diff mbox

cifs: set client time as MsvAvTimestamp from CHALLENGE_MESSAGE.TargetInfo

Message ID 001301cfc025$940767f0$bc1637d0$@samsung.com (mailing list archive)
State New, archived
Headers show

Commit Message

Namjae Jeon Aug. 25, 2014, 5:29 a.m. UTC
Windows machine has extended security feature which refuse to allow
authentication when there is time difference between server time and
client time when ntlmv2 negotiation is used. This problem is prevalent
in embedded enviornment where system time is set to default 1970.

Modern servers send the server timestamp in the TargetInfo Av_Pair
structure in the challenge message [see MS-NLMP 2.2.2.1]
In [MS-NLMP 3.1.5.1.2] it is explicitly mentioned that the client must
use the server provided timestamp if present OR current time if it is
not.

Cc: Simo <simo@samba.org>
Signed-off-by: Namjae Jeon <namjae.jeon@samsung.com>
Signed-off-by: Ashish Sangwan <a.sangwan@samsung.com>
---
 fs/cifs/cifsencrypt.c |    6 ++++--
 fs/cifs/cifsglob.h    |    2 ++
 fs/cifs/sess.c        |   21 +++++++++++++++++++++
 3 files changed, 27 insertions(+), 2 deletions(-)

Comments

Simo Aug. 25, 2014, 1:12 p.m. UTC | #1
On Mon, 2014-08-25 at 14:29 +0900, Namjae Jeon wrote:
> Windows machine has extended security feature which refuse to allow
> authentication when there is time difference between server time and
> client time when ntlmv2 negotiation is used. This problem is prevalent
> in embedded enviornment where system time is set to default 1970.
> 
> Modern servers send the server timestamp in the TargetInfo Av_Pair
> structure in the challenge message [see MS-NLMP 2.2.2.1]
> In [MS-NLMP 3.1.5.1.2] it is explicitly mentioned that the client must
> use the server provided timestamp if present OR current time if it is
> not.
> 
> Cc: Simo <simo@samba.org>
> Signed-off-by: Namjae Jeon <namjae.jeon@samsung.com>
> Signed-off-by: Ashish Sangwan <a.sangwan@samsung.com>
> ---
>  fs/cifs/cifsencrypt.c |    6 ++++--
>  fs/cifs/cifsglob.h    |    2 ++
>  fs/cifs/sess.c        |   21 +++++++++++++++++++++
>  3 files changed, 27 insertions(+), 2 deletions(-)
> 
> diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c
> index 4934347..3ec44f8 100644
> --- a/fs/cifs/cifsencrypt.c
> +++ b/fs/cifs/cifsencrypt.c
> @@ -671,8 +671,10 @@ setup_ntlmv2_rsp(struct cifs_ses *ses, const struct nls_table *nls_cp)
>  			(ses->auth_key.response + CIFS_SESS_KEY_SIZE);
>  	ntlmv2->blob_signature = cpu_to_le32(0x00000101);
>  	ntlmv2->reserved = 0;
> -	/* Must be within 5 minutes of the server */
> -	ntlmv2->time = cpu_to_le64(cifs_UnixTimeToNT(CURRENT_TIME));
> +	if (ses->serverTime)
> +		ntlmv2->time = ses->serverTime;
> +	else
> +		ntlmv2->time = cpu_to_le64(cifs_UnixTimeToNT(CURRENT_TIME));
>  	get_random_bytes(&ntlmv2->client_chal, sizeof(ntlmv2->client_chal));
>  	ntlmv2->reserved2 = 0;
>  
> diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h
> index ce24c1f..1102822 100644
> --- a/fs/cifs/cifsglob.h
> +++ b/fs/cifs/cifsglob.h
> @@ -796,6 +796,8 @@ struct cifs_ses {
>  	enum securityEnum sectype; /* what security flavor was specified? */
>  	bool sign;		/* is signing required? */
>  	bool need_reconnect:1; /* connection reset, uid now invalid */
> +	__u64   serverTime;	/* Keeps a track of server time sent by server
> +				   during NTLM challenge in little endian */
>  #ifdef CONFIG_CIFS_SMB2
>  	__u16 session_flags;
>  	char smb3signingkey[SMB3_SIGN_KEY_SIZE]; /* for signing smb3 packets */
> diff --git a/fs/cifs/sess.c b/fs/cifs/sess.c
> index 07fe97a..0762377 100644
> --- a/fs/cifs/sess.c
> +++ b/fs/cifs/sess.c
> @@ -277,6 +277,26 @@ static void decode_ascii_ssetup(char **pbcc_area, __u16 bleft,
>  	cifs_dbg(FYI, "ascii: bytes left %d\n", bleft);
>  }
>  
> +static void
> +get_ntlmv2_server_time(struct cifs_ses *ses)
> +{
> +#define MsvAvEOL	0x0000
> +#define MsvAvTimestamp	0x0007
> +	char *payload = ses->auth_key.response;
> +	u16 AvId, AvLen;
> +
> +	do {
> +		AvId = le16_to_cpu(*payload);
> +		AvLen = le16_to_cpu(*(payload + sizeof(u16)));
> +		payload += AvLen + (2 * sizeof(u16));
> +	} while (AvId != MsvAvTimestamp && AvId != MsvAvEOL);
> +
> +	if (AvId == MsvAvTimestamp)
> +		memcpy(&(ses->serverTime), (payload - AvLen), sizeof(__u64));
> +	else
> +		ses->serverTime = 0;
> +}
> +
>  int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len,
>  				    struct cifs_ses *ses)
>  {
> @@ -322,6 +342,7 @@ int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len,
>  			return -ENOMEM;
>  		}
>  		ses->auth_key.len = tilen;
> +		get_ntlmv2_server_time(ses);
>  	}
>  
>  	return 0;

I'll let a cifs maintainer ack or nack the implementation, but from a
logic pov it looks good.

Simo.

--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Shirish Pargaonkar Aug. 25, 2014, 3:12 p.m. UTC | #2
On Mon, Aug 25, 2014 at 12:29 AM, Namjae Jeon <namjae.jeon@samsung.com> wrote:
> Windows machine has extended security feature which refuse to allow
> authentication when there is time difference between server time and
> client time when ntlmv2 negotiation is used. This problem is prevalent
> in embedded enviornment where system time is set to default 1970.
>
> Modern servers send the server timestamp in the TargetInfo Av_Pair
> structure in the challenge message [see MS-NLMP 2.2.2.1]
> In [MS-NLMP 3.1.5.1.2] it is explicitly mentioned that the client must
> use the server provided timestamp if present OR current time if it is
> not.
>
> Cc: Simo <simo@samba.org>
> Signed-off-by: Namjae Jeon <namjae.jeon@samsung.com>
> Signed-off-by: Ashish Sangwan <a.sangwan@samsung.com>
> ---
>  fs/cifs/cifsencrypt.c |    6 ++++--
>  fs/cifs/cifsglob.h    |    2 ++
>  fs/cifs/sess.c        |   21 +++++++++++++++++++++
>  3 files changed, 27 insertions(+), 2 deletions(-)
>
> diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c
> index 4934347..3ec44f8 100644
> --- a/fs/cifs/cifsencrypt.c
> +++ b/fs/cifs/cifsencrypt.c
> @@ -671,8 +671,10 @@ setup_ntlmv2_rsp(struct cifs_ses *ses, const struct nls_table *nls_cp)
>                         (ses->auth_key.response + CIFS_SESS_KEY_SIZE);
>         ntlmv2->blob_signature = cpu_to_le32(0x00000101);
>         ntlmv2->reserved = 0;
> -       /* Must be within 5 minutes of the server */
> -       ntlmv2->time = cpu_to_le64(cifs_UnixTimeToNT(CURRENT_TIME));
> +       if (ses->serverTime)
> +               ntlmv2->time = ses->serverTime;
> +       else
> +               ntlmv2->time = cpu_to_le64(cifs_UnixTimeToNT(CURRENT_TIME));
>         get_random_bytes(&ntlmv2->client_chal, sizeof(ntlmv2->client_chal));
>         ntlmv2->reserved2 = 0;
>
> diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h
> index ce24c1f..1102822 100644
> --- a/fs/cifs/cifsglob.h
> +++ b/fs/cifs/cifsglob.h
> @@ -796,6 +796,8 @@ struct cifs_ses {
>         enum securityEnum sectype; /* what security flavor was specified? */
>         bool sign;              /* is signing required? */
>         bool need_reconnect:1; /* connection reset, uid now invalid */
> +       __u64   serverTime;     /* Keeps a track of server time sent by server
> +                                  during NTLM challenge in little endian */
>  #ifdef CONFIG_CIFS_SMB2
>         __u16 session_flags;
>         char smb3signingkey[SMB3_SIGN_KEY_SIZE]; /* for signing smb3 packets */
> diff --git a/fs/cifs/sess.c b/fs/cifs/sess.c
> index 07fe97a..0762377 100644
> --- a/fs/cifs/sess.c
> +++ b/fs/cifs/sess.c
> @@ -277,6 +277,26 @@ static void decode_ascii_ssetup(char **pbcc_area, __u16 bleft,
>         cifs_dbg(FYI, "ascii: bytes left %d\n", bleft);
>  }
>
> +static void
> +get_ntlmv2_server_time(struct cifs_ses *ses)
> +{
> +#define MsvAvEOL       0x0000
> +#define MsvAvTimestamp 0x0007

This patch looks correct but we have these defines in ntlmssp.h.

> +       char *payload = ses->auth_key.response;
> +       u16 AvId, AvLen;
> +
> +       do {
> +               AvId = le16_to_cpu(*payload);
> +               AvLen = le16_to_cpu(*(payload + sizeof(u16)));
> +               payload += AvLen + (2 * sizeof(u16));
> +       } while (AvId != MsvAvTimestamp && AvId != MsvAvEOL);
> +
> +       if (AvId == MsvAvTimestamp)
> +               memcpy(&(ses->serverTime), (payload - AvLen), sizeof(__u64));
> +       else
> +               ses->serverTime = 0;
> +}
> +
>  int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len,
>                                     struct cifs_ses *ses)
>  {
> @@ -322,6 +342,7 @@ int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len,
>                         return -ENOMEM;
>                 }
>                 ses->auth_key.len = tilen;
> +               get_ntlmv2_server_time(ses);
>         }
>
>         return 0;
> --
> 1.7.7
>
> --
> To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Namjae Jeon Aug. 26, 2014, 12:19 a.m. UTC | #3
> > +
> >  int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len,
> >  				    struct cifs_ses *ses)
> >  {
> > @@ -322,6 +342,7 @@ int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len,
> >  			return -ENOMEM;
> >  		}
> >  		ses->auth_key.len = tilen;
> > +		get_ntlmv2_server_time(ses);
> >  	}
> >
> >  	return 0;
> 
> I'll let a cifs maintainer ack or nack the implementation, but from a
> logic pov it looks good.
Thanks for your review!
> 
> Simo.

--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Namjae Jeon Aug. 26, 2014, 12:20 a.m. UTC | #4
> On Mon, Aug 25, 2014 at 12:29 AM, Namjae Jeon <namjae.jeon@samsung.com> wrote:
> > Windows machine has extended security feature which refuse to allow
> > authentication when there is time difference between server time and
> > client time when ntlmv2 negotiation is used. This problem is prevalent
> > in embedded enviornment where system time is set to default 1970.
> >
> > Modern servers send the server timestamp in the TargetInfo Av_Pair
> > structure in the challenge message [see MS-NLMP 2.2.2.1]
> > In [MS-NLMP 3.1.5.1.2] it is explicitly mentioned that the client must
> > use the server provided timestamp if present OR current time if it is
> > not.
> >
> > Cc: Simo <simo@samba.org>
> > Signed-off-by: Namjae Jeon <namjae.jeon@samsung.com>
> > Signed-off-by: Ashish Sangwan <a.sangwan@samsung.com>
> > ---
> >  fs/cifs/cifsencrypt.c |    6 ++++--
> >  fs/cifs/cifsglob.h    |    2 ++
> >  fs/cifs/sess.c        |   21 +++++++++++++++++++++
> >  3 files changed, 27 insertions(+), 2 deletions(-)
> >
> > diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c
> > index 4934347..3ec44f8 100644
> > --- a/fs/cifs/cifsencrypt.c
> > +++ b/fs/cifs/cifsencrypt.c
> > @@ -671,8 +671,10 @@ setup_ntlmv2_rsp(struct cifs_ses *ses, const struct nls_table *nls_cp)
> >                         (ses->auth_key.response + CIFS_SESS_KEY_SIZE);
> >         ntlmv2->blob_signature = cpu_to_le32(0x00000101);
> >         ntlmv2->reserved = 0;
> > -       /* Must be within 5 minutes of the server */
> > -       ntlmv2->time = cpu_to_le64(cifs_UnixTimeToNT(CURRENT_TIME));
> > +       if (ses->serverTime)
> > +               ntlmv2->time = ses->serverTime;
> > +       else
> > +               ntlmv2->time = cpu_to_le64(cifs_UnixTimeToNT(CURRENT_TIME));
> >         get_random_bytes(&ntlmv2->client_chal, sizeof(ntlmv2->client_chal));
> >         ntlmv2->reserved2 = 0;
> >
> > diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h
> > index ce24c1f..1102822 100644
> > --- a/fs/cifs/cifsglob.h
> > +++ b/fs/cifs/cifsglob.h
> > @@ -796,6 +796,8 @@ struct cifs_ses {
> >         enum securityEnum sectype; /* what security flavor was specified? */
> >         bool sign;              /* is signing required? */
> >         bool need_reconnect:1; /* connection reset, uid now invalid */
> > +       __u64   serverTime;     /* Keeps a track of server time sent by server
> > +                                  during NTLM challenge in little endian */
> >  #ifdef CONFIG_CIFS_SMB2
> >         __u16 session_flags;
> >         char smb3signingkey[SMB3_SIGN_KEY_SIZE]; /* for signing smb3 packets */
> > diff --git a/fs/cifs/sess.c b/fs/cifs/sess.c
> > index 07fe97a..0762377 100644
> > --- a/fs/cifs/sess.c
> > +++ b/fs/cifs/sess.c
> > @@ -277,6 +277,26 @@ static void decode_ascii_ssetup(char **pbcc_area, __u16 bleft,
> >         cifs_dbg(FYI, "ascii: bytes left %d\n", bleft);
> >  }
> >
> > +static void
> > +get_ntlmv2_server_time(struct cifs_ses *ses)
> > +{
> > +#define MsvAvEOL       0x0000
> > +#define MsvAvTimestamp 0x0007
> 
> This patch looks correct but we have these defines in ntlmssp.h.
Okay, I will send v2 patch.
Thanks for your reivew!
> 

--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Steve French Aug. 26, 2014, 12:28 a.m. UTC | #5
Would be helpful as well to note in the patch description whether this
was observed so far only to Windows servers (or whether it affects
mounts to Samba as well e.g.)

On Mon, Aug 25, 2014 at 7:20 PM, Namjae Jeon <namjae.jeon@samsung.com> wrote:
>> On Mon, Aug 25, 2014 at 12:29 AM, Namjae Jeon <namjae.jeon@samsung.com> wrote:
>> > Windows machine has extended security feature which refuse to allow
>> > authentication when there is time difference between server time and
>> > client time when ntlmv2 negotiation is used. This problem is prevalent
>> > in embedded enviornment where system time is set to default 1970.
>> >
>> > Modern servers send the server timestamp in the TargetInfo Av_Pair
>> > structure in the challenge message [see MS-NLMP 2.2.2.1]
>> > In [MS-NLMP 3.1.5.1.2] it is explicitly mentioned that the client must
>> > use the server provided timestamp if present OR current time if it is
>> > not.
>> >
>> > Cc: Simo <simo@samba.org>
>> > Signed-off-by: Namjae Jeon <namjae.jeon@samsung.com>
>> > Signed-off-by: Ashish Sangwan <a.sangwan@samsung.com>
>> > ---
>> >  fs/cifs/cifsencrypt.c |    6 ++++--
>> >  fs/cifs/cifsglob.h    |    2 ++
>> >  fs/cifs/sess.c        |   21 +++++++++++++++++++++
>> >  3 files changed, 27 insertions(+), 2 deletions(-)
>> >
>> > diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c
>> > index 4934347..3ec44f8 100644
>> > --- a/fs/cifs/cifsencrypt.c
>> > +++ b/fs/cifs/cifsencrypt.c
>> > @@ -671,8 +671,10 @@ setup_ntlmv2_rsp(struct cifs_ses *ses, const struct nls_table *nls_cp)
>> >                         (ses->auth_key.response + CIFS_SESS_KEY_SIZE);
>> >         ntlmv2->blob_signature = cpu_to_le32(0x00000101);
>> >         ntlmv2->reserved = 0;
>> > -       /* Must be within 5 minutes of the server */
>> > -       ntlmv2->time = cpu_to_le64(cifs_UnixTimeToNT(CURRENT_TIME));
>> > +       if (ses->serverTime)
>> > +               ntlmv2->time = ses->serverTime;
>> > +       else
>> > +               ntlmv2->time = cpu_to_le64(cifs_UnixTimeToNT(CURRENT_TIME));
>> >         get_random_bytes(&ntlmv2->client_chal, sizeof(ntlmv2->client_chal));
>> >         ntlmv2->reserved2 = 0;
>> >
>> > diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h
>> > index ce24c1f..1102822 100644
>> > --- a/fs/cifs/cifsglob.h
>> > +++ b/fs/cifs/cifsglob.h
>> > @@ -796,6 +796,8 @@ struct cifs_ses {
>> >         enum securityEnum sectype; /* what security flavor was specified? */
>> >         bool sign;              /* is signing required? */
>> >         bool need_reconnect:1; /* connection reset, uid now invalid */
>> > +       __u64   serverTime;     /* Keeps a track of server time sent by server
>> > +                                  during NTLM challenge in little endian */
>> >  #ifdef CONFIG_CIFS_SMB2
>> >         __u16 session_flags;
>> >         char smb3signingkey[SMB3_SIGN_KEY_SIZE]; /* for signing smb3 packets */
>> > diff --git a/fs/cifs/sess.c b/fs/cifs/sess.c
>> > index 07fe97a..0762377 100644
>> > --- a/fs/cifs/sess.c
>> > +++ b/fs/cifs/sess.c
>> > @@ -277,6 +277,26 @@ static void decode_ascii_ssetup(char **pbcc_area, __u16 bleft,
>> >         cifs_dbg(FYI, "ascii: bytes left %d\n", bleft);
>> >  }
>> >
>> > +static void
>> > +get_ntlmv2_server_time(struct cifs_ses *ses)
>> > +{
>> > +#define MsvAvEOL       0x0000
>> > +#define MsvAvTimestamp 0x0007
>>
>> This patch looks correct but we have these defines in ntlmssp.h.
> Okay, I will send v2 patch.
> Thanks for your reivew!
>>
>
Namjae Jeon Aug. 26, 2014, 12:34 a.m. UTC | #6
> Would be helpful as well to note in the patch description whether this
> was observed so far only to Windows servers (or whether it affects
> mounts to Samba as well e.g.)
Okay, I will update patch description also. :)

Thanks.
> 
> On Mon, Aug 25, 2014 at 7:20 PM, Namjae Jeon <namjae.jeon@samsung.com> wrote:
> >> On Mon, Aug 25, 2014 at 12:29 AM, Namjae Jeon <namjae.jeon@samsung.com> wrote:
> >> > Windows machine has extended security feature which refuse to allow
> >> > authentication when there is time difference between server time and
> >> > client time when ntlmv2 negotiation is used. This problem is prevalent
> >> > in embedded enviornment where system time is set to default 1970.
> >> >
> >> > Modern servers send the server timestamp in the TargetInfo Av_Pair
> >> > structure in the challenge message [see MS-NLMP 2.2.2.1]
> >> > In [MS-NLMP 3.1.5.1.2] it is explicitly mentioned that the client must
> >> > use the server provided timestamp if present OR current time if it is
> >> > not.
> >> >
> >> > Cc: Simo <simo@samba.org>
> >> > Signed-off-by: Namjae Jeon <namjae.jeon@samsung.com>
> >> > Signed-off-by: Ashish Sangwan <a.sangwan@samsung.com>
> >> > ---
> >> >  fs/cifs/cifsencrypt.c |    6 ++++--
> >> >  fs/cifs/cifsglob.h    |    2 ++
> >> >  fs/cifs/sess.c        |   21 +++++++++++++++++++++
> >> >  3 files changed, 27 insertions(+), 2 deletions(-)
> >> >
> >> > diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c
> >> > index 4934347..3ec44f8 100644
> >> > --- a/fs/cifs/cifsencrypt.c
> >> > +++ b/fs/cifs/cifsencrypt.c
> >> > @@ -671,8 +671,10 @@ setup_ntlmv2_rsp(struct cifs_ses *ses, const struct nls_table *nls_cp)
> >> >                         (ses->auth_key.response + CIFS_SESS_KEY_SIZE);
> >> >         ntlmv2->blob_signature = cpu_to_le32(0x00000101);
> >> >         ntlmv2->reserved = 0;
> >> > -       /* Must be within 5 minutes of the server */
> >> > -       ntlmv2->time = cpu_to_le64(cifs_UnixTimeToNT(CURRENT_TIME));
> >> > +       if (ses->serverTime)
> >> > +               ntlmv2->time = ses->serverTime;
> >> > +       else
> >> > +               ntlmv2->time = cpu_to_le64(cifs_UnixTimeToNT(CURRENT_TIME));
> >> >         get_random_bytes(&ntlmv2->client_chal, sizeof(ntlmv2->client_chal));
> >> >         ntlmv2->reserved2 = 0;
> >> >
> >> > diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h
> >> > index ce24c1f..1102822 100644
> >> > --- a/fs/cifs/cifsglob.h
> >> > +++ b/fs/cifs/cifsglob.h
> >> > @@ -796,6 +796,8 @@ struct cifs_ses {
> >> >         enum securityEnum sectype; /* what security flavor was specified? */
> >> >         bool sign;              /* is signing required? */
> >> >         bool need_reconnect:1; /* connection reset, uid now invalid */
> >> > +       __u64   serverTime;     /* Keeps a track of server time sent by server
> >> > +                                  during NTLM challenge in little endian */
> >> >  #ifdef CONFIG_CIFS_SMB2
> >> >         __u16 session_flags;
> >> >         char smb3signingkey[SMB3_SIGN_KEY_SIZE]; /* for signing smb3 packets */
> >> > diff --git a/fs/cifs/sess.c b/fs/cifs/sess.c
> >> > index 07fe97a..0762377 100644
> >> > --- a/fs/cifs/sess.c
> >> > +++ b/fs/cifs/sess.c
> >> > @@ -277,6 +277,26 @@ static void decode_ascii_ssetup(char **pbcc_area, __u16 bleft,
> >> >         cifs_dbg(FYI, "ascii: bytes left %d\n", bleft);
> >> >  }
> >> >
> >> > +static void
> >> > +get_ntlmv2_server_time(struct cifs_ses *ses)
> >> > +{
> >> > +#define MsvAvEOL       0x0000
> >> > +#define MsvAvTimestamp 0x0007
> >>
> >> This patch looks correct but we have these defines in ntlmssp.h.
> > Okay, I will send v2 patch.
> > Thanks for your reivew!
> >>
> >
> 
> 
> 
> --
> Thanks,
> 
> Steve

--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
diff mbox

Patch

diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c
index 4934347..3ec44f8 100644
--- a/fs/cifs/cifsencrypt.c
+++ b/fs/cifs/cifsencrypt.c
@@ -671,8 +671,10 @@  setup_ntlmv2_rsp(struct cifs_ses *ses, const struct nls_table *nls_cp)
 			(ses->auth_key.response + CIFS_SESS_KEY_SIZE);
 	ntlmv2->blob_signature = cpu_to_le32(0x00000101);
 	ntlmv2->reserved = 0;
-	/* Must be within 5 minutes of the server */
-	ntlmv2->time = cpu_to_le64(cifs_UnixTimeToNT(CURRENT_TIME));
+	if (ses->serverTime)
+		ntlmv2->time = ses->serverTime;
+	else
+		ntlmv2->time = cpu_to_le64(cifs_UnixTimeToNT(CURRENT_TIME));
 	get_random_bytes(&ntlmv2->client_chal, sizeof(ntlmv2->client_chal));
 	ntlmv2->reserved2 = 0;
 
diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h
index ce24c1f..1102822 100644
--- a/fs/cifs/cifsglob.h
+++ b/fs/cifs/cifsglob.h
@@ -796,6 +796,8 @@  struct cifs_ses {
 	enum securityEnum sectype; /* what security flavor was specified? */
 	bool sign;		/* is signing required? */
 	bool need_reconnect:1; /* connection reset, uid now invalid */
+	__u64   serverTime;	/* Keeps a track of server time sent by server
+				   during NTLM challenge in little endian */
 #ifdef CONFIG_CIFS_SMB2
 	__u16 session_flags;
 	char smb3signingkey[SMB3_SIGN_KEY_SIZE]; /* for signing smb3 packets */
diff --git a/fs/cifs/sess.c b/fs/cifs/sess.c
index 07fe97a..0762377 100644
--- a/fs/cifs/sess.c
+++ b/fs/cifs/sess.c
@@ -277,6 +277,26 @@  static void decode_ascii_ssetup(char **pbcc_area, __u16 bleft,
 	cifs_dbg(FYI, "ascii: bytes left %d\n", bleft);
 }
 
+static void
+get_ntlmv2_server_time(struct cifs_ses *ses)
+{
+#define MsvAvEOL	0x0000
+#define MsvAvTimestamp	0x0007
+	char *payload = ses->auth_key.response;
+	u16 AvId, AvLen;
+
+	do {
+		AvId = le16_to_cpu(*payload);
+		AvLen = le16_to_cpu(*(payload + sizeof(u16)));
+		payload += AvLen + (2 * sizeof(u16));
+	} while (AvId != MsvAvTimestamp && AvId != MsvAvEOL);
+
+	if (AvId == MsvAvTimestamp)
+		memcpy(&(ses->serverTime), (payload - AvLen), sizeof(__u64));
+	else
+		ses->serverTime = 0;
+}
+
 int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len,
 				    struct cifs_ses *ses)
 {
@@ -322,6 +342,7 @@  int decode_ntlmssp_challenge(char *bcc_ptr, int blob_len,
 			return -ENOMEM;
 		}
 		ses->auth_key.len = tilen;
+		get_ntlmv2_server_time(ses);
 	}
 
 	return 0;