/* Unix SMB/CIFS implementation. Winbind daemon - miscellaneous other functions Copyright (C) Tim Potter 2000 Copyright (C) Andrew Bartlett 2002 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #include "includes.h" #include "winbindd.h" #include "../librpc/gen_ndr/cli_netlogon.h" #undef DBGC_CLASS #define DBGC_CLASS DBGC_WINBIND /* Constants and helper functions for determining domain trust types */ enum trust_type { EXTERNAL = 0, FOREST, IN_FOREST, NONE, }; const char *trust_type_strings[] = {"External", "Forest", "In Forest", "None"}; static enum trust_type get_trust_type(struct winbindd_tdc_domain *domain) { if (domain->trust_attribs == NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN) return EXTERNAL; else if (domain->trust_attribs == NETR_TRUST_ATTRIBUTE_FOREST_TRANSITIVE) return FOREST; else if (((domain->trust_flags & NETR_TRUST_FLAG_IN_FOREST) == NETR_TRUST_FLAG_IN_FOREST) && ((domain->trust_flags & NETR_TRUST_FLAG_PRIMARY) == 0x0)) return IN_FOREST; return NONE; } static const char *get_trust_type_string(struct winbindd_tdc_domain *domain) { return trust_type_strings[get_trust_type(domain)]; } static bool trust_is_inbound(struct winbindd_tdc_domain *domain) { return (domain->trust_flags == 0x0) || ((domain->trust_flags & NETR_TRUST_FLAG_IN_FOREST) == NETR_TRUST_FLAG_IN_FOREST) || ((domain->trust_flags & NETR_TRUST_FLAG_INBOUND) == NETR_TRUST_FLAG_INBOUND); } static bool trust_is_outbound(struct winbindd_tdc_domain *domain) { return (domain->trust_flags == 0x0) || ((domain->trust_flags & NETR_TRUST_FLAG_IN_FOREST) == NETR_TRUST_FLAG_IN_FOREST) || ((domain->trust_flags & NETR_TRUST_FLAG_OUTBOUND) == NETR_TRUST_FLAG_OUTBOUND); } static bool trust_is_transitive(struct winbindd_tdc_domain *domain) { if ((domain->trust_attribs == NETR_TRUST_ATTRIBUTE_NON_TRANSITIVE) || (domain->trust_attribs == NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN) || (domain->trust_attribs == NETR_TRUST_ATTRIBUTE_TREAT_AS_EXTERNAL)) return False; return True; } void winbindd_list_trusted_domains(struct winbindd_cli_state *state) { struct winbindd_tdc_domain *dom_list = NULL; struct winbindd_tdc_domain *d = NULL; size_t num_domains = 0; int extra_data_len = 0; char *extra_data = NULL; int i = 0; DEBUG(3, ("[%5lu]: list trusted domains\n", (unsigned long)state->pid)); if( !wcache_tdc_fetch_list( &dom_list, &num_domains )) { request_error(state); goto done; } for ( i = 0; i < num_domains; i++ ) { struct winbindd_domain *domain; bool is_online = true; d = &dom_list[i]; domain = find_domain_from_name_noinit(d->domain_name); if (domain) { is_online = domain->online; } if ( !extra_data ) { extra_data = talloc_asprintf(state->mem_ctx, "%s\\%s\\%s\\%s\\%s\\%s\\%s\\%s", d->domain_name, d->dns_name ? d->dns_name : d->domain_name, sid_string_talloc(state->mem_ctx, &d->sid), get_trust_type_string(d), trust_is_transitive(d) ? "Yes" : "No", trust_is_inbound(d) ? "Yes" : "No", trust_is_outbound(d) ? "Yes" : "No", is_online ? "Online" : "Offline" ); } else { extra_data = talloc_asprintf(state->mem_ctx, "%s\n%s\\%s\\%s\\%s\\%s\\%s\\%s\\%s", extra_data, d->domain_name, d->dns_name ? d->dns_name : d->domain_name, sid_string_talloc(state->mem_ctx, &d->sid), get_trust_type_string(d), trust_is_transitive(d) ? "Yes" : "No", trust_is_inbound(d) ? "Yes" : "No", trust_is_outbound(d) ? "Yes" : "No", is_online ? "Online" : "Offline" ); } } extra_data_len = 0; if (extra_data != NULL) { extra_data_len = strlen(extra_data); } if (extra_data_len > 0) { state->response->extra_data.data = extra_data; state->response->length += extra_data_len+1; } request_ok(state); done: TALLOC_FREE( dom_list ); } enum winbindd_result winbindd_dual_list_trusted_domains(struct winbindd_domain *domain, struct winbindd_cli_state *state) { uint32 i, num_domains; char **names, **alt_names; DOM_SID *sids; int extra_data_len = 0; char *extra_data; NTSTATUS result; bool have_own_domain = False; DEBUG(3, ("[%5lu]: list trusted domains\n", (unsigned long)state->pid)); result = domain->methods->trusted_domains(domain, state->mem_ctx, &num_domains, &names, &alt_names, &sids); if (!NT_STATUS_IS_OK(result)) { DEBUG(3, ("winbindd_dual_list_trusted_domains: trusted_domains returned %s\n", nt_errstr(result) )); return WINBINDD_ERROR; } extra_data = talloc_strdup(state->mem_ctx, ""); if (num_domains > 0) extra_data = talloc_asprintf( state->mem_ctx, "%s\\%s\\%s", names[0], alt_names[0] ? alt_names[0] : names[0], sid_string_talloc(state->mem_ctx, &sids[0])); for (i=1; imem_ctx, "%s\n%s\\%s\\%s", extra_data, names[i], alt_names[i] ? alt_names[i] : names[i], sid_string_talloc(state->mem_ctx, &sids[i])); /* add our primary domain */ for (i=0; iname)) { have_own_domain = True; break; } } if (state->request->data.list_all_domains && !have_own_domain) { extra_data = talloc_asprintf( state->mem_ctx, "%s\n%s\\%s\\%s", extra_data, domain->name, domain->alt_name ? domain->alt_name : domain->name, sid_string_talloc(state->mem_ctx, &domain->sid)); } /* This is a bit excessive, but the extra data sooner or later will be talloc'ed */ extra_data_len = 0; if (extra_data != NULL) { extra_data_len = strlen(extra_data); } if (extra_data_len > 0) { state->response->extra_data.data = extra_data; state->response->length += extra_data_len+1; } return WINBINDD_OK; } enum winbindd_result winbindd_dual_getdcname(struct winbindd_domain *domain, struct winbindd_cli_state *state) { const char *dcname_slash = NULL; const char *p; struct rpc_pipe_client *netlogon_pipe; NTSTATUS result; WERROR werr; unsigned int orig_timeout; struct winbindd_domain *req_domain; state->request->domain_name [sizeof(state->request->domain_name)-1] = '\0'; DEBUG(3, ("[%5lu]: Get DC name for %s\n", (unsigned long)state->pid, state->request->domain_name)); result = cm_connect_netlogon(domain, &netlogon_pipe); if (!NT_STATUS_IS_OK(result)) { DEBUG(1, ("Can't contact the NETLOGON pipe\n")); return WINBINDD_ERROR; } /* This call can take a long time - allow the server to time out. 35 seconds should do it. */ orig_timeout = rpccli_set_timeout(netlogon_pipe, 35000); req_domain = find_domain_from_name_noinit(state->request->domain_name); if (req_domain == domain) { result = rpccli_netr_GetDcName(netlogon_pipe, state->mem_ctx, domain->dcname, state->request->domain_name, &dcname_slash, &werr); } else { result = rpccli_netr_GetAnyDCName(netlogon_pipe, state->mem_ctx, domain->dcname, state->request->domain_name, &dcname_slash, &werr); } /* And restore our original timeout. */ rpccli_set_timeout(netlogon_pipe, orig_timeout); if (!NT_STATUS_IS_OK(result)) { DEBUG(5,("Error requesting DCname for domain %s: %s\n", state->request->domain_name, nt_errstr(result))); return WINBINDD_ERROR; } if (!W_ERROR_IS_OK(werr)) { DEBUG(5, ("Error requesting DCname for domain %s: %s\n", state->request->domain_name, win_errstr(werr))); return WINBINDD_ERROR; } p = dcname_slash; if (*p == '\\') { p+=1; } if (*p == '\\') { p+=1; } fstrcpy(state->response->data.dc_name, p); return WINBINDD_OK; } /* This is the child-only version of --sequence. It only allows for a single * domain (ie "our" one) to be displayed. */ enum winbindd_result winbindd_dual_show_sequence(struct winbindd_domain *domain, struct winbindd_cli_state *state) { DEBUG(3, ("[%5lu]: show sequence\n", (unsigned long)state->pid)); /* Ensure null termination */ state->request->domain_name[sizeof(state->request->domain_name)-1]='\0'; domain->methods->sequence_number(domain, &domain->sequence_number); state->response->data.sequence_number = domain->sequence_number; return WINBINDD_OK; } struct domain_info_state { struct winbindd_domain *domain; struct winbindd_cli_state *cli; struct winbindd_request ping_request; }; static void domain_info_done(struct tevent_req *req); void winbindd_domain_info(struct winbindd_cli_state *cli) { struct domain_info_state *state; struct winbindd_domain *domain; struct tevent_req *req; DEBUG(3, ("[%5lu]: domain_info [%s]\n", (unsigned long)cli->pid, cli->request->domain_name)); domain = find_domain_from_name_noinit(cli->request->domain_name); if (domain == NULL) { DEBUG(3, ("Did not find domain [%s]\n", cli->request->domain_name)); request_error(cli); return; } if (domain->initialized) { fstrcpy(cli->response->data.domain_info.name, domain->name); fstrcpy(cli->response->data.domain_info.alt_name, domain->alt_name); sid_to_fstring(cli->response->data.domain_info.sid, &domain->sid); cli->response->data.domain_info.native_mode = domain->native_mode; cli->response->data.domain_info.active_directory = domain->active_directory; cli->response->data.domain_info.primary = domain->primary; request_ok(cli); return; } state = talloc_zero(cli->mem_ctx, struct domain_info_state); if (state == NULL) { DEBUG(0, ("talloc failed\n")); request_error(cli); return; } state->cli = cli; state->domain = domain; state->ping_request.cmd = WINBINDD_PING; /* * Send a ping down. This implicitly initializes the domain. */ req = wb_domain_request_send(state, winbind_event_context(), domain, &state->ping_request); if (req == NULL) { DEBUG(3, ("wb_domain_request_send failed\n")); request_error(cli); return; } tevent_req_set_callback(req, domain_info_done, state); } static void domain_info_done(struct tevent_req *req) { struct domain_info_state *state = tevent_req_callback_data( req, struct domain_info_state); struct winbindd_response *response; int ret, err; ret = wb_domain_request_recv(req, req, &response, &err); TALLOC_FREE(req); if (ret == -1) { DEBUG(10, ("wb_domain_request failed: %s\n", strerror(errno))); request_error(state->cli); return; } if (!state->domain->initialized) { DEBUG(5, ("wb_domain_request did not initialize domain %s\n", state->domain->name)); request_error(state->cli); return; } fstrcpy(state->cli->response->data.domain_info.name, state->domain->name); fstrcpy(state->cli->response->data.domain_info.alt_name, state->domain->alt_name); sid_to_fstring(state->cli->response->data.domain_info.sid, &state->domain->sid); state->cli->response->data.domain_info.native_mode = state->domain->native_mode; state->cli->response->data.domain_info.active_directory = state->domain->active_directory; state->cli->response->data.domain_info.primary = state->domain->primary; request_ok(state->cli); } /* List various tidbits of information */ void winbindd_info(struct winbindd_cli_state *state) { DEBUG(3, ("[%5lu]: request misc info\n", (unsigned long)state->pid)); state->response->data.info.winbind_separator = *lp_winbind_separator(); fstrcpy(state->response->data.info.samba_version, samba_version_string()); request_ok(state); } /* Tell the client the current interface version */ void winbindd_interface_version(struct winbindd_cli_state *state) { DEBUG(3, ("[%5lu]: request interface version\n", (unsigned long)state->pid)); state->response->data.interface_version = WINBIND_INTERFACE_VERSION; request_ok(state); } /* What domain are we a member of? */ void winbindd_domain_name(struct winbindd_cli_state *state) { DEBUG(3, ("[%5lu]: request domain name\n", (unsigned long)state->pid)); fstrcpy(state->response->data.domain_name, lp_workgroup()); request_ok(state); } /* What's my name again? */ void winbindd_netbios_name(struct winbindd_cli_state *state) { DEBUG(3, ("[%5lu]: request netbios name\n", (unsigned long)state->pid)); fstrcpy(state->response->data.netbios_name, global_myname()); request_ok(state); } /* Where can I find the privileged pipe? */ void winbindd_priv_pipe_dir(struct winbindd_cli_state *state) { char *priv_dir; DEBUG(3, ("[%5lu]: request location of privileged pipe\n", (unsigned long)state->pid)); priv_dir = get_winbind_priv_pipe_dir(); state->response->extra_data.data = talloc_move(state->mem_ctx, &priv_dir); /* must add one to length to copy the 0 for string termination */ state->response->length += strlen((char *)state->response->extra_data.data) + 1; request_ok(state); }