WindowsXP-SP1/termsrv/winsta/server/regnw.c
2020-09-30 16:53:49 +02:00

735 lines
20 KiB
C

/*************************************************************************
*
* nw.c
*
* Netware security support
*
* Copyright Microsoft Corporation, 1998
*
*
*************************************************************************/
/*
* Includes
*/
#include "precomp.h"
#pragma hdrstop
#include <ntlsa.h>
#include <rpc.h>
#if DBG
ULONG
DbgPrint(
PCH Format,
...
);
#define DBGPRINT(x) DbgPrint x
#if DBGTRACE
#define TRACE0(x) DbgPrint x
#define TRACE1(x) DbgPrint x
#else
#define TRACE0(x)
#define TRACE1(x)
#endif
#else
#define DBGPRINT(x)
#define TRACE0(x)
#define TRACE1(x)
#endif
/*
* This is the prefix for the secret object name.
*/
#define CITRIX_NW_SECRET_NAME L"CTX_NW_INFO_"
/*=============================================================================
== Public functions
=============================================================================*/
/*=============================================================================
== Functions Used
=============================================================================*/
NTSTATUS CreateSecretInLsa(
PWCHAR pSecretName,
PWCHAR pSecretData
);
NTSTATUS
QuerySecretInLsa(
PWCHAR pSecretName,
PWCHAR pSecretData,
DWORD ByteCount
);
BOOL
IsCallerSystem( VOID );
BOOL
IsCallerAdmin( VOID );
BOOL
TestUserForAdmin( VOID );
NTSTATUS
IsZeroterminateStringA(
PBYTE pString,
DWORD dwLength
);
NTSTATUS
IsZeroterminateStringW(
PWCHAR pwString,
DWORD dwLength
) ;
/*=============================================================================
== Global data
=============================================================================*/
/*******************************************************************************
*
* RpcServerNWLogonSetAdmin (UNICODE)
*
* Creates or updates the specified server's NWLogon Domain Administrator
* UserID and Password in the SAM secret objects of the specified server.
*
* The caller must be ADMIN.
*
* ENTRY:
* pServerName (input)
* Server to store info for. This server is typically a domain controller.
*
* pNWLogon (input)
* Pointer to a NWLOGONADMIN structure containing specified server's
* domain admin and password.
*
* EXIT:
* ERROR_SUCCESS - no error
* ERROR_INSUFFICIENT_BUFFER - pUserConfig buffer too small
* otherwise: the error code
*
******************************************************************************/
BOOLEAN
RpcServerNWLogonSetAdmin(
HANDLE hServer,
DWORD *pResult,
PWCHAR pServerName,
DWORD ServerNameSize,
PNWLOGONADMIN pNWLogon,
DWORD ByteCount
)
{
DWORD Size;
DWORD Result;
PWCHAR pDomain;
UINT LocalFlag;
PWCHAR pSecretName;
RPC_STATUS RpcStatus;
WCHAR UserPass[ USERNAME_LENGTH + PASSWORD_LENGTH + DOMAIN_LENGTH + 3 ];
// Do minimal buffer validation
if (pNWLogon == NULL ) {
*pResult = STATUS_INVALID_USER_BUFFER;
return FALSE;
}
if( pServerName == NULL ) {
DBGPRINT(("NWLogonSetAdmin: No ServerName\n"));
*pResult = (ULONG)STATUS_INVALID_PARAMETER;
return( FALSE );
}
*pResult = IsZeroterminateStringW(pServerName, ServerNameSize );
if (*pResult != STATUS_SUCCESS) {
return FALSE;
}
pNWLogon->Username[USERNAME_LENGTH] = (WCHAR) 0;
pNWLogon->Password[PASSWORD_LENGTH] = (WCHAR) 0;
pNWLogon->Domain[DOMAIN_LENGTH] = (WCHAR) 0;
//
// Only a SYSTEM mode caller (IE: Winlogon) is allowed
// to query this value.
//
RpcStatus = RpcImpersonateClient( NULL );
if( RpcStatus != RPC_S_OK ) {
DBGPRINT(("RpcServerNWLogonSetAdmin: Not impersonating! RpcStatus 0x%x\n",RpcStatus));
*pResult = (ULONG)STATUS_CANNOT_IMPERSONATE;
return( FALSE );
}
//
// Inquire if local RPC call
//
RpcStatus = I_RpcBindingIsClientLocal(
0, // Active RPC call we are servicing
&LocalFlag
);
if( RpcStatus != RPC_S_OK ) {
DBGPRINT(("NWLogonSetAdmin Could not query local client RpcStatus 0x%x\n",RpcStatus));
RpcRevertToSelf();
*pResult = (ULONG)STATUS_ACCESS_DENIED;
return( FALSE );
}
if( !LocalFlag ) {
DBGPRINT(("NWLogonSetAdmin Not a local client call\n"));
RpcRevertToSelf();
*pResult = (ULONG)STATUS_ACCESS_DENIED;
return( FALSE );
}
if( !IsCallerAdmin() ) {
RpcRevertToSelf();
DBGPRINT(("RpcServerNWLogonSetAdmin: Caller Not SYSTEM\n"));
*pResult = (ULONG)STATUS_ACCESS_DENIED;
return( FALSE );
}
RpcRevertToSelf();
if( ByteCount < sizeof(NWLOGONADMIN) ) {
DBGPRINT(("NWLogonSetAdmin: Bad size %d\n",ByteCount));
*pResult = (ULONG)STATUS_INFO_LENGTH_MISMATCH;
return( FALSE );
}
// check for username, and if there is one then encrypt username and pw
TRACE0(("NWLogonSetAdmin: UserName %ws\n",pNWLogon->Username));
// concatenate the username, password, and domain together
wcscpy(UserPass, pNWLogon->Username);
wcscat(UserPass, L"/");
wcscat(UserPass, pNWLogon->Password);
wcscat(UserPass, L"/");
// Skip over any \\ backslashes (if a machine name was passed in)
pDomain = pNWLogon->Domain;
while (*pDomain == L'\\') {
pDomain++;
}
wcscat(UserPass, pDomain);
//
// Build the secret name from the server name.
//
// This is because each domain will have a different entry.
//
// Skip over any \\ backslashes (if a machine name was passed in)
while (*pServerName == L'\\') {
pServerName++;
}
Size = wcslen(pServerName) + 1;
Size *= sizeof(WCHAR);
Size += sizeof(CITRIX_NW_SECRET_NAME);
pSecretName = MemAlloc( Size );
if( pSecretName == NULL ) {
DBGPRINT(("NWLogonSetAdmin: No memory\n"));
*pResult = (ULONG)STATUS_NO_MEMORY;
return( FALSE );
}
wcscpy(pSecretName, CITRIX_NW_SECRET_NAME );
wcscat(pSecretName, pServerName );
// check for username, and if there is one then encrypt username and pw
if ( wcslen( pNWLogon->Username ) ) {
// store encrypted username
Result = CreateSecretInLsa( pSecretName, UserPass );
} else {
// If there wasn't a username, clear this secret object.
Result = CreateSecretInLsa( pSecretName, L"");
DBGPRINT(("TERMSRV: RpcServerNWLogonSetAdmin: UserName not supplied\n"));
}
MemFree( pSecretName );
*pResult = Result;
return( Result == STATUS_SUCCESS );
}
/*******************************************************************************
*
* RpcServerQueryNWLogonAdmin
*
* Query NWLOGONADMIN structure from the SAM Secret object on the given
* WinFrame server.
*
* The caller must be SYSTEM context, IE: WinLogon.
*
* ENTRY:
* hServer (input)
* Rpc handle
*
* pServerName (input)
* Server to store info for. This server is typically a domain controller.
*
* pNWLogon (output)
* pointer to NWLOGONADMIN structure
*
* EXIT:
* nothing
*
******************************************************************************/
BOOLEAN
RpcServerNWLogonQueryAdmin(
HANDLE hServer,
DWORD *pResult,
PWCHAR pServerName,
DWORD ServerNameSize,
PNWLOGONADMIN pNWLogon,
DWORD ByteCount
)
{
PWCHAR pwch;
DWORD Size;
ULONG ulcsep;
UINT LocalFlag;
NTSTATUS Status;
PWCHAR pSecretName;
RPC_STATUS RpcStatus;
WCHAR encString[ USERNAME_LENGTH + PASSWORD_LENGTH + DOMAIN_LENGTH + 3 ];
BOOLEAN SystemCaller = FALSE;
// Do minimal buffer validation
if (pNWLogon == NULL) {
*pResult = STATUS_INVALID_USER_BUFFER;
return FALSE;
}
if( pServerName == NULL ) {
DBGPRINT(("NWLogonQueryAdmin: No ServerName\n"));
*pResult = (ULONG)STATUS_INVALID_PARAMETER;
return( FALSE );
}
*pResult = IsZeroterminateStringW(pServerName, ServerNameSize );
if (*pResult != STATUS_SUCCESS) {
return FALSE;
}
pNWLogon->Username[USERNAME_LENGTH] = (WCHAR) 0;
pNWLogon->Password[PASSWORD_LENGTH] = (WCHAR) 0;
pNWLogon->Domain[DOMAIN_LENGTH] = (WCHAR) 0;
//
//
// Only a SYSTEM mode caller (IE: Winlogon) is allowed
// to query this value.
//
RpcStatus = RpcImpersonateClient( NULL );
if( RpcStatus != RPC_S_OK ) {
DBGPRINT(("RpcServerNWLogonQueryAdmin: Not impersonating! RpcStatus 0x%x\n",RpcStatus));
*pResult = (ULONG)STATUS_CANNOT_IMPERSONATE;
return( FALSE );
}
//
// Inquire if local RPC call
//
RpcStatus = I_RpcBindingIsClientLocal(
0, // Active RPC call we are servicing
&LocalFlag
);
if( RpcStatus != RPC_S_OK ) {
DBGPRINT(("NWLogonQueryAdmin Could not query local client RpcStatus 0x%x\n",RpcStatus));
RpcRevertToSelf();
*pResult = (ULONG)STATUS_ACCESS_DENIED;
return( FALSE );
}
if( !LocalFlag ) {
DBGPRINT(("NWLogonQueryAdmin Not a local client call\n"));
RpcRevertToSelf();
*pResult = (ULONG)STATUS_ACCESS_DENIED;
return( FALSE );
}
/* find out who is calling us system has complete access, admin can't get password, user is kicked out */
if( IsCallerSystem() ) {
SystemCaller = TRUE;
}
if( !TestUserForAdmin() && (SystemCaller != TRUE) ) {
RpcRevertToSelf();
DBGPRINT(("RpcServerNWLogonQueryAdmin: Caller Not SYSTEM or Admin\n"));
*pResult = (ULONG)STATUS_ACCESS_DENIED;
return( FALSE );
}
RpcRevertToSelf();
if( ByteCount < sizeof(NWLOGONADMIN) ) {
DBGPRINT(("NWLogonQueryAdmin: Bad size %d\n",ByteCount));
*pResult = (ULONG)STATUS_INFO_LENGTH_MISMATCH;
return( FALSE );
}
//
// Build the secret name from the server name.
//
// This is because each domain will have a different entry.
//
// Skip over any \\ backslashes (if a machine name was passed in)
while (*pServerName == L'\\') {
pServerName++;
}
Size = wcslen(pServerName) + 1;
Size *= sizeof(WCHAR);
Size += sizeof(CITRIX_NW_SECRET_NAME);
pSecretName = MemAlloc( Size );
if( pSecretName == NULL ) {
DBGPRINT(("NWLogonSetAdmin: No memory\n"));
*pResult = (ULONG)STATUS_NO_MEMORY;
return( FALSE );
}
wcscpy(pSecretName, CITRIX_NW_SECRET_NAME );
wcscat(pSecretName, pServerName );
Status = QuerySecretInLsa(
pSecretName,
encString,
sizeof(encString)
);
MemFree( pSecretName );
if( !NT_SUCCESS(Status) ) {
*pResult = Status;
DBGPRINT(("NWLogonQueryAdmin: Error 0x%x querying secret object\n",Status));
return( FALSE );
}
// check for username/password if there is one then decrypt it
if ( wcslen( encString ) ) {
// Change the '/' seperator to null
pwch = &encString[0];
ulcsep = 0;
while (pwch && *pwch) {
pwch = wcschr(pwch, L'/');
if (pwch) {
*pwch = L'\0';
pwch++;
ulcsep++;
}
}
// get clear text username
wcscpy( pNWLogon->Username, &encString[0] );
if (ulcsep >= 1) {
// Skip to the password
pwch = &encString[0] + wcslen(&encString[0]) + 1;
if( SystemCaller == TRUE ){
// get clear text password
wcscpy( pNWLogon->Password, pwch);
} else {
*pNWLogon->Password = L'\0';
}
} else {
*pNWLogon->Password = L'\0';
}
if (ulcsep >= 2) {
// Skip to the domain string
pwch = pwch + wcslen(pwch) + 1;
// get clear text domain
wcscpy( pNWLogon->Domain, pwch);
} else {
*pNWLogon->Domain = L'\0';
}
TRACE0(("NwLogonQueryAdmin :%ws:%ws:%ws:\n",pNWLogon->Username,pNWLogon->Domain,pNWLogon->Password));
*pResult = STATUS_SUCCESS;
return( TRUE );
}
else {
DBGPRINT(("RpcServerNWLogonQueryAdmin: zero length data\n"));
// set to username and password to NULL strings
pNWLogon->Password[0] = L'\0';
pNWLogon->Username[0] = L'\0';
pNWLogon->Domain[0] = L'\0';
*pResult = STATUS_SUCCESS;
return( TRUE );
}
}
/*******************************************************************************
*
* CreateSecretInLsa
*
* Create the secret object in the LSA to keep it from prying eyes.
*
* NOTE: There is no need to encode the data since it is RSA encrypted
* by the LSA secret routines.
*
* ENTRY:
* pSecretName (input)
* Secret name to create.
*
* pSecretData (input)
* Data to store in secret
*
* EXIT:
* NTSTATUS
*
******************************************************************************/
NTSTATUS
CreateSecretInLsa(
PWCHAR pSecretName,
PWCHAR pSecretData
)
{
NTSTATUS Status;
OBJECT_ATTRIBUTES ObjectAttributes;
SECURITY_QUALITY_OF_SERVICE SecurityQualityOfService;
LSA_HANDLE PolicyHandle;
UNICODE_STRING SecretName;
UNICODE_STRING SecretValue;
LSA_HANDLE SecretHandle;
ACCESS_MASK DesiredAccess;
if( pSecretName == NULL ) {
DBGPRINT(("CreateSecretInLsa: NULL SecretName\n"));
return( STATUS_INVALID_PARAMETER );
}
SecurityQualityOfService.Length = sizeof(SECURITY_QUALITY_OF_SERVICE);
SecurityQualityOfService.ImpersonationLevel = SecurityImpersonation;
SecurityQualityOfService.ContextTrackingMode = SECURITY_DYNAMIC_TRACKING;
SecurityQualityOfService.EffectiveOnly = FALSE;
InitializeObjectAttributes(
&ObjectAttributes,
NULL,
0L,
NULL,
NULL
);
ObjectAttributes.SecurityQualityOfService = &SecurityQualityOfService;
Status = LsaOpenPolicy(
NULL, // SystemName (Local)
&ObjectAttributes,
GENERIC_ALL,
&PolicyHandle
);
if( !NT_SUCCESS(Status) ) {
DBGPRINT(("Error 0x%x Opening Policy\n",Status));
return( Status );
}
RtlInitUnicodeString( &SecretName, pSecretName );
DesiredAccess = GENERIC_ALL;
TRACE0(("Creating Secret name :%ws:\n",pSecretName));
Status = LsaCreateSecret(
PolicyHandle,
&SecretName,
DesiredAccess,
&SecretHandle
);
// Its OK if the name already exits, we will set a new value or delete
if( Status == STATUS_OBJECT_NAME_COLLISION ) {
TRACE0(("CreateSecretInLsa: Existing Entry, Opening\n"));
Status = LsaOpenSecret(
PolicyHandle,
&SecretName,
DesiredAccess,
&SecretHandle
);
}
if( !NT_SUCCESS(Status) ) {
DBGPRINT(("Error 0x%x Creating Secret\n",Status));
/* makarp; Close Policy Handle in case of LsaCreateSecrete, LsaopenSecret failures. #182787 */
LsaClose( PolicyHandle );
return( Status );
}
TRACE0(("CreateSecretInLsa: Status 0x%x\n",Status));
if ( wcslen(pSecretData) != 0 ){
RtlInitUnicodeString( &SecretValue, pSecretData );
Status = LsaSetSecret( SecretHandle, &SecretValue, NULL );
TRACE0(("CreateSecretInLsa: LsaSetSecret Status 0x%x\n",Status));
LsaClose(SecretHandle);
}
else{
Status = LsaDelete(SecretHandle);
}
LsaClose( PolicyHandle );
return( Status );
}
/*******************************************************************************
*
* QuerySecretInLsa
*
* Query the secret object in the LSA.
*
* ENTRY:
* pSecretName (input)
* Secret name to create.
*
* pSecretData (output)
* Buffer to store secret data.
*
* ByteCount (input)
* Maximum size of buffer to store result.
*
* EXIT:
* NTSTATUS
*
******************************************************************************/
NTSTATUS
QuerySecretInLsa(
PWCHAR pSecretName,
PWCHAR pSecretData,
DWORD ByteCount
)
{
NTSTATUS Status;
OBJECT_ATTRIBUTES ObjectAttributes;
SECURITY_QUALITY_OF_SERVICE SecurityQualityOfService;
LSA_HANDLE PolicyHandle;
UNICODE_STRING SecretName;
LSA_HANDLE SecretHandle;
ACCESS_MASK DesiredAccess;
LARGE_INTEGER CurrentTime;
PUNICODE_STRING pCurrentValue = NULL;
SecurityQualityOfService.Length = sizeof(SECURITY_QUALITY_OF_SERVICE);
SecurityQualityOfService.ImpersonationLevel = SecurityImpersonation;
SecurityQualityOfService.ContextTrackingMode = SECURITY_DYNAMIC_TRACKING;
SecurityQualityOfService.EffectiveOnly = FALSE;
InitializeObjectAttributes(
&ObjectAttributes,
NULL,
0L,
NULL,
NULL
);
ObjectAttributes.SecurityQualityOfService = &SecurityQualityOfService;
Status = LsaOpenPolicy(
NULL, // SystemName (Local)
&ObjectAttributes,
GENERIC_ALL,
&PolicyHandle
);
if( !NT_SUCCESS(Status) ) {
DBGPRINT(("Error 0x%x Opening Policy\n",Status));
return( Status );
}
RtlInitUnicodeString( &SecretName, pSecretName );
DesiredAccess = GENERIC_ALL;
Status = LsaOpenSecret(
PolicyHandle,
&SecretName,
DesiredAccess,
&SecretHandle
);
if( !NT_SUCCESS(Status) ) {
DBGPRINT(("Error 0x%x Opening Secret :%ws:\n",Status,pSecretName));
/* makarp; Close Policy Handle in case of LsaopenSecret failures. #182787 */
LsaClose( PolicyHandle );
return( Status );
}
Status = LsaQuerySecret(
SecretHandle,
&pCurrentValue,
&CurrentTime,
NULL,
NULL
);
TRACE0(("QuerySecretInLsa: Status 0x%x\n",Status));
if( NT_SUCCESS(Status) ) {
if (pCurrentValue != NULL) {
if( (pCurrentValue->Length+sizeof(WCHAR)) > ByteCount ) {
Status = STATUS_INFO_LENGTH_MISMATCH;
}
else {
RtlMoveMemory( pSecretData, pCurrentValue->Buffer, pCurrentValue->Length );
pSecretData[pCurrentValue->Length/sizeof(WCHAR)] = 0;
}
LsaFreeMemory( pCurrentValue );
} else {
pSecretData[0] = (WCHAR) 0;
}
}
LsaClose(SecretHandle);
LsaClose( PolicyHandle );
TRACE0(("QuerySecretInLsa: Final Status 0x%x\n",Status));
return( Status );
}