1996-05-04 11:50:46 +04:00
/*
2001-06-29 12:04:12 +04:00
* Unix SMB / Netbios implementation .
* Copyright ( C ) Jeremy Allison 1995 - 1998
* Copyright ( C ) Tim Potter 2001
1996-05-04 11:50:46 +04:00
*
2001-06-29 12:04:12 +04:00
* This program is free software ; you can redistribute it and / or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation ; either version 2 of the License , or ( at your
* option ) any later version .
1996-05-04 11:50:46 +04:00
*
* This program is distributed in the hope that it will be useful , but WITHOUT
* ANY WARRANTY ; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE . See the GNU General Public License for
* more details .
*
* You should have received a copy of the GNU General Public License along with
* this program ; if not , write to the Free Software Foundation , Inc . , 675
2001-06-29 12:04:12 +04:00
* Mass Ave , Cambridge , MA 0213 9 , USA . */
1996-05-04 11:50:46 +04:00
# include "includes.h"
1998-04-25 05:12:08 +04:00
extern pstring global_myname ;
1998-04-30 02:27:26 +04:00
1998-11-19 01:04:24 +03:00
/*
* Next two lines needed for SunOS and don ' t
* hurt anything else . . .
*/
extern char * optarg ;
extern int optind ;
1998-04-25 05:12:08 +04:00
2001-11-19 11:12:06 +03:00
/** forced running in root-mode **/
2001-06-25 05:15:17 +04:00
static BOOL local_mode ;
2001-11-19 11:12:06 +03:00
/**
* Print command usage on stderr and die .
* */
1998-11-12 09:12:19 +03:00
static void usage ( void )
1996-05-04 11:50:46 +04:00
{
2001-11-19 11:12:06 +03:00
printf ( " When run by root: \n " ) ;
printf ( " smbpasswd [options] [username] [password] \n " ) ;
printf ( " otherwise: \n " ) ;
printf ( " smbpasswd [options] [password] \n \n " ) ;
1998-11-12 09:12:19 +03:00
printf ( " options: \n " ) ;
printf ( " -s use stdin for password prompt \n " ) ;
printf ( " -D LEVEL debug level \n " ) ;
printf ( " -U USER remote username \n " ) ;
printf ( " -r MACHINE remote machine \n " ) ;
2001-11-19 11:12:06 +03:00
printf ( " extra options when run by root or in local mode: \n " ) ;
printf ( " -L local mode (must be first option) \n " ) ;
printf ( " -R ORDER name resolve order \n " ) ;
printf ( " -j DOMAIN join domain name \n " ) ;
printf ( " -a add user \n " ) ;
printf ( " -x delete user \n " ) ;
printf ( " -d disable user \n " ) ;
printf ( " -e enable user \n " ) ;
printf ( " -n set no password \n " ) ;
printf ( " -m machine trust account \n " ) ;
1996-05-04 11:50:46 +04:00
exit ( 1 ) ;
}
1999-11-21 00:59:16 +03:00
/*********************************************************
Join a domain .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-12-13 16:27:58 +03:00
static int join_domain ( char * domain , char * remote )
1999-11-21 00:59:16 +03:00
{
1999-12-13 16:27:58 +03:00
pstring remote_machine ;
1999-11-21 00:59:16 +03:00
fstring trust_passwd ;
1999-12-13 16:27:58 +03:00
unsigned char orig_trust_passwd_hash [ 16 ] ;
BOOL ret ;
pstrcpy ( remote_machine , remote ? remote : " " ) ;
fstrcpy ( trust_passwd , global_myname ) ;
strlower ( trust_passwd ) ;
E_md4hash ( ( uchar * ) trust_passwd , orig_trust_passwd_hash ) ;
1999-11-21 00:59:16 +03:00
1999-12-13 16:27:58 +03:00
/* Ensure that we are not trying to join a
domain if we are locally set up as a domain
controller . */
1999-11-21 00:59:16 +03:00
1999-12-13 16:27:58 +03:00
if ( strequal ( remote , global_myname ) ) {
fprintf ( stderr , " Cannot join domain %s as the domain controller name is our own. We cannot be a domain controller for a domain and also be a domain member. \n " , domain ) ;
1999-11-21 00:59:16 +03:00
return 1 ;
}
1999-12-13 16:27:58 +03:00
/*
* Write the old machine account password .
*/
1999-11-21 00:59:16 +03:00
2000-06-03 10:34:40 +04:00
if ( ! secrets_store_trust_account_password ( domain , orig_trust_passwd_hash ) ) {
1999-12-13 16:27:58 +03:00
fprintf ( stderr , " Unable to write the machine account password for \
machine % s in domain % s . \ n " , global_myname, domain);
1999-11-21 00:59:16 +03:00
return 1 ;
}
1999-12-13 16:27:58 +03:00
/*
* If we are given a remote machine assume this is the PDC .
*/
if ( remote = = NULL ) {
pstrcpy ( remote_machine , lp_passwordserver ( ) ) ;
1998-11-12 09:12:19 +03:00
}
1999-12-13 16:27:58 +03:00
if ( ! * remote_machine ) {
fprintf ( stderr , " No password server list given in smb.conf - \
unable to join domain . \ n " );
1999-07-22 14:55:41 +04:00
return 1 ;
}
1999-12-13 16:27:58 +03:00
ret = change_trust_account_password ( domain , remote_machine ) ;
1998-11-12 09:12:19 +03:00
1999-12-13 16:27:58 +03:00
if ( ! ret ) {
2000-05-08 14:42:21 +04:00
trust_password_delete ( domain ) ;
1998-11-12 09:12:19 +03:00
fprintf ( stderr , " Unable to join domain %s. \n " , domain ) ;
1999-12-13 16:27:58 +03:00
} else {
printf ( " Joined domain %s. \n " , domain ) ;
1998-11-12 09:12:19 +03:00
}
1999-12-13 16:27:58 +03:00
return ( int ) ret ;
1998-11-12 09:12:19 +03:00
}
1998-04-30 02:27:26 +04:00
1998-11-12 09:12:19 +03:00
static void set_line_buffering ( FILE * f )
1998-04-30 02:27:26 +04:00
{
1998-11-12 09:12:19 +03:00
setvbuf ( f , NULL , _IOLBF , 0 ) ;
1998-04-30 02:27:26 +04:00
}
1998-11-04 03:57:00 +03:00
/*************************************************************
Utility function to prompt for passwords from stdin . Each
password entered must end with a newline .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static char * stdin_new_passwd ( void )
{
1998-11-12 09:12:19 +03:00
static fstring new_passwd ;
size_t len ;
1998-11-13 06:37:01 +03:00
ZERO_ARRAY ( new_passwd ) ;
1998-11-12 09:12:19 +03:00
/*
* if no error is reported from fgets ( ) and string at least contains
* the newline that ends the password , then replace the newline with
* a null terminator .
*/
if ( fgets ( new_passwd , sizeof ( new_passwd ) , stdin ) ! = NULL ) {
if ( ( len = strlen ( new_passwd ) ) > 0 ) {
if ( new_passwd [ len - 1 ] = = ' \n ' )
new_passwd [ len - 1 ] = 0 ;
}
}
return ( new_passwd ) ;
1998-11-04 03:57:00 +03:00
}
1998-11-12 09:12:19 +03:00
1998-11-04 03:57:00 +03:00
/*************************************************************
Utility function to get passwords via tty or stdin
Used if the ' - s ' option is set to silently get passwords
to enable scripting .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static char * get_pass ( char * prompt , BOOL stdin_get )
{
1998-11-12 09:12:19 +03:00
char * p ;
if ( stdin_get ) {
p = stdin_new_passwd ( ) ;
} else {
p = getpass ( prompt ) ;
}
2001-11-20 09:38:09 +03:00
return smb_xstrdup ( p ) ;
1998-11-04 03:57:00 +03:00
}
1998-09-25 02:33:13 +04:00
/*************************************************************
Utility function to prompt for new password .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1998-11-12 09:12:19 +03:00
static char * prompt_for_new_password ( BOOL stdin_get )
1998-09-25 02:33:13 +04:00
{
1998-11-12 09:12:19 +03:00
char * p ;
fstring new_passwd ;
1998-09-25 02:33:13 +04:00
1998-11-13 06:37:01 +03:00
ZERO_ARRAY ( new_passwd ) ;
1998-11-04 03:57:00 +03:00
1998-11-12 09:12:19 +03:00
p = get_pass ( " New SMB password: " , stdin_get ) ;
1998-09-25 02:33:13 +04:00
1998-11-12 09:12:19 +03:00
fstrcpy ( new_passwd , p ) ;
2001-09-17 15:48:29 +04:00
SAFE_FREE ( p ) ;
1998-09-25 02:33:13 +04:00
1998-11-12 09:12:19 +03:00
p = get_pass ( " Retype new SMB password: " , stdin_get ) ;
1998-09-25 02:33:13 +04:00
1998-11-12 09:12:19 +03:00
if ( strcmp ( p , new_passwd ) ) {
fprintf ( stderr , " Mismatch - password unchanged. \n " ) ;
1999-12-13 16:27:58 +03:00
ZERO_ARRAY ( new_passwd ) ;
2001-09-17 15:48:29 +04:00
SAFE_FREE ( p ) ;
1998-11-12 09:12:19 +03:00
return NULL ;
}
1998-09-25 02:33:13 +04:00
2000-07-26 07:55:17 +04:00
return p ;
1998-09-25 02:33:13 +04:00
}
1998-03-25 00:04:36 +03:00
1998-11-12 09:12:19 +03:00
/*************************************************************
2000-02-26 01:25:25 +03:00
Change a password either locally or remotely .
1998-11-12 09:12:19 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2000-02-26 01:25:25 +03:00
1998-11-12 09:12:19 +03:00
static BOOL password_change ( const char * remote_machine , char * user_name ,
2000-02-26 01:25:25 +03:00
char * old_passwd , char * new_passwd , int local_flags )
1998-11-12 09:12:19 +03:00
{
1998-11-13 02:49:32 +03:00
BOOL ret ;
pstring err_str ;
pstring msg_str ;
1999-12-13 16:27:58 +03:00
if ( remote_machine ! = NULL ) {
2000-02-26 01:25:25 +03:00
if ( local_flags & ( LOCAL_ADD_USER | LOCAL_DELETE_USER | LOCAL_DISABLE_USER | LOCAL_ENABLE_USER |
2001-03-11 03:32:10 +03:00
LOCAL_TRUST_ACCOUNT | LOCAL_SET_NO_PASSWORD ) ) {
1998-11-12 09:12:19 +03:00
/* these things can't be done remotely yet */
return False ;
}
2001-03-11 03:32:10 +03:00
ret = remote_password_change ( remote_machine , user_name ,
2001-09-29 17:08:26 +04:00
old_passwd , new_passwd , err_str , sizeof ( err_str ) ) ;
1999-12-13 16:27:58 +03:00
if ( * err_str )
1998-11-13 02:49:32 +03:00
fprintf ( stderr , err_str ) ;
return ret ;
1998-11-12 09:12:19 +03:00
}
2000-02-26 01:25:25 +03:00
ret = local_password_change ( user_name , local_flags , new_passwd ,
1999-12-13 16:27:58 +03:00
err_str , sizeof ( err_str ) , msg_str , sizeof ( msg_str ) ) ;
1998-11-13 02:49:32 +03:00
1999-12-13 16:27:58 +03:00
if ( * msg_str )
1998-11-13 02:49:32 +03:00
printf ( msg_str ) ;
1999-12-13 16:27:58 +03:00
if ( * err_str )
1998-11-13 02:49:32 +03:00
fprintf ( stderr , err_str ) ;
return ret ;
1998-11-12 09:12:19 +03:00
}
/*************************************************************
2000-02-26 01:25:25 +03:00
Handle password changing for root .
1998-11-12 09:12:19 +03:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2000-02-26 01:25:25 +03:00
1998-11-12 09:12:19 +03:00
static int process_root ( int argc , char * argv [ ] )
{
struct passwd * pwd ;
2000-07-26 07:55:17 +04:00
int result = 0 , ch ;
2001-09-13 00:00:42 +04:00
BOOL joining_domain = False , got_pass = False , got_username = False ;
2001-10-30 08:21:16 +03:00
int local_flags = LOCAL_SET_PASSWORD ;
1998-11-12 09:12:19 +03:00
BOOL stdin_passwd_get = False ;
2001-06-29 12:04:12 +04:00
fstring user_name , user_password ;
1998-11-12 09:12:19 +03:00
char * new_domain = NULL ;
char * new_passwd = NULL ;
char * old_passwd = NULL ;
char * remote_machine = NULL ;
1999-12-13 16:27:58 +03:00
2001-09-13 00:00:42 +04:00
ZERO_STRUCT ( user_name ) ;
ZERO_STRUCT ( user_password ) ;
2001-08-30 02:47:59 +04:00
2001-08-30 09:54:41 +04:00
user_name [ 0 ] = ' \0 ' ;
2001-09-13 00:00:42 +04:00
while ( ( ch = getopt ( argc , argv , " axdehmnj:r:sR:D:U:L " ) ) ! = EOF ) {
1999-12-13 16:27:58 +03:00
switch ( ch ) {
2001-06-25 05:15:17 +04:00
case ' L ' :
local_mode = True ;
break ;
1999-12-13 16:27:58 +03:00
case ' a ' :
2000-02-26 01:25:25 +03:00
local_flags | = LOCAL_ADD_USER ;
break ;
case ' x ' :
local_flags | = LOCAL_DELETE_USER ;
2001-10-30 08:21:16 +03:00
local_flags & = ~ LOCAL_SET_PASSWORD ;
1999-12-13 16:27:58 +03:00
break ;
case ' d ' :
2000-02-26 01:25:25 +03:00
local_flags | = LOCAL_DISABLE_USER ;
2001-10-30 08:21:16 +03:00
local_flags & = ~ LOCAL_SET_PASSWORD ;
1999-12-13 16:27:58 +03:00
break ;
case ' e ' :
2000-02-26 01:25:25 +03:00
local_flags | = LOCAL_ENABLE_USER ;
2001-10-30 08:21:16 +03:00
local_flags & = ~ LOCAL_SET_PASSWORD ;
1999-12-13 16:27:58 +03:00
break ;
2000-02-26 01:25:25 +03:00
case ' m ' :
local_flags | = LOCAL_TRUST_ACCOUNT ;
1999-12-13 16:27:58 +03:00
break ;
case ' n ' :
2000-02-26 01:25:25 +03:00
local_flags | = LOCAL_SET_NO_PASSWORD ;
2001-10-30 08:21:16 +03:00
local_flags & = ~ LOCAL_SET_PASSWORD ;
2000-03-01 21:58:50 +03:00
break ;
2000-02-26 01:25:25 +03:00
case ' j ' :
new_domain = optarg ;
strupper ( new_domain ) ;
joining_domain = True ;
break ;
1999-12-13 16:27:58 +03:00
case ' r ' :
remote_machine = optarg ;
break ;
case ' s ' :
set_line_buffering ( stdin ) ;
set_line_buffering ( stdout ) ;
set_line_buffering ( stderr ) ;
stdin_passwd_get = True ;
break ;
case ' R ' :
lp_set_name_resolve_order ( optarg ) ;
break ;
2000-02-26 01:25:25 +03:00
case ' D ' :
DEBUGLEVEL = atoi ( optarg ) ;
1999-12-13 16:27:58 +03:00
break ;
2001-06-29 12:04:12 +04:00
case ' U ' : {
char * lp ;
2001-09-13 00:00:42 +04:00
got_username = True ;
2001-06-29 12:04:12 +04:00
fstrcpy ( user_name , optarg ) ;
2001-07-04 11:36:09 +04:00
if ( ( lp = strchr_m ( user_name , ' % ' ) ) ) {
2001-06-29 12:04:12 +04:00
* lp = 0 ;
fstrcpy ( user_password , lp + 1 ) ;
got_pass = True ;
2001-07-04 11:36:09 +04:00
memset ( strchr_m ( optarg , ' % ' ) + 1 , ' X ' ,
2001-06-29 12:04:12 +04:00
strlen ( user_password ) ) ;
}
1999-12-13 16:27:58 +03:00
break ;
2001-06-29 12:04:12 +04:00
}
2001-08-03 03:48:51 +04:00
case ' h ' :
1999-12-13 16:27:58 +03:00
default :
usage ( ) ;
1998-11-12 09:12:19 +03:00
}
}
argc - = optind ;
argv + = optind ;
/*
2001-04-24 20:44:28 +04:00
* Ensure both add / delete user are not set
2000-02-26 01:25:25 +03:00
* Ensure add / delete user and either remote machine or join domain are
1998-11-12 09:12:19 +03:00
* not both set .
*/
2001-04-24 22:53:15 +04:00
if ( ( ( local_flags & ( LOCAL_ADD_USER | LOCAL_DELETE_USER ) ) = = ( LOCAL_ADD_USER | LOCAL_DELETE_USER ) ) | |
2001-04-24 20:44:28 +04:00
( ( local_flags & ( LOCAL_ADD_USER | LOCAL_DELETE_USER ) ) & &
( ( remote_machine ! = NULL ) | | joining_domain ) ) ) {
1998-11-12 09:12:19 +03:00
usage ( ) ;
}
2001-01-12 02:21:17 +03:00
/* Only load interfaces if we are doing network operations. */
if ( joining_domain | | remote_machine ) {
load_interfaces ( ) ;
}
2001-06-29 12:04:12 +04:00
/* Join a domain */
if ( joining_domain ) {
2000-02-26 01:25:25 +03:00
if ( argc ! = 0 )
usage ( ) ;
2001-06-29 12:04:12 +04:00
/* Are we joining by specifing an admin username and
password ? */
if ( user_name [ 0 ] ) {
/* Get administrator password if not specified */
if ( ! got_pass ) {
char * pass = getpass ( " Password: " ) ;
if ( pass )
pstrcpy ( user_password , pass ) ;
}
2001-12-04 08:03:03 +03:00
d_printf ( " use net rpc join to do this now. \n " ) ;
return 1 ;
2001-06-29 12:04:12 +04:00
} else {
/* Or just with the server manager? */
return join_domain ( new_domain , remote_machine ) ;
}
1998-11-12 09:12:19 +03:00
}
/*
* Deal with root - can add a user , but only locally .
*/
switch ( argc ) {
case 0 :
2001-09-13 00:00:42 +04:00
if ( ! got_username )
fstrcpy ( user_name , " " ) ;
1998-11-12 09:12:19 +03:00
break ;
case 1 :
2001-09-13 00:00:42 +04:00
if ( got_username )
usage ( ) ;
2001-06-29 12:04:12 +04:00
fstrcpy ( user_name , argv [ 0 ] ) ;
1998-11-12 09:12:19 +03:00
break ;
case 2 :
2001-09-13 00:00:42 +04:00
if ( got_username | | got_pass )
usage ( ) ;
2001-06-29 12:04:12 +04:00
fstrcpy ( user_name , argv [ 0 ] ) ;
2001-11-20 09:38:09 +03:00
new_passwd = smb_xstrdup ( argv [ 1 ] ) ;
1998-11-12 09:12:19 +03:00
break ;
default :
usage ( ) ;
}
2001-09-29 17:08:26 +04:00
if ( ! user_name [ 0 ] & & ( pwd = sys_getpwuid ( geteuid ( ) ) ) ) {
2001-06-29 12:04:12 +04:00
fstrcpy ( user_name , pwd - > pw_name ) ;
1998-11-12 09:12:19 +03:00
}
2001-06-29 12:04:12 +04:00
if ( ! user_name [ 0 ] ) {
1998-11-12 09:12:19 +03:00
fprintf ( stderr , " You must specify a username \n " ) ;
exit ( 1 ) ;
}
2000-02-26 01:25:25 +03:00
if ( local_flags & LOCAL_TRUST_ACCOUNT ) {
1998-11-12 09:12:19 +03:00
/* add the $ automatically */
static fstring buf ;
1998-11-16 23:19:57 +03:00
/*
* Remove any trailing ' $ ' before we
* generate the initial machine password .
*/
if ( user_name [ strlen ( user_name ) - 1 ] = = ' $ ' ) {
user_name [ strlen ( user_name ) - 1 ] = 0 ;
}
2000-02-26 01:25:25 +03:00
if ( local_flags & LOCAL_ADD_USER ) {
2001-09-17 15:48:29 +04:00
SAFE_FREE ( new_passwd ) ;
2001-11-20 09:38:09 +03:00
new_passwd = smb_xstrdup ( user_name ) ;
1998-11-12 09:12:19 +03:00
strlower ( new_passwd ) ;
}
1998-11-16 23:19:57 +03:00
/*
* Now ensure the username ends in ' $ ' for
* the machine add .
*/
1998-11-12 09:12:19 +03:00
slprintf ( buf , sizeof ( buf ) - 1 , " %s$ " , user_name ) ;
2001-06-29 12:04:12 +04:00
fstrcpy ( user_name , buf ) ;
1998-11-12 09:12:19 +03:00
}
if ( remote_machine ! = NULL ) {
old_passwd = get_pass ( " Old SMB password: " , stdin_passwd_get ) ;
}
2001-10-30 08:21:16 +03:00
if ( ! ( local_flags & LOCAL_SET_PASSWORD ) ) {
1999-12-13 16:27:58 +03:00
1998-11-12 23:22:11 +03:00
/*
* If we are trying to enable a user , first we need to find out
* if they are using a modern version of the smbpasswd file that
* disables a user by just writing a flag into the file . If so
* then we can re - enable a user without prompting for a new
* password . If not ( ie . they have a no stored password in the
* smbpasswd file ) then we need to prompt for a new password .
*/
2001-03-11 03:32:10 +03:00
if ( local_flags & LOCAL_ENABLE_USER ) {
2001-05-04 19:44:27 +04:00
SAM_ACCOUNT * sampass = NULL ;
BOOL ret ;
pdb_init_sam ( & sampass ) ;
ret = pdb_getsampwnam ( sampass , user_name ) ;
2001-10-30 08:21:16 +03:00
if ( ( sampass ! = False ) & & ( pdb_get_lanman_passwd ( sampass ) = = NULL ) ) {
local_flags | = LOCAL_SET_PASSWORD ;
1998-11-12 23:22:11 +03:00
}
2001-09-29 17:08:26 +04:00
pdb_free_sam ( & sampass ) ;
1998-11-12 23:22:11 +03:00
}
2001-10-30 08:21:16 +03:00
}
1998-11-12 23:22:11 +03:00
2001-10-30 08:21:16 +03:00
if ( local_flags & LOCAL_SET_PASSWORD ) {
new_passwd = prompt_for_new_password ( stdin_passwd_get ) ;
1999-12-13 16:27:58 +03:00
if ( ! new_passwd ) {
fprintf ( stderr , " Unable to get new password. \n " ) ;
exit ( 1 ) ;
}
1999-03-19 08:00:39 +03:00
}
2001-03-11 03:32:10 +03:00
if ( ! password_change ( remote_machine , user_name , old_passwd , new_passwd , local_flags ) ) {
2000-02-26 01:25:25 +03:00
fprintf ( stderr , " Failed to modify password entry for user %s \n " , user_name ) ;
2000-07-26 07:55:17 +04:00
result = 1 ;
goto done ;
1998-11-12 09:12:19 +03:00
}
2001-10-30 08:21:16 +03:00
if ( ! ( local_flags & ( LOCAL_ADD_USER | LOCAL_DISABLE_USER | LOCAL_ENABLE_USER | LOCAL_DELETE_USER | LOCAL_SET_NO_PASSWORD | LOCAL_SET_PASSWORD ) ) ) {
2001-05-04 19:44:27 +04:00
SAM_ACCOUNT * sampass = NULL ;
BOOL ret ;
pdb_init_sam ( & sampass ) ;
ret = pdb_getsampwnam ( sampass , user_name ) ;
1999-12-13 16:27:58 +03:00
printf ( " Password changed for user %s. " , user_name ) ;
2001-05-04 19:44:27 +04:00
if ( ( ret ! = False ) & & ( pdb_get_acct_ctrl ( sampass ) & ACB_DISABLED ) )
1999-12-13 16:27:58 +03:00
printf ( " User has disabled flag set. " ) ;
2001-05-04 19:44:27 +04:00
if ( ( ret ! = False ) & & ( pdb_get_acct_ctrl ( sampass ) & ACB_PWNOTREQ ) )
1999-12-13 16:27:58 +03:00
printf ( " User has no password flag set. " ) ;
printf ( " \n " ) ;
2001-09-29 17:08:26 +04:00
pdb_free_sam ( & sampass ) ;
1998-11-12 09:12:19 +03:00
}
2000-07-26 07:55:17 +04:00
done :
2001-09-17 15:48:29 +04:00
SAFE_FREE ( new_passwd ) ;
2000-07-26 07:55:17 +04:00
return result ;
1998-11-12 09:12:19 +03:00
}
2001-11-20 09:38:09 +03:00
/**
handle password changing for non - root
* */
1998-11-12 09:12:19 +03:00
static int process_nonroot ( int argc , char * argv [ ] )
{
struct passwd * pwd = NULL ;
2000-07-26 07:55:17 +04:00
int result = 0 , ch ;
1998-11-12 09:12:19 +03:00
BOOL stdin_passwd_get = False ;
char * old_passwd = NULL ;
char * remote_machine = NULL ;
char * user_name = NULL ;
char * new_passwd = NULL ;
1999-12-13 16:27:58 +03:00
while ( ( ch = getopt ( argc , argv , " hD:r:sU: " ) ) ! = EOF ) {
switch ( ch ) {
1998-11-12 09:12:19 +03:00
case ' D ' :
DEBUGLEVEL = atoi ( optarg ) ;
break ;
case ' r ' :
remote_machine = optarg ;
break ;
case ' s ' :
set_line_buffering ( stdin ) ;
set_line_buffering ( stdout ) ;
set_line_buffering ( stderr ) ;
stdin_passwd_get = True ;
break ;
case ' U ' :
user_name = optarg ;
break ;
default :
usage ( ) ;
}
}
argc - = optind ;
argv + = optind ;
if ( argc > 1 ) {
usage ( ) ;
}
if ( argc = = 1 ) {
new_passwd = argv [ 0 ] ;
}
if ( ! user_name ) {
1999-12-13 16:27:58 +03:00
pwd = sys_getpwuid ( getuid ( ) ) ;
1998-11-12 09:12:19 +03:00
if ( pwd ) {
2001-11-20 09:38:09 +03:00
user_name = smb_xstrdup ( pwd - > pw_name ) ;
1998-11-12 09:12:19 +03:00
} else {
2001-11-20 09:38:09 +03:00
fprintf ( stderr , " smbpasswd: you don't exist - go away \n " ) ;
1998-11-12 09:12:19 +03:00
exit ( 1 ) ;
}
}
/*
* A non - root user is always setting a password
* via a remote machine ( even if that machine is
* localhost ) .
*/
2001-01-12 02:21:17 +03:00
load_interfaces ( ) ; /* Delayed from main() */
1998-11-12 09:12:19 +03:00
if ( remote_machine = = NULL ) {
remote_machine = " 127.0.0.1 " ;
}
if ( remote_machine ! = NULL ) {
old_passwd = get_pass ( " Old SMB password: " , stdin_passwd_get ) ;
}
if ( ! new_passwd ) {
new_passwd = prompt_for_new_password ( stdin_passwd_get ) ;
}
if ( ! new_passwd ) {
1999-12-13 16:27:58 +03:00
fprintf ( stderr , " Unable to get new password. \n " ) ;
exit ( 1 ) ;
1998-11-12 09:12:19 +03:00
}
2000-02-26 01:25:25 +03:00
if ( ! password_change ( remote_machine , user_name , old_passwd , new_passwd , 0 ) ) {
1998-11-12 09:12:19 +03:00
fprintf ( stderr , " Failed to change password for %s \n " , user_name ) ;
2000-07-26 07:55:17 +04:00
result = 1 ;
goto done ;
1998-11-12 09:12:19 +03:00
}
printf ( " Password changed for user %s \n " , user_name ) ;
2000-07-26 07:55:17 +04:00
done :
2001-09-17 15:48:29 +04:00
SAFE_FREE ( old_passwd ) ;
SAFE_FREE ( new_passwd ) ;
2000-07-26 07:55:17 +04:00
return result ;
1998-11-12 09:12:19 +03:00
}
/*********************************************************
Start here .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
int main ( int argc , char * * argv )
{
1999-12-13 16:27:58 +03:00
# if defined(HAVE_SET_AUTH_PARAMETERS)
set_auth_parameters ( argc , argv ) ;
# endif /* HAVE_SET_AUTH_PARAMETERS */
1998-11-12 09:12:19 +03:00
setup_logging ( " smbpasswd " , True ) ;
2000-11-14 02:03:34 +03:00
if ( ! initialize_password_db ( True ) ) {
1999-12-13 16:27:58 +03:00
fprintf ( stderr , " Can't setup password database vectors. \n " ) ;
1998-11-12 09:12:19 +03:00
exit ( 1 ) ;
}
2001-11-19 05:49:53 +03:00
if ( ! lp_load ( dyn_CONFIGFILE , True , False , False ) ) {
1999-12-13 16:27:58 +03:00
fprintf ( stderr , " Can't load %s - run testparm to debug it \n " ,
2001-11-19 05:49:53 +03:00
dyn_CONFIGFILE ) ;
1998-11-12 09:12:19 +03:00
exit ( 1 ) ;
}
/*
* Set the machine NETBIOS name if not already
* set from the config file .
*/
if ( ! * global_myname ) {
char * p ;
1999-12-13 16:27:58 +03:00
fstrcpy ( global_myname , myhostname ( ) ) ;
2001-07-04 11:36:09 +04:00
p = strchr_m ( global_myname , ' . ' ) ;
1998-11-12 09:12:19 +03:00
if ( p ) * p = 0 ;
}
strupper ( global_myname ) ;
/* Check the effective uid - make sure we are not setuid */
2001-10-31 04:52:34 +03:00
if ( is_setuid_root ( ) ) {
1998-11-12 09:12:19 +03:00
fprintf ( stderr , " smbpasswd must *NOT* be setuid root. \n " ) ;
exit ( 1 ) ;
}
2001-06-25 05:15:17 +04:00
/* pre-check for local mode option as first option. We can't
do this via normal getopt as getopt can ' t be called
twice . */
if ( argc > 1 & & strcmp ( argv [ 1 ] , " -L " ) = = 0 ) {
local_mode = True ;
}
if ( local_mode | | getuid ( ) = = 0 ) {
2001-07-07 01:53:32 +04:00
secrets_init ( ) ;
1998-11-12 09:12:19 +03:00
return process_root ( argc , argv ) ;
}
return process_nonroot ( argc , argv ) ;
1996-05-04 11:50:46 +04:00
}