/* Unix SMB/Netbios implementation. Version 2.2 RPC pipe client Copyright (C) Tim Potter 2000 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ #include "includes.h" extern int DEBUGLEVEL; extern fstring debugf; DOM_SID domain_sid; /* List to hold groups of commands */ static struct cmd_list { struct cmd_list *prev, *next; struct cmd_set *cmd_set; } *cmd_list; /**************************************************************************** handle completion of commands for readline ****************************************************************************/ static char **completion_fn(char *text, int start, int end) { #define MAX_COMPLETIONS 100 char **matches; int i, count=0; struct cmd_list *commands = cmd_list; #if 0 /* JERRY */ /* FIXME!!! -- what to do when completing argument? */ /* for words not at the start of the line fallback to filename completion */ if (start) return NULL; #endif /* make sure we have a list of valid commands */ if (!commands) return NULL; matches = (char **)malloc(sizeof(matches[0])*MAX_COMPLETIONS); if (!matches) return NULL; matches[count++] = strdup(text); if (!matches[0]) return NULL; while (commands && count < MAX_COMPLETIONS-1) { if (!commands->cmd_set) break; for (i=0; commands->cmd_set[i].name; i++) { if ((strncmp(text, commands->cmd_set[i].name, strlen(text)) == 0) && commands->cmd_set[i].fn) { matches[count] = strdup(commands->cmd_set[i].name); if (!matches[count]) return NULL; count++; } } commands = commands->next; } if (count == 2) { free(matches[0]); matches[0] = strdup(matches[1]); } matches[count] = NULL; return matches; } /*********************************************************************** * read in username/password credentials from a file */ static void read_authfile ( char *filename, char* username, char* password, char* domain ) { FILE *auth; fstring buf; uint16 len = 0; char *ptr, *val, *param; if ((auth=sys_fopen(filename, "r")) == NULL) { printf ("ERROR: Unable to open credentials file!\n"); return; } while (!feof(auth)) { /* get a line from the file */ if (!fgets (buf, sizeof(buf), auth)) continue; len = strlen(buf); /* skip empty lines */ if ((len) && (buf[len-1]=='\n')) { buf[len-1] = '\0'; len--; } if (len == 0) continue; /* break up the line into parameter & value. will need to eat a little whitespace possibly */ param = buf; if (!(ptr = strchr_m(buf, '='))) continue; val = ptr+1; *ptr = '\0'; /* eat leading white space */ while ((*val!='\0') && ((*val==' ') || (*val=='\t'))) val++; if (strwicmp("password", param) == 0) fstrcpy (password, val); else if (strwicmp("username", param) == 0) fstrcpy (username, val); else if (strwicmp("domain", param) == 0) fstrcpy (domain, val); memset(buf, 0, sizeof(buf)); } fclose(auth); return; } static char* next_command (char** cmdstr) { static pstring command; char *p; if (!cmdstr || !(*cmdstr)) return NULL; p = strchr_m(*cmdstr, ';'); if (p) *p = '\0'; pstrcpy(command, *cmdstr); *cmdstr = p; return command; } static void get_username (char *username) { if (getenv("USER")) pstrcpy(username,getenv("USER")); if (*username == 0 && getenv("LOGNAME")) pstrcpy(username,getenv("LOGNAME")); if (*username == 0) { pstrcpy(username,"GUEST"); } return; } /* Fetch the SID for this domain */ void fetch_domain_sid(struct cli_state *cli) { POLICY_HND pol; uint32 result = 0, info_class = 5; fstring domain_name; static BOOL got_domain_sid; TALLOC_CTX *mem_ctx; if (got_domain_sid) return; if (!(mem_ctx=talloc_init())) { DEBUG(0,("fetch_domain_sid: talloc_init returned NULL!\n")); goto error; } if (!cli_nt_session_open (cli, PIPE_LSARPC)) { fprintf(stderr, "could not initialise lsa pipe\n"); goto error; } if ((result = cli_lsa_open_policy(cli, mem_ctx, True, SEC_RIGHTS_MAXIMUM_ALLOWED, &pol) != NT_STATUS_NOPROBLEMO)) { goto error; } if ((result = cli_lsa_query_info_policy(cli, mem_ctx, &pol, info_class, domain_name, &domain_sid)) != NT_STATUS_NOPROBLEMO) { goto error; } got_domain_sid = True; cli_lsa_close(cli, mem_ctx, &pol); cli_nt_session_close(cli); talloc_destroy(mem_ctx); return; error: fprintf(stderr, "could not obtain sid for domain %s\n", cli->domain); if (result != NT_STATUS_NOPROBLEMO) { fprintf(stderr, "error: %s\n", get_nt_error_msg(result)); } exit(1); } /* Initialise client credentials for authenticated pipe access */ void init_rpcclient_creds(struct ntuser_creds *creds, char* username, char* domain, char* password) { ZERO_STRUCTP(creds); if (lp_encrypted_passwords()) { pwd_make_lm_nt_16(&creds->pwd, password); } else { pwd_set_cleartext(&creds->pwd, password); } fstrcpy(creds->user_name, username); fstrcpy(creds->domain, domain); } static uint32 cmd_help(struct cli_state *cli, int argc, char **argv) { struct cmd_list *temp_list; for (temp_list = cmd_list; temp_list; temp_list = temp_list->next) { struct cmd_set *temp_set = temp_list->cmd_set; while(temp_set->name) { printf("%15s\t\t%s\n", temp_set->name, temp_set->description); temp_set++; } } return 0; } static uint32 cmd_debuglevel(struct cli_state *cli, int argc, char **argv) { if (argc > 2) { printf("Usage: %s [debuglevel]\n", argv[0]); return NT_STATUS_NOPROBLEMO; } if (argc == 2) { DEBUGLEVEL = atoi(argv[1]); } printf("debuglevel is %d\n", DEBUGLEVEL); return NT_STATUS_NOPROBLEMO; } static uint32 cmd_quit(struct cli_state *cli, int argc, char **argv) { exit(0); return NT_STATUS_NOPROBLEMO; /* NOTREACHED */ } /* Build in rpcclient commands */ static struct cmd_set rpcclient_commands[] = { { "GENERAL OPTIONS", NULL, "" }, { "help", cmd_help, "Print list of commands" }, { "?", cmd_help, "Print list of commands" }, { "debuglevel", cmd_debuglevel, "Set debug level" }, { "exit", cmd_quit, "Exit program" }, { "quit", cmd_quit, "Exit program" }, { NULL, NULL, NULL } }; static struct cmd_set separator_command[] = { { "---------------", NULL, "----------------------" }, { NULL, NULL, NULL } }; /* Various pipe commands */ extern struct cmd_set lsarpc_commands[]; extern struct cmd_set samr_commands[]; extern struct cmd_set spoolss_commands[]; extern struct cmd_set netlogon_commands[]; extern struct cmd_set srvsvc_commands[]; extern struct cmd_set dfs_commands[]; static struct cmd_set *rpcclient_command_list[] = { rpcclient_commands, lsarpc_commands, samr_commands, spoolss_commands, netlogon_commands, srvsvc_commands, dfs_commands, NULL }; void add_command_set(struct cmd_set *cmd_set) { struct cmd_list *entry; if (!(entry = (struct cmd_list *)malloc(sizeof(struct cmd_list)))) { DEBUG(0, ("out of memory\n")); return; } ZERO_STRUCTP(entry); entry->cmd_set = cmd_set; DLIST_ADD(cmd_list, entry); } static uint32 do_cmd(struct cli_state *cli, struct cmd_set *cmd_entry, char *cmd) { char *p = cmd, **argv = NULL; uint32 result; pstring buf; int argc = 1, i; next_token_nr(&p, buf, " ", sizeof(buf)); /* Count number of arguments first time through the loop then allocate memory and strdup them. */ again: while(next_token_nr(NULL, buf, " ", sizeof(buf))) { if (argv) { argv[argc] = strdup(buf); } argc++; } if (!argv) { /* Create argument list */ argv = (char **)malloc(sizeof(char *) * argc); if (!argv) { fprintf(stderr, "out of memoryx\n"); return 0; } p = cmd; next_token_nr(&p, buf, " ", sizeof(buf)); argv[0] = strdup(buf); argc = 1; goto again; } /* Call the function */ if (cmd_entry->fn) { result = cmd_entry->fn(cli, argc, argv); } else { fprintf (stderr, "Invalid command\n"); result = NT_STATUS_INVALID_PARAMETER; } /* Cleanup */ for (i = 0; i < argc; i++) { free(argv[i]); } free(argv); return result; } /* Process a command entered at the prompt or as part of -c */ static uint32 process_cmd(struct cli_state *cli, char *cmd) { struct cmd_list *temp_list; BOOL found = False; pstring buf; char *p = cmd; uint32 result=0; int len = 0; if (cmd[strlen(cmd) - 1] == '\n') cmd[strlen(cmd) - 1] = '\0'; if (!next_token_nr(&p, buf, " ", sizeof(buf))) { return 0; } /* strip the trainly \n if it exsists */ len = strlen(buf); if (buf[len-1] == '\n') buf[len-1] = '\0'; /* Search for matching commands */ for (temp_list = cmd_list; temp_list; temp_list = temp_list->next) { struct cmd_set *temp_set = temp_list->cmd_set; while(temp_set->name) { if (strequal(buf, temp_set->name)) { found = True; result = do_cmd(cli, temp_set, cmd); goto done; } temp_set++; } } done: if (!found && buf[0]) { printf("command not found: %s\n", buf); return 0; } if (result != 0) { printf("result was %s\n", get_nt_error_msg(result)); } return result; } /************************************************************************/ struct cli_state *setup_connection(struct cli_state *cli, char *system_name, struct ntuser_creds *creds) { struct in_addr dest_ip; struct nmb_name calling, called; fstring dest_host; extern pstring global_myname; struct ntuser_creds anon; /* Initialise cli_state information */ if (!cli_initialise(cli)) { return NULL; } if (!creds) { ZERO_STRUCT(anon); anon.pwd.null_pwd = 1; creds = &anon; } cli_init_creds(cli, creds); /* Establish a SMB connection */ if (!resolve_srv_name(system_name, dest_host, &dest_ip)) { return NULL; } make_nmb_name(&called, dns_to_netbios_name(dest_host), 0x20); make_nmb_name(&calling, dns_to_netbios_name(global_myname), 0); if (!cli_establish_connection(cli, dest_host, &dest_ip, &calling, &called, "IPC$", "IPC", False, True)) { return NULL; } return cli; } /* Print usage information */ static void usage(char *pname) { printf("Usage: %s server [options]\n", pname); printf("\t-A authfile file containing user credentials\n"); printf("\t-c \"command string\" execute semicolon separated cmds\n"); printf("\t-d debuglevel set the debuglevel\n"); printf("\t-l logfile name of logfile to use as opposed to stdout\n"); printf("\t-h Print this help message.\n"); printf("\t-N don't ask for a password\n"); printf("\t-s configfile specify an alternative config file\n"); printf("\t-U username set the network username\n"); printf("\t-W domain set the domain name for user account\n"); printf("\n"); } /* Main function */ int main(int argc, char *argv[]) { extern char *optarg; extern int optind; extern pstring global_myname; BOOL got_pass = False; BOOL interactive = True; int opt; int olddebug; pstring cmdstr = "", servicesf = CONFIGFILE; struct ntuser_creds creds; struct cli_state cli; fstring password, username, domain, server; struct cmd_set **cmd_set; setlinebuf(stdout); DEBUGLEVEL = 1; /* Parse options */ if (argc < 2) { usage(argv[0]); return 0; } pstrcpy(server, argv[1]); argv++; argc--; while ((opt = getopt(argc, argv, "A:s:Nd:U:W:c:l:")) != EOF) { switch (opt) { case 'A': /* only get the username, password, and domain from the file */ read_authfile (optarg, username, password, domain); if (strlen (password)) got_pass = True; break; case 'c': pstrcpy(cmdstr, optarg); break; case 'd': DEBUGLEVEL = atoi(optarg); break; case 'l': slprintf(debugf, sizeof(debugf) - 1, "%s.client", optarg); interactive = False; break; case 'N': got_pass = True; break; case 's': pstrcpy(servicesf, optarg); break; case 'U': { char *lp; pstrcpy(username,optarg); if ((lp=strchr_m(username,'%'))) { *lp = 0; pstrcpy(password,lp+1); got_pass = True; memset(strchr_m(optarg,'%')+1,'X',strlen(password)); } break; } case 'W': pstrcpy(domain, optarg); break; case 'h': default: usage(argv[0]); exit(1); } } /* the following functions are part of the Samba debugging facilities. See lib/debug.c */ setup_logging (argv[0], interactive); if (!interactive) reopen_logs(); /* Load smb.conf file */ /* FIXME! How to get this DEBUGLEVEL to last over lp_load()? */ olddebug = DEBUGLEVEL; if (!lp_load(servicesf,True,False,False)) { fprintf(stderr, "Can't load %s\n", servicesf); } DEBUGLEVEL = olddebug; load_interfaces(); TimeInit(); get_myname((*global_myname)?NULL:global_myname); strupper(global_myname); /* * initialize the credentials struct. Get password * from stdin if necessary */ if (!strlen(username)) get_username (username); if (!got_pass) { init_rpcclient_creds (&creds, username, domain, ""); pwd_read(&creds.pwd, "Enter Password: ", lp_encrypted_passwords()); } else { init_rpcclient_creds (&creds, username, domain, password); } memset(password,'X',strlen(password)); /* open a connection to the specified server */ ZERO_STRUCTP (&cli); if (!setup_connection (&cli, server, &creds)) { return 0; } /* There are no pointers in ntuser_creds struct so zero it out */ ZERO_STRUCTP (&creds); /* Load command lists */ cmd_set = rpcclient_command_list; while(*cmd_set) { add_command_set(*cmd_set); add_command_set(separator_command); cmd_set++; } /* Do anything specified with -c */ if (cmdstr[0]) { char *cmd; char *p = cmdstr; while((cmd=next_command(&p)) != NULL) { process_cmd(&cli, cmd); } return 0; } /* Loop around accepting commands */ while(1) { pstring prompt; char *line; slprintf(prompt, sizeof(prompt) - 1, "rpcclient $> "); line = smb_readline(prompt, NULL, completion_fn); if (line == NULL) break; if (line[0] != '\n') process_cmd(&cli, line); } return 0; }