/*
Unix SMB/CIFS implementation.
client file operations
Copyright (C) Andrew Tridgell 1994-1998
Copyright (C) Jeremy Allison 2001-2002
Copyright (C) James Myers 2003
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see .
*/
#include "includes.h"
#include "libcli/smb/smb_common.h"
#include "system/filesys.h"
#include "lib/param/loadparm.h"
#include "lib/param/param.h"
#include "libcli/smb/smb2_negotiate_context.h"
const char *smb_protocol_types_string(enum protocol_types protocol)
{
switch (protocol) {
case PROTOCOL_DEFAULT:
return "DEFAULT";
case PROTOCOL_NONE:
return "NONE";
case PROTOCOL_CORE:
return "CORE";
case PROTOCOL_COREPLUS:
return "COREPLUS";
case PROTOCOL_LANMAN1:
return "LANMAN1";
case PROTOCOL_LANMAN2:
return "LANMAN2";
case PROTOCOL_NT1:
return "NT1";
case PROTOCOL_SMB2_02:
return "SMB2_02";
case PROTOCOL_SMB2_10:
return "SMB2_10";
case PROTOCOL_SMB3_00:
return "SMB3_00";
case PROTOCOL_SMB3_02:
return "SMB3_02";
case PROTOCOL_SMB3_11:
return "SMB3_11";
}
return "Invalid protocol_types value";
}
/**
Return a string representing a CIFS attribute for a file.
**/
char *attrib_string(TALLOC_CTX *mem_ctx, uint32_t attrib)
{
size_t i, len;
static const struct {
char c;
uint16_t attr;
} attr_strs[] = {
{'V', FILE_ATTRIBUTE_VOLUME},
{'D', FILE_ATTRIBUTE_DIRECTORY},
{'A', FILE_ATTRIBUTE_ARCHIVE},
{'H', FILE_ATTRIBUTE_HIDDEN},
{'S', FILE_ATTRIBUTE_SYSTEM},
{'N', FILE_ATTRIBUTE_NORMAL},
{'R', FILE_ATTRIBUTE_READONLY},
{'d', FILE_ATTRIBUTE_DEVICE},
{'t', FILE_ATTRIBUTE_TEMPORARY},
{'s', FILE_ATTRIBUTE_SPARSE},
{'r', FILE_ATTRIBUTE_REPARSE_POINT},
{'c', FILE_ATTRIBUTE_COMPRESSED},
{'o', FILE_ATTRIBUTE_OFFLINE},
{'n', FILE_ATTRIBUTE_NONINDEXED},
{'e', FILE_ATTRIBUTE_ENCRYPTED}
};
char *ret;
ret = talloc_array(mem_ctx, char, ARRAY_SIZE(attr_strs)+1);
if (!ret) {
return NULL;
}
for (len=i=0; i bufsize) || (offset + length > bufsize)) {
/* overflow */
return true;
}
return false;
}
/***********************************************************
Common function for pushing stings, used by smb_bytes_push_str()
and trans_bytes_push_str(). Only difference is the align_odd
parameter setting.
***********************************************************/
static uint8_t *internal_bytes_push_str(uint8_t *buf, bool ucs2,
const char *str, size_t str_len,
bool align_odd,
size_t *pconverted_size)
{
TALLOC_CTX *frame = talloc_stackframe();
size_t buflen;
char *converted;
size_t converted_size;
/*
* This check prevents us from
* (re)alloc buf on a NULL TALLOC_CTX.
*/
if (buf == NULL) {
TALLOC_FREE(frame);
return NULL;
}
buflen = talloc_get_size(buf);
if (ucs2 &&
((align_odd && (buflen % 2 == 0)) ||
(!align_odd && (buflen % 2 == 1)))) {
/*
* We're pushing into an SMB buffer, align odd
*/
buf = talloc_realloc(NULL, buf, uint8_t, buflen + 1);
if (buf == NULL) {
TALLOC_FREE(frame);
return NULL;
}
buf[buflen] = '\0';
buflen += 1;
}
if (!convert_string_talloc(frame, CH_UNIX,
ucs2 ? CH_UTF16LE : CH_DOS,
str, str_len, &converted,
&converted_size)) {
TALLOC_FREE(frame);
return NULL;
}
buf = talloc_realloc(NULL, buf, uint8_t,
buflen + converted_size);
if (buf == NULL) {
TALLOC_FREE(frame);
return NULL;
}
memcpy(buf + buflen, converted, converted_size);
TALLOC_FREE(converted);
if (pconverted_size) {
*pconverted_size = converted_size;
}
TALLOC_FREE(frame);
return buf;
}
/***********************************************************
Push a string into an SMB buffer, with odd byte alignment
if it's a UCS2 string.
***********************************************************/
uint8_t *smb_bytes_push_str(uint8_t *buf, bool ucs2,
const char *str, size_t str_len,
size_t *pconverted_size)
{
return internal_bytes_push_str(buf, ucs2, str, str_len,
true, pconverted_size);
}
uint8_t *smb_bytes_push_bytes(uint8_t *buf, uint8_t prefix,
const uint8_t *bytes, size_t num_bytes)
{
size_t buflen;
/*
* This check prevents us from
* (re)alloc buf on a NULL TALLOC_CTX.
*/
if (buf == NULL) {
return NULL;
}
buflen = talloc_get_size(buf);
buf = talloc_realloc(NULL, buf, uint8_t,
buflen + 1 + num_bytes);
if (buf == NULL) {
return NULL;
}
buf[buflen] = prefix;
memcpy(&buf[buflen+1], bytes, num_bytes);
return buf;
}
/***********************************************************
Same as smb_bytes_push_str(), but without the odd byte
align for ucs2 (we're pushing into a param or data block).
static for now, although this will probably change when
other modules use async trans calls.
***********************************************************/
uint8_t *trans2_bytes_push_str(uint8_t *buf, bool ucs2,
const char *str, size_t str_len,
size_t *pconverted_size)
{
return internal_bytes_push_str(buf, ucs2, str, str_len,
false, pconverted_size);
}
uint8_t *trans2_bytes_push_bytes(uint8_t *buf,
const uint8_t *bytes, size_t num_bytes)
{
size_t buflen;
if (buf == NULL) {
return NULL;
}
buflen = talloc_get_size(buf);
buf = talloc_realloc(NULL, buf, uint8_t,
buflen + num_bytes);
if (buf == NULL) {
return NULL;
}
memcpy(&buf[buflen], bytes, num_bytes);
return buf;
}
static NTSTATUS internal_bytes_pull_str(TALLOC_CTX *mem_ctx, char **_str,
bool ucs2, bool align_odd,
const uint8_t *buf, size_t buf_len,
const uint8_t *position,
size_t *p_consumed)
{
size_t pad = 0;
size_t offset;
char *str = NULL;
size_t str_len = 0;
bool ok;
*_str = NULL;
if (p_consumed != NULL) {
*p_consumed = 0;
}
if (position < buf) {
return NT_STATUS_INTERNAL_ERROR;
}
offset = PTR_DIFF(position, buf);
if (offset > buf_len) {
return NT_STATUS_BUFFER_TOO_SMALL;
}
if (ucs2 &&
((align_odd && (offset % 2 == 0)) ||
(!align_odd && (offset % 2 == 1)))) {
pad += 1;
offset += 1;
}
if (offset > buf_len) {
return NT_STATUS_BUFFER_TOO_SMALL;
}
buf_len -= offset;
buf += offset;
if (ucs2) {
buf_len = utf16_len_n(buf, buf_len);
} else {
size_t tmp = strnlen((const char *)buf, buf_len);
if (tmp < buf_len) {
tmp += 1;
}
buf_len = tmp;
}
ok = convert_string_talloc(mem_ctx,
ucs2 ? CH_UTF16LE : CH_DOS,
CH_UNIX,
buf, buf_len,
&str, &str_len);
if (!ok) {
return map_nt_error_from_unix_common(errno);
}
if (p_consumed != NULL) {
*p_consumed = buf_len + pad;
}
*_str = str;
return NT_STATUS_OK;
}
NTSTATUS smb_bytes_pull_str(TALLOC_CTX *mem_ctx, char **_str, bool ucs2,
const uint8_t *buf, size_t buf_len,
const uint8_t *position,
size_t *_consumed)
{
return internal_bytes_pull_str(mem_ctx, _str, ucs2, true,
buf, buf_len, position, _consumed);
}
/**
* @brief Translate SMB signing settings as string to an enum.
*
* @param[in] str The string to translate.
*
* @return A corresponding enum @smb_signing_setting tranlated from the string.
*/
enum smb_signing_setting smb_signing_setting_translate(const char *str)
{
enum smb_signing_setting signing_state = SMB_SIGNING_REQUIRED;
int32_t val = lpcfg_parse_enum_vals("client signing", str);
if (val != INT32_MIN) {
signing_state = val;
}
return signing_state;
}
/**
* @brief Translate SMB encryption settings as string to an enum.
*
* @param[in] str The string to translate.
*
* @return A corresponding enum @smb_encryption_setting tranlated from the
* string.
*/
enum smb_encryption_setting smb_encryption_setting_translate(const char *str)
{
enum smb_encryption_setting encryption_state = SMB_ENCRYPTION_REQUIRED;
int32_t val = lpcfg_parse_enum_vals("client smb encrypt", str);
if (val != INT32_MIN) {
encryption_state = val;
}
return encryption_state;
}
static const struct enum_list enum_smb3_signing_algorithms[] = {
{SMB2_SIGNING_AES128_GMAC, "AES-128-GMAC"},
{SMB2_SIGNING_AES128_CMAC, "AES-128-CMAC"},
{SMB2_SIGNING_HMAC_SHA256, "HMAC-SHA256"},
{-1, NULL}
};
const char *smb3_signing_algorithm_name(uint16_t algo)
{
size_t i;
for (i = 0; i < ARRAY_SIZE(enum_smb3_signing_algorithms); i++) {
if (enum_smb3_signing_algorithms[i].value != algo) {
continue;
}
return enum_smb3_signing_algorithms[i].name;
}
return NULL;
}
static const struct enum_list enum_smb3_encryption_algorithms[] = {
{SMB2_ENCRYPTION_AES128_GCM, "AES-128-GCM"},
{SMB2_ENCRYPTION_AES128_CCM, "AES-128-CCM"},
{SMB2_ENCRYPTION_AES256_GCM, "AES-256-GCM"},
{SMB2_ENCRYPTION_AES256_CCM, "AES-256-CCM"},
{-1, NULL}
};
const char *smb3_encryption_algorithm_name(uint16_t algo)
{
size_t i;
for (i = 0; i < ARRAY_SIZE(enum_smb3_encryption_algorithms); i++) {
if (enum_smb3_encryption_algorithms[i].value != algo) {
continue;
}
return enum_smb3_encryption_algorithms[i].name;
}
return NULL;
}
static int32_t parse_enum_val(const struct enum_list *e,
const char *param_name,
const char *param_value)
{
struct parm_struct parm = {
.label = param_name,
.type = P_LIST,
.p_class = P_GLOBAL,
.enum_list = e,
};
int32_t ret = INT32_MIN;
bool ok;
ok = lp_set_enum_parm(&parm, param_value, &ret);
if (!ok) {
return INT32_MIN;
}
return ret;
}
struct smb311_capabilities smb311_capabilities_parse(const char *role,
const char * const *signing_algos,
const char * const *encryption_algos)
{
struct smb311_capabilities c = {
.signing = {
.num_algos = 0,
},
.encryption = {
.num_algos = 0,
},
};
char sign_param[64] = { 0, };
char enc_param[64] = { 0, };
size_t ai;
snprintf(sign_param, sizeof(sign_param),
"%s smb3 signing algorithms", role);
snprintf(enc_param, sizeof(enc_param),
"%s smb3 encryption algorithms", role);
for (ai = 0; signing_algos != NULL && signing_algos[ai] != NULL; ai++) {
const char *algoname = signing_algos[ai];
int32_t v32;
uint16_t algo;
size_t di;
bool ignore = false;
if (c.signing.num_algos >= SMB3_ENCRYTION_CAPABILITIES_MAX_ALGOS) {
DBG_ERR("WARNING: Ignoring trailing value '%s' for parameter '%s'\n",
algoname, sign_param);
continue;
}
v32 = parse_enum_val(enum_smb3_signing_algorithms,
sign_param, algoname);
if (v32 == INT32_MAX) {
continue;
}
algo = v32;
for (di = 0; di < c.signing.num_algos; di++) {
if (algo != c.signing.algos[di]) {
continue;
}
ignore = true;
break;
}
if (ignore) {
DBG_ERR("WARNING: Ignoring duplicate value '%s' for parameter '%s'\n",
algoname, sign_param);
continue;
}
c.signing.algos[c.signing.num_algos] = algo;
c.signing.num_algos += 1;
}
for (ai = 0; encryption_algos != NULL && encryption_algos[ai] != NULL; ai++) {
const char *algoname = encryption_algos[ai];
int32_t v32;
uint16_t algo;
size_t di;
bool ignore = false;
if (c.encryption.num_algos >= SMB3_ENCRYTION_CAPABILITIES_MAX_ALGOS) {
DBG_ERR("WARNING: Ignoring trailing value '%s' for parameter '%s'\n",
algoname, enc_param);
continue;
}
v32 = parse_enum_val(enum_smb3_encryption_algorithms,
enc_param, algoname);
if (v32 == INT32_MAX) {
continue;
}
algo = v32;
for (di = 0; di < c.encryption.num_algos; di++) {
if (algo != c.encryption.algos[di]) {
continue;
}
ignore = true;
break;
}
if (ignore) {
DBG_ERR("WARNING: Ignoring duplicate value '%s' for parameter '%s'\n",
algoname, enc_param);
continue;
}
c.encryption.algos[c.encryption.num_algos] = algo;
c.encryption.num_algos += 1;
}
return c;
}
NTSTATUS smb311_capabilities_check(const struct smb311_capabilities *c,
const char *debug_prefix,
int debug_lvl,
NTSTATUS error_status,
const char *role,
enum protocol_types protocol,
uint16_t sign_algo,
uint16_t cipher_algo)
{
const struct smb3_signing_capabilities *sign_algos =
&c->signing;
const struct smb3_encryption_capabilities *ciphers =
&c->encryption;
bool found_signing = false;
bool found_encryption = false;
size_t i;
for (i = 0; i < sign_algos->num_algos; i++) {
if (sign_algo == sign_algos->algos[i]) {
/*
* We found a match
*/
found_signing = true;
break;
}
}
for (i = 0; i < ciphers->num_algos; i++) {
if (cipher_algo == SMB2_ENCRYPTION_NONE) {
/*
* encryption not supported, we'll error out later
*/
found_encryption = true;
break;
}
if (cipher_algo == ciphers->algos[i]) {
/*
* We found a match
*/
found_encryption = true;
break;
}
}
if (!found_signing) {
/*
* We negotiated a signing algo we don't allow,
* most likely for SMB < 3.1.1
*/
DEBUG(debug_lvl,("%s: "
"SMB3 signing algorithm[%u][%s] on dialect[%s] "
"not allowed by '%s smb3 signing algorithms' - %s.\n",
debug_prefix,
sign_algo,
smb3_signing_algorithm_name(sign_algo),
smb_protocol_types_string(protocol),
role,
nt_errstr(error_status)));
return error_status;
}
if (!found_encryption) {
/*
* We negotiated a cipher we don't allow,
* most likely for SMB 3.0 and 3.0.2
*/
DEBUG(debug_lvl,("%s: "
"SMB3 encryption algorithm[%u][%s] on dialect[%s] "
"not allowed by '%s smb3 encryption algorithms' - %s.\n",
debug_prefix,
cipher_algo,
smb3_encryption_algorithm_name(cipher_algo),
smb_protocol_types_string(protocol),
role,
nt_errstr(error_status)));
return error_status;
}
return NT_STATUS_OK;
}