summaryrefslogtreecommitdiff
path: root/source4/scripting/bin/samba3dump
blob: a1a893a754eaf3472e23dfd4e03f30e6c4678368 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
#!/usr/bin/env python
#
#    Dump Samba3 data
#    Copyright Jelmer Vernooij 2005-2007
#    Released under the GNU GPL v3 or later
#

import optparse
import os, sys

# Find right directory when running from source tree
sys.path.insert(0, "bin/python")

import samba
import samba.samba3
from samba.samba3 import param as s3param
from samba.dcerpc import lsa

parser = optparse.OptionParser("samba3dump <libdir> [<smb.conf>]")
parser.add_option("--format", type="choice", metavar="FORMAT",
                  choices=["full", "summary"])

opts, args = parser.parse_args()

if opts.format is None:
    opts.format = "summary"

def print_header(txt):
    print "\n%s" % txt
    print "=" * len(txt)

def print_samba3_policy(pol):
    print_header("Account Policies")
    print "Min password length: %d" % pol['min password length']
    print "Password history length: %d" % pol['password history']
    if pol['user must logon to change password']:
        print "User must logon to change password: %d" % pol['user must logon to change password']
    if pol['maximum password age']:
        print "Maximum password age: %d" % pol['maximum password age']
    if pol['minimum password age']:
        print "Minimum password age: %d" % pol['minimum password age']
    if pol['lockout duration']:
        print "Lockout duration: %d" % pol['lockout duration']
    if pol['reset count minutes']:
        print "Reset Count Minutes: %d" % pol['reset count minutes']
    if pol['bad lockout attempt']:
        print "Bad Lockout Minutes: %d" % pol['bad lockout attempt']
    if pol['disconnect time']:
        print "Disconnect Time: %d" % pol['disconnect time']
    if pol['refuse machine password change']:
        print "Refuse Machine Password Change: %d" % pol['refuse machine password change']

def print_samba3_sam(samdb):
    print_header("SAM Database")
    for user in samdb.search_users(0):
        print "%s (%d): %s" % (user['account_name'], user['rid'], user['fullname'])

def print_samba3_shares(lp):
    print_header("Configured shares")
    for s in lp.services():
        print "--- %s ---" % s
        for p in ['path']:
            print "\t%s = %s" % (p, lp.get(p, s))
        print ""

def print_samba3_secrets(secrets):
    print_header("Secrets")

    if secrets.get_auth_user():
        print "IPC Credentials:"
        if secrets.get_auth_user():
            print "    User: %s\n" % secrets.get_auth_user()
        if secrets.get_auth_password():
            print "    Password: %s\n" % secrets.get_auth_password()
        if secrets.get_auth_domain():
            print "    Domain: %s\n" % secrets.get_auth_domain()

    if len(list(secrets.ldap_dns())) > 0:
        print "LDAP passwords:"
        for dn in secrets.ldap_dns():
            print "\t%s -> %s" % (dn, secrets.get_ldap_bind_pw(dn))
        print ""

    print "Domains:"
    for domain in secrets.domains():
        print "\t--- %s ---" % domain
        print "\tSID: %s" % secrets.get_sid(domain)
        print "\tGUID: %s" % secrets.get_domain_guid(domain)
        print "\tPlaintext pwd: %s" % secrets.get_machine_password(domain)
        if secrets.get_machine_last_change_time(domain):
            print "\tLast Changed: %lu" % secrets.get_machine_last_change_time(domain)
        if secrets.get_machine_sec_channel_type(domain):
            print "\tSecure Channel Type: %d\n" % secrets.get_machine_sec_channel_type(domain)

    print "Trusted domains:"
    for td in secrets.trusted_domains():
        print td

def print_samba3_regdb(regdb):
    print_header("Registry")
    from samba.registry import str_regtype

    for k in regdb.keys():
        print "[%s]" % k
        for (value_name, (type, value))  in regdb.values(k).items():
            print "\"%s\"=%s:%s" % (value_name, str_regtype(type), value)

def print_samba3_winsdb(winsdb):
    print_header("WINS Database")

    for name in winsdb:
        (ttl, ips, nb_flags) = winsdb[name]
        print "%s, nb_flags: %s, ttl: %lu, %d ips, fst: %s" % (name, nb_flags, ttl, len(ips), ips[0])

def print_samba3_groupmappings(groupdb):
    print_header("Group Mappings")
    
    for g in groupdb.enum_group_mapping(samba.samba3.passdb.get_global_sam_sid(),
                                        lsa.SID_NAME_DOM_GRP):
        print "\t--- Group: %s ---" % g.sid

def print_samba3_aliases(groupdb):
    for g in groupdb.enum_group_mapping(samba.samba3.passdb.get_global_sam_sid(),
                                        lsa.SID_NAME_ALIAS):
        print "\t--- Alias: %s ---" % g.sid

def print_samba3_idmapdb(idmapdb):
    print_header("Winbindd SID<->GID/UID mappings")

    print "User High Water Mark: %d" % idmapdb.get_user_hwm()
    print "Group High Water Mark: %d\n" % idmapdb.get_group_hwm()

    for uid in idmapdb.uids():
        print "%s -> UID %d" % (idmapdb.get_user_sid(uid), uid)

    for gid in idmapdb.gids():
        print "%s -> GID %d" % (idmapdb.get_group_sid(gid), gid)

def print_samba3(samba3):
    passdb = samba3.get_sam_db()
    print_samba3_policy(passdb.get_account_policy())
    print_samba3_winsdb(samba3.get_wins_db())
    print_samba3_regdb(samba3.get_registry())
    print_samba3_secrets(samba3.get_secrets_db())
    print_samba3_idmapdb(samba3.get_idmap_db())
    print_samba3_sam(passdb)
    print_samba3_groupmappings(passdb)
    print_samba3_aliases(passdb)
    print_samba3_shares(samba3.lp)

def print_samba3_summary(samba3):
    print "WINS db entries: %d" % len(samba3.get_wins_db())
    print "Registry key count: %d" % len(samba3.get_registry())
    passdb = samba3.get_sam_db()
    print "Groupmap count: %d" % len(passdb.enum_group_mapping())
    print "Alias count: %d" % len(passdb.search_aliases())
    idmapdb = samba3.get_idmap_db()
    print "Idmap count: %d" % (len(list(idmapdb.uids())) + len(list(idmapdb.gids())))

if len(args) < 1:
    parser.print_help()
    sys.exit(1)

libdir = args[0]
if len(args) < 1:
    smbconf = args[1]
else:
    smbconf = os.path.join(libdir, "smb.conf")

s3_lp = s3param.get_context()
s3_lp.set("private dir", libdir)
s3_lp.set("state directory", libdir)
s3_lp.set("lock directory", libdir)
s3_lp.load(smbconf)
samba3 = samba.samba3.Samba3(smbconf, s3_lp)

if opts.format == "summary":
    print_samba3_summary(samba3)
elif opts.format == "full":
    print_samba3(samba3)