first stab at impersonation

This commit is contained in:
Casey Bodley 2010-10-12 10:02:20 -04:00
parent d136756272
commit a0cda354be
4 changed files with 21 additions and 26 deletions

View file

@ -39,7 +39,7 @@
#define NFS41_MAX_COMPONENT_SIZE 64 #define NFS41_MAX_COMPONENT_SIZE 64
#define UPCALL_BUF_SIZE 1024 + SECURITY_MAX_SID_SIZE #define UPCALL_BUF_SIZE 1024
/* MaximumComponentNameLength reported for FileFsAttributeInformation */ /* MaximumComponentNameLength reported for FileFsAttributeInformation */
#define NFS41_MAX_COMPONENT_LEN 64 #define NFS41_MAX_COMPONENT_LEN 64

View file

@ -123,11 +123,8 @@ int upcall_parse(
if (status) goto out; if (status) goto out;
status = safe_read(&buffer, &length, &upcall->opcode, sizeof(uint32_t)); status = safe_read(&buffer, &length, &upcall->opcode, sizeof(uint32_t));
if (status) goto out; if (status) goto out;
status = get_name(&buffer, &length, upcall->sid);
if (status) goto out;
dprintf(2, "xid=%d opcode=%s SID=%s\n", upcall->xid, dprintf(2, "xid=%d opcode=%s\n", upcall->xid, opcode2string(upcall->opcode));
opcode2string(upcall->opcode), upcall->sid);
if (upcall->opcode >= g_upcall_op_table_size) { if (upcall->opcode >= g_upcall_op_table_size) {
status = ERROR_NOT_SUPPORTED; status = ERROR_NOT_SUPPORTED;

View file

@ -165,7 +165,6 @@ typedef struct __nfs41_upcall {
uint32_t status; uint32_t status;
uint32_t last_error; uint32_t last_error;
upcall_args args; upcall_args args;
char sid[SECURITY_MAX_SID_SIZE];
} nfs41_upcall; } nfs41_upcall;

View file

@ -115,7 +115,7 @@ typedef struct _updowncall_entry {
KEVENT cond; KEVENT cond;
DWORD errno; DWORD errno;
BOOLEAN async_op; BOOLEAN async_op;
UNICODE_STRING sid; SECURITY_CLIENT_CONTEXT sec_ctx;
union { union {
struct { struct {
PUNICODE_STRING srv_name; PUNICODE_STRING srv_name;
@ -415,8 +415,7 @@ NTSTATUS marshal_nfs41_header(nfs41_updowncall_entry *entry,
ULONG header_len = 0; ULONG header_len = 0;
unsigned char *tmp = buf; unsigned char *tmp = buf;
header_len = sizeof(entry->xid) + sizeof(entry->opcode) + entry->sid.Length + header_len = sizeof(entry->xid) + sizeof(entry->opcode);
sizeof(entry->sid.Length);
if (header_len > buf_len) { if (header_len > buf_len) {
status = STATUS_INSUFFICIENT_RESOURCES; status = STATUS_INSUFFICIENT_RESOURCES;
goto out; goto out;
@ -426,13 +425,8 @@ NTSTATUS marshal_nfs41_header(nfs41_updowncall_entry *entry,
RtlCopyMemory(tmp, &entry->xid, sizeof(entry->xid)); RtlCopyMemory(tmp, &entry->xid, sizeof(entry->xid));
tmp += sizeof(xid); tmp += sizeof(xid);
RtlCopyMemory(tmp, &entry->opcode, sizeof(entry->opcode)); RtlCopyMemory(tmp, &entry->opcode, sizeof(entry->opcode));
tmp += sizeof(entry->opcode);
RtlCopyMemory(tmp, &entry->sid.Length, sizeof(entry->sid.Length)); DbgP("[upcall] entry=%p xid=%d opcode=%d\n", entry, entry->xid, entry->opcode);
tmp += sizeof(entry->sid.Length);
RtlCopyMemory(tmp, entry->sid.Buffer, entry->sid.Length);
DbgP("[upcall] entry=%p xid=%d opcode=%d SID=%wZ\n", entry, entry->xid,
entry->opcode, entry->sid);
RtlFreeUnicodeString(&entry->sid);
out: out:
return status; return status;
} }
@ -1047,6 +1041,10 @@ handle_upcall(
ULONG cbOut = LowIoContext->ParamsFor.IoCtl.OutputBufferLength; ULONG cbOut = LowIoContext->ParamsFor.IoCtl.OutputBufferLength;
unsigned char *pbOut = LowIoContext->ParamsFor.IoCtl.pOutputBuffer; unsigned char *pbOut = LowIoContext->ParamsFor.IoCtl.pOutputBuffer;
status = SeImpersonateClientEx(&entry->sec_ctx, NULL);
if (status != STATUS_SUCCESS)
DbgP("SeImpersonateClientEx failed %x\n", status);
switch(entry->opcode) { switch(entry->opcode) {
case NFS41_SHUTDOWN: case NFS41_SHUTDOWN:
status = marshal_nfs41_shutdown(entry, pbOut, cbOut, len); status = marshal_nfs41_shutdown(entry, pbOut, cbOut, len);
@ -1109,9 +1107,8 @@ NTSTATUS nfs41_UpcallCreate(
{ {
NTSTATUS status = STATUS_SUCCESS; NTSTATUS status = STATUS_SUCCESS;
nfs41_updowncall_entry *entry; nfs41_updowncall_entry *entry;
PACCESS_TOKEN token = NULL;
PTOKEN_USER user = NULL;
SECURITY_SUBJECT_CONTEXT sec_ctx; SECURITY_SUBJECT_CONTEXT sec_ctx;
SECURITY_QUALITY_OF_SERVICE sec_qos;
entry = RxAllocatePoolWithTag(NonPagedPool, sizeof(nfs41_updowncall_entry), entry = RxAllocatePoolWithTag(NonPagedPool, sizeof(nfs41_updowncall_entry),
NFS41_MM_POOLTAG); NFS41_MM_POOLTAG);
@ -1129,14 +1126,15 @@ NTSTATUS nfs41_UpcallCreate(
ExInitializeFastMutex(&entry->lock); ExInitializeFastMutex(&entry->lock);
SeCaptureSubjectContext(&sec_ctx); SeCaptureSubjectContext(&sec_ctx);
token = SeQuerySubjectContextToken(&sec_ctx); sec_qos.ContextTrackingMode = SECURITY_DYNAMIC_TRACKING;
status = SeQueryInformationToken(token, TokenUser, &user); sec_qos.ImpersonationLevel = SecurityImpersonation;
if (status == STATUS_SUCCESS) { sec_qos.Length = sizeof(SECURITY_QUALITY_OF_SERVICE);
status = RtlConvertSidToUnicodeString(&entry->sid, user->User.Sid, 1); sec_qos.EffectiveOnly = 0;
DbgP("[upcall] SID = %wZ", &entry->sid); status = SeCreateClientSecurityFromSubjectContext(&sec_ctx, &sec_qos, 1, &entry->sec_ctx);
ExFreePool(user); if (status != STATUS_SUCCESS) {
} else DbgP("SeCreateClientSecurityFromSubjectContext failed with %x\n", status);
DbgP("SeQueryInformationToken failed %d\n", status); RxFreePool(entry);
}
SeReleaseSubjectContext(&sec_ctx); SeReleaseSubjectContext(&sec_ctx);
*entry_out = entry; *entry_out = entry;
@ -1387,6 +1385,7 @@ nfs41_downcall (
} }
} }
DbgP("[downcall] About to signal waiting IO thread\n"); DbgP("[downcall] About to signal waiting IO thread\n");
SeDeleteClientSecurity(&cur->sec_ctx);
ExReleaseFastMutex(&cur->lock); ExReleaseFastMutex(&cur->lock);
if (cur->async_op) { if (cur->async_op) {
if (cur->status == STATUS_SUCCESS) { if (cur->status == STATUS_SUCCESS) {