diff --git a/SMBLibrary/Server/SMB1/FileStoreResponseHelper.cs b/SMBLibrary/Server/SMB1/FileStoreResponseHelper.cs index 8d7020f..196cec8 100644 --- a/SMBLibrary/Server/SMB1/FileStoreResponseHelper.cs +++ b/SMBLibrary/Server/SMB1/FileStoreResponseHelper.cs @@ -22,6 +22,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasWriteAccess(session.SecurityContext, request.DirectoryName)) { + state.LogToServer(Severity.Verbose, "Create Directory '{0}{1}' failed. User '{2}' was denied access.", share.Name, request.DirectoryName, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return new ErrorResponse(request.CommandName); } @@ -43,6 +44,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasWriteAccess(session.SecurityContext, request.DirectoryName)) { + state.LogToServer(Severity.Verbose, "Delete Directory '{0}{1}' failed. User '{2}' was denied access.", share.Name, request.DirectoryName, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return new ErrorResponse(request.CommandName); } @@ -63,6 +65,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasWriteAccess(session.SecurityContext, request.FileName)) { + state.LogToServer(Severity.Verbose, "Delete '{0}{1}' failed. User '{2}' was denied access.", share.Name, request.FileName, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return new ErrorResponse(request.CommandName); } @@ -84,11 +87,13 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasWriteAccess(session.SecurityContext, request.OldFileName)) { + state.LogToServer(Severity.Verbose, "Rename '{0}{1}' failed. User '{2}' was denied access.", share.Name, request.OldFileName, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return new ErrorResponse(request.CommandName); } if (!((FileSystemShare)share).HasWriteAccess(session.SecurityContext, request.NewFileName)) { + state.LogToServer(Severity.Verbose, "Rename '{0}{1}' failed. User '{2}' was denied access.", share.Name, request.OldFileName, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return new ErrorResponse(request.CommandName); } @@ -109,6 +114,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasReadAccess(session.SecurityContext, request.DirectoryName)) { + state.LogToServer(Severity.Verbose, "Check Directory '{0}{1}' failed. User '{2}' was denied access.", share.Name, request.DirectoryName, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return new ErrorResponse(request.CommandName); } @@ -130,6 +136,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasReadAccess(session.SecurityContext, request.FileName)) { + state.LogToServer(Severity.Verbose, "Query Information on '{0}{1}' failed. User '{2}' was denied access.", share.Name, request.FileName, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return new ErrorResponse(request.CommandName); } @@ -156,6 +163,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasWriteAccess(session.SecurityContext, request.FileName)) { + state.LogToServer(Severity.Verbose, "Set Information on '{0}{1}' failed. User '{2}' was denied access.", share.Name, request.FileName, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return new ErrorResponse(request.CommandName); } @@ -184,6 +192,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasWriteAccess(session.SecurityContext, openFile.Path)) { + state.LogToServer(Severity.Verbose, "Set Information 2 on '{0}{1}' failed. User '{2}' was denied access.", share.Name, openFile.Path, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return new ErrorResponse(request.CommandName); } diff --git a/SMBLibrary/Server/SMB1/NTCreateHelper.cs b/SMBLibrary/Server/SMB1/NTCreateHelper.cs index 3d39442..affeb8f 100644 --- a/SMBLibrary/Server/SMB1/NTCreateHelper.cs +++ b/SMBLibrary/Server/SMB1/NTCreateHelper.cs @@ -26,6 +26,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasAccess(session.SecurityContext, path, createAccess)) { + state.LogToServer(Severity.Verbose, "Create: Opening '{0}{1}' failed. User '{2}' was denied access.", share.Name, request.FileName, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return new ErrorResponse(request.CommandName); } diff --git a/SMBLibrary/Server/SMB1/OpenAndXHelper.cs b/SMBLibrary/Server/SMB1/OpenAndXHelper.cs index 802bf34..fa92618 100644 --- a/SMBLibrary/Server/SMB1/OpenAndXHelper.cs +++ b/SMBLibrary/Server/SMB1/OpenAndXHelper.cs @@ -43,6 +43,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasAccess(session.SecurityContext, path, fileAccess)) { + state.LogToServer(Severity.Verbose, "OpenAndX: Opening '{0}{1}' failed. User '{2}' was denied access.", share.Name, request.FileName, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return new ErrorResponse(request.CommandName); } diff --git a/SMBLibrary/Server/SMB1/ReadWriteResponseHelper.cs b/SMBLibrary/Server/SMB1/ReadWriteResponseHelper.cs index 7f480e9..1c52af0 100644 --- a/SMBLibrary/Server/SMB1/ReadWriteResponseHelper.cs +++ b/SMBLibrary/Server/SMB1/ReadWriteResponseHelper.cs @@ -31,6 +31,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasReadAccess(session.SecurityContext, openFile.Path)) { + state.LogToServer(Severity.Verbose, "Read from '{0}{1}' failed. User '{2}' was denied access.", share.Name, openFile.Path, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return new ErrorResponse(request.CommandName); } @@ -63,6 +64,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasReadAccess(session.SecurityContext, openFile.Path)) { + state.LogToServer(Severity.Verbose, "ReadAndX from '{0}{1}' failed. User '{2}' was denied access.", share.Name, openFile.Path, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return new ErrorResponse(request.CommandName); } @@ -104,6 +106,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasWriteAccess(session.SecurityContext, openFile.Path)) { + state.LogToServer(Severity.Verbose, "Write to '{0}{1}' failed. User '{2}' was denied access.", share.Name, openFile.Path, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return new ErrorResponse(request.CommandName); } @@ -134,6 +137,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasWriteAccess(session.SecurityContext, openFile.Path)) { + state.LogToServer(Severity.Verbose, "WriteAndX to '{0}{1}' failed. User '{2}' was denied access.", share.Name, openFile.Path, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return new ErrorResponse(request.CommandName); } diff --git a/SMBLibrary/Server/SMB1/Transaction2SubcommandHelper.cs b/SMBLibrary/Server/SMB1/Transaction2SubcommandHelper.cs index b83b9cb..fc63d64 100644 --- a/SMBLibrary/Server/SMB1/Transaction2SubcommandHelper.cs +++ b/SMBLibrary/Server/SMB1/Transaction2SubcommandHelper.cs @@ -122,6 +122,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasReadAccess(session.SecurityContext, @"\")) { + state.LogToServer(Severity.Verbose, "QueryFileSystemInformation on '{0}' failed. User '{1}' was denied access.", share.Name, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return null; } @@ -148,6 +149,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasReadAccess(session.SecurityContext, path)) { + state.LogToServer(Severity.Verbose, "QueryPathInformation on '{0}{1}' failed. User '{2}' was denied access.", share.Name, path, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return null; } @@ -180,6 +182,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasReadAccess(session.SecurityContext, openFile.Path)) { + state.LogToServer(Severity.Verbose, "QueryFileInformation on '{0}{1}' failed. User '{2}' was denied access.", share.Name, openFile.Path, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return null; } @@ -212,6 +215,7 @@ namespace SMBLibrary.Server.SMB1 { if (!((FileSystemShare)share).HasWriteAccess(session.SecurityContext, openFile.Path)) { + state.LogToServer(Severity.Verbose, "SetFileInformation on '{0}{1}' failed. User '{2}' was denied access.", share.Name, openFile.Path, session.UserName); header.Status = NTStatus.STATUS_ACCESS_DENIED; return null; } diff --git a/SMBLibrary/Server/SMB2/CreateHelper.cs b/SMBLibrary/Server/SMB2/CreateHelper.cs index 172eba3..268b74f 100644 --- a/SMBLibrary/Server/SMB2/CreateHelper.cs +++ b/SMBLibrary/Server/SMB2/CreateHelper.cs @@ -28,6 +28,7 @@ namespace SMBLibrary.Server.SMB2 { if (!((FileSystemShare)share).HasAccess(session.SecurityContext, path, createAccess)) { + state.LogToServer(Severity.Verbose, "Create: Opening '{0}{1}' failed. User '{2}' was denied access.", share.Name, path, session.UserName); return new ErrorResponse(request.CommandName, NTStatus.STATUS_ACCESS_DENIED); } } diff --git a/SMBLibrary/Server/SMB2/QueryDirectoryHelper.cs b/SMBLibrary/Server/SMB2/QueryDirectoryHelper.cs index eee3959..c5be5dd 100644 --- a/SMBLibrary/Server/SMB2/QueryDirectoryHelper.cs +++ b/SMBLibrary/Server/SMB2/QueryDirectoryHelper.cs @@ -25,6 +25,7 @@ namespace SMBLibrary.Server.SMB2 if (!((FileSystemShare)share).HasReadAccess(session.SecurityContext, openFile.Path)) { + state.LogToServer(Severity.Verbose, "Query Directory on '{0}{1}' failed. User '{2}' was denied access.", share.Name, openFile.Path, session.UserName); return new ErrorResponse(request.CommandName, NTStatus.STATUS_ACCESS_DENIED); } diff --git a/SMBLibrary/Server/SMB2/QueryInfoHelper.cs b/SMBLibrary/Server/SMB2/QueryInfoHelper.cs index 26274d8..fa7d6ea 100644 --- a/SMBLibrary/Server/SMB2/QueryInfoHelper.cs +++ b/SMBLibrary/Server/SMB2/QueryInfoHelper.cs @@ -29,6 +29,7 @@ namespace SMBLibrary.Server.SMB2 { if (!((FileSystemShare)share).HasReadAccess(session.SecurityContext, openFile.Path)) { + state.LogToServer(Severity.Verbose, "GetFileInformation on '{0}{1}' failed. User '{2}' was denied access.", share.Name, openFile.Path, session.UserName); return new ErrorResponse(request.CommandName, NTStatus.STATUS_ACCESS_DENIED); } } @@ -51,6 +52,7 @@ namespace SMBLibrary.Server.SMB2 { if (!((FileSystemShare)share).HasReadAccess(session.SecurityContext, @"\")) { + state.LogToServer(Severity.Verbose, "GetFileSystemInformation on '{0}' failed. User '{1}' was denied access.", share.Name, session.UserName); return new ErrorResponse(request.CommandName, NTStatus.STATUS_ACCESS_DENIED); } diff --git a/SMBLibrary/Server/SMB2/SetInfoHelper.cs b/SMBLibrary/Server/SMB2/SetInfoHelper.cs index 0c4bd56..8a4be4d 100644 --- a/SMBLibrary/Server/SMB2/SetInfoHelper.cs +++ b/SMBLibrary/Server/SMB2/SetInfoHelper.cs @@ -29,6 +29,7 @@ namespace SMBLibrary.Server.SMB2 { if (!((FileSystemShare)share).HasWriteAccess(session.SecurityContext, openFile.Path)) { + state.LogToServer(Severity.Verbose, "SetFileInformation on '{0}{1}' failed. User '{2}' was denied access.", share.Name, openFile.Path, session.UserName); return new ErrorResponse(request.CommandName, NTStatus.STATUS_ACCESS_DENIED); } }