Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

448 lines
13 KiB

#include <nt.h>
#include <ntrtl.h>
#include <nturtl.h>
#include <windows.h>
#include "tsappcmp.h"
#include <regapi.h>
PTERMSRVCREATEREGENTRY gpfnTermsrvCreateRegEntry;
PTERMSRVOPENREGENTRY gpfnTermsrvOpenRegEntry;
PTERMSRVSETVALUEKEY gpfnTermsrvSetValueKey;
PTERMSRVDELETEKEY gpfnTermsrvDeleteKey;
PTERMSRVDELETEVALUE gpfnTermsrvDeleteValue;
PTERMSRVRESTOREKEY gpfnTermsrvRestoreKey;
PTERMSRVSETKEYSECURITY gpfnTermsrvSetKeySecurity;
PTERMSRVOPENUSERCLASSES gpfnTermsrvOpenUserClasses;
PTERMSRVGETPRESETVALUE gpfnTermsrvGetPreSetValue;
DWORD gdwRegistryExtensionFlags=0;
BOOL IsTerminalServerCompatible(VOID)
{
PIMAGE_NT_HEADERS NtHeader = RtlImageNtHeader( NtCurrentPeb()->ImageBaseAddress );
if ((NtHeader) && (NtHeader->OptionalHeader.DllCharacteristics & IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE)) {
return TRUE;
} else {
return FALSE;
}
}
BOOL IsSystemLUID(VOID)
{
HANDLE TokenHandle;
UCHAR TokenInformation[ sizeof( TOKEN_STATISTICS ) ];
ULONG ReturnLength;
LUID CurrentLUID = { 0, 0 };
LUID SystemLUID = SYSTEM_LUID;
NTSTATUS Status;
if ( CurrentLUID.LowPart == 0 && CurrentLUID.HighPart == 0 ) {
Status = NtOpenProcessToken( NtCurrentProcess(),
TOKEN_QUERY,
&TokenHandle );
if ( !NT_SUCCESS( Status ) )
return(TRUE);
NtQueryInformationToken( TokenHandle, TokenStatistics, &TokenInformation,
sizeof(TokenInformation), &ReturnLength );
NtClose( TokenHandle );
RtlCopyLuid(&CurrentLUID,
&(((PTOKEN_STATISTICS)TokenInformation)->AuthenticationId));
}
if (RtlEqualLuid(&CurrentLUID, &SystemLUID)) {
return(TRUE);
} else {
return(FALSE );
}
}
/**
Params:
[out] Boolean *RelaxedSecurityMode
If TRUE, then we are running app server in relaxed security mode
which means that the TsUserSID will be present in user's token, allowing
user more access to various reg and file system components.
Retrun:
TRUE means app server is enabled, and it is in app-compat mode ( the default)
FALSE means this is not an app server
**/
BOOL IsTSAppCompatEnabled( BOOLEAN *RelaxedSecurityMode )
{
NTSTATUS NtStatus;
OBJECT_ATTRIBUTES ObjectAttributes;
UNICODE_STRING UniString;
HKEY hKey = 0;
ULONG ul, ulcbuf;
PKEY_VALUE_PARTIAL_INFORMATION pKeyValInfo = NULL;
BOOL retval = TRUE;
RtlInitUnicodeString(&UniString,REG_NTAPI_CONTROL_TSERVER);
// Determine the value info buffer size
ulcbuf = sizeof(KEY_VALUE_FULL_INFORMATION) + MAX_PATH*sizeof(WCHAR) +
sizeof(ULONG);
pKeyValInfo = RtlAllocateHeap(RtlProcessHeap(),
0,
ulcbuf);
// Did everything initialize OK?
if (UniString.Buffer && pKeyValInfo) {
InitializeObjectAttributes(&ObjectAttributes,
&UniString,
OBJ_CASE_INSENSITIVE,
NULL,
NULL
);
NtStatus = NtOpenKey(&hKey, KEY_READ, &ObjectAttributes);
if (NT_SUCCESS(NtStatus)) {
RtlInitUnicodeString(&UniString,
L"TSAppCompat");
NtStatus = NtQueryValueKey(hKey,
&UniString,
KeyValuePartialInformation,
pKeyValInfo,
ulcbuf,
&ul);
if (NT_SUCCESS(NtStatus) && (REG_DWORD == pKeyValInfo->Type)) {
if ((*(PULONG)pKeyValInfo->Data) == 0) {
retval = FALSE;
}
}
RtlInitUnicodeString(&UniString,
L"TSUserEnabled");
NtStatus = NtQueryValueKey(hKey,
&UniString,
KeyValuePartialInformation,
pKeyValInfo,
ulcbuf,
&ul);
if (NT_SUCCESS(NtStatus) && (REG_DWORD == pKeyValInfo->Type) )
{
*RelaxedSecurityMode = (BOOLEAN ) (*(PULONG)pKeyValInfo->Data);
}
else // in case of any problems, assume standard security mode
{
*RelaxedSecurityMode = FALSE;
}
NtClose(hKey);
}
}
// Free up the buffers we allocated
// Need to zero out the buffers, because some apps (MS Internet Assistant)
// won't install if the heap is not zero filled.
if (pKeyValInfo) {
memset(pKeyValInfo, 0, ulcbuf);
RtlFreeHeap( RtlProcessHeap(), 0, pKeyValInfo );
}
return(retval);
}
ULONG GetCompatFlags()
{
ULONG ulAppFlags = 0;
PRTL_USER_PROCESS_PARAMETERS pUserParam;
PWCHAR pwch, pwchext;
WCHAR pwcAppName[MAX_PATH+1];
NTSTATUS NtStatus;
OBJECT_ATTRIBUTES ObjectAttributes;
UNICODE_STRING UniString;
HKEY hKey = 0;
ULONG ul, ulcbuf;
PKEY_VALUE_PARTIAL_INFORMATION pKeyValInfo = NULL;
LPWSTR UniBuff = NULL;
ULONG dwCompatFlags = 0;
UniString.Buffer = NULL;
// Get the path of the executable name
pUserParam = NtCurrentPeb()->ProcessParameters;
// Get the executable name, if there's no \ just use the name as it is
pwch = wcsrchr(pUserParam->ImagePathName.Buffer, L'\\');
if (pwch) {
pwch++;
} else {
pwch = pUserParam->ImagePathName.Buffer;
}
wcscpy(pwcAppName, pwch);
pwch = pwcAppName;
// Remove the extension
if (pwchext = wcsrchr(pwch, L'.')) {
*pwchext = '\0';
}
UniString.Buffer = NULL;
ul = sizeof(TERMSRV_COMPAT_APP) + (wcslen(pwch) + 1)*sizeof(WCHAR);
UniBuff = RtlAllocateHeap(RtlProcessHeap(),
0,
ul);
if (UniBuff) {
wcscpy(UniBuff, TERMSRV_COMPAT_APP);
wcscat(UniBuff, pwch);
RtlInitUnicodeString(&UniString, UniBuff);
}
// Determine the value info buffer size
ulcbuf = sizeof(KEY_VALUE_FULL_INFORMATION) + MAX_PATH*sizeof(WCHAR) +
sizeof(ULONG);
pKeyValInfo = RtlAllocateHeap(RtlProcessHeap(),
0,
ulcbuf);
// Did everything initialize OK?
if (UniString.Buffer && pKeyValInfo) {
InitializeObjectAttributes(&ObjectAttributes,
&UniString,
OBJ_CASE_INSENSITIVE,
NULL,
NULL
);
NtStatus = NtOpenKey(&hKey, KEY_READ, &ObjectAttributes);
if (NT_SUCCESS(NtStatus)) {
RtlInitUnicodeString(&UniString,
COMPAT_FLAGS);
NtStatus = NtQueryValueKey(hKey,
&UniString,
KeyValuePartialInformation,
pKeyValInfo,
ulcbuf,
&ul);
if (NT_SUCCESS(NtStatus) && (REG_DWORD == pKeyValInfo->Type)) {
dwCompatFlags = *(PULONG)pKeyValInfo->Data;
}
NtClose(hKey);
}
}
// Free up the buffers we allocated
// Need to zero out the buffers, because some apps (MS Internet Assistant)
// won't install if the heap is not zero filled.
if (UniBuff) {
memset(UniBuff, 0, UniString.MaximumLength);
RtlFreeHeap( RtlProcessHeap(), 0, UniBuff );
}
if (pKeyValInfo) {
memset(pKeyValInfo, 0, ulcbuf);
RtlFreeHeap( RtlProcessHeap(), 0, pKeyValInfo );
}
return(dwCompatFlags);
}
/**
Return code :
TRUE means app compat is enabled for this app
FALSE means app compat is not enabled for this app
**/
BOOLEAN AdvApi_InitializeTermsrvFpns( BOOLEAN *pIsInRelaxedSecurityMode , DWORD *pdwCompatFlags )
{
HANDLE dllHandle;
ULONG dwCompatFlags;
BOOLEAN rc=FALSE;
if (IsTerminalServerCompatible() || (!IsTSAppCompatEnabled( pIsInRelaxedSecurityMode ))) {
return rc;
}
*pdwCompatFlags = dwCompatFlags = GetCompatFlags();
//Don't load app compatibility dll for system components
if (IsSystemLUID()) {
if ( (dwCompatFlags & (TERMSRV_COMPAT_SYSREGMAP | TERMSRV_COMPAT_WIN32))
!= (TERMSRV_COMPAT_SYSREGMAP | TERMSRV_COMPAT_WIN32) ) {
//
// Process is running as SYSTEM and we don't have an app
// compatibility flag telling us to do the regmap stuff.
//
return rc;
}
} else if ( (dwCompatFlags & (TERMSRV_COMPAT_NOREGMAP | TERMSRV_COMPAT_WIN32))
== (TERMSRV_COMPAT_NOREGMAP | TERMSRV_COMPAT_WIN32) ) {
//
// We don't want to do registry mapping for this user process
//
return rc;
}
//
// Load Terminal Server application compatibility dll
//
dllHandle = LoadLibrary("tsappcmp.dll");
if (dllHandle) {
gpfnTermsrvCreateRegEntry =
(PTERMSRVCREATEREGENTRY)GetProcAddress(dllHandle,"TermsrvCreateRegEntry");
gpfnTermsrvOpenRegEntry =
(PTERMSRVOPENREGENTRY)GetProcAddress(dllHandle,"TermsrvOpenRegEntry");
gpfnTermsrvSetValueKey =
(PTERMSRVSETVALUEKEY)GetProcAddress(dllHandle,"TermsrvSetValueKey");
gpfnTermsrvDeleteKey =
(PTERMSRVDELETEKEY)GetProcAddress(dllHandle,"TermsrvDeleteKey");
gpfnTermsrvDeleteValue =
(PTERMSRVDELETEVALUE)GetProcAddress(dllHandle,"TermsrvDeleteValue");
gpfnTermsrvRestoreKey =
(PTERMSRVRESTOREKEY)GetProcAddress(dllHandle,"TermsrvRestoreKey");
gpfnTermsrvSetKeySecurity =
(PTERMSRVSETKEYSECURITY)GetProcAddress(dllHandle,"TermsrvSetKeySecurity");
gpfnTermsrvOpenUserClasses =
(PTERMSRVOPENUSERCLASSES)GetProcAddress(dllHandle,"TermsrvOpenUserClasses");
gpfnTermsrvGetPreSetValue =
(PTERMSRVGETPRESETVALUE)GetProcAddress(dllHandle,"TermsrvGetPreSetValue");
rc = TRUE;
}
return rc;
}
void
GetRegistryExtensionFlags( DWORD dwCompatFlags )
/*++
GetRegistryExtensionFlags
Routine Description:
Reads DWORD value of
Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Terminal Server\RegistryExtensionFlags
Arguments:
none
Return Value:
none
--*/
{
DWORD dwResult=0;
NTSTATUS Status;
HANDLE hKey;
UNICODE_STRING KeyName;
PCWSTR wszKeyName=TERMSRV_BASE;
OBJECT_ATTRIBUTES ObjAttr;
RtlInitUnicodeString(&KeyName,wszKeyName );
InitializeObjectAttributes(&ObjAttr,&KeyName,OBJ_CASE_INSENSITIVE,NULL,NULL);
Status = NtOpenKey(&hKey,KEY_QUERY_VALUE,&ObjAttr);
if(NT_SUCCESS(Status)){
UNICODE_STRING ValueName;
PKEY_VALUE_PARTIAL_INFORMATION pKeyValInfo = NULL;
ULONG ulSize = sizeof(KEY_VALUE_PARTIAL_INFORMATION)+sizeof(DWORD);
pKeyValInfo = RtlAllocateHeap(RtlProcessHeap(), 0, ulSize);
if(pKeyValInfo){
PCWSTR wszValueName=L"RegistryExtensionFlags";
RtlInitUnicodeString(&ValueName,wszValueName );
Status=NtQueryValueKey(hKey,&ValueName,KeyValuePartialInformation,
(PVOID)pKeyValInfo,ulSize,&ulSize);
if(NT_SUCCESS(Status)){
gdwRegistryExtensionFlags=*((LPDWORD)(pKeyValInfo->Data));
}
RtlFreeHeap( RtlProcessHeap(), 0, pKeyValInfo );
// the global advapi extension flags might be turned off for this app, so check.
if ( dwCompatFlags & TERMSRV_COMPAT_NO_PER_USER_CLASSES_REDIRECTION )
{
gdwRegistryExtensionFlags &= ~ TERMSRV_ENABLE_PER_USER_CLASSES_REDIRECTION;
}
if ( dwCompatFlags & TERMSRV_COMPAT_NO_ENABLE_ACCESS_FLAG_MODIFICATION )
{
gdwRegistryExtensionFlags &= ~TERMSRV_ENABLE_ACCESS_FLAG_MODIFICATION;
}
}
NtClose(hKey);
}
}