1 | /*
|
---|
2 | Unix SMB/CIFS implementation.
|
---|
3 | SMB Signing Code
|
---|
4 | Copyright (C) Jeremy Allison 2003.
|
---|
5 | Copyright (C) Andrew Bartlett <abartlet@samba.org> 2002-2003
|
---|
6 | Copyright (C) Stefan Metzmacher 2009
|
---|
7 |
|
---|
8 | This program is free software; you can redistribute it and/or modify
|
---|
9 | it under the terms of the GNU General Public License as published by
|
---|
10 | the Free Software Foundation; either version 3 of the License, or
|
---|
11 | (at your option) any later version.
|
---|
12 |
|
---|
13 | This program is distributed in the hope that it will be useful,
|
---|
14 | but WITHOUT ANY WARRANTY; without even the implied warranty of
|
---|
15 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
---|
16 | GNU General Public License for more details.
|
---|
17 |
|
---|
18 | You should have received a copy of the GNU General Public License
|
---|
19 | along with this program. If not, see <http://www.gnu.org/licenses/>.
|
---|
20 | */
|
---|
21 |
|
---|
22 | #include "includes.h"
|
---|
23 | #include "smbd/smbd.h"
|
---|
24 | #include "smbd/globals.h"
|
---|
25 | #include "smb_signing.h"
|
---|
26 |
|
---|
27 | /***********************************************************
|
---|
28 | Called to validate an incoming packet from the client.
|
---|
29 | ************************************************************/
|
---|
30 |
|
---|
31 | bool srv_check_sign_mac(struct smbd_server_connection *conn,
|
---|
32 | const char *inbuf, uint32_t *seqnum,
|
---|
33 | bool trusted_channel)
|
---|
34 | {
|
---|
35 | /* Check if it's a non-session message. */
|
---|
36 | if(CVAL(inbuf,0)) {
|
---|
37 | return true;
|
---|
38 | }
|
---|
39 |
|
---|
40 | if (trusted_channel) {
|
---|
41 | NTSTATUS status;
|
---|
42 |
|
---|
43 | if (smb_len(inbuf) < (smb_ss_field + 8 - 4)) {
|
---|
44 | DEBUG(1,("smb_signing_check_pdu: Can't check signature "
|
---|
45 | "on short packet! smb_len = %u\n",
|
---|
46 | smb_len(inbuf)));
|
---|
47 | return false;
|
---|
48 | }
|
---|
49 |
|
---|
50 | status = NT_STATUS(IVAL(inbuf, smb_ss_field + 4));
|
---|
51 | if (!NT_STATUS_IS_OK(status)) {
|
---|
52 | DEBUG(1,("smb_signing_check_pdu: trusted channel passed %s\n",
|
---|
53 | nt_errstr(status)));
|
---|
54 | return false;
|
---|
55 | }
|
---|
56 |
|
---|
57 | *seqnum = IVAL(inbuf, smb_ss_field);
|
---|
58 | return true;
|
---|
59 | }
|
---|
60 |
|
---|
61 | *seqnum = smb_signing_next_seqnum(conn->smb1.signing_state, false);
|
---|
62 | return smb_signing_check_pdu(conn->smb1.signing_state,
|
---|
63 | (const uint8_t *)inbuf,
|
---|
64 | *seqnum);
|
---|
65 | }
|
---|
66 |
|
---|
67 | /***********************************************************
|
---|
68 | Called to sign an outgoing packet to the client.
|
---|
69 | ************************************************************/
|
---|
70 |
|
---|
71 | void srv_calculate_sign_mac(struct smbd_server_connection *conn,
|
---|
72 | char *outbuf, uint32_t seqnum)
|
---|
73 | {
|
---|
74 | /* Check if it's a non-session message. */
|
---|
75 | if(CVAL(outbuf,0)) {
|
---|
76 | return;
|
---|
77 | }
|
---|
78 |
|
---|
79 | smb_signing_sign_pdu(conn->smb1.signing_state, (uint8_t *)outbuf, seqnum);
|
---|
80 | }
|
---|
81 |
|
---|
82 |
|
---|
83 | /***********************************************************
|
---|
84 | Called to indicate a oneway request
|
---|
85 | ************************************************************/
|
---|
86 | void srv_cancel_sign_response(struct smbd_server_connection *conn)
|
---|
87 | {
|
---|
88 | smb_signing_cancel_reply(conn->smb1.signing_state, true);
|
---|
89 | }
|
---|
90 |
|
---|
91 | struct smbd_shm_signing {
|
---|
92 | size_t shm_size;
|
---|
93 | uint8_t *shm_pointer;
|
---|
94 |
|
---|
95 | /* we know the signing engine will only allocate 2 chunks */
|
---|
96 | uint8_t *ptr1;
|
---|
97 | size_t len1;
|
---|
98 | uint8_t *ptr2;
|
---|
99 | size_t len2;
|
---|
100 | };
|
---|
101 |
|
---|
102 | static int smbd_shm_signing_destructor(struct smbd_shm_signing *s)
|
---|
103 | {
|
---|
104 | anonymous_shared_free(s->shm_pointer);
|
---|
105 | return 0;
|
---|
106 | }
|
---|
107 |
|
---|
108 | static void *smbd_shm_signing_alloc(TALLOC_CTX *mem_ctx, size_t len)
|
---|
109 | {
|
---|
110 | struct smbd_shm_signing *s = talloc_get_type_abort(mem_ctx,
|
---|
111 | struct smbd_shm_signing);
|
---|
112 |
|
---|
113 | if (s->ptr1 == NULL) {
|
---|
114 | s->len1 = len;
|
---|
115 | if (len % 8) {
|
---|
116 | s->len1 += (8 - (len % 8));
|
---|
117 | }
|
---|
118 | if (s->len1 > s->shm_size) {
|
---|
119 | s->len1 = 0;
|
---|
120 | errno = ENOMEM;
|
---|
121 | return NULL;
|
---|
122 | }
|
---|
123 | s->ptr1 = s->shm_pointer;
|
---|
124 | return s->ptr1;
|
---|
125 | }
|
---|
126 |
|
---|
127 | if (s->ptr2 == NULL) {
|
---|
128 | s->len2 = len;
|
---|
129 | if (s->len2 > (s->shm_size - s->len1)) {
|
---|
130 | s->len2 = 0;
|
---|
131 | errno = ENOMEM;
|
---|
132 | return NULL;
|
---|
133 | }
|
---|
134 | s->ptr2 = s->shm_pointer + s->len1;
|
---|
135 | return s->ptr2;
|
---|
136 | }
|
---|
137 |
|
---|
138 | errno = ENOMEM;
|
---|
139 | return NULL;
|
---|
140 | }
|
---|
141 |
|
---|
142 | static void smbd_shm_signing_free(TALLOC_CTX *mem_ctx, void *ptr)
|
---|
143 | {
|
---|
144 | struct smbd_shm_signing *s = talloc_get_type_abort(mem_ctx,
|
---|
145 | struct smbd_shm_signing);
|
---|
146 |
|
---|
147 | if (s->ptr2 == ptr) {
|
---|
148 | s->ptr2 = NULL;
|
---|
149 | s->len2 = 0;
|
---|
150 | }
|
---|
151 | }
|
---|
152 |
|
---|
153 | /***********************************************************
|
---|
154 | Called by server negprot when signing has been negotiated.
|
---|
155 | ************************************************************/
|
---|
156 |
|
---|
157 | bool srv_init_signing(struct smbd_server_connection *conn)
|
---|
158 | {
|
---|
159 | bool allowed = true;
|
---|
160 | bool mandatory = false;
|
---|
161 |
|
---|
162 | switch (lp_server_signing()) {
|
---|
163 | case Required:
|
---|
164 | mandatory = true;
|
---|
165 | break;
|
---|
166 | case Auto:
|
---|
167 | break;
|
---|
168 | case True:
|
---|
169 | break;
|
---|
170 | case False:
|
---|
171 | allowed = false;
|
---|
172 | break;
|
---|
173 | }
|
---|
174 |
|
---|
175 | if (lp_async_smb_echo_handler()) {
|
---|
176 | struct smbd_shm_signing *s;
|
---|
177 |
|
---|
178 | /* setup the signing state in shared memory */
|
---|
179 | s = talloc_zero(smbd_event_context(), struct smbd_shm_signing);
|
---|
180 | if (s == NULL) {
|
---|
181 | return false;
|
---|
182 | }
|
---|
183 | s->shm_size = 4096;
|
---|
184 | s->shm_pointer =
|
---|
185 | (uint8_t *)anonymous_shared_allocate(s->shm_size);
|
---|
186 | if (s->shm_pointer == NULL) {
|
---|
187 | talloc_free(s);
|
---|
188 | return false;
|
---|
189 | }
|
---|
190 | talloc_set_destructor(s, smbd_shm_signing_destructor);
|
---|
191 | conn->smb1.signing_state = smb_signing_init_ex(s,
|
---|
192 | allowed, mandatory,
|
---|
193 | smbd_shm_signing_alloc,
|
---|
194 | smbd_shm_signing_free);
|
---|
195 | if (!conn->smb1.signing_state) {
|
---|
196 | return false;
|
---|
197 | }
|
---|
198 | return true;
|
---|
199 | }
|
---|
200 |
|
---|
201 | conn->smb1.signing_state = smb_signing_init(smbd_event_context(),
|
---|
202 | allowed, mandatory);
|
---|
203 | if (!conn->smb1.signing_state) {
|
---|
204 | return false;
|
---|
205 | }
|
---|
206 |
|
---|
207 | return true;
|
---|
208 | }
|
---|
209 |
|
---|
210 | void srv_set_signing_negotiated(struct smbd_server_connection *conn)
|
---|
211 | {
|
---|
212 | smb_signing_set_negotiated(conn->smb1.signing_state);
|
---|
213 | }
|
---|
214 |
|
---|
215 | /***********************************************************
|
---|
216 | Returns whether signing is active. We can't use sendfile or raw
|
---|
217 | reads/writes if it is.
|
---|
218 | ************************************************************/
|
---|
219 |
|
---|
220 | bool srv_is_signing_active(struct smbd_server_connection *conn)
|
---|
221 | {
|
---|
222 | return smb_signing_is_active(conn->smb1.signing_state);
|
---|
223 | }
|
---|
224 |
|
---|
225 |
|
---|
226 | /***********************************************************
|
---|
227 | Returns whether signing is negotiated. We can't use it unless it was
|
---|
228 | in the negprot.
|
---|
229 | ************************************************************/
|
---|
230 |
|
---|
231 | bool srv_is_signing_negotiated(struct smbd_server_connection *conn)
|
---|
232 | {
|
---|
233 | return smb_signing_is_negotiated(conn->smb1.signing_state);
|
---|
234 | }
|
---|
235 |
|
---|
236 | /***********************************************************
|
---|
237 | Turn on signing from this packet onwards.
|
---|
238 | ************************************************************/
|
---|
239 |
|
---|
240 | void srv_set_signing(struct smbd_server_connection *conn,
|
---|
241 | const DATA_BLOB user_session_key,
|
---|
242 | const DATA_BLOB response)
|
---|
243 | {
|
---|
244 | bool negotiated;
|
---|
245 | bool mandatory;
|
---|
246 |
|
---|
247 | if (!user_session_key.length)
|
---|
248 | return;
|
---|
249 |
|
---|
250 | negotiated = smb_signing_is_negotiated(conn->smb1.signing_state);
|
---|
251 | mandatory = smb_signing_is_mandatory(conn->smb1.signing_state);
|
---|
252 |
|
---|
253 | if (!negotiated && !mandatory) {
|
---|
254 | DEBUG(5,("srv_set_signing: signing negotiated = %u, "
|
---|
255 | "mandatory_signing = %u. Not allowing smb signing.\n",
|
---|
256 | negotiated, mandatory));
|
---|
257 | return;
|
---|
258 | }
|
---|
259 |
|
---|
260 | if (!smb_signing_activate(conn->smb1.signing_state,
|
---|
261 | user_session_key, response)) {
|
---|
262 | return;
|
---|
263 | }
|
---|
264 |
|
---|
265 | DEBUG(3,("srv_set_signing: turning on SMB signing: "
|
---|
266 | "signing negotiated = %u, mandatory_signing = %u.\n",
|
---|
267 | negotiated, mandatory));
|
---|
268 | }
|
---|
269 |
|
---|