summaryrefslogtreecommitdiff
path: root/source4/smb_server/negprot.c
diff options
context:
space:
mode:
authorAndrew Bartlett <abartlet@samba.org>2004-08-11 18:09:40 +0000
committerGerald (Jerry) Carter <jerry@samba.org>2007-10-10 12:57:51 -0500
commit1c9216f36cc451156d6c65f0e971ce48f05da3e5 (patch)
treee86bb93c78f168110f7e81dac4069213cfc74917 /source4/smb_server/negprot.c
parent86d4ec7212bcebd460cc52a24d3833939e4746bc (diff)
downloadsamba-1c9216f36cc451156d6c65f0e971ce48f05da3e5.tar.gz
samba-1c9216f36cc451156d6c65f0e971ce48f05da3e5.tar.bz2
samba-1c9216f36cc451156d6c65f0e971ce48f05da3e5.zip
r1731: Add server-side SPNEGO support to Samba (disabled, until SMB signing
is reworked). Andrew Bartlett (This used to be commit 73ee549b8c54e93556ff0105941996e0d4de8303)
Diffstat (limited to 'source4/smb_server/negprot.c')
-rw-r--r--source4/smb_server/negprot.c100
1 files changed, 45 insertions, 55 deletions
diff --git a/source4/smb_server/negprot.c b/source4/smb_server/negprot.c
index c9c775e62f..9e8a8f1f2c 100644
--- a/source4/smb_server/negprot.c
+++ b/source4/smb_server/negprot.c
@@ -171,54 +171,9 @@ static void reply_lanman2(struct smbsrv_request *req, uint16_t choice)
req_push_str(req, NULL, lp_workgroup(), -1, STR_TERMINATE);
- req_send_reply(req);
-}
-
-#if 0
-/****************************************************************************
- Generate the spnego negprot reply blob. Return the number of bytes used.
-****************************************************************************/
-static DATA_BLOB negprot_spnego(struct smbsrv_connection *smb_conn)
-{
- DATA_BLOB blob;
- uint8_t guid[16];
- const char *OIDs_krb5[] = {OID_KERBEROS5,
- OID_KERBEROS5_OLD,
- OID_NTLMSSP,
- NULL};
- const char *OIDs_plain[] = {OID_NTLMSSP, NULL};
- char *principal;
-
- smb_conn->negotiate.spnego_negotiated = True;
-
- memset(guid, 0, 16);
- safe_strcpy((char *)guid, lp_netbios_name(), 16);
- strlower((char *)guid);
-
-#if 0
- /* strangely enough, NT does not send the single OID NTLMSSP when
- not a ADS member, it sends no OIDs at all
-
- we can't do this until we teach our sesssion setup parser to know
- about raw NTLMSSP (clients send no ASN.1 wrapping if we do this)
- */
- if (lp_security() != SEC_ADS) {
- memcpy(p, guid, 16);
- return 16;
- }
-#endif
- if (lp_security() != SEC_ADS) {
- blob = spnego_gen_negTokenInit(guid, OIDs_plain, "NONE");
- } else {
- asprintf(&principal, "%s$@%s", guid, lp_realm());
- blob = spnego_gen_negTokenInit(guid, OIDs_krb5, principal);
- free(principal);
- }
-
- return blob;
+ req_send_reply(req);
}
-#endif
/****************************************************************************
Reply for the nt protocol.
@@ -243,13 +198,12 @@ static void reply_nt1(struct smbsrv_request *req, uint16_t choice)
/* do spnego in user level security if the client
supports it and we can do encrypted passwords */
- if (req->smb_conn->negotiate.encrypted_passwords &&
+ if (0 && req->smb_conn->negotiate.encrypted_passwords &&
(lp_security() != SEC_SHARE) &&
lp_use_spnego() &&
(req->flags2 & FLAGS2_EXTENDED_SECURITY)) {
-/* REWRITE negotiate_spnego = True;
+ negotiate_spnego = True;
capabilities |= CAP_EXTENDED_SECURITY;
-*/
}
if (lp_unix_extensions()) {
@@ -335,15 +289,51 @@ static void reply_nt1(struct smbsrv_request *req, uint16_t choice)
req_push_str(req, NULL, lp_netbios_name(), -1, STR_UNICODE|STR_TERMINATE|STR_NOALIGN);
DEBUG(3,("not using SPNEGO\n"));
} else {
-#if 0
- DATA_BLOB blob = negprot_spnego(req->smb_conn);
+ struct gensec_security *gensec_security;
+ DATA_BLOB null_data_blob = data_blob(NULL, 0);
+ DATA_BLOB blob;
+ NTSTATUS nt_status = gensec_server_start(&gensec_security);
+
+ if (req->smb_conn->negotiate.auth_context) {
+ smbsrv_terminate_connection(req->smb_conn, "reply_nt1: is this a secondary negprot? auth_context is non-NULL!\n");
+ return;
+ }
+
+ req->smb_conn->negotiate.auth_context = NULL;
+
+ if (!NT_STATUS_IS_OK(nt_status)) {
+ DEBUG(0, ("Failed to start GENSEC: %s\n", nt_errstr(nt_status)));
+ smbsrv_terminate_connection(req->smb_conn, "Failed to start GENSEC\n");
+ return;
+ }
+
+ nt_status = gensec_start_mech_by_oid(gensec_security, OID_SPNEGO);
+
+ if (!NT_STATUS_IS_OK(nt_status)) {
+ DEBUG(0, ("Failed to start SPNEGO: %s\n", nt_errstr(nt_status)));
+ smbsrv_terminate_connection(req->smb_conn, "Failed to start SPNEGO\n");
+ return;
+ }
+
+ nt_status = gensec_update(gensec_security, req->mem_ctx, null_data_blob, &blob);
+
+ if (!NT_STATUS_IS_OK(nt_status) && !NT_STATUS_EQUAL(nt_status, NT_STATUS_MORE_PROCESSING_REQUIRED)) {
+ DEBUG(0, ("Failed to get SPNEGO to give us the first token: %s\n", nt_errstr(nt_status)));
+ smbsrv_terminate_connection(req->smb_conn, "Failed to start SPNEGO - no first token\n");
+ return;
+ }
+
+ req->smb_conn->negotiate.spnego_negotiated = True;
+
+ req_grow_data(req, blob.length + 16);
+ /* a NOT very random guid */
+ memset(req->out.ptr, '\0', 16);
+ req->out.ptr += 16;
- req_grow_data(req, blob.length);
memcpy(req->out.ptr, blob.data, blob.length);
+ SCVAL(req->out.vwv+1, VWV(16), blob.length + 16);
+ req->out.ptr += blob.length;
DEBUG(3,("using SPNEGO\n"));
-#else
- smbsrv_terminate_connection(req->smb_conn, "no SPNEGO please");
-#endif
}
req_send_reply_nosign(req);