/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* or http://www.opensolaris.org/os/licensing.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright (c) 2007, 2012, Oracle and/or its affiliates. All rights reserved.
*/
#include <strings.h>
#include <stdlib.h>
#include <smbsrv/string.h>
#include <smbsrv/libsmb.h>
extern void randomize(char *data, unsigned len);
static uint64_t unix_micro_to_nt_time(struct timeval *unix_time);
/*
* smb_auth_qnd_unicode
*
* Quick and dirty unicode conversion!
* Returns the length of dst in bytes.
*/
int
smb_auth_qnd_unicode(smb_wchar_t *dst, const char *src, int length)
{
int i;
unsigned int count;
smb_wchar_t new_char;
if ((count = oemtoucs(dst, src, length, OEM_CPG_1252)) == 0) {
for (i = 0; i < length; ++i) {
new_char = (smb_wchar_t)src[i] & 0xff;
dst[i] = LE_IN16(&new_char);
}
dst[i] = 0;
count = length;
}
return (count * sizeof (smb_wchar_t));
}
/*
* smb_auth_lmupr
*
* Converts the given LM password to all uppercase.
* The standard strupr cannot
* be used here because lm_pwd doesn't have to be
* nul terminated.
*/
static void
smb_auth_lmupr(unsigned char *lm_pwd)
{
unsigned char *p = lm_pwd;
int i;
for (i = 0; (*p) && (i < SMBAUTH_LM_PWD_SZ); i++) {
if (smb_isascii(*p)) {
*p = smb_toupper(*p);
p++;
}
}
}
/*
* smb_auth_lm_hash
*
* Source: Implementing CIFS (Chris Hertel)
*
* 1. The password, as entered by user, is either padded with nulls
* or trimmed to 14 bytes.
* . Note that the 14-byte result string is not handled as a
* nul-terminated string.
* . The given password is OEM not Unicode
*
* 2. The 14-byte password is converted to all uppercase
*
* 3. The result is used as key to encrypt the KGS magic string to
* make a 16-byte hash.
*/
int
smb_auth_lm_hash(const char *password, unsigned char *lm_hash)
{
unsigned char lm_pwd[SMBAUTH_LM_PWD_SZ];
bzero((void *)lm_pwd, SMBAUTH_LM_PWD_SZ);
(void) strncpy((char *)lm_pwd, password, SMBAUTH_LM_PWD_SZ);
smb_auth_lmupr(lm_pwd);
return (smb_auth_DES(lm_hash, SMBAUTH_HASH_SZ, lm_pwd,
SMBAUTH_LM_PWD_SZ, (unsigned char *)SMBAUTH_LM_MAGIC_STR,
sizeof (SMBAUTH_LM_MAGIC_STR)));
}
/*
* smb_auth_lm_response
*
* Create a LM response from the given LM hash and challenge.
*
* Returns SMBAUTH_FAILURE if any problems occur, SMBAUTH_SUCCESS if
* all goes well.
*/
static int
smb_auth_lm_response(unsigned char *hash,
unsigned char *challenge, int clen,
unsigned char *lm_rsp)
{
unsigned char S21[21];
int rc;
/*
* 14-byte LM Hash should be padded with 5 nul bytes to create
* a 21-byte string to be used in producing LM response
*/
bzero(&S21[SMBAUTH_HASH_SZ], 5);
bcopy(hash, S21, SMBAUTH_HASH_SZ);
/* padded LM Hash -> LM Response */
rc = smb_auth_DES(lm_rsp, SMBAUTH_RESP_SZ, S21, 21, challenge, clen);
return (rc);
}
/*
* smb_auth_ntlm_hash
*
* Make NTLM Hash (using MD4) from the given password.
* The result will contain a 16-byte NTLM hash.
*/
int
smb_auth_ntlm_hash(const char *password, unsigned char *hash)
{
smb_wchar_t *unicode_password;
int length;
int rc;
if (password == NULL || hash == NULL)
return (SMBAUTH_FAILURE);
length = strlen(password);
unicode_password = (smb_wchar_t *)
malloc((length + 1) * sizeof (smb_wchar_t));
if (unicode_password == NULL)
return (SMBAUTH_FAILURE);
length = smb_auth_qnd_unicode(unicode_password, password, length);
rc = smb_auth_md4(hash, (unsigned char *)unicode_password, length);
free(unicode_password);
return (rc);
}
/*
* smb_auth_ntlm_response
*
* Make LM/NTLM response from the given LM/NTLM Hash and given
* challenge.
*/
static int
smb_auth_ntlm_response(unsigned char *hash,
unsigned char *challenge, int clen,
unsigned char *ntlm_rsp)
{
unsigned char S21[21];
bcopy(hash, S21, SMBAUTH_HASH_SZ);
bzero(&S21[SMBAUTH_HASH_SZ], 5);
if (smb_auth_DES((unsigned char *)ntlm_rsp, SMBAUTH_RESP_SZ,
S21, 21, challenge, clen) == SMBAUTH_FAILURE)
return (0);
return (SMBAUTH_RESP_SZ);
}
/*
* smb_auth_ntlm2_session_hash
*
* data = concat(challenge, client_nonce); [ntlm2 session nonce]
* hash = MD5(data);
* NTLM2 session hash = head(hash, 8);
*
* Returns SMBAUTH_SUCCESS if cryptology framework use was successful,
* Otherwise, returns SMBAUTH_FAILURE.
*/
int
smb_auth_ntlm2_session_hash(
const unsigned char *nonce, int nlen, unsigned char *ntlm2_sess_hash)
{
uint8_t digest[MD_DIGEST_LEN];
if (smb_auth_md5(digest, nonce, nlen) != SMBAUTH_SUCCESS)
return (SMBAUTH_FAILURE);
bcopy(digest, ntlm2_sess_hash, SMBAUTH_SESSION_HASH_SZ);
return (SMBAUTH_SUCCESS);
}
/*
* ntlm2_sess_rsp = DES(data=ntlm2_sess_hash, key=ntlm_hash)
* On success, returns SMBAUTH_SUCCESS. Otherwise, returns SMBAUTH_FAILURE.
*/
int
smb_auth_ntlm2_session_response(unsigned char *session_nonce, int slen,
const unsigned char *ntlm_hash, int hlen, unsigned char *ntlm2_sess_rsp,
int rlen)
{
unsigned char ntlm2_sess_hash[SMBAUTH_SESSION_HASH_SZ];
unsigned char S21[21];
if (smb_auth_ntlm2_session_hash(session_nonce, slen,
ntlm2_sess_hash) == SMBAUTH_FAILURE)
return (SMBAUTH_FAILURE);
bzero(S21, 21);
bcopy(ntlm_hash, S21, hlen);
return (smb_auth_DES(ntlm2_sess_rsp, rlen, S21, 21, ntlm2_sess_hash,
SMBAUTH_SESSION_HASH_SZ));
}
/*
* smb_auth_gen_data_blob
*
* Fill the NTLMv2 data blob structure with information as described in
* "Implementing CIFS, The Common Internet File System". (pg. 282)
*/
static void
smb_auth_gen_data_blob(smb_auth_data_blob_t *blob, char *ntdomain)
{
struct timeval now;
(void) memset(blob->ndb_signature, 1, 2);
(void) memset(&blob->ndb_signature[2], 0, 2);
(void) memset(blob->ndb_reserved, 0, sizeof (blob->ndb_reserved));
(void) gettimeofday(&now, 0);
blob->ndb_timestamp = unix_micro_to_nt_time(&now);
randomize((char *)blob->ndb_clnt_challenge,
SMBAUTH_V2_CLNT_CHALLENGE_SZ);
(void) memset(blob->ndb_unknown, 0, sizeof (blob->ndb_unknown));
blob->ndb_names[0].nne_len = smb_auth_qnd_unicode(
blob->ndb_names[0].nne_name, ntdomain, strlen(ntdomain));
blob->ndb_names[0].nne_type = SMBAUTH_NAME_TYPE_DOMAIN_NETBIOS;
blob->ndb_names[1].nne_len = 0;
blob->ndb_names[1].nne_type = SMBAUTH_NAME_TYPE_LIST_END;
*blob->ndb_names[1].nne_name = 0;
(void) memset(blob->ndb_unknown2, 0, sizeof (blob->ndb_unknown2));
}
/*
* smb_auth_memcpy
*
* It increments the pointer to the destination buffer for the easy of
* concatenation.
*/
static void
smb_auth_memcpy(unsigned char **dstbuf,
unsigned char *srcbuf,
int srcbuf_len)
{
(void) memcpy(*dstbuf, srcbuf, srcbuf_len);
*dstbuf += srcbuf_len;
}
/*
* smb_auth_blob_to_string
*
* Prepare the data blob string which will be used in NTLMv2 response
* generation.
*
* Assumption: Caller must allocate big enough buffer to prevent buffer
* overrun.
*
* Returns the len of the data blob string.
*/
static int
smb_auth_blob_to_string(smb_auth_data_blob_t *blob, unsigned char *data_blob)
{
unsigned char *bufp = data_blob;
smb_auth_memcpy(&bufp, blob->ndb_signature,
sizeof (blob->ndb_signature));
smb_auth_memcpy(&bufp, blob->ndb_reserved,
sizeof (blob->ndb_reserved));
smb_auth_memcpy(&bufp, (unsigned char *)&blob->ndb_timestamp,
sizeof (blob->ndb_timestamp));
smb_auth_memcpy(&bufp, blob->ndb_clnt_challenge,
SMBAUTH_V2_CLNT_CHALLENGE_SZ);
smb_auth_memcpy(&bufp, blob->ndb_unknown, sizeof (blob->ndb_unknown));
smb_auth_memcpy(&bufp, (unsigned char *)&blob->ndb_names[0].nne_type,
sizeof (blob->ndb_names[0].nne_type));
smb_auth_memcpy(&bufp, (unsigned char *)&blob->ndb_names[0].nne_len,
sizeof (blob->ndb_names[0].nne_len));
smb_auth_memcpy(&bufp, (unsigned char *)blob->ndb_names[0].nne_name,
blob->ndb_names[0].nne_len);
smb_auth_memcpy(&bufp, (unsigned char *)&blob->ndb_names[1].nne_type,
sizeof (blob->ndb_names[1].nne_type));
smb_auth_memcpy(&bufp, (unsigned char *)&blob->ndb_names[1].nne_len,
sizeof (blob->ndb_names[1].nne_len));
smb_auth_memcpy(&bufp, blob->ndb_unknown2, sizeof (blob->ndb_unknown2));
/*LINTED E_PTRDIFF_OVERFLOW*/
return (bufp - data_blob);
}
/*
* smb_auth_ntlmv2_hash
*
* The NTLM v2 hash will be created from the given NTLM hash, username,
* and the NETBIOS name of the domain.
*
* The NTLMv2 hash will be returned via the ntlmv2_hash parameter which
* will be used in the calculation of the NTLMv2 and LMv2 responses.
*/
int
smb_auth_ntlmv2_hash(unsigned char *ntlm_hash,
char *username,
char *ntdomain,
unsigned char *ntlmv2_hash)
{
smb_wchar_t *data;
int data_len;
unsigned char *buf;
int rc;
if (username == NULL || ntdomain == NULL)
return (SMBAUTH_FAILURE);
(void) smb_strupr(username);
data_len = strlen(username) + strlen(ntdomain);
buf = (unsigned char *)malloc((data_len + 1) * sizeof (char));
if (buf == NULL)
return (SMBAUTH_FAILURE);
(void) snprintf((char *)buf, data_len + 1, "%s%s", username, ntdomain);
data = (smb_wchar_t *)malloc((data_len + 1) * sizeof (smb_wchar_t));
if (data == NULL) {
free(buf);
return (SMBAUTH_FAILURE);
}
data_len = smb_auth_qnd_unicode(data, (char *)buf, data_len);
rc = SMBAUTH_HMACT64((unsigned char *)data, data_len, ntlm_hash,
SMBAUTH_HASH_SZ, ntlmv2_hash);
free(buf);
free(data);
return (rc);
}
/*
* smb_auth_v2_response
*
* Caculates either the LMv2 or NTLMv2 response.
*
* Same algorithm is used for calculating both LMv2 or NTLMv2 responses.
* This routine will return NTLMv2 response if the data blob information
* is passed in as the clnt_data. Otherwise, it will return LMv2 response
* with the 8-byte client challenge(a.k.a blip) as the clnt_data.
*
* (LM/NTLM)v2 response is the hmac-md5 hash of the specified data
* (server challenge + NTLMv2 data blob or LMv2 client challenge)
* using the NTLMv2 hash as the key.
*
* Returns the size of the corresponding v2 response upon success.
* Otherwise, returns -1 on error.
*/
static int
smb_auth_v2_response(
unsigned char *hash,
unsigned char *srv_challenge, int slen,
unsigned char *clnt_data, int clen,
unsigned char *v2_rsp)
{
unsigned char *hmac_data;
hmac_data = (unsigned char *)malloc((slen + clen) * sizeof (char));
if (!hmac_data) {
return (-1);
}
(void) memcpy(hmac_data, srv_challenge, slen);
(void) memcpy(&hmac_data[slen], clnt_data, clen);
if (SMBAUTH_HMACT64(hmac_data, slen + clen, (unsigned char *)hash,
SMBAUTH_HASH_SZ, (unsigned char *)v2_rsp) != SMBAUTH_SUCCESS)
return (-1);
(void) memcpy(&v2_rsp[SMBAUTH_HASH_SZ], clnt_data, clen);
free(hmac_data);
return (SMBAUTH_HASH_SZ + clen);
}
/*
* smb_auth_set_info
*
* Fill the smb_auth_info instance with either NTLM or NTLMv2 related
* authentication information based on the LMCompatibilityLevel.
*
* If the LMCompatibilityLevel equals 2, the SMB Redirector will perform
* NTLM challenge/response authentication which requires the NTLM hash and
* NTLM response.
*
* If the LMCompatibilityLevel is 3 or above, the SMB Redirector will
* perfrom NTLMv2 challenge/response authenticatoin which requires the
* NTLM hash, NTLMv2 hash, NTLMv2 response and LMv2 response.
*
* Returns -1 on error. Otherwise, returns 0 upon success.
*/
int
smb_auth_set_info(char *username,
char *password,
unsigned char *ntlm_hash,
char *domain,
unsigned char *srv_challenge_key,
int srv_challenge_len,
int lmcomp_lvl,
smb_auth_info_t *auth)
{
unsigned short blob_len;
unsigned char blob_buf[SMBAUTH_BLOB_MAXLEN];
int rc;
char *uppercase_dom;
auth->lmcompatibility_lvl = lmcomp_lvl;
if (lmcomp_lvl == 2) {
auth->ci_len = 0;
*auth->ci = 0;
if (!ntlm_hash) {
if (smb_auth_ntlm_hash(password, auth->hash) !=
SMBAUTH_SUCCESS)
return (-1);
} else {
(void) memcpy(auth->hash, ntlm_hash, SMBAUTH_HASH_SZ);
}
auth->cs_len = smb_auth_ntlm_response(auth->hash,
srv_challenge_key, srv_challenge_len, auth->cs);
} else {
if (!ntlm_hash) {
if (smb_auth_ntlm_hash(password, auth->hash) !=
SMBAUTH_SUCCESS)
return (-1);
} else {
(void) memcpy(auth->hash, ntlm_hash, SMBAUTH_HASH_SZ);
}
if (!domain)
return (-1);
if ((uppercase_dom = strdup(domain)) == NULL)
return (-1);
(void) smb_strupr(uppercase_dom);
if (smb_auth_ntlmv2_hash(auth->hash, username,
uppercase_dom, auth->hash_v2) != SMBAUTH_SUCCESS) {
free(uppercase_dom);
return (-1);
}
/* generate data blob */
smb_auth_gen_data_blob(&auth->data_blob, uppercase_dom);
free(uppercase_dom);
blob_len = smb_auth_blob_to_string(&auth->data_blob, blob_buf);
/* generate NTLMv2 response */
rc = smb_auth_v2_response(auth->hash_v2, srv_challenge_key,
srv_challenge_len, blob_buf, blob_len, auth->cs);
if (rc < 0)
return (-1);
auth->cs_len = rc;
/* generate LMv2 response */
rc = smb_auth_v2_response(auth->hash_v2, srv_challenge_key,
srv_challenge_len, auth->data_blob.ndb_clnt_challenge,
SMBAUTH_V2_CLNT_CHALLENGE_SZ, auth->ci);
if (rc < 0)
return (-1);
auth->ci_len = rc;
}
return (0);
}
/*
* smb_auth_gen_session_key
*
* Generate the NTLM user session key if LMCompatibilityLevel is 2 or
* NTLMv2 user session key if LMCompatibilityLevel is 3 or above.
*
* NTLM_Session_Key = MD4(NTLM_Hash);
*
* NTLMv2_Session_Key = HMAC_MD5(NTLMv2Hash, 16, NTLMv2_HMAC, 16)
*
* Prior to calling this function, the auth instance should be set
* via smb_auth_set_info().
*
* Returns the appropriate session key.
*/
int
smb_auth_gen_session_key(smb_auth_info_t *auth, unsigned char *session_key)
{
int rc;
if (auth->lmcompatibility_lvl == 2)
rc = smb_auth_md4(session_key, auth->hash, SMBAUTH_HASH_SZ);
else
rc = SMBAUTH_HMACT64((unsigned char *)auth->cs,
SMBAUTH_HASH_SZ, (unsigned char *)auth->hash_v2,
SMBAUTH_SESSION_KEY_SZ, session_key);
return (rc);
}
/* 100's of ns between 1/1/1970 and 1/1/1601 */
#define NT_TIME_BIAS (134774LL * 24LL * 60LL * 60LL * 10000000LL)
static uint64_t
unix_micro_to_nt_time(struct timeval *unix_time)
{
uint64_t nt_time;
nt_time = unix_time->tv_sec;
nt_time *= 10000000; /* seconds to 100ns */
nt_time += unix_time->tv_usec * 10;
return (nt_time + NT_TIME_BIAS);
}
/*
* Local Authentication
*/
static boolean_t
smb_lm_password_ok(
unsigned char *challenge,
uint32_t clen,
unsigned char *lm_hash,
unsigned char *passwd)
{
unsigned char lm_resp[SMBAUTH_RESP_SZ];
int rc;
rc = smb_auth_lm_response(lm_hash, challenge, clen, lm_resp);
if (rc != SMBAUTH_SUCCESS)
return (B_FALSE);
return (bcmp(lm_resp, passwd, SMBAUTH_RESP_SZ) == 0);
}
static boolean_t
smb_ntlm_password_ok(
unsigned char *challenge,
uint32_t clen,
unsigned char *ntlm_hash,
unsigned char *passwd,
unsigned char *session_key)
{
unsigned char ntlm_resp[SMBAUTH_RESP_SZ];
int rc;
boolean_t ok;
rc = smb_auth_ntlm_response(ntlm_hash, challenge, clen, ntlm_resp);
if (rc != SMBAUTH_RESP_SZ)
return (B_FALSE);
ok = (bcmp(ntlm_resp, passwd, SMBAUTH_RESP_SZ) == 0);
if (ok && (session_key)) {
rc = smb_auth_md4(session_key, ntlm_hash, SMBAUTH_HASH_SZ);
if (rc != SMBAUTH_SUCCESS)
ok = B_FALSE;
}
return (ok);
}
static boolean_t
smb_ntlmv2_password_ok(
unsigned char *challenge,
uint32_t clen,
unsigned char *ntlm_hash,
unsigned char *passwd,
int pwdlen,
char *domain,
char *username,
uchar_t *session_key)
{
unsigned char *clnt_blob;
int clnt_blob_len;
unsigned char ntlmv2_hash[SMBAUTH_HASH_SZ];
unsigned char *ntlmv2_resp;
boolean_t ok = B_FALSE;
char *dest[3];
int i;
int rc;
clnt_blob_len = pwdlen - SMBAUTH_HASH_SZ;
clnt_blob = &passwd[SMBAUTH_HASH_SZ];
dest[0] = domain;
if ((dest[1] = strdup(domain)) == NULL)
return (B_FALSE);
(void) smb_strupr(dest[1]);
dest[2] = "";
/*
* 15.5.2 The NTLMv2 Password Hash, pg. 279, of the "Implementing CIFS"
*
* The NTLMv2 Hash is created from:
* - NTLM hash
* - user's username, and
* - the name of the logon destination(i.e. the NetBIOS name of either
* the SMB server or NT Domain against which the user is trying to
* authenticate.
*
* Experiments show this is not exactly the case.
* For Windows Server 2003, the domain name needs to be included and
* converted to uppercase. For Vista, the domain name needs to be
* included also, but leave the case alone. And in some cases it needs
* to be empty. All three variants are tried here.
*/
ntlmv2_resp = (unsigned char *)malloc(SMBAUTH_HASH_SZ + clnt_blob_len);
if (ntlmv2_resp == NULL) {
free(dest[1]);
return (B_FALSE);
}
for (i = 0; i < (sizeof (dest) / sizeof (char *)); i++) {
if (smb_auth_ntlmv2_hash(ntlm_hash, username, dest[i],
ntlmv2_hash) != SMBAUTH_SUCCESS)
break;
if (smb_auth_v2_response(ntlmv2_hash, challenge,
clen, clnt_blob, clnt_blob_len, ntlmv2_resp) < 0)
break;
ok = (bcmp(passwd, ntlmv2_resp, pwdlen) == 0);
if (ok && session_key) {
rc = SMBAUTH_HMACT64(ntlmv2_resp,
SMBAUTH_HASH_SZ, ntlmv2_hash,
SMBAUTH_SESSION_KEY_SZ, session_key);
if (rc != SMBAUTH_SUCCESS) {
ok = B_FALSE;
}
break;
}
}
free(dest[1]);
free(ntlmv2_resp);
return (ok);
}
/*
* NTLM2 Session Response User Session Key
*
* Used when NTLMv1 authentication is employed with NTLM2 session security.
* This key is derived from the NTLM2 session response information as follows:
* The HMAC-MD5 algorithm is applied to the session nonce, using the NTLM
* User Session Key as the key. The resulting 16-byte value is the NTLM2
* Session Response User Session Key.
*/
int
smb_auth_ntlm2_usr_ssn_key(
const unsigned char *ntlm_hash, const unsigned char *sess_nonce,
unsigned char *result)
{
unsigned char ntlm_usr_sess_key[SMBAUTH_HASH_SZ];
if (smb_auth_md4(ntlm_usr_sess_key, ntlm_hash, SMBAUTH_HASH_SZ)
!= SMBAUTH_SUCCESS)
return (SMBAUTH_FAILURE);
return (SMBAUTH_HMACT64(sess_nonce, SMBAUTH_SESSION_NONCE_SZ,
ntlm_usr_sess_key, SMBAUTH_SESSION_KEY_SZ, result));
}
static boolean_t
smb_ntlm2_session_password_ok(
unsigned char *challenge,
uint32_t clen,
unsigned char *ntlm_hash,
unsigned char *passwd,
int pwdlen,
unsigned char *nonce,
int nlen,
uchar_t *session_key)
{
unsigned char ntlm2_sess_resp[SMBAUTH_RESP_SZ];
unsigned char ntlm2_sess_nonce[SMBAUTH_SESSION_NONCE_SZ];
bcopy(challenge, ntlm2_sess_nonce, clen);
bcopy(nonce, ntlm2_sess_nonce + clen, nlen);
if (smb_auth_ntlm2_session_response(ntlm2_sess_nonce,
SMBAUTH_SESSION_NONCE_SZ, ntlm_hash, SMBAUTH_HASH_SZ,
ntlm2_sess_resp, SMBAUTH_RESP_SZ) != SMBAUTH_SUCCESS)
return (B_FALSE);
if (smb_auth_ntlm2_usr_ssn_key(ntlm_hash, ntlm2_sess_nonce,
session_key) != SMBAUTH_SUCCESS)
return (B_FALSE);
return (bcmp(passwd, ntlm2_sess_resp, pwdlen) == 0);
}
static boolean_t
smb_lmv2_password_ok(
unsigned char *challenge,
uint32_t clen,
unsigned char *ntlm_hash,
unsigned char *passwd,
char *domain,
char *username)
{
unsigned char *clnt_challenge;
unsigned char ntlmv2_hash[SMBAUTH_HASH_SZ];
unsigned char lmv2_resp[SMBAUTH_RESP_SZ];
boolean_t ok = B_FALSE;
char *dest[3];
int i;
clnt_challenge = &passwd[SMBAUTH_HASH_SZ];
dest[0] = domain;
if ((dest[1] = strdup(domain)) == NULL)
return (B_FALSE);
(void) smb_strupr(dest[1]);
dest[2] = "";
/*
* 15.5.2 The NTLMv2 Password Hash, pg. 279, of the "Implementing CIFS"
*
* The NTLMv2 Hash is created from:
* - NTLM hash
* - user's username, and
* - the name of the logon destination(i.e. the NetBIOS name of either
* the SMB server or NT Domain against which the suer is trying to
* authenticate.
*
* Experiments show this is not exactly the case.
* For Windows Server 2003, the domain name needs to be included and
* converted to uppercase. For Vista, the domain name needs to be
* included also, but leave the case alone. And in some cases it needs
* to be empty. All three variants are tried here.
*/
for (i = 0; i < (sizeof (dest) / sizeof (char *)); i++) {
if (smb_auth_ntlmv2_hash(ntlm_hash, username, dest[i],
ntlmv2_hash) != SMBAUTH_SUCCESS)
break;
if (smb_auth_v2_response(ntlmv2_hash, challenge,
clen, clnt_challenge, SMBAUTH_V2_CLNT_CHALLENGE_SZ,
lmv2_resp) < 0)
break;
ok = (bcmp(passwd, lmv2_resp, SMBAUTH_RESP_SZ) == 0);
if (ok)
break;
}
free(dest[1]);
return (ok);
}
/*
* smb_auth_validate_lm
*
* Validates given LM/LMv2 client response, passed in passwd arg, against
* stored user's password, passed in smbpw
*
* If LM level <=3 server accepts LM responses, otherwise LMv2
*/
boolean_t
smb_auth_validate_lm(
unsigned char *challenge,
uint32_t clen,
smb_passwd_t *smbpw,
unsigned char *passwd,
int pwdlen,
char *domain,
char *username)
{
boolean_t ok = B_FALSE;
int64_t lmlevel;
if (pwdlen != SMBAUTH_RESP_SZ)
return (B_FALSE);
if (smb_config_getnum(SMB_CI_SVR_LM_LEVEL, &lmlevel) != SMBD_SMF_OK)
return (B_FALSE);
if (lmlevel <= 3) {
ok = smb_lm_password_ok(challenge, clen, smbpw->pw_lmhash,
passwd);
}
if (!ok)
ok = smb_lmv2_password_ok(challenge, clen, smbpw->pw_nthash,
passwd, domain, username);
return (ok);
}
/*
* smb_auth_validate_nt
*
* Validates given NTLM/NTLMv2/NTLM 2 session response sent by the client,
* passed in passwd arg, against stored user's password, passed in smbpw
*
* If LM level <=4 server accepts NTLM/NTLMv2 responses, otherwise only NTLMv2.
*/
boolean_t
smb_auth_validate_nt(
unsigned char *challenge,
uint32_t clen,
smb_passwd_t *smbpw,
unsigned char *passwd,
int pwdlen,
char *domain,
char *username,
unsigned char *nonce,
int nlen,
uchar_t *session_key)
{
int64_t lmlevel;
boolean_t ok;
if (smb_config_getnum(SMB_CI_SVR_LM_LEVEL, &lmlevel) != SMBD_SMF_OK)
return (B_FALSE);
if ((lmlevel == 5) && (pwdlen <= SMBAUTH_RESP_SZ))
return (B_FALSE);
if (pwdlen > SMBAUTH_RESP_SZ)
ok = smb_ntlmv2_password_ok(challenge, clen,
smbpw->pw_nthash, passwd, pwdlen,
domain, username, session_key);
else
ok = smb_ntlm_password_ok(challenge, clen,
smbpw->pw_nthash, passwd, session_key);
if (!ok && (nonce != NULL))
ok = smb_ntlm2_session_password_ok(challenge, clen,
smbpw->pw_nthash, passwd, pwdlen, nonce, nlen,
session_key);
return (ok);
}