s4:libcli/smb2: fix session setup with raw NTLMSSP
[samba.git] / source4 / libcli / smb2 / session.c
1 /* 
2    Unix SMB/CIFS implementation.
3
4    SMB2 client session handling
5
6    Copyright (C) Andrew Tridgell 2005
7    
8    This program is free software; you can redistribute it and/or modify
9    it under the terms of the GNU General Public License as published by
10    the Free Software Foundation; either version 3 of the License, or
11    (at your option) any later version.
12    
13    This program is distributed in the hope that it will be useful,
14    but WITHOUT ANY WARRANTY; without even the implied warranty of
15    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16    GNU General Public License for more details.
17    
18    You should have received a copy of the GNU General Public License
19    along with this program.  If not, see <http://www.gnu.org/licenses/>.
20 */
21
22 #include "includes.h"
23 #include "libcli/raw/libcliraw.h"
24 #include "libcli/smb2/smb2.h"
25 #include "libcli/smb2/smb2_calls.h"
26 #include "libcli/composite/composite.h"
27 #include "auth/gensec/gensec.h"
28
29 /**
30   initialise a smb2_session structure
31  */
32 struct smb2_session *smb2_session_init(struct smb2_transport *transport,
33                                        struct gensec_settings *settings,
34                                        TALLOC_CTX *parent_ctx, bool primary)
35 {
36         struct smb2_session *session;
37         NTSTATUS status;
38
39         session = talloc_zero(parent_ctx, struct smb2_session);
40         if (!session) {
41                 return NULL;
42         }
43         if (primary) {
44                 session->transport = talloc_steal(session, transport);
45         } else {
46                 session->transport = talloc_reference(session, transport);
47         }
48
49         /* prepare a gensec context for later use */
50         status = gensec_client_start(session, &session->gensec, 
51                                      session->transport->socket->event.ctx, 
52                                      settings);
53         if (!NT_STATUS_IS_OK(status)) {
54                 talloc_free(session);
55                 return NULL;
56         }
57
58         gensec_want_feature(session->gensec, GENSEC_FEATURE_SESSION_KEY);
59
60         return session;
61 }
62
63 /**
64   send a session setup request
65 */
66 struct smb2_request *smb2_session_setup_send(struct smb2_session *session, 
67                                              struct smb2_session_setup *io)
68 {
69         struct smb2_request *req;
70         NTSTATUS status;
71         
72         req = smb2_request_init(session->transport, SMB2_OP_SESSSETUP, 
73                                 0x18, true, io->in.secblob.length);
74         if (req == NULL) return NULL;
75
76         SBVAL(req->out.hdr,  SMB2_HDR_SESSION_ID, session->uid);
77         SCVAL(req->out.body, 0x02, io->in.vc_number);
78         SCVAL(req->out.body, 0x03, io->in.security_mode);
79         SIVAL(req->out.body, 0x04, io->in.capabilities);
80         SIVAL(req->out.body, 0x08, io->in.channel);
81         SBVAL(req->out.body, 0x10, io->in.previous_sessionid);
82
83         req->session = session;
84
85         status = smb2_push_o16s16_blob(&req->out, 0x0C, io->in.secblob);
86         if (!NT_STATUS_IS_OK(status)) {
87                 talloc_free(req);
88                 return NULL;
89         }
90
91         smb2_transport_send(req);
92
93         return req;
94 }
95
96
97 /**
98   recv a session setup reply
99 */
100 NTSTATUS smb2_session_setup_recv(struct smb2_request *req, TALLOC_CTX *mem_ctx, 
101                                  struct smb2_session_setup *io)
102 {
103         NTSTATUS status;
104
105         if (!smb2_request_receive(req) || 
106             (smb2_request_is_error(req) && 
107              !NT_STATUS_EQUAL(req->status, NT_STATUS_MORE_PROCESSING_REQUIRED))) {
108                 return smb2_request_destroy(req);
109         }
110
111         SMB2_CHECK_PACKET_RECV(req, 0x08, true);
112
113         io->out.session_flags = SVAL(req->in.body, 0x02);
114         io->out.uid           = BVAL(req->in.hdr,  SMB2_HDR_SESSION_ID);
115         
116         status = smb2_pull_o16s16_blob(&req->in, mem_ctx, req->in.body+0x04, &io->out.secblob);
117         if (!NT_STATUS_IS_OK(status)) {
118                 smb2_request_destroy(req);
119                 return status;
120         }
121
122         return smb2_request_destroy(req);
123 }
124
125 /*
126   sync session setup request
127 */
128 NTSTATUS smb2_session_setup(struct smb2_session *session, 
129                             TALLOC_CTX *mem_ctx, struct smb2_session_setup *io)
130 {
131         struct smb2_request *req = smb2_session_setup_send(session, io);
132         return smb2_session_setup_recv(req, mem_ctx, io);
133 }
134
135
136 struct smb2_session_state {
137         struct smb2_session_setup io;
138         struct smb2_request *req;
139         NTSTATUS gensec_status;
140 };
141
142 /*
143   handle continuations of the spnego session setup
144 */
145 static void session_request_handler(struct smb2_request *req)
146 {
147         struct composite_context *c = talloc_get_type(req->async.private_data, 
148                                                       struct composite_context);
149         struct smb2_session_state *state = talloc_get_type(c->private_data, 
150                                                            struct smb2_session_state);
151         struct smb2_session *session = req->session;
152         NTSTATUS session_key_err;
153         DATA_BLOB session_key;
154         NTSTATUS peer_status;
155
156         c->status = smb2_session_setup_recv(req, c, &state->io);
157         peer_status = c->status;
158
159         if (NT_STATUS_EQUAL(peer_status, NT_STATUS_MORE_PROCESSING_REQUIRED) ||
160             (NT_STATUS_IS_OK(peer_status) &&
161              NT_STATUS_EQUAL(state->gensec_status, NT_STATUS_MORE_PROCESSING_REQUIRED))) {
162                 c->status = gensec_update(session->gensec, c, 
163                                           state->io.out.secblob,
164                                           &state->io.in.secblob);
165                 state->gensec_status = c->status;
166
167                 session->uid = state->io.out.uid;
168         }
169
170         if (!NT_STATUS_IS_OK(c->status) &&
171             !NT_STATUS_EQUAL(c->status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
172                 composite_error(c, c->status);
173                 return;
174         }
175
176         if (NT_STATUS_EQUAL(peer_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
177                 state->req = smb2_session_setup_send(session, &state->io);
178                 if (state->req == NULL) {
179                         composite_error(c, NT_STATUS_NO_MEMORY);
180                         return;
181                 }
182
183                 state->req->async.fn = session_request_handler;
184                 state->req->async.private_data = c;
185                 return;
186         }
187
188         session_key_err = gensec_session_key(session->gensec, &session_key);
189         if (NT_STATUS_IS_OK(session_key_err)) {
190                 session->session_key = session_key;
191         }
192
193         if (session->transport->signing_required) {
194                 if (session->session_key.length == 0) {
195                         DEBUG(0,("Wrong session key length %u for SMB2 signing\n",
196                                  (unsigned)session->session_key.length));
197                         composite_error(c, NT_STATUS_ACCESS_DENIED);
198                         return;
199                 }
200                 session->signing_active = true;
201         }
202
203         composite_done(c);
204 }
205
206 /*
207   a composite function that does a full SPNEGO session setup
208  */
209 struct composite_context *smb2_session_setup_spnego_send(struct smb2_session *session, 
210                                                          struct cli_credentials *credentials)
211 {
212         struct composite_context *c;
213         struct smb2_session_state *state;
214         const char *chosen_oid;
215
216         c = composite_create(session, session->transport->socket->event.ctx);
217         if (c == NULL) return NULL;
218
219         state = talloc(c, struct smb2_session_state);
220         if (composite_nomem(state, c)) return c;
221         c->private_data = state;
222
223         ZERO_STRUCT(state->io);
224         state->io.in.vc_number          = 0;
225         if (session->transport->signing_required) {
226                 state->io.in.security_mode = 
227                         SMB2_NEGOTIATE_SIGNING_ENABLED | SMB2_NEGOTIATE_SIGNING_REQUIRED;
228         }
229         state->io.in.capabilities       = 0;
230         state->io.in.channel            = 0;
231         state->io.in.previous_sessionid = 0;
232
233         c->status = gensec_set_credentials(session->gensec, credentials);
234         if (!composite_is_ok(c)) return c;
235
236         c->status = gensec_set_target_hostname(session->gensec, 
237                                                session->transport->socket->hostname);
238         if (!composite_is_ok(c)) return c;
239
240         c->status = gensec_set_target_service(session->gensec, "cifs");
241         if (!composite_is_ok(c)) return c;
242
243         if (session->transport->negotiate.secblob.length > 0) {
244                 chosen_oid = GENSEC_OID_SPNEGO;
245         } else {
246                 chosen_oid = GENSEC_OID_NTLMSSP;
247         }
248
249         c->status = gensec_start_mech_by_oid(session->gensec, chosen_oid);
250         if (!composite_is_ok(c)) return c;
251
252         c->status = gensec_update(session->gensec, c, 
253                                   session->transport->negotiate.secblob,
254                                   &state->io.in.secblob);
255         if (!NT_STATUS_EQUAL(c->status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
256                 composite_error(c, c->status);
257                 return c;
258         }
259         state->gensec_status = c->status;
260                 
261         state->req = smb2_session_setup_send(session, &state->io);
262         composite_continue_smb2(c, state->req, session_request_handler, c);
263         return c;
264 }
265
266 /*
267   receive a composite session setup reply
268 */
269 NTSTATUS smb2_session_setup_spnego_recv(struct composite_context *c)
270 {
271         NTSTATUS status;
272         status = composite_wait(c);
273         talloc_free(c);
274         return status;
275 }
276
277 /*
278   sync version of smb2_session_setup_spnego
279 */
280 NTSTATUS smb2_session_setup_spnego(struct smb2_session *session, 
281                                    struct cli_credentials *credentials)
282 {
283         struct composite_context *c = smb2_session_setup_spnego_send(session, credentials);
284         return smb2_session_setup_spnego_recv(c);
285 }