#!/usr/bin/python # # Unix SMB/CIFS implementation. # A script to compare differences of objects and attributes between # two LDAP servers both running at the same time. It generally compares # one of the three pratitions DOMAIN, CONFIGURATION or SCHEMA. Users # that have to be provided sheould be able to read objects in any of the # above partitions. # Copyright (C) Zahari Zahariev 2009 # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see . # import os import re import sys from optparse import OptionParser sys.path.insert(0, "bin/python") import samba import samba.getopt as options from samba import Ldb from samba.ndr import ndr_pack, ndr_unpack from samba.dcerpc import security from ldb import SCOPE_SUBTREE, SCOPE_ONELEVEL, SCOPE_BASE, ERR_NO_SUCH_OBJECT, LdbError global summary summary = {} class LDAPBase(object): def __init__(self, host, creds, lp): if not "://" in host: self.host = "ldap://" + host + ":389" self.ldb = Ldb(self.host, credentials=creds, lp=lp, options=["modules:paged_searches"]) self.base_dn = self.find_basedn() self.netbios_name = self.find_netbios() self.domain_name = re.sub("[Dd][Cc]=", "", self.base_dn).replace(",", ".") self.domain_sid_bin = self.get_object_sid(self.base_dn) def find_netbios(self): res = self.ldb.search(base="CN=Partitions,CN=Configuration,%s" % self.base_dn, \ scope=SCOPE_SUBTREE, attrs=["nETBIOSName"]) assert len(res) > 0 for x in res: if "nETBIOSName" in x.keys(): return x["nETBIOSName"][0] def find_basedn(self): res = self.ldb.search(base="", expression="(objectClass=*)", scope=SCOPE_BASE, attrs=["defaultNamingContext"]) assert len(res) == 1 return res[0]["defaultNamingContext"][0] def object_exists(self, object_dn): res = None try: res = self.ldb.search(base=object_dn, scope=SCOPE_BASE, expression="(objectClass=*)") except LdbError, (ERR_NO_SUCH_OBJECT, _): return False return len(res) == 1 def get_object_sid(self, object_dn): try: res = self.ldb.search(base=object_dn, expression="(objectClass=*)", scope=SCOPE_BASE, attrs=["objectSid"]) except LdbError, (ERR_NO_SUCH_OBJECT, _): raise Exception("DN sintax is wrong or object does't exist: " + object_dn) assert len(res) == 1 return res[0]["objectSid"][0] def delete_force(self, object_dn): try: self.ldb.delete(object_dn) except Ldb.LdbError, e: assert "No such object" in str(e) def get_attributes(self, object_dn): """ Returns dict with all default visible attributes """ res = self.ldb.search(base=object_dn, scope=SCOPE_BASE, attrs=["*"]) assert len(res) == 1 res = dict(res[0]) # 'Dn' element is not iterable and we have it as 'distinguishedName' del res["dn"] for key in res.keys(): res[key] = list(res[key]) return res def get_descriptor(self, object_dn): res = self.ldb.search(base=object_dn, scope=SCOPE_BASE, attrs=["nTSecurityDescriptor"]) return res[0]["nTSecurityDescriptor"][0] class AdObject(object): def __init__(self, con, dn, summary): self.con = con self.summary = summary self.dn = dn.replace("${DOMAIN_DN}", self.con.base_dn) self.attributes = self.con.get_attributes(self.dn) # attributes that are considered always to be different e.g based on timestamp etc. self.ignore_attributes = ["objectCategory", "objectGUID", \ "whenChanged", "objectSid", "whenCreated", "uSNChanged", "pwdLastSet", \ "uSNCreated", "logonCount", "badPasswordTime", "lastLogon", "creationTime", \ "modifiedCount", "priorSetTime", "rIDManagerReference", "gPLink", "ipsecNFAReference", \ "fRSPrimaryMember", "fSMORoleOwner", "masteredBy", "ipsecOwnersReference", "wellKnownObjects", \ "badPwdCount", "ipsecISAKMPReference", "ipsecFilterReference", "msDs-masteredBy", "lastSetTime", \ "ipsecNegotiationPolicyReference", "subRefs", "gPCFileSysPath", "accountExpires", "dSCorePropagationData", \ # After Exchange preps "targetAddress", "msExchMailboxGuid", "siteFolderGUID"] #self.ignore_attributes = [] self.ignore_attributes = [x.upper() for x in self.ignore_attributes] # # Attributes that contain the unique DN tail part e.g. 'DC=samba,DC=org' self.dn_attributes = ["distinguishedName", "defaultObjectCategory", \ "member", "memberOf", "siteList", "nCName", "homeMDB", "homeMTA", "interSiteTopologyGenerator", \ # After Exchange preps "msExchHomeRoutingGroup", "msExchResponsibleMTAServer", "siteFolderServer", "msExchRoutingMasterDN", \ "msExchRoutingGroupMembersBL", "homeMDBBL", "msExchHomePublicMDB", "msExchOwningServer", "templateRoots", \ "addressBookRoots", "msExchPolicyRoots", "globalAddressList", "msExchOwningPFTree", \ "msExchResponsibleMTAServerBL", "msExchOwningPFTreeBL",] self.dn_attributes = [x.upper() for x in self.dn_attributes] # # Attributes that contain the Domain name e.g. 'samba.org' self.domain_attributes = ["proxyAddresses", "mail", "userPrincipalName", "msExchSmtpFullyQualifiedDomainName", \ "dnsHostName", "networkAddress", "dnsRoot", "servicePrincipalName"] self.domain_attributes = [x.upper() for x in self.domain_attributes] def fix_dn(self, s): res = "%s" % s if res.upper().endswith(self.con.base_dn.upper()): res = res[:len(res)-len(self.con.base_dn)] + "${DOMAIN_DN}" return res def fix_domain_name(self, s): res = "%s" % s if res.upper().endswith(self.con.domain_name.upper()): res = res[:len(res)-len(self.con.domain_name)] + "${DOMAIN_NAME}" return res def fix_netbios_name(self, s): res = "%s" % s if res.upper().endswith(self.con.netbios_name.upper()): res = res[:len(res)-len(self.con.netbios_name)] + "${NETBIOS_NAME}" return res def __eq__(self, other): res = True self.unique_attrs = [] self.df_value_attrs = [] other.unique_attrs = [] if self.attributes.keys() != other.attributes.keys(): print 4*" " + "Different number of attributes!" # title = 4*" " + "Attributes found only in %s:" % self.con.base_dn for x in self.attributes.keys(): if not x.upper() in [q.upper() for q in other.attributes.keys()]: if title: print title title = None print 8*" " + x self.unique_attrs.append(x) # title = 4*" " + "Attributes found only in %s:" % other.con.base_dn for x in other.attributes.keys(): if not x.upper() in [q.upper() for q in self.attributes.keys()]: if title: print title title = None print 8*" " + x other.unique_attrs.append(x) # res = False # missing_attrs = [x.upper() for x in self.unique_attrs] missing_attrs += [x.upper() for x in other.unique_attrs] title = 4*" " + "Difference in attribute values:" for x in self.attributes.keys(): if x.upper() in self.ignore_attributes or x.upper() in missing_attrs: continue if isinstance(self.attributes[x], list) and isinstance(other.attributes[x], list): self.attributes[x] = sorted(self.attributes[x]) other.attributes[x] = sorted(other.attributes[x]) if self.attributes[x] != other.attributes[x]: p = None q = None # Attribute values that are list that contain DN based values that may differ if x.upper() in self.dn_attributes: p = [self.fix_dn(j) for j in self.attributes[x]] q = [other.fix_dn(j) for j in other.attributes[x]] if p == q: continue elif x.upper() in ["DC",]: # Usually displayed as the first part of the Domain DN p = [self.con.domain_name.split(".")[0] == j for j in self.attributes[x]] q = [other.con.domain_name.split(".")[0] == j for j in other.attributes[x]] if p == q: continue # Attributes that contain the Domain name in them elif x.upper() in self.domain_attributes: p = [self.fix_domain_name(j) for j in self.attributes[x]] q = [other.fix_domain_name(j) for j in other.attributes[x]] if p == q: continue # if title: print title title = None if p and q: print 8*" " + x + " -> \n* %s\n* %s" % (p, q) else: print 8*" " + x + " -> \n* %s\n* %s" % (self.attributes[x], other.attributes[x]) self.df_value_attrs.append(x) res = False # if self.unique_attrs + other.unique_attrs != []: assert self.unique_attrs != other.unique_attrs self.summary["unique_attrs"] += self.unique_attrs self.summary["df_value_attrs"] += self.df_value_attrs other.summary["unique_attrs"] += other.unique_attrs other.summary["df_value_attrs"] += self.df_value_attrs # they are the same # return res class AdBundel(object): def __init__(self, con, context=None, dn_list=None): self.con = con self.summary = {} self.summary["unique_attrs"] = [] self.summary["df_value_attrs"] = [] self.summary["known_ignored_dn"] = [] self.summary["abnormal_ignored_dn"] = [] if dn_list: self.dn_list = dn_list elif context.upper() in ["DOMAIN", "CONFIGURATION", "SCHEMA"]: self.context = context.upper() self.dn_list = self.get_dn_list(context) else: raise Exception("Unknown initialization data for AdBundel().") self.dn_list = [x[:len(x)-len(self.con.base_dn)] + "${DOMAIN_DN}" for x in self.dn_list] self.dn_list = list(set(self.dn_list)) self.dn_list = sorted(self.dn_list) self.size = len(self.dn_list) def update_size(self): self.size = len(self.dn_list) self.dn_list = sorted(self.dn_list) def __eq__(self, other): res = True if self.size != other.size: print "Lists have different size: %s != %s" % (self.size, other.size) res = False # print "\n* DNs found only in %s:" % self.con.base_dn for x in self.dn_list: if not x.upper() in [q.upper() for q in other.dn_list]: print " %s" % x self.dn_list[self.dn_list.index(x)] = "" self.dn_list = [x for x in self.dn_list if x] # print "\n* DNs found only in %s:" % other.con.base_dn for x in other.dn_list: if not x.upper() in [q.upper() for q in self.dn_list]: print " %s" % x other.dn_list[other.dn_list.index(x)] = "" other.dn_list = [x for x in other.dn_list if x] # self.update_size() other.update_size() print "%s == %s" % (self.size, other.size) assert self.size == other.size assert sorted([x.upper() for x in self.dn_list]) == sorted([x.upper() for x in other.dn_list]) index = 0 while index < self.size: skip = False try: object1 = AdObject(self.con, self.dn_list[index], self.summary) except LdbError, (ERR_NO_SUCH_OBJECT, _): print "\n!!! Object not found:", self.dn_list[index] skip = True try: object2 = AdObject(other.con, other.dn_list[index], other.summary) except LdbError, (ERR_NO_SUCH_OBJECT, _): print "\n!!! Object not found:", other.dn_list[index] skip = True if skip: index += 1 continue print "\nComparing:\n'%s'\n'%s'" % (object1.dn, object2.dn) if object1 == object2: print 4*" " + "OK" else: print 4*" " + "FAILED" res = False self.summary = object1.summary other.summary = object2.summary index += 1 # return res def is_ignored(self, dn): ignore_list = { "DOMAIN" : [ # Default naming context "^CN=BCKUPKEY_[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12} Secret,CN=System,", "^CN=BCKUPKEY_[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12} Secret,CN=System,", "^CN=Domain System Volume (SYSVOL share),CN=NTFRS Subscriptions,CN=.+?,OU=Domain Controllers,", "^CN=NTFRS Subscriptions,CN=.+?,OU=Domain Controllers,", "^CN=RID Set,CN=.+?,OU=Domain Controllers,", "^CN=.+?,CN=Domain System Volume \(SYSVOL share\),CN=File Replication Service,CN=System,", "^CN=.+?,OU=Domain Controllers,", # After Exchange preps "^CN=OWAScratchPad.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}.,CN=Microsoft Exchange System Objects,", "^CN=StoreEvents.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}.,CN=Microsoft ExchangeSystem Objects,", "^CN=SystemMailbox.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}.,CN=Microsoft Exchange System Objects,", ], # Configuration naming context "CONFIGURATION" : [ "^CN=[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12},CN=Partitions,CN=Configuration,", "^CN=[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12},CN=Partitions,CN=Configuration,", "^CN=NTDS Settings,CN=.+?,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,", "^CN=.+?,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,", "^CN=%s,CN=Partitions,CN=Configuration," % self.con.netbios_name, # This one has to be investigated "^CN=Default Query Policy,CN=Query-Policies,CN=Directory Service,CN=WindowsNT,CN=Services,CN=Configuration,", # After Exchange preps "^CN=SMTP \(.+?-\{[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}\}\),CN=Connections,CN=First Organization,CN=Microsoft Exchange,CN=Services,CN=Configuration,", # x 3 times ], "SCHEMA" : [ ], } #ignore_list = {} for x in ignore_list[self.context]: if re.match(x.upper(), dn.upper()): return True return False def get_dn_list(self, context): """ Query LDAP server about the DNs of certain naming self.con.ext Domain (or Default), Configuration, Schema. Parse all DNs and filter those that are 'strange' or abnormal. """ if context.upper() == "DOMAIN": search_base = "%s" % self.con.base_dn elif context.upper() == "CONFIGURATION": search_base = "CN=Configuration,%s" % self.con.base_dn elif context.upper() == "SCHEMA": search_base = "CN=Schema,CN=Configuration,%s" % self.con.base_dn dn_list = [] res = self.con.ldb.search(base=search_base, scope=SCOPE_SUBTREE, attrs=["dn"]) for x in res: dn_list.append(x["dn"].get_linearized()) # global summary # print "\nIgnored (strange) DNs in %s:" % self.con.base_dn for x in dn_list: xx = "".join(re.findall("[Cc][Nn]=.*?,", x)) \ + "".join(re.findall("[Oo][Uu]=.*?,", x)) \ + "".join(re.findall("[Dd][Cc]=.*?,", x)) + re.search("([Dd][Cc]=[\w^=]*?$)", x).group() if x != xx: print 4*" " + x dn_list[dn_list.index(x)] = "" # print "\nKnown DN ignore list for %s" % self.con.base_dn for x in dn_list: if self.is_ignored(x): print 4*" " + x dn_list[dn_list.index(x)] = "" # dn_list = [x for x in dn_list if x] return dn_list def print_summary(self): self.summary["unique_attrs"] = list(set(self.summary["unique_attrs"])) self.summary["df_value_attrs"] = list(set(self.summary["df_value_attrs"])) # print "\nAttributes found only in %s:" % self.con.base_dn print "".join([str("\n" + 4*" " + x) for x in self.summary["unique_attrs"]]) # print "\nAttributes with different values:" print "".join([str("\n" + 4*" " + x) for x in self.summary["df_value_attrs"]]) self.summary["df_value_attrs"] = [] ### if __name__ == "__main__": parser = OptionParser("ldapcmp [options] domain|configuration|schema") sambaopts = options.SambaOptions(parser) credopts = options.CredentialsOptionsDouble(parser) parser.add_option_group(credopts) lp = sambaopts.get_loadparm() creds = credopts.get_credentials(lp) creds2 = credopts.get_credentials2(lp) parser.add_option("", "--host", dest="host", help="IP of the first LDAP server",) parser.add_option("", "--host2", dest="host2", help="IP of the second LDAP server",) (options, args) = parser.parse_args() if not (len(args) == 1 and args[0].upper() in ["DOMAIN", "CONFIGURATION", "SCHEMA"]): parser.error("Incorrect arguments") con1 = LDAPBase(options.host, creds, lp) assert len(con1.base_dn) > 0 con2 = LDAPBase(options.host2, creds2, lp) assert len(con2.base_dn) > 0 b1 = AdBundel(con1, args[0]) b2 = AdBundel(con2, args[0]) if b1 == b2: print "\n\nFinal result: SUCCESS!" status = 0 else: print "\n\nFinal result: FAILURE!" status = 1 assert len(b1.summary["df_value_attrs"]) == len(b2.summary["df_value_attrs"]) print "\nSUMMARY" print "---------" b1.print_summary() b2.print_summary() sys.exit(status)