account.cpp 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388
  1. #include "nssm.h"
  2. #include <sddl.h>
  3. extern imports_t imports;
  4. /* Open Policy object. */
  5. int open_lsa_policy(LSA_HANDLE *policy) {
  6. LSA_OBJECT_ATTRIBUTES attributes;
  7. ZeroMemory(&attributes, sizeof(attributes));
  8. NTSTATUS status = LsaOpenPolicy(0, &attributes, POLICY_ALL_ACCESS, policy);
  9. if (status) {
  10. print_message(stderr, NSSM_MESSAGE_LSAOPENPOLICY_FAILED, error_string(LsaNtStatusToWinError(status)));
  11. return 1;
  12. }
  13. return 0;
  14. }
  15. /* Look up SID for an account. */
  16. int username_sid(const TCHAR *username, SID **sid, LSA_HANDLE *policy) {
  17. LSA_HANDLE handle;
  18. if (! policy) {
  19. policy = &handle;
  20. if (open_lsa_policy(policy)) return 1;
  21. }
  22. LSA_UNICODE_STRING lsa_username;
  23. #ifdef UNICODE
  24. lsa_username.Buffer = (wchar_t *) username;
  25. lsa_username.Length = (unsigned short) _tcslen(username) * sizeof(TCHAR);
  26. lsa_username.MaximumLength = lsa_username.Length + sizeof(TCHAR);
  27. #else
  28. size_t buflen;
  29. mbstowcs_s(&buflen, NULL, 0, username, _TRUNCATE);
  30. lsa_username.MaximumLength = (unsigned short) buflen * sizeof(wchar_t);
  31. lsa_username.Length = lsa_username.MaximumLength - sizeof(wchar_t);
  32. lsa_username.Buffer = (wchar_t *) HeapAlloc(GetProcessHeap(), 0, lsa_username.MaximumLength);
  33. if (lsa_username.Buffer) mbstowcs_s(&buflen, lsa_username.Buffer, lsa_username.MaximumLength, username, _TRUNCATE);
  34. else {
  35. if (policy == &handle) LsaClose(handle);
  36. print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("LSA_UNICODE_STRING"), _T("username_sid()"));
  37. return 2;
  38. }
  39. #endif
  40. LSA_REFERENCED_DOMAIN_LIST *translated_domains;
  41. LSA_TRANSLATED_SID *translated_sid;
  42. NTSTATUS status = LsaLookupNames(*policy, 1, &lsa_username, &translated_domains, &translated_sid);
  43. #ifndef UNICODE
  44. HeapFree(GetProcessHeap(), 0, lsa_username.Buffer);
  45. #endif
  46. if (policy == &handle) LsaClose(handle);
  47. if (status) {
  48. LsaFreeMemory(translated_domains);
  49. LsaFreeMemory(translated_sid);
  50. print_message(stderr, NSSM_MESSAGE_LSALOOKUPNAMES_FAILED, username, error_string(LsaNtStatusToWinError(status)));
  51. return 3;
  52. }
  53. if (translated_sid->Use != SidTypeUser && translated_sid->Use != SidTypeWellKnownGroup) {
  54. LsaFreeMemory(translated_domains);
  55. LsaFreeMemory(translated_sid);
  56. print_message(stderr, NSSM_GUI_INVALID_USERNAME, username);
  57. return 4;
  58. }
  59. LSA_TRUST_INFORMATION *trust = &translated_domains->Domains[translated_sid->DomainIndex];
  60. if (! trust || ! IsValidSid(trust->Sid)) {
  61. LsaFreeMemory(translated_domains);
  62. LsaFreeMemory(translated_sid);
  63. print_message(stderr, NSSM_GUI_INVALID_USERNAME, username);
  64. return 5;
  65. }
  66. /* GetSidSubAuthority*() return pointers! */
  67. unsigned char *n = GetSidSubAuthorityCount(trust->Sid);
  68. /* Convert translated SID to SID. */
  69. *sid = (SID *) HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, GetSidLengthRequired(*n + 1));
  70. if (! *sid) {
  71. LsaFreeMemory(translated_domains);
  72. LsaFreeMemory(translated_sid);
  73. print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("SID"), _T("grant_logon_as_service"));
  74. return 6;
  75. }
  76. unsigned long error;
  77. if (! InitializeSid(*sid, GetSidIdentifierAuthority(trust->Sid), *n + 1)) {
  78. error = GetLastError();
  79. HeapFree(GetProcessHeap(), 0, *sid);
  80. LsaFreeMemory(translated_domains);
  81. LsaFreeMemory(translated_sid);
  82. print_message(stderr, NSSM_MESSAGE_INITIALIZESID_FAILED, username, error_string(error));
  83. return 7;
  84. }
  85. for (unsigned char i = 0; i <= *n; i++) {
  86. unsigned long *sub = GetSidSubAuthority(*sid, i);
  87. if (i < *n) *sub = *GetSidSubAuthority(trust->Sid, i);
  88. else *sub = translated_sid->RelativeId;
  89. }
  90. int ret = 0;
  91. if (translated_sid->Use == SidTypeWellKnownGroup && requires_password(*sid)) {
  92. print_message(stderr, NSSM_GUI_INVALID_USERNAME, username);
  93. ret = 8;
  94. }
  95. LsaFreeMemory(translated_domains);
  96. LsaFreeMemory(translated_sid);
  97. return ret;
  98. }
  99. int username_sid(const TCHAR *username, SID **sid) {
  100. return username_sid(username, sid, 0);
  101. }
  102. /* Do two usernames map to the same SID? */
  103. int username_equiv(const TCHAR *a, const TCHAR *b) {
  104. SID *sid_a, *sid_b;
  105. if (username_sid(a, &sid_a)) return 0;
  106. if (username_sid(b, &sid_b)) {
  107. FreeSid(sid_a);
  108. return 0;
  109. }
  110. int ret = 0;
  111. if (EqualSid(sid_a, sid_b)) ret = 1;
  112. FreeSid(sid_a);
  113. FreeSid(sid_b);
  114. return ret;
  115. }
  116. /* Does the username represent the LocalSystem account? */
  117. int is_localsystem(const TCHAR *username) {
  118. if (str_equiv(username, NSSM_LOCALSYSTEM_ACCOUNT)) return 1;
  119. if (! imports.IsWellKnownSid) return 0;
  120. SID *sid;
  121. if (username_sid(username, &sid)) return 0;
  122. int ret = 0;
  123. if (imports.IsWellKnownSid(sid, WinLocalSystemSid)) ret = 1;
  124. FreeSid(sid);
  125. return ret;
  126. }
  127. /*
  128. Find the canonical name for a well-known account name.
  129. MUST ONLY BE USED for well-known account names.
  130. Must call LocalFree() on result.
  131. */
  132. TCHAR *canonical_username(const TCHAR *username) {
  133. SID *user_sid;
  134. TCHAR *canon;
  135. size_t len;
  136. if (is_localsystem(username)) {
  137. len = (_tcslen(NSSM_LOCALSYSTEM_ACCOUNT) + 1) * sizeof(TCHAR);
  138. canon = (TCHAR *) LocalAlloc(LPTR, len);
  139. if (! canon) {
  140. print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, NSSM_LOCALSYSTEM_ACCOUNT, _T("canonical_username"));
  141. return 0;
  142. }
  143. memmove(canon, NSSM_LOCALSYSTEM_ACCOUNT, len);
  144. _tprintf(_T("it's localsystem = %s!\n"), canon);
  145. return canon;
  146. }
  147. if (! imports.CreateWellKnownSid) return 0;
  148. if (username_sid(username, &user_sid)) return 0;
  149. /*
  150. LsaLookupSids will return the canonical username but the result won't
  151. include the NT Authority part. Thus we must look that up as well.
  152. */
  153. unsigned long ntsidsize = SECURITY_MAX_SID_SIZE;
  154. SID *ntauth_sid = (SID *) HeapAlloc(GetProcessHeap(), 0, ntsidsize);
  155. if (! ntauth_sid) {
  156. HeapFree(GetProcessHeap(), 0, user_sid);
  157. print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("NT Authority"), _T("canonical_username"));
  158. return 0;
  159. }
  160. if (! imports.CreateWellKnownSid(WinNtAuthoritySid, NULL, ntauth_sid, &ntsidsize)) {
  161. HeapFree(GetProcessHeap(), 0, ntauth_sid);
  162. print_message(stderr, NSSM_MESSAGE_CREATEWELLKNOWNSID_FAILED, _T("WinNtAuthoritySid"));
  163. return 0;
  164. }
  165. LSA_HANDLE policy;
  166. if (open_lsa_policy(&policy)) return 0;
  167. LSA_REFERENCED_DOMAIN_LIST *translated_domains;
  168. LSA_TRANSLATED_NAME *translated_names;
  169. unsigned long n = 2;
  170. PSID *sids = (PSID *) HeapAlloc(GetProcessHeap(), 0, n * sizeof(PSID));
  171. sids[0] = user_sid;
  172. sids[1] = ntauth_sid;
  173. NTSTATUS status = LsaLookupSids(policy, n, (PSID *) sids, &translated_domains, &translated_names);
  174. HeapFree(GetProcessHeap(), 0, user_sid);
  175. HeapFree(GetProcessHeap(), 0, ntauth_sid);
  176. HeapFree(GetProcessHeap(), 0, sids);
  177. LsaClose(policy);
  178. if (status) {
  179. print_message(stderr, NSSM_MESSAGE_LSALOOKUPSIDS_FAILED);
  180. return 0;
  181. }
  182. /* Look up the account name. */
  183. LSA_TRANSLATED_NAME *translated_name = &(translated_names[0]);
  184. if (translated_name->Use != SidTypeWellKnownGroup) {
  185. print_message(stderr, NSSM_GUI_INVALID_USERNAME);
  186. LsaFreeMemory(translated_domains);
  187. LsaFreeMemory(translated_names);
  188. return 0;
  189. }
  190. LSA_UNICODE_STRING *lsa_group = &translated_name->Name;
  191. /* Look up NT Authority. */
  192. translated_name = &(translated_names[1]);
  193. if (translated_name->Use != SidTypeDomain) {
  194. print_message(stderr, NSSM_GUI_INVALID_USERNAME);
  195. LsaFreeMemory(translated_domains);
  196. LsaFreeMemory(translated_names);
  197. return 0;
  198. }
  199. /* In theory these pointers should all be valid if we got this far... */
  200. LSA_TRUST_INFORMATION *trust = &translated_domains->Domains[translated_name->DomainIndex];
  201. LSA_UNICODE_STRING *lsa_domain = &trust->Name;
  202. TCHAR *domain, *group;
  203. unsigned long lsa_domain_len = lsa_domain->Length;
  204. unsigned long lsa_group_len = lsa_group->Length;
  205. len = lsa_domain_len + lsa_group_len + 2;
  206. #ifdef UNICODE
  207. domain = lsa_domain->Buffer;
  208. group = lsa_group->Buffer;
  209. #else
  210. size_t buflen;
  211. wcstombs_s(&buflen, NULL, 0, lsa_domain->Buffer, _TRUNCATE);
  212. domain = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, buflen);
  213. if (! domain) {
  214. print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("domain"), _T("canonical_username"));
  215. LsaFreeMemory(translated_domains);
  216. LsaFreeMemory(translated_names);
  217. return 0;
  218. }
  219. wcstombs_s(&buflen, (char *) domain, buflen, lsa_domain->Buffer, _TRUNCATE);
  220. wcstombs_s(&buflen, NULL, 0, lsa_group->Buffer, _TRUNCATE);
  221. group = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, buflen);
  222. if (! group) {
  223. print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("group"), _T("canonical_username"));
  224. LsaFreeMemory(translated_domains);
  225. LsaFreeMemory(translated_names);
  226. return 0;
  227. }
  228. wcstombs_s(&buflen, (char *) group, buflen, lsa_group->Buffer, _TRUNCATE);
  229. #endif
  230. canon = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, len * sizeof(TCHAR));
  231. if (! canon) {
  232. LsaFreeMemory(translated_domains);
  233. LsaFreeMemory(translated_names);
  234. print_message(stderr, NSSM_MESSAGE_OUT_OF_MEMORY, _T("canon"), _T("canonical_username"));
  235. return 0;
  236. }
  237. _sntprintf_s(canon, len, _TRUNCATE, _T("%s\\%s"), domain, group);
  238. #ifndef UNICODE
  239. HeapFree(GetProcessHeap(), 0, domain);
  240. HeapFree(GetProcessHeap(), 0, group);
  241. #endif
  242. LsaFreeMemory(translated_domains);
  243. LsaFreeMemory(translated_names);
  244. return canon;
  245. }
  246. /* Does the SID type require a password? */
  247. int requires_password(SID *sid) {
  248. if (! imports.IsWellKnownSid) return -1;
  249. if (imports.IsWellKnownSid(sid, WinLocalSystemSid)) return 0;
  250. if (imports.IsWellKnownSid(sid, WinLocalServiceSid)) return 0;
  251. if (imports.IsWellKnownSid(sid, WinNetworkServiceSid)) return 0;;
  252. return 1;
  253. }
  254. /* Does the username require a password? */
  255. int requires_password(const TCHAR *username) {
  256. if (str_equiv(username, NSSM_LOCALSYSTEM_ACCOUNT)) return 0;
  257. SID *sid;
  258. int r = username_sid(username, &sid);
  259. if (username_sid(username, &sid)) return 0;
  260. int ret = 0;
  261. ret = requires_password(sid);
  262. FreeSid(sid);
  263. return ret;
  264. }
  265. int grant_logon_as_service(const TCHAR *username) {
  266. if (! username) return 0;
  267. if (! requires_password(username)) return 0;
  268. /* Open Policy object. */
  269. LSA_OBJECT_ATTRIBUTES attributes;
  270. ZeroMemory(&attributes, sizeof(attributes));
  271. LSA_HANDLE policy;
  272. NTSTATUS status;
  273. if (open_lsa_policy(&policy)) return 1;
  274. /* Look up SID for the account. */
  275. SID *sid;
  276. if (username_sid(username, &sid, &policy)) {
  277. LsaClose(policy);
  278. return 2;
  279. }
  280. /* Check if the SID has the "Log on as a service" right. */
  281. LSA_UNICODE_STRING lsa_right;
  282. lsa_right.Buffer = NSSM_LOGON_AS_SERVICE_RIGHT;
  283. lsa_right.Length = (unsigned short) wcslen(lsa_right.Buffer) * sizeof(wchar_t);
  284. lsa_right.MaximumLength = lsa_right.Length + sizeof(wchar_t);
  285. LSA_UNICODE_STRING *rights;
  286. unsigned long count = ~0;
  287. status = LsaEnumerateAccountRights(policy, sid, &rights, &count);
  288. if (status) {
  289. /*
  290. If the account has no rights set LsaEnumerateAccountRights() will return
  291. STATUS_OBJECT_NAME_NOT_FOUND and set count to 0.
  292. */
  293. unsigned long error = LsaNtStatusToWinError(status);
  294. if (error != ERROR_FILE_NOT_FOUND) {
  295. FreeSid(sid);
  296. LsaClose(policy);
  297. print_message(stderr, NSSM_MESSAGE_LSAENUMERATEACCOUNTRIGHTS_FAILED, username, error_string(error));
  298. return 4;
  299. }
  300. }
  301. for (unsigned long i = 0; i < count; i++) {
  302. if (rights[i].Length != lsa_right.Length) continue;
  303. if (_wcsnicmp(rights[i].Buffer, lsa_right.Buffer, lsa_right.MaximumLength)) continue;
  304. /* The SID has the right. */
  305. FreeSid(sid);
  306. LsaFreeMemory(rights);
  307. LsaClose(policy);
  308. return 0;
  309. }
  310. LsaFreeMemory(rights);
  311. /* Add the right. */
  312. status = LsaAddAccountRights(policy, sid, &lsa_right, 1);
  313. FreeSid(sid);
  314. LsaClose(policy);
  315. if (status) {
  316. print_message(stderr, NSSM_MESSAGE_LSAADDACCOUNTRIGHTS_FAILED, error_string(LsaNtStatusToWinError(status)));
  317. return 5;
  318. }
  319. print_message(stdout, NSSM_MESSAGE_GRANTED_LOGON_AS_SERVICE, username);
  320. return 0;
  321. }