/* Unix SMB/CIFS implementation. Copyright (C) Stefan Metzmacher 2004 Copyright (C) Andrew Bartlett 2005 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #include "includes.h" #include "libnet/libnet.h" #include "libcli/auth/libcli_auth.h" #include "librpc/gen_ndr/ndr_samr_c.h" #include "source4/librpc/rpc/dcerpc.h" #include "auth/credentials/credentials.h" #include "libcli/smb/smb_constants.h" #include "librpc/rpc/dcerpc_samr.h" #include "source3/rpc_client/init_samr.h" #include "lib/param/loadparm.h" #include "lib/param/param.h" #include "lib/crypto/gnutls_helpers.h" #include #include static NTSTATUS libnet_ChangePassword_samr_aes(TALLOC_CTX *mem_ctx, struct dcerpc_binding_handle *h, struct lsa_String *server, struct lsa_String *account, const char *old_password, const char *new_password, const char **error_string) { #ifdef HAVE_GNUTLS_PBKDF2 struct samr_ChangePasswordUser4 r; uint8_t old_nt_key_data[16] = {0}; gnutls_datum_t old_nt_key = { .data = old_nt_key_data, .size = sizeof(old_nt_key_data), }; uint8_t cek_data[16] = {0}; DATA_BLOB cek = { .data = cek_data, .length = sizeof(cek_data), }; struct samr_EncryptedPasswordAES pwd_buf = { .cipher_len = 0 }; DATA_BLOB salt = { .data = pwd_buf.salt, .length = sizeof(pwd_buf.salt), }; gnutls_datum_t salt_datum = { .data = pwd_buf.salt, .size = sizeof(pwd_buf.salt), }; uint64_t pbkdf2_iterations = generate_random_u64_range(5000, 1000000); NTSTATUS status; int rc; E_md4hash(old_password, old_nt_key_data); generate_nonce_buffer(salt.data, salt.length); rc = gnutls_pbkdf2(GNUTLS_MAC_SHA512, &old_nt_key, &salt_datum, pbkdf2_iterations, cek.data, cek.length); BURN_DATA(old_nt_key_data); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); if (!NT_STATUS_IS_OK(status)) { goto done; } } status = init_samr_CryptPasswordAES(mem_ctx, new_password, &salt, &cek, &pwd_buf); data_blob_clear(&cek); if (!NT_STATUS_IS_OK(status)) { goto done; } pwd_buf.PBKDF2Iterations = pbkdf2_iterations; r.in.server = server; r.in.account = account; r.in.password = &pwd_buf; status = dcerpc_samr_ChangePasswordUser4_r(h, mem_ctx, &r); if (!NT_STATUS_IS_OK(status)) { goto done; } if (!NT_STATUS_IS_OK(r.out.result)) { status = r.out.result; *error_string = talloc_asprintf(mem_ctx, "samr_ChangePasswordUser4 for " "'%s\\%s' failed: %s", server->string, account->string, nt_errstr(status)); goto done; } done: BURN_DATA(pwd_buf); return status; #else /* HAVE_GNUTLS_PBKDF2 */ return NT_STATUS_NOT_IMPLEMENTED; #endif /* HAVE_GNUTLS_PBKDF2 */ } static NTSTATUS libnet_ChangePassword_samr_rc4(TALLOC_CTX *mem_ctx, struct dcerpc_binding_handle *h, struct lsa_String *server, struct lsa_String *account, const char *old_password, const char *new_password, const char **error_string) { struct samr_OemChangePasswordUser2 oe2; struct samr_ChangePasswordUser2 pw2; struct samr_ChangePasswordUser3 pw3; struct samr_CryptPassword nt_pass, lm_pass; uint8_t old_nt_hash[16], new_nt_hash[16]; uint8_t old_lm_hash[16], new_lm_hash[16]; struct samr_Password nt_verifier, lm_verifier; struct lsa_AsciiString a_server, a_account; gnutls_cipher_hd_t cipher_hnd = NULL; gnutls_datum_t nt_session_key = { .data = old_nt_hash, .size = sizeof(old_nt_hash), }; gnutls_datum_t lm_session_key = { .data = old_lm_hash, .size = sizeof(old_lm_hash), }; struct samr_DomInfo1 *dominfo = NULL; struct userPwdChangeFailureInformation *reject = NULL; NTSTATUS status; int rc; E_md4hash(old_password, old_nt_hash); E_md4hash(new_password, new_nt_hash); E_deshash(old_password, old_lm_hash); E_deshash(new_password, new_lm_hash); /* prepare samr_ChangePasswordUser3 */ encode_pw_buffer(lm_pass.data, new_password, STR_UNICODE); rc = gnutls_cipher_init(&cipher_hnd, GNUTLS_CIPHER_ARCFOUR_128, &nt_session_key, NULL); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); goto done; } rc = gnutls_cipher_encrypt(cipher_hnd, lm_pass.data, 516); gnutls_cipher_deinit(cipher_hnd); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); goto done; } rc = E_old_pw_hash(new_lm_hash, old_lm_hash, lm_verifier.hash); if (rc != 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_ACCESS_DISABLED_BY_POLICY_OTHER); goto done; } encode_pw_buffer(nt_pass.data, new_password, STR_UNICODE); rc = gnutls_cipher_init(&cipher_hnd, GNUTLS_CIPHER_ARCFOUR_128, &nt_session_key, NULL); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); goto done; } rc = gnutls_cipher_encrypt(cipher_hnd, nt_pass.data, 516); gnutls_cipher_deinit(cipher_hnd); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); goto done; } rc = E_old_pw_hash(new_nt_hash, old_nt_hash, nt_verifier.hash); if (rc != 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_ACCESS_DISABLED_BY_POLICY_OTHER); goto done; } pw3.in.server = server; pw3.in.account = account; pw3.in.nt_password = &nt_pass; pw3.in.nt_verifier = &nt_verifier; pw3.in.lm_change = 1; pw3.in.lm_password = &lm_pass; pw3.in.lm_verifier = &lm_verifier; pw3.in.password3 = NULL; pw3.out.dominfo = &dominfo; pw3.out.reject = &reject; /* 2. try samr_ChangePasswordUser3 */ status = dcerpc_samr_ChangePasswordUser3_r(h, mem_ctx, &pw3); if (!NT_STATUS_EQUAL(status, NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE)) { if (NT_STATUS_IS_OK(status) && !NT_STATUS_IS_OK(pw3.out.result)) { status = pw3.out.result; } if (!NT_STATUS_IS_OK(status)) { *error_string = talloc_asprintf( mem_ctx, "samr_ChangePasswordUser3 failed: %s", nt_errstr(status)); *error_string = talloc_asprintf(mem_ctx, "samr_ChangePasswordUser3 for " "'%s\\%s' failed: %s", server->string, account->string, nt_errstr(status)); } goto done; } /* prepare samr_ChangePasswordUser2 */ encode_pw_buffer(lm_pass.data, new_password, STR_ASCII | STR_TERMINATE); rc = gnutls_cipher_init(&cipher_hnd, GNUTLS_CIPHER_ARCFOUR_128, &lm_session_key, NULL); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); goto done; } rc = gnutls_cipher_encrypt(cipher_hnd, lm_pass.data, 516); gnutls_cipher_deinit(cipher_hnd); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); goto done; } rc = E_old_pw_hash(new_lm_hash, old_lm_hash, lm_verifier.hash); if (rc != 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_ACCESS_DISABLED_BY_POLICY_OTHER); goto done; } encode_pw_buffer(nt_pass.data, new_password, STR_UNICODE); rc = gnutls_cipher_init(&cipher_hnd, GNUTLS_CIPHER_ARCFOUR_128, &nt_session_key, NULL); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); goto done; } rc = gnutls_cipher_encrypt(cipher_hnd, nt_pass.data, 516); gnutls_cipher_deinit(cipher_hnd); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); goto done; } rc = E_old_pw_hash(new_nt_hash, old_nt_hash, nt_verifier.hash); if (rc != 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_ACCESS_DISABLED_BY_POLICY_OTHER); goto done; } pw2.in.server = server; pw2.in.account = account; pw2.in.nt_password = &nt_pass; pw2.in.nt_verifier = &nt_verifier; pw2.in.lm_change = 1; pw2.in.lm_password = &lm_pass; pw2.in.lm_verifier = &lm_verifier; /* 3. try samr_ChangePasswordUser2 */ status = dcerpc_samr_ChangePasswordUser2_r(h, mem_ctx, &pw2); if (!NT_STATUS_EQUAL(status, NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE)) { if (NT_STATUS_IS_OK(status) && !NT_STATUS_IS_OK(pw2.out.result)) { status = pw2.out.result; } if (!NT_STATUS_IS_OK(status)) { *error_string = talloc_asprintf(mem_ctx, "samr_ChangePasswordUser2 for " "'%s\\%s' failed: %s", server->string, account->string, nt_errstr(status)); } goto done; } /* prepare samr_OemChangePasswordUser2 */ a_server.string = server->string; a_account.string = account->string; encode_pw_buffer(lm_pass.data, new_password, STR_ASCII); rc = gnutls_cipher_init(&cipher_hnd, GNUTLS_CIPHER_ARCFOUR_128, &lm_session_key, NULL); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); goto done; } rc = gnutls_cipher_encrypt(cipher_hnd, lm_pass.data, 516); gnutls_cipher_deinit(cipher_hnd); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); goto done; } rc = E_old_pw_hash(new_lm_hash, old_lm_hash, lm_verifier.hash); if (rc != 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_ACCESS_DISABLED_BY_POLICY_OTHER); goto done; } oe2.in.server = &a_server; oe2.in.account = &a_account; oe2.in.password = &lm_pass; oe2.in.hash = &lm_verifier; /* 4. try samr_OemChangePasswordUser2 */ status = dcerpc_samr_OemChangePasswordUser2_r(h, mem_ctx, &oe2); if (!NT_STATUS_EQUAL(status, NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE)) { if (NT_STATUS_IS_OK(status) && !NT_STATUS_IS_OK(oe2.out.result)) { status = oe2.out.result; } if (!NT_STATUS_IS_OK(oe2.out.result)) { *error_string = talloc_asprintf(mem_ctx, "samr_OemChangePasswordUser2 " "for '%s\\%s' failed: %s", server->string, account->string, nt_errstr(status)); } goto done; } status = NT_STATUS_OK; done: return status; } /* * do a password change using DCERPC/SAMR calls * 1. connect to the SAMR pipe of users domain PDC (maybe a standalone server or workstation) * 2. try samr_ChangePasswordUser3 * 3. try samr_ChangePasswordUser2 * 4. try samr_OemChangePasswordUser2 */ static NTSTATUS libnet_ChangePassword_samr(struct libnet_context *ctx, TALLOC_CTX *mem_ctx, union libnet_ChangePassword *r) { NTSTATUS status; struct libnet_RpcConnect c; struct lsa_String server, account; ZERO_STRUCT(c); /* prepare connect to the SAMR pipe of the users domain PDC */ c.level = LIBNET_RPC_CONNECT_PDC; c.in.name = r->samr.in.domain_name; c.in.dcerpc_iface = &ndr_table_samr; c.in.dcerpc_flags = DCERPC_ANON_FALLBACK; /* 1. connect to the SAMR pipe of users domain PDC (maybe a standalone server or workstation) */ status = libnet_RpcConnect(ctx, mem_ctx, &c); if (!NT_STATUS_IS_OK(status)) { r->samr.out.error_string = talloc_asprintf(mem_ctx, "Connection to SAMR pipe of PDC of domain '%s' failed: %s", r->samr.in.domain_name, nt_errstr(status)); return status; } /* prepare password change for account */ server.string = talloc_asprintf(mem_ctx, "\\\\%s", dcerpc_server_name(c.out.dcerpc_pipe)); account.string = r->samr.in.account_name; status = libnet_ChangePassword_samr_aes( mem_ctx, c.out.dcerpc_pipe->binding_handle, &server, &account, r->samr.in.oldpassword, r->samr.in.newpassword, &(r->samr.out.error_string)); if (NT_STATUS_IS_OK(status)) { goto disconnect; } else if (NT_STATUS_EQUAL(status, NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE) || NT_STATUS_EQUAL(status, NT_STATUS_NOT_SUPPORTED) || NT_STATUS_EQUAL(status, NT_STATUS_NOT_IMPLEMENTED)) { /* * Don't fallback to RC4 based SAMR if weak crypto is not * allowed. */ if (lpcfg_weak_crypto(ctx->lp_ctx) == SAMBA_WEAK_CRYPTO_DISALLOWED) { goto disconnect; } } else { /* libnet_ChangePassword_samr_aes is implemented and failed */ goto disconnect; } status = libnet_ChangePassword_samr_rc4( mem_ctx, c.out.dcerpc_pipe->binding_handle, &server, &account, r->samr.in.oldpassword, r->samr.in.newpassword, &(r->samr.out.error_string)); if (!NT_STATUS_IS_OK(status)) { goto disconnect; } disconnect: /* close connection */ talloc_unlink(ctx, c.out.dcerpc_pipe); return status; } static NTSTATUS libnet_ChangePassword_generic(struct libnet_context *ctx, TALLOC_CTX *mem_ctx, union libnet_ChangePassword *r) { NTSTATUS status; union libnet_ChangePassword r2; r2.samr.level = LIBNET_CHANGE_PASSWORD_SAMR; r2.samr.in.account_name = r->generic.in.account_name; r2.samr.in.domain_name = r->generic.in.domain_name; r2.samr.in.oldpassword = r->generic.in.oldpassword; r2.samr.in.newpassword = r->generic.in.newpassword; status = libnet_ChangePassword(ctx, mem_ctx, &r2); r->generic.out.error_string = r2.samr.out.error_string; return status; } NTSTATUS libnet_ChangePassword(struct libnet_context *ctx, TALLOC_CTX *mem_ctx, union libnet_ChangePassword *r) { switch (r->generic.level) { case LIBNET_CHANGE_PASSWORD_GENERIC: return libnet_ChangePassword_generic(ctx, mem_ctx, r); case LIBNET_CHANGE_PASSWORD_SAMR: return libnet_ChangePassword_samr(ctx, mem_ctx, r); case LIBNET_CHANGE_PASSWORD_KRB5: return NT_STATUS_NOT_IMPLEMENTED; case LIBNET_CHANGE_PASSWORD_LDAP: return NT_STATUS_NOT_IMPLEMENTED; case LIBNET_CHANGE_PASSWORD_RAP: return NT_STATUS_NOT_IMPLEMENTED; } return NT_STATUS_INVALID_LEVEL; } static NTSTATUS libnet_SetPassword_samr_handle_26(struct libnet_context *ctx, TALLOC_CTX *mem_ctx, union libnet_SetPassword *r) { NTSTATUS status; struct samr_SetUserInfo2 sui; union samr_UserInfo u_info; DATA_BLOB session_key; if (r->samr_handle.in.info21) { return NT_STATUS_INVALID_PARAMETER_MIX; } /* prepare samr_SetUserInfo2 level 26 */ ZERO_STRUCT(u_info); u_info.info26.password_expired = 0; status = dcerpc_fetch_session_key(r->samr_handle.in.dcerpc_pipe, &session_key); if (!NT_STATUS_IS_OK(status)) { r->samr_handle.out.error_string = talloc_asprintf(mem_ctx, "dcerpc_fetch_session_key failed: %s", nt_errstr(status)); return status; } status = encode_rc4_passwd_buffer(r->samr_handle.in.newpassword, &session_key, &u_info.info26.password); if (!NT_STATUS_IS_OK(status)) { r->samr_handle.out.error_string = talloc_asprintf(mem_ctx, "encode_rc4_passwd_buffer failed: %s", nt_errstr(status)); return status; } sui.in.user_handle = r->samr_handle.in.user_handle; sui.in.info = &u_info; sui.in.level = 26; /* 7. try samr_SetUserInfo2 level 26 to set the password */ status = dcerpc_samr_SetUserInfo2_r(r->samr_handle.in.dcerpc_pipe->binding_handle, mem_ctx, &sui); /* check result of samr_SetUserInfo2 level 26 */ if (NT_STATUS_IS_OK(status) && !NT_STATUS_IS_OK(sui.out.result)) { status = sui.out.result; } if (!NT_STATUS_IS_OK(status)) { r->samr_handle.out.error_string = talloc_asprintf(mem_ctx, "SetUserInfo2 level 26 for [%s] failed: %s", r->samr_handle.in.account_name, nt_errstr(status)); } return status; } static NTSTATUS libnet_SetPassword_samr_handle_25(struct libnet_context *ctx, TALLOC_CTX *mem_ctx, union libnet_SetPassword *r) { NTSTATUS status; struct samr_SetUserInfo2 sui; union samr_UserInfo u_info; DATA_BLOB session_key; if (!r->samr_handle.in.info21) { return NT_STATUS_INVALID_PARAMETER_MIX; } /* prepare samr_SetUserInfo2 level 25 */ ZERO_STRUCT(u_info); u_info.info25.info = *r->samr_handle.in.info21; u_info.info25.info.fields_present |= SAMR_FIELD_NT_PASSWORD_PRESENT; status = dcerpc_fetch_session_key(r->samr_handle.in.dcerpc_pipe, &session_key); if (!NT_STATUS_IS_OK(status)) { r->samr_handle.out.error_string = talloc_asprintf(mem_ctx, "dcerpc_fetch_session_key failed: %s", nt_errstr(status)); return status; } status = encode_rc4_passwd_buffer(r->samr_handle.in.newpassword, &session_key, &u_info.info25.password); if (!NT_STATUS_IS_OK(status)) { r->samr_handle.out.error_string = talloc_asprintf(mem_ctx, "encode_rc4_passwd_buffer failed: %s", nt_errstr(status)); return status; } sui.in.user_handle = r->samr_handle.in.user_handle; sui.in.info = &u_info; sui.in.level = 25; /* 8. try samr_SetUserInfo2 level 25 to set the password */ status = dcerpc_samr_SetUserInfo2_r(r->samr_handle.in.dcerpc_pipe->binding_handle, mem_ctx, &sui); if (NT_STATUS_IS_OK(status) && !NT_STATUS_IS_OK(sui.out.result)) { status = sui.out.result; } if (!NT_STATUS_IS_OK(status)) { r->samr_handle.out.error_string = talloc_asprintf(mem_ctx, "SetUserInfo2 level 25 for [%s] failed: %s", r->samr_handle.in.account_name, nt_errstr(status)); } return status; } static NTSTATUS libnet_SetPassword_samr_handle_24(struct libnet_context *ctx, TALLOC_CTX *mem_ctx, union libnet_SetPassword *r) { NTSTATUS status; struct samr_SetUserInfo2 sui; union samr_UserInfo u_info; DATA_BLOB session_key; gnutls_cipher_hd_t cipher_hnd = NULL; gnutls_datum_t enc_session_key; int rc; if (r->samr_handle.in.info21) { return NT_STATUS_INVALID_PARAMETER_MIX; } /* prepare samr_SetUserInfo2 level 24 */ ZERO_STRUCT(u_info); encode_pw_buffer(u_info.info24.password.data, r->samr_handle.in.newpassword, STR_UNICODE); u_info.info24.password_expired = 0; status = dcerpc_fetch_session_key(r->samr_handle.in.dcerpc_pipe, &session_key); if (!NT_STATUS_IS_OK(status)) { r->samr_handle.out.error_string = talloc_asprintf(mem_ctx, "dcerpc_fetch_session_key failed: %s", nt_errstr(status)); return status; } enc_session_key = (gnutls_datum_t) { .data = session_key.data, .size = session_key.length, }; rc = gnutls_cipher_init(&cipher_hnd, GNUTLS_CIPHER_ARCFOUR_128, &enc_session_key, NULL); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); goto out; } rc = gnutls_cipher_encrypt(cipher_hnd, u_info.info24.password.data, 516); gnutls_cipher_deinit(cipher_hnd); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); goto out; } sui.in.user_handle = r->samr_handle.in.user_handle; sui.in.info = &u_info; sui.in.level = 24; /* 9. try samr_SetUserInfo2 level 24 to set the password */ status = dcerpc_samr_SetUserInfo2_r(r->samr_handle.in.dcerpc_pipe->binding_handle, mem_ctx, &sui); if (NT_STATUS_IS_OK(status) && !NT_STATUS_IS_OK(sui.out.result)) { status = sui.out.result; } if (!NT_STATUS_IS_OK(status)) { r->samr_handle.out.error_string = talloc_asprintf(mem_ctx, "SetUserInfo2 level 24 for [%s] failed: %s", r->samr_handle.in.account_name, nt_errstr(status)); } out: data_blob_clear(&session_key); return status; } static NTSTATUS libnet_SetPassword_samr_handle_23(struct libnet_context *ctx, TALLOC_CTX *mem_ctx, union libnet_SetPassword *r) { NTSTATUS status; struct samr_SetUserInfo2 sui; union samr_UserInfo u_info; DATA_BLOB session_key; gnutls_cipher_hd_t cipher_hnd = NULL; gnutls_datum_t _session_key; int rc; if (!r->samr_handle.in.info21) { return NT_STATUS_INVALID_PARAMETER_MIX; } /* prepare samr_SetUserInfo2 level 23 */ ZERO_STRUCT(u_info); u_info.info23.info = *r->samr_handle.in.info21; u_info.info23.info.fields_present |= SAMR_FIELD_NT_PASSWORD_PRESENT; encode_pw_buffer(u_info.info23.password.data, r->samr_handle.in.newpassword, STR_UNICODE); status = dcerpc_fetch_session_key(r->samr_handle.in.dcerpc_pipe, &session_key); if (!NT_STATUS_IS_OK(status)) { r->samr_handle.out.error_string = talloc_asprintf(mem_ctx, "dcerpc_fetch_session_key failed: %s", nt_errstr(status)); return status; } _session_key = (gnutls_datum_t) { .data = session_key.data, .size = session_key.length, }; rc = gnutls_cipher_init(&cipher_hnd, GNUTLS_CIPHER_ARCFOUR_128, &_session_key, NULL); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); goto out; } rc = gnutls_cipher_encrypt(cipher_hnd, u_info.info23.password.data, 516); data_blob_clear_free(&session_key); gnutls_cipher_deinit(cipher_hnd); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); goto out; } sui.in.user_handle = r->samr_handle.in.user_handle; sui.in.info = &u_info; sui.in.level = 23; /* 10. try samr_SetUserInfo2 level 23 to set the password */ status = dcerpc_samr_SetUserInfo2_r(r->samr_handle.in.dcerpc_pipe->binding_handle, mem_ctx, &sui); if (NT_STATUS_IS_OK(status) && !NT_STATUS_IS_OK(sui.out.result)) { status = sui.out.result; } if (!NT_STATUS_IS_OK(status)) { r->samr_handle.out.error_string = talloc_asprintf(mem_ctx, "SetUserInfo2 level 23 for [%s] failed: %s", r->samr_handle.in.account_name, nt_errstr(status)); } out: return status; } static NTSTATUS libnet_SetPassword_samr_handle_18(struct libnet_context *ctx, TALLOC_CTX *mem_ctx, union libnet_SetPassword *r) { NTSTATUS status; struct samr_SetUserInfo2 sui; union samr_UserInfo u_info; struct samr_Password ntpwd; DATA_BLOB ntpwd_in; DATA_BLOB ntpwd_out; DATA_BLOB session_key; int rc; if (r->samr_handle.in.info21) { return NT_STATUS_INVALID_PARAMETER_MIX; } /* prepare samr_SetUserInfo2 level 18 (nt_hash) */ ZERO_STRUCT(u_info); E_md4hash(r->samr_handle.in.newpassword, ntpwd.hash); ntpwd_in = data_blob_const(ntpwd.hash, sizeof(ntpwd.hash)); ntpwd_out = data_blob_const(u_info.info18.nt_pwd.hash, sizeof(u_info.info18.nt_pwd.hash)); u_info.info18.nt_pwd_active = 1; u_info.info18.password_expired = 0; status = dcerpc_fetch_session_key(r->samr_handle.in.dcerpc_pipe, &session_key); if (!NT_STATUS_IS_OK(status)) { r->samr_handle.out.error_string = talloc_asprintf(mem_ctx, "dcerpc_fetch_session_key failed: %s", nt_errstr(status)); return status; } rc = sess_crypt_blob(&ntpwd_out, &ntpwd_in, &session_key, SAMBA_GNUTLS_ENCRYPT); if (rc < 0) { status = gnutls_error_to_ntstatus(rc, NT_STATUS_CRYPTO_SYSTEM_INVALID); goto out; } sui.in.user_handle = r->samr_handle.in.user_handle; sui.in.info = &u_info; sui.in.level = 18; /* 9. try samr_SetUserInfo2 level 18 to set the password */ status = dcerpc_samr_SetUserInfo2_r(r->samr_handle.in.dcerpc_pipe->binding_handle, mem_ctx, &sui); if (NT_STATUS_IS_OK(status) && !NT_STATUS_IS_OK(sui.out.result)) { status = sui.out.result; } if (!NT_STATUS_IS_OK(status)) { r->samr_handle.out.error_string = talloc_asprintf(mem_ctx, "SetUserInfo2 level 18 for [%s] failed: %s", r->samr_handle.in.account_name, nt_errstr(status)); } out: data_blob_clear(&session_key); return status; } /* * 1. try samr_SetUserInfo2 level 26 to set the password * 2. try samr_SetUserInfo2 level 25 to set the password * 3. try samr_SetUserInfo2 level 24 to set the password * 4. try samr_SetUserInfo2 level 23 to set the password */ static NTSTATUS libnet_SetPassword_samr_handle(struct libnet_context *ctx, TALLOC_CTX *mem_ctx, union libnet_SetPassword *r) { NTSTATUS status; enum libnet_SetPassword_level levels[] = { LIBNET_SET_PASSWORD_SAMR_HANDLE_26, LIBNET_SET_PASSWORD_SAMR_HANDLE_25, LIBNET_SET_PASSWORD_SAMR_HANDLE_24, LIBNET_SET_PASSWORD_SAMR_HANDLE_23, }; unsigned int i; if (r->samr_handle.samr_level != 0) { r->generic.level = r->samr_handle.samr_level; return libnet_SetPassword(ctx, mem_ctx, r); } for (i=0; i < ARRAY_SIZE(levels); i++) { r->generic.level = levels[i]; status = libnet_SetPassword(ctx, mem_ctx, r); if (NT_STATUS_EQUAL(status, NT_STATUS_INVALID_INFO_CLASS) || NT_STATUS_EQUAL(status, NT_STATUS_INVALID_PARAMETER_MIX) || NT_STATUS_EQUAL(status, NT_STATUS_RPC_ENUM_VALUE_OUT_OF_RANGE)) { /* Try another password set mechanism */ continue; } break; } return status; } /* * set a password with DCERPC/SAMR calls * 1. connect to the SAMR pipe of users domain PDC (maybe a standalone server or workstation) * is it correct to contact the the pdc of the domain of the user who's password should be set? * 2. do a samr_Connect to get a policy handle * 3. do a samr_LookupDomain to get the domain sid * 4. do a samr_OpenDomain to get a domain handle * 5. do a samr_LookupNames to get the users rid * 6. do a samr_OpenUser to get a user handle * 7 call libnet_SetPassword_samr_handle to set the password */ static NTSTATUS libnet_SetPassword_samr(struct libnet_context *ctx, TALLOC_CTX *mem_ctx, union libnet_SetPassword *r) { NTSTATUS status; struct libnet_RpcConnect c; struct samr_Connect sc; struct policy_handle p_handle; struct samr_LookupDomain ld; struct dom_sid2 *sid = NULL; struct lsa_String d_name; struct samr_OpenDomain od; struct policy_handle d_handle; struct samr_LookupNames ln; struct samr_Ids rids, types; struct samr_OpenUser ou; struct policy_handle u_handle; union libnet_SetPassword r2; ZERO_STRUCT(c); /* prepare connect to the SAMR pipe of users domain PDC */ c.level = LIBNET_RPC_CONNECT_PDC; c.in.name = r->samr.in.domain_name; c.in.dcerpc_iface = &ndr_table_samr; /* 1. connect to the SAMR pipe of users domain PDC (maybe a standalone server or workstation) */ status = libnet_RpcConnect(ctx, mem_ctx, &c); if (!NT_STATUS_IS_OK(status)) { r->samr.out.error_string = talloc_asprintf(mem_ctx, "Connection to SAMR pipe of PDC of domain '%s' failed: %s", r->samr.in.domain_name, nt_errstr(status)); return status; } /* prepare samr_Connect */ ZERO_STRUCT(p_handle); sc.in.system_name = NULL; sc.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED; sc.out.connect_handle = &p_handle; /* 2. do a samr_Connect to get a policy handle */ status = dcerpc_samr_Connect_r(c.out.dcerpc_pipe->binding_handle, mem_ctx, &sc); if (NT_STATUS_IS_OK(status) && !NT_STATUS_IS_OK(sc.out.result)) { status = sc.out.result; } if (!NT_STATUS_IS_OK(status)) { r->samr.out.error_string = talloc_asprintf(mem_ctx, "samr_Connect failed: %s", nt_errstr(status)); goto disconnect; } /* prepare samr_LookupDomain */ d_name.string = r->samr.in.domain_name; ld.in.connect_handle = &p_handle; ld.in.domain_name = &d_name; ld.out.sid = &sid; /* 3. do a samr_LookupDomain to get the domain sid */ status = dcerpc_samr_LookupDomain_r(c.out.dcerpc_pipe->binding_handle, mem_ctx, &ld); if (NT_STATUS_IS_OK(status) && !NT_STATUS_IS_OK(ld.out.result)) { status = ld.out.result; } if (!NT_STATUS_IS_OK(status)) { r->samr.out.error_string = talloc_asprintf(mem_ctx, "samr_LookupDomain for [%s] failed: %s", r->samr.in.domain_name, nt_errstr(status)); goto disconnect; } /* prepare samr_OpenDomain */ ZERO_STRUCT(d_handle); od.in.connect_handle = &p_handle; od.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED; od.in.sid = *ld.out.sid; od.out.domain_handle = &d_handle; /* 4. do a samr_OpenDomain to get a domain handle */ status = dcerpc_samr_OpenDomain_r(c.out.dcerpc_pipe->binding_handle, mem_ctx, &od); if (NT_STATUS_IS_OK(status) && !NT_STATUS_IS_OK(od.out.result)) { status = od.out.result; } if (!NT_STATUS_IS_OK(status)) { r->samr.out.error_string = talloc_asprintf(mem_ctx, "samr_OpenDomain for [%s] failed: %s", r->samr.in.domain_name, nt_errstr(status)); goto disconnect; } /* prepare samr_LookupNames */ ln.in.domain_handle = &d_handle; ln.in.num_names = 1; ln.in.names = talloc_array(mem_ctx, struct lsa_String, 1); ln.out.rids = &rids; ln.out.types = &types; if (!ln.in.names) { r->samr.out.error_string = "Out of Memory"; return NT_STATUS_NO_MEMORY; } ln.in.names[0].string = r->samr.in.account_name; /* 5. do a samr_LookupNames to get the users rid */ status = dcerpc_samr_LookupNames_r(c.out.dcerpc_pipe->binding_handle, mem_ctx, &ln); if (NT_STATUS_IS_OK(status) && !NT_STATUS_IS_OK(ln.out.result)) { status = ln.out.result; } if (!NT_STATUS_IS_OK(status)) { r->samr.out.error_string = talloc_asprintf(mem_ctx, "samr_LookupNames for [%s] failed: %s", r->samr.in.account_name, nt_errstr(status)); goto disconnect; } /* check if we got one RID for the user */ if (ln.out.rids->count != 1) { r->samr.out.error_string = talloc_asprintf(mem_ctx, "samr_LookupNames for [%s] returns %d RIDs", r->samr.in.account_name, ln.out.rids->count); status = NT_STATUS_INVALID_NETWORK_RESPONSE; goto disconnect; } if (ln.out.types->count != 1) { r->samr.out.error_string = talloc_asprintf(mem_ctx, "samr_LookupNames for [%s] returns %d RID TYPEs", r->samr.in.account_name, ln.out.types->count); status = NT_STATUS_INVALID_NETWORK_RESPONSE; goto disconnect; } /* prepare samr_OpenUser */ ZERO_STRUCT(u_handle); ou.in.domain_handle = &d_handle; ou.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED; ou.in.rid = ln.out.rids->ids[0]; ou.out.user_handle = &u_handle; /* 6. do a samr_OpenUser to get a user handle */ status = dcerpc_samr_OpenUser_r(c.out.dcerpc_pipe->binding_handle, mem_ctx, &ou); if (NT_STATUS_IS_OK(status) && !NT_STATUS_IS_OK(ou.out.result)) { status = ou.out.result; } if (!NT_STATUS_IS_OK(status)) { r->samr.out.error_string = talloc_asprintf(mem_ctx, "samr_OpenUser for [%s] failed: %s", r->samr.in.account_name, nt_errstr(status)); goto disconnect; } ZERO_STRUCT(r2); r2.samr_handle.level = LIBNET_SET_PASSWORD_SAMR_HANDLE; r2.samr_handle.samr_level = r->samr.samr_level; r2.samr_handle.in.account_name = r->samr.in.account_name; r2.samr_handle.in.newpassword = r->samr.in.newpassword; r2.samr_handle.in.user_handle = &u_handle; r2.samr_handle.in.dcerpc_pipe = c.out.dcerpc_pipe; r2.samr_handle.in.info21 = NULL; status = libnet_SetPassword(ctx, mem_ctx, &r2); r->generic.out.error_string = r2.samr_handle.out.error_string; disconnect: /* close connection */ talloc_unlink(ctx, c.out.dcerpc_pipe); return status; } static NTSTATUS libnet_SetPassword_generic(struct libnet_context *ctx, TALLOC_CTX *mem_ctx, union libnet_SetPassword *r) { NTSTATUS status; union libnet_SetPassword r2; ZERO_STRUCT(r2); r2.samr.level = LIBNET_SET_PASSWORD_SAMR; r2.samr.samr_level = r->generic.samr_level; r2.samr.in.account_name = r->generic.in.account_name; r2.samr.in.domain_name = r->generic.in.domain_name; r2.samr.in.newpassword = r->generic.in.newpassword; r->generic.out.error_string = "Unknown Error"; status = libnet_SetPassword(ctx, mem_ctx, &r2); r->generic.out.error_string = r2.samr.out.error_string; return status; } NTSTATUS libnet_SetPassword(struct libnet_context *ctx, TALLOC_CTX *mem_ctx, union libnet_SetPassword *r) { enum smb_encryption_setting encryption_state = cli_credentials_get_smb_encryption(ctx->cred); NTSTATUS status = NT_STATUS_INVALID_LEVEL; switch (r->generic.level) { case LIBNET_SET_PASSWORD_GENERIC: status = libnet_SetPassword_generic(ctx, mem_ctx, r); break; case LIBNET_SET_PASSWORD_SAMR: status = libnet_SetPassword_samr(ctx, mem_ctx, r); break; case LIBNET_SET_PASSWORD_SAMR_HANDLE: status = libnet_SetPassword_samr_handle(ctx, mem_ctx, r); break; case LIBNET_SET_PASSWORD_SAMR_HANDLE_26: if (encryption_state == SMB_ENCRYPTION_REQUIRED) { GNUTLS_FIPS140_SET_LAX_MODE(); } status = libnet_SetPassword_samr_handle_26(ctx, mem_ctx, r); break; case LIBNET_SET_PASSWORD_SAMR_HANDLE_25: if (encryption_state == SMB_ENCRYPTION_REQUIRED) { GNUTLS_FIPS140_SET_LAX_MODE(); } status = libnet_SetPassword_samr_handle_25(ctx, mem_ctx, r); break; case LIBNET_SET_PASSWORD_SAMR_HANDLE_24: if (encryption_state == SMB_ENCRYPTION_REQUIRED) { GNUTLS_FIPS140_SET_LAX_MODE(); } status = libnet_SetPassword_samr_handle_24(ctx, mem_ctx, r); break; case LIBNET_SET_PASSWORD_SAMR_HANDLE_23: if (encryption_state == SMB_ENCRYPTION_REQUIRED) { GNUTLS_FIPS140_SET_LAX_MODE(); } status = libnet_SetPassword_samr_handle_23(ctx, mem_ctx, r); break; case LIBNET_SET_PASSWORD_SAMR_HANDLE_18: if (encryption_state == SMB_ENCRYPTION_REQUIRED) { GNUTLS_FIPS140_SET_LAX_MODE(); } status = libnet_SetPassword_samr_handle_18(ctx, mem_ctx, r); break; case LIBNET_SET_PASSWORD_KRB5: status = NT_STATUS_NOT_IMPLEMENTED; break; case LIBNET_SET_PASSWORD_LDAP: status = NT_STATUS_NOT_IMPLEMENTED; break; case LIBNET_SET_PASSWORD_RAP: status = NT_STATUS_NOT_IMPLEMENTED; break; } GNUTLS_FIPS140_SET_STRICT_MODE(); return status; }