/** * FreeRDP: A Remote Desktop Protocol Implementation * Network Level Authentication (NLA) * * Copyright 2010-2012 Marc-Andre Moreau * Copyright 2015 Thincast Technologies GmbH * Copyright 2015 DI (FH) Martin Haimberger * Copyright 2016 Martin Fleisz * Copyright 2017 Dorian Ducournau * Copyright 2022 David Fort * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "nla.h" #include "utils.h" #include #define TAG FREERDP_TAG("core.nla") #define SERVER_KEY "Software\\" FREERDP_VENDOR_STRING "\\" FREERDP_PRODUCT_STRING "\\Server" /** * TSRequest ::= SEQUENCE { * version [0] INTEGER, * negoTokens [1] NegoData OPTIONAL, * authInfo [2] OCTET STRING OPTIONAL, * pubKeyAuth [3] OCTET STRING OPTIONAL, * errorCode [4] INTEGER OPTIONAL * } * * NegoData ::= SEQUENCE OF NegoDataItem * * NegoDataItem ::= SEQUENCE { * negoToken [0] OCTET STRING * } * * TSCredentials ::= SEQUENCE { * credType [0] INTEGER, * credentials [1] OCTET STRING * } * * TSPasswordCreds ::= SEQUENCE { * domainName [0] OCTET STRING, * userName [1] OCTET STRING, * password [2] OCTET STRING * } * * TSSmartCardCreds ::= SEQUENCE { * pin [0] OCTET STRING, * cspData [1] TSCspDataDetail, * userHint [2] OCTET STRING OPTIONAL, * domainHint [3] OCTET STRING OPTIONAL * } * * TSCspDataDetail ::= SEQUENCE { * keySpec [0] INTEGER, * cardName [1] OCTET STRING OPTIONAL, * readerName [2] OCTET STRING OPTIONAL, * containerName [3] OCTET STRING OPTIONAL, * cspName [4] OCTET STRING OPTIONAL * } * */ #define NLA_PKG_NAME NEGO_SSP_NAME #define TERMSRV_SPN_PREFIX "TERMSRV/" struct rdp_nla { BOOL server; NLA_STATE state; ULONG sendSeqNum; ULONG recvSeqNum; rdpContext* rdpcontext; CtxtHandle context; LPSTR SspiModule; char* SamFile; rdpTransport* transport; UINT32 cbMaxToken; CHAR* packageName; UINT32 version; UINT32 peerVersion; UINT32 errorCode; ULONG fContextReq; ULONG pfContextAttr; BOOL haveContext; BOOL haveInputBuffer; BOOL havePubKeyAuth; SECURITY_STATUS status; CredHandle credentials; TimeStamp expiration; /* Lifetime of buffer nla_new -> nla_free */ SecBuffer ClientNonce; /* Depending on protocol version a random nonce or a value read from the server. */ SecBuffer negoToken; SecBuffer pubKeyAuth; SecBuffer authInfo; SecBuffer PublicKey; SecBuffer tsCredentials; LPTSTR ServicePrincipalName; SEC_WINNT_AUTH_IDENTITY* identity; SEC_WINNT_AUTH_IDENTITY_WINPR identityWinPr; SEC_WINPR_KERBEROS_SETTINGS* kerberosSettings; PSecurityFunctionTable table; SecPkgContext_Sizes ContextSizes; }; static BOOL nla_send(rdpNla* nla); static int nla_server_recv(rdpNla* nla); static void nla_buffer_free(rdpNla* nla); static SECURITY_STATUS nla_encrypt_public_key_echo(rdpNla* nla); static SECURITY_STATUS nla_encrypt_public_key_hash(rdpNla* nla); static SECURITY_STATUS nla_decrypt_public_key_echo(rdpNla* nla); static SECURITY_STATUS nla_decrypt_public_key_hash(rdpNla* nla); static SECURITY_STATUS nla_encrypt_ts_credentials(rdpNla* nla); static SECURITY_STATUS nla_decrypt_ts_credentials(rdpNla* nla); static BOOL nla_Digest_Update_From_SecBuffer(WINPR_DIGEST_CTX* ctx, const SecBuffer* buffer) { if (!buffer) return FALSE; return winpr_Digest_Update(ctx, buffer->pvBuffer, buffer->cbBuffer); } static BOOL nla_sec_buffer_alloc(SecBuffer* buffer, size_t size) { sspi_SecBufferFree(buffer); if (!sspi_SecBufferAlloc(buffer, size)) return FALSE; WINPR_ASSERT(buffer); buffer->BufferType = SECBUFFER_TOKEN; return TRUE; } static BOOL nla_sec_buffer_alloc_from_data(SecBuffer* buffer, const BYTE* data, size_t offset, size_t size) { BYTE* pb; if (!nla_sec_buffer_alloc(buffer, offset + size)) return FALSE; WINPR_ASSERT(buffer); pb = buffer->pvBuffer; memcpy(&pb[offset], data, size); return TRUE; } static BOOL nla_sec_buffer_alloc_from_buffer(SecBuffer* buffer, const SecBuffer* data, size_t offset) { return nla_sec_buffer_alloc_from_data(buffer, data->pvBuffer, offset, data->cbBuffer); } static BOOL nla_set_package_name(rdpNla* nla, const TCHAR* name) { if (!nla) return FALSE; free(nla->packageName); nla->packageName = NULL; if (name) { #if defined(UNICODE) ConvertFromUnicode(CP_UTF8, 0, name, -1, &nla->packageName, 0, NULL, NULL); #else nla->packageName = _strdup(name); #endif if (!nla->packageName) return FALSE; } return TRUE; } static SECURITY_STATUS nla_update_package_name(rdpNla* nla) { BOOL rc; SECURITY_STATUS status; PSecPkgInfo pPackageInfo; if (!nla || !nla->table) { WLog_ERR(TAG, "[%s] nla->table=%p->%p", __FUNCTION__, nla, nla ? nla->table : NULL); return ERROR_INTERNAL_ERROR; } if (!nla->table->QuerySecurityPackageInfo || !nla->table->FreeContextBuffer) { WLog_ERR(TAG, "[%s] QuerySecurityPackageInfo=%p, FreeContextBuffer=%p", __FUNCTION__, nla->table->QuerySecurityPackageInfo, nla->table->FreeContextBuffer); return ERROR_INTERNAL_ERROR; } status = nla->table->QuerySecurityPackageInfo(NLA_PKG_NAME, &pPackageInfo); if (status != SEC_E_OK) { WLog_ERR(TAG, "QuerySecurityPackageInfo status %s [0x%08" PRIX32 "]", GetSecurityStatusString(status), status); return status; } nla->cbMaxToken = pPackageInfo->cbMaxToken; rc = nla_set_package_name(nla, pPackageInfo->Name); status = nla->table->FreeContextBuffer(pPackageInfo); if (status != SEC_E_OK) { WLog_ERR(TAG, "FreeContextBuffer status %s [0x%08" PRIX32 "]", GetSecurityStatusString(status), status); return status; } if (!rc) return ERROR_WINS_INTERNAL; return status; } static SECURITY_STATUS nla_query_context_sizes(rdpNla* nla) { SECURITY_STATUS status; if (!nla || !nla->table) { WLog_ERR(TAG, "[%s] nla->table=%p->%p", __FUNCTION__, nla, nla ? nla->table : NULL); return SEC_E_INVALID_PARAMETER; } if (!nla->table->QueryContextAttributes) { WLog_ERR(TAG, "[%s] QueryContextAttributes=%p", __FUNCTION__, nla->table->QuerySecurityPackageInfo); return ERROR_INTERNAL_ERROR; } status = nla->table->QueryContextAttributes(&nla->context, SECPKG_ATTR_SIZES, &nla->ContextSizes); if (status != SEC_E_OK) { WLog_ERR(TAG, "QueryContextAttributes SECPKG_ATTR_SIZES failure %s [0x%08" PRIX32 "]", GetSecurityStatusString(status), status); } return status; } static SECURITY_STATUS nla_initialize_security_context(rdpNla* nla, BOOL initial, SecBufferDesc* pInputBufferDesc, SecBufferDesc* pOutputBufferDesc) { SECURITY_STATUS status; PCtxtHandle ctx = NULL; if (!nla || !nla->table) { WLog_ERR(TAG, "[%s] nla->table=%p->%p", __FUNCTION__, nla, nla ? nla->table : NULL); return SEC_E_INVALID_PARAMETER; } if (!nla->table->InitializeSecurityContext) { WLog_ERR(TAG, "[%s] InitializeSecurityContext=%p", __FUNCTION__, nla->table->InitializeSecurityContext); return ERROR_INTERNAL_ERROR; } if (!initial) ctx = &nla->context; status = nla->table->InitializeSecurityContext( &nla->credentials, ctx, nla->ServicePrincipalName, nla->fContextReq, 0, SECURITY_NATIVE_DREP, pInputBufferDesc, 0, &nla->context, pOutputBufferDesc, &nla->pfContextAttr, &nla->expiration); switch (status) { case SEC_E_INCOMPLETE_MESSAGE: case SEC_E_OK: case SEC_I_COMPLETE_AND_CONTINUE: case SEC_I_COMPLETE_NEEDED: case SEC_I_CONTINUE_NEEDED: case SEC_I_INCOMPLETE_CREDENTIALS: WLog_DBG(TAG, " InitializeSecurityContext status %s [0x%08" PRIX32 "]", GetSecurityStatusString(status), status); break; default: WLog_WARN(TAG, " InitializeSecurityContext failure status %s [0x%08" PRIX32 "]", GetSecurityStatusString(status), status); break; } return status; } static BOOL nla_complete_auth(rdpNla* nla, PSecBufferDesc pOutputBufferDesc) { SECURITY_STATUS status = SEC_E_INVALID_TOKEN; if (!nla || !nla->table) { WLog_ERR(TAG, "[%s] nla->table=%p->%p", __FUNCTION__, nla, nla ? nla->table : NULL); return FALSE; } if (!nla->table->CompleteAuthToken) { WLog_ERR(TAG, "[%s] CompleteAuthToken=%p", __FUNCTION__, nla->table->CompleteAuthToken); return FALSE; } nla->status = nla->table->CompleteAuthToken(&nla->context, pOutputBufferDesc); if (nla->status != SEC_E_OK) { WLog_WARN(TAG, "CompleteAuthToken status %s [0x%08" PRIX32 "]", GetSecurityStatusString(status), status); return FALSE; } return TRUE; } static SECURITY_STATUS nla_decrypt(rdpNla* nla, SecBuffer* buffer, size_t headerLength) { ULONG pfQOP = 0; SECURITY_STATUS status = SEC_E_INVALID_PARAMETER; SecBuffer Buffers[2]; SecBufferDesc Message; if (!nla || !nla->table) { WLog_ERR(TAG, "[%s] nla->table=%p->%p", __FUNCTION__, nla, nla ? nla->table : NULL); return SEC_E_INVALID_PARAMETER; } if (!nla->table->DecryptMessage) { WLog_ERR(TAG, "[%s] DecryptMessage=%p", __FUNCTION__, nla->table->DecryptMessage); return ERROR_INTERNAL_ERROR; } if (!buffer || (headerLength > buffer->cbBuffer)) { return SEC_E_INVALID_PARAMETER; } Buffers[0].BufferType = SECBUFFER_TOKEN; /* Signature */ Buffers[0].cbBuffer = (ULONG)headerLength; Buffers[0].pvBuffer = &((BYTE*)buffer->pvBuffer)[0]; Buffers[1].BufferType = SECBUFFER_DATA; /* Encrypted TLS Public Key */ Buffers[1].cbBuffer = (ULONG)(buffer->cbBuffer - headerLength); Buffers[1].pvBuffer = &((BYTE*)buffer->pvBuffer)[headerLength]; Message.cBuffers = 2; Message.ulVersion = SECBUFFER_VERSION; Message.pBuffers = Buffers; status = nla->table->DecryptMessage(&nla->context, &Message, nla->recvSeqNum++, &pfQOP); if (status != SEC_E_OK) { WLog_ERR(TAG, "DecryptMessage failure %s [%08" PRIX32 "]", GetSecurityStatusString(status), status); } return status; } static SECURITY_STATUS nla_encrypt(rdpNla* nla, SecBuffer* buffer, size_t headerLength) { SECURITY_STATUS status = SEC_E_INVALID_PARAMETER; SecBuffer Buffers[2]; SecBufferDesc Message; if (!nla || !nla->table) { WLog_ERR(TAG, "[%s] nla->table=%p->%p", __FUNCTION__, nla, nla ? nla->table : NULL); return SEC_E_INVALID_PARAMETER; } if (!nla->table->EncryptMessage) { WLog_ERR(TAG, "[%s] EncryptMessage=%p", __FUNCTION__, nla->table->EncryptMessage); return ERROR_INTERNAL_ERROR; } if (!buffer || (headerLength > buffer->cbBuffer)) { return SEC_E_INVALID_PARAMETER; } Message.cBuffers = 2; Buffers[0].BufferType = SECBUFFER_TOKEN; /* Signature */ Buffers[0].cbBuffer = (ULONG)headerLength; Buffers[0].pvBuffer = &((BYTE*)buffer->pvBuffer)[0]; Buffers[1].BufferType = SECBUFFER_DATA; Buffers[1].cbBuffer = (ULONG)(buffer->cbBuffer - headerLength); Buffers[1].pvBuffer = &((BYTE*)buffer->pvBuffer)[headerLength]; Message.pBuffers = Buffers; Message.ulVersion = SECBUFFER_VERSION; status = nla->table->EncryptMessage(&nla->context, 0, &Message, nla->sendSeqNum++); if (status != SEC_E_OK) { WLog_ERR(TAG, "EncryptMessage status %s [0x%08" PRIX32 "]", GetSecurityStatusString(status), status); return status; } if ((Message.cBuffers == 2) && (Buffers[0].cbBuffer < nla->ContextSizes.cbSecurityTrailer)) { /* IMPORTANT: EncryptMessage may not use all the signature space, so we need to shrink the * excess between the buffers */ MoveMemory(((BYTE*)Buffers[0].pvBuffer) + Buffers[0].cbBuffer, Buffers[1].pvBuffer, Buffers[1].cbBuffer); buffer->cbBuffer = Buffers[0].cbBuffer + Buffers[1].cbBuffer; } return status; } /* CredSSP Client-To-Server Binding Hash\0 */ static const BYTE ClientServerHashMagic[] = { 0x43, 0x72, 0x65, 0x64, 0x53, 0x53, 0x50, 0x20, 0x43, 0x6C, 0x69, 0x65, 0x6E, 0x74, 0x2D, 0x54, 0x6F, 0x2D, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x20, 0x42, 0x69, 0x6E, 0x64, 0x69, 0x6E, 0x67, 0x20, 0x48, 0x61, 0x73, 0x68, 0x00 }; /* CredSSP Server-To-Client Binding Hash\0 */ static const BYTE ServerClientHashMagic[] = { 0x43, 0x72, 0x65, 0x64, 0x53, 0x53, 0x50, 0x20, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x2D, 0x54, 0x6F, 0x2D, 0x43, 0x6C, 0x69, 0x65, 0x6E, 0x74, 0x20, 0x42, 0x69, 0x6E, 0x64, 0x69, 0x6E, 0x67, 0x20, 0x48, 0x61, 0x73, 0x68, 0x00 }; static const UINT32 NonceLength = 32; static BOOL nla_adjust_settings_from_smartcard(rdpNla* nla) { SmartcardCerts* certs = NULL; const SmartcardCertInfo* info = NULL; DWORD count; rdpSettings* settings; SEC_WINPR_KERBEROS_SETTINGS* kerbSettings; BOOL ret = FALSE; WINPR_ASSERT(nla); WINPR_ASSERT(nla->rdpcontext); settings = nla->rdpcontext->settings; WINPR_ASSERT(settings); if (!settings->SmartcardLogon) return TRUE; kerbSettings = nla->kerberosSettings; WINPR_ASSERT(kerbSettings); if (!settings->CspName) { if (!freerdp_settings_set_string(settings, FreeRDP_CspName, MS_SCARD_PROV_A)) { WLog_ERR(TAG, "unable to set CSP name"); return FALSE; } } if (settings->PkinitAnchors) { kerbSettings->pkinitX509Anchors = _strdup(settings->PkinitAnchors); if (!kerbSettings->pkinitX509Anchors) { WLog_ERR(TAG, "error setting X509 anchors"); return FALSE; } } if (!smartcard_enumerateCerts(settings, &certs, &count)) { WLog_ERR(TAG, "unable to list smartcard certificates"); return FALSE; } if (count < 1) { WLog_ERR(TAG, "no smartcard certificates found"); goto out; } if (count != 1) goto setup_pin; info = smartcard_getCertInfo(certs, 0); if (!info) goto out; /* * just one result let's try to fill missing parameters */ if (!settings->Username && info->userHint) { if (!freerdp_settings_set_string(settings, FreeRDP_Username, info->userHint)) { WLog_ERR(TAG, "unable to copy certificate username"); goto out; } } if (!settings->Domain && info->domainHint) { if (!freerdp_settings_set_string(settings, FreeRDP_Domain, info->domainHint)) { WLog_ERR(TAG, "unable to copy certificate domain"); goto out; } } if (!settings->ReaderName && info->reader) { if (ConvertFromUnicode(CP_UTF8, 0, info->reader, -1, &settings->ReaderName, 0, NULL, NULL) < 0) { WLog_ERR(TAG, "unable to copy reader name"); goto out; } } if (!settings->ContainerName && info->containerName) { if (!freerdp_settings_set_string(settings, FreeRDP_ContainerName, info->containerName)) { WLog_ERR(TAG, "unable to copy container name"); goto out; } } memcpy(kerbSettings->certSha1, info->sha1Hash, sizeof(kerbSettings->certSha1)); if (info->pkinitArgs) { kerbSettings->pkinitX509Identity = _strdup(info->pkinitArgs); if (!kerbSettings->pkinitX509Identity) { WLog_ERR(TAG, "unable to copy pkinitArgs"); goto out; } } setup_pin: ret = TRUE; out: smartcardCerts_Free(certs); return ret; } static BOOL nla_client_setup_identity(rdpNla* nla) { WINPR_SAM* sam; WINPR_SAM_ENTRY* entry; BOOL PromptPassword = FALSE; rdpSettings* settings; freerdp* instance; WINPR_ASSERT(nla); WINPR_ASSERT(nla->rdpcontext); settings = nla->rdpcontext->settings; WINPR_ASSERT(settings); instance = nla->rdpcontext->instance; WINPR_ASSERT(instance); /* */ if ((utils_str_is_empty(settings->Username) || (utils_str_is_empty(settings->Password) && utils_str_is_empty((const char*)settings->RedirectionPassword)))) { PromptPassword = TRUE; } if (PromptPassword && !utils_str_is_empty(settings->Username)) { sam = SamOpen(NULL, TRUE); if (sam) { entry = SamLookupUserA(sam, settings->Username, strlen(settings->Username), NULL, 0); if (entry) { /** * The user could be found in SAM database. * Use entry in SAM database later instead of prompt */ PromptPassword = FALSE; SamFreeEntry(sam, entry); } SamClose(sam); } } #ifndef _WIN32 if (PromptPassword) { if (settings->RestrictedAdminModeRequired) { if ((settings->PasswordHash) && (strlen(settings->PasswordHash) > 0)) PromptPassword = FALSE; } } #endif if (PromptPassword) { switch (utils_authenticate(instance, AUTH_NLA, TRUE)) { case AUTH_SKIP: case AUTH_SUCCESS: break; case AUTH_NO_CREDENTIALS: freerdp_set_last_error_log(instance->context, FREERDP_ERROR_CONNECT_NO_OR_MISSING_CREDENTIALS); return 0; default: return 0; } } if (!settings->Username) { sspi_FreeAuthIdentity(nla->identity); nla->identity = NULL; } else if (settings->SmartcardLogon) { #ifdef _WIN32 { CERT_CREDENTIAL_INFO certInfo = { sizeof(CERT_CREDENTIAL_INFO), { 0 } }; LPSTR marshalledCredentials; memcpy(certInfo.rgbHashOfCert, nla->kerberosSettings->certSha1, sizeof(certInfo.rgbHashOfCert)); if (!CredMarshalCredentialA(CertCredential, &certInfo, &marshalledCredentials)) { WLog_ERR(TAG, "error marshalling cert credentials"); return FALSE; } if (sspi_SetAuthIdentityA(nla->identity, marshalledCredentials, NULL, settings->Password) < 0) return -1; CredFree(marshalledCredentials); } #else if (sspi_SetAuthIdentityA(nla->identity, settings->Username, settings->Domain, settings->Password) < 0) return -1; #endif /* _WIN32 */ return TRUE; } else { BOOL usePassword = TRUE; if (settings->RedirectionPassword && (settings->RedirectionPasswordLength > 0)) { if (sspi_SetAuthIdentityWithUnicodePassword( nla->identity, settings->Username, settings->Domain, (UINT16*)settings->RedirectionPassword, settings->RedirectionPasswordLength / sizeof(WCHAR) - 1) < 0) return -1; } if (settings->RestrictedAdminModeRequired) { if (settings->PasswordHash && strlen(settings->PasswordHash) == 32) { if (sspi_SetAuthIdentityA(nla->identity, settings->Username, settings->Domain, settings->PasswordHash) < 0) return -1; /** * Increase password hash length by LB_PASSWORD_MAX_LENGTH to obtain a * length exceeding the maximum (LB_PASSWORD_MAX_LENGTH) and use it this for * hash identification in WinPR. */ nla->identity->PasswordLength += LB_PASSWORD_MAX_LENGTH; usePassword = FALSE; } } if (usePassword) { if (sspi_SetAuthIdentityA(nla->identity, settings->Username, settings->Domain, settings->Password) < 0) return -1; } } return TRUE; } static const char* parseInt(const char* v, INT32* r) { *r = 0; /* check that we have at least a digit */ if (!*v || !((*v >= '0') && (*v <= '9'))) return NULL; for (; *v && (*v >= '0') && (*v <= '9'); v++) { *r = (*r * 10) + (*v - '0'); } return v; } static BOOL parseKerberosDeltat(const char* value, INT32* dest, const char* message) { INT32 v; const char* ptr; WINPR_ASSERT(value); WINPR_ASSERT(dest); WINPR_ASSERT(message); /* determine the format : * h:m[:s] (3:00:02) deltat in hours/minutes * dhms 1d4h deltat in day/hours/minutes/seconds * deltat in seconds */ ptr = strchr(value, ':'); if (ptr) { /* format like h:m[:s] */ *dest = 0; value = parseInt(value, &v); if (!value || *value != ':') { WLog_ERR(TAG, "Invalid value for %s", message); return FALSE; } *dest = v * 3600; value = parseInt(value + 1, &v); if (!value || (*value != 0 && *value != ':') || (v > 60)) { WLog_ERR(TAG, "Invalid value for %s", message); return FALSE; } *dest += v * 60; if (*value == ':') { /* have optional seconds */ value = parseInt(value + 1, &v); if (!value || (*value != 0) || (v > 60)) { WLog_ERR(TAG, "Invalid value for %s", message); return FALSE; } *dest += v; } return TRUE; } /* or dhms format */ value = parseInt(value, &v); if (!value) { WLog_ERR(TAG, "Invalid value for %s", message); return FALSE; } if (!*value || isspace(*value)) { /* interpret that as a value in seconds */ *dest = v; return TRUE; } *dest = 0; do { INT32 factor = 0; INT32 maxValue = 0; switch (*value) { case 'd': factor = 3600 * 24; maxValue = 0; break; case 'h': factor = 3600; maxValue = 0; break; case 'm': factor = 60; maxValue = 60; break; case 's': factor = 1; maxValue = 60; break; default: WLog_ERR(TAG, "invalid value for unit %c when parsing %s", *value, message); return FALSE; } if ((maxValue > 0) && (v > maxValue)) { WLog_ERR(TAG, "invalid value for unit %c when parsing %s", *value, message); return FALSE; } *dest += (v * factor); value++; if (!*value) return TRUE; value = parseInt(value, &v); if (!value || !*value) { WLog_ERR(TAG, "Invalid value for %s", message); return FALSE; } } while (TRUE); return TRUE; } static BOOL nla_setup_kerberos(rdpNla* nla) { SEC_WINPR_KERBEROS_SETTINGS* kerbSettings; rdpSettings* settings; WINPR_ASSERT(nla); WINPR_ASSERT(nla->rdpcontext); settings = nla->rdpcontext->settings; WINPR_ASSERT(settings); kerbSettings = nla->kerberosSettings; WINPR_ASSERT(kerbSettings); if (settings->KerberosLifeTime && !parseKerberosDeltat(settings->KerberosLifeTime, &kerbSettings->lifeTime, "lifetime")) return FALSE; if (settings->KerberosStartTime && !parseKerberosDeltat(settings->KerberosStartTime, &kerbSettings->startTime, "starttime")) return FALSE; if (settings->KerberosRenewableLifeTime && !parseKerberosDeltat(settings->KerberosRenewableLifeTime, &kerbSettings->renewLifeTime, "renewLifetime")) return FALSE; if (settings->KerberosCache) { kerbSettings->cache = _strdup(settings->KerberosCache); if (!kerbSettings->cache) { WLog_ERR(TAG, "unable to copy cache name"); return FALSE; } } if (settings->KerberosKeytab) { kerbSettings->keytab = _strdup(settings->KerberosKeytab); if (!kerbSettings->keytab) { WLog_ERR(TAG, "unable to copy keytab name"); return FALSE; } } if (settings->KerberosArmor) { kerbSettings->armorCache = _strdup(settings->KerberosArmor); if (!kerbSettings->armorCache) { WLog_ERR(TAG, "unable to copy armorCache"); return FALSE; } } return TRUE; } /** * Initialize NTLM/Kerberos SSP authentication module (client). * @param credssp */ static int nla_client_init(rdpNla* nla) { char* spn; size_t length; rdpTls* tls = NULL; rdpSettings* settings; WINPR_ASSERT(nla); WINPR_ASSERT(nla->rdpcontext); settings = nla->rdpcontext->settings; WINPR_ASSERT(settings); nla_set_state(nla, NLA_STATE_INITIAL); if (settings->RestrictedAdminModeRequired) settings->DisableCredentialsDelegation = TRUE; if (!nla_setup_kerberos(nla)) return -1; if (!nla_adjust_settings_from_smartcard(nla)) return -1; if (!nla_client_setup_identity(nla)) return -1; tls = transport_get_tls(nla->transport); if (!tls) { WLog_ERR(TAG, "Unknown NLA transport layer"); return -1; } if (!nla_sec_buffer_alloc_from_data(&nla->PublicKey, tls->PublicKey, 0, tls->PublicKeyLength)) { WLog_ERR(TAG, "Failed to allocate sspi secBuffer"); return -1; } length = sizeof(TERMSRV_SPN_PREFIX) + strlen(settings->ServerHostname); spn = (SEC_CHAR*)malloc(length + 1); if (!spn) return -1; sprintf_s(spn, length + 1, "%s%s", TERMSRV_SPN_PREFIX, settings->ServerHostname); #ifdef UNICODE nla->ServicePrincipalName = NULL; ConvertToUnicode(CP_UTF8, 0, spn, -1, &nla->ServicePrincipalName, 0); free(spn); #else nla->ServicePrincipalName = spn; #endif if (!nla_sspi_module_init(nla)) return -1; nla->status = nla_update_package_name(nla); if (nla->status != SEC_E_OK) return -1; WLog_DBG(TAG, "%s %" PRIu32 " : packageName=%s ; cbMaxToken=%d", __FUNCTION__, __LINE__, nla->packageName, nla->cbMaxToken); nla->status = nla->table->AcquireCredentialsHandle(NULL, NLA_PKG_NAME, SECPKG_CRED_OUTBOUND, NULL, nla->identity, NULL, NULL, &nla->credentials, &nla->expiration); if (nla->status != SEC_E_OK) { WLog_ERR(TAG, "AcquireCredentialsHandle status %s [0x%08" PRIX32 "]", GetSecurityStatusString(nla->status), nla->status); return -1; } nla->haveContext = FALSE; nla->haveInputBuffer = FALSE; nla->havePubKeyAuth = FALSE; ZeroMemory(&nla->ContextSizes, sizeof(SecPkgContext_Sizes)); /* * from tspkg.dll: 0x00000132 * ISC_REQ_MUTUAL_AUTH * ISC_REQ_CONFIDENTIALITY * ISC_REQ_USE_SESSION_KEY * ISC_REQ_ALLOCATE_MEMORY */ nla->fContextReq = ISC_REQ_MUTUAL_AUTH | ISC_REQ_CONFIDENTIALITY; return 1; } static BOOL nla_client_send_token(rdpNla* nla, SecBufferDesc* token) { BOOL rc = FALSE; if (!nla || !token) { WLog_ERR(TAG, "[%s] nla=%p, token=%p", __FUNCTION__, nla, token); goto fail; } if (token->cBuffers != 1) { WLog_ERR(TAG, "[%s] token->cBuffers=%" PRIu32, __FUNCTION__, token->cBuffers); goto fail; } if (!nla_sec_buffer_alloc_from_buffer(&nla->negoToken, &token->pBuffers[0], 0)) goto fail; if (!nla_send(nla)) goto fail; rc = TRUE; fail: return rc; } int nla_client_begin(rdpNla* nla) { int rc = -1; SecBuffer outputBuffer = { 0 }; SecBufferDesc outputBufferDesc = { 0 }; WINPR_ASSERT(nla); if (nla_client_init(nla) < 1) goto fail; if (nla_get_state(nla) != NLA_STATE_INITIAL) goto fail; outputBufferDesc.ulVersion = SECBUFFER_VERSION; outputBufferDesc.cBuffers = 1; outputBufferDesc.pBuffers = &outputBuffer; if (!nla_sec_buffer_alloc(&outputBuffer, nla->cbMaxToken)) goto fail; nla->status = nla_initialize_security_context(nla, TRUE, NULL, &outputBufferDesc); switch (nla->status) { case SEC_E_OK: /* Complete, send output token if >0 */ if (!nla_client_send_token(nla, &outputBufferDesc)) goto fail; nla_set_state(nla, NLA_STATE_FINAL); break; case SEC_I_COMPLETE_AND_CONTINUE: /* CompleteAuthToken -> server -> InitializeSecurityContext again */ if (!nla_complete_auth(nla, &outputBufferDesc)) goto fail; nla_set_state(nla, NLA_STATE_NEGO_TOKEN); break; case SEC_I_COMPLETE_NEEDED: /* CompleteAuthToken -> finish */ if (!nla_complete_auth(nla, &outputBufferDesc)) goto fail; nla_set_state(nla, NLA_STATE_FINAL); break; case SEC_I_CONTINUE_NEEDED: /* out token -> server -> InitializeSecurityContext again */ if (!nla_client_send_token(nla, &outputBufferDesc)) goto fail; nla_set_state(nla, NLA_STATE_NEGO_TOKEN); break; case SEC_E_NO_CREDENTIALS: case SEC_I_INCOMPLETE_CREDENTIALS: case SEC_E_INCOMPLETE_MESSAGE: default: goto fail; } rc = 1; fail: sspi_SecBufferFree(&outputBuffer); return rc; } static int nla_client_recv_nego_token(rdpNla* nla) { int rc = -1; SECURITY_STATUS status; SecBuffer inputBuffer = { 0 }; SecBuffer outputBuffer = { 0 }; SecBufferDesc inputBufferDesc = { 0 }; SecBufferDesc outputBufferDesc = { 0 }; WINPR_ASSERT(nla); inputBufferDesc.ulVersion = SECBUFFER_VERSION; inputBufferDesc.cBuffers = 1; inputBufferDesc.pBuffers = &inputBuffer; if (!nla_sec_buffer_alloc_from_buffer(&inputBuffer, &nla->negoToken, 0)) goto fail; outputBufferDesc.ulVersion = SECBUFFER_VERSION; outputBufferDesc.cBuffers = 1; outputBufferDesc.pBuffers = &outputBuffer; if (!nla_sec_buffer_alloc(&outputBuffer, nla->cbMaxToken)) goto fail; nla->status = nla_initialize_security_context(nla, FALSE, &inputBufferDesc, &outputBufferDesc); switch (nla->status) { case SEC_I_COMPLETE_AND_CONTINUE: if (!nla_complete_auth(nla, &outputBufferDesc)) goto fail; if (!nla_client_send_token(nla, &outputBufferDesc)) goto fail; break; case SEC_I_COMPLETE_NEEDED: /* CompleteAuthToken -> finish */ if (!nla_complete_auth(nla, &outputBufferDesc)) goto fail; nla_set_state(nla, NLA_STATE_NEGO_TOKEN); break; case SEC_E_OK: /* completed */ nla->havePubKeyAuth = TRUE; status = nla_query_context_sizes(nla); if (status != SEC_E_OK) goto fail; if (nla->peerVersion < 5) status = nla_encrypt_public_key_echo(nla); else status = nla_encrypt_public_key_hash(nla); if (status != SEC_E_OK) goto fail; if (!nla_client_send_token(nla, &outputBufferDesc)) goto fail; nla_set_state(nla, NLA_STATE_PUB_KEY_AUTH); break; case SEC_I_CONTINUE_NEEDED: /* send -> retry */ if (!nla_client_send_token(nla, &outputBufferDesc)) goto fail; nla_set_state(nla, NLA_STATE_NEGO_TOKEN); break; default: WLog_ERR(TAG, "Unexpected NLA return %s", GetSecurityStatusString(nla->status)); goto fail; } rc = 1; fail: sspi_SecBufferFree(&inputBuffer); sspi_SecBufferFree(&outputBuffer); return rc; } static int nla_client_recv_pub_key_auth(rdpNla* nla) { WINPR_ASSERT(nla); /* Verify Server Public Key Echo */ if (nla->peerVersion < 5) nla->status = nla_decrypt_public_key_echo(nla); else nla->status = nla_decrypt_public_key_hash(nla); nla_buffer_free(nla); if (nla->status != SEC_E_OK) { WLog_ERR(TAG, "Could not verify public key echo %s [0x%08" PRIX32 "]", GetSecurityStatusString(nla->status), nla->status); return -1; } /* Send encrypted credentials */ nla->status = nla_encrypt_ts_credentials(nla); if (nla->status != SEC_E_OK) return -1; if (!nla_send(nla)) { nla_buffer_free(nla); return -1; } nla_buffer_free(nla); if (SecIsValidHandle(&nla->credentials)) { nla->table->FreeCredentialsHandle(&nla->credentials); SecInvalidateHandle(&nla->credentials); } if (nla->status != SEC_E_OK) { WLog_ERR(TAG, "FreeCredentialsHandle status %s [0x%08" PRIX32 "]", GetSecurityStatusString(nla->status), nla->status); } if (nla->status != SEC_E_OK) return -1; nla_set_state(nla, NLA_STATE_AUTH_INFO); return 1; } static int nla_client_recv(rdpNla* nla) { WINPR_ASSERT(nla); switch (nla_get_state(nla)) { case NLA_STATE_NEGO_TOKEN: return nla_client_recv_nego_token(nla); case NLA_STATE_PUB_KEY_AUTH: return nla_client_recv_pub_key_auth(nla); case NLA_STATE_FINAL: default: WLog_ERR(TAG, "NLA in invalid client receive state %s", nla_get_state_str(nla_get_state(nla))); return -1; } } static int nla_client_authenticate(rdpNla* nla) { int rc = -1; wStream* s; int status; WINPR_ASSERT(nla); s = Stream_New(NULL, 4096); if (!s) { WLog_ERR(TAG, "Stream_New failed!"); return -1; } if (nla_client_begin(nla) < 1) goto fail; while (nla_get_state(nla) < NLA_STATE_AUTH_INFO) { Stream_SetPosition(s, 0); status = transport_read_pdu(nla->transport, s); if (status < 0) { WLog_ERR(TAG, "nla_client_authenticate failure"); goto fail; } status = nla_recv_pdu(nla, s); if (status < 0) goto fail; } rc = 1; fail: Stream_Free(s, TRUE); return rc; } /** * Initialize NTLMSSP authentication module (server). * @param credssp */ static int nla_server_init(rdpNla* nla) { rdpTls* tls; freerdp_peer* peer; SEC_WINNT_AUTH_IDENTITY_WINPR* identity; WINPR_ASSERT(nla); tls = transport_get_tls(nla->transport); WINPR_ASSERT(tls); if (!nla_sec_buffer_alloc_from_data(&nla->PublicKey, tls->PublicKey, 0, tls->PublicKeyLength)) { WLog_ERR(TAG, "Failed to allocate SecBuffer for public key"); return -1; } if (!nla_sspi_module_init(nla)) return -1; if (!nla_setup_kerberos(nla)) return -1; WINPR_ASSERT(nla->rdpcontext); WINPR_ASSERT(nla->rdpcontext->peer); peer = nla->rdpcontext->peer; WINPR_ASSERT(peer); identity = &nla->identityWinPr; identity->ntlmSettings.hashCallback = peer->SspiNtlmHashCallback; identity->ntlmSettings.hashCallbackArg = peer; identity->ntlmSettings.samFile = nla->SamFile; nla->status = nla_update_package_name(nla); if (nla->status != SEC_E_OK) return -1; nla->status = nla->table->AcquireCredentialsHandle(NULL, NLA_PKG_NAME, SECPKG_CRED_INBOUND, NULL, nla->identity, NULL, NULL, &nla->credentials, &nla->expiration); if (nla->status != SEC_E_OK) { WLog_ERR(TAG, "AcquireCredentialsHandle status %s [0x%08" PRIX32 "]", GetSecurityStatusString(nla->status), nla->status); return -1; } nla->haveContext = FALSE; nla->haveInputBuffer = FALSE; nla->havePubKeyAuth = FALSE; ZeroMemory(&nla->ContextSizes, sizeof(SecPkgContext_Sizes)); /* * from tspkg.dll: 0x00000112 * ASC_REQ_MUTUAL_AUTH * ASC_REQ_CONFIDENTIALITY * ASC_REQ_ALLOCATE_MEMORY */ nla->fContextReq = 0; nla->fContextReq |= ASC_REQ_MUTUAL_AUTH; nla->fContextReq |= ASC_REQ_CONFIDENTIALITY; nla->fContextReq |= ASC_REQ_CONNECTION; nla->fContextReq |= ASC_REQ_USE_SESSION_KEY; nla->fContextReq |= ASC_REQ_REPLAY_DETECT; nla->fContextReq |= ASC_REQ_SEQUENCE_DETECT; nla->fContextReq |= ASC_REQ_EXTENDED_ERROR; nla_set_state(nla, NLA_STATE_INITIAL); return 1; } static wStream* nla_server_recv_stream(rdpNla* nla) { wStream* s = NULL; int status = -1; WINPR_ASSERT(nla); s = Stream_New(NULL, 4096); if (!s) goto fail; status = transport_read_pdu(nla->transport, s); fail: if (status < 0) { WLog_ERR(TAG, "nla_recv() error: %d", status); Stream_Free(s, TRUE); return NULL; } return s; } static BOOL nla_server_recv_credentials(rdpNla* nla) { BOOL rc = FALSE; WINPR_ASSERT(nla); if (nla_server_recv(nla) < 0) goto fail; nla->status = nla_decrypt_ts_credentials(nla); if (nla->status != SEC_E_OK) { WLog_ERR(TAG, "Could not decrypt TSCredentials status %s [0x%08" PRIX32 "]", GetSecurityStatusString(nla->status), nla->status); goto fail; } WINPR_ASSERT(nla->table); WINPR_ASSERT(nla->table->ImpersonateSecurityContext); nla->status = nla->table->ImpersonateSecurityContext(&nla->context); if (nla->status != SEC_E_OK) { WLog_ERR(TAG, "ImpersonateSecurityContext status %s [0x%08" PRIX32 "]", GetSecurityStatusString(nla->status), nla->status); goto fail; } else { WINPR_ASSERT(nla->table->RevertSecurityContext); nla->status = nla->table->RevertSecurityContext(&nla->context); if (nla->status != SEC_E_OK) { WLog_ERR(TAG, "RevertSecurityContext status %s [0x%08" PRIX32 "]", GetSecurityStatusString(nla->status), nla->status); goto fail; } } rc = TRUE; fail: return rc; } /** * Authenticate with client using CredSSP (server). * @param credssp * @return 1 if authentication is successful */ static int nla_server_authenticate(rdpNla* nla) { int res = -1; WINPR_ASSERT(nla); if (nla_server_init(nla) < 1) goto fail_auth; /* Client is starting, here es the state machine: * * -- NLA_STATE_INITIAL --> NLA_STATE_INITIAL * ----->> sending... * ----->> protocol version 6 * ----->> nego token * ----->> client nonce * <<----- receiving... * <<----- protocol version 6 * <<----- nego token * ----->> sending... * ----->> protocol version 6 * ----->> nego token * ----->> public key auth * ----->> client nonce * -- NLA_STATE_NEGO_TOKEN --> NLA_STATE_PUB_KEY_AUTH * <<----- receiving... * <<----- protocol version 6 * <<----- public key info * ----->> sending... * ----->> protocol version 6 * ----->> auth info * ----->> client nonce * -- NLA_STATE_PUB_KEY_AUTH --> NLA_STATE */ while (TRUE) { int rc = -1; SecBuffer inputBuffer = { 0 }; SecBuffer outputBuffer = { 0 }; SecBufferDesc inputBufferDesc = { 0 }; SecBufferDesc outputBufferDesc = { 0 }; /* receive authentication token */ inputBufferDesc.ulVersion = SECBUFFER_VERSION; inputBufferDesc.cBuffers = 1; inputBufferDesc.pBuffers = &inputBuffer; if (nla_server_recv(nla) < 0) goto fail_auth; WLog_DBG(TAG, "Receiving Authentication Token"); if (!nla_sec_buffer_alloc_from_buffer(&inputBuffer, &nla->negoToken, 0)) { WLog_ERR(TAG, "CredSSP: invalid negoToken!"); goto fail; } outputBufferDesc.ulVersion = SECBUFFER_VERSION; outputBufferDesc.cBuffers = 1; outputBufferDesc.pBuffers = &outputBuffer; if (!nla_sec_buffer_alloc(&outputBuffer, nla->cbMaxToken)) goto fail; nla->status = nla->table->AcceptSecurityContext( &nla->credentials, nla->haveContext ? &nla->context : NULL, &inputBufferDesc, nla->fContextReq, SECURITY_NATIVE_DREP, &nla->context, &outputBufferDesc, &nla->pfContextAttr, &nla->expiration); WLog_VRB(TAG, "AcceptSecurityContext status %s [0x%08" PRIX32 "]", GetSecurityStatusString(nla->status), nla->status); if (!nla_sec_buffer_alloc_from_buffer(&nla->negoToken, &outputBuffer, 0)) goto fail; if (nla->status == SEC_E_OK) { if (outputBuffer.cbBuffer != 0) { if (!nla_send(nla)) { nla_buffer_free(nla); goto fail; } if (nla_server_recv(nla) < 0) goto fail; WLog_DBG(TAG, "Receiving pubkey Token"); } nla->havePubKeyAuth = TRUE; nla->status = nla_query_context_sizes(nla); if (nla->status != SEC_E_OK) goto fail; if (nla->peerVersion < 5) nla->status = nla_decrypt_public_key_echo(nla); else nla->status = nla_decrypt_public_key_hash(nla); if (nla->status != SEC_E_OK) { WLog_ERR(TAG, "Error: could not verify client's public key echo %s [0x%08" PRIX32 "]", GetSecurityStatusString(nla->status), nla->status); goto fail; } sspi_SecBufferFree(&nla->negoToken); if (nla->peerVersion < 5) nla->status = nla_encrypt_public_key_echo(nla); else nla->status = nla_encrypt_public_key_hash(nla); if (nla->status != SEC_E_OK) goto fail; rc = 1; } else { rc = 0; } fail: sspi_SecBufferFree(&inputBuffer); sspi_SecBufferFree(&outputBuffer); if (rc < 0) { res = rc; goto fail_auth; } if ((nla->status != SEC_E_OK) && (nla->status != SEC_I_CONTINUE_NEEDED)) { /* Special handling of these specific error codes as NTSTATUS_FROM_WIN32 unfortunately does not map directly to the corresponding NTSTATUS values */ switch (GetLastError()) { case ERROR_PASSWORD_MUST_CHANGE: nla->errorCode = STATUS_PASSWORD_MUST_CHANGE; break; case ERROR_PASSWORD_EXPIRED: nla->errorCode = STATUS_PASSWORD_EXPIRED; break; case ERROR_ACCOUNT_DISABLED: nla->errorCode = STATUS_ACCOUNT_DISABLED; break; default: nla->errorCode = NTSTATUS_FROM_WIN32(GetLastError()); break; } WLog_ERR(TAG, "AcceptSecurityContext status %s [0x%08" PRIX32 "]", GetSecurityStatusString(nla->status), nla->status); nla_send(nla); goto fail_auth; /* Access Denied */ } /* send authentication token */ WLog_DBG(TAG, "Sending Authentication Token"); if (!nla_send(nla)) { nla_buffer_free(nla); goto fail_auth; } if (nla->status != SEC_I_CONTINUE_NEEDED) break; nla->haveContext = TRUE; } /* Receive encrypted credentials */ if (!nla_server_recv_credentials(nla)) goto fail_auth; res = 1; fail_auth: nla_buffer_free(nla); return res; } /** * Authenticate using CredSSP. * @param credssp * @return 1 if authentication is successful */ int nla_authenticate(rdpNla* nla) { WINPR_ASSERT(nla); if (nla->server) return nla_server_authenticate(nla); else return nla_client_authenticate(nla); } static void ap_integer_increment_le(BYTE* number, size_t size) { size_t index; WINPR_ASSERT(number || (size == 0)); for (index = 0; index < size; index++) { if (number[index] < 0xFF) { number[index]++; break; } else { number[index] = 0; continue; } } } static void ap_integer_decrement_le(BYTE* number, size_t size) { size_t index; WINPR_ASSERT(number || (size == 0)); for (index = 0; index < size; index++) { if (number[index] > 0) { number[index]--; break; } else { number[index] = 0xFF; continue; } } } SECURITY_STATUS nla_encrypt_public_key_echo(rdpNla* nla) { SECURITY_STATUS status; WINPR_ASSERT(nla); if (!nla_sec_buffer_alloc_from_buffer(&nla->pubKeyAuth, &nla->PublicKey, nla->ContextSizes.cbSecurityTrailer)) return SEC_E_INSUFFICIENT_MEMORY; if (!nla->server) { BYTE* data = &((BYTE*)nla->PublicKey.pvBuffer)[nla->ContextSizes.cbSecurityTrailer]; /* server echos the public key +1 */ ap_integer_increment_le(data, nla->PublicKey.cbBuffer); } status = nla_encrypt(nla, &nla->pubKeyAuth, nla->ContextSizes.cbSecurityTrailer); if (status != SEC_E_OK) return status; return status; } SECURITY_STATUS nla_encrypt_public_key_hash(rdpNla* nla) { SECURITY_STATUS status = SEC_E_INTERNAL_ERROR; WINPR_DIGEST_CTX* sha256 = NULL; BYTE* hash; WINPR_ASSERT(nla); const ULONG auth_data_length = (nla->ContextSizes.cbSecurityTrailer + WINPR_SHA256_DIGEST_LENGTH); const BYTE* hashMagic = nla->server ? ServerClientHashMagic : ClientServerHashMagic; const size_t hashSize = nla->server ? sizeof(ServerClientHashMagic) : sizeof(ClientServerHashMagic); if (!nla_sec_buffer_alloc(&nla->pubKeyAuth, auth_data_length)) { status = SEC_E_INSUFFICIENT_MEMORY; goto out; } /* generate SHA256 of following data: ClientServerHashMagic, Nonce, SubjectPublicKey */ if (!(sha256 = winpr_Digest_New())) goto out; if (!winpr_Digest_Init(sha256, WINPR_MD_SHA256)) goto out; /* include trailing \0 from hashMagic */ if (!winpr_Digest_Update(sha256, hashMagic, hashSize)) goto out; if (!nla_Digest_Update_From_SecBuffer(sha256, &nla->ClientNonce)) goto out; /* SubjectPublicKey */ if (!nla_Digest_Update_From_SecBuffer(sha256, &nla->PublicKey)) goto out; hash = &((BYTE*)nla->pubKeyAuth.pvBuffer)[nla->ContextSizes.cbSecurityTrailer]; if (!winpr_Digest_Final(sha256, hash, WINPR_SHA256_DIGEST_LENGTH)) goto out; status = nla_encrypt(nla, &nla->pubKeyAuth, nla->ContextSizes.cbSecurityTrailer); if (status != SEC_E_OK) goto out; out: winpr_Digest_Free(sha256); return status; } SECURITY_STATUS nla_decrypt_public_key_echo(rdpNla* nla) { BYTE* public_key1 = NULL; BYTE* public_key2 = NULL; ULONG public_key_length = 0; size_t signature_length; SECURITY_STATUS status = SEC_E_INVALID_TOKEN; PSecBuffer pubKeyAuth; if (!nla) goto fail; pubKeyAuth = &nla->pubKeyAuth; signature_length = pubKeyAuth->cbBuffer - nla->PublicKey.cbBuffer; if ((pubKeyAuth->cbBuffer < nla->PublicKey.cbBuffer) || (signature_length > nla->ContextSizes.cbSecurityTrailer)) { WLog_ERR(TAG, "unexpected pubKeyAuth buffer size: %" PRIu32 "", pubKeyAuth->cbBuffer); goto fail; } status = nla_decrypt(nla, pubKeyAuth, signature_length); if (status != SEC_E_OK) goto fail; public_key1 = &((BYTE*)nla->PublicKey.pvBuffer)[0]; public_key2 = &((BYTE*)pubKeyAuth->pvBuffer)[pubKeyAuth->cbBuffer]; if (!nla->server) { /* server echos the public key +1 */ ap_integer_decrement_le(public_key2, public_key_length); } if (!public_key1 || !public_key2 || memcmp(public_key1, public_key2, public_key_length) != 0) { WLog_ERR(TAG, "Could not verify server's public key echo"); #if defined(WITH_DEBUG_NLA) WLog_ERR(TAG, "Expected (length = %d):", public_key_length); winpr_HexDump(TAG, WLOG_ERROR, public_key1, public_key_length); WLog_ERR(TAG, "Actual (length = %d):", public_key_length); winpr_HexDump(TAG, WLOG_ERROR, public_key2, public_key_length); #endif status = SEC_E_MESSAGE_ALTERED; /* DO NOT SEND CREDENTIALS! */ goto fail; } status = SEC_E_OK; fail: return status; } SECURITY_STATUS nla_decrypt_public_key_hash(rdpNla* nla) { size_t signature_length; WINPR_DIGEST_CTX* sha256 = NULL; BYTE serverClientHash[WINPR_SHA256_DIGEST_LENGTH]; SECURITY_STATUS status = SEC_E_INVALID_TOKEN; WINPR_ASSERT(nla); const BYTE* hashMagic = nla->server ? ClientServerHashMagic : ServerClientHashMagic; const BYTE* decryptedHash; const size_t hashSize = nla->server ? sizeof(ClientServerHashMagic) : sizeof(ServerClientHashMagic); PSecBuffer pubKeyAuth = &nla->pubKeyAuth; signature_length = pubKeyAuth->cbBuffer - WINPR_SHA256_DIGEST_LENGTH; if ((pubKeyAuth->cbBuffer < WINPR_SHA256_DIGEST_LENGTH) || (signature_length > nla->ContextSizes.cbSecurityTrailer)) { WLog_ERR(TAG, "unexpected pubKeyAuth buffer size: %" PRIu32 "", pubKeyAuth->cbBuffer); goto fail; } status = nla_decrypt(nla, pubKeyAuth, signature_length); if (status != SEC_E_OK) goto fail; status = SEC_E_INTERNAL_ERROR; decryptedHash = &((const BYTE*)pubKeyAuth->pvBuffer)[signature_length]; /* generate SHA256 of following data: ServerClientHashMagic, Nonce, SubjectPublicKey */ if (!(sha256 = winpr_Digest_New())) goto fail; if (!winpr_Digest_Init(sha256, WINPR_MD_SHA256)) goto fail; /* include trailing \0 from hashMagic */ if (!winpr_Digest_Update(sha256, hashMagic, hashSize)) goto fail; if (!nla_Digest_Update_From_SecBuffer(sha256, &nla->ClientNonce)) goto fail; /* SubjectPublicKey */ if (!nla_Digest_Update_From_SecBuffer(sha256, &nla->PublicKey)) goto fail; if (!winpr_Digest_Final(sha256, serverClientHash, sizeof(serverClientHash))) goto fail; /* verify hash */ if (memcmp(serverClientHash, decryptedHash, WINPR_SHA256_DIGEST_LENGTH) != 0) { WLog_ERR(TAG, "Could not verify server's hash"); status = SEC_E_MESSAGE_ALTERED; /* DO NOT SEND CREDENTIALS! */ goto fail; } status = SEC_E_OK; fail: winpr_Digest_Free(sha256); return status; } static BOOL nla_read_ts_credentials(rdpNla* nla, SecBuffer* data, size_t offset) { WinPrAsn1Decoder dec, dec2; WinPrAsn1_OctetString credentials; BOOL error; WinPrAsn1_INTEGER credType; WINPR_ASSERT(nla); WINPR_ASSERT(data); WINPR_ASSERT(data->cbBuffer >= offset); WinPrAsn1Decoder_InitMem(&dec, WINPR_ASN1_DER, (BYTE*)data->pvBuffer + offset, data->cbBuffer - offset); /* TSCredentials */ if (!WinPrAsn1DecReadSequence(&dec, &dec2)) return FALSE; dec = dec2; /* credType [0] INTEGER */ if (!WinPrAsn1DecReadContextualInteger(&dec, 0, &error, &credType)) return FALSE; /* credentials [1] OCTET STRING */ if (!WinPrAsn1DecReadContextualOctetString(&dec, 1, &error, &credentials, FALSE)) return FALSE; WinPrAsn1Decoder_InitMem(&dec, WINPR_ASN1_DER, credentials.data, credentials.len); if (credType == 1) { WinPrAsn1_OctetString domain; WinPrAsn1_OctetString username; WinPrAsn1_OctetString password; /* TSPasswordCreds */ if (!WinPrAsn1DecReadSequence(&dec, &dec2)) return FALSE; dec = dec2; /* domainName [0] OCTET STRING */ if (!WinPrAsn1DecReadContextualOctetString(&dec, 0, &error, &domain, FALSE) && error) return FALSE; /* userName [1] OCTET STRING */ if (!WinPrAsn1DecReadContextualOctetString(&dec, 1, &error, &username, FALSE) && error) return FALSE; /* password [2] OCTET STRING */ if (!WinPrAsn1DecReadContextualOctetString(&dec, 2, &error, &password, FALSE)) return FALSE; if (sspi_SetAuthIdentityWithLengthW(nla->identity, (WCHAR*)username.data, username.len / sizeof(WCHAR), (WCHAR*)domain.data, domain.len / sizeof(WCHAR), (WCHAR*)password.data, password.len / sizeof(WCHAR)) < 0) return FALSE; } return TRUE; } /** * Encode TSCredentials structure. * @param credssp */ static BOOL nla_encode_ts_credentials(rdpNla* nla) { rdpSettings* settings; BOOL ret = FALSE; WinPrAsn1Encoder* enc; size_t length; wStream s; int credType; WINPR_ASSERT(nla); WINPR_ASSERT(nla->rdpcontext); settings = nla->rdpcontext->settings; WINPR_ASSERT(settings); enc = WinPrAsn1Encoder_New(WINPR_ASN1_DER); if (!enc) return FALSE; /* TSCredentials */ if (!WinPrAsn1EncSeqContainer(enc)) goto out; /* credType [0] INTEGER */ credType = settings->SmartcardLogon ? 2 : 1; if (!WinPrAsn1EncContextualInteger(enc, 0, credType)) goto out; /* credentials [1] OCTET STRING */ if (!WinPrAsn1EncContextualOctetStringContainer(enc, 1)) goto out; if (settings->SmartcardLogon) { struct { WinPrAsn1_tagId tag; size_t setting_id; } cspData_fields[] = { { 1, FreeRDP_CardName }, { 2, FreeRDP_ReaderName }, { 3, FreeRDP_ContainerName }, { 4, FreeRDP_CspName } }; WinPrAsn1_OctetString octet_string = { 0 }; char* str; BOOL ret; /* TSSmartCardCreds */ if (!WinPrAsn1EncSeqContainer(enc)) goto out; /* pin [0] OCTET STRING */ str = freerdp_settings_get_string_writable(settings, FreeRDP_Password); octet_string.len = ConvertToUnicode(CP_UTF8, 0, str, -1, (LPWSTR*)&octet_string.data, 0) * sizeof(WCHAR); ret = WinPrAsn1EncContextualOctetString(enc, 0, &octet_string); free(octet_string.data); if (!ret) goto out; /* cspData [1] SEQUENCE */ if (!WinPrAsn1EncContextualSeqContainer(enc, 1)) goto out; /* keySpec [0] INTEGER */ if (!WinPrAsn1EncContextualInteger(enc, 0, freerdp_settings_get_uint32(settings, FreeRDP_KeySpec))) goto out; for (int i = 0; i < ARRAYSIZE(cspData_fields); i++) { str = freerdp_settings_get_string_writable(settings, cspData_fields[i].setting_id); octet_string.len = ConvertToUnicode(CP_UTF8, 0, str, -1, (LPWSTR*)&octet_string.data, 0) * sizeof(WCHAR); if (octet_string.len) { ret = WinPrAsn1EncContextualOctetString(enc, cspData_fields[i].tag, &octet_string); free(octet_string.data); if (!ret) goto out; } } /* End cspData */ if (!WinPrAsn1EncEndContainer(enc)) goto out; /* End TSSmartCardCreds */ if (!WinPrAsn1EncEndContainer(enc)) goto out; } else { WinPrAsn1_OctetString username = { 0 }; WinPrAsn1_OctetString domain = { 0 }; WinPrAsn1_OctetString password = { 0 }; /* TSPasswordCreds */ if (!WinPrAsn1EncSeqContainer(enc)) goto out; if (!settings->DisableCredentialsDelegation && nla->identity) { username.len = nla->identity->UserLength * 2; username.data = (BYTE*)nla->identity->User; domain.len = nla->identity->DomainLength * 2; domain.data = (BYTE*)nla->identity->Domain; password.len = nla->identity->PasswordLength * 2; password.data = (BYTE*)nla->identity->Password; } if (!WinPrAsn1EncContextualOctetString(enc, 0, &domain)) goto out; if (!WinPrAsn1EncContextualOctetString(enc, 1, &username)) goto out; if (!WinPrAsn1EncContextualOctetString(enc, 2, &password)) goto out; /* End TSPasswordCreds */ if (!WinPrAsn1EncEndContainer(enc)) goto out; } /* End credentials | End TSCredentials */ if (!WinPrAsn1EncEndContainer(enc) || !WinPrAsn1EncEndContainer(enc)) goto out; if (!WinPrAsn1EncStreamSize(enc, &length)) goto out; if (!nla_sec_buffer_alloc(&nla->tsCredentials, length)) { WLog_ERR(TAG, "sspi_SecBufferAlloc failed!"); goto out; } Stream_StaticInit(&s, (BYTE*)nla->tsCredentials.pvBuffer, length); if (WinPrAsn1EncToStream(enc, &s)) ret = TRUE; out: WinPrAsn1Encoder_Free(&enc); return ret; } static SECURITY_STATUS nla_encrypt_ts_credentials(rdpNla* nla) { SECURITY_STATUS status; WINPR_ASSERT(nla); if (!nla_encode_ts_credentials(nla)) return SEC_E_INSUFFICIENT_MEMORY; if (!nla_sec_buffer_alloc_from_buffer(&nla->authInfo, &nla->tsCredentials, nla->ContextSizes.cbSecurityTrailer)) return SEC_E_INSUFFICIENT_MEMORY; status = nla_encrypt(nla, &nla->authInfo, nla->ContextSizes.cbSecurityTrailer); if (status != SEC_E_OK) return status; return SEC_E_OK; } static SECURITY_STATUS nla_decrypt_ts_credentials(rdpNla* nla) { SECURITY_STATUS status; WINPR_ASSERT(nla); if (nla->authInfo.cbBuffer < 1) { WLog_ERR(TAG, "nla_decrypt_ts_credentials missing authInfo buffer"); return SEC_E_INVALID_TOKEN; } status = nla_decrypt(nla, &nla->authInfo, nla->ContextSizes.cbSecurityTrailer); if (status != SEC_E_OK) return status; if (!nla_read_ts_credentials(nla, &nla->authInfo, nla->ContextSizes.cbSecurityTrailer)) return SEC_E_INSUFFICIENT_MEMORY; return SEC_E_OK; } /** * Send CredSSP message. * @param credssp */ BOOL nla_send(rdpNla* nla) { BOOL rc = FALSE; wStream* s; size_t length; WinPrAsn1Encoder* enc; WinPrAsn1_OctetString octet_string; WINPR_ASSERT(nla); enc = WinPrAsn1Encoder_New(WINPR_ASN1_DER); if (!enc) return FALSE; /* TSRequest */ WLog_DBG(TAG, "----->> sending..."); if (!WinPrAsn1EncSeqContainer(enc)) goto fail; /* version [0] INTEGER */ WLog_DBG(TAG, " ----->> protocol version %" PRIu32, nla->version); if (!WinPrAsn1EncContextualInteger(enc, 0, nla->version)) goto fail; /* negoTokens [1] SEQUENCE OF SEQUENCE */ if (nla->negoToken.cbBuffer > 0) { WLog_DBG(TAG, " ----->> auth info"); if (!WinPrAsn1EncContextualSeqContainer(enc, 1) || !WinPrAsn1EncSeqContainer(enc)) goto fail; /* negoToken [0] OCTET STRING */ octet_string.data = nla->negoToken.pvBuffer; octet_string.len = nla->negoToken.cbBuffer; if (!WinPrAsn1EncContextualOctetString(enc, 0, &octet_string)) goto fail; /* End negoTokens (SEQUENCE OF SEQUENCE) */ if (!WinPrAsn1EncEndContainer(enc) || !WinPrAsn1EncEndContainer(enc)) goto fail; } /* authInfo [2] OCTET STRING */ if (nla->authInfo.cbBuffer > 0) { WLog_DBG(TAG, " ----->> public key auth"); octet_string.data = nla->authInfo.pvBuffer; octet_string.len = nla->authInfo.cbBuffer; if (!WinPrAsn1EncContextualOctetString(enc, 2, &octet_string)) goto fail; } /* pubKeyAuth [3] OCTET STRING */ if (nla->pubKeyAuth.cbBuffer > 0) { WLog_DBG(TAG, " ----->> public key auth"); octet_string.data = nla->pubKeyAuth.pvBuffer; octet_string.len = nla->pubKeyAuth.cbBuffer; if (!WinPrAsn1EncContextualOctetString(enc, 3, &octet_string)) goto fail; } /* errorCode [4] INTEGER */ if (nla->errorCode && nla->peerVersion >= 3 && nla->peerVersion != 5) { char buffer[1024]; WLog_DBG(TAG, " ----->> error code %s 0x%08" PRIx32, winpr_strerror(nla->errorCode, buffer, sizeof(buffer)), nla->errorCode); if (!WinPrAsn1EncContextualInteger(enc, 4, nla->errorCode)) goto fail; } /* clientNonce [5] OCTET STRING */ if (nla->ClientNonce.cbBuffer > 0) { WLog_DBG(TAG, " ----->> client nonce"); octet_string.data = nla->ClientNonce.pvBuffer; octet_string.len = nla->ClientNonce.cbBuffer; if (!WinPrAsn1EncContextualOctetString(enc, 5, &octet_string)) goto fail; } /* End TSRequest */ if (!WinPrAsn1EncEndContainer(enc)) goto fail; if (!WinPrAsn1EncStreamSize(enc, &length)) goto fail; s = Stream_New(NULL, length); if (!s) goto fail; if (!WinPrAsn1EncToStream(enc, s)) goto fail; WLog_DBG(TAG, "[%" PRIuz " bytes]", length); if (transport_write(nla->transport, s) < 0) goto fail; rc = TRUE; fail: WinPrAsn1Encoder_Free(&enc); return rc; } static int nla_decode_ts_request(rdpNla* nla, wStream* s) { WinPrAsn1Decoder dec, dec2, dec3; BOOL error; WinPrAsn1_tagId tag; WinPrAsn1_OctetString octet_string; WinPrAsn1_INTEGER val; UINT32 version = 0; char buffer[1024]; WINPR_ASSERT(nla); WINPR_ASSERT(s); WinPrAsn1Decoder_Init(&dec, WINPR_ASN1_DER, s); WLog_DBG(TAG, "<<----- receiving..."); /* TSRequest */ if (!WinPrAsn1DecReadSequence(&dec, &dec2)) return -1; dec = dec2; /* version [0] INTEGER */ if (!WinPrAsn1DecReadContextualInteger(&dec, 0, &error, &val)) return -1; version = (UINT)val; WLog_DBG(TAG, " <<----- protocol version %" PRIu32, version); if (nla->peerVersion == 0) nla->peerVersion = version; /* if the peer suddenly changed its version - kick it */ if (nla->peerVersion != version) { WLog_ERR(TAG, "CredSSP peer changed protocol version from %" PRIu32 " to %" PRIu32, nla->peerVersion, version); return -1; } while (WinPrAsn1DecReadContextualTag(&dec, &tag, &dec2)) { switch (tag) { case 1: WLog_DBG(TAG, " <<----- nego token"); /* negoTokens [1] SEQUENCE OF SEQUENCE */ if (!WinPrAsn1DecReadSequence(&dec2, &dec3) || !WinPrAsn1DecReadSequence(&dec3, &dec2)) return -1; /* negoToken [0] OCTET STRING */ if (!WinPrAsn1DecReadContextualOctetString(&dec2, 0, &error, &octet_string, FALSE) && error) return -1; if (!nla_sec_buffer_alloc_from_data(&nla->negoToken, octet_string.data, 0, octet_string.len)) return -1; break; case 2: WLog_DBG(TAG, " <<----- auth info"); /* authInfo [2] OCTET STRING */ if (!WinPrAsn1DecReadOctetString(&dec2, &octet_string, FALSE)) return -1; if (!nla_sec_buffer_alloc_from_data(&nla->authInfo, octet_string.data, 0, octet_string.len)) return -1; break; case 3: WLog_DBG(TAG, " <<----- public key info"); /* pubKeyAuth [3] OCTET STRING */ if (!WinPrAsn1DecReadOctetString(&dec2, &octet_string, FALSE)) return -1; if (!nla_sec_buffer_alloc_from_data(&nla->pubKeyAuth, octet_string.data, 0, octet_string.len)) return -1; break; case 4: /* errorCode [4] INTEGER */ if (!WinPrAsn1DecReadInteger(&dec2, &val)) return -1; nla->errorCode = (UINT)val; WLog_DBG(TAG, " <<----- error code %s 0x%08" PRIx32, winpr_strerror(nla->errorCode, buffer, sizeof(buffer)), nla->errorCode); break; case 5: WLog_DBG(TAG, " <<----- client nonce"); /* clientNonce [5] OCTET STRING */ if (!WinPrAsn1DecReadOctetString(&dec2, &octet_string, FALSE)) return -1; if (!nla_sec_buffer_alloc_from_data(&nla->ClientNonce, octet_string.data, 0, octet_string.len)) return -1; break; default: return -1; } } return 1; } int nla_recv_pdu(rdpNla* nla, wStream* s) { WINPR_ASSERT(nla); WINPR_ASSERT(s); if (nla_decode_ts_request(nla, s) < 1) return -1; if (nla->errorCode) { UINT32 code; switch (nla->errorCode) { case STATUS_PASSWORD_MUST_CHANGE: code = FREERDP_ERROR_CONNECT_PASSWORD_MUST_CHANGE; break; case STATUS_PASSWORD_EXPIRED: code = FREERDP_ERROR_CONNECT_PASSWORD_EXPIRED; break; case STATUS_ACCOUNT_DISABLED: code = FREERDP_ERROR_CONNECT_ACCOUNT_DISABLED; break; case STATUS_LOGON_FAILURE: code = FREERDP_ERROR_CONNECT_LOGON_FAILURE; break; case STATUS_WRONG_PASSWORD: code = FREERDP_ERROR_CONNECT_WRONG_PASSWORD; break; case STATUS_ACCESS_DENIED: code = FREERDP_ERROR_CONNECT_ACCESS_DENIED; break; case STATUS_ACCOUNT_RESTRICTION: code = FREERDP_ERROR_CONNECT_ACCOUNT_RESTRICTION; break; case STATUS_ACCOUNT_LOCKED_OUT: code = FREERDP_ERROR_CONNECT_ACCOUNT_LOCKED_OUT; break; case STATUS_ACCOUNT_EXPIRED: code = FREERDP_ERROR_CONNECT_ACCOUNT_EXPIRED; break; case STATUS_LOGON_TYPE_NOT_GRANTED: code = FREERDP_ERROR_CONNECT_LOGON_TYPE_NOT_GRANTED; break; default: WLog_ERR(TAG, "SPNEGO failed with NTSTATUS: 0x%08" PRIX32 "", nla->errorCode); code = FREERDP_ERROR_AUTHENTICATION_FAILED; break; } freerdp_set_last_error_log(nla->rdpcontext, code); return -1; } return nla_client_recv(nla); } int nla_server_recv(rdpNla* nla) { int status = -1; wStream* s; WINPR_ASSERT(nla); s = nla_server_recv_stream(nla); if (!s) goto fail; status = nla_decode_ts_request(nla, s); fail: Stream_Free(s, TRUE); return status; } void nla_buffer_free(rdpNla* nla) { WINPR_ASSERT(nla); sspi_SecBufferFree(&nla->negoToken); sspi_SecBufferFree(&nla->pubKeyAuth); sspi_SecBufferFree(&nla->authInfo); } LPTSTR nla_make_spn(const char* ServiceClass, const char* hostname) { DWORD status = ERROR_INTERNAL_ERROR; DWORD SpnLength; LPTSTR hostnameX = NULL; LPTSTR ServiceClassX = NULL; LPTSTR ServicePrincipalName = NULL; #ifdef UNICODE ConvertToUnicode(CP_UTF8, 0, hostname, -1, &hostnameX, 0); ConvertToUnicode(CP_UTF8, 0, ServiceClass, -1, &ServiceClassX, 0); #else hostnameX = _strdup(hostname); ServiceClassX = _strdup(ServiceClass); #endif if (!hostnameX || !ServiceClassX) goto fail; if (!ServiceClass) { ServicePrincipalName = (LPTSTR)_tcsdup(hostnameX); status = ERROR_SUCCESS; goto fail; } SpnLength = 0; status = DsMakeSpn(ServiceClassX, hostnameX, NULL, 0, NULL, &SpnLength, NULL); if (status != ERROR_BUFFER_OVERFLOW) goto fail; ServicePrincipalName = (LPTSTR)calloc(SpnLength, sizeof(TCHAR)); if (!ServicePrincipalName) goto fail; status = DsMakeSpn(ServiceClassX, hostnameX, NULL, 0, NULL, &SpnLength, ServicePrincipalName); if (status != ERROR_SUCCESS) goto fail; fail: if (status != ERROR_SUCCESS) { free(ServicePrincipalName); ServicePrincipalName = NULL; } free(ServiceClassX); free(hostnameX); return ServicePrincipalName; } /** * Create new CredSSP state machine. * @param transport * @return new CredSSP state machine. */ rdpNla* nla_new(rdpContext* context, rdpTransport* transport) { rdpNla* nla = (rdpNla*)calloc(1, sizeof(rdpNla)); rdpSettings* settings; WINPR_ASSERT(transport); WINPR_ASSERT(context); settings = context->settings; WINPR_ASSERT(settings); if (!nla) return NULL; nla->identity = (SEC_WINNT_AUTH_IDENTITY*)&nla->identityWinPr; nla->identity->Flags = SEC_WINNT_AUTH_IDENTITY_EXTENDED; nla->rdpcontext = context; nla->server = settings->ServerMode; nla->transport = transport; nla->sendSeqNum = 0; nla->recvSeqNum = 0; nla->version = 6; nla->kerberosSettings = &nla->identityWinPr.kerberosSettings; SecInvalidateHandle(&nla->context); if (settings->NtlmSamFile) { nla->SamFile = _strdup(settings->NtlmSamFile); if (!nla->SamFile) goto cleanup; } if (settings->SspiModule) { nla->SspiModule = _strdup(settings->SspiModule); if (!nla->SspiModule) goto cleanup; } /* init to 0 or we end up freeing a bad pointer if the alloc fails */ if (!nla_sec_buffer_alloc(&nla->ClientNonce, NonceLength)) goto cleanup; /* generate random 32-byte nonce */ if (winpr_RAND(nla->ClientNonce.pvBuffer, NonceLength) < 0) goto cleanup; if (nla->server) { LONG status; HKEY hKey; DWORD dwType; DWORD dwSize; status = RegOpenKeyExA(HKEY_LOCAL_MACHINE, SERVER_KEY, 0, KEY_READ | KEY_WOW64_64KEY, &hKey); if (status != ERROR_SUCCESS) return nla; status = RegQueryValueExA(hKey, "SspiModule", NULL, &dwType, NULL, &dwSize); if (status != ERROR_SUCCESS) { RegCloseKey(hKey); return nla; } nla->SspiModule = (LPSTR)malloc(dwSize + sizeof(CHAR)); if (!nla->SspiModule) { RegCloseKey(hKey); goto cleanup; } status = RegQueryValueExA(hKey, "SspiModule", NULL, &dwType, (BYTE*)nla->SspiModule, &dwSize); if (status == ERROR_SUCCESS) WLog_INFO(TAG, "Using SSPI Module: %s", nla->SspiModule); RegCloseKey(hKey); } return nla; cleanup: nla_free(nla); return NULL; } /** * Free CredSSP state machine. * @param credssp */ void nla_free(rdpNla* nla) { if (!nla) return; if (nla->table) { SECURITY_STATUS status; if (SecIsValidHandle(&nla->credentials)) { status = nla->table->FreeCredentialsHandle(&nla->credentials); if (status != SEC_E_OK) { WLog_WARN(TAG, "FreeCredentialsHandle status %s [0x%08" PRIX32 "]", GetSecurityStatusString(status), status); } SecInvalidateHandle(&nla->credentials); } status = nla->table->DeleteSecurityContext(&nla->context); if (status != SEC_E_OK) { WLog_WARN(TAG, "DeleteSecurityContext status %s [0x%08" PRIX32 "]", GetSecurityStatusString(status), status); } } free(nla->SamFile); nla->SamFile = NULL; free(nla->SspiModule); nla->SspiModule = NULL; nla_buffer_free(nla); sspi_SecBufferFree(&nla->ClientNonce); sspi_SecBufferFree(&nla->PublicKey); sspi_SecBufferFree(&nla->tsCredentials); free(nla->ServicePrincipalName); free(nla->kerberosSettings->armorCache); free(nla->kerberosSettings->cache); free(nla->kerberosSettings->pkinitX509Anchors); free(nla->kerberosSettings->pkinitX509Identity); sspi_FreeAuthIdentity(nla->identity); nla_set_package_name(nla, NULL); free(nla); } SEC_WINNT_AUTH_IDENTITY* nla_get_identity(rdpNla* nla) { if (!nla) return NULL; return nla->identity; } NLA_STATE nla_get_state(rdpNla* nla) { if (!nla) return NLA_STATE_FINAL; return nla->state; } BOOL nla_set_state(rdpNla* nla, NLA_STATE state) { if (!nla) return FALSE; WLog_DBG(TAG, "-- %s\t--> %s", nla_get_state_str(nla->state), nla_get_state_str(state)); nla->state = state; return TRUE; } BOOL nla_set_service_principal(rdpNla* nla, LPTSTR principal) { if (!nla || !principal) return FALSE; nla->ServicePrincipalName = principal; return TRUE; } BOOL nla_set_sspi_module(rdpNla* nla, const char* sspiModule) { if (!nla) return FALSE; if (nla->SspiModule) { free(nla->SspiModule); nla->SspiModule = NULL; } if (!sspiModule) return TRUE; nla->SspiModule = _strdup(sspiModule); if (!nla->SspiModule) return FALSE; return TRUE; } BOOL nla_sspi_module_init(rdpNla* nla) { if (!nla) return FALSE; if (nla->SspiModule) { INIT_SECURITY_INTERFACE pInitSecurityInterface; HMODULE hSSPI = LoadLibraryX(nla->SspiModule); if (!hSSPI) { WLog_ERR(TAG, "Failed to load SSPI module: %s", nla->SspiModule); return FALSE; } #ifdef UNICODE pInitSecurityInterface = (INIT_SECURITY_INTERFACE)GetProcAddress(hSSPI, "InitSecurityInterfaceW"); #else pInitSecurityInterface = (INIT_SECURITY_INTERFACE)GetProcAddress(hSSPI, "InitSecurityInterfaceA"); #endif nla->table = pInitSecurityInterface(); } else { nla->table = InitSecurityInterfaceEx(0); } return TRUE; } BOOL nla_impersonate(rdpNla* nla) { if (!nla) return FALSE; if (!nla->table || !nla->table->ImpersonateSecurityContext) return FALSE; return (nla->table->ImpersonateSecurityContext(&nla->context) == SEC_E_OK); } BOOL nla_revert_to_self(rdpNla* nla) { if (!nla) return FALSE; if (!nla->table || !nla->table->RevertSecurityContext) return FALSE; return (nla->table->RevertSecurityContext(&nla->context) == SEC_E_OK); } const char* nla_get_state_str(NLA_STATE state) { switch (state) { case NLA_STATE_INITIAL: return "NLA_STATE_INITIAL"; case NLA_STATE_NEGO_TOKEN: return "NLA_STATE_NEGO_TOKEN"; case NLA_STATE_PUB_KEY_AUTH: return "NLA_STATE_PUB_KEY_AUTH"; case NLA_STATE_AUTH_INFO: return "NLA_STATE_AUTH_INFO"; case NLA_STATE_POST_NEGO: return "NLA_STATE_POST_NEGO"; case NLA_STATE_FINAL: return "NLA_STATE_FINAL"; default: return "UNKNOWN"; } } DWORD nla_get_error(rdpNla* nla) { if (!nla) return ERROR_INTERNAL_ERROR; return nla->errorCode; }