/** * FreeRDP: A Remote Desktop Protocol Client * RPC over HTTP * * Copyright 2012 Fujitsu Technology Solutions GmbH * Copyright 2012 Dmitrij Jasnov * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "config.h" #include #include #include #include #include "http.h" #include "rpc.h" #define HTTP_STREAM_SIZE 0xFFFF boolean rpc_attach(rdpRpc* rpc, rdpTcp* tcp_in, rdpTcp* tcp_out, rdpTls* tls_in, rdpTls* tls_out) { rpc->tcp_in = tcp_in; rpc->tcp_out = tcp_out; rpc->tls_in = tls_in; rpc->tls_out = tls_out; return true; } #define NTLM_PACKAGE_NAME _T("NTLM") boolean ntlm_client_init(rdpNtlm* ntlm, char* user, char* domain, char* password) { size_t size; SECURITY_STATUS status; sspi_GlobalInit(); ntlm->table = InitSecurityInterface(); ntlm->identity.Flags = SEC_WINNT_AUTH_IDENTITY_UNICODE; ntlm->identity.User = (uint16*) freerdp_uniconv_out(ntlm->uniconv, user, &size); ntlm->identity.UserLength = (uint32) size; if (domain) { ntlm->identity.Domain = (uint16*) freerdp_uniconv_out(ntlm->uniconv, domain, &size); ntlm->identity.DomainLength = (uint32) size; } else { ntlm->identity.Domain = (uint16*) NULL; ntlm->identity.DomainLength = 0; } ntlm->identity.Password = (uint16*) freerdp_uniconv_out(ntlm->uniconv, (char*) password, &size); ntlm->identity.PasswordLength = (uint32) size; status = QuerySecurityPackageInfo(NTLM_PACKAGE_NAME, &ntlm->pPackageInfo); if (status != SEC_E_OK) { printf("QuerySecurityPackageInfo status: 0x%08X\n", status); return false; } ntlm->cbMaxToken = ntlm->pPackageInfo->cbMaxToken; status = ntlm->table->AcquireCredentialsHandle(NULL, NTLM_PACKAGE_NAME, SECPKG_CRED_OUTBOUND, NULL, &ntlm->identity, NULL, NULL, &ntlm->credentials, &ntlm->expiration); if (status != SEC_E_OK) { printf("AcquireCredentialsHandle status: 0x%08X\n", status); return false; } ntlm->haveContext = false; ntlm->haveInputBuffer = false; memset(&ntlm->inputBuffer, 0, sizeof(SecBuffer)); memset(&ntlm->outputBuffer, 0, sizeof(SecBuffer)); memset(&ntlm->ContextSizes, 0, sizeof(SecPkgContext_Sizes)); ntlm->fContextReq = ISC_REQ_REPLAY_DETECT | ISC_REQ_SEQUENCE_DETECT | ISC_REQ_CONFIDENTIALITY | ISC_REQ_DELEGATE; return true; } boolean ntlm_authenticate(rdpNtlm* ntlm) { SECURITY_STATUS status; ntlm->outputBufferDesc.ulVersion = SECBUFFER_VERSION; ntlm->outputBufferDesc.cBuffers = 1; ntlm->outputBufferDesc.pBuffers = &ntlm->outputBuffer; ntlm->outputBuffer.BufferType = SECBUFFER_TOKEN; ntlm->outputBuffer.cbBuffer = ntlm->cbMaxToken; ntlm->outputBuffer.pvBuffer = xmalloc(ntlm->outputBuffer.cbBuffer); status = ntlm->table->InitializeSecurityContext(&ntlm->credentials, (ntlm->haveContext) ? &ntlm->context : NULL, NULL, ntlm->fContextReq, 0, SECURITY_NATIVE_DREP, (ntlm->haveInputBuffer) ? &ntlm->inputBufferDesc : NULL, 0, &ntlm->context, &ntlm->outputBufferDesc, &ntlm->pfContextAttr, &ntlm->expiration); if ((status == SEC_I_COMPLETE_AND_CONTINUE) || (status == SEC_I_COMPLETE_NEEDED) || (status == SEC_E_OK)) { if (ntlm->table->CompleteAuthToken != NULL) ntlm->table->CompleteAuthToken(&ntlm->context, &ntlm->outputBufferDesc); if (ntlm->table->QueryContextAttributes(&ntlm->context, SECPKG_ATTR_SIZES, &ntlm->ContextSizes) != SEC_E_OK) { printf("QueryContextAttributes SECPKG_ATTR_SIZES failure\n"); return 0; } if (status == SEC_I_COMPLETE_NEEDED) status = SEC_E_OK; else if (status == SEC_I_COMPLETE_AND_CONTINUE) status = SEC_I_CONTINUE_NEEDED; } ntlm->haveInputBuffer = true; ntlm->haveContext = true; return true; } void ntlm_client_uninit(rdpNtlm* ntlm) { FreeCredentialsHandle(&ntlm->credentials); FreeContextBuffer(ntlm->pPackageInfo); } rdpNtlm* ntlm_new() { rdpNtlm* ntlm = xnew(rdpNtlm); if (ntlm != NULL) { ntlm->uniconv = freerdp_uniconv_new(); } return ntlm; } void ntlm_free(rdpNtlm* ntlm) { if (ntlm != NULL) { freerdp_uniconv_free(ntlm->uniconv); } } STREAM* rpc_ntlm_http_data(rdpRpc* rpc, char* command, SecBuffer* ntlm_token, uint8* content, int length) { STREAM* s; char* base64_ntlm_token; HttpContext* http_context; HttpRequest* http_request; base64_ntlm_token = crypto_encode_base64(ntlm_token->pvBuffer, ntlm_token->cbBuffer); if (strcmp(command, "RPC_IN_DATA") == 0) http_context = rpc->http_in->context; else http_context = rpc->http_out->context; http_request = http_request_new(); http_request->ContentLength = length; http_request_set_method(http_request, http_context->Method); http_request_set_uri(http_request, http_context->URI); http_request_set_auth_scheme(http_request, "NTLM"); http_request_set_auth_param(http_request, base64_ntlm_token); s = http_request_write(http_context, http_request); return s; } boolean rpc_out_connect_http(rdpRpc* rpc) { STREAM* http_stream; STREAM* ntlm_stream; HttpResponse* http_response; int decoded_ntlm_http_length; int encoded_ntlm_http_length; uint8* decoded_ntlm_http_data = NULL; uint8* encoded_ntlm_http_data = NULL; rdpTls* tls_out = rpc->tls_out; rdpSettings* settings = rpc->settings; rdpRpcHTTP* http_out = rpc->http_out; rdpNtlm* http_out_ntlm = http_out->ntlm; ntlm_stream = stream_new(0); printf("rpc_out_connect_http\n"); ntlm_client_init(http_out_ntlm, settings->username, settings->password, settings->domain); ntlm_authenticate(http_out_ntlm); http_stream = rpc_ntlm_http_data(rpc, "RPC_OUT_DATA", &http_out_ntlm->outputBuffer, NULL, 0); DEBUG_RPC("\nSend:\n%s\n", http_stream->data); tls_write(tls_out, http_stream->data, http_stream->size); http_stream = stream_new(0xFFFF); stream_clear(http_stream); http_stream->p = http_stream->data; encoded_ntlm_http_length = -1; xfree(encoded_ntlm_http_data); encoded_ntlm_http_data = NULL; http_out->contentLength = 0; http_response = http_response_recv(tls_out); DEBUG_RPC("\nRecv:\n%s\n", http_stream->data); stream_clear(http_stream); http_stream->p = http_stream->data; encoded_ntlm_http_data = (uint8*) http_response->AuthParam; encoded_ntlm_http_length = strlen((char*) encoded_ntlm_http_data); if (encoded_ntlm_http_length == 0) /* No NTLM data was found */ return false; crypto_base64_decode(encoded_ntlm_http_data, encoded_ntlm_http_length, &decoded_ntlm_http_data, &decoded_ntlm_http_length); http_out_ntlm->inputBuffer.pvBuffer = decoded_ntlm_http_data; http_out_ntlm->inputBuffer.cbBuffer = decoded_ntlm_http_length; ntlm_authenticate(http_out_ntlm); http_out->contentLength = 76; http_out->remContentLength = 76; http_stream = rpc_ntlm_http_data(rpc, "RPC_OUT_DATA", &http_out_ntlm->outputBuffer, NULL, http_out->contentLength); DEBUG_RPC("\nSend:\n%s\n", http_stream->data); tls_write(tls_out, http_stream->data, http_stream->size); stream_clear(http_stream); xfree(decoded_ntlm_http_data); xfree(encoded_ntlm_http_data); /* At this point OUT connection is ready to send CONN/A1 and start with receiving data */ http_out->state = RPC_HTTP_SENDING; return true; } boolean rpc_in_connect_http(rdpRpc* rpc) { STREAM* ntlm_stream; STREAM* http_stream; HttpResponse* http_response; int decoded_ntlm_http_length; int encoded_ntlm_http_length; uint8* decoded_ntlm_http_data = NULL; uint8* encoded_ntlm_http_data = NULL; rdpTls* tls_in = rpc->tls_in; rdpSettings* settings = rpc->settings; rdpRpcHTTP* http_in = rpc->http_in; rdpNtlm* http_in_ntlm = http_in->ntlm; ntlm_stream = stream_new(0); printf("rpc_in_connect_http\n"); ntlm_client_init(http_in_ntlm, settings->username, settings->password, settings->domain); ntlm_authenticate(http_in_ntlm); http_stream = rpc_ntlm_http_data(rpc, "RPC_IN_DATA", &http_in_ntlm->outputBuffer, NULL, 0); DEBUG_RPC("Send:\n%s\n", http_stream->data); tls_write(tls_in, http_stream->data, http_stream->size); http_stream = stream_new(0xFFFF); stream_clear(http_stream); http_stream->p = http_stream->data; xfree(decoded_ntlm_http_data); encoded_ntlm_http_length = -1; xfree(encoded_ntlm_http_data); encoded_ntlm_http_data = NULL; http_in->contentLength = 0; http_response = http_response_recv(tls_in); DEBUG_RPC("Recv:\n%s\n", http_stream->data); stream_clear(http_stream); http_stream->p = http_stream->data; encoded_ntlm_http_data = (uint8*) http_response->AuthParam; encoded_ntlm_http_length = strlen((char*) encoded_ntlm_http_data); if (encoded_ntlm_http_length == 0) /* No NTLM data was found */ return false; crypto_base64_decode(encoded_ntlm_http_data, encoded_ntlm_http_length, &decoded_ntlm_http_data, &decoded_ntlm_http_length); http_in_ntlm->inputBuffer.pvBuffer = decoded_ntlm_http_data; http_in_ntlm->inputBuffer.cbBuffer = decoded_ntlm_http_length; ntlm_authenticate(http_in_ntlm); http_in->contentLength = 1073741824; http_in->remContentLength = 1073741824; http_stream = rpc_ntlm_http_data(rpc, "RPC_IN_DATA", &http_in_ntlm->outputBuffer, NULL, http_in->contentLength); DEBUG_RPC("Send:\n%s\n", http_stream->data); tls_write(tls_in, http_stream->data, http_stream->size); stream_clear(http_stream); http_stream->p = http_stream->data; xfree(decoded_ntlm_http_data); xfree(encoded_ntlm_http_data); /* At this point IN connection is ready to send CONN/B1 and start with sending data */ http_in->state = RPC_HTTP_SENDING; return true; } int rpc_out_write(rdpRpc* rpc, uint8* data, int length) { int sent = 0; int status = -1; rdpRpcHTTP* http_out = rpc->http_out; rdpTls* tls_out = rpc->tls_out; if (http_out->state == RPC_HTTP_DISCONNECTED) { if (!rpc_out_connect_http(rpc)) return false; } if (http_out->remContentLength < length) { printf("RPC Error: HTTP frame is over.\n"); return -1; /* TODO ChannelRecycling */ } #ifdef WITH_DEBUG_RPC printf("rpc_out_write(): length: %d\n", length); freerdp_hexdump(data, length); printf("\n"); #endif while (sent < length) { status = tls_write(tls_out, data + sent, length - sent); if (status <= 0) return status; /* TODO no idea how to handle errors */ sent += status; } http_out->remContentLength -= sent; return sent; } int rpc_in_write(rdpRpc* rpc, uint8* data, int length) { int sent = 0; int status = -1; rdpRpcHTTP* http_in = rpc->http_in; rdpTls* tls_in = rpc->tls_in; if (http_in->state == RPC_HTTP_DISCONNECTED) { if (!rpc_in_connect_http(rpc)) return -1; } if (http_in->remContentLength < length) { printf("RPC Error: HTTP frame is over.\n"); return -1;/* TODO ChannelRecycling */ } #ifdef WITH_DEBUG_RPC printf("rpc_in_write() length: %d, remaining content length: %d\n", length, http_in->remContentLength); freerdp_hexdump(data, length); printf("\n"); #endif while (sent < length) { status = tls_write(tls_in, data + sent, length - sent); if (status <= 0) return status; /* TODO no idea how to handle errors */ sent += status; } rpc->BytesSent += sent; http_in->remContentLength -= sent; return sent; } uint8* rpc_create_cookie() { uint8* ret = xmalloc(16); RAND_pseudo_bytes(ret, 16); return ret; } boolean rpc_out_send_CONN_A1(rdpRpc* rpc) { STREAM* pdu = stream_new(76); DEBUG_RPC("Sending CONN_A1"); uint8 rpc_vers = 0x05; uint8 rpc_vers_minor = 0x00; uint8 ptype = PTYPE_RTS; uint8 pfc_flags = PFC_FIRST_FRAG | PFC_LAST_FRAG; uint32 packet_drep = 0x00000010; uint16 frag_length = 76; uint16 auth_length = 0; uint32 call_id = 0x00000000; uint16 flags = 0x0000; uint16 num_commands = 0x0004; uint32 vCommandType = 0x00000006; uint32 Version = 0x00000001; uint32 vccCommandType = 0x00000003; uint32 occCommandType = 0x00000003; uint32 rwsCommandType = 0x00000000; uint32 receiveWindowSize = 0x00010000; rpc->virtualConnectionCookie = rpc_create_cookie(); /* 16 bytes */ rpc->OUTChannelCookie = rpc_create_cookie(); /* 16 bytes */ rpc->AwailableWindow = receiveWindowSize; stream_write_uint8(pdu, rpc_vers); stream_write_uint8(pdu, rpc_vers_minor); stream_write_uint8(pdu, ptype); stream_write_uint8(pdu, pfc_flags); stream_write_uint32(pdu, packet_drep); stream_write_uint16(pdu, frag_length); stream_write_uint16(pdu, auth_length); stream_write_uint32(pdu, call_id); stream_write_uint16(pdu, flags); stream_write_uint16(pdu, num_commands); stream_write_uint32(pdu, vCommandType); stream_write_uint32(pdu, Version); stream_write_uint32(pdu, vccCommandType); stream_write(pdu, rpc->virtualConnectionCookie, 16); stream_write_uint32(pdu, occCommandType); stream_write(pdu, rpc->OUTChannelCookie, 16); stream_write_uint32(pdu, rwsCommandType); stream_write_uint32(pdu, receiveWindowSize); rpc_out_write(rpc, pdu->data, stream_get_length(pdu)); stream_free(pdu); return true; } boolean rpc_in_send_CONN_B1(rdpRpc* rpc) { STREAM* s = stream_new(104); DEBUG_RPC("Sending CONN_B1"); uint8 rpc_vers = 0x05; uint8 rpc_vers_minor = 0x00; uint8 ptype = PTYPE_RTS; uint8 pfc_flags = PFC_FIRST_FRAG | PFC_LAST_FRAG; uint32 packet_drep = 0x00000010; uint16 frag_length = 104; uint16 auth_length = 0; uint32 call_id = 0x00000000; uint16 flags = 0x0000; uint16 num_commands = 0x0006; uint32 vCommandType = 0x00000006; uint32 Version = 0x00000001; uint32 vccCommandType = 0x00000003; uint32 iccCommandType = 0x00000003; uint32 clCommandType = 0x00000004; uint32 ChannelLifetime = 0x40000000; uint32 ckCommandType = 0x00000005; uint32 ClientKeepalive = 0x000493e0; uint32 agidCommandType = 0x0000000c; uint8* AssociationGroupId; rpc->INChannelCookie = rpc_create_cookie(); /* 16 bytes */ AssociationGroupId = rpc_create_cookie(); /* 16 bytes */ stream_write_uint8(s, rpc_vers); stream_write_uint8(s, rpc_vers_minor); stream_write_uint8(s, ptype); stream_write_uint8(s, pfc_flags); stream_write_uint32(s, packet_drep); stream_write_uint16(s, frag_length); stream_write_uint16(s, auth_length); stream_write_uint32(s, call_id); stream_write_uint16(s, flags); stream_write_uint16(s, num_commands); stream_write_uint32(s, vCommandType); stream_write_uint32(s, Version); stream_write_uint32(s, vccCommandType); stream_write(s, rpc->virtualConnectionCookie, 16); stream_write_uint32(s, iccCommandType); stream_write(s, rpc->INChannelCookie, 16); stream_write_uint32(s, clCommandType); stream_write_uint32(s, ChannelLifetime); stream_write_uint32(s, ckCommandType); stream_write_uint32(s, ClientKeepalive); stream_write_uint32(s, agidCommandType); stream_write(s, AssociationGroupId, 16); stream_seal(s); rpc_in_write(rpc, s->data, s->size); stream_free(s); return true; } boolean rpc_in_send_keep_alive(rdpRpc* rpc) { STREAM* s = stream_new(28); uint8 rpc_vers = 0x05; uint8 rpc_vers_minor = 0x00; uint8 ptype = PTYPE_RTS; uint8 pfc_flags = PFC_FIRST_FRAG | PFC_LAST_FRAG; uint32 packet_drep = 0x00000010; uint16 frag_length = 28; uint16 auth_length = 0; uint32 call_id = 0x00000000; uint16 flags = 0x0002; uint16 num_commands = 0x0001; uint32 ckCommandType = 0x00000005; uint32 ClientKeepalive = 0x00007530; stream_write_uint8(s, rpc_vers); stream_write_uint8(s, rpc_vers_minor); stream_write_uint8(s, ptype); stream_write_uint8(s, pfc_flags); stream_write_uint32(s, packet_drep); stream_write_uint16(s, frag_length); stream_write_uint16(s, auth_length); stream_write_uint32(s, call_id); stream_write_uint16(s, flags); stream_write_uint16(s, num_commands); stream_write_uint32(s, ckCommandType); stream_write_uint32(s, ClientKeepalive); rpc_in_write(rpc, s->data, stream_get_length(s)); stream_free(s); return true; } boolean rpc_in_send_bind(rdpRpc* rpc) { STREAM* pdu; rpcconn_bind_hdr_t* bind_pdu; rdpSettings* settings = rpc->settings; STREAM* ntlm_stream = stream_new(0xFFFF); /* TODO: Set NTLMv2 + DO_NOT_SEAL, DomainName = GatewayName? */ rpc->ntlm = ntlm_new(); DEBUG_RPC("TODO: complete NTLM integration"); ntlm_client_init(rpc->ntlm, settings->username, settings->password, settings->domain); ntlm_authenticate(rpc->ntlm); ntlm_stream->size = rpc->ntlm->outputBuffer.cbBuffer; ntlm_stream->p = ntlm_stream->data = rpc->ntlm->outputBuffer.pvBuffer; bind_pdu = xnew(rpcconn_bind_hdr_t); bind_pdu->rpc_vers = 5; bind_pdu->rpc_vers_minor = 0; bind_pdu->PTYPE = PTYPE_BIND; bind_pdu->pfc_flags = PFC_FIRST_FRAG | PFC_LAST_FRAG | PFC_PENDING_CANCEL | PFC_CONC_MPX; bind_pdu->packed_drep[0] = 0x10; bind_pdu->packed_drep[1] = 0x00; bind_pdu->packed_drep[2] = 0x00; bind_pdu->packed_drep[3] = 0x00; bind_pdu->frag_length = 124 + ntlm_stream->size; bind_pdu->auth_length = ntlm_stream->size; bind_pdu->call_id = 2; bind_pdu->max_xmit_frag = 0x0FF8; bind_pdu->max_recv_frag = 0x0FF8; bind_pdu->assoc_group_id = 0; bind_pdu->p_context_elem.n_context_elem = 2; bind_pdu->p_context_elem.reserved = 0; bind_pdu->p_context_elem.reserved2 = 0; bind_pdu->p_context_elem.p_cont_elem = xmalloc(sizeof(p_cont_elem_t) * bind_pdu->p_context_elem.n_context_elem); bind_pdu->p_context_elem.p_cont_elem[0].p_cont_id = 0; bind_pdu->p_context_elem.p_cont_elem[0].n_transfer_syn = 1; bind_pdu->p_context_elem.p_cont_elem[0].reserved = 0; bind_pdu->p_context_elem.p_cont_elem[0].abstract_syntax.if_uuid.time_low = 0x44e265dd; bind_pdu->p_context_elem.p_cont_elem[0].abstract_syntax.if_uuid.time_mid = 0x7daf; bind_pdu->p_context_elem.p_cont_elem[0].abstract_syntax.if_uuid.time_hi_and_version = 0x42cd; bind_pdu->p_context_elem.p_cont_elem[0].abstract_syntax.if_uuid.clock_seq_hi_and_reserved = 0x85; bind_pdu->p_context_elem.p_cont_elem[0].abstract_syntax.if_uuid.clock_seq_low = 0x60; bind_pdu->p_context_elem.p_cont_elem[0].abstract_syntax.if_uuid.node[0] = 0x3c; bind_pdu->p_context_elem.p_cont_elem[0].abstract_syntax.if_uuid.node[1] = 0xdb; bind_pdu->p_context_elem.p_cont_elem[0].abstract_syntax.if_uuid.node[2] = 0x6e; bind_pdu->p_context_elem.p_cont_elem[0].abstract_syntax.if_uuid.node[3] = 0x7a; bind_pdu->p_context_elem.p_cont_elem[0].abstract_syntax.if_uuid.node[4] = 0x27; bind_pdu->p_context_elem.p_cont_elem[0].abstract_syntax.if_uuid.node[5] = 0x29; bind_pdu->p_context_elem.p_cont_elem[0].abstract_syntax.if_version = 0x00030001; bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes = xmalloc(sizeof(p_syntax_id_t)); bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes[0].if_uuid.time_low = 0x8a885d04; bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes[0].if_uuid.time_mid = 0x1ceb; bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes[0].if_uuid.time_hi_and_version = 0x11c9; bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes[0].if_uuid.clock_seq_hi_and_reserved = 0x9f; bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes[0].if_uuid.clock_seq_low = 0xe8; bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes[0].if_uuid.node[0] = 0x08; bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes[0].if_uuid.node[1] = 0x00; bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes[0].if_uuid.node[2] = 0x2b; bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes[0].if_uuid.node[3] = 0x10; bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes[0].if_uuid.node[4] = 0x48; bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes[0].if_uuid.node[5] = 0x60; bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes[0].if_version = 0x00000002; bind_pdu->p_context_elem.p_cont_elem[1].p_cont_id = 1; bind_pdu->p_context_elem.p_cont_elem[1].n_transfer_syn = 1; bind_pdu->p_context_elem.p_cont_elem[1].reserved = 0; bind_pdu->p_context_elem.p_cont_elem[1].abstract_syntax.if_uuid.time_low = 0x44e265dd; bind_pdu->p_context_elem.p_cont_elem[1].abstract_syntax.if_uuid.time_mid = 0x7daf; bind_pdu->p_context_elem.p_cont_elem[1].abstract_syntax.if_uuid.time_hi_and_version = 0x42cd; bind_pdu->p_context_elem.p_cont_elem[1].abstract_syntax.if_uuid.clock_seq_hi_and_reserved = 0x85; bind_pdu->p_context_elem.p_cont_elem[1].abstract_syntax.if_uuid.clock_seq_low = 0x60; bind_pdu->p_context_elem.p_cont_elem[1].abstract_syntax.if_uuid.node[0] = 0x3c; bind_pdu->p_context_elem.p_cont_elem[1].abstract_syntax.if_uuid.node[1] = 0xdb; bind_pdu->p_context_elem.p_cont_elem[1].abstract_syntax.if_uuid.node[2] = 0x6e; bind_pdu->p_context_elem.p_cont_elem[1].abstract_syntax.if_uuid.node[3] = 0x7a; bind_pdu->p_context_elem.p_cont_elem[1].abstract_syntax.if_uuid.node[4] = 0x27; bind_pdu->p_context_elem.p_cont_elem[1].abstract_syntax.if_uuid.node[5] = 0x29; bind_pdu->p_context_elem.p_cont_elem[1].abstract_syntax.if_version = 0x00030001; bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes = xmalloc(sizeof(p_syntax_id_t)); bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes[0].if_uuid.time_low = 0x6cb71c2c; bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes[0].if_uuid.time_mid = 0x9812; bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes[0].if_uuid.time_hi_and_version = 0x4540; bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes[0].if_uuid.clock_seq_hi_and_reserved = 0x03; bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes[0].if_uuid.clock_seq_low = 0x00; bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes[0].if_uuid.node[0] = 0x00; bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes[0].if_uuid.node[1] = 0x00; bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes[0].if_uuid.node[2] = 0x00; bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes[0].if_uuid.node[3] = 0x00; bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes[0].if_uuid.node[4] = 0x00; bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes[0].if_uuid.node[5] = 0x00; bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes[0].if_version = 0x00000001; bind_pdu->auth_verifier.auth_pad = NULL; /* align(4); size_is(auth_pad_length) p*/ bind_pdu->auth_verifier.auth_type = 0x0a; /* :01 which authent service */ bind_pdu->auth_verifier.auth_level = 0x05; /* :01 which level within service */ bind_pdu->auth_verifier.auth_pad_length = 0x00; /* :01 */ bind_pdu->auth_verifier.auth_reserved = 0x00; /* :01 reserved, m.b.z. */ bind_pdu->auth_verifier.auth_context_id = 0x00000000; /* :04 */ bind_pdu->auth_verifier.auth_value = xmalloc(bind_pdu->auth_length); /* credentials; size_is(auth_length) p*/; memcpy(bind_pdu->auth_verifier.auth_value, ntlm_stream->data, bind_pdu->auth_length); stream_free(ntlm_stream); pdu = stream_new(bind_pdu->frag_length); stream_write(pdu, bind_pdu, 24); stream_write(pdu, &bind_pdu->p_context_elem, 4); stream_write(pdu, bind_pdu->p_context_elem.p_cont_elem, 24); stream_write(pdu, bind_pdu->p_context_elem.p_cont_elem[0].transfer_syntaxes, 20); stream_write(pdu, bind_pdu->p_context_elem.p_cont_elem + 1, 24); stream_write(pdu, bind_pdu->p_context_elem.p_cont_elem[1].transfer_syntaxes, 20); if (bind_pdu->auth_verifier.auth_pad_length > 0) stream_write(pdu, bind_pdu->auth_verifier.auth_pad, bind_pdu->auth_verifier.auth_pad_length); stream_write(pdu, &bind_pdu->auth_verifier.auth_type, 8); /* assumed that uint8 pointer is 32bit long (4 bytes) */ stream_write(pdu, bind_pdu->auth_verifier.auth_value, bind_pdu->auth_length); rpc_in_write(rpc, pdu->data, stream_get_length(pdu)); /* TODO there is some allocated memory */ xfree(bind_pdu); return true; } boolean rpc_in_send_rpc_auth_3(rdpRpc* rpc) { rpcconn_rpc_auth_3_hdr_t* rpc_auth_3_pdu; STREAM* ntlm_stream = stream_new(0xFFFF); ntlm_authenticate(rpc->ntlm); ntlm_stream->size = rpc->ntlm->outputBuffer.cbBuffer; ntlm_stream->p = ntlm_stream->data = rpc->ntlm->outputBuffer.pvBuffer; rpc_auth_3_pdu = xnew(rpcconn_rpc_auth_3_hdr_t); rpc_auth_3_pdu->rpc_vers = 5; rpc_auth_3_pdu->rpc_vers_minor = 0; rpc_auth_3_pdu->PTYPE = PTYPE_RPC_AUTH_3; rpc_auth_3_pdu->pfc_flags = PFC_FIRST_FRAG | PFC_LAST_FRAG | PFC_CONC_MPX; rpc_auth_3_pdu->packed_drep[0] = 0x10; rpc_auth_3_pdu->packed_drep[1] = 0x00; rpc_auth_3_pdu->packed_drep[2] = 0x00; rpc_auth_3_pdu->packed_drep[3] = 0x00; rpc_auth_3_pdu->frag_length = 28 + ntlm_stream->size; rpc_auth_3_pdu->auth_length = ntlm_stream->size; rpc_auth_3_pdu->call_id = 2; rpc_auth_3_pdu->max_xmit_frag = 0x0FF8; rpc_auth_3_pdu->max_recv_frag = 0x0FF8; rpc_auth_3_pdu->auth_verifier.auth_pad = NULL; /* align(4); size_is(auth_pad_length) p */ rpc_auth_3_pdu->auth_verifier.auth_type = 0x0a; /* :01 which authent service */ rpc_auth_3_pdu->auth_verifier.auth_level = 0x05; /* :01 which level within service */ rpc_auth_3_pdu->auth_verifier.auth_pad_length = 0x00; /* :01 */ rpc_auth_3_pdu->auth_verifier.auth_reserved = 0x00; /* :01 reserved, m.b.z. */ rpc_auth_3_pdu->auth_verifier.auth_context_id = 0x00000000; /* :04 */ rpc_auth_3_pdu->auth_verifier.auth_value = xmalloc(rpc_auth_3_pdu->auth_length); /* credentials; size_is(auth_length) p */ memcpy(rpc_auth_3_pdu->auth_verifier.auth_value, ntlm_stream->data, rpc_auth_3_pdu->auth_length); stream_free(ntlm_stream); STREAM* pdu = stream_new(rpc_auth_3_pdu->frag_length); stream_write(pdu, rpc_auth_3_pdu, 20); if (rpc_auth_3_pdu->auth_verifier.auth_pad_length > 0) stream_write(pdu, rpc_auth_3_pdu->auth_verifier.auth_pad, rpc_auth_3_pdu->auth_verifier.auth_pad_length); stream_write(pdu, &rpc_auth_3_pdu->auth_verifier.auth_type, 8); stream_write(pdu, rpc_auth_3_pdu->auth_verifier.auth_value, rpc_auth_3_pdu->auth_length); rpc_in_write(rpc, pdu->data, stream_get_length(pdu)); xfree(rpc_auth_3_pdu); return true; } boolean rpc_in_send_flow_control(rdpRpc* rpc) { STREAM* s = stream_new(56); uint8* b; uint8 rpc_vers = 0x05; uint8 rpc_vers_minor = 0x00; uint8 ptype = PTYPE_RTS; uint8 pfc_flags = PFC_FIRST_FRAG | PFC_LAST_FRAG; uint32 packet_drep = 0x00000010; uint16 frag_length = 56; uint16 auth_length = 0; uint32 call_id = 0x00000000; uint16 flags = 0x0002; uint16 num_commands = 0x0002; uint32 ckCommandType = 0x0000000d; uint32 ClientKeepalive = 0x00000003; uint32 a = 0x00000001; uint32 aa = rpc->BytesReceived; uint32 aaa = 0x00010000; rpc->AwailableWindow = aaa; b = rpc->OUTChannelCookie; stream_write_uint8(s, rpc_vers); stream_write_uint8(s, rpc_vers_minor); stream_write_uint8(s, ptype); stream_write_uint8(s, pfc_flags); stream_write_uint32(s, packet_drep); stream_write_uint16(s, frag_length); stream_write_uint16(s, auth_length); stream_write_uint32(s, call_id); stream_write_uint16(s, flags); stream_write_uint16(s, num_commands); stream_write_uint32(s, ckCommandType); stream_write_uint32(s, ClientKeepalive); stream_write_uint32(s, a); stream_write_uint32(s, aa); stream_write_uint32(s, aaa); stream_write(s, b, 16); rpc_in_write(rpc, s->data, stream_get_length(s)); stream_free(s); return true; } boolean rpc_in_send_ping(rdpRpc* rpc) { STREAM* s = stream_new(20); uint8 rpc_vers = 0x05; uint8 rpc_vers_minor = 0x00; uint8 ptype = PTYPE_RTS; uint8 pfc_flags = PFC_FIRST_FRAG | PFC_LAST_FRAG; uint32 packet_drep = 0x00000010; uint16 frag_length = 56; uint16 auth_length = 0; uint32 call_id = 0x00000000; uint16 flags = 0x0001; uint16 num_commands = 0x0000; stream_write_uint8(s, rpc_vers); stream_write_uint8(s, rpc_vers_minor); stream_write_uint8(s, ptype); stream_write_uint8(s, pfc_flags); stream_write_uint32(s, packet_drep); stream_write_uint16(s, frag_length); stream_write_uint16(s, auth_length); stream_write_uint32(s, call_id); stream_write_uint16(s, flags); stream_write_uint16(s, num_commands); rpc_in_write(rpc, s->data, stream_get_length(s)); stream_free(s); return true; } int rpc_out_read_http_header(rdpRpc* rpc) { int status = 0; HttpResponse* http_response; rdpTls* tls_out = rpc->tls_out; http_response = http_response_recv(tls_out); return status; } int rpc_rts_recv(rdpRpc* rpc, uint8* pdu, int length) { int i; uint32 CommandType; uint16 flags = *(uint16*)(pdu + 16); uint16 num_commands = *(uint16*)(pdu + 18); uint8* iterator = pdu + 20; if (flags & RTS_FLAG_PING) { rpc_in_send_keep_alive(rpc); return 0; } for (i = 0; i < num_commands; i++) { CommandType = *(uint32*) iterator; switch (CommandType) { case 0x00000000: /* ReceiveWindowSize */ iterator += 8; break; case 0x00000001: /* FlowControlAck */ iterator += 28; break; case 0x00000002: /* ConnectionTimeout */ iterator += 8; break; case 0x00000003: /* Cookie */ iterator += 20; break; case 0x00000004: /* ChannelLifetime */ iterator += 8; break; case 0x00000005: /* ClientKeepalive */ iterator += 8; break; case 0x00000006: /* Version */ iterator += 8; break; case 0x00000007: /* Empty */ iterator += 4; break; case 0x00000008: /* Padding */ iterator += 8 + *(uint32*) (iterator + 4); break; case 0x00000009: /* NegativeANCE */ iterator += 4; break; case 0x0000000a: /* ANCE */ iterator += 4; break; case 0x0000000b: /* ClientAddress */ iterator += 4 + 4 + (12 * (*(uint32*) (iterator + 4))) + 12; break; case 0x0000000c: /* AssociationGroupId */ iterator += 20; break; case 0x0000000d: /* Destination */ iterator += 8; break; case 0x0000000e: /* PingTrafficSentNotify */ iterator += 8; break; default: printf(" Error: Unknown RTS CommandType: 0x%x\n", CommandType); return -1; } } return 0; } int rpc_out_read(rdpRpc* rpc, uint8* data, int length) { int status; uint8* pdu; uint8 ptype; uint16 frag_length; rdpTls* tls_out = rpc->tls_out; rdpRpcHTTP* http_out = rpc->http_out; if (rpc->AwailableWindow < 0x00008FFF) /* Just a simple workaround */ rpc_in_send_flow_control(rpc); /* Send FlowControlAck every time AW reaches the half */ if (http_out->remContentLength <= 0xFFFF) /* TODO make ChannelRecycling */ { if (rpc_out_read_http_header(rpc) < 0) return -1; } pdu = xmalloc(0xFFFF); status = tls_read(tls_out, pdu, 10); if (status <= 0) /* read first 10 bytes to get the frag_length value */ { xfree(pdu); return status; } ptype = *(pdu + 2); frag_length = *((uint16*) (pdu + 8)); status = tls_read(tls_out, pdu + 10, frag_length - 10); if (status < 0) { xfree(pdu); return status; } if (ptype == 0x14) /* RTS PDU */ { rpc_rts_recv(rpc, pdu, frag_length); xfree(pdu); return 0; } else { rpc->BytesReceived += frag_length; /* RTS PDUs are not subjects for FlowControl */ rpc->AwailableWindow -= frag_length; } http_out->remContentLength -= frag_length; if (length < frag_length) { printf("rpc_out_read(): Error! Given buffer is to small. Received data fits not in.\n"); xfree(pdu); return -1; /* TODO add buffer for storing remaining data for the next read in case destination buffer is too small */ } memcpy(data, pdu, frag_length); #ifdef WITH_DEBUG_RPC printf("rpc_out_recv(): length: %d, remaining content length: %d\n", frag_length, http_out->remContentLength); freerdp_hexdump(data, frag_length); printf("\n"); #endif xfree(pdu); return frag_length; } int rpc_out_recv_bind_ack(rdpRpc* rpc) { uint16 frag_length; uint16 auth_length; STREAM* ntlmssp_stream; int pdu_length = 0x8FFF; /* 32KB buffer */ uint8* pdu = xmalloc(pdu_length); int status = rpc_out_read(rpc, pdu, pdu_length); DEBUG_RPC("TODO: complete NTLM integration"); if (status > 0) { frag_length = *((uint16*)(pdu + 8)); auth_length = *((uint16*)(pdu + 10)); ntlmssp_stream = stream_new(0xFFFF); stream_write(ntlmssp_stream, (pdu + (frag_length - auth_length)), auth_length); ntlmssp_stream->p = ntlmssp_stream->data; //ntlmssp_recv(rpc->ntlmssp, ntlmssp_stream); stream_free(ntlmssp_stream); } xfree(pdu); return status; } int rpc_write(rdpRpc* rpc, uint8* data, int length, uint16 opnum) { int i; int status = -1; rpcconn_request_hdr_t* request_pdu; uint8 auth_pad_length = 16 - ((24 + length + 8 + 16) % 16); if (auth_pad_length == 16) auth_pad_length = 0; request_pdu = xnew(rpcconn_request_hdr_t); request_pdu->rpc_vers = 5; request_pdu->rpc_vers_minor = 0; request_pdu->PTYPE = PTYPE_REQUEST; request_pdu->pfc_flags = PFC_FIRST_FRAG | PFC_LAST_FRAG; request_pdu->packed_drep[0] = 0x10; request_pdu->packed_drep[1] = 0x00; request_pdu->packed_drep[2] = 0x00; request_pdu->packed_drep[3] = 0x00; request_pdu->frag_length = 24 + length + auth_pad_length + 8 + 16; request_pdu->auth_length = 16; request_pdu->call_id = ++rpc->call_id; /* opnum=8 means [MS-TSGU] TsProxySetupRecievePipe, save call_id for checking pipe responses */ if (opnum == 8) rpc->pipe_call_id = rpc->call_id; request_pdu->alloc_hint = length; request_pdu->p_cont_id = 0x0000; request_pdu->opnum = opnum; request_pdu->stub_data = data; request_pdu->auth_verifier.auth_type = 0x0a; /* :01 which authentication service */ request_pdu->auth_verifier.auth_level = 0x05; /* :01 which level within service */ request_pdu->auth_verifier.auth_pad_length = auth_pad_length; /* :01 */ request_pdu->auth_verifier.auth_pad = xmalloc(auth_pad_length); /* align(4); size_is(auth_pad_length) p */ for (i = 0; i < auth_pad_length; i++) { request_pdu->auth_verifier.auth_pad[i] = 0x00; } request_pdu->auth_verifier.auth_reserved = 0x00; /* :01 reserved, m.b.z. */ request_pdu->auth_verifier.auth_context_id = 0x00000000; /* :04 */ request_pdu->auth_verifier.auth_value = xmalloc(request_pdu->auth_length); /* credentials; size_is(auth_length) p */ STREAM* pdu = stream_new(request_pdu->frag_length); stream_write(pdu, request_pdu, 24); stream_write(pdu, request_pdu->stub_data, request_pdu->alloc_hint); if (request_pdu->auth_verifier.auth_pad_length > 0) stream_write(pdu, request_pdu->auth_verifier.auth_pad, request_pdu->auth_verifier.auth_pad_length); stream_write(pdu, &request_pdu->auth_verifier.auth_type, 8); rdpBlob rdpMsg; rdpMsg.data = pdu->data; rdpMsg.length = stream_get_length(pdu); DEBUG_RPC("TODO: complete NTLM integration"); //ntlmssp_encrypt_message(rpc->ntlmssp, &rdpMsg, NULL, request_pdu->auth_verifier.auth_value); stream_write(pdu, request_pdu->auth_verifier.auth_value, request_pdu->auth_length); status = rpc_in_write(rpc, pdu->data, pdu->p - pdu->data); xfree(request_pdu->auth_verifier.auth_value); xfree(request_pdu->auth_verifier.auth_pad); xfree(request_pdu); if (status < 0) { printf("rpc_write(): Error! rcph_in_write returned negative value.\n"); return status; } return length; } int rpc_read(rdpRpc* rpc, uint8* data, int length) { int status; int read = 0; int data_length; uint16 frag_length; uint16 auth_length; uint8 auth_pad_length; uint32 call_id = -1; int rpc_length = length + 0xFF; uint8* rpc_data = xmalloc(rpc_length); if (rpc->read_buffer_len > 0) { if (rpc->read_buffer_len > length) { /*TODO fix read_buffer is too long problem */ printf("ERROR! RPCH Stores data in read_buffer fits not in data on rpc_read.\n"); return -1; } memcpy(data, rpc->read_buffer, rpc->read_buffer_len); read += rpc->read_buffer_len; xfree(rpc->read_buffer); rpc->read_buffer_len = 0; } while (true) { status = rpc_out_read(rpc, rpc_data, rpc_length); if (status == 0) { xfree(rpc_data); return read; } else if (status < 0) { printf("\nError! rpc_out_read() returned negative value. BytesSent: %d, BytesReceived: %d\n", rpc->BytesSent, rpc->BytesReceived); xfree(rpc_data); return status; } frag_length = *(uint16*)(rpc_data + 8); auth_length = *(uint16*)(rpc_data + 10); call_id = *(uint32*)(rpc_data + 12); status = *(uint32*)(rpc_data + 16); /* alloc_hint */ auth_pad_length = *(rpc_data + frag_length - auth_length - 6); /* -6 = -8 + 2 (sec_trailer + 2) */ /* data_length must be calculated because alloc_hint carries size of more than one pdu */ data_length = frag_length - auth_length - 24 - 8 - auth_pad_length; /* 24 is header; 8 is sec_trailer */ if (status == 4) continue; if (read + data_length > length) /* if read data is greater then given buffer */ { rpc->read_buffer_len = read + data_length - length; rpc->read_buffer = xmalloc(rpc->read_buffer_len); data_length -= rpc->read_buffer_len; memcpy(rpc->read_buffer, rpc_data + 24 + data_length, rpc->read_buffer_len); } memcpy(data + read, rpc_data + 24, data_length); read += data_length; if (status > data_length && read < length) continue; break; } xfree(rpc_data); return read; } boolean rpc_connect(rdpRpc* rpc) { int status; uint8* pdu; int pdu_length; if (!rpc_out_send_CONN_A1(rpc)) { printf("rpc_out_send_CONN_A1 fault!\n"); return false; } pdu_length = 0xFFFF; pdu = xmalloc(pdu_length); status = rpc_out_read(rpc, pdu, pdu_length); if (!rpc_in_send_CONN_B1(rpc)) { printf("rpc_out_send_CONN_A1 fault!\n"); return false; } status = rpc_out_read(rpc, pdu, pdu_length); /* [MS-RPCH] 3.2.1.5.3.1 Connection Establishment * at this point VirtualChannel is created */ if (!rpc_in_send_bind(rpc)) { printf("rpc_out_send_bind fault!\n"); return false; } if (!rpc_out_recv_bind_ack(rpc)) { printf("rpc_out_recv_bind_ack fault!\n"); return false; } if (!rpc_in_send_rpc_auth_3(rpc)) { printf("rpc_out_send_rpc_auth_3 fault!\n"); return false; } xfree(pdu); return true; } rdpRpc* rpc_new(rdpSettings* settings) { rdpRpc* rpc = (rdpRpc*) xnew(rdpRpc); if (rpc != NULL) { rpc->http_in = (rdpRpcHTTP*) xnew(rdpRpcHTTP); rpc->http_out = (rdpRpcHTTP*) xnew(rdpRpcHTTP); rpc->http_in->ntlm = ntlm_new(); rpc->http_out->ntlm = ntlm_new(); rpc->http_in->state = RPC_HTTP_DISCONNECTED; rpc->http_out->state = RPC_HTTP_DISCONNECTED; rpc->http_in->context = http_context_new(); http_context_set_method(rpc->http_in->context, "RPC_IN_DATA"); http_context_set_uri(rpc->http_in->context, "/rpc/rpcproxy.dll?localhost:3388"); http_context_set_accept(rpc->http_in->context, "application/rpc"); http_context_set_cache_control(rpc->http_in->context, "no-cache"); http_context_set_connection(rpc->http_in->context, "Keep-Alive"); http_context_set_user_agent(rpc->http_in->context, "MSRPC"); http_context_set_host(rpc->http_in->context, settings->tsg_hostname); http_context_set_pragma(rpc->http_in->context, "ResourceTypeUuid=44e265dd-7daf-42cd-8560-3cdb6e7a2729, " "SessionId=33ad20ac-7469-4f63-946d-113eac21a23c"); rpc->http_out->context = http_context_new(); http_context_set_method(rpc->http_out->context, "RPC_OUT_DATA"); http_context_set_uri(rpc->http_out->context, "/rpc/rpcproxy.dll?localhost:3388"); http_context_set_accept(rpc->http_out->context, "application/rpc"); http_context_set_cache_control(rpc->http_out->context, "no-cache"); http_context_set_connection(rpc->http_out->context, "Keep-Alive"); http_context_set_user_agent(rpc->http_out->context, "MSRPC"); http_context_set_host(rpc->http_out->context, settings->tsg_hostname); http_context_set_pragma(rpc->http_out->context, "ResourceTypeUuid=44e265dd-7daf-42cd-8560-3cdb6e7a2729, " "SessionId=33ad20ac-7469-4f63-946d-113eac21a23c"); rpc->read_buffer = NULL; rpc->write_buffer = NULL; rpc->read_buffer_len = 0; rpc->write_buffer_len = 0; rpc->BytesReceived = 0; rpc->AwailableWindow = 0; rpc->BytesSent = 0; rpc->RecAwailableWindow = 0; rpc->settings = settings; rpc->ntlm = ntlm_new(); rpc->call_id = 0; } return rpc; }