Skip to content

Commit

Permalink
gssapi: SPNEGO does not reset NTLM RC4 state (#509)
Browse files Browse the repository at this point in the history
  • Loading branch information
lhoward authored and nicowilliams committed Jan 7, 2019
1 parent 9750f2d commit 83d2951
Show file tree
Hide file tree
Showing 12 changed files with 132 additions and 23 deletions.
1 change: 1 addition & 0 deletions lib/gssapi/Makefile.am
Expand Up @@ -202,6 +202,7 @@ ntlmsrc = \
ntlm/process_context_token.c \
ntlm/release_cred.c \
ntlm/release_name.c \
ntlm/set_sec_context_option.c \
ntlm/kdc.c

$(srcdir)/ntlm/ntlm-private.h: $(ntlmsrc)
Expand Down
2 changes: 2 additions & 0 deletions lib/gssapi/NTMakefile
Expand Up @@ -218,6 +218,7 @@ ntlmsrc = \
ntlm/process_context_token.c \
ntlm/release_cred.c \
ntlm/release_name.c \
ntlm/set_sec_context_option.c \
ntlm/kdc.c

$(OBJ)\ntlm\ntlm-private.h: $(ntlmsrc)
Expand Down Expand Up @@ -442,6 +443,7 @@ libgssapi_OBJs = \
$(OBJ)\ntlm/process_context_token.obj \
$(OBJ)\ntlm/release_cred.obj \
$(OBJ)\ntlm/release_name.obj \
$(OBJ)\ntlm/set_sec_context_option.obj \
$(OBJ)\ntlm/kdc.obj \
$(OBJ)\gkrb5_err.obj \
$(spnego_files:.x=.obj) \
Expand Down
3 changes: 3 additions & 0 deletions lib/gssapi/gssapi/gssapi_oid.h
Expand Up @@ -148,6 +148,9 @@ extern GSSAPI_LIB_VARIABLE gss_OID_desc __gss_spnego_mechanism_oid_desc;
extern GSSAPI_LIB_VARIABLE gss_OID_desc __gss_c_peer_has_updated_spnego_oid_desc;
#define GSS_C_PEER_HAS_UPDATED_SPNEGO (&__gss_c_peer_has_updated_spnego_oid_desc)

extern GSSAPI_LIB_VARIABLE gss_OID_desc __gss_c_ntlm_reset_crypto_oid_desc;
#define GSS_C_NTLM_RESET_CRYPTO (&__gss_c_ntlm_reset_crypto_oid_desc)

/*
* OID mappings with name and short description and and slightly longer description
*/
Expand Down
4 changes: 4 additions & 0 deletions lib/gssapi/mech/gss_oid.c
Expand Up @@ -136,6 +136,9 @@ gss_OID_desc GSSAPI_LIB_VARIABLE __gss_spnego_mechanism_oid_desc = { 6, rk_UNCON
/* GSS_C_PEER_HAS_UPDATED_SPNEGO - 1.3.6.1.4.1.5322.19.5 */
gss_OID_desc GSSAPI_LIB_VARIABLE __gss_c_peer_has_updated_spnego_oid_desc = { 9, rk_UNCONST("\x2b\x06\x01\x04\x01\xa9\x4a\x13\x05") };

/* GSS_C_NTLM_RESET_CRYPTO - 1.3.6.1.4.1.7165.655.1.3 */
gss_OID_desc GSSAPI_LIB_VARIABLE __gss_c_ntlm_reset_crypto_oid_desc = { 11, rk_UNCONST("\x2b\x06\x01\x04\x01\xb7\x7d\x85\x0f\x01\x03") };

/* GSS_C_MA_MECH_CONCRETE - 1.3.6.1.5.5.13.1 */
gss_OID_desc GSSAPI_LIB_VARIABLE __gss_c_ma_mech_concrete_oid_desc = { 7, rk_UNCONST("\x2b\x06\x01\x05\x05\x0d\x01") };

Expand Down Expand Up @@ -304,6 +307,7 @@ gss_OID _gss_ot_internal[] = {
&__gss_ntlm_mechanism_oid_desc,
&__gss_spnego_mechanism_oid_desc,
&__gss_c_peer_has_updated_spnego_oid_desc,
&__gss_c_ntlm_reset_crypto_oid_desc,
&__gss_c_ma_mech_concrete_oid_desc,
&__gss_c_ma_mech_pseudo_oid_desc,
&__gss_c_ma_mech_composite_oid_desc,
Expand Down
23 changes: 1 addition & 22 deletions lib/gssapi/ntlm/accept_sec_context.c
Expand Up @@ -237,28 +237,7 @@ _gss_ntlm_accept_sec_context
return GSS_S_FAILURE;
}

if (session.length != 0) {

ctx->status |= STATUS_SESSIONKEY;

if (ctx->flags & NTLM_NEG_NTLM2_SESSION) {
_gss_ntlm_set_key(&ctx->u.v2.send, 1,
(ctx->flags & NTLM_NEG_KEYEX),
ctx->sessionkey.data,
ctx->sessionkey.length);
_gss_ntlm_set_key(&ctx->u.v2.recv, 0,
(ctx->flags & NTLM_NEG_KEYEX),
ctx->sessionkey.data,
ctx->sessionkey.length);
} else {
RC4_set_key(&ctx->u.v1.crypto_send.key,
ctx->sessionkey.length,
ctx->sessionkey.data);
RC4_set_key(&ctx->u.v1.crypto_recv.key,
ctx->sessionkey.length,
ctx->sessionkey.data);
}
}
_gss_ntlm_set_keys(ctx);

if (mech_type)
*mech_type = GSS_NTLM_MECHANISM;
Expand Down
31 changes: 31 additions & 0 deletions lib/gssapi/ntlm/crypto.c
Expand Up @@ -115,6 +115,37 @@ _gss_ntlm_set_key(struct ntlmv2_key *key, int acceptor, int sealsign,
key->signsealkey = &key->sealkey;
}

/*
* Set (or reset) keys
*/

void
_gss_ntlm_set_keys(ntlm_ctx ctx)
{
if (ctx->sessionkey.length == 0)
return;

ctx->status |= STATUS_SESSIONKEY;

if (ctx->flags & NTLM_NEG_NTLM2_SESSION) {
_gss_ntlm_set_key(&ctx->u.v2.send, 1,
(ctx->flags & NTLM_NEG_KEYEX),
ctx->sessionkey.data,
ctx->sessionkey.length);
_gss_ntlm_set_key(&ctx->u.v2.recv, 0,
(ctx->flags & NTLM_NEG_KEYEX),
ctx->sessionkey.data,
ctx->sessionkey.length);
} else {
RC4_set_key(&ctx->u.v1.crypto_send.key,
ctx->sessionkey.length,
ctx->sessionkey.data);
RC4_set_key(&ctx->u.v1.crypto_recv.key,
ctx->sessionkey.length,
ctx->sessionkey.data);
}
}

/*
*
*/
Expand Down
2 changes: 1 addition & 1 deletion lib/gssapi/ntlm/external.c
Expand Up @@ -96,7 +96,7 @@ static gssapi_mech_interface_desc ntlm_mech = {
_gss_ntlm_duplicate_name,
_gss_ntlm_inquire_sec_context_by_oid,
NULL,
NULL,
_gss_ntlm_set_sec_context_option,
NULL,
NULL,
NULL,
Expand Down
61 changes: 61 additions & 0 deletions lib/gssapi/ntlm/set_sec_context_option.c
@@ -0,0 +1,61 @@
/*
* Copyright (c) 2006 Kungliga Tekniska Högskolan
* (Royal Institute of Technology, Stockholm, Sweden).
* All rights reserved.
*
* Portions Copyright (c) 2009 Apple Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* 3. Neither the name of the Institute nor the names of its contributors
* may be used to endorse or promote products derived from this software
* without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/

#include "ntlm.h"

OM_uint32 GSSAPI_CALLCONV
_gss_ntlm_set_sec_context_option(OM_uint32 *minor_status,
gss_ctx_id_t *context_handle,
const gss_OID object,
const gss_buffer_t value)
{
ntlm_ctx ctx;

if (context_handle == NULL)
return GSS_S_UNAVAILABLE;

*minor_status = 0;

ctx = (ntlm_ctx)*context_handle;
if (ctx == NULL)
return GSS_S_NO_CONTEXT;

if (gss_oid_equal(object, GSS_C_NTLM_RESET_CRYPTO)) {
/* OM_uint32 verify = *((OM_uint32 *)value->value); */
_gss_ntlm_set_keys(ctx);
return GSS_S_COMPLETE;
} else
return GSS_S_UNAVAILABLE;
}
2 changes: 2 additions & 0 deletions lib/gssapi/oid.txt
Expand Up @@ -64,6 +64,8 @@ oid base GSS_SPNEGO_MECHANISM 1.3.6.1.5.5.2
# /* From Luke Howard */

oid base GSS_C_PEER_HAS_UPDATED_SPNEGO 1.3.6.1.4.1.5322.19.5
oid base GSS_C_NTLM_RESET_CRYPTO 1.3.6.1.4.1.7165.655.1.3


#/*
# * OID mappings with name and short description and and slightly longer description
Expand Down
4 changes: 4 additions & 0 deletions lib/gssapi/spnego/accept_sec_context.c
Expand Up @@ -236,6 +236,10 @@ send_accept (OM_uint32 *minor_status,
0,
mech_buf,
&mech_mic_buf);
if (ret == GSS_S_COMPLETE &&
gss_oid_equal(context_handle->negotiated_mech_type,
GSS_NTLM_MECHANISM))
_gss_spnego_ntlm_reset_crypto(minor_status, context_handle, 0);
if (ret == GSS_S_COMPLETE) {
ALLOC(nt.u.negTokenResp.mechListMIC, 1);
if (nt.u.negTokenResp.mechListMIC == NULL) {
Expand Down
16 changes: 16 additions & 0 deletions lib/gssapi/spnego/compat.c
Expand Up @@ -315,3 +315,19 @@ _gss_spnego_indicate_mechtypelist (OM_uint32 *minor_status,

return ret;
}

OM_uint32
_gss_spnego_ntlm_reset_crypto(OM_uint32 *minor_status,
gssspnego_ctx ctx,
OM_uint32 verify)
{
gss_buffer_desc value;

value.length = sizeof(verify);
value.value = &verify;

return gss_set_sec_context_option(minor_status,
&ctx->negotiated_ctx_id,
GSS_C_NTLM_RESET_CRYPTO,
&value);
}
6 changes: 6 additions & 0 deletions lib/gssapi/spnego/init_sec_context.c
Expand Up @@ -136,6 +136,9 @@ spnego_reply_internal(OM_uint32 *minor_status,
0,
mech_buf,
&mic_buf);
if (ret == GSS_S_COMPLETE &&
gss_oid_equal(context_handle->negotiated_mech_type, GSS_NTLM_MECHANISM))
_gss_spnego_ntlm_reset_crypto(minor_status, context_handle, 0);
if (ret == GSS_S_COMPLETE) {
ALLOC(nt.u.negTokenResp.mechListMIC, 1);
if (nt.u.negTokenResp.mechListMIC == NULL) {
Expand Down Expand Up @@ -580,6 +583,9 @@ spnego_reply
&mech_buf,
&mic_buf,
NULL);
if (ret == GSS_S_COMPLETE &&
gss_oid_equal(ctx->negotiated_mech_type, GSS_NTLM_MECHANISM))
_gss_spnego_ntlm_reset_crypto(minor_status, ctx, 1);
if (ret) {
HEIMDAL_MUTEX_unlock(&ctx->ctx_id_mutex);
free(mech_buf.value);
Expand Down

0 comments on commit 83d2951

Please sign in to comment.