/* Unix SMB/CIFS implementation. Copyright (C) Volker Lendecke 2005 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ /* a composite API for finding a DC and its name */ #include "includes.h" #include "libcli/composite/composite.h" #include "winbind/wb_async_helpers.h" #include "lib/messaging/irpc.h" #include "librpc/gen_ndr/ndr_irpc.h" #include "libcli/auth/credentials.h" struct get_schannel_creds_state { struct cli_credentials *wks_creds; struct dcerpc_pipe *p; struct netr_ServerReqChallenge r; struct creds_CredentialState *creds_state; struct netr_Credential netr_cred; uint32_t negotiate_flags; struct netr_ServerAuthenticate2 a; }; static void get_schannel_creds_recv_anonbind(struct composite_context *creq); static void get_schannel_creds_recv_auth(struct rpc_request *req); static void get_schannel_creds_recv_chal(struct rpc_request *req); static void get_schannel_creds_recv_pipe(struct composite_context *ctx); struct composite_context *wb_get_schannel_creds_send(TALLOC_CTX *mem_ctx, struct cli_credentials *wks_creds, struct smbcli_tree *tree, struct event_context *ev) { struct composite_context *c, *creq; struct get_schannel_creds_state *state; c = talloc_zero(mem_ctx, struct composite_context); if (c == NULL) return NULL; state = talloc(c, struct get_schannel_creds_state); if (state == NULL) { c->status = NT_STATUS_NO_MEMORY; goto failed; } c->state = COMPOSITE_STATE_IN_PROGRESS; c->private_data = state; c->event_ctx = ev; state->wks_creds = wks_creds; state->p = dcerpc_pipe_init(state, ev); if (state->p == NULL) { c->status = NT_STATUS_NO_MEMORY; goto failed; } creq = dcerpc_pipe_open_smb_send(state->p->conn, tree, "\\netlogon"); if (creq == NULL) { c->status = NT_STATUS_NO_MEMORY; goto failed; } creq->async.fn = get_schannel_creds_recv_pipe; creq->async.private_data = c; return c; failed: composite_error(c, c->status); return c; } static void get_schannel_creds_recv_pipe(struct composite_context *creq) { struct composite_context *c = talloc_get_type(creq->async.private_data, struct composite_context); struct get_schannel_creds_state *state = talloc_get_type(c->private_data, struct get_schannel_creds_state); c->status = dcerpc_pipe_open_smb_recv(creq); if (!composite_is_ok(c)) return; creq = dcerpc_bind_auth_none_send(state, state->p, &dcerpc_table_netlogon); composite_continue(c, creq, get_schannel_creds_recv_anonbind, c); } static void get_schannel_creds_recv_anonbind(struct composite_context *creq) { struct composite_context *c = talloc_get_type(creq->async.private_data, struct composite_context); struct get_schannel_creds_state *state = talloc_get_type(c->private_data, struct get_schannel_creds_state); struct rpc_request *req; c->status = dcerpc_bind_auth_none_recv(creq); if (!composite_is_ok(c)) return; state->r.in.computer_name = cli_credentials_get_workstation(state->wks_creds); state->r.in.server_name = talloc_asprintf(state, "\\\\%s", dcerpc_server_name(state->p)); if (composite_nomem(state->r.in.server_name, c)) return; state->r.in.credentials = talloc(state, struct netr_Credential); if (composite_nomem(state->r.in.credentials, c)) return; state->r.out.credentials = talloc(state, struct netr_Credential); if (composite_nomem(state->r.out.credentials, c)) return; generate_random_buffer(state->r.in.credentials->data, sizeof(state->r.in.credentials->data)); req = dcerpc_netr_ServerReqChallenge_send(state->p, state, &state->r); composite_continue_rpc(c, req, get_schannel_creds_recv_chal, c); } static void get_schannel_creds_recv_chal(struct rpc_request *req) { struct composite_context *c = talloc_get_type(req->async.private, struct composite_context); struct get_schannel_creds_state *state = talloc_get_type(c->private_data, struct get_schannel_creds_state); const struct samr_Password *mach_pwd; c->status = dcerpc_ndr_request_recv(req); if (!composite_is_ok(c)) return; c->status = state->r.out.result; if (!composite_is_ok(c)) return; state->creds_state = talloc(state, struct creds_CredentialState); if (composite_nomem(state->creds_state, c)) return; mach_pwd = cli_credentials_get_nt_hash(state->wks_creds, state); if (composite_nomem(mach_pwd, c)) return; state->negotiate_flags = NETLOGON_NEG_AUTH2_FLAGS; creds_client_init(state->creds_state, state->r.in.credentials, state->r.out.credentials, mach_pwd, &state->netr_cred, state->negotiate_flags); state->a.in.server_name = talloc_reference(state, state->r.in.server_name); state->a.in.account_name = cli_credentials_get_username(state->wks_creds); state->a.in.secure_channel_type = cli_credentials_get_secure_channel_type(state->wks_creds); state->a.in.computer_name = cli_credentials_get_workstation(state->wks_creds); state->a.in.negotiate_flags = &state->negotiate_flags; state->a.out.negotiate_flags = &state->negotiate_flags; state->a.in.credentials = &state->netr_cred; state->a.out.credentials = &state->netr_cred; req = dcerpc_netr_ServerAuthenticate2_send(state->p, state, &state->a); composite_continue_rpc(c, req, get_schannel_creds_recv_auth, c); } static void get_schannel_creds_recv_auth(struct rpc_request *req) { struct composite_context *c = talloc_get_type(req->async.private, struct composite_context); struct get_schannel_creds_state *state = talloc_get_type(c->private_data, struct get_schannel_creds_state); c->status = dcerpc_ndr_request_recv(req); if (!composite_is_ok(c)) return; c->status = state->a.out.result; if (!composite_is_ok(c)) return; if (!creds_client_check(state->creds_state, state->a.out.credentials)) { DEBUG(5, ("Server got us invalid creds\n")); composite_error(c, NT_STATUS_UNSUCCESSFUL); return; } cli_credentials_set_netlogon_creds(state->wks_creds, state->creds_state); composite_done(c); } NTSTATUS wb_get_schannel_creds_recv(struct composite_context *c, TALLOC_CTX *mem_ctx, struct dcerpc_pipe **netlogon_pipe) { NTSTATUS status = composite_wait(c); if (NT_STATUS_IS_OK(status)) { struct get_schannel_creds_state *state = talloc_get_type(c->private_data, struct get_schannel_creds_state); *netlogon_pipe = talloc_steal(mem_ctx, state->p); } talloc_free(c); return status; } NTSTATUS wb_get_schannel_creds(TALLOC_CTX *mem_ctx, struct cli_credentials *wks_creds, struct smbcli_tree *tree, struct event_context *event_ctx, struct dcerpc_pipe **netlogon_pipe) { struct composite_context *c = wb_get_schannel_creds_send(mem_ctx, wks_creds, tree, event_ctx); return wb_get_schannel_creds_recv(c, mem_ctx, netlogon_pipe); } struct lsa_lookupsids_state { struct composite_context *ctx; int num_sids; struct lsa_LookupSids r; struct lsa_SidArray sids; struct lsa_TransNameArray names; uint32_t count; struct wb_sid_object **result; }; static void lsa_lookupsids_recv_names(struct rpc_request *req); struct composite_context *wb_lsa_lookupsids_send(TALLOC_CTX *mem_ctx, struct dcerpc_pipe *lsa_pipe, struct policy_handle *handle, int num_sids, const struct dom_sid **sids) { struct composite_context *result; struct rpc_request *req; struct lsa_lookupsids_state *state; int i; result = talloc(mem_ctx, struct composite_context); if (result == NULL) goto failed; result->state = COMPOSITE_STATE_IN_PROGRESS; result->async.fn = NULL; result->event_ctx = lsa_pipe->conn->event_ctx; state = talloc(result, struct lsa_lookupsids_state); if (state == NULL) goto failed; result->private_data = state; state->ctx = result; state->sids.num_sids = num_sids; state->sids.sids = talloc_array(state, struct lsa_SidPtr, num_sids); if (state->sids.sids == NULL) goto failed; for (i=0; i<num_sids; i++) { state->sids.sids[i].sid = dom_sid_dup(state->sids.sids, sids[i]); if (state->sids.sids[i].sid == NULL) goto failed; } state->count = 0; state->num_sids = num_sids; state->names.count = 0; state->names.names = NULL; state->r.in.handle = handle; state->r.in.sids = &state->sids; state->r.in.names = &state->names; state->r.in.level = 1; state->r.in.count = &state->count; state->r.out.names = &state->names; state->r.out.count = &state->count; req = dcerpc_lsa_LookupSids_send(lsa_pipe, state, &state->r); if (req == NULL) goto failed; req->async.callback = lsa_lookupsids_recv_names; req->async.private = state; return result; failed: talloc_free(result); return NULL; } static void lsa_lookupsids_recv_names(struct rpc_request *req) { struct lsa_lookupsids_state *state = talloc_get_type(req->async.private, struct lsa_lookupsids_state); int i; state->ctx->status = dcerpc_ndr_request_recv(req); if (!composite_is_ok(state->ctx)) return; state->ctx->status = state->r.out.result; if (!NT_STATUS_IS_OK(state->ctx->status) && !NT_STATUS_EQUAL(state->ctx->status, STATUS_SOME_UNMAPPED)) { composite_error(state->ctx, state->ctx->status); return; } state->result = talloc_array(state, struct wb_sid_object *, state->num_sids); if (composite_nomem(state->result, state->ctx)) return; for (i=0; i<state->num_sids; i++) { struct lsa_TranslatedName *name = &state->r.out.names->names[i]; struct lsa_TrustInformation *dom; state->result[i] = talloc_zero(state->result, struct wb_sid_object); if (composite_nomem(state->result[i], state->ctx)) return; state->result[i]->type = name->sid_type; if (state->result[i]->type == SID_NAME_UNKNOWN) { continue; } if (name->sid_index >= state->r.out.domains->count) { composite_error(state->ctx, NT_STATUS_INVALID_PARAMETER); return; } dom = &state->r.out.domains->domains[name->sid_index]; state->result[i]->domain = talloc_reference(state->result[i], dom->name.string); if ((name->sid_type == SID_NAME_DOMAIN) || (name->name.string == NULL)) { state->result[i]->name = talloc_strdup(state->result[i], ""); } else { state->result[i]->name = talloc_steal(state->result[i], name->name.string); } if (composite_nomem(state->result[i]->name, state->ctx)) { return; } } composite_done(state->ctx); } NTSTATUS wb_lsa_lookupsids_recv(struct composite_context *c, TALLOC_CTX *mem_ctx, struct wb_sid_object ***names) { NTSTATUS status = composite_wait(c); if (NT_STATUS_IS_OK(status)) { struct lsa_lookupsids_state *state = talloc_get_type(c->private_data, struct lsa_lookupsids_state); *names = talloc_steal(mem_ctx, state->result); } talloc_free(c); return status; } NTSTATUS wb_lsa_lookupsids(TALLOC_CTX *mem_ctx, struct dcerpc_pipe *lsa_pipe, struct policy_handle *handle, int num_sids, const struct dom_sid **sids, struct wb_sid_object ***names) { struct composite_context *c = wb_lsa_lookupsids_send(mem_ctx, lsa_pipe, handle, num_sids, sids); return wb_lsa_lookupnames_recv(c, mem_ctx, names); } struct lsa_lookupnames_state { struct composite_context *ctx; uint32_t num_names; struct lsa_LookupNames r; struct lsa_TransSidArray sids; uint32_t count; struct wb_sid_object **result; }; static void lsa_lookupnames_recv_sids(struct rpc_request *req); struct composite_context *wb_lsa_lookupnames_send(TALLOC_CTX *mem_ctx, struct dcerpc_pipe *lsa_pipe, struct policy_handle *handle, int num_names, const char **names) { struct composite_context *result; struct rpc_request *req; struct lsa_lookupnames_state *state; struct lsa_String *lsa_names; int i; result = talloc(mem_ctx, struct composite_context); if (result == NULL) goto failed; result->state = COMPOSITE_STATE_IN_PROGRESS; result->async.fn = NULL; result->event_ctx = lsa_pipe->conn->event_ctx; state = talloc(result, struct lsa_lookupnames_state); if (state == NULL) goto failed; result->private_data = state; state->ctx = result; state->sids.count = 0; state->sids.sids = NULL; state->num_names = num_names; state->count = 0; lsa_names = talloc_array(state, struct lsa_String, num_names); if (lsa_names == NULL) goto failed; for (i=0; i<num_names; i++) { lsa_names[i].string = names[i]; } state->r.in.handle = handle; state->r.in.num_names = num_names; state->r.in.names = lsa_names; state->r.in.sids = &state->sids; state->r.in.level = 1; state->r.in.count = &state->count; state->r.out.count = &state->count; state->r.out.sids = &state->sids; req = dcerpc_lsa_LookupNames_send(lsa_pipe, state, &state->r); if (req == NULL) goto failed; req->async.callback = lsa_lookupnames_recv_sids; req->async.private = state; return result; failed: talloc_free(result); return NULL; } static void lsa_lookupnames_recv_sids(struct rpc_request *req) { struct lsa_lookupnames_state *state = talloc_get_type(req->async.private, struct lsa_lookupnames_state); int i; state->ctx->status = dcerpc_ndr_request_recv(req); if (!composite_is_ok(state->ctx)) return; state->ctx->status = state->r.out.result; if (!NT_STATUS_IS_OK(state->ctx->status) && !NT_STATUS_EQUAL(state->ctx->status, STATUS_SOME_UNMAPPED)) { composite_error(state->ctx, state->ctx->status); return; } state->result = talloc_array(state, struct wb_sid_object *, state->num_names); if (composite_nomem(state->result, state->ctx)) return; for (i=0; i<state->num_names; i++) { struct lsa_TranslatedSid *sid = &state->r.out.sids->sids[i]; struct lsa_TrustInformation *dom; state->result[i] = talloc_zero(state->result, struct wb_sid_object); if (composite_nomem(state->result[i], state->ctx)) return; state->result[i]->type = sid->sid_type; if (state->result[i]->type == SID_NAME_UNKNOWN) { continue; } if (sid->sid_index >= state->r.out.domains->count) { composite_error(state->ctx, NT_STATUS_INVALID_PARAMETER); return; } dom = &state->r.out.domains->domains[sid->sid_index]; state->result[i]->sid = dom_sid_add_rid(state->result[i], dom->sid, sid->rid); } composite_done(state->ctx); } NTSTATUS wb_lsa_lookupnames_recv(struct composite_context *c, TALLOC_CTX *mem_ctx, struct wb_sid_object ***sids) { NTSTATUS status = composite_wait(c); if (NT_STATUS_IS_OK(status)) { struct lsa_lookupnames_state *state = talloc_get_type(c->private_data, struct lsa_lookupnames_state); *sids = talloc_steal(mem_ctx, state->result); } talloc_free(c); return status; } NTSTATUS wb_lsa_lookupnames(TALLOC_CTX *mem_ctx, struct dcerpc_pipe *lsa_pipe, struct policy_handle *handle, int num_names, const char **names, struct wb_sid_object ***sids) { struct composite_context *c = wb_lsa_lookupnames_send(mem_ctx, lsa_pipe, handle, num_names, names); return wb_lsa_lookupnames_recv(c, mem_ctx, sids); } #if 0 struct cmd_checkmachacc_state { struct composite_context *ctx; struct wbsrv_call *call; struct wbsrv_domain *domain; }; static void cmd_checkmachacc_recv_init(struct composite_context *ctx); struct composite_context *wb_cmd_checkmachacc_send(struct wbsrv_call *call) { struct composite_context *result, *ctx; struct cmd_checkmachacc_state *state; struct wbsrv_service *service = call->wbconn->listen_socket->service; result = talloc(call, struct composite_context); if (result == NULL) goto failed; result->state = COMPOSITE_STATE_IN_PROGRESS; result->async.fn = NULL; result->event_ctx = call->event_ctx; state = talloc(result, struct cmd_checkmachacc_state); if (state == NULL) goto failed; state->ctx = result; result->private_data = state; state->call = call; state->domain = service->domains; ctx = wb_init_domain_send(service, state->domain); if (ctx == NULL) goto failed; ctx->async.fn = cmd_checkmachacc_recv_init; ctx->async.private_data = state; return result; failed: talloc_free(result); return NULL; } static void cmd_checkmachacc_recv_init(struct composite_context *ctx) { struct cmd_checkmachacc_state *state = talloc_get_type(ctx->async.private_data, struct cmd_checkmachacc_state); state->ctx->status = wb_init_domain_recv(ctx); if (!composite_is_ok(state->ctx)) return; composite_done(state->ctx); } NTSTATUS wb_cmd_checkmachacc_recv(struct composite_context *c) { NTSTATUS status = composite_wait(c); talloc_free(c); return status; } NTSTATUS wb_cmd_checkmachacc(struct wbsrv_call *call) { struct composite_context *c = wb_cmd_checkmachacc_send(call); return wb_cmd_checkmachacc_recv(c); } #endif struct samr_getuserdomgroups_state { struct composite_context *ctx; struct dcerpc_pipe *samr_pipe; int num_rids; uint32_t *rids; struct policy_handle *user_handle; struct samr_OpenUser o; struct samr_GetGroupsForUser g; struct samr_Close c; }; static void samr_usergroups_recv_open(struct rpc_request *req); static void samr_usergroups_recv_groups(struct rpc_request *req); static void samr_usergroups_recv_close(struct rpc_request *req); struct composite_context *wb_samr_userdomgroups_send(TALLOC_CTX *mem_ctx, struct dcerpc_pipe *samr_pipe, struct policy_handle *domain_handle, uint32_t rid) { struct composite_context *result; struct rpc_request *req; struct samr_getuserdomgroups_state *state; result = talloc(mem_ctx, struct composite_context); if (result == NULL) goto failed; result->state = COMPOSITE_STATE_IN_PROGRESS; result->async.fn = NULL; result->event_ctx = samr_pipe->conn->event_ctx; state = talloc(result, struct samr_getuserdomgroups_state); if (state == NULL) goto failed; result->private_data = state; state->ctx = result; state->samr_pipe = samr_pipe; state->user_handle = talloc(state, struct policy_handle); if (state->user_handle == NULL) goto failed; state->o.in.domain_handle = domain_handle; state->o.in.access_mask = SEC_FLAG_MAXIMUM_ALLOWED; state->o.in.rid = rid; state->o.out.user_handle = state->user_handle; req = dcerpc_samr_OpenUser_send(state->samr_pipe, state, &state->o); if (req == NULL) goto failed; req->async.callback = samr_usergroups_recv_open; req->async.private = state; return result; failed: talloc_free(result); return NULL; } static void samr_usergroups_recv_open(struct rpc_request *req) { struct samr_getuserdomgroups_state *state = talloc_get_type(req->async.private, struct samr_getuserdomgroups_state); state->ctx->status = dcerpc_ndr_request_recv(req); if (!composite_is_ok(state->ctx)) return; state->ctx->status = state->o.out.result; if (!composite_is_ok(state->ctx)) return; state->g.in.user_handle = state->user_handle; req = dcerpc_samr_GetGroupsForUser_send(state->samr_pipe, state, &state->g); composite_continue_rpc(state->ctx, req, samr_usergroups_recv_groups, state); } static void samr_usergroups_recv_groups(struct rpc_request *req) { struct samr_getuserdomgroups_state *state = talloc_get_type(req->async.private, struct samr_getuserdomgroups_state); state->ctx->status = dcerpc_ndr_request_recv(req); if (!composite_is_ok(state->ctx)) return; state->ctx->status = state->g.out.result; if (!composite_is_ok(state->ctx)) return; state->c.in.handle = state->user_handle; state->c.out.handle = state->user_handle; req = dcerpc_samr_Close_send(state->samr_pipe, state, &state->c); composite_continue_rpc(state->ctx, req, samr_usergroups_recv_close, state); } static void samr_usergroups_recv_close(struct rpc_request *req) { struct samr_getuserdomgroups_state *state = talloc_get_type(req->async.private, struct samr_getuserdomgroups_state); state->ctx->status = dcerpc_ndr_request_recv(req); if (!composite_is_ok(state->ctx)) return; state->ctx->status = state->c.out.result; if (!composite_is_ok(state->ctx)) return; composite_done(state->ctx); } NTSTATUS wb_samr_userdomgroups_recv(struct composite_context *ctx, TALLOC_CTX *mem_ctx, int *num_rids, uint32_t **rids) { struct samr_getuserdomgroups_state *state = talloc_get_type(ctx->private_data, struct samr_getuserdomgroups_state); int i; NTSTATUS status = composite_wait(ctx); if (!NT_STATUS_IS_OK(status)) goto done; *num_rids = state->g.out.rids->count; *rids = talloc_array(mem_ctx, uint32_t, *num_rids); if (*rids == NULL) { status = NT_STATUS_NO_MEMORY; goto done; } for (i=0; i<*num_rids; i++) { (*rids)[i] = state->g.out.rids->rids[i].rid; } done: talloc_free(ctx); return status; }