Re: [PATCH] NTLM auth and sign - Use appropriate server challenge

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 27 Oct 2010 15:20:36 -0500
shirishpargaonkar@xxxxxxxxx wrote:

> From: Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx>
> 
> 
> Need to have cryptkey or server challenge in smb connection
> (struct TCP_Server_Info) for ntlm and ntlmv2 auth types for which
> cryptkey (Encryption Key) is supplied just once in Negotiate Protocol
> response during an smb connection setup for all the smb sessions over
> that smb connection.
> 
> For ntlmssp, cryptkey or server challenge is provided for every
> smb session in type 2 packet of ntlmssp negotiation, the cryptkey
> provided during Negotiation Protocol response before smb connection
> does not count.
> 
> Rename cryptKey to cryptkey and related changes.
> 
> 
> Signed-off-by: Shirish Pargaonkar <shirishpargaonkar@xxxxxxxxx>
> ---
>  fs/cifs/cifsencrypt.c |   10 +++++++---
>  fs/cifs/cifsglob.h    |    3 ++-
>  fs/cifs/cifssmb.c     |    4 ++--
>  fs/cifs/connect.c     |    4 ++--
>  fs/cifs/sess.c        |   12 ++++++++----
>  5 files changed, 21 insertions(+), 12 deletions(-)
> 
> diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c
> index 17d603a..ef95a27 100644
> --- a/fs/cifs/cifsencrypt.c
> +++ b/fs/cifs/cifsencrypt.c
> @@ -249,7 +249,7 @@ int setup_ntlm_response(struct cifsSesInfo *ses)
>  	}
>  	ses->auth_key.len = temp_len;
>  
> -	SMBNTencrypt(ses->password, ses->cryptKey,
> +	SMBNTencrypt(ses->password, ses->server->cryptkey,
>  			ses->auth_key.response + CIFS_SESS_KEY_SIZE);
>  
>  	E_md4hash(ses->password, temp_key);
> @@ -537,8 +537,12 @@ CalcNTLMv2_response(const struct cifsSesInfo *ses)
>  		return rc;
>  	}
>  
> -	memcpy(ses->auth_key.response + offset,
> -		ses->cryptKey, CIFS_SERVER_CHALLENGE_SIZE);
> +	if (ses->server->secType == RawNTLMSSP)
> +		memcpy(ses->auth_key.response + offset,
> +			ses->cryptkey, CIFS_SERVER_CHALLENGE_SIZE);
> +	else
> +		memcpy(ses->auth_key.response + offset,
> +			ses->server->cryptkey, CIFS_SERVER_CHALLENGE_SIZE);
>  	crypto_shash_update(&ses->server->secmech.sdeschmacmd5->shash,
>  		ses->auth_key.response + offset, ses->auth_key.len - offset);
>  
> diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h
> index 67d6a22..b736951 100644
> --- a/fs/cifs/cifsglob.h
> +++ b/fs/cifs/cifsglob.h
> @@ -196,6 +196,7 @@ struct TCP_Server_Info {
>  	int capabilities; /* allow selective disabling of caps by smb sess */
>  	int timeAdj;  /* Adjust for difference in server time zone in sec */
>  	__u16 CurrentMid;         /* multiplex id - rotating counter */
> +	char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlm, ntlmv2 etc */
>  	/* 16th byte of RFC1001 workstation name is always null */
>  	char workstation_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL];
>  	__u32 sequence_number; /* needed for CIFS PDU signature */
> @@ -240,7 +241,7 @@ struct cifsSesInfo {
>  	char userName[MAX_USERNAME_SIZE + 1];
>  	char *domainName;
>  	char *password;
> -	char cryptKey[CIFS_CRYPTO_KEY_SIZE];
> +	char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlmssp */
>  	struct session_key auth_key;
>  	char ntlmv2_hash[16];
>  	unsigned int tilen; /* length of the target info blob */
> diff --git a/fs/cifs/cifssmb.c b/fs/cifs/cifssmb.c
> index e98f1f3..2f2632b 100644
> --- a/fs/cifs/cifssmb.c
> +++ b/fs/cifs/cifssmb.c
> @@ -503,7 +503,7 @@ CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses)
>  
>  		if (rsp->EncryptionKeyLength ==
>  				cpu_to_le16(CIFS_CRYPTO_KEY_SIZE)) {
> -			memcpy(ses->cryptKey, rsp->EncryptionKey,
> +			memcpy(ses->server->cryptkey, rsp->EncryptionKey,
>  				CIFS_CRYPTO_KEY_SIZE);
>  		} else if (server->secMode & SECMODE_PW_ENCRYPT) {
>  			rc = -EIO; /* need cryptkey unless plain text */
> @@ -574,7 +574,7 @@ CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses)
>  	server->timeAdj = (int)(__s16)le16_to_cpu(pSMBr->ServerTimeZone);
>  	server->timeAdj *= 60;
>  	if (pSMBr->EncryptionKeyLength == CIFS_CRYPTO_KEY_SIZE) {
> -		memcpy(ses->cryptKey, pSMBr->u.EncryptionKey,
> +		memcpy(ses->server->cryptkey, pSMBr->u.EncryptionKey,
>  		       CIFS_CRYPTO_KEY_SIZE);
>  	} else if ((pSMBr->hdr.Flags2 & SMBFLG2_EXT_SEC)
>  			&& (pSMBr->EncryptionKeyLength == 0)) {
> diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
> index 469c3dd..4d8004c 100644
> --- a/fs/cifs/connect.c
> +++ b/fs/cifs/connect.c
> @@ -3002,13 +3002,13 @@ CIFSTCon(unsigned int xid, struct cifsSesInfo *ses,
>  #ifdef CONFIG_CIFS_WEAK_PW_HASH
>  		if ((global_secflags & CIFSSEC_MAY_LANMAN) &&
>  		    (ses->server->secType == LANMAN))
> -			calc_lanman_hash(tcon->password, ses->cryptKey,
> +			calc_lanman_hash(tcon->password, ses->server->cryptkey,
>  					 ses->server->secMode &
>  					    SECMODE_PW_ENCRYPT ? true : false,
>  					 bcc_ptr);
>  		else
>  #endif /* CIFS_WEAK_PW_HASH */
> -		SMBNTencrypt(tcon->password, ses->cryptKey, bcc_ptr);
> +		SMBNTencrypt(tcon->password, ses->server->cryptkey, bcc_ptr);
>  
>  		bcc_ptr += CIFS_SESS_KEY_SIZE;
>  		if (ses->capabilities & CAP_UNICODE) {
> diff --git a/fs/cifs/sess.c b/fs/cifs/sess.c
> index e0515a6..f74c5a8 100644
> --- a/fs/cifs/sess.c
> +++ b/fs/cifs/sess.c
> @@ -399,7 +399,7 @@ static int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len,
>  		return -EINVAL;
>  	}
>  
> -	memcpy(ses->cryptKey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE);
> +	memcpy(ses->cryptkey, pblob->Challenge, CIFS_CRYPTO_KEY_SIZE);
>  	/* BB we could decode pblob->NegotiateFlags; some may be useful */
>  	/* In particular we can examine sign flags */
>  	/* BB spec says that if AvId field of MsvAvTimestamp is populated then
> @@ -667,10 +667,14 @@ ssetup_ntlmssp_authenticate:
>  		/* no capabilities flags in old lanman negotiation */
>  
>  		pSMB->old_req.PasswordLength = cpu_to_le16(CIFS_SESS_KEY_SIZE);
> -		/* BB calculate hash with password */
> -		/* and copy into bcc */
>  
> -		calc_lanman_hash(ses->password, ses->cryptKey,
> +		/* Calculate hash with password and copy into bcc_ptr.
> +		 * Encryption Key (stored as in cryptkey) gets used if the
> +		 * security mode bit in Negottiate Protocol response states
> +		 * to use challenge/response method (i.e. Password bit is 1).
> +		 */
> +
> +		calc_lanman_hash(ses->password, ses->server->cryptkey,
>  				 ses->server->secMode & SECMODE_PW_ENCRYPT ?
>  					true : false, lnm_session_key);
>  

Ack on this patch, assuming that it's a prerequisite for the later
cleanup patch.

Acked-by: Jeff Layton <jlayton@xxxxxxxxxx>
--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux