|
|
/****************************** Module Header ******************************\
* Module Name: security.c * * Copyright (c) 1991, Microsoft Corporation * * Handles security aspects of winlogon operation. * * History: * 12-05-91 Davidc Created - mostly taken from old winlogon.c \***************************************************************************/
#include "msgina.h"
#include "authmon.h"
#pragma hdrstop
#define SECURITY_WIN32
#define SECURITY_KERBEROS
#include <security.h>
#include <secint.h>
#include <wincrypt.h>
#include <sclogon.h>
#include <md5.h>
#include <align.h>
#include <ginacomn.h>
//
// 'Constants' used in this module only.
//
SID_IDENTIFIER_AUTHORITY gSystemSidAuthority = SECURITY_NT_AUTHORITY; SID_IDENTIFIER_AUTHORITY gLocalSidAuthority = SECURITY_LOCAL_SID_AUTHORITY; PSID gLocalSid; // Initialized in 'InitializeSecurityGlobals'
PSID gAdminSid; // Initialized in 'InitializeSecurityGlobals'
PSID pWinlogonSid; // Initialized in 'InitializeSecurityGlobals'
//
// This structure wraps parameters passed to the background logon thread.
// The background logon is queued to the thread pool after a fast-cached
// logon to update the cached credentials.
//
typedef struct _BACKGROUND_LOGON_PARAMETERS { ULONG AuthenticationPackage; ULONG AuthenticationInformationLength; PVOID AuthenticationInformation; PWCHAR UserSidString; HANDLE LsaHandle; } BACKGROUND_LOGON_PARAMETERS, *PBACKGROUND_LOGON_PARAMETERS;
//
// Routines to check for & perform fast cached logon if policy allows it.
//
NTSTATUS AttemptCachedLogon( HANDLE LsaHandle, PLSA_STRING OriginName, SECURITY_LOGON_TYPE LogonType, ULONG AuthenticationPackage, PVOID AuthenticationInformation, ULONG AuthenticationInformationLength, PTOKEN_GROUPS LocalGroups, PTOKEN_SOURCE SourceContext, PVOID *ProfileBuffer, PULONG ProfileBufferLength, PLUID LogonId, PHANDLE UserToken, PQUOTA_LIMITS Quotas, PNTSTATUS SubStatus, POPTIMIZED_LOGON_STATUS OptimizedLogonStatus );
DWORD BackgroundLogonWorker( PBACKGROUND_LOGON_PARAMETERS LogonParameters );
#define PASSWORD_HASH_STRING TEXT("Long string used by msgina inside of winlogon to hash out the password")
typedef LONG ACEINDEX; typedef ACEINDEX *PACEINDEX;
typedef struct _MYACE { PSID Sid; ACCESS_MASK AccessMask; UCHAR InheritFlags; } MYACE; typedef MYACE *PMYACE;
BOOL InitializeWindowsSecurity( PGLOBALS pGlobals );
BOOL InitializeAuthentication( IN PGLOBALS pGlobals );
/***************************************************************************\
* SetMyAce * * Helper routine that fills in a MYACE structure. * * History: * 02-06-92 Davidc Created \***************************************************************************/ VOID SetMyAce( PMYACE MyAce, PSID Sid, ACCESS_MASK Mask, UCHAR InheritFlags ) { MyAce->Sid = Sid; MyAce->AccessMask= Mask; MyAce->InheritFlags = InheritFlags; }
/***************************************************************************\
* CreateAccessAllowedAce * * Allocates memory for an ACCESS_ALLOWED_ACE and fills it in. * The memory should be freed by calling DestroyACE. * * Returns pointer to ACE on success, NULL on failure * * History: * 12-05-91 Davidc Created \***************************************************************************/ PVOID CreateAccessAllowedAce( PSID Sid, ACCESS_MASK AccessMask, UCHAR AceFlags, UCHAR InheritFlags ) { ULONG LengthSid = RtlLengthSid(Sid); ULONG LengthACE = sizeof(ACE_HEADER) + sizeof(ACCESS_MASK) + LengthSid; PACCESS_ALLOWED_ACE Ace;
Ace = (PACCESS_ALLOWED_ACE)Alloc(LengthACE); if (Ace == NULL) { DebugLog((DEB_ERROR, "CreateAccessAllowedAce : Failed to allocate ace\n")); return NULL; }
Ace->Header.AceType = ACCESS_ALLOWED_ACE_TYPE; Ace->Header.AceSize = (UCHAR)LengthACE; Ace->Header.AceFlags = AceFlags | InheritFlags; Ace->Mask = AccessMask; RtlCopySid(LengthSid, (PSID)(&(Ace->SidStart)), Sid );
return(Ace); }
/***************************************************************************\
* DestroyAce * * Frees the memory allocate for an ACE * * History: * 12-05-91 Davidc Created \***************************************************************************/ VOID DestroyAce( PVOID Ace ) { Free(Ace); }
/***************************************************************************\
* CreateSecurityDescriptor * * Creates a security descriptor containing an ACL containing the specified ACEs * * A SD created with this routine should be destroyed using * DeleteSecurityDescriptor * * Returns a pointer to the security descriptor or NULL on failure. * * 02-06-92 Davidc Created. \***************************************************************************/
PSECURITY_DESCRIPTOR CreateSecurityDescriptor( PMYACE MyAce, ACEINDEX AceCount ) { NTSTATUS Status; ACEINDEX AceIndex; PACCESS_ALLOWED_ACE *Ace; PACL Acl = NULL; PSECURITY_DESCRIPTOR SecurityDescriptor = NULL; ULONG LengthAces; ULONG LengthAcl; ULONG LengthSd;
//
// Allocate space for the ACE pointer array
//
Ace = (PACCESS_ALLOWED_ACE *)Alloc(sizeof(PACCESS_ALLOWED_ACE) * AceCount); if (Ace == NULL) { DebugLog((DEB_ERROR, "Failed to allocated ACE array\n")); return(NULL); }
//
// Create the ACEs and calculate total ACE size
//
LengthAces = 0; for (AceIndex=0; AceIndex < AceCount; AceIndex ++) { Ace[AceIndex] = CreateAccessAllowedAce(MyAce[AceIndex].Sid, MyAce[AceIndex].AccessMask, 0, MyAce[AceIndex].InheritFlags); if (Ace[AceIndex] == NULL) { DebugLog((DEB_ERROR, "Failed to allocate ace\n")); } else { LengthAces += Ace[AceIndex]->Header.AceSize; } }
//
// Calculate ACL and SD sizes
//
LengthAcl = sizeof(ACL) + LengthAces; LengthSd = SECURITY_DESCRIPTOR_MIN_LENGTH;
//
// Create the ACL
//
Acl = Alloc(LengthAcl);
if (Acl != NULL) {
Status = RtlCreateAcl(Acl, LengthAcl, ACL_REVISION); ASSERT(NT_SUCCESS(Status));
//
// Add the ACES to the ACL and destroy the ACEs
//
for (AceIndex = 0; AceIndex < AceCount; AceIndex ++) {
if (Ace[AceIndex] != NULL) {
Status = RtlAddAce(Acl, ACL_REVISION, 0, Ace[AceIndex], Ace[AceIndex]->Header.AceSize);
if (!NT_SUCCESS(Status)) { DebugLog((DEB_ERROR, "AddAce failed, status = 0x%lx", Status)); }
DestroyAce( Ace[AceIndex] ); } }
} else { DebugLog((DEB_ERROR, "Failed to allocate ACL\n"));
for ( AceIndex = 0 ; AceIndex < AceCount ; AceIndex++ ) { if ( Ace[AceIndex] ) { DestroyAce( Ace[ AceIndex ] ); } } }
//
// Free the ACE pointer array
//
Free(Ace);
//
// Create the security descriptor
//
SecurityDescriptor = Alloc(LengthSd);
if (SecurityDescriptor != NULL) {
Status = RtlCreateSecurityDescriptor(SecurityDescriptor, SECURITY_DESCRIPTOR_REVISION); ASSERT(NT_SUCCESS(Status));
//
// Set the DACL on the security descriptor
//
Status = RtlSetDaclSecurityDescriptor(SecurityDescriptor, TRUE, Acl, FALSE); if (!NT_SUCCESS(Status)) { DebugLog((DEB_ERROR, "SetDACLSD failed, status = 0x%lx", Status)); } } else {
DebugLog((DEB_ERROR, "Failed to allocate security descriptor\n"));
Free( Acl ); }
//
// Return with our spoils
//
return(SecurityDescriptor); }
//+---------------------------------------------------------------------------
//
// Function: FreeSecurityDescriptor
//
// Synopsis: Frees security descriptors created by CreateSecurityDescriptor
//
// Arguments: [SecurityDescriptor] --
//
// History: 5-09-96 RichardW Created
//
// Notes:
//
//----------------------------------------------------------------------------
VOID FreeSecurityDescriptor( PSECURITY_DESCRIPTOR SecurityDescriptor ) { PACL Acl; BOOL Present; BOOL Defaulted;
Acl = NULL;
GetSecurityDescriptorDacl( SecurityDescriptor, &Present, &Acl, &Defaulted );
if ( Acl ) { Free( Acl ); }
Free( SecurityDescriptor );
} /***************************************************************************\
* CreateUserThreadTokenSD * * Creates a security descriptor to protect tokens on user threads * * History: * 12-05-91 Davidc Created \***************************************************************************/ PSECURITY_DESCRIPTOR CreateUserThreadTokenSD( PSID UserSid, PSID WinlogonSid ) { MYACE Ace[2]; ACEINDEX AceCount = 0; PSECURITY_DESCRIPTOR SecurityDescriptor;
ASSERT(UserSid != NULL); // should always have a non-null user sid
//
// Define the User ACEs
//
SetMyAce(&(Ace[AceCount++]), UserSid, TOKEN_ADJUST_PRIVILEGES | TOKEN_ADJUST_GROUPS | TOKEN_ADJUST_DEFAULT | TOKEN_QUERY | TOKEN_DUPLICATE | TOKEN_IMPERSONATE | READ_CONTROL, 0 );
//
// Define the Winlogon ACEs
//
SetMyAce(&(Ace[AceCount++]), WinlogonSid, TOKEN_ALL_ACCESS, 0 );
// Check we didn't goof
ASSERT((sizeof(Ace) / sizeof(MYACE)) >= AceCount);
//
// Create the security descriptor
//
SecurityDescriptor = CreateSecurityDescriptor(Ace, AceCount); if (SecurityDescriptor == NULL) { DebugLog((DEB_ERROR, "failed to create user process token security descriptor\n")); }
return(SecurityDescriptor);
}
/***************************************************************************\
* InitializeSecurityGlobals * * Initializes the various global constants (mainly Sids used in this module. * * History: * 12-05-91 Davidc Created \***************************************************************************/ VOID InitializeSecurityGlobals( VOID ) { NTSTATUS Status; SID_IDENTIFIER_AUTHORITY SystemSidAuthority = SECURITY_NT_AUTHORITY; ULONG SidLength;
//
// Get our sid so it can be put on object ACLs
//
SidLength = RtlLengthRequiredSid(1); pWinlogonSid = (PSID)Alloc(SidLength); if (!pWinlogonSid) { //
// We're dead. Couldn't even allocate memory for a measly SID...
//
return; }
RtlInitializeSid(pWinlogonSid, &SystemSidAuthority, 1); *(RtlSubAuthoritySid(pWinlogonSid, 0)) = SECURITY_LOCAL_SYSTEM_RID;
//
// Initialize the local sid for later
//
Status = RtlAllocateAndInitializeSid( &gLocalSidAuthority, 1, SECURITY_LOCAL_RID, 0, 0, 0, 0, 0, 0, 0, &gLocalSid );
if (!NT_SUCCESS(Status)) { WLPrint(("Failed to initialize local sid, status = 0x%lx", Status)); }
//
// Initialize the admin sid for later
//
Status = RtlAllocateAndInitializeSid( &gSystemSidAuthority, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, &gAdminSid ); if (!NT_SUCCESS(Status)) { WLPrint(("Failed to initialize admin alias sid, status = 0x%lx", Status)); }
}
VOID FreeSecurityGlobals( VOID )
{ RtlFreeSid(gAdminSid); RtlFreeSid(gLocalSid); LocalFree(pWinlogonSid); }
/***************************************************************************\
* InitializeAuthentication * * Initializes the authentication service. i.e. connects to the authentication * package using the Lsa. * * On successful return, the following fields of our global structure are * filled in : * LsaHandle * SecurityMode * AuthenticationPackage * * Returns TRUE on success, FALSE on failure * * History: * 12-05-91 Davidc Created \***************************************************************************/ BOOL InitializeAuthentication( IN PGLOBALS pGlobals ) { NTSTATUS Status; STRING LogonProcessName;
if (!EnablePrivilege(SE_TCB_PRIVILEGE, TRUE)) { DebugLog((DEB_ERROR, "Failed to enable SeTcbPrivilege!\n")); return(FALSE); }
//
// Hookup to the LSA and locate our authentication package.
//
RtlInitString(&LogonProcessName, "Winlogon\\MSGina"); Status = LsaRegisterLogonProcess( &LogonProcessName, &pGlobals->LsaHandle, &pGlobals->SecurityMode );
if (!NT_SUCCESS(Status)) {
DebugLog((DEB_ERROR, "LsaRegisterLogonProcess failed: %#x\n", Status)); return(FALSE); }
return TRUE; }
PVOID FormatPasswordCredentials( IN PUNICODE_STRING UserName, IN PUNICODE_STRING Domain, IN PUNICODE_STRING Password, IN BOOLEAN Unlock, IN OPTIONAL PLUID LogonId, OUT PULONG Size ) { PKERB_INTERACTIVE_LOGON KerbAuthInfo; ULONG AuthInfoSize; PSECURITY_SEED_AND_LENGTH SeedAndLength; UCHAR Seed; PBYTE Where;
SeedAndLength = (PSECURITY_SEED_AND_LENGTH)(&Password->Length); Seed = SeedAndLength->Seed;
//
// Build the authentication information buffer
//
if (Seed != 0) { RevealPassword( Password ); }
AuthInfoSize = sizeof(KERB_INTERACTIVE_UNLOCK_LOGON) + UserName->Length + 2 + Domain->Length + 2 + Password->Length + 2 ;
KerbAuthInfo = Alloc(AuthInfoSize); if (KerbAuthInfo == NULL) { DebugLog((DEB_ERROR, "failed to allocate memory for authentication buffer\n")); return( NULL ); }
//
// This authentication buffer will be used for a logon attempt
//
if (Unlock) { ASSERT(ARGUMENT_PRESENT(LogonId)); KerbAuthInfo->MessageType = KerbWorkstationUnlockLogon ; ((PKERB_INTERACTIVE_UNLOCK_LOGON) KerbAuthInfo)->LogonId = *LogonId; Where = (PBYTE) (KerbAuthInfo) + sizeof(KERB_INTERACTIVE_UNLOCK_LOGON); } else { KerbAuthInfo->MessageType = KerbInteractiveLogon ; Where = (PBYTE) (KerbAuthInfo + 1); }
//
// Copy the user name into the authentication buffer
//
KerbAuthInfo->UserName.Length = (USHORT) sizeof(TCHAR) * (USHORT) lstrlen(UserName->Buffer);
KerbAuthInfo->UserName.MaximumLength = KerbAuthInfo->UserName.Length + sizeof(TCHAR);
KerbAuthInfo->UserName.Buffer = (PWSTR)Where; lstrcpy(KerbAuthInfo->UserName.Buffer, UserName->Buffer);
//
// Copy the domain name into the authentication buffer
//
KerbAuthInfo->LogonDomainName.Length = (USHORT) sizeof(TCHAR) * (USHORT) lstrlen(Domain->Buffer);
KerbAuthInfo->LogonDomainName.MaximumLength = KerbAuthInfo->LogonDomainName.Length + sizeof(TCHAR);
KerbAuthInfo->LogonDomainName.Buffer = (PWSTR) ((PBYTE)(KerbAuthInfo->UserName.Buffer) + KerbAuthInfo->UserName.MaximumLength);
lstrcpy(KerbAuthInfo->LogonDomainName.Buffer, Domain->Buffer);
//
// Copy the password into the authentication buffer
// Hide it once we have copied it. Use the same seed value
// that we used for the original password in pGlobals.
//
KerbAuthInfo->Password.Length = (USHORT) sizeof(TCHAR) * (USHORT) lstrlen(Password->Buffer);
KerbAuthInfo->Password.MaximumLength = KerbAuthInfo->Password.Length + sizeof(TCHAR);
KerbAuthInfo->Password.Buffer = (PWSTR) ((PBYTE)(KerbAuthInfo->LogonDomainName.Buffer) + KerbAuthInfo->LogonDomainName.MaximumLength); lstrcpy(KerbAuthInfo->Password.Buffer, Password->Buffer);
if ( Seed != 0 ) { HidePassword( &Seed, Password); }
HidePassword( &Seed, (PUNICODE_STRING) &KerbAuthInfo->Password);
*Size = AuthInfoSize ;
return KerbAuthInfo ; }
PVOID FormatSmartCardCredentials( PUNICODE_STRING Pin, PVOID SmartCardInfo, IN BOOLEAN Unlock, IN OPTIONAL PLUID LogonId, OUT PULONG Size ) { PKERB_SMART_CARD_LOGON KerbAuthInfo; ULONG AuthInfoSize; PSECURITY_SEED_AND_LENGTH SeedAndLength; UCHAR Seed; PULONG ScInfo ; PUCHAR Where ;
SeedAndLength = (PSECURITY_SEED_AND_LENGTH)(&Pin->Length); Seed = SeedAndLength->Seed;
//
// Build the authentication information buffer
//
ScInfo = (PULONG) SmartCardInfo ;
if (Seed != 0) { RevealPassword( Pin ); }
AuthInfoSize = sizeof( KERB_SMART_CARD_UNLOCK_LOGON ) + ROUND_UP_COUNT(Pin->Length + 2, 8) + *ScInfo ;
KerbAuthInfo = (PKERB_SMART_CARD_LOGON) LocalAlloc( LMEM_FIXED, AuthInfoSize );
if ( !KerbAuthInfo ) { return NULL ; }
if (Unlock) { ASSERT(ARGUMENT_PRESENT(LogonId)); KerbAuthInfo->MessageType = KerbSmartCardUnlockLogon ; ((PKERB_SMART_CARD_UNLOCK_LOGON) KerbAuthInfo)->LogonId = *LogonId; Where = (PUCHAR) (KerbAuthInfo) + sizeof(KERB_SMART_CARD_UNLOCK_LOGON) ; } else { KerbAuthInfo->MessageType = KerbSmartCardLogon ; Where = (PUCHAR) (KerbAuthInfo + 1) ; }
KerbAuthInfo->Pin.Buffer = (PWSTR) Where ; KerbAuthInfo->Pin.Length = Pin->Length ; KerbAuthInfo->Pin.MaximumLength = Pin->Length + 2 ;
RtlCopyMemory( Where, Pin->Buffer, Pin->Length + 2 );
Where += ROUND_UP_COUNT(Pin->Length + 2, 8) ;
if ( Seed != 0 ) { HidePassword( &Seed, Pin ); }
KerbAuthInfo->CspDataLength = *ScInfo ; KerbAuthInfo->CspData = Where ;
RtlCopyMemory( Where, SmartCardInfo, *ScInfo );
*Size = AuthInfoSize ;
return KerbAuthInfo ;
}
/***************************************************************************\
* LogonUser * * Calls the Lsa to logon the specified user. * * The LogonSid and a LocalSid is added to the user's groups on successful logon * * For this release, password lengths are restricted to 255 bytes in length. * This allows us to use the upper byte of the String.Length field to * carry a seed needed to decode the run-encoded password. If the password * is not run-encoded, the upper byte of the String.Length field should * be zero. * * NOTE: This function will LocalFree the passed in AuthInfo buffer. * * On successful return, LogonToken is a handle to the user's token, * the profile buffer contains user profile information. * * History: * 12-05-91 Davidc Created \***************************************************************************/ NTSTATUS WinLogonUser( IN HANDLE LsaHandle, IN ULONG AuthenticationPackage, IN SECURITY_LOGON_TYPE LogonType, IN PVOID AuthInfo, IN ULONG AuthInfoSize, IN PSID LogonSid, OUT PLUID LogonId, OUT PHANDLE LogonToken, OUT PQUOTA_LIMITS Quotas, OUT PVOID *pProfileBuffer, OUT PULONG pProfileBufferLength, OUT PNTSTATUS pSubStatus, OUT POPTIMIZED_LOGON_STATUS OptimizedLogonStatus ) { NTSTATUS Status; STRING OriginName; TOKEN_SOURCE SourceContext; PTOKEN_GROUPS TokenGroups = NULL; PMSV1_0_INTERACTIVE_PROFILE UserProfile; PWCHAR UserSidString; DWORD ErrorCode; DWORD LogonCacheable; DWORD DaysToCheck; DWORD DaysToExpiry; LARGE_INTEGER CurrentTime;
BOOLEAN UserLoggedOnUsingCache;
DebugLog((DEB_TRACE, " LsaHandle = %x\n", LsaHandle)); DebugLog((DEB_TRACE, " AuthenticationPackage = %d\n", AuthenticationPackage)); #if DBG
if (!RtlValidSid(LogonSid)) { DebugLog((DEB_ERROR, "LogonSid is invalid!\n")); Status = STATUS_INVALID_PARAMETER; goto cleanup; } #endif
//
// Initialize source context structure
//
strncpy(SourceContext.SourceName, "User32 ", sizeof(SourceContext.SourceName)); // LATER from res file
Status = NtAllocateLocallyUniqueId(&SourceContext.SourceIdentifier); if (!NT_SUCCESS(Status)) { DebugLog((DEB_ERROR, "failed to allocate locally unique id, status = 0x%lx", Status)); goto cleanup; }
//
// Get any run-encoding information out of the way
// and decode the password. This creates a window
// where the cleartext password will be in memory.
// Keep it short.
//
// Save the seed so we can use the same one again.
//
//
// Set logon origin
//
RtlInitString(&OriginName, "Winlogon");
//
// Create logon token groups
//
#define TOKEN_GROUP_COUNT 2 // We'll add the local SID and the logon SID
TokenGroups = (PTOKEN_GROUPS)Alloc(sizeof(TOKEN_GROUPS) + (TOKEN_GROUP_COUNT - ANYSIZE_ARRAY) * sizeof(SID_AND_ATTRIBUTES)); if (TokenGroups == NULL) { DebugLog((DEB_ERROR, "failed to allocate memory for token groups")); Status = STATUS_NO_MEMORY; goto cleanup; }
//
// Fill in the logon token group list
//
TokenGroups->GroupCount = TOKEN_GROUP_COUNT; TokenGroups->Groups[0].Sid = LogonSid; TokenGroups->Groups[0].Attributes = SE_GROUP_MANDATORY | SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT | SE_GROUP_LOGON_ID; TokenGroups->Groups[1].Sid = gLocalSid; TokenGroups->Groups[1].Attributes = SE_GROUP_MANDATORY | SE_GROUP_ENABLED | SE_GROUP_ENABLED_BY_DEFAULT;
//
// If logging on Interactive to the console, try cached logon first.
//
UserLoggedOnUsingCache = FALSE;
if (LogonType == Interactive) {
//
// Optimized logon that does not hit the network does not
// make sense for local logins.
//
if (IsMachineDomainMember()) {
Status = AttemptCachedLogon(LsaHandle, &OriginName, CachedInteractive, AuthenticationPackage, AuthInfo, AuthInfoSize, TokenGroups, &SourceContext, pProfileBuffer, pProfileBufferLength, LogonId, LogonToken, Quotas, pSubStatus, OptimizedLogonStatus);
if (NT_SUCCESS(Status)) {
UserLoggedOnUsingCache = TRUE;
//
// AttemptCachedLogon will take care of freeing AuthInfo.
//
AuthInfo = NULL; }
} else {
*OptimizedLogonStatus = OLS_MachineIsNotDomainMember; } } else {
*OptimizedLogonStatus = OLS_NonCachedLogonType; } //
// If we have not been able to log the user on using cached credentials,
// fall back to real network logon.
//
if (!UserLoggedOnUsingCache) {
Status = LsaLogonUser ( LsaHandle, &OriginName, LogonType, AuthenticationPackage, AuthInfo, AuthInfoSize, TokenGroups, &SourceContext, pProfileBuffer, pProfileBufferLength, LogonId, LogonToken, Quotas, pSubStatus );
}
#if 0
// If this failed it may be because we are doing a UPN logon. Try again
// with no domain
if (!NT_SUCCESS(Status)) { *pfUpnLogon = TRUE;
PKERB_INTERACTIVE_LOGON pinfo = (PKERB_INTERACTIVE_LOGON) AuthInfo;
// Null out domain string
pinfo->LogonDomainName.Length = 0; pinfo->LogonDomainName.Buffer[0] = 0;
Status = LsaLogonUser ( LsaHandle, &OriginName, LogonType, AuthenticationPackage, AuthInfo, AuthInfoSize, TokenGroups, &SourceContext, pProfileBuffer, pProfileBufferLength, LogonId, LogonToken, Quotas, pSubStatus ); } #endif
//
// If this was a successful login perform tasks for optimized logon
// maintenance.
//
if (NT_SUCCESS(Status)) {
UserProfile = *pProfileBuffer;
//
// Get user's SID in string form.
//
UserSidString = GcGetSidString(*LogonToken);
if (UserSidString) {
//
// Save whether we did an optimized logon or the reason why
// we did not.
//
GcSetOptimizedLogonStatus(UserSidString, *OptimizedLogonStatus);
//
// Check if this was a cached logon.
//
if (!(UserProfile->UserFlags & LOGON_CACHED_ACCOUNT)) { FgPolicyRefreshInfo UserPolicyRefreshInfo;
//
// If this is not a cached logon because user's profile
// does not allow it, we have to force group policy to
// apply synchronously.
//
ErrorCode = GcCheckIfProfileAllowsCachedLogon(&UserProfile->HomeDirectory, &UserProfile->ProfilePath, UserSidString, &LogonCacheable);
if (ErrorCode != ERROR_SUCCESS || !LogonCacheable) {
//
// If policy is already sync, leave it alone.
//
GetNextFgPolicyRefreshInfo( UserSidString, &UserPolicyRefreshInfo ); if ( UserPolicyRefreshInfo.mode == GP_ModeAsyncForeground ) { UserPolicyRefreshInfo.reason = GP_ReasonNonCachedCredentials; UserPolicyRefreshInfo.mode = GP_ModeSyncForeground; SetNextFgPolicyRefreshInfo( UserSidString, UserPolicyRefreshInfo ); } } //
// Determine if we should allow next logon to be optimized.
// We may have disallowed optimizing next logon via this
// mechanism because
// - Our background logon attempt failed e.g. password has
// changed, account has been disabled etc.
// - We are entering the password expiry warning period.
// When we do an optimized logon warning dialogs don't show
// because cached logon invents password expiry time field.
//
// We will allow optimized logon again if this was a non
// cached logon and user got authenticated by the DC, unless
// we are entering the password expiry warning period.
//
if (LogonType == Interactive) {
//
// Are we entering password expiry warning period?
//
GetSystemTimeAsFileTime((FILETIME*) &CurrentTime);
DaysToCheck = GetPasswordExpiryWarningPeriod();
if (GetDaysToExpiry(&CurrentTime, &UserProfile->PasswordMustChange, &DaysToExpiry)) {
if (DaysToExpiry > DaysToCheck) {
//
// We passed this check too. We can allow optimized
// logon next time. Note that, even if we allow it,
// policy, profile, logon scripts etc. might still
// disallow it!
//
GcSetNextLogonCacheable(UserSidString, TRUE); } } } }
GcDeleteSidString(UserSidString); } }
cleanup:
if (AuthInfo) { LocalFree(AuthInfo); }
if (TokenGroups) { Free(TokenGroups); }
return(Status); }
/***************************************************************************\
* EnablePrivilege * * Enables/disables the specified well-known privilege in the current thread * token if there is one, otherwise the current process token. * * Returns TRUE on success, FALSE on failure * * History: * 12-05-91 Davidc Created \***************************************************************************/ BOOL EnablePrivilege( ULONG Privilege, BOOL Enable ) { NTSTATUS Status; BOOLEAN WasEnabled;
//
// Try the thread token first
//
Status = RtlAdjustPrivilege(Privilege, (BOOLEAN)Enable, TRUE, &WasEnabled);
if (Status == STATUS_NO_TOKEN) {
//
// No thread token, use the process token
//
Status = RtlAdjustPrivilege(Privilege, (BOOLEAN)Enable, FALSE, &WasEnabled); }
if (!NT_SUCCESS(Status)) { DebugLog((DEB_ERROR, "Failed to %ws privilege : 0x%lx, status = 0x%lx", Enable ? TEXT("enable") : TEXT("disable"), Privilege, Status)); return(FALSE); }
return(TRUE); }
/***************************************************************************\
* TestTokenForAdmin * * Returns TRUE if the token passed represents an admin user, otherwise FALSE * * The token handle passed must have TOKEN_QUERY access. * * History: * 05-06-92 Davidc Created \***************************************************************************/ BOOL TestTokenForAdmin( HANDLE Token ) { BOOL FoundAdmin ; TOKEN_TYPE Type ; NTSTATUS Status ; ULONG Actual ; HANDLE ImpToken ;
Status = NtQueryInformationToken( Token, TokenType, (PVOID) &Type, sizeof( Type ), &Actual );
if ( !NT_SUCCESS( Status ) ) { return FALSE ; }
if ( Type == TokenPrimary ) { //
// Need an impersonation token for this:
//
if ( DuplicateTokenEx( Token, TOKEN_IMPERSONATE | TOKEN_READ, NULL, SecurityImpersonation, TokenImpersonation, &ImpToken ) ) { if ( !CheckTokenMembership( ImpToken, gAdminSid, &FoundAdmin ) ) { FoundAdmin = FALSE ; }
CloseHandle( ImpToken ); } else { FoundAdmin = FALSE ; }
} else { if ( !CheckTokenMembership( Token, gAdminSid, &FoundAdmin ) ) { FoundAdmin = FALSE ; }
}
return FoundAdmin ; }
/***************************************************************************\
* TestUserForAdmin * * Returns TRUE if the named user is an admin. This is done by attempting to * log the user on and examining their token. * * NOTE: The password will be erased upon return to prevent it from being * visually identifiable in a pagefile. * * History: * 03-16-92 Davidc Created \***************************************************************************/ BOOL TestUserForAdmin( PGLOBALS pGlobals, IN PWCHAR UserName, IN PWCHAR Domain, IN PUNICODE_STRING PasswordString ) { NTSTATUS Status, SubStatus, IgnoreStatus; UNICODE_STRING UserNameString; UNICODE_STRING DomainString; PVOID ProfileBuffer; ULONG ProfileBufferLength; QUOTA_LIMITS Quotas; HANDLE Token; BOOL UserIsAdmin; LUID LogonId; PVOID AuthInfo ; ULONG AuthInfoSize ;
RtlInitUnicodeString(&UserNameString, UserName); RtlInitUnicodeString(&DomainString, Domain);
//
// Temporarily log this new subject on and see if their groups
// contain the appropriate admin group
//
AuthInfo = FormatPasswordCredentials( &UserNameString, &DomainString, PasswordString, FALSE, // no unlock
NULL, // no logon id
&AuthInfoSize );
if ( !AuthInfo ) { return FALSE ; }
Status = WinLogonUser( pGlobals->LsaHandle, pGlobals->AuthenticationPackage, Interactive, AuthInfo, AuthInfoSize, pGlobals->LogonSid, // any sid will do
&LogonId, &Token, &Quotas, &ProfileBuffer, &ProfileBufferLength, &SubStatus, &pGlobals->OptimizedLogonStatus);
RtlEraseUnicodeString( PasswordString );
//
// If we couldn't log them on, they're not an admin
//
if (!NT_SUCCESS(Status)) { return(FALSE); }
//
// Free up the profile buffer
//
IgnoreStatus = LsaFreeReturnBuffer(ProfileBuffer); ASSERT(NT_SUCCESS(IgnoreStatus));
//
// See if the token represents an admin user
//
UserIsAdmin = TestTokenForAdmin(Token);
//
// We're finished with the token
//
IgnoreStatus = NtClose(Token); ASSERT(NT_SUCCESS(IgnoreStatus));
return(UserIsAdmin); }
BOOL UnlockLogon( PGLOBALS pGlobals, IN BOOL SmartCardUnlock, IN PWCHAR UserName, IN PWCHAR Domain, IN PUNICODE_STRING PasswordString, OUT PNTSTATUS pStatus, OUT PBOOL IsAdmin, OUT PBOOL IsLoggedOnUser, OUT PVOID *pProfileBuffer, OUT ULONG *pProfileBufferLength ) { NTSTATUS Status, SubStatus, IgnoreStatus; UNICODE_STRING UserNameString; UNICODE_STRING DomainString; QUOTA_LIMITS Quotas; HANDLE Token; HANDLE ImpToken ; LUID LogonId; PVOID AuthInfo ; ULONG AuthInfoSize ; ULONG SidSize ; UCHAR Buffer[ sizeof( TOKEN_USER ) + 8 + SID_MAX_SUB_AUTHORITIES * sizeof(DWORD) ]; PTOKEN_USER User ; PUCHAR SmartCardInfo ; PWLX_SC_NOTIFICATION_INFO ScInfo = NULL; PVOID LocalProfileBuffer = NULL; ULONG LocalProfileBufferLength;
#ifdef SMARTCARD_DOGFOOD
DWORD StartTime, EndTime; #endif
//
// Assume no admin
//
*IsAdmin = FALSE ; *IsLoggedOnUser = FALSE ;
//
// Bundle up the credentials for passing down to the auth pkgs:
//
if ( !SmartCardUnlock ) {
RtlInitUnicodeString(&UserNameString, UserName); RtlInitUnicodeString(&DomainString, Domain);
AuthInfo = FormatPasswordCredentials( &UserNameString, &DomainString, PasswordString, TRUE, // unlock
&pGlobals->LogonId, &AuthInfoSize );
} else { if ( !pWlxFuncs->WlxGetOption( pGlobals->hGlobalWlx, WLX_OPTION_SMART_CARD_INFO, (PULONG_PTR) &ScInfo ) ) { return FALSE ; }
if ( ScInfo == NULL ) { return FALSE ; }
SmartCardInfo = ScBuildLogonInfo( ScInfo->pszCard, ScInfo->pszReader, ScInfo->pszContainer, ScInfo->pszCryptoProvider );
#ifndef SMARTCARD_DOGFOOD
LocalFree(ScInfo); #endif
if ( SmartCardInfo == NULL ) { #ifdef SMARTCARD_DOGFOOD
LocalFree(ScInfo); #endif
return FALSE ; }
AuthInfo = FormatSmartCardCredentials( PasswordString, SmartCardInfo, TRUE, // unlock
&pGlobals->LogonId, &AuthInfoSize);
LocalFree( SmartCardInfo );
}
//
// Make sure that worked:
//
if ( !AuthInfo ) { #ifdef SMARTCARD_DOGFOOD
if (ScInfo) LocalFree(ScInfo); #endif
return FALSE ; }
#ifdef SMARTCARD_DOGFOOD
StartTime = GetTickCount(); #endif
//
// Initialize profile buffer
//
if ( !pProfileBuffer ) { pProfileBuffer = &LocalProfileBuffer; pProfileBufferLength = &LocalProfileBufferLength; }
SubStatus = 0;
Status = WinLogonUser( pGlobals->LsaHandle, ( SmartCardUnlock ? pGlobals->SmartCardLogonPackage : pGlobals->PasswordLogonPackage ), Unlock, AuthInfo, AuthInfoSize, pGlobals->LogonSid, // any sid will do
&LogonId, &Token, &Quotas, pProfileBuffer, pProfileBufferLength, &SubStatus, &pGlobals->OptimizedLogonStatus);
if (SmartCardUnlock) { switch (SubStatus) { case STATUS_SMARTCARD_WRONG_PIN: case STATUS_SMARTCARD_CARD_BLOCKED: case STATUS_SMARTCARD_CARD_NOT_AUTHENTICATED: case STATUS_SMARTCARD_NO_CARD: case STATUS_SMARTCARD_NO_KEY_CONTAINER: case STATUS_SMARTCARD_NO_CERTIFICATE: case STATUS_SMARTCARD_NO_KEYSET: case STATUS_SMARTCARD_IO_ERROR: case STATUS_SMARTCARD_CERT_EXPIRED: case STATUS_SMARTCARD_CERT_REVOKED: case STATUS_ISSUING_CA_UNTRUSTED: case STATUS_REVOCATION_OFFLINE_C: case STATUS_PKINIT_CLIENT_FAILURE: Status = SubStatus; break; } }
#ifdef SMARTCARD_DOGFOOD
EndTime = GetTickCount();
if (SmartCardUnlock) { AuthMonitor( AuthOperUnlock, g_Console, &pGlobals->UserNameString, &pGlobals->DomainString, (ScInfo ? ScInfo->pszCard : NULL), (ScInfo ? ScInfo->pszReader : NULL), (PKERB_SMART_CARD_PROFILE) pGlobals->Profile, EndTime - StartTime, Status ); }
if (ScInfo) LocalFree(ScInfo); #endif
//
// Do *NOT* erase the password string.
//
// RtlEraseUnicodeString( PasswordString );
if ( !NT_SUCCESS( Status ) ) { if ( Status == STATUS_ACCOUNT_RESTRICTION ) { Status = SubStatus ; } }
*pStatus = Status ;
//
// If we couldn't log them on, forget it.
//
if (!NT_SUCCESS(Status)) { return(FALSE); }
//
// No error check - if we can't tell if the user is an admin, then
// as far as we're concerned, he isn't.
//
*IsAdmin = TestTokenForAdmin( Token );
//
// Determine if this really is the logged on user:
//
User = (PTOKEN_USER) Buffer ;
Status = NtQueryInformationToken( Token, TokenUser, User, sizeof( Buffer ), &SidSize );
if ( NT_SUCCESS( Status ) ) { if ( pGlobals->UserProcessData.UserSid ) { if ( DuplicateToken( Token, SecurityImpersonation, &ImpToken ) ) { if ( !CheckTokenMembership(ImpToken, pGlobals->UserProcessData.UserSid, IsLoggedOnUser ) ) { *IsLoggedOnUser = FALSE ; }
NtClose( ImpToken ); } else { if ( RtlEqualSid( User->User.Sid, pGlobals->UserProcessData.UserSid ) ) { *IsLoggedOnUser = TRUE ; } else { *IsLoggedOnUser = FALSE ; } } } else { *IsLoggedOnUser = FALSE ; } }
//
// If we're using our local buffer pointer, free up the profile buffer
//
if ( LocalProfileBuffer ) { IgnoreStatus = LsaFreeReturnBuffer(LocalProfileBuffer);
ASSERT(NT_SUCCESS(IgnoreStatus)); }
//
// We're finished with the token
//
IgnoreStatus = NtClose(Token); ASSERT(NT_SUCCESS(IgnoreStatus));
return( TRUE ); }
/***************************************************************************\
* FUNCTION: ImpersonateUser * * PURPOSE: Impersonates the user by setting the users token * on the specified thread. If no thread is specified the token * is set on the current thread. * * RETURNS: Handle to be used on call to StopImpersonating() or NULL on failure * If a non-null thread handle was passed in, the handle returned will * be the one passed in. (See note) * * NOTES: Take care when passing in a thread handle and then calling * StopImpersonating() with the handle returned by this routine. * StopImpersonating() will close any thread handle passed to it - * even yours ! * * HISTORY: * * 04-21-92 Davidc Created. * \***************************************************************************/
HANDLE ImpersonateUser( PUSER_PROCESS_DATA UserProcessData, HANDLE ThreadHandle ) { NTSTATUS Status, IgnoreStatus; HANDLE UserToken = UserProcessData->UserToken; SECURITY_QUALITY_OF_SERVICE SecurityQualityOfService; OBJECT_ATTRIBUTES ObjectAttributes; HANDLE ImpersonationToken; BOOL ThreadHandleOpened = FALSE;
if (ThreadHandle == NULL) {
//
// Get a handle to the current thread.
// Once we have this handle, we can set the user's impersonation
// token into the thread and remove it later even though we ARE
// the user for the removal operation. This is because the handle
// contains the access rights - the access is not re-evaluated
// at token removal time.
//
Status = NtDuplicateObject( NtCurrentProcess(), // Source process
NtCurrentThread(), // Source handle
NtCurrentProcess(), // Target process
&ThreadHandle, // Target handle
THREAD_SET_THREAD_TOKEN,// Access
0L, // Attributes
DUPLICATE_SAME_ATTRIBUTES ); if (!NT_SUCCESS(Status)) { DebugLog((DEB_ERROR, "ImpersonateUser : Failed to duplicate thread handle, status = 0x%lx", Status)); return(NULL); }
ThreadHandleOpened = TRUE; }
//
// If the usertoken is NULL, there's nothing to do
//
if (UserToken != NULL) {
//
// UserToken is a primary token - create an impersonation token version
// of it so we can set it on our thread
//
InitializeObjectAttributes( &ObjectAttributes, NULL, 0L, NULL, UserProcessData->NewThreadTokenSD);
SecurityQualityOfService.Length = sizeof(SECURITY_QUALITY_OF_SERVICE); SecurityQualityOfService.ImpersonationLevel = SecurityImpersonation; SecurityQualityOfService.ContextTrackingMode = SECURITY_DYNAMIC_TRACKING; SecurityQualityOfService.EffectiveOnly = FALSE;
ObjectAttributes.SecurityQualityOfService = &SecurityQualityOfService;
Status = NtDuplicateToken( UserToken, TOKEN_IMPERSONATE | TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, &ObjectAttributes, FALSE, TokenImpersonation, &ImpersonationToken ); if (!NT_SUCCESS(Status)) {
DebugLog((DEB_ERROR, "Failed to duplicate users token to create impersonation thread, status = 0x%lx", Status));
if (ThreadHandleOpened) { IgnoreStatus = NtClose(ThreadHandle); ASSERT(NT_SUCCESS(IgnoreStatus)); }
return(NULL); }
//
// Set the impersonation token on this thread so we 'are' the user
//
Status = NtSetInformationThread( ThreadHandle, ThreadImpersonationToken, (PVOID)&ImpersonationToken, sizeof(ImpersonationToken) ); //
// We're finished with our handle to the impersonation token
//
IgnoreStatus = NtClose(ImpersonationToken); ASSERT(NT_SUCCESS(IgnoreStatus));
//
// Check we set the token on our thread ok
//
if (!NT_SUCCESS(Status)) {
DebugLog((DEB_ERROR, "Failed to set user impersonation token on winlogon thread, status = 0x%lx", Status));
if (ThreadHandleOpened) { IgnoreStatus = NtClose(ThreadHandle); ASSERT(NT_SUCCESS(IgnoreStatus)); }
return(NULL); } }
return(ThreadHandle);
}
/***************************************************************************\
* FUNCTION: StopImpersonating * * PURPOSE: Stops impersonating the client by removing the token on the * current thread. * * PARAMETERS: ThreadHandle - handle returned by ImpersonateUser() call. * * RETURNS: TRUE on success, FALSE on failure * * NOTES: If a thread handle was passed in to ImpersonateUser() then the * handle returned was one and the same. If this is passed to * StopImpersonating() the handle will be closed. Take care ! * * HISTORY: * * 04-21-92 Davidc Created. * \***************************************************************************/
BOOL StopImpersonating( HANDLE ThreadHandle ) { NTSTATUS Status, IgnoreStatus; HANDLE ImpersonationToken;
//
// Remove the user's token from our thread so we are 'ourself' again
//
ImpersonationToken = NULL;
Status = NtSetInformationThread( ThreadHandle, ThreadImpersonationToken, (PVOID)&ImpersonationToken, sizeof(ImpersonationToken) ); //
// We're finished with the thread handle
//
IgnoreStatus = NtClose(ThreadHandle); ASSERT(NT_SUCCESS(IgnoreStatus));
if (!NT_SUCCESS(Status)) { DebugLog((DEB_ERROR, "Failed to remove user impersonation token from winlogon thread, status = 0x%lx", Status)); }
return(NT_SUCCESS(Status)); }
/***************************************************************************\
* TestUserPrivilege * * Looks at the user token to determine if they have the specified privilege * * Returns TRUE if the user has the privilege, otherwise FALSE * * History: * 04-21-92 Davidc Created \***************************************************************************/ BOOL TestUserPrivilege( HANDLE UserToken, ULONG Privilege ) { NTSTATUS Status; NTSTATUS IgnoreStatus; BOOL TokenOpened; LUID LuidPrivilege; LUID TokenPrivilege; PTOKEN_PRIVILEGES Privileges; ULONG BytesRequired; ULONG i; BOOL Found;
TokenOpened = FALSE;
//
// If the token is NULL, get a token for the current process since
// this is the token that will be inherited by new processes.
//
if (UserToken == NULL) {
Status = NtOpenProcessToken( NtCurrentProcess(), TOKEN_QUERY, &UserToken ); if (!NT_SUCCESS(Status)) { DebugLog((DEB_ERROR, "Can't open own process token for token_query access")); return(FALSE); }
TokenOpened = TRUE; }
//
// Find out how much memory we need to allocate
//
Status = NtQueryInformationToken( UserToken, // Handle
TokenPrivileges, // TokenInformationClass
NULL, // TokenInformation
0, // TokenInformationLength
&BytesRequired // ReturnLength
);
if (Status != STATUS_BUFFER_TOO_SMALL) {
if (!NT_SUCCESS(Status)) { DebugLog((DEB_ERROR, "Failed to query privileges from user token, status = 0x%lx", Status)); }
if (TokenOpened) { IgnoreStatus = NtClose(UserToken); ASSERT(NT_SUCCESS(IgnoreStatus)); }
return(FALSE); }
//
// Allocate space for the privilege array
//
Privileges = Alloc(BytesRequired); if (Privileges == NULL) {
DebugLog((DEB_ERROR, "Failed to allocate memory for user privileges"));
if (TokenOpened) { IgnoreStatus = NtClose(UserToken); ASSERT(NT_SUCCESS(IgnoreStatus)); }
return(FALSE); }
//
// Read in the user privileges
//
Status = NtQueryInformationToken( UserToken, // Handle
TokenPrivileges, // TokenInformationClass
Privileges, // TokenInformation
BytesRequired, // TokenInformationLength
&BytesRequired // ReturnLength
);
//
// We're finished with the token handle
//
if (TokenOpened) { IgnoreStatus = NtClose(UserToken); ASSERT(NT_SUCCESS(IgnoreStatus)); }
//
// See if we got the privileges
//
if (!NT_SUCCESS(Status)) {
DebugLog((DEB_ERROR, "Failed to query privileges from user token"));
Free(Privileges);
return(FALSE); }
//
// See if the user has the privilege we're looking for.
//
LuidPrivilege = RtlConvertLongToLuid(Privilege); Found = FALSE;
for (i=0; i<Privileges->PrivilegeCount; i++) {
TokenPrivilege = *((LUID UNALIGNED *) &Privileges->Privileges[i].Luid); if (RtlEqualLuid(&TokenPrivilege, &LuidPrivilege)) { Found = TRUE; break; }
}
Free(Privileges);
return(Found); }
/***************************************************************************\
* FUNCTION: HidePassword * * PURPOSE: Run-encodes the password so that it is not very visually * distinguishable. This is so that if it makes it to a * paging file, it wont be obvious. * * if pGlobals->Seed is zero, then we will allocate and assign * a seed value. Otherwise, the existing seed value is used. * * WARNING - This routine will use the upper portion of the * password's length field to store the seed used in encoding * password. Be careful you don't pass such a string to * a routine that looks at the length (like and RPC routine). * * * RETURNS: (None) * * NOTES: * * HISTORY: * * 04-27-93 JimK Created. * \***************************************************************************/ VOID HidePassword( PUCHAR Seed OPTIONAL, PUNICODE_STRING Password ) { PSECURITY_SEED_AND_LENGTH SeedAndLength;
UCHAR LocalSeed;
//
// If no seed address passed, use our own local seed buffer
//
if (Seed == NULL) { Seed = &LocalSeed; LocalSeed = 0; }
SeedAndLength = (PSECURITY_SEED_AND_LENGTH)&Password->Length; //ASSERT(*((LPWCH)SeedAndLength+Password->Length) == 0);
ASSERT((SeedAndLength->Seed) == 0);
RtlRunEncodeUnicodeString( Seed, Password );
SeedAndLength->Seed = (*Seed); return; }
/***************************************************************************\
* FUNCTION: RevealPassword * * PURPOSE: Reveals a previously hidden password so that it * is plain text once again. * * RETURNS: (None) * * NOTES: * * HISTORY: * * 04-27-93 JimK Created. * \***************************************************************************/ VOID RevealPassword( PUNICODE_STRING HiddenPassword ) { PSECURITY_SEED_AND_LENGTH SeedAndLength;
UCHAR Seed;
SeedAndLength = (PSECURITY_SEED_AND_LENGTH)&HiddenPassword->Length; Seed = SeedAndLength->Seed; SeedAndLength->Seed = 0;
RtlRunDecodeUnicodeString( Seed, HiddenPassword );
return; }
/***************************************************************************\
* FUNCTION: ErasePassword * * PURPOSE: zeros a password that is no longer needed. * * RETURNS: (None) * * NOTES: * * HISTORY: * * 04-27-93 JimK Created. * \***************************************************************************/ VOID ErasePassword( PUNICODE_STRING Password ) { PSECURITY_SEED_AND_LENGTH SeedAndLength;
SeedAndLength = (PSECURITY_SEED_AND_LENGTH)&Password->Length; SeedAndLength->Seed = 0;
RtlEraseUnicodeString( Password );
return;
}
VOID HashPassword( PUNICODE_STRING Password, PUCHAR HashBuffer ) { MD5_CTX Context ;
MD5Init( &Context ); MD5Update( &Context, (PUCHAR) Password->Buffer, Password->Length ); MD5Update( &Context, (PUCHAR) PASSWORD_HASH_STRING, sizeof( PASSWORD_HASH_STRING ) ); MD5Final( &Context );
RtlCopyMemory( HashBuffer, Context.digest, MD5DIGESTLEN );
}
/***************************************************************************\
* AttemptCachedLogon * * Checks to see if we are allowed to use cached credentials to log the user * in fast, and does so. * * Parameters are the same list of parameters passed to LsaLogonUser. * * On successful return, LogonToken is a handle to the user's token, * the profile buffer contains user profile information. * * History: * 03-23-01 Cenke Created \***************************************************************************/ NTSTATUS AttemptCachedLogon( HANDLE LsaHandle, PLSA_STRING OriginName, SECURITY_LOGON_TYPE LogonType, ULONG AuthenticationPackage, PVOID AuthenticationInformation, ULONG AuthenticationInformationLength, PTOKEN_GROUPS LocalGroups, PTOKEN_SOURCE SourceContext, PVOID *ProfileBuffer, PULONG ProfileBufferLength, PLUID LogonId, PHANDLE UserToken, PQUOTA_LIMITS Quotas, PNTSTATUS SubStatus, POPTIMIZED_LOGON_STATUS OptimizedLogonStatus ) { PWCHAR UserSidString; PMSV1_0_INTERACTIVE_PROFILE UserProfile; FgPolicyRefreshInfo UserPolicyRefreshInfo; PBACKGROUND_LOGON_PARAMETERS LogonParameters; OSVERSIONINFOEXW OsVersion; NTSTATUS Status; DWORD ErrorCode; BOOL Success; DWORD NextLogonCacheable; BOOLEAN UserLoggedOn; BOOL RunSynchronous;
//
// Initialize locals.
//
UserSidString = NULL; UserLoggedOn = FALSE; LogonParameters = NULL; *OptimizedLogonStatus = OLS_Unspecified; //
// Verify parameters.
//
ASSERT(LogonType == CachedInteractive);
//
// Check if SKU allows cached interactive logons.
//
ZeroMemory(&OsVersion, sizeof(OsVersion)); OsVersion.dwOSVersionInfoSize = sizeof(OsVersion); Status = RtlGetVersion((POSVERSIONINFOW)&OsVersion);
if (!NT_SUCCESS(Status)) { *OptimizedLogonStatus = OLS_UnsupportedSKU; goto cleanup; }
if (OsVersion.wProductType != VER_NT_WORKSTATION) { Status = STATUS_NOT_SUPPORTED; *OptimizedLogonStatus = OLS_UnsupportedSKU; goto cleanup; }
//
// Attempt a cached logon.
//
Status = LsaLogonUser(LsaHandle, OriginName, LogonType, AuthenticationPackage, AuthenticationInformation, AuthenticationInformationLength, LocalGroups, SourceContext, ProfileBuffer, ProfileBufferLength, LogonId, UserToken, Quotas, SubStatus);
//
// If cached logon was not successful we cannot continue.
//
if (!NT_SUCCESS(Status)) { *OptimizedLogonStatus = OLS_LogonFailed; goto cleanup; }
UserLoggedOn = TRUE;
//
// Get user's SID.
//
UserSidString = GcGetSidString(*UserToken);
if (!UserSidString) { Status = STATUS_INSUFFICIENT_RESOURCES; *OptimizedLogonStatus = OLS_InsufficientResources; goto cleanup; }
//
// Check if in last logon of this user we determined we cannot do
// a cached logon this time.
//
ErrorCode = GcGetNextLogonCacheable(UserSidString, &NextLogonCacheable);
if (ErrorCode == ERROR_SUCCESS && !NextLogonCacheable) { Status = STATUS_NOT_SUPPORTED; *OptimizedLogonStatus = OLS_NextLogonNotCacheable; goto cleanup; }
//
// Does policy allow cached logons on this machine for the user?
//
if (IsSyncForegroundPolicyRefresh(FALSE, *UserToken)) { Status = STATUS_NOT_SUPPORTED; *OptimizedLogonStatus = OLS_SyncMachinePolicy; goto cleanup; }
//
// Check if policy allows cached logon for this user.
//
ErrorCode = GetNextFgPolicyRefreshInfo(UserSidString, &UserPolicyRefreshInfo);
if (ErrorCode != ERROR_SUCCESS || UserPolicyRefreshInfo.mode != GP_ModeAsyncForeground) {
Status = STATUS_NOT_SUPPORTED; *OptimizedLogonStatus = OLS_SyncUserPolicy; goto cleanup; }
//
// Check if user profile does not support default cached logons.
// e.g if the user has a remote home directory or a roaming profile etc.
//
UserProfile = *ProfileBuffer;
ErrorCode = GcCheckIfProfileAllowsCachedLogon(&UserProfile->HomeDirectory, &UserProfile->ProfilePath, UserSidString, &NextLogonCacheable);
if (ErrorCode != ERROR_SUCCESS || !NextLogonCacheable) { Status = STATUS_NOT_SUPPORTED; *OptimizedLogonStatus = OLS_ProfileDisallows; goto cleanup; }
//
// Check if logon scripts are set to run synchronously.
//
RunSynchronous = GcCheckIfLogonScriptsRunSync(UserSidString);
if (RunSynchronous) { Status = STATUS_NOT_SUPPORTED; *OptimizedLogonStatus = OLS_SyncLogonScripts; goto cleanup; }
//
// We are fine to run with cached logon. We still need to launch a work
// item to do a real interactive logon that will update the cache.
//
LogonParameters = Alloc(sizeof(*LogonParameters));
if (!LogonParameters) { Status = STATUS_INSUFFICIENT_RESOURCES; *OptimizedLogonStatus = OLS_InsufficientResources; goto cleanup; }
//
// Initialize the structure so we know what to cleanup.
//
ZeroMemory(LogonParameters, sizeof(*LogonParameters));
LogonParameters->LsaHandle = LsaHandle;
//
// Hand over the allocated UserSidString to background logon to cleanup.
//
LogonParameters->UserSidString = UserSidString; UserSidString = NULL;
//
// Hand over AuthenticationInfo structure to background logon.
// The password is already hidden.
//
LogonParameters->AuthenticationPackage = AuthenticationPackage; LogonParameters->AuthenticationInformationLength = AuthenticationInformationLength;
//
// Background logon will use the authentication information and free it.
//
LogonParameters->AuthenticationInformation = AuthenticationInformation;
//
// Queue a work item to perform the background logon to update the cache.
// This background "logon" has nothing to do with the current user
// successfully logging on, logging off etc. So we don't have to monitor
// those. All it does is to update the cache.
//
Success = QueueUserWorkItem(BackgroundLogonWorker, LogonParameters, WT_EXECUTELONGFUNCTION);
if (!Success) {
//
// We want to back out from the cached logon if we could not queue
// an actual logon to update the cache for the next time.
//
Status = STATUS_INSUFFICIENT_RESOURCES; *OptimizedLogonStatus = OLS_InsufficientResources; goto cleanup; }
//
// We are done.
//
Status = STATUS_SUCCESS; *OptimizedLogonStatus = OLS_LogonIsCached;
cleanup:
if (!NT_SUCCESS(Status)) { //
// If we failed after logging on the user using cached credentials,
// we have to cleanup.
//
if (UserLoggedOn) {
//
// Close the user's token.
//
CloseHandle(*UserToken); //
// Free the profile buffer.
//
if (*ProfileBuffer) { LsaFreeReturnBuffer(*ProfileBuffer); } }
if (LogonParameters) {
if (LogonParameters->UserSidString) { GcDeleteSidString(LogonParameters->UserSidString); }
Free(LogonParameters); } }
if (UserSidString) { GcDeleteSidString(UserSidString); }
return Status; }
/***************************************************************************\
* BackgroundLogonWorker * * If the actual interactive logon was performed using cached credentials * because of policy, this workitem is queued to perform an actual network * logon to update the cached information in the security packages. * * Authentication information to perform the logon is passed in as the * parameter and must be freed when the thread is done. * * History: * 03-23-01 Cenke Created \***************************************************************************/ DWORD BackgroundLogonWorker( PBACKGROUND_LOGON_PARAMETERS LogonParameters ) { PMSV1_0_INTERACTIVE_PROFILE Profile; HANDLE UserToken; LSA_STRING OriginName; TOKEN_SOURCE SourceContext; QUOTA_LIMITS Quotas; PSECURITY_LOGON_SESSION_DATA LogonSessionData; LUID LogonId; NTSTATUS SubStatus; NTSTATUS Status; DWORD ErrorCode; ULONG ProfileBufferLength; ULONG NameBufferNumChars; static LONG LogonServicesStarted = 0; DWORD MaxWaitTime; BOOLEAN UserLoggedOn; BOOLEAN ImpersonatingUser; WCHAR NameBuffer[UNLEN + 1]; DWORD DaysToCheck; DWORD DaysToExpiry; LARGE_INTEGER CurrentTime; //
// Initialize locals.
//
Profile = NULL; RtlInitString(&OriginName, "Winlogon-Background"); LogonSessionData = NULL; ZeroMemory(&SourceContext, sizeof(SourceContext)); strncpy(SourceContext.SourceName, "GinaBkg", TOKEN_SOURCE_LENGTH); UserLoggedOn = FALSE; ImpersonatingUser = FALSE; NameBufferNumChars = sizeof(NameBuffer) / sizeof(NameBuffer[0]);
//
// Verify parameters.
//
ASSERT(LogonParameters); ASSERT(LogonParameters->AuthenticationInformation); ASSERT(LogonParameters->UserSidString); //
// Make sure workstation and netlogon services have started.
//
if (!LogonServicesStarted) {
MaxWaitTime = 120000; // 2 minutes.
GcWaitForServiceToStart(SERVICE_WORKSTATION, MaxWaitTime); GcWaitForServiceToStart(SERVICE_NETLOGON, MaxWaitTime);
LogonServicesStarted = 1; }
//
// Try to log the user in to initiate update of cached credentials.
//
Status = LsaLogonUser(LogonParameters->LsaHandle, &OriginName, Interactive, LogonParameters->AuthenticationPackage, LogonParameters->AuthenticationInformation, LogonParameters->AuthenticationInformationLength, NULL, &SourceContext, &(PVOID)Profile, &ProfileBufferLength, &LogonId, &UserToken, &Quotas, &SubStatus);
if (!NT_SUCCESS(Status)) {
//
// If the error is real we will force non-cached logon next time.
//
if (Status != STATUS_NO_LOGON_SERVERS) { GcSetNextLogonCacheable(LogonParameters->UserSidString, FALSE); }
ErrorCode = LsaNtStatusToWinError(Status); goto cleanup; }
UserLoggedOn = TRUE;
//
// Did we actually end up doing a cached logon?
//
if (Profile->UserFlags & LOGON_CACHED_ACCOUNT) {
//
// We are done, just cleanup.
//
ErrorCode = ERROR_SUCCESS; goto cleanup; }
//
// If we are entering the password expiry warning period, disable optimized
// logon for next time so warning dialogs get shown. Otherwise for cached
// logons password expiry date gets invented to be forever in future.
//
if (Profile) {
GetSystemTimeAsFileTime((FILETIME*) &CurrentTime);
DaysToCheck = GetPasswordExpiryWarningPeriod();
if (GetDaysToExpiry(&CurrentTime, &Profile->PasswordMustChange, &DaysToExpiry)) {
if (DaysToCheck >= DaysToExpiry) { GcSetNextLogonCacheable(LogonParameters->UserSidString, FALSE); } } }
//
// Make a GetUserName call to update the user name cache. Ignore errors.
//
if (!ImpersonateLoggedOnUser(UserToken)) { ErrorCode = GetLastError(); goto cleanup; }
ImpersonatingUser = TRUE;
GetUserNameEx(NameSamCompatible, NameBuffer, &NameBufferNumChars);
//
// We are done.
//
ErrorCode = ERROR_SUCCESS;
cleanup:
//
// Stop impersonation.
//
if (ImpersonatingUser) { RevertToSelf(); }
//
// Cleanup passed in LogonParameters.
//
LocalFree(LogonParameters->AuthenticationInformation); Free(LogonParameters->UserSidString); Free(LogonParameters);
//
// If the user logged on, cleanup.
//
if (UserLoggedOn) { CloseHandle(UserToken); if (Profile) { LsaFreeReturnBuffer(Profile); } }
if (LogonSessionData) { LsaFreeReturnBuffer(LogonSessionData); }
return ErrorCode; }
|