon)
return TRUE;
smartcardCertInfo_Free(nla->smartcardCert);
if (!smartcard_getCert(nla->rdpcontext, &nla->smartcardCert, FALSE))
2022-02-02 01:23:34 +03:00
{
WLog_ERR(TAG, "unable to get smartcard certificate for logon");
2022-02-02 01:23:34 +03:00
return FALSE;
}
2022-10-07 15:09:44 +03:00
if (!settings->CspName)
{
if (nla->smartcardCert->csp && !freerdp_settings_set_string_from_utf16(
settings, FreeRDP_CspName, nla->smartcardCert->csp))
2022-10-07 15:09:44 +03:00
{
WLog_ERR(TAG, "unable to set CSP name");
goto out;
}
else if (!freerdp_settings_set_string(settings, FreeRDP_CspName, MS_SCARD_PROV_A))
2022-10-07 15:09:44 +03:00
{
WLog_ERR(TAG, "unable to set CSP name");
goto out;
}
}
if (!settings->ReaderName && nla->smartcardCert->reader)
2022-02-02 01:23:34 +03:00
{
if (!freerdp_settings_set_string_from_utf16(settings, FreeRDP_ReaderName,
nla->smartcardCert->reader))
2022-02-02 01:23:34 +03:00
{
WLog_ERR(TAG, "unable to copy reader name");
goto out;
}
}
if (!settings->ContainerName && nla->smartcardCert->containerName)
2022-02-02 01:23:34 +03:00
{
if (!freerdp_settings_set_string_from_utf16(settings, FreeRDP_ContainerName,
nla->smartcardCert->containerName))
2022-02-02 01:23:34 +03:00
{
WLog_ERR(TAG, "unable to copy container name");
goto out;
}
}
memcpy(nla->certSha1, nla->smartcardCert->sha1Hash, sizeof(nla->certSha1));
2022-02-02 01:23:34 +03:00
if (nla->smartcardCert->pkinitArgs)
2022-02-02 01:23:34 +03:00
{
nla->pkinitArgs = _strdup(nla->smartcardCert->pkinitArgs);
if (!nla->pkinitArgs)
2022-02-02 01:23:34 +03:00
{
WLog_ERR(TAG, "unable to copy pkinitArgs");
goto out;
}
}
ret = TRUE;
out:
return ret;
}
static BOOL nla_client_setup_identity(rdpNla* nla)
{
BOOL PromptPassword = FALSE;
WINPR_ASSERT(nla);
WINPR_ASSERT(nla->rdpcontext);
2022-02-02 01:23:34 +03:00
2023-01-26 14:56:42 +03:00
rdpSettings* settings = nla->rdpcontext->settings;
WINPR_ASSERT(settings);
2022-02-02 01:23:34 +03:00
2023-01-26 14:56:42 +03:00
freerdp* instance = nla->rdpcontext->instance;
WINPR_ASSERT(instance);
2022-02-02 01:23:34 +03:00
/* */
if ((utils_str_is_empty(settings->Username) ||
(utils_str_is_empty(settings->Password) &&
utils_str_is_empty((const char*)settings->RedirectionPassword))))
{
PromptPassword = TRUE;
}
if (PromptPassword && !utils_str_is_empty(settings->Username))
{
2023-01-26 14:56:42 +03:00
WINPR_SAM* sam = SamOpen(NULL, TRUE);
if (sam)
{
2023-01-26 14:56:42 +03:00
const size_t userLength = strlen(settings->Username);
WINPR_SAM_ENTRY* entry = SamLookupUserA(
sam, settings->Username, userLength + 1 /* ensure '\0' is checked too */, NULL, 0);
if (entry)
{
/**
* The user could be found in SAM database.
* Use entry in SAM database later instead of prompt
*/
PromptPassword = FALSE;
SamFreeEntry(sam, entry);
}
SamClose(sam);
}
}
#ifndef _WIN32
if (PromptPassword)
{
if (settings->RestrictedAdminModeRequired)
{
if ((settings->PasswordHash) && (strlen(settings->PasswordHash) > 0))
PromptPassword = FALSE;
}
}
#endif
if (PromptPassword)
{
switch (utils_authenticate(instance, AUTH_NLA, TRUE))
{
case AUTH_SKIP:
case AUTH_SUCCESS:
break;
case AUTH_CANCELLED:
freerdp_set_last_error_log(instance->context, FREERDP_ERROR_CONNECT_CANCELLED);
return FALSE;
case AUTH_NO_CREDENTIALS:
freerdp_set_last_error_log(instance->context,
FREERDP_ERROR_CONNECT_NO_OR_MISSING_CREDENTIALS);
2022-10-07 11:52:27 +03:00
return FALSE;
default:
2022-10-07 11:52:27 +03:00
return FALSE;
}
}
if (!settings->Username)
{
2022-05-28 01:29:28 +03:00
sspi_FreeAuthIdentity(nla->identity);
nla->identity = NULL;
}
else if (settings->SmartcardLogon)
{
#ifdef _WIN32
{
CERT_CREDENTIAL_INFO certInfo = { sizeof(CERT_CREDENTIAL_INFO), { 0 } };
LPSTR marshalledCredentials;
memcpy(certInfo.rgbHashOfCert, nla->certSha1, sizeof(certInfo.rgbHashOfCert));
if (!CredMarshalCredentialA(CertCredential, &certInfo, &marshalledCredentials))
{
WLog_ERR(TAG, "error marshalling cert credentials");
return FALSE;
}
2022-05-28 01:29:28 +03:00
if (sspi_SetAuthIdentityA(nla->identity, marshalledCredentials, NULL,
settings->Password) < 0)
2022-10-07 11:52:27 +03:00
return FALSE;
2022-05-28 01:29:28 +03:00
CredFree(marshalledCredentials);
}
#else
2022-05-28 01:29:28 +03:00
if (sspi_SetAuthIdentityA(nla->identity, settings->Username, settings->Domain,
settings->Password) < 0)
2022-10-07 11:52:27 +03:00
return FALSE;
#endif /* _WIN32 */
}
else
2017-05-11 19:51:45 +03:00
{
2022-02-02 01:23:34 +03:00
BOOL usePassword = TRUE;
if (settings->RedirectionPassword && (settings->RedirectionPasswordLength > 0))
{
2019-11-06 17:24:51 +03:00
if (sspi_SetAuthIdentityWithUnicodePassword(
nla->identity, settings->Username, settings->Domain,
(const WCHAR*)settings->RedirectionPassword,
2017-12-21 13:04:32 +03:00
settings->RedirectionPasswordLength / sizeof(WCHAR) - 1) < 0)
2022-10-07 11:52:27 +03:00
return FALSE;
}
2022-02-02 01:23:34 +03:00
if (settings->RestrictedAdminModeRequired)
{
if (settings->PasswordHash && strlen(settings->PasswordHash) == 32)
{
2022-03-25 16:10:35 +03:00
if (sspi_SetAuthIdentityA(nla->identity, settings->Username, settings->Domain,
settings->PasswordHash) < 0)
2022-10-07 11:52:27 +03:00
return FALSE;
2022-02-02 01:23:34 +03:00
/**
* Increase password hash length by LB_PASSWORD_MAX_LENGTH to obtain a
* length exceeding the maximum (LB_PASSWORD_MAX_LENGTH) and use it this for
* hash identification in WinPR.
*/
nla->identity->PasswordLength += LB_PASSWORD_MAX_LENGTH;
usePassword = FALSE;
}
}
2022-02-02 01:23:34 +03:00
if (usePassword)
{
2022-03-25 16:10:35 +03:00
if (sspi_SetAuthIdentityA(nla->identity, settings->Username, settings->Domain,
settings->Password) < 0)
2022-10-07 11:52:27 +03:00
return FALSE;
2022-02-02 01:23:34 +03:00
}
}
2022-02-02 01:23:34 +03:00
return TRUE;
}
static int nla_client_init(rdpNla* nla)
{
WINPR_ASSERT(nla);
WINPR_ASSERT(nla->rdpcontext);
2023-01-26 14:56:42 +03:00
rdpSettings* settings = nla->rdpcontext->settings;
WINPR_ASSERT(settings);
2022-02-02 01:23:34 +03:00
nla_set_state(nla, NLA_STATE_INITIAL);
if (!nla_adjust_settings_from_smartcard(nla))
2022-02-05 01:59:16 +03:00
return -1;
2022-10-07 15:09:44 +03:00
if (!credssp_auth_init(nla->auth, NLA_AUTH_PKG, NULL))
2022-02-02 01:23:34 +03:00
return -1;
if (!nla_client_setup_identity(nla))
return -1;
const char* hostname = freerdp_settings_get_server_name(settings);
if (!credssp_auth_setup_client(nla->auth, "TERMSRV", hostname, nla->identity, nla->pkinitArgs))
return -1;
2023-01-26 14:56:42 +03:00
rdpTls* tls = transport_get_tls(nla->transport);
if (!tls)
2013-10-31 01:56:44 +04:00
{
WLog_ERR(TAG, "Unknown NLA transport layer");
2015-02-15 19:10:14 +03:00
return -1;
}
if (!nla_sec_buffer_alloc_from_data(&nla->PublicKey, tls->PublicKey, 0, tls->PublicKeyLength))
{
2017-05-11 19:51:45 +03:00
WLog_ERR(TAG, "Failed to allocate sspi secBuffer");
return -1;
}
return 1;
}
int nla_client_begin(rdpNla* nla)
{
WINPR_ASSERT(nla);
if (nla_client_init(nla) < 1)
2015-02-15 19:10:14 +03:00
return -1;
if (nla_get_state(nla) != NLA_STATE_INITIAL)
2022-09-30 16:58:15 +03:00
return -1;
/*
* from tspkg.dll: 0x00000132
* ISC_REQ_MUTUAL_AUTH
* ISC_REQ_CONFIDENTIALITY
* ISC_REQ_USE_SESSION_KEY
* ISC_REQ_ALLOCATE_MEMORY
*/
credssp_auth_set_flags(nla->auth, ISC_REQ_MUTUAL_AUTH | ISC_REQ_CONFIDENTIALITY);
2023-01-26 14:56:42 +03:00
const int rc = credssp_auth_authenticate(nla->auth);
switch (rc)
{
case 0:
if (!nla_send(nla))
return -1;
nla_set_state(nla, NLA_STATE_NEGO_TOKEN);
break;
case 1:
if (credssp_auth_have_output_token(nla->auth))
{
if (!nla_send(nla))
return -1;
}
nla_set_state(nla, NLA_STATE_FINAL);
break;
default:
return -1;
}
return 1;
2015-02-16 00:04:59 +03:00
}
static int nla_client_recv_nego_token(rdpNla* nla)
2015-02-16 00:04:59 +03:00
{
credssp_auth_take_input_buffer(nla->auth, &nla->negoToken);
2023-01-26 14:56:42 +03:00
const int rc = credssp_auth_authenticate(nla->auth);
switch (rc)
{
case 0:
if (!nla_send(nla))
return -1;
break;
case 1: /* completed */
2023-01-26 14:56:42 +03:00
{
int res = -1;
if (nla->peerVersion < 5)
2023-01-26 14:56:42 +03:00
res = nla_encrypt_public_key_echo(nla);
else
2023-01-26 14:56:42 +03:00
res = nla_encrypt_public_key_hash(nla);
2023-01-26 14:56:42 +03:00
if (!res)
return -1;
if (!nla_send(nla))
return -1;
2015-02-15 19:10:14 +03:00
nla_set_state(nla, NLA_STATE_PUB_KEY_AUTH);
2023-01-26 14:56:42 +03:00
}
break;
default:
return -1;
}
return 1;
}
static int nla_client_recv_pub_key_auth(rdpNla* nla)
{
2023-01-26 14:56:42 +03:00
BOOL rc = FALSE;
WINPR_ASSERT(nla);
/* Verify Server Public Key Echo */
if (nla->peerVersion < 5)
rc = nla_decrypt_public_key_echo(nla);
else
rc = nla_decrypt_public_key_hash(nla);
sspi_SecBufferFree(&nla->pubKeyAuth);
if (!rc)
return -1;
/* Send encrypted credentials */
rc = nla_encrypt_ts_credentials(nla);
if (!rc)
return -1;
if (!nla_send(nla))
return -1;
2017-11-14 15:57:48 +03:00
nla_set_state(nla, NLA_STATE_AUTH_INFO);
return 1;
}
static int nla_client_recv(rdpNla* nla)
{
WINPR_ASSERT(nla);
switch (nla_get_state(nla))
{
case NLA_STATE_NEGO_TOKEN:
return nla_client_recv_nego_token(nla);
case NLA_STATE_PUB_KEY_AUTH:
return nla_client_recv_pub_key_auth(nla);
case NLA_STATE_FINAL:
default:
WLog_ERR(TAG, "NLA in invalid client receive state %s",
nla_get_state_str(nla_get_state(nla)));
return -1;
}
2015-02-16 00:04:59 +03:00
}
2017-07-18 13:54:00 +03:00
static int nla_client_authenticate(rdpNla* nla)
2015-02-16 00:04:59 +03:00
{
int rc = -1;
WINPR_ASSERT(nla);
2023-01-26 14:56:42 +03:00
wStream* s = Stream_New(NULL, 4096);
2015-02-16 00:04:59 +03:00
if (!s)
{
WLog_ERR(TAG, "Stream_New failed!");
return -1;
}
2015-02-16 00:04:59 +03:00
if (nla_client_begin(nla) < 1)
goto fail;
2015-02-16 00:04:59 +03:00
while (nla_get_state(nla) < NLA_STATE_AUTH_INFO)
2015-02-16 00:04:59 +03:00
{
Stream_SetPosition(s, 0);
2023-01-26 14:56:42 +03:00
const int status = transport_read_pdu(nla->transport, s);
2015-02-16 00:04:59 +03:00
if (status < 0)
{
WLog_ERR(TAG, "nla_client_authenticate failure");
goto fail;
2015-02-16 00:04:59 +03:00
}
2023-01-26 14:56:42 +03:00
const int status2 = nla_recv_pdu(nla, s);
2015-02-16 00:04:59 +03:00
2023-01-26 14:56:42 +03:00
if (status2 < 0)
goto fail;
2015-02-16 00:04:59 +03:00
}
rc = 1;
fail:
2015-02-16 00:04:59 +03:00
Stream_Free(s, TRUE);
return rc;
}
/**
2015-02-15 19:10:14 +03:00
* Initialize NTLMSSP authentication module (server).
*/
2017-07-18 13:54:00 +03:00
static int nla_server_init(rdpNla* nla)
{
WINPR_ASSERT(nla);
2023-01-26 14:56:42 +03:00
rdpTls* tls = transport_get_tls(nla->transport);
WINPR_ASSERT(tls);
2015-02-15 19:10:14 +03:00
if (!nla_sec_buffer_alloc_from_data(&nla->PublicKey, tls->PublicKey, 0, tls->PublicKeyLength))
{
WLog_ERR(TAG, "Failed to allocate SecBuffer for public key");
return -1;
}
2022-10-07 15:09:44 +03:00
if (!credssp_auth_init(nla->auth, NLA_AUTH_PKG, NULL))
2015-02-15 19:10:14 +03:00
return -1;
if (!credssp_auth_setup_server(nla->auth))
2015-02-15 19:10:14 +03:00
return -1;
nla_set_state(nla, NLA_STATE_INITIAL);
2015-02-15 19:10:14 +03:00
return 1;
}
static wStream* nla_server_recv_stream(rdpNla* nla)
{
wStream* s = NULL;
int status = -1;
WINPR_ASSERT(nla);
s = Stream_New(NULL, 4096);
if (!s)
goto fail;
status = transport_read_pdu(nla->transport, s);
fail:
if (status < 0)
{
WLog_ERR(TAG, "nla_recv() error: %d", status);
Stream_Free(s, TRUE);
2021-08-26 09:20:20 +03:00
return NULL;
}
return s;
}
static BOOL nla_server_recv_credentials(rdpNla* nla)
{
2023-01-26 14:56:42 +03:00
WINPR_ASSERT(nla);
if (nla_server_recv(nla) < 0)
return FALSE;
if (!nla_decrypt_ts_credentials(nla))
return FALSE;
if (!nla_impersonate(nla))
return FALSE;
if (!nla_revert_to_self(nla))
return FALSE;
return TRUE;
}
2015-02-15 19:10:14 +03:00
/**
* Authenticate with client using CredSSP (server).
2022-12-09 16:35:03 +03:00
* @param nla The NLA instance to use
*
2015-02-15 19:10:14 +03:00
* @return 1 if authentication is successful
*/
2017-07-18 13:54:00 +03:00
static int nla_server_authenticate(rdpNla* nla)
2015-02-15 19:10:14 +03:00
{
int ret = -1;
WINPR_ASSERT(nla);
if (nla_server_init(nla) < 1)
goto fail;
/*
* from tspkg.dll: 0x00000112
* ASC_REQ_MUTUAL_AUTH
* ASC_REQ_CONFIDENTIALITY
* ASC_REQ_ALLOCATE_MEMORY
*/
credssp_auth_set_flags(nla->auth, ASC_REQ_MUTUAL_AUTH | ASC_REQ_CONFIDENTIALITY |
ASC_REQ_CONNECTION | ASC_REQ_USE_SESSION_KEY |
ASC_REQ_SEQUENCE_DETECT | ASC_REQ_EXTENDED_ERROR);
/* Client is starting, here es the state machine:
*
* -- NLA_STATE_INITIAL --> NLA_STATE_INITIAL
* ----->> sending...
* ----->> protocol version 6
* ----->> nego token
* ----->> client nonce
* <<----- receiving...
* <<----- protocol version 6
* <<----- nego token
* ----->> sending...
* ----->> protocol version 6
* ----->> nego token
* ----->> public key auth
* ----->> client nonce
* -- NLA_STATE_NEGO_TOKEN --> NLA_STATE_PUB_KEY_AUTH
* <<----- receiving...
* <<----- protocol version 6
* <<----- public key info
* ----->> sending...
* ----->> protocol version 6
* ----->> auth info
* ----->> client nonce
* -- NLA_STATE_PUB_KEY_AUTH --> NLA_STATE
*/
while (TRUE)
{
int res = -1;
if (nla_server_recv(nla) < 0)
goto fail;
WLog_DBG(TAG, "Receiving Authentication Token");
credssp_auth_take_input_buffer(nla->auth, &nla->negoToken);
res = credssp_auth_authenticate(nla->auth);
if (res == -1)
{
/* Special handling of these specific error codes as NTSTATUS_FROM_WIN32
unfortunately does not map directly to the corresponding NTSTATUS values
*/
switch (GetLastError())
{
2017-11-14 15:57:48 +03:00
case ERROR_PASSWORD_MUST_CHANGE:
nla->errorCode = STATUS_PASSWORD_MUST_CHANGE;
break;
2017-11-14 15:57:48 +03:00
case ERROR_PASSWORD_EXPIRED:
nla->errorCode = STATUS_PASSWORD_EXPIRED;
break;
2017-11-14 15:57:48 +03:00
case ERROR_ACCOUNT_DISABLED:
nla->errorCode = STATUS_ACCOUNT_DISABLED;
break;
2017-11-14 15:57:48 +03:00
default:
nla->errorCode = NTSTATUS_FROM_WIN32(GetLastError());
break;
}
nla_send(nla);
/* Access Denied */
goto fail;
}
if (res == 1)
{
/* Process final part of the nego token exchange */
if (credssp_auth_have_output_token(nla->auth))
{
if (!nla_send(nla))
goto fail;
if (nla_server_recv(nla) < 0)
goto fail;
WLog_DBG(TAG, "Receiving pubkey Token");
}
if (nla->peerVersion < 5)
res = nla_decrypt_public_key_echo(nla);
else
res = nla_decrypt_public_key_hash(nla);
if (!res)
goto fail;
/* Clear nego token buffer or we will send it again to the client */
sspi_SecBufferFree(&nla->negoToken);
if (nla->peerVersion < 5)
res = nla_encrypt_public_key_echo(nla);
else
res = nla_encrypt_public_key_hash(nla);
if (!res)
goto fail;
}
/* send authentication token */
WLog_DBG(TAG, "Sending Authentication Token");
if (!nla_send(nla))
goto fail;
if (res == 1)
{
ret = 1;
break;
}
}
/* Receive encrypted credentials */
if (!nla_server_recv_credentials(nla))
ret = -1;
fail:
nla_buffer_free(nla);
return ret;
}
/**
* Authenticate using CredSSP.
2022-12-09 16:35:03 +03:00
* @param nla The NLA instance to use
*
* @return 1 if authentication is successful
*/
2015-02-15 19:10:14 +03:00
int nla_authenticate(rdpNla* nla)
{
WINPR_ASSERT(nla);
2015-02-15 19:10:14 +03:00
if (nla->server)
return nla_server_authenticate(nla);
else
2015-02-15 19:10:14 +03:00
return nla_client_authenticate(nla);
}
static void ap_integer_increment_le(BYTE* number, size_t size)
{
WINPR_ASSERT(number || (size == 0));
2023-01-26 14:56:42 +03:00
for (size_t index = 0; index < size; index++)
{
if (number[index] < 0xFF)
{
number[index]++;
break;
}
else
{
number[index] = 0;
continue;
}
}
}
static void ap_integer_decrement_le(BYTE* number, size_t size)
{
WINPR_ASSERT(number || (size == 0));
2023-01-26 14:56:42 +03:00
for (size_t index = 0; index < size; index++)
{
if (number[index] > 0)
{
number[index]--;
break;
}
else
{
number[index] = 0xFF;
continue;
}
}
}
BOOL nla_encrypt_public_key_echo(rdpNla* nla)
{
2023-01-26 14:56:42 +03:00
BOOL status = FALSE;
WINPR_ASSERT(nla);
sspi_SecBufferFree(&nla->pubKeyAuth);
if (nla->server)
{
2023-01-26 14:56:42 +03:00
SecBuffer buf = { 0 };
if (!sspi_SecBufferAlloc(&buf, nla->PublicKey.cbBuffer))
return FALSE;
ap_integer_increment_le(buf.pvBuffer, buf.cbBuffer);
status = credssp_auth_encrypt(nla->auth, &buf, &nla->pubKeyAuth, NULL, nla->sendSeqNum++);
sspi_SecBufferFree(&buf);
}
else
{
status = credssp_auth_encrypt(nla->auth, &nla->PublicKey, &nla->pubKeyAuth, NULL,
nla->sendSeqNum++);
}
return status;
}
BOOL nla_encrypt_public_key_hash(rdpNla* nla)
{
BOOL status = FALSE;
WINPR_DIGEST_CTX* sha256 = NULL;
2023-01-26 14:56:42 +03:00
SecBuffer buf = { 0 };
WINPR_ASSERT(nla);
2018-03-21 13:30:02 +03:00
const BYTE* hashMagic = nla->server ? ServerClientHashMagic : ClientServerHashMagic;
2019-11-06 17:24:51 +03:00
const size_t hashSize =
nla->server ? sizeof(ServerClientHashMagic) : sizeof(ClientServerHashMagic);
if (!sspi_SecBufferAlloc(&buf, WINPR_SHA256_DIGEST_LENGTH))
return FALSE;
/* generate SHA256 of following data: ClientServerHashMagic, Nonce, SubjectPublicKey */
if (!(sha256 = winpr_Digest_New()))
goto out;
if (!winpr_Digest_Init(sha256, WINPR_MD_SHA256))
goto out;
/* include trailing \0 from hashMagic */
2018-03-21 13:30:02 +03:00
if (!winpr_Digest_Update(sha256, hashMagic, hashSize))
goto out;
if (!nla_Digest_Update_From_SecBuffer(sha256, &nla->ClientNonce))
goto out;
/* SubjectPublicKey */
if (!nla_Digest_Update_From_SecBuffer(sha256, &nla->PublicKey))
goto out;
if (!winpr_Digest_Final(sha256, buf.pvBuffer, WINPR_SHA256_DIGEST_LENGTH))
goto out;
sspi_SecBufferFree(&nla->pubKeyAuth);
if (!credssp_auth_encrypt(nla->auth, &buf, &nla->pubKeyAuth, NULL, nla->sendSeqNum++))
goto out;
status = TRUE;
out:
winpr_Digest_Free(sha256);
sspi_SecBufferFree(&buf);
return status;
}
BOOL nla_decrypt_public_key_echo(rdpNla* nla)
{
BOOL status = FALSE;
SecBuffer public_key = { 0 };
if (!nla)
goto fail;
if (!credssp_auth_decrypt(nla->auth, &nla->pubKeyAuth, &public_key, nla->recvSeqNum++))
return FALSE;
2015-02-15 19:10:14 +03:00
if (!nla->server)
{
/* server echos the public key +1 */
ap_integer_decrement_le(public_key.pvBuffer, public_key.cbBuffer);
}
if (public_key.cbBuffer != nla->PublicKey.cbBuffer ||
memcmp(public_key.pvBuffer, nla->PublicKey.pvBuffer, public_key.cbBuffer) != 0)
{
WLog_ERR(TAG, "Could not verify server's public key echo");
2019-11-06 17:24:51 +03:00
#if defined(WITH_DEBUG_NLA)
WLog_ERR(TAG, "Expected (length = %" PRIu32 "):", nla->PublicKey.cbBuffer);
winpr_HexDump(TAG, WLOG_ERROR, nla->PublicKey.pvBuffer, nla->PublicKey.cbBuffer);
WLog_ERR(TAG, "Actual (length = %" PRIu32 "):", public_key.cbBuffer);
winpr_HexDump(TAG, WLOG_ERROR, public_key.pvBuffer, public_key.cbBuffer);
#endif
/* DO NOT SEND CREDENTIALS! */
goto fail;
}
status = TRUE;
fail:
sspi_SecBufferFree(&public_key);
return status;
}
BOOL nla_decrypt_public_key_hash(rdpNla* nla)
{
WINPR_DIGEST_CTX* sha256 = NULL;
2023-01-26 14:56:42 +03:00
BYTE serverClientHash[WINPR_SHA256_DIGEST_LENGTH] = { 0 };
BOOL status = FALSE;
WINPR_ASSERT(nla);
2018-03-21 13:30:02 +03:00
const BYTE* hashMagic = nla->server ? ClientServerHashMagic : ServerClientHashMagic;
2019-11-06 17:24:51 +03:00
const size_t hashSize =
nla->server ? sizeof(ClientServerHashMagic) : sizeof(ServerClientHashMagic);
SecBuffer hash = { 0 };
if (!credssp_auth_decrypt(nla->auth, &nla->pubKeyAuth, &hash, nla->recvSeqNum++))
return FALSE;
/* generate SHA256 of following data: ServerClientHashMagic, Nonce, SubjectPublicKey */
if (!(sha256 = winpr_Digest_New()))
goto fail;
if (!winpr_Digest_Init(sha256, WINPR_MD_SHA256))
goto fail;
/* include trailing \0 from hashMagic */
2018-03-21 13:30:02 +03:00
if (!winpr_Digest_Update(sha256, hashMagic, hashSize))
goto fail;
if (!nla_Digest_Update_From_SecBuffer(sha256, &nla->ClientNonce))
goto fail;
/* SubjectPublicKey */
if (!nla_Digest_Update_From_SecBuffer(sha256, &nla->PublicKey))
goto fail;
if (!winpr_Digest_Final(sha256, serverClientHash, sizeof(serverClientHash)))
goto fail;
/* verify hash */
if (hash.cbBuffer != WINPR_SHA256_DIGEST_LENGTH ||
memcmp(serverClientHash, hash.pvBuffer, WINPR_SHA256_DIGEST_LENGTH) != 0)
{
WLog_ERR(TAG, "Could not verify server's hash");
/* DO NOT SEND CREDENTIALS! */
goto fail;
}
status = TRUE;
fail:
winpr_Digest_Free(sha256);
sspi_SecBufferFree(&hash);
return status;
}
static BOOL nla_read_ts_credentials(rdpNla* nla, SecBuffer* data)
{
2023-01-26 14:56:42 +03:00
WinPrAsn1Decoder dec = { 0 };
WinPrAsn1Decoder dec2 = { 0 };
WinPrAsn1_OctetString credentials = { 0 };
BOOL error = FALSE;
WinPrAsn1_INTEGER credType = -1;
2015-02-15 19:10:14 +03:00
WINPR_ASSERT(nla);
2022-07-14 23:19:38 +03:00
WINPR_ASSERT(data);
WinPrAsn1Decoder_InitMem(&dec, WINPR_ASN1_DER, (BYTE*)data->pvBuffer, data->cbBuffer);
2022-07-14 23:19:38 +03:00
/* TSCredentials */
if (!WinPrAsn1DecReadSequence(&dec, &dec2))
2015-07-01 17:05:11 +03:00
return FALSE;
2022-07-14 23:19:38 +03:00
dec = dec2;
2015-07-01 17:05:11 +03:00
2022-07-14 23:19:38 +03:00
/* credType [0] INTEGER */
if (!WinPrAsn1DecReadContextualInteger(&dec, 0, &error, &credType))
2022-03-25 16:10:35 +03:00
return FALSE;
2015-02-15 19:10:14 +03:00
2022-07-14 23:19:38 +03:00
/* credentials [1] OCTET STRING */
if (!WinPrAsn1DecReadContextualOctetString(&dec, 1, &error, &credentials, FALSE))
return FALSE;
2022-07-14 23:19:38 +03:00
WinPrAsn1Decoder_InitMem(&dec, WINPR_ASN1_DER, credentials.data, credentials.len);
2022-07-14 23:19:38 +03:00
if (credType == 1)
{
2023-01-26 14:56:42 +03:00
WinPrAsn1_OctetString domain = { 0 };
WinPrAsn1_OctetString username = { 0 };
WinPrAsn1_OctetString password = { 0 };
2022-07-14 23:19:38 +03:00
/* TSPasswordCreds */
if (!WinPrAsn1DecReadSequence(&dec, &dec2))
return FALSE;
dec = dec2;
2022-07-14 23:19:38 +03:00
/* domainName [0] OCTET STRING */
if (!WinPrAsn1DecReadContextualOctetString(&dec, 0, &error, &domain, FALSE) && error)
return FALSE;
2017-11-14 15:57:48 +03:00
2022-07-14 23:19:38 +03:00
/* userName [1] OCTET STRING */
if (!WinPrAsn1DecReadContextualOctetString(&dec, 1, &error, &username, FALSE) && error)
return FALSE;
2017-11-14 15:57:48 +03:00
2022-07-14 23:19:38 +03:00
/* password [2] OCTET STRING */
if (!WinPrAsn1DecReadContextualOctetString(&dec, 2, &error, &password, FALSE))
return FALSE;
2015-02-03 01:16:32 +03:00
2023-01-26 14:56:42 +03:00
if (sspi_SetAuthIdentityWithLengthW(nla->identity, (const WCHAR*)username.data,
username.len / sizeof(WCHAR), (const WCHAR*)domain.data,
domain.len / sizeof(WCHAR), (const WCHAR*)password.data,
2022-07-14 23:19:38 +03:00
password.len / sizeof(WCHAR)) < 0)
return FALSE;
}
2022-07-14 23:19:38 +03:00
return TRUE;
}
/**
* Encode TSCredentials structure.
2022-12-09 16:35:03 +03:00
* @param nla A pointer to the NLA to use
*
* @return \b TRUE for success, \b FALSE otherwise
*/
2017-07-18 13:54:00 +03:00
static BOOL nla_encode_ts_credentials(rdpNla* nla)
{
2022-02-02 01:23:34 +03:00
BOOL ret = FALSE;
2023-01-26 14:56:42 +03:00
WinPrAsn1Encoder* enc = NULL;
size_t length = 0;
wStream s = { 0 };
int credType = -1;
WINPR_ASSERT(nla);
WINPR_ASSERT(nla->rdpcontext);
2023-01-26 14:56:42 +03:00
rdpSettings* settings = nla->rdpcontext->settings;
WINPR_ASSERT(settings);
2013-11-06 10:51:55 +04:00
2022-07-14 23:19:38 +03:00
enc = WinPrAsn1Encoder_New(WINPR_ASN1_DER);
if (!enc)
return FALSE;
/* TSCredentials */
if (!WinPrAsn1EncSeqContainer(enc))
goto out;
/* credType [0] INTEGER */
credType = settings->SmartcardLogon ? 2 : 1;
if (!WinPrAsn1EncContextualInteger(enc, 0, credType))
goto out;
/* credentials [1] OCTET STRING */
if (!WinPrAsn1EncContextualOctetStringContainer(enc, 1))
goto out;
2022-02-02 01:23:34 +03:00
if (settings->SmartcardLogon)
2013-11-06 10:51:55 +04:00
{
2022-07-14 23:19:38 +03:00
struct
{
WinPrAsn1_tagId tag;
size_t setting_id;
} cspData_fields[] = { { 1, FreeRDP_CardName },
{ 2, FreeRDP_ReaderName },
{ 3, FreeRDP_ContainerName },
{ 4, FreeRDP_CspName } };
WinPrAsn1_OctetString octet_string = { 0 };
/* TSSmartCardCreds */
if (!WinPrAsn1EncSeqContainer(enc))
goto out;
2022-07-14 23:19:38 +03:00
/* pin [0] OCTET STRING */
2022-11-22 20:52:38 +03:00
size_t ss;
octet_string.data =
2022-11-22 20:52:38 +03:00
(BYTE*)freerdp_settings_get_string_as_utf16(settings, FreeRDP_Password, &ss);
octet_string.len = ss * sizeof(WCHAR);
2022-11-14 13:17:43 +03:00
const BOOL res = WinPrAsn1EncContextualOctetString(enc, 0, &octet_string) > 0;
2022-07-14 23:19:38 +03:00
free(octet_string.data);
2022-11-14 13:17:43 +03:00
if (!res)
2022-07-14 23:19:38 +03:00
goto out;
2022-02-05 01:59:16 +03:00
2022-07-14 23:19:38 +03:00
/* cspData [1] SEQUENCE */
if (!WinPrAsn1EncContextualSeqContainer(enc, 1))
goto out;
2022-07-14 23:19:38 +03:00
/* keySpec [0] INTEGER */
if (!WinPrAsn1EncContextualInteger(enc, 0,
freerdp_settings_get_uint32(settings, FreeRDP_KeySpec)))
goto out;
for (size_t i = 0; i < ARRAYSIZE(cspData_fields); i++)
2022-07-14 23:19:38 +03:00
{
size_t len;
octet_string.data = (BYTE*)freerdp_settings_get_string_as_utf16(
settings, cspData_fields[i].setting_id, &len);
octet_string.len = len * sizeof(WCHAR);
2022-07-14 23:19:38 +03:00
if (octet_string.len)
{
2022-11-22 20:52:38 +03:00
const BOOL res2 = WinPrAsn1EncContextualOctetString(enc, cspData_fields[i].tag,
&octet_string) > 0;
2022-07-14 23:19:38 +03:00
free(octet_string.data);
2022-11-14 13:17:43 +03:00
if (!res2)
2022-07-14 23:19:38 +03:00
goto out;
}
}
2022-07-14 23:19:38 +03:00
/* End cspData */
if (!WinPrAsn1EncEndContainer(enc))
goto out;
2022-02-02 01:23:34 +03:00
2022-07-14 23:19:38 +03:00
/* End TSSmartCardCreds */
if (!WinPrAsn1EncEndContainer(enc))
goto out;
2022-02-02 01:23:34 +03:00
}
else
{
2022-07-14 23:19:38 +03:00
WinPrAsn1_OctetString username = { 0 };
WinPrAsn1_OctetString domain = { 0 };
WinPrAsn1_OctetString password = { 0 };
/* TSPasswordCreds */
if (!WinPrAsn1EncSeqContainer(enc))
goto out;
2022-02-02 01:23:34 +03:00
if (!settings->DisableCredentialsDelegation && nla->identity)
2022-02-02 01:23:34 +03:00
{
2022-07-14 23:19:38 +03:00
username.len = nla->identity->UserLength * 2;
username.data = (BYTE*)nla->identity->User;
2022-02-02 01:23:34 +03:00
2022-07-14 23:19:38 +03:00
domain.len = nla->identity->DomainLength * 2;
domain.data = (BYTE*)nla->identity->Domain;
2022-02-02 01:23:34 +03:00
2022-07-14 23:19:38 +03:00
password.len = nla->identity->PasswordLength * 2;
password.data = (BYTE*)nla->identity->Password;
2022-02-02 01:23:34 +03:00
}
if (WinPrAsn1EncContextualOctetString(enc, 0, &domain) == 0)
2022-07-14 23:19:38 +03:00
goto out;
if (WinPrAsn1EncContextualOctetString(enc, 1, &username) == 0)
2022-07-14 23:19:38 +03:00
goto out;
if (WinPrAsn1EncContextualOctetString(enc, 2, &password) == 0)
2022-07-14 23:19:38 +03:00
goto out;
2022-02-02 01:23:34 +03:00
2022-07-14 23:19:38 +03:00
/* End TSPasswordCreds */
if (!WinPrAsn1EncEndContainer(enc))
goto out;
}
2022-07-14 23:19:38 +03:00
/* End credentials | End TSCredentials */
if (!WinPrAsn1EncEndContainer(enc) || !WinPrAsn1EncEndContainer(enc))
goto out;
if (!WinPrAsn1EncStreamSize(enc, &length))
goto out;
2013-05-09 01:48:30 +04:00
2022-02-02 01:23:34 +03:00
if (!nla_sec_buffer_alloc(&nla->tsCredentials, length))
2013-11-06 10:51:55 +04:00
{
2022-02-02 01:23:34 +03:00
WLog_ERR(TAG, "sspi_SecBufferAlloc failed!");
goto out;
2013-11-06 10:51:55 +04:00
}
2022-07-14 23:19:38 +03:00
Stream_StaticInit(&s, (BYTE*)nla->tsCredentials.pvBuffer, length);
if (WinPrAsn1EncToStream(enc, &s))
ret = TRUE;
2022-02-05 01:59:16 +03:00
2022-02-02 01:23:34 +03:00
out:
2022-07-14 23:19:38 +03:00
WinPrAsn1Encoder_Free(&enc);
2022-02-02 01:23:34 +03:00
return ret;
}
static BOOL nla_encrypt_ts_credentials(rdpNla* nla)
{
WINPR_ASSERT(nla);
if (!nla_encode_ts_credentials(nla))
return FALSE;
sspi_SecBufferFree(&nla->authInfo);
if (!credssp_auth_encrypt(nla->auth, &nla->tsCredentials, &nla->authInfo, NULL,
nla->sendSeqNum++))
return FALSE;
return TRUE;
}
static BOOL nla_decrypt_ts_credentials(rdpNla* nla)
{
WINPR_ASSERT(nla);
2015-02-15 19:10:14 +03:00
if (nla->authInfo.cbBuffer < 1)
{
2015-02-15 19:10:14 +03:00
WLog_ERR(TAG, "nla_decrypt_ts_credentials missing authInfo buffer");
return FALSE;
}
sspi_SecBufferFree(&nla->tsCredentials);
if (!credssp_auth_decrypt(nla->auth, &nla->authInfo, &nla->tsCredentials, nla->recvSeqNum++))
return FALSE;
if (!nla_read_ts_credentials(nla, &nla->tsCredentials))
return FALSE;
2015-02-15 19:10:14 +03:00
return TRUE;
}
static BOOL nla_write_octet_string(WinPrAsn1Encoder* enc, const SecBuffer* buffer,
WinPrAsn1_tagId tagId, const char* msg)
{
BOOL res = FALSE;
WINPR_ASSERT(enc);
WINPR_ASSERT(buffer);
WINPR_ASSERT(msg);
if (buffer->cbBuffer > 0)
{
size_t rc = 0;
WinPrAsn1_OctetString octet_string = { 0 };
WLog_DBG(TAG, " ----->> %s", msg);
octet_string.data = buffer->pvBuffer;
octet_string.len = buffer->cbBuffer;
rc = WinPrAsn1EncContextualOctetString(enc, tagId, &octet_string);
if (rc != 0)
res = TRUE;
}
return res;
}
static BOOL nla_write_octet_string_free(WinPrAsn1Encoder* enc, SecBuffer* buffer,
WinPrAsn1_tagId tagId, const char* msg)
{
2023-01-26 14:56:42 +03:00
const BOOL rc = nla_write_octet_string(enc, buffer, tagId, msg);
sspi_SecBufferFree(buffer);
return rc;
}
/**
* Send CredSSP message.
2022-12-09 16:35:03 +03:00
*
* @param nla A pointer to the NLA to use
*
* @return \b TRUE for success, \b FALSE otherwise
*/
BOOL nla_send(rdpNla* nla)
{
BOOL rc = FALSE;
2022-09-12 11:54:29 +03:00
wStream* s = NULL;
size_t length = 0;
WinPrAsn1Encoder* enc = NULL;
WINPR_ASSERT(nla);
2022-07-14 23:19:38 +03:00
enc = WinPrAsn1Encoder_New(WINPR_ASN1_DER);
if (!enc)
return FALSE;
/* TSRequest */
2022-07-14 23:19:38 +03:00
WLog_DBG(TAG, "----->> sending...");
if (!WinPrAsn1EncSeqContainer(enc))
goto fail;
2022-07-14 23:19:38 +03:00
/* version [0] INTEGER */
WLog_DBG(TAG, " ----->> protocol version %" PRIu32, nla->version);
2022-07-14 23:19:38 +03:00
if (!WinPrAsn1EncContextualInteger(enc, 0, nla->version))
goto fail;
2022-07-14 23:19:38 +03:00
/* negoTokens [1] SEQUENCE OF SEQUENCE */
if (nla_get_state(nla) <= NLA_STATE_NEGO_TOKEN && credssp_auth_have_output_token(nla->auth))
{
const SecBuffer* buffer = credssp_auth_get_output_buffer(nla->auth);
2022-07-14 23:19:38 +03:00
if (!WinPrAsn1EncContextualSeqContainer(enc, 1) || !WinPrAsn1EncSeqContainer(enc))
goto fail;
/* negoToken [0] OCTET STRING */
if (!nla_write_octet_string(enc, buffer, 0, "negoToken"))
2022-07-14 23:19:38 +03:00
goto fail;
/* End negoTokens (SEQUENCE OF SEQUENCE) */
if (!WinPrAsn1EncEndContainer(enc) || !WinPrAsn1EncEndContainer(enc))
goto fail;
}
/* authInfo [2] OCTET STRING */
if (nla->authInfo.cbBuffer > 0)
{
if (!nla_write_octet_string_free(enc, &nla->authInfo, 2, "auth info"))
goto fail;
}
2022-07-14 23:19:38 +03:00
/* pubKeyAuth [3] OCTET STRING */
if (nla->pubKeyAuth.cbBuffer > 0)
{
if (!nla_write_octet_string_free(enc, &nla->pubKeyAuth, 3, "public key auth"))
goto fail;
}
2022-07-14 23:19:38 +03:00
/* errorCode [4] INTEGER */
if (nla->errorCode && nla->peerVersion >= 3 && nla->peerVersion != 5)
{
WLog_DBG(TAG, " ----->> error code %s 0x%08" PRIx32, NtStatus2Tag(nla->errorCode),
nla->errorCode);
2022-07-14 23:19:38 +03:00
if (!WinPrAsn1EncContextualInteger(enc, 4, nla->errorCode))
goto fail;
}
2022-07-14 23:19:38 +03:00
/* clientNonce [5] OCTET STRING */
if (!nla->server && nla->ClientNonce.cbBuffer > 0)
{
if (!nla_write_octet_string(enc, &nla->ClientNonce, 5, "client nonce"))
goto fail;
}
2022-07-14 23:19:38 +03:00
/* End TSRequest */
if (!WinPrAsn1EncEndContainer(enc))
goto fail;
if (!WinPrAsn1EncStreamSize(enc, &length))
goto fail;
s = Stream_New(NULL, length);
if (!s)
goto fail;
if (!WinPrAsn1EncToStream(enc, s))
goto fail;
WLog_DBG(TAG, "[%" PRIuz " bytes]", length);
if (transport_write(nla->transport, s) < 0)
goto fail;
rc = TRUE;
fail:
2022-09-12 11:54:29 +03:00
Stream_Free(s, TRUE);
2022-07-14 23:19:38 +03:00
WinPrAsn1Encoder_Free(&enc);
return rc;
}
2017-07-18 13:54:00 +03:00
static int nla_decode_ts_request(rdpNla* nla, wStream* s)
{
WinPrAsn1Decoder dec = { 0 };
WinPrAsn1Decoder dec2 = { 0 };
BOOL error = FALSE;
WinPrAsn1_tagId tag = { 0 };
WinPrAsn1_INTEGER val = { 0 };
UINT32 version = 0;
2015-02-03 01:16:32 +03:00
WINPR_ASSERT(nla);
WINPR_ASSERT(s);
2022-07-14 23:19:38 +03:00
WinPrAsn1Decoder_Init(&dec, WINPR_ASN1_DER, s);
WLog_DBG(TAG, "<<----- receiving...");
/* TSRequest */
const size_t offset = WinPrAsn1DecReadSequence(&dec, &dec2);
if (offset == 0)
return -1;
2022-07-14 23:19:38 +03:00
dec = dec2;
2022-07-14 23:19:38 +03:00
/* version [0] INTEGER */
if (WinPrAsn1DecReadContextualInteger(&dec, 0, &error, &val) == 0)
2022-07-14 23:19:38 +03:00
return -1;
if (!Stream_SafeSeek(s, offset))
return -1;
2022-07-14 23:19:38 +03:00
version = (UINT)val;
WLog_DBG(TAG, " <<----- protocol version %" PRIu32, version);
2022-07-14 23:19:38 +03:00
if (nla->peerVersion == 0)
nla->peerVersion = version;
/* if the peer suddenly changed its version - kick it */
if (nla->peerVersion != version)
{
2019-11-06 17:24:51 +03:00
WLog_ERR(TAG, "CredSSP peer changed protocol version from %" PRIu32 " to %" PRIu32,
nla->peerVersion, version);
2022-07-14 23:19:38 +03:00
return -1;
}
while (WinPrAsn1DecReadContextualTag(&dec, &tag, &dec2) != 0)
{
2023-01-26 14:56:42 +03:00
WinPrAsn1Decoder dec3 = { 0 };
WinPrAsn1_OctetString octet_string = { 0 };
2022-07-14 23:19:38 +03:00
switch (tag)
{
2022-07-14 23:19:38 +03:00
case 1:
WLog_DBG(TAG, " <<----- nego token");
/* negoTokens [1] SEQUENCE OF SEQUENCE */
if ((WinPrAsn1DecReadSequence(&dec2, &dec3) == 0) ||
(WinPrAsn1DecReadSequence(&dec3, &dec2) == 0))
2022-07-14 23:19:38 +03:00
return -1;
/* negoToken [0] OCTET STRING */
if ((WinPrAsn1DecReadContextualOctetString(&dec2, 0, &error, &octet_string,
FALSE) == 0) &&
2022-07-14 23:19:38 +03:00
error)
return -1;
if (!nla_sec_buffer_alloc_from_data(&nla->negoToken, octet_string.data, 0,
octet_string.len))
return -1;
break;
case 2:
WLog_DBG(TAG, " <<----- auth info");
/* authInfo [2] OCTET STRING */
if (WinPrAsn1DecReadOctetString(&dec2, &octet_string, FALSE) == 0)
2022-07-14 23:19:38 +03:00
return -1;
if (!nla_sec_buffer_alloc_from_data(&nla->authInfo, octet_string.data, 0,
octet_string.len))
return -1;
break;
case 3:
WLog_DBG(TAG, " <<----- public key auth");
2022-07-14 23:19:38 +03:00
/* pubKeyAuth [3] OCTET STRING */
if (WinPrAsn1DecReadOctetString(&dec2, &octet_string, FALSE) == 0)
2022-07-14 23:19:38 +03:00
return -1;
if (!nla_sec_buffer_alloc_from_data(&nla->pubKeyAuth, octet_string.data, 0,
octet_string.len))
return -1;
break;
case 4:
/* errorCode [4] INTEGER */
if (WinPrAsn1DecReadInteger(&dec2, &val) == 0)
2022-07-14 23:19:38 +03:00
return -1;
nla->errorCode = (UINT)val;
WLog_DBG(TAG, " <<----- error code %s 0x%08" PRIx32, NtStatus2Tag(nla->errorCode),
nla->errorCode);
2022-07-14 23:19:38 +03:00
break;
case 5:
WLog_DBG(TAG, " <<----- client nonce");
2022-07-14 23:19:38 +03:00
/* clientNonce [5] OCTET STRING */
if (WinPrAsn1DecReadOctetString(&dec2, &octet_string, FALSE) == 0)
2022-07-14 23:19:38 +03:00
return -1;
if (!nla_sec_buffer_alloc_from_data(&nla->ClientNonce, octet_string.data, 0,
octet_string.len))
return -1;
break;
default:
return -1;
}
}
2022-07-14 23:19:38 +03:00
return 1;
}
2015-02-16 00:04:59 +03:00
int nla_recv_pdu(rdpNla* nla, wStream* s)
{
WINPR_ASSERT(nla);
WINPR_ASSERT(s);
2015-02-16 00:04:59 +03:00
if (nla_decode_ts_request(nla, s) < 1)
return -1;
if (nla->errorCode)
{
UINT32 code;
2017-11-14 15:57:48 +03:00
switch (nla->errorCode)
{
2017-11-14 15:57:48 +03:00
case STATUS_PASSWORD_MUST_CHANGE:
code = FREERDP_ERROR_CONNECT_PASSWORD_MUST_CHANGE;
break;
2017-11-14 15:57:48 +03:00
case STATUS_PASSWORD_EXPIRED:
code = FREERDP_ERROR_CONNECT_PASSWORD_EXPIRED;
break;
2017-11-14 15:57:48 +03:00
case STATUS_ACCOUNT_DISABLED:
code = FREERDP_ERROR_CONNECT_ACCOUNT_DISABLED;
break;
2017-11-14 15:57:48 +03:00
case STATUS_LOGON_FAILURE:
code = FREERDP_ERROR_CONNECT_LOGON_FAILURE;
break;
2017-11-06 11:49:03 +03:00
2017-11-14 15:57:48 +03:00
case STATUS_WRONG_PASSWORD:
code = FREERDP_ERROR_CONNECT_WRONG_PASSWORD;
break;
2017-11-06 11:49:03 +03:00
2017-11-14 15:57:48 +03:00
case STATUS_ACCESS_DENIED:
code = FREERDP_ERROR_CONNECT_ACCESS_DENIED;
break;
2017-11-06 11:49:03 +03:00
2017-11-14 15:57:48 +03:00
case STATUS_ACCOUNT_RESTRICTION:
code = FREERDP_ERROR_CONNECT_ACCOUNT_RESTRICTION;
break;
2017-11-06 11:49:03 +03:00
2017-11-14 15:57:48 +03:00
case STATUS_ACCOUNT_LOCKED_OUT:
code = FREERDP_ERROR_CONNECT_ACCOUNT_LOCKED_OUT;
break;
2017-11-06 11:49:03 +03:00
2017-11-14 15:57:48 +03:00
case STATUS_ACCOUNT_EXPIRED:
code = FREERDP_ERROR_CONNECT_ACCOUNT_EXPIRED;
break;
2017-11-06 11:49:03 +03:00
2017-11-14 15:57:48 +03:00
case STATUS_LOGON_TYPE_NOT_GRANTED:
code = FREERDP_ERROR_CONNECT_LOGON_TYPE_NOT_GRANTED;
break;
2017-11-06 11:49:03 +03:00
2017-11-14 15:57:48 +03:00
default:
WLog_ERR(TAG, "SPNEGO failed with NTSTATUS: 0x%08" PRIX32 "", nla->errorCode);
code = FREERDP_ERROR_AUTHENTICATION_FAILED;
2017-11-14 15:57:48 +03:00
break;
}
2017-11-14 15:57:48 +03:00
freerdp_set_last_error_log(nla->rdpcontext, code);
return -1;
}
return nla_client_recv(nla);
2015-02-16 00:04:59 +03:00
}
int nla_server_recv(rdpNla* nla)
{
2021-06-30 11:19:16 +03:00
int status = -1;
WINPR_ASSERT(nla);
2023-01-26 14:56:42 +03:00
wStream* s = nla_server_recv_stream(nla);
if (!s)
goto fail;
status = nla_decode_ts_request(nla, s);
fail:
2013-05-09 01:48:30 +04:00
Stream_Free(s, TRUE);
return status;
}
/**
* Create new CredSSP state machine.
2022-12-09 16:35:03 +03:00
*
* @param context A pointer to the rdp context to use
* @param transport A pointer to the transport to use
*
* @return new CredSSP state machine.
*/
rdpNla* nla_new(rdpContext* context, rdpTransport* transport)
{
WINPR_ASSERT(transport);
WINPR_ASSERT(context);
2023-01-26 14:56:42 +03:00
rdpSettings* settings = context->settings;
WINPR_ASSERT(settings);
2023-01-26 14:56:42 +03:00
rdpNla* nla = (rdpNla*)calloc(1, sizeof(rdpNla));
if (!nla)
return NULL;
nla->rdpcontext = context;
nla->server = settings->ServerMode;
nla->transport = transport;
nla->sendSeqNum = 0;
nla->recvSeqNum = 0;
nla->version = 6;
nla->identity = calloc(1, sizeof(SEC_WINNT_AUTH_IDENTITY));
if (!nla->identity)
goto cleanup;
nla->auth = credssp_auth_new(context);
if (!nla->auth)
goto cleanup;
2018-03-29 16:50:16 +03:00
/* init to 0 or we end up freeing a bad pointer if the alloc fails */
if (!nla_sec_buffer_alloc(&nla->ClientNonce, NonceLength))
2018-03-29 16:50:16 +03:00
goto cleanup;
/* generate random 32-byte nonce */
if (winpr_RAND(nla->ClientNonce.pvBuffer, NonceLength) < 0)
goto cleanup;
2015-02-15 19:10:14 +03:00
return nla;
2018-03-29 16:50:16 +03:00
cleanup:
credssp_auth_free(nla->auth);
free(nla->identity);
2018-03-29 16:50:16 +03:00
nla_free(nla);
return NULL;
}
/**
* Free CredSSP state machine.
2022-12-09 16:35:03 +03:00
* @param nla The NLA instance to free
*/
2015-02-15 19:10:14 +03:00
void nla_free(rdpNla* nla)
{
2015-02-15 19:10:14 +03:00
if (!nla)
return;
smartcardCertInfo_Free(nla->smartcardCert);
nla_buffer_free(nla);
2015-02-15 19:10:14 +03:00
sspi_SecBufferFree(&nla->tsCredentials);
credssp_auth_free(nla->auth);
2022-05-28 01:29:28 +03:00
sspi_FreeAuthIdentity(nla->identity);
free(nla->pkinitArgs);
free(nla->identity);
2015-02-15 19:10:14 +03:00
free(nla);
}
2018-11-20 18:48:59 +03:00
SEC_WINNT_AUTH_IDENTITY* nla_get_identity(rdpNla* nla)
{
if (!nla)
return NULL;
return nla->identity;
}
NLA_STATE nla_get_state(rdpNla* nla)
{
if (!nla)
return NLA_STATE_FINAL;
return nla->state;
}
BOOL nla_set_state(rdpNla* nla, NLA_STATE state)
{
if (!nla)
return FALSE;
WLog_DBG(TAG, "-- %s\t--> %s", nla_get_state_str(nla->state), nla_get_state_str(state));
2018-11-20 18:48:59 +03:00
nla->state = state;
return TRUE;
}
BOOL nla_set_service_principal(rdpNla* nla, const char* service, const char* hostname)
{
if (!credssp_auth_set_spn(nla->auth, service, hostname))
return FALSE;
return TRUE;
2018-11-20 18:48:59 +03:00
}
BOOL nla_impersonate(rdpNla* nla)
{
return credssp_auth_impersonate(nla->auth);
}
BOOL nla_revert_to_self(rdpNla* nla)
{
return credssp_auth_revert_to_self(nla->auth);
}
const char* nla_get_state_str(NLA_STATE state)
{
switch (state)
{
case NLA_STATE_INITIAL:
return "NLA_STATE_INITIAL";
case NLA_STATE_NEGO_TOKEN:
return "NLA_STATE_NEGO_TOKEN";
case NLA_STATE_PUB_KEY_AUTH:
return "NLA_STATE_PUB_KEY_AUTH";
case NLA_STATE_AUTH_INFO:
return "NLA_STATE_AUTH_INFO";
case NLA_STATE_POST_NEGO:
return "NLA_STATE_POST_NEGO";
case NLA_STATE_FINAL:
return "NLA_STATE_FINAL";
default:
return "UNKNOWN";
}
}
DWORD nla_get_error(rdpNla* nla)
{
if (!nla)
return ERROR_INTERNAL_ERROR;
return nla->errorCode;
}