diff options
Diffstat (limited to 'libfreerdp/core/nla.c')
-rw-r--r-- | libfreerdp/core/nla.c | 2096 |
1 files changed, 2096 insertions, 0 deletions
diff --git a/libfreerdp/core/nla.c b/libfreerdp/core/nla.c new file mode 100644 index 0000000..ddee306 --- /dev/null +++ b/libfreerdp/core/nla.c @@ -0,0 +1,2096 @@ +/** + * FreeRDP: A Remote Desktop Protocol Implementation + * Network Level Authentication (NLA) + * + * Copyright 2010-2012 Marc-Andre Moreau <marcandre.moreau@gmail.com> + * Copyright 2015 Thincast Technologies GmbH + * Copyright 2015 DI (FH) Martin Haimberger <martin.haimberger@thincast.com> + * Copyright 2016 Martin Fleisz <martin.fleisz@thincast.com> + * Copyright 2017 Dorian Ducournau <dorian.ducournau@gmail.com> + * Copyright 2022 David Fort <contact@hardening-consulting.com> + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +#include <freerdp/config.h> + +#include "settings.h" + +#include <time.h> +#include <ctype.h> + +#include <freerdp/log.h> +#include <freerdp/build-config.h> + +#include <winpr/crt.h> +#include <winpr/assert.h> +#include <winpr/sam.h> +#include <winpr/sspi.h> +#include <winpr/print.h> +#include <winpr/tchar.h> +#include <winpr/ncrypt.h> +#include <winpr/cred.h> +#include <winpr/debug.h> +#include <winpr/asn1.h> +#include <winpr/secapi.h> + +#include "../crypto/tls.h" +#include "nego.h" +#include "rdp.h" +#include "nla.h" +#include "utils.h" +#include "credssp_auth.h" +#include <freerdp/utils/smartcardlogon.h> + +#define TAG FREERDP_TAG("core.nla") + +#define SERVER_KEY "Software\\" FREERDP_VENDOR_STRING "\\" FREERDP_PRODUCT_STRING "\\Server" + +#define NLA_AUTH_PKG NEGO_SSP_NAME + +typedef enum +{ + AUTHZ_SUCCESS = 0x00000000, + AUTHZ_ACCESS_DENIED = 0x00000005, +} AUTHZ_RESULT; + +/** + * TSRequest ::= SEQUENCE { + * version [0] INTEGER, + * negoTokens [1] NegoData OPTIONAL, + * authInfo [2] OCTET STRING OPTIONAL, + * pubKeyAuth [3] OCTET STRING OPTIONAL, + * errorCode [4] INTEGER OPTIONAL + * } + * + * NegoData ::= SEQUENCE OF NegoDataItem + * + * NegoDataItem ::= SEQUENCE { + * negoToken [0] OCTET STRING + * } + * + * TSCredentials ::= SEQUENCE { + * credType [0] INTEGER, + * credentials [1] OCTET STRING + * } + * + * TSPasswordCreds ::= SEQUENCE { + * domainName [0] OCTET STRING, + * userName [1] OCTET STRING, + * password [2] OCTET STRING + * } + * + * TSSmartCardCreds ::= SEQUENCE { + * pin [0] OCTET STRING, + * cspData [1] TSCspDataDetail, + * userHint [2] OCTET STRING OPTIONAL, + * domainHint [3] OCTET STRING OPTIONAL + * } + * + * TSCspDataDetail ::= SEQUENCE { + * keySpec [0] INTEGER, + * cardName [1] OCTET STRING OPTIONAL, + * readerName [2] OCTET STRING OPTIONAL, + * containerName [3] OCTET STRING OPTIONAL, + * cspName [4] OCTET STRING OPTIONAL + * } + * + */ + +#define NLA_PKG_NAME CREDSSP_AUTH_PKG_SPNEGO + +struct rdp_nla +{ + BOOL server; + NLA_STATE state; + ULONG sendSeqNum; + ULONG recvSeqNum; + rdpContext* rdpcontext; + rdpTransport* transport; + UINT32 version; + UINT32 peerVersion; + UINT32 errorCode; + + /* Lifetime of buffer nla_new -> nla_free */ + SecBuffer ClientNonce; /* Depending on protocol version a random nonce or a value read from the + server. */ + + SecBuffer negoToken; + SecBuffer pubKeyAuth; + SecBuffer authInfo; + SecBuffer PublicKey; + SecBuffer tsCredentials; + + SEC_WINNT_AUTH_IDENTITY* identity; + + rdpCredsspAuth* auth; + char* pkinitArgs; + SmartcardCertInfo* smartcardCert; + BYTE certSha1[20]; + BOOL earlyUserAuth; +}; + +static BOOL nla_send(rdpNla* nla); +static int nla_server_recv(rdpNla* nla); +static BOOL nla_encrypt_public_key_echo(rdpNla* nla); +static BOOL nla_encrypt_public_key_hash(rdpNla* nla); +static BOOL nla_decrypt_public_key_echo(rdpNla* nla); +static BOOL nla_decrypt_public_key_hash(rdpNla* nla); +static BOOL nla_encrypt_ts_credentials(rdpNla* nla); +static BOOL nla_decrypt_ts_credentials(rdpNla* nla); + +void nla_set_early_user_auth(rdpNla* nla, BOOL earlyUserAuth) +{ + WINPR_ASSERT(nla); + WLog_DBG(TAG, "Early User Auth active: %s", earlyUserAuth ? "true" : "false"); + nla->earlyUserAuth = earlyUserAuth; +} + +static void nla_buffer_free(rdpNla* nla) +{ + WINPR_ASSERT(nla); + sspi_SecBufferFree(&nla->pubKeyAuth); + sspi_SecBufferFree(&nla->authInfo); + sspi_SecBufferFree(&nla->negoToken); + sspi_SecBufferFree(&nla->ClientNonce); + sspi_SecBufferFree(&nla->PublicKey); +} + +static BOOL nla_Digest_Update_From_SecBuffer(WINPR_DIGEST_CTX* ctx, const SecBuffer* buffer) +{ + if (!buffer) + return FALSE; + return winpr_Digest_Update(ctx, buffer->pvBuffer, buffer->cbBuffer); +} + +static BOOL nla_sec_buffer_alloc(SecBuffer* buffer, size_t size) +{ + WINPR_ASSERT(buffer); + sspi_SecBufferFree(buffer); + if (size > ULONG_MAX) + return FALSE; + if (!sspi_SecBufferAlloc(buffer, (ULONG)size)) + return FALSE; + + WINPR_ASSERT(buffer); + buffer->BufferType = SECBUFFER_TOKEN; + return TRUE; +} + +static BOOL nla_sec_buffer_alloc_from_data(SecBuffer* buffer, const BYTE* data, size_t offset, + size_t size) +{ + if (!nla_sec_buffer_alloc(buffer, offset + size)) + return FALSE; + + WINPR_ASSERT(buffer); + BYTE* pb = buffer->pvBuffer; + memcpy(&pb[offset], data, size); + return TRUE; +} + +/* CredSSP Client-To-Server Binding Hash\0 */ +static const BYTE ClientServerHashMagic[] = { 0x43, 0x72, 0x65, 0x64, 0x53, 0x53, 0x50, 0x20, + 0x43, 0x6C, 0x69, 0x65, 0x6E, 0x74, 0x2D, 0x54, + 0x6F, 0x2D, 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, + 0x20, 0x42, 0x69, 0x6E, 0x64, 0x69, 0x6E, 0x67, + 0x20, 0x48, 0x61, 0x73, 0x68, 0x00 }; + +/* CredSSP Server-To-Client Binding Hash\0 */ +static const BYTE ServerClientHashMagic[] = { 0x43, 0x72, 0x65, 0x64, 0x53, 0x53, 0x50, 0x20, + 0x53, 0x65, 0x72, 0x76, 0x65, 0x72, 0x2D, 0x54, + 0x6F, 0x2D, 0x43, 0x6C, 0x69, 0x65, 0x6E, 0x74, + 0x20, 0x42, 0x69, 0x6E, 0x64, 0x69, 0x6E, 0x67, + 0x20, 0x48, 0x61, 0x73, 0x68, 0x00 }; + +static const UINT32 NonceLength = 32; + +static BOOL nla_adjust_settings_from_smartcard(rdpNla* nla) +{ + BOOL ret = FALSE; + + WINPR_ASSERT(nla); + WINPR_ASSERT(nla->rdpcontext); + + rdpSettings* settings = nla->rdpcontext->settings; + WINPR_ASSERT(settings); + + if (!settings->SmartcardLogon) + return TRUE; + + smartcardCertInfo_Free(nla->smartcardCert); + + if (!smartcard_getCert(nla->rdpcontext, &nla->smartcardCert, FALSE)) + { + WLog_ERR(TAG, "unable to get smartcard certificate for logon"); + return FALSE; + } + + if (!settings->CspName) + { + if (nla->smartcardCert->csp && !freerdp_settings_set_string_from_utf16( + settings, FreeRDP_CspName, nla->smartcardCert->csp)) + { + WLog_ERR(TAG, "unable to set CSP name"); + goto out; + } + if (!settings->CspName && + !freerdp_settings_set_string(settings, FreeRDP_CspName, MS_SCARD_PROV_A)) + { + WLog_ERR(TAG, "unable to set CSP name"); + goto out; + } + } + + if (!settings->ReaderName && nla->smartcardCert->reader) + { + if (!freerdp_settings_set_string_from_utf16(settings, FreeRDP_ReaderName, + nla->smartcardCert->reader)) + { + WLog_ERR(TAG, "unable to copy reader name"); + goto out; + } + } + + if (!settings->ContainerName && nla->smartcardCert->containerName) + { + if (!freerdp_settings_set_string_from_utf16(settings, FreeRDP_ContainerName, + nla->smartcardCert->containerName)) + { + WLog_ERR(TAG, "unable to copy container name"); + goto out; + } + } + + memcpy(nla->certSha1, nla->smartcardCert->sha1Hash, sizeof(nla->certSha1)); + + if (nla->smartcardCert->pkinitArgs) + { + nla->pkinitArgs = _strdup(nla->smartcardCert->pkinitArgs); + if (!nla->pkinitArgs) + { + WLog_ERR(TAG, "unable to copy pkinitArgs"); + goto out; + } + } + + ret = TRUE; +out: + return ret; +} + +static BOOL nla_client_setup_identity(rdpNla* nla) +{ + BOOL PromptPassword = FALSE; + + WINPR_ASSERT(nla); + WINPR_ASSERT(nla->rdpcontext); + + rdpSettings* settings = nla->rdpcontext->settings; + WINPR_ASSERT(settings); + + freerdp* instance = nla->rdpcontext->instance; + WINPR_ASSERT(instance); + + /* */ + if ((utils_str_is_empty(settings->Username) || + (utils_str_is_empty(settings->Password) && + utils_str_is_empty((const char*)settings->RedirectionPassword)))) + { + PromptPassword = TRUE; + } + + if (PromptPassword && !utils_str_is_empty(settings->Username)) + { + WINPR_SAM* sam = SamOpen(NULL, TRUE); + if (sam) + { + const size_t userLength = strlen(settings->Username); + WINPR_SAM_ENTRY* entry = SamLookupUserA( + sam, settings->Username, userLength + 1 /* ensure '\0' is checked too */, NULL, 0); + if (entry) + { + /** + * The user could be found in SAM database. + * Use entry in SAM database later instead of prompt + */ + PromptPassword = FALSE; + SamFreeEntry(sam, entry); + } + + SamClose(sam); + } + } + +#ifndef _WIN32 + if (PromptPassword) + { + if (settings->RestrictedAdminModeRequired) + { + if ((settings->PasswordHash) && (strlen(settings->PasswordHash) > 0)) + PromptPassword = FALSE; + } + + if (settings->RemoteCredentialGuard) + PromptPassword = FALSE; + } +#endif + + BOOL smartCardLogonWasDisabled = !settings->SmartcardLogon; + if (PromptPassword) + { + switch (utils_authenticate(instance, AUTH_NLA, TRUE)) + { + case AUTH_SKIP: + case AUTH_SUCCESS: + break; + case AUTH_CANCELLED: + freerdp_set_last_error_log(instance->context, FREERDP_ERROR_CONNECT_CANCELLED); + return FALSE; + case AUTH_NO_CREDENTIALS: + WLog_INFO(TAG, "No credentials provided - using NULL identity"); + break; + default: + return FALSE; + } + } + + if (!settings->Username) + { + sspi_FreeAuthIdentity(nla->identity); + nla->identity = NULL; + } + else if (settings->SmartcardLogon) + { + if (smartCardLogonWasDisabled) + { + if (!nla_adjust_settings_from_smartcard(nla)) + return FALSE; + } + + if (!identity_set_from_smartcard_hash(nla->identity, settings, FreeRDP_Username, + FreeRDP_Domain, FreeRDP_Password, nla->certSha1, + sizeof(nla->certSha1))) + return FALSE; + } + else + { + BOOL usePassword = TRUE; + + if (settings->RedirectionPassword && (settings->RedirectionPasswordLength > 0)) + { + if (!identity_set_from_settings_with_pwd( + nla->identity, settings, FreeRDP_Username, FreeRDP_Domain, + (const WCHAR*)settings->RedirectionPassword, + settings->RedirectionPasswordLength / sizeof(WCHAR))) + return FALSE; + + usePassword = FALSE; + } + + if (settings->RestrictedAdminModeRequired) + { + if (settings->PasswordHash && strlen(settings->PasswordHash) == 32) + { + if (!identity_set_from_settings(nla->identity, settings, FreeRDP_Username, + FreeRDP_Domain, FreeRDP_PasswordHash)) + return FALSE; + + /** + * Increase password hash length by LB_PASSWORD_MAX_LENGTH to obtain a + * length exceeding the maximum (LB_PASSWORD_MAX_LENGTH) and use it this for + * hash identification in WinPR. + */ + nla->identity->PasswordLength += LB_PASSWORD_MAX_LENGTH; + usePassword = FALSE; + } + } + + if (usePassword) + { + if (!identity_set_from_settings(nla->identity, settings, FreeRDP_Username, + FreeRDP_Domain, FreeRDP_Password)) + return FALSE; + } + } + + return TRUE; +} + +static int nla_client_init(rdpNla* nla) +{ + WINPR_ASSERT(nla); + WINPR_ASSERT(nla->rdpcontext); + + rdpSettings* settings = nla->rdpcontext->settings; + WINPR_ASSERT(settings); + + nla_set_state(nla, NLA_STATE_INITIAL); + + if (!nla_adjust_settings_from_smartcard(nla)) + return -1; + + if (!credssp_auth_init(nla->auth, NLA_AUTH_PKG, NULL)) + return -1; + + if (!nla_client_setup_identity(nla)) + return -1; + + const char* hostname = freerdp_settings_get_server_name(settings); + + if (!credssp_auth_setup_client(nla->auth, "TERMSRV", hostname, nla->identity, nla->pkinitArgs)) + return -1; + + const BYTE* data = NULL; + DWORD length = 0; + if (!transport_get_public_key(nla->transport, &data, &length)) + { + WLog_ERR(TAG, "Failed to get public key"); + return -1; + } + + if (!nla_sec_buffer_alloc_from_data(&nla->PublicKey, data, 0, length)) + { + WLog_ERR(TAG, "Failed to allocate sspi secBuffer"); + return -1; + } + + return 1; +} + +int nla_client_begin(rdpNla* nla) +{ + WINPR_ASSERT(nla); + + if (nla_client_init(nla) < 1) + return -1; + + if (nla_get_state(nla) != NLA_STATE_INITIAL) + return -1; + + /* + * from tspkg.dll: 0x00000132 + * ISC_REQ_MUTUAL_AUTH + * ISC_REQ_CONFIDENTIALITY + * ISC_REQ_USE_SESSION_KEY + * ISC_REQ_ALLOCATE_MEMORY + */ + credssp_auth_set_flags(nla->auth, ISC_REQ_MUTUAL_AUTH | ISC_REQ_CONFIDENTIALITY); + + const int rc = credssp_auth_authenticate(nla->auth); + + switch (rc) + { + case 0: + if (!nla_send(nla)) + return -1; + nla_set_state(nla, NLA_STATE_NEGO_TOKEN); + break; + case 1: + if (credssp_auth_have_output_token(nla->auth)) + { + if (!nla_send(nla)) + return -1; + } + nla_set_state(nla, NLA_STATE_FINAL); + break; + default: + return -1; + } + + return 1; +} + +static int nla_client_recv_nego_token(rdpNla* nla) +{ + credssp_auth_take_input_buffer(nla->auth, &nla->negoToken); + const int rc = credssp_auth_authenticate(nla->auth); + + switch (rc) + { + case 0: + if (!nla_send(nla)) + return -1; + break; + case 1: /* completed */ + { + int res = -1; + if (nla->peerVersion < 5) + res = nla_encrypt_public_key_echo(nla); + else + res = nla_encrypt_public_key_hash(nla); + + if (!res) + return -1; + + if (!nla_send(nla)) + return -1; + + nla_set_state(nla, NLA_STATE_PUB_KEY_AUTH); + } + break; + + default: + return -1; + } + + return 1; +} + +static int nla_client_recv_pub_key_auth(rdpNla* nla) +{ + BOOL rc = FALSE; + + WINPR_ASSERT(nla); + + /* Verify Server Public Key Echo */ + if (nla->peerVersion < 5) + rc = nla_decrypt_public_key_echo(nla); + else + rc = nla_decrypt_public_key_hash(nla); + + sspi_SecBufferFree(&nla->pubKeyAuth); + + if (!rc) + return -1; + + /* Send encrypted credentials */ + rc = nla_encrypt_ts_credentials(nla); + if (!rc) + return -1; + + if (!nla_send(nla)) + return -1; + + if (nla->earlyUserAuth) + { + transport_set_early_user_auth_mode(nla->transport, TRUE); + nla_set_state(nla, NLA_STATE_EARLY_USER_AUTH); + } + else + nla_set_state(nla, NLA_STATE_AUTH_INFO); + return 1; +} + +static int nla_client_recv_early_user_auth(rdpNla* nla) +{ + WINPR_ASSERT(nla); + + transport_set_early_user_auth_mode(nla->transport, FALSE); + nla_set_state(nla, NLA_STATE_AUTH_INFO); + return 1; +} + +static int nla_client_recv(rdpNla* nla) +{ + WINPR_ASSERT(nla); + + switch (nla_get_state(nla)) + { + case NLA_STATE_NEGO_TOKEN: + return nla_client_recv_nego_token(nla); + + case NLA_STATE_PUB_KEY_AUTH: + return nla_client_recv_pub_key_auth(nla); + + case NLA_STATE_EARLY_USER_AUTH: + return nla_client_recv_early_user_auth(nla); + + case NLA_STATE_FINAL: + default: + WLog_ERR(TAG, "NLA in invalid client receive state %s", + nla_get_state_str(nla_get_state(nla))); + return -1; + } +} + +static int nla_client_authenticate(rdpNla* nla) +{ + int rc = -1; + + WINPR_ASSERT(nla); + + wStream* s = Stream_New(NULL, 4096); + + if (!s) + { + WLog_ERR(TAG, "Stream_New failed!"); + return -1; + } + + if (nla_client_begin(nla) < 1) + goto fail; + + while (nla_get_state(nla) < NLA_STATE_AUTH_INFO) + { + Stream_SetPosition(s, 0); + const int status = transport_read_pdu(nla->transport, s); + + if (status < 0) + { + WLog_ERR(TAG, "nla_client_authenticate failure"); + goto fail; + } + + const int status2 = nla_recv_pdu(nla, s); + + if (status2 < 0) + goto fail; + } + + rc = 1; +fail: + Stream_Free(s, TRUE); + return rc; +} + +/** + * Initialize NTLMSSP authentication module (server). + */ + +static int nla_server_init(rdpNla* nla) +{ + WINPR_ASSERT(nla); + + const BYTE* data = NULL; + DWORD length = 0; + if (!transport_get_public_key(nla->transport, &data, &length)) + { + WLog_ERR(TAG, "Failed to get public key"); + return -1; + } + + if (!nla_sec_buffer_alloc_from_data(&nla->PublicKey, data, 0, length)) + { + WLog_ERR(TAG, "Failed to allocate SecBuffer for public key"); + return -1; + } + + if (!credssp_auth_init(nla->auth, NLA_AUTH_PKG, NULL)) + return -1; + + if (!credssp_auth_setup_server(nla->auth)) + return -1; + + nla_set_state(nla, NLA_STATE_INITIAL); + return 1; +} + +static wStream* nla_server_recv_stream(rdpNla* nla) +{ + wStream* s = NULL; + int status = -1; + + WINPR_ASSERT(nla); + + s = Stream_New(NULL, 4096); + + if (!s) + goto fail; + + status = transport_read_pdu(nla->transport, s); + +fail: + if (status < 0) + { + WLog_ERR(TAG, "nla_recv() error: %d", status); + Stream_Free(s, TRUE); + return NULL; + } + + return s; +} + +static BOOL nla_server_recv_credentials(rdpNla* nla) +{ + WINPR_ASSERT(nla); + + if (nla_server_recv(nla) < 0) + return FALSE; + + if (!nla_decrypt_ts_credentials(nla)) + return FALSE; + + if (!nla_impersonate(nla)) + return FALSE; + + if (!nla_revert_to_self(nla)) + return FALSE; + + return TRUE; +} + +/** + * Authenticate with client using CredSSP (server). + * @param nla The NLA instance to use + * + * @return 1 if authentication is successful + */ + +static int nla_server_authenticate(rdpNla* nla) +{ + int ret = -1; + + WINPR_ASSERT(nla); + + if (nla_server_init(nla) < 1) + goto fail; + + /* + * from tspkg.dll: 0x00000112 + * ASC_REQ_MUTUAL_AUTH + * ASC_REQ_CONFIDENTIALITY + * ASC_REQ_ALLOCATE_MEMORY + */ + credssp_auth_set_flags(nla->auth, ASC_REQ_MUTUAL_AUTH | ASC_REQ_CONFIDENTIALITY | + ASC_REQ_CONNECTION | ASC_REQ_USE_SESSION_KEY | + ASC_REQ_SEQUENCE_DETECT | ASC_REQ_EXTENDED_ERROR); + + /* Client is starting, here es the state machine: + * + * -- NLA_STATE_INITIAL --> NLA_STATE_INITIAL + * ----->> sending... + * ----->> protocol version 6 + * ----->> nego token + * ----->> client nonce + * <<----- receiving... + * <<----- protocol version 6 + * <<----- nego token + * ----->> sending... + * ----->> protocol version 6 + * ----->> nego token + * ----->> public key auth + * ----->> client nonce + * -- NLA_STATE_NEGO_TOKEN --> NLA_STATE_PUB_KEY_AUTH + * <<----- receiving... + * <<----- protocol version 6 + * <<----- public key info + * ----->> sending... + * ----->> protocol version 6 + * ----->> auth info + * ----->> client nonce + * -- NLA_STATE_PUB_KEY_AUTH --> NLA_STATE + */ + + while (TRUE) + { + int res = -1; + + if (nla_server_recv(nla) < 0) + goto fail; + + WLog_DBG(TAG, "Receiving Authentication Token"); + credssp_auth_take_input_buffer(nla->auth, &nla->negoToken); + + res = credssp_auth_authenticate(nla->auth); + + if (res == -1) + { + /* Special handling of these specific error codes as NTSTATUS_FROM_WIN32 + unfortunately does not map directly to the corresponding NTSTATUS values + */ + switch (GetLastError()) + { + case ERROR_PASSWORD_MUST_CHANGE: + nla->errorCode = STATUS_PASSWORD_MUST_CHANGE; + break; + + case ERROR_PASSWORD_EXPIRED: + nla->errorCode = STATUS_PASSWORD_EXPIRED; + break; + + case ERROR_ACCOUNT_DISABLED: + nla->errorCode = STATUS_ACCOUNT_DISABLED; + break; + + default: + nla->errorCode = NTSTATUS_FROM_WIN32(GetLastError()); + break; + } + + nla_send(nla); + /* Access Denied */ + goto fail; + } + + if (res == 1) + { + /* Process final part of the nego token exchange */ + if (credssp_auth_have_output_token(nla->auth)) + { + if (!nla_send(nla)) + goto fail; + + if (nla_server_recv(nla) < 0) + goto fail; + + WLog_DBG(TAG, "Receiving pubkey Token"); + } + + if (nla->peerVersion < 5) + res = nla_decrypt_public_key_echo(nla); + else + res = nla_decrypt_public_key_hash(nla); + + if (!res) + goto fail; + + /* Clear nego token buffer or we will send it again to the client */ + sspi_SecBufferFree(&nla->negoToken); + + if (nla->peerVersion < 5) + res = nla_encrypt_public_key_echo(nla); + else + res = nla_encrypt_public_key_hash(nla); + + if (!res) + goto fail; + } + + /* send authentication token */ + WLog_DBG(TAG, "Sending Authentication Token"); + + if (!nla_send(nla)) + goto fail; + + if (res == 1) + { + ret = 1; + break; + } + } + + /* Receive encrypted credentials */ + if (!nla_server_recv_credentials(nla)) + ret = -1; + +fail: + nla_buffer_free(nla); + return ret; +} + +/** + * Authenticate using CredSSP. + * @param nla The NLA instance to use + * + * @return 1 if authentication is successful + */ + +int nla_authenticate(rdpNla* nla) +{ + WINPR_ASSERT(nla); + + if (nla->server) + return nla_server_authenticate(nla); + else + return nla_client_authenticate(nla); +} + +static void ap_integer_increment_le(BYTE* number, size_t size) +{ + WINPR_ASSERT(number || (size == 0)); + + for (size_t index = 0; index < size; index++) + { + if (number[index] < 0xFF) + { + number[index]++; + break; + } + else + { + number[index] = 0; + continue; + } + } +} + +static void ap_integer_decrement_le(BYTE* number, size_t size) +{ + WINPR_ASSERT(number || (size == 0)); + + for (size_t index = 0; index < size; index++) + { + if (number[index] > 0) + { + number[index]--; + break; + } + else + { + number[index] = 0xFF; + continue; + } + } +} + +BOOL nla_encrypt_public_key_echo(rdpNla* nla) +{ + BOOL status = FALSE; + + WINPR_ASSERT(nla); + + sspi_SecBufferFree(&nla->pubKeyAuth); + if (nla->server) + { + SecBuffer buf = { 0 }; + if (!sspi_SecBufferAlloc(&buf, nla->PublicKey.cbBuffer)) + return FALSE; + ap_integer_increment_le(buf.pvBuffer, buf.cbBuffer); + status = credssp_auth_encrypt(nla->auth, &buf, &nla->pubKeyAuth, NULL, nla->sendSeqNum++); + sspi_SecBufferFree(&buf); + } + else + { + status = credssp_auth_encrypt(nla->auth, &nla->PublicKey, &nla->pubKeyAuth, NULL, + nla->sendSeqNum++); + } + + return status; +} + +BOOL nla_encrypt_public_key_hash(rdpNla* nla) +{ + BOOL status = FALSE; + WINPR_DIGEST_CTX* sha256 = NULL; + SecBuffer buf = { 0 }; + + WINPR_ASSERT(nla); + + const BYTE* hashMagic = nla->server ? ServerClientHashMagic : ClientServerHashMagic; + const size_t hashSize = + nla->server ? sizeof(ServerClientHashMagic) : sizeof(ClientServerHashMagic); + + if (!sspi_SecBufferAlloc(&buf, WINPR_SHA256_DIGEST_LENGTH)) + return FALSE; + + /* generate SHA256 of following data: ClientServerHashMagic, Nonce, SubjectPublicKey */ + if (!(sha256 = winpr_Digest_New())) + goto out; + + if (!winpr_Digest_Init(sha256, WINPR_MD_SHA256)) + goto out; + + /* include trailing \0 from hashMagic */ + if (!winpr_Digest_Update(sha256, hashMagic, hashSize)) + goto out; + + if (!nla_Digest_Update_From_SecBuffer(sha256, &nla->ClientNonce)) + goto out; + + /* SubjectPublicKey */ + if (!nla_Digest_Update_From_SecBuffer(sha256, &nla->PublicKey)) + goto out; + + if (!winpr_Digest_Final(sha256, buf.pvBuffer, WINPR_SHA256_DIGEST_LENGTH)) + goto out; + + sspi_SecBufferFree(&nla->pubKeyAuth); + if (!credssp_auth_encrypt(nla->auth, &buf, &nla->pubKeyAuth, NULL, nla->sendSeqNum++)) + goto out; + + status = TRUE; + +out: + winpr_Digest_Free(sha256); + sspi_SecBufferFree(&buf); + return status; +} + +BOOL nla_decrypt_public_key_echo(rdpNla* nla) +{ + BOOL status = FALSE; + SecBuffer public_key = { 0 }; + + if (!nla) + goto fail; + + if (!credssp_auth_decrypt(nla->auth, &nla->pubKeyAuth, &public_key, nla->recvSeqNum++)) + return FALSE; + + if (!nla->server) + { + /* server echos the public key +1 */ + ap_integer_decrement_le(public_key.pvBuffer, public_key.cbBuffer); + } + + if (public_key.cbBuffer != nla->PublicKey.cbBuffer || + memcmp(public_key.pvBuffer, nla->PublicKey.pvBuffer, public_key.cbBuffer) != 0) + { + WLog_ERR(TAG, "Could not verify server's public key echo"); +#if defined(WITH_DEBUG_NLA) + WLog_ERR(TAG, "Expected (length = %" PRIu32 "):", nla->PublicKey.cbBuffer); + winpr_HexDump(TAG, WLOG_ERROR, nla->PublicKey.pvBuffer, nla->PublicKey.cbBuffer); + WLog_ERR(TAG, "Actual (length = %" PRIu32 "):", public_key.cbBuffer); + winpr_HexDump(TAG, WLOG_ERROR, public_key.pvBuffer, public_key.cbBuffer); +#endif + /* DO NOT SEND CREDENTIALS! */ + goto fail; + } + + status = TRUE; +fail: + sspi_SecBufferFree(&public_key); + return status; +} + +BOOL nla_decrypt_public_key_hash(rdpNla* nla) +{ + WINPR_DIGEST_CTX* sha256 = NULL; + BYTE serverClientHash[WINPR_SHA256_DIGEST_LENGTH] = { 0 }; + BOOL status = FALSE; + + WINPR_ASSERT(nla); + + const BYTE* hashMagic = nla->server ? ClientServerHashMagic : ServerClientHashMagic; + const size_t hashSize = + nla->server ? sizeof(ClientServerHashMagic) : sizeof(ServerClientHashMagic); + SecBuffer hash = { 0 }; + + if (!credssp_auth_decrypt(nla->auth, &nla->pubKeyAuth, &hash, nla->recvSeqNum++)) + return FALSE; + + /* generate SHA256 of following data: ServerClientHashMagic, Nonce, SubjectPublicKey */ + if (!(sha256 = winpr_Digest_New())) + goto fail; + + if (!winpr_Digest_Init(sha256, WINPR_MD_SHA256)) + goto fail; + + /* include trailing \0 from hashMagic */ + if (!winpr_Digest_Update(sha256, hashMagic, hashSize)) + goto fail; + + if (!nla_Digest_Update_From_SecBuffer(sha256, &nla->ClientNonce)) + goto fail; + + /* SubjectPublicKey */ + if (!nla_Digest_Update_From_SecBuffer(sha256, &nla->PublicKey)) + goto fail; + + if (!winpr_Digest_Final(sha256, serverClientHash, sizeof(serverClientHash))) + goto fail; + + /* verify hash */ + if (hash.cbBuffer != WINPR_SHA256_DIGEST_LENGTH || + memcmp(serverClientHash, hash.pvBuffer, WINPR_SHA256_DIGEST_LENGTH) != 0) + { + WLog_ERR(TAG, "Could not verify server's hash"); + /* DO NOT SEND CREDENTIALS! */ + goto fail; + } + + status = TRUE; +fail: + winpr_Digest_Free(sha256); + sspi_SecBufferFree(&hash); + return status; +} + +static BOOL set_creds_octetstring_to_settings(WinPrAsn1Decoder* dec, WinPrAsn1_tagId tagId, + BOOL optional, FreeRDP_Settings_Keys_String settingId, + rdpSettings* settings) +{ + if (optional) + { + WinPrAsn1_tagId itemTag = 0; + if (!WinPrAsn1DecPeekTag(dec, &itemTag) || (itemTag != tagId)) + return TRUE; + } + + BOOL error = FALSE; + WinPrAsn1_OctetString value; + /* note: not checking "error" value, as the not present optional item case is handled above + * if the function fails it's because of a real error not because the item is not present + */ + if (!WinPrAsn1DecReadContextualOctetString(dec, tagId, &error, &value, FALSE)) + return FALSE; + + return freerdp_settings_set_string_from_utf16N(settings, settingId, (const WCHAR*)value.data, + value.len / sizeof(WCHAR)); +} + +static BOOL nla_read_TSCspDataDetail(WinPrAsn1Decoder* dec, rdpSettings* settings) +{ + BOOL error = FALSE; + + /* keySpec [0] INTEGER */ + WinPrAsn1_INTEGER keyspec = 0; + if (!WinPrAsn1DecReadContextualInteger(dec, 0, &error, &keyspec)) + return FALSE; + settings->KeySpec = (UINT32)keyspec; + + /* cardName [1] OCTET STRING OPTIONAL */ + if (!set_creds_octetstring_to_settings(dec, 1, TRUE, FreeRDP_CardName, settings)) + return FALSE; + + /* readerName [2] OCTET STRING OPTIONAL */ + if (!set_creds_octetstring_to_settings(dec, 2, TRUE, FreeRDP_ReaderName, settings)) + return FALSE; + + /* containerName [3] OCTET STRING OPTIONAL */ + if (!set_creds_octetstring_to_settings(dec, 3, TRUE, FreeRDP_ContainerName, settings)) + return FALSE; + + /* cspName [4] OCTET STRING OPTIONAL */ + return set_creds_octetstring_to_settings(dec, 4, TRUE, FreeRDP_CspName, settings); +} + +static BOOL nla_read_KERB_TICKET_LOGON(rdpNla* nla, wStream* s, KERB_TICKET_LOGON* ticket) +{ + /* mysterious extra 16 bytes before TGS/TGT content */ + if (!Stream_CheckAndLogRequiredLength(TAG, s, 16 + 16)) + return FALSE; + + Stream_Read_UINT32(s, ticket->MessageType); + Stream_Read_UINT32(s, ticket->Flags); + Stream_Read_UINT32(s, ticket->ServiceTicketLength); + Stream_Read_UINT32(s, ticket->TicketGrantingTicketLength); + + if (ticket->MessageType != KerbTicketLogon) + { + WLog_ERR(TAG, "Not a KerbTicketLogon"); + return FALSE; + } + + if (!Stream_CheckAndLogRequiredLength( + TAG, s, 16ull + ticket->ServiceTicketLength + ticket->TicketGrantingTicketLength)) + return FALSE; + + /* mysterious 16 bytes in the way, maybe they would need to be interpreted... */ + Stream_Seek(s, 16); + + /*WLog_INFO(TAG, "TGS"); + winpr_HexDump(TAG, WLOG_DEBUG, Stream_PointerAs(s, const BYTE), ticket->ServiceTicketLength);*/ + ticket->ServiceTicket = Stream_PointerAs(s, UCHAR); + Stream_Seek(s, ticket->ServiceTicketLength); + + /*WLog_INFO(TAG, "TGT"); + winpr_HexDump(TAG, WLOG_DEBUG, Stream_PointerAs(s, const BYTE), + ticket->TicketGrantingTicketLength);*/ + ticket->TicketGrantingTicket = Stream_PointerAs(s, UCHAR); + return TRUE; +} + +/** @brief kind of RCG credentials */ +typedef enum +{ + RCG_TYPE_KERB, + RCG_TYPE_NTLM +} RemoteGuardPackageCredType; + +static BOOL nla_read_TSRemoteGuardPackageCred(rdpNla* nla, WinPrAsn1Decoder* dec, + RemoteGuardPackageCredType* credsType, + wStream* payload) +{ + WinPrAsn1_OctetString packageName = { 0 }; + WinPrAsn1_OctetString credBuffer = { 0 }; + BOOL error = FALSE; + char packageNameStr[100] = { 0 }; + + /* packageName [0] OCTET STRING */ + if (!WinPrAsn1DecReadContextualOctetString(dec, 0, &error, &packageName, FALSE) || error) + return TRUE; + + ConvertMszWCharNToUtf8((WCHAR*)packageName.data, packageName.len / sizeof(WCHAR), + packageNameStr, 100); + WLog_DBG(TAG, "TSRemoteGuardPackageCred(%s)", packageNameStr); + + /* credBuffer [1] OCTET STRING, */ + if (!WinPrAsn1DecReadContextualOctetString(dec, 1, &error, &credBuffer, FALSE) || error) + return TRUE; + + if (_stricmp(packageNameStr, "Kerberos") == 0) + { + *credsType = RCG_TYPE_KERB; + } + else if (_stricmp(packageNameStr, "NTLM") == 0) + { + *credsType = RCG_TYPE_NTLM; + } + else + { + WLog_INFO(TAG, "TSRemoteGuardPackageCred package %s not handled", packageNameStr); + return FALSE; + } + + Stream_StaticInit(payload, credBuffer.data, credBuffer.len); + return TRUE; +} + +/** @brief kind of TSCreds */ +typedef enum +{ + TSCREDS_INVALID = 0, + TSCREDS_USER_PASSWD = 1, + TSCREDS_SMARTCARD = 2, + TSCREDS_REMOTEGUARD = 6 +} TsCredentialsType; + +static BOOL nla_read_ts_credentials(rdpNla* nla, SecBuffer* data) +{ + WinPrAsn1Decoder dec = { 0 }; + WinPrAsn1Decoder dec2 = { 0 }; + WinPrAsn1_OctetString credentials = { 0 }; + BOOL error = FALSE; + WinPrAsn1_INTEGER credType = -1; + BOOL ret = true; + + WINPR_ASSERT(nla); + WINPR_ASSERT(data); + + WinPrAsn1Decoder_InitMem(&dec, WINPR_ASN1_DER, (BYTE*)data->pvBuffer, data->cbBuffer); + + /* TSCredentials */ + if (!WinPrAsn1DecReadSequence(&dec, &dec2)) + return FALSE; + dec = dec2; + + /* credType [0] INTEGER */ + if (!WinPrAsn1DecReadContextualInteger(&dec, 0, &error, &credType)) + return FALSE; + + /* credentials [1] OCTET STRING */ + if (!WinPrAsn1DecReadContextualOctetString(&dec, 1, &error, &credentials, FALSE)) + return FALSE; + + WinPrAsn1Decoder_InitMem(&dec, WINPR_ASN1_DER, credentials.data, credentials.len); + + rdpSettings* settings = nla->rdpcontext->settings; + if (nego_get_remoteCredentialGuard(nla->rdpcontext->rdp->nego) && + credType != TSCREDS_REMOTEGUARD) + { + WLog_ERR(TAG, "connecting with RCG but it's not TSRemoteGuard credentials"); + return FALSE; + } + + switch (credType) + { + case TSCREDS_USER_PASSWD: + { + /* TSPasswordCreds */ + if (!WinPrAsn1DecReadSequence(&dec, &dec2)) + return FALSE; + dec = dec2; + + /* domainName [0] OCTET STRING */ + if (!set_creds_octetstring_to_settings(&dec, 0, FALSE, FreeRDP_Domain, settings)) + return FALSE; + + /* userName [1] OCTET STRING */ + if (!set_creds_octetstring_to_settings(&dec, 1, FALSE, FreeRDP_Username, settings)) + return FALSE; + + /* password [2] OCTET STRING */ + return set_creds_octetstring_to_settings(&dec, 2, FALSE, FreeRDP_Password, settings); + } + case TSCREDS_SMARTCARD: + { + /* TSSmartCardCreds */ + if (!WinPrAsn1DecReadSequence(&dec, &dec2)) + return FALSE; + dec = dec2; + + /* pin [0] OCTET STRING, */ + if (!set_creds_octetstring_to_settings(&dec, 0, FALSE, FreeRDP_Password, settings)) + return FALSE; + settings->PasswordIsSmartcardPin = TRUE; + + /* cspData [1] TSCspDataDetail */ + WinPrAsn1Decoder cspDetails = { 0 }; + if (!WinPrAsn1DecReadContextualSequence(&dec, 1, &error, &cspDetails) && error) + return FALSE; + if (!nla_read_TSCspDataDetail(&cspDetails, settings)) + return FALSE; + + /* userHint [2] OCTET STRING OPTIONAL */ + if (!set_creds_octetstring_to_settings(&dec, 2, TRUE, FreeRDP_Username, settings)) + return FALSE; + + /* domainHint [3] OCTET STRING OPTIONAL */ + return set_creds_octetstring_to_settings(&dec, 3, TRUE, FreeRDP_Domain, settings); + } + case TSCREDS_REMOTEGUARD: + { + /* TSRemoteGuardCreds */ + if (!WinPrAsn1DecReadSequence(&dec, &dec2)) + return FALSE; + + /* logonCred[0] TSRemoteGuardPackageCred */ + KERB_TICKET_LOGON kerbLogon = { 0 }; + WinPrAsn1Decoder logonCredsSeq = { 0 }; + if (!WinPrAsn1DecReadContextualSequence(&dec2, 0, &error, &logonCredsSeq) || error) + return FALSE; + + RemoteGuardPackageCredType logonCredsType = { 0 }; + wStream logonPayload = { 0 }; + if (!nla_read_TSRemoteGuardPackageCred(nla, &logonCredsSeq, &logonCredsType, + &logonPayload)) + return FALSE; + if (logonCredsType != RCG_TYPE_KERB) + { + WLog_ERR(TAG, "logonCred must be some Kerberos creds"); + return FALSE; + } + + if (!nla_read_KERB_TICKET_LOGON(nla, &logonPayload, &kerbLogon)) + { + WLog_ERR(TAG, "invalid KERB_TICKET_LOGON"); + return FALSE; + } + + /* supplementalCreds [1] SEQUENCE OF TSRemoteGuardPackageCred OPTIONAL, */ + MSV1_0_SUPPLEMENTAL_CREDENTIAL* suppCreds = NULL; + WinPrAsn1Decoder suppCredsSeq = { 0 }; + + if (WinPrAsn1DecReadContextualSequence(&dec2, 1, &error, &suppCredsSeq)) + { + WinPrAsn1Decoder ntlmCredsSeq = { 0 }; + if (!WinPrAsn1DecReadSequence(&suppCredsSeq, &ntlmCredsSeq)) + return FALSE; + + RemoteGuardPackageCredType suppCredsType = { 0 }; + wStream ntlmPayload = { 0 }; + if (!nla_read_TSRemoteGuardPackageCred(nla, &ntlmCredsSeq, &suppCredsType, + &ntlmPayload)) + return FALSE; + + if (suppCredsType != RCG_TYPE_NTLM) + { + WLog_ERR(TAG, "supplementalCreds must be some NTLM creds"); + return FALSE; + } + + /* TODO: suppCreds = &ntlmCreds; and parse NTLM creds */ + } + else if (error) + { + WLog_ERR(TAG, "invalid supplementalCreds"); + return FALSE; + } + + freerdp_peer* peer = nla->rdpcontext->peer; + ret = IFCALLRESULT(TRUE, peer->RemoteCredentials, peer, &kerbLogon, suppCreds); + break; + } + default: + WLog_DBG(TAG, "TSCredentials type " PRIu32 " not supported for now", credType); + ret = FALSE; + break; + } + + return ret; +} + +/** + * Encode TSCredentials structure. + * @param nla A pointer to the NLA to use + * + * @return \b TRUE for success, \b FALSE otherwise + */ + +static BOOL nla_encode_ts_credentials(rdpNla* nla) +{ + BOOL ret = FALSE; + WinPrAsn1Encoder* enc = NULL; + size_t length = 0; + wStream s = { 0 }; + TsCredentialsType credType = TSCREDS_INVALID; + + WINPR_ASSERT(nla); + WINPR_ASSERT(nla->rdpcontext); + + rdpSettings* settings = nla->rdpcontext->settings; + WINPR_ASSERT(settings); + + if (settings->RemoteCredentialGuard) + credType = TSCREDS_REMOTEGUARD; + else if (settings->SmartcardLogon) + credType = TSCREDS_SMARTCARD; + else + credType = TSCREDS_USER_PASSWD; + + enc = WinPrAsn1Encoder_New(WINPR_ASN1_DER); + if (!enc) + return FALSE; + + /* TSCredentials */ + if (!WinPrAsn1EncSeqContainer(enc)) + goto out; + + /* credType [0] INTEGER */ + if (!WinPrAsn1EncContextualInteger(enc, 0, (WinPrAsn1_INTEGER)credType)) + goto out; + + /* credentials [1] OCTET STRING */ + if (!WinPrAsn1EncContextualOctetStringContainer(enc, 1)) + goto out; + + switch (credType) + { + case TSCREDS_SMARTCARD: + { + struct + { + WinPrAsn1_tagId tag; + size_t setting_id; + } cspData_fields[] = { { 1, FreeRDP_CardName }, + { 2, FreeRDP_ReaderName }, + { 3, FreeRDP_ContainerName }, + { 4, FreeRDP_CspName } }; + WinPrAsn1_OctetString octet_string = { 0 }; + + /* TSSmartCardCreds */ + if (!WinPrAsn1EncSeqContainer(enc)) + goto out; + + /* pin [0] OCTET STRING */ + size_t ss = 0; + octet_string.data = + (BYTE*)freerdp_settings_get_string_as_utf16(settings, FreeRDP_Password, &ss); + octet_string.len = ss * sizeof(WCHAR); + const BOOL res = WinPrAsn1EncContextualOctetString(enc, 0, &octet_string) > 0; + free(octet_string.data); + if (!res) + goto out; + + /* cspData [1] SEQUENCE */ + if (!WinPrAsn1EncContextualSeqContainer(enc, 1)) + goto out; + + /* keySpec [0] INTEGER */ + if (!WinPrAsn1EncContextualInteger( + enc, 0, freerdp_settings_get_uint32(settings, FreeRDP_KeySpec))) + goto out; + + for (size_t i = 0; i < ARRAYSIZE(cspData_fields); i++) + { + size_t len = 0; + + octet_string.data = (BYTE*)freerdp_settings_get_string_as_utf16( + settings, cspData_fields[i].setting_id, &len); + octet_string.len = len * sizeof(WCHAR); + if (octet_string.len) + { + const BOOL res2 = WinPrAsn1EncContextualOctetString(enc, cspData_fields[i].tag, + &octet_string) > 0; + free(octet_string.data); + if (!res2) + goto out; + } + } + + /* End cspData */ + if (!WinPrAsn1EncEndContainer(enc)) + goto out; + + /* End TSSmartCardCreds */ + if (!WinPrAsn1EncEndContainer(enc)) + goto out; + break; + } + case TSCREDS_USER_PASSWD: + { + WinPrAsn1_OctetString username = { 0 }; + WinPrAsn1_OctetString domain = { 0 }; + WinPrAsn1_OctetString password = { 0 }; + + /* TSPasswordCreds */ + if (!WinPrAsn1EncSeqContainer(enc)) + goto out; + + if (!settings->DisableCredentialsDelegation && nla->identity) + { + username.len = nla->identity->UserLength * sizeof(WCHAR); + username.data = (BYTE*)nla->identity->User; + + domain.len = nla->identity->DomainLength * sizeof(WCHAR); + domain.data = (BYTE*)nla->identity->Domain; + + password.len = nla->identity->PasswordLength * sizeof(WCHAR); + password.data = (BYTE*)nla->identity->Password; + } + + if (WinPrAsn1EncContextualOctetString(enc, 0, &domain) == 0) + goto out; + if (WinPrAsn1EncContextualOctetString(enc, 1, &username) == 0) + goto out; + if (WinPrAsn1EncContextualOctetString(enc, 2, &password) == 0) + goto out; + + /* End TSPasswordCreds */ + if (!WinPrAsn1EncEndContainer(enc)) + goto out; + break; + } + case TSCREDS_REMOTEGUARD: + default: + goto out; + } + + /* End credentials | End TSCredentials */ + if (!WinPrAsn1EncEndContainer(enc) || !WinPrAsn1EncEndContainer(enc)) + goto out; + + if (!WinPrAsn1EncStreamSize(enc, &length)) + goto out; + + if (!nla_sec_buffer_alloc(&nla->tsCredentials, length)) + { + WLog_ERR(TAG, "sspi_SecBufferAlloc failed!"); + goto out; + } + + Stream_StaticInit(&s, (BYTE*)nla->tsCredentials.pvBuffer, length); + + ret = WinPrAsn1EncToStream(enc, &s); + +out: + WinPrAsn1Encoder_Free(&enc); + return ret; +} + +static BOOL nla_encrypt_ts_credentials(rdpNla* nla) +{ + WINPR_ASSERT(nla); + + if (!nla_encode_ts_credentials(nla)) + return FALSE; + + sspi_SecBufferFree(&nla->authInfo); + if (!credssp_auth_encrypt(nla->auth, &nla->tsCredentials, &nla->authInfo, NULL, + nla->sendSeqNum++)) + return FALSE; + + return TRUE; +} + +static BOOL nla_decrypt_ts_credentials(rdpNla* nla) +{ + WINPR_ASSERT(nla); + + if (nla->authInfo.cbBuffer < 1) + { + WLog_ERR(TAG, "nla_decrypt_ts_credentials missing authInfo buffer"); + return FALSE; + } + + sspi_SecBufferFree(&nla->tsCredentials); + if (!credssp_auth_decrypt(nla->auth, &nla->authInfo, &nla->tsCredentials, nla->recvSeqNum++)) + return FALSE; + + if (!nla_read_ts_credentials(nla, &nla->tsCredentials)) + return FALSE; + + return TRUE; +} + +static BOOL nla_write_octet_string(WinPrAsn1Encoder* enc, const SecBuffer* buffer, + WinPrAsn1_tagId tagId, const char* msg) +{ + BOOL res = FALSE; + + WINPR_ASSERT(enc); + WINPR_ASSERT(buffer); + WINPR_ASSERT(msg); + + if (buffer->cbBuffer > 0) + { + size_t rc = 0; + WinPrAsn1_OctetString octet_string = { 0 }; + + WLog_DBG(TAG, " ----->> %s", msg); + octet_string.data = buffer->pvBuffer; + octet_string.len = buffer->cbBuffer; + rc = WinPrAsn1EncContextualOctetString(enc, tagId, &octet_string); + if (rc != 0) + res = TRUE; + } + + return res; +} + +static BOOL nla_write_octet_string_free(WinPrAsn1Encoder* enc, SecBuffer* buffer, + WinPrAsn1_tagId tagId, const char* msg) +{ + const BOOL rc = nla_write_octet_string(enc, buffer, tagId, msg); + sspi_SecBufferFree(buffer); + return rc; +} + +/** + * Send CredSSP message. + * + * @param nla A pointer to the NLA to use + * + * @return \b TRUE for success, \b FALSE otherwise + */ + +BOOL nla_send(rdpNla* nla) +{ + BOOL rc = FALSE; + wStream* s = NULL; + size_t length = 0; + WinPrAsn1Encoder* enc = NULL; + + WINPR_ASSERT(nla); + + enc = WinPrAsn1Encoder_New(WINPR_ASN1_DER); + if (!enc) + return FALSE; + + /* TSRequest */ + WLog_DBG(TAG, "----->> sending..."); + if (!WinPrAsn1EncSeqContainer(enc)) + goto fail; + + /* version [0] INTEGER */ + WLog_DBG(TAG, " ----->> protocol version %" PRIu32, nla->version); + if (!WinPrAsn1EncContextualInteger(enc, 0, nla->version)) + goto fail; + + /* negoTokens [1] SEQUENCE OF SEQUENCE */ + if (nla_get_state(nla) <= NLA_STATE_NEGO_TOKEN && credssp_auth_have_output_token(nla->auth)) + { + const SecBuffer* buffer = credssp_auth_get_output_buffer(nla->auth); + + if (!WinPrAsn1EncContextualSeqContainer(enc, 1) || !WinPrAsn1EncSeqContainer(enc)) + goto fail; + + /* negoToken [0] OCTET STRING */ + if (!nla_write_octet_string(enc, buffer, 0, "negoToken")) + goto fail; + + /* End negoTokens (SEQUENCE OF SEQUENCE) */ + if (!WinPrAsn1EncEndContainer(enc) || !WinPrAsn1EncEndContainer(enc)) + goto fail; + } + + /* authInfo [2] OCTET STRING */ + if (nla->authInfo.cbBuffer > 0) + { + if (!nla_write_octet_string_free(enc, &nla->authInfo, 2, "auth info")) + goto fail; + } + + /* pubKeyAuth [3] OCTET STRING */ + if (nla->pubKeyAuth.cbBuffer > 0) + { + if (!nla_write_octet_string_free(enc, &nla->pubKeyAuth, 3, "public key auth")) + goto fail; + } + + /* errorCode [4] INTEGER */ + if (nla->errorCode && nla->peerVersion >= 3 && nla->peerVersion != 5) + { + WLog_DBG(TAG, " ----->> error code %s 0x%08" PRIx32, NtStatus2Tag(nla->errorCode), + nla->errorCode); + if (!WinPrAsn1EncContextualInteger(enc, 4, nla->errorCode)) + goto fail; + } + + /* clientNonce [5] OCTET STRING */ + if (!nla->server && nla->ClientNonce.cbBuffer > 0) + { + if (!nla_write_octet_string(enc, &nla->ClientNonce, 5, "client nonce")) + goto fail; + } + + /* End TSRequest */ + if (!WinPrAsn1EncEndContainer(enc)) + goto fail; + + if (!WinPrAsn1EncStreamSize(enc, &length)) + goto fail; + + s = Stream_New(NULL, length); + if (!s) + goto fail; + + if (!WinPrAsn1EncToStream(enc, s)) + goto fail; + + WLog_DBG(TAG, "[%" PRIuz " bytes]", length); + if (transport_write(nla->transport, s) < 0) + goto fail; + rc = TRUE; + +fail: + Stream_Free(s, TRUE); + WinPrAsn1Encoder_Free(&enc); + return rc; +} + +static int nla_decode_ts_request(rdpNla* nla, wStream* s) +{ + WinPrAsn1Decoder dec = { 0 }; + WinPrAsn1Decoder dec2 = { 0 }; + BOOL error = FALSE; + WinPrAsn1_tagId tag = { 0 }; + WinPrAsn1_INTEGER val = { 0 }; + UINT32 version = 0; + + WINPR_ASSERT(nla); + WINPR_ASSERT(s); + + WinPrAsn1Decoder_Init(&dec, WINPR_ASN1_DER, s); + + WLog_DBG(TAG, "<<----- receiving..."); + + /* TSRequest */ + const size_t offset = WinPrAsn1DecReadSequence(&dec, &dec2); + if (offset == 0) + return -1; + dec = dec2; + + /* version [0] INTEGER */ + if (WinPrAsn1DecReadContextualInteger(&dec, 0, &error, &val) == 0) + return -1; + + if (!Stream_SafeSeek(s, offset)) + return -1; + + version = (UINT)val; + WLog_DBG(TAG, " <<----- protocol version %" PRIu32, version); + + if (nla->peerVersion == 0) + nla->peerVersion = version; + + /* if the peer suddenly changed its version - kick it */ + if (nla->peerVersion != version) + { + WLog_ERR(TAG, "CredSSP peer changed protocol version from %" PRIu32 " to %" PRIu32, + nla->peerVersion, version); + return -1; + } + + while (WinPrAsn1DecReadContextualTag(&dec, &tag, &dec2) != 0) + { + WinPrAsn1Decoder dec3 = { 0 }; + WinPrAsn1_OctetString octet_string = { 0 }; + + switch (tag) + { + case 1: + WLog_DBG(TAG, " <<----- nego token"); + /* negoTokens [1] SEQUENCE OF SEQUENCE */ + if ((WinPrAsn1DecReadSequence(&dec2, &dec3) == 0) || + (WinPrAsn1DecReadSequence(&dec3, &dec2) == 0)) + return -1; + /* negoToken [0] OCTET STRING */ + if ((WinPrAsn1DecReadContextualOctetString(&dec2, 0, &error, &octet_string, + FALSE) == 0) && + error) + return -1; + if (!nla_sec_buffer_alloc_from_data(&nla->negoToken, octet_string.data, 0, + octet_string.len)) + return -1; + break; + case 2: + WLog_DBG(TAG, " <<----- auth info"); + /* authInfo [2] OCTET STRING */ + if (WinPrAsn1DecReadOctetString(&dec2, &octet_string, FALSE) == 0) + return -1; + if (!nla_sec_buffer_alloc_from_data(&nla->authInfo, octet_string.data, 0, + octet_string.len)) + return -1; + break; + case 3: + WLog_DBG(TAG, " <<----- public key auth"); + /* pubKeyAuth [3] OCTET STRING */ + if (WinPrAsn1DecReadOctetString(&dec2, &octet_string, FALSE) == 0) + return -1; + if (!nla_sec_buffer_alloc_from_data(&nla->pubKeyAuth, octet_string.data, 0, + octet_string.len)) + return -1; + break; + case 4: + /* errorCode [4] INTEGER */ + if (WinPrAsn1DecReadInteger(&dec2, &val) == 0) + return -1; + nla->errorCode = (UINT)val; + WLog_DBG(TAG, " <<----- error code %s 0x%08" PRIx32, NtStatus2Tag(nla->errorCode), + nla->errorCode); + break; + case 5: + WLog_DBG(TAG, " <<----- client nonce"); + /* clientNonce [5] OCTET STRING */ + if (WinPrAsn1DecReadOctetString(&dec2, &octet_string, FALSE) == 0) + return -1; + if (!nla_sec_buffer_alloc_from_data(&nla->ClientNonce, octet_string.data, 0, + octet_string.len)) + return -1; + break; + default: + return -1; + } + } + + return 1; +} + +int nla_recv_pdu(rdpNla* nla, wStream* s) +{ + WINPR_ASSERT(nla); + WINPR_ASSERT(s); + + if (nla_get_state(nla) == NLA_STATE_EARLY_USER_AUTH) + { + UINT32 code = 0; + Stream_Read_UINT32(s, code); + if (code != AUTHZ_SUCCESS) + { + WLog_DBG(TAG, "Early User Auth active: FAILURE code 0x%08" PRIX32 "", code); + code = FREERDP_ERROR_AUTHENTICATION_FAILED; + freerdp_set_last_error_log(nla->rdpcontext, code); + return -1; + } + else + WLog_DBG(TAG, "Early User Auth active: SUCCESS"); + } + else + { + if (nla_decode_ts_request(nla, s) < 1) + return -1; + + if (nla->errorCode) + { + UINT32 code = 0; + + switch (nla->errorCode) + { + case STATUS_PASSWORD_MUST_CHANGE: + code = FREERDP_ERROR_CONNECT_PASSWORD_MUST_CHANGE; + break; + + case STATUS_PASSWORD_EXPIRED: + code = FREERDP_ERROR_CONNECT_PASSWORD_EXPIRED; + break; + + case STATUS_ACCOUNT_DISABLED: + code = FREERDP_ERROR_CONNECT_ACCOUNT_DISABLED; + break; + + case STATUS_LOGON_FAILURE: + code = FREERDP_ERROR_CONNECT_LOGON_FAILURE; + break; + + case STATUS_WRONG_PASSWORD: + code = FREERDP_ERROR_CONNECT_WRONG_PASSWORD; + break; + + case STATUS_ACCESS_DENIED: + code = FREERDP_ERROR_CONNECT_ACCESS_DENIED; + break; + + case STATUS_ACCOUNT_RESTRICTION: + code = FREERDP_ERROR_CONNECT_ACCOUNT_RESTRICTION; + break; + + case STATUS_ACCOUNT_LOCKED_OUT: + code = FREERDP_ERROR_CONNECT_ACCOUNT_LOCKED_OUT; + break; + + case STATUS_ACCOUNT_EXPIRED: + code = FREERDP_ERROR_CONNECT_ACCOUNT_EXPIRED; + break; + + case STATUS_LOGON_TYPE_NOT_GRANTED: + code = FREERDP_ERROR_CONNECT_LOGON_TYPE_NOT_GRANTED; + break; + + default: + WLog_ERR(TAG, "SPNEGO failed with NTSTATUS: %s [0x%08" PRIX32 "]", + NtStatus2Tag(nla->errorCode), nla->errorCode); + code = FREERDP_ERROR_AUTHENTICATION_FAILED; + break; + } + + freerdp_set_last_error_log(nla->rdpcontext, code); + return -1; + } + } + + return nla_client_recv(nla); +} + +int nla_server_recv(rdpNla* nla) +{ + int status = -1; + + WINPR_ASSERT(nla); + + wStream* s = nla_server_recv_stream(nla); + if (!s) + goto fail; + status = nla_decode_ts_request(nla, s); + +fail: + Stream_Free(s, TRUE); + return status; +} + +/** + * Create new CredSSP state machine. + * + * @param context A pointer to the rdp context to use + * @param transport A pointer to the transport to use + * + * @return new CredSSP state machine. + */ + +rdpNla* nla_new(rdpContext* context, rdpTransport* transport) +{ + WINPR_ASSERT(transport); + WINPR_ASSERT(context); + + rdpSettings* settings = context->settings; + WINPR_ASSERT(settings); + + rdpNla* nla = (rdpNla*)calloc(1, sizeof(rdpNla)); + + if (!nla) + return NULL; + + nla->rdpcontext = context; + nla->server = settings->ServerMode; + nla->transport = transport; + nla->sendSeqNum = 0; + nla->recvSeqNum = 0; + nla->version = 6; + nla->earlyUserAuth = FALSE; + + nla->identity = calloc(1, sizeof(SEC_WINNT_AUTH_IDENTITY)); + if (!nla->identity) + goto cleanup; + + nla->auth = credssp_auth_new(context); + if (!nla->auth) + goto cleanup; + + /* init to 0 or we end up freeing a bad pointer if the alloc fails */ + if (!nla_sec_buffer_alloc(&nla->ClientNonce, NonceLength)) + goto cleanup; + + /* generate random 32-byte nonce */ + if (winpr_RAND(nla->ClientNonce.pvBuffer, NonceLength) < 0) + goto cleanup; + + return nla; +cleanup: + WINPR_PRAGMA_DIAG_PUSH + WINPR_PRAGMA_DIAG_IGNORED_MISMATCHED_DEALLOC + nla_free(nla); + WINPR_PRAGMA_DIAG_POP + return NULL; +} + +/** + * Free CredSSP state machine. + * @param nla The NLA instance to free + */ + +void nla_free(rdpNla* nla) +{ + if (!nla) + return; + + smartcardCertInfo_Free(nla->smartcardCert); + nla_buffer_free(nla); + sspi_SecBufferFree(&nla->tsCredentials); + credssp_auth_free(nla->auth); + + sspi_FreeAuthIdentity(nla->identity); + free(nla->pkinitArgs); + free(nla->identity); + free(nla); +} + +SEC_WINNT_AUTH_IDENTITY* nla_get_identity(rdpNla* nla) +{ + if (!nla) + return NULL; + + return nla->identity; +} + +NLA_STATE nla_get_state(rdpNla* nla) +{ + if (!nla) + return NLA_STATE_FINAL; + + return nla->state; +} + +BOOL nla_set_state(rdpNla* nla, NLA_STATE state) +{ + if (!nla) + return FALSE; + + WLog_DBG(TAG, "-- %s\t--> %s", nla_get_state_str(nla->state), nla_get_state_str(state)); + nla->state = state; + return TRUE; +} + +BOOL nla_set_service_principal(rdpNla* nla, const char* service, const char* hostname) +{ + if (!credssp_auth_set_spn(nla->auth, service, hostname)) + return FALSE; + return TRUE; +} + +BOOL nla_impersonate(rdpNla* nla) +{ + return credssp_auth_impersonate(nla->auth); +} + +BOOL nla_revert_to_self(rdpNla* nla) +{ + return credssp_auth_revert_to_self(nla->auth); +} + +const char* nla_get_state_str(NLA_STATE state) +{ + switch (state) + { + case NLA_STATE_INITIAL: + return "NLA_STATE_INITIAL"; + case NLA_STATE_NEGO_TOKEN: + return "NLA_STATE_NEGO_TOKEN"; + case NLA_STATE_PUB_KEY_AUTH: + return "NLA_STATE_PUB_KEY_AUTH"; + case NLA_STATE_AUTH_INFO: + return "NLA_STATE_AUTH_INFO"; + case NLA_STATE_POST_NEGO: + return "NLA_STATE_POST_NEGO"; + case NLA_STATE_EARLY_USER_AUTH: + return "NLA_STATE_EARLY_USER_AUTH"; + case NLA_STATE_FINAL: + return "NLA_STATE_FINAL"; + default: + return "UNKNOWN"; + } +} + +DWORD nla_get_error(rdpNla* nla) +{ + if (!nla) + return ERROR_INTERNAL_ERROR; + return nla->errorCode; +} + +UINT32 nla_get_sspi_error(rdpNla* nla) +{ + WINPR_ASSERT(nla); + return credssp_auth_sspi_error(nla->auth); +} |