2004-05-15 11:51:38 +04:00
/*
Unix SMB / CIFS implementation .
endpoint server for the netlogon pipe
2008-09-05 10:45:37 +04:00
Copyright ( C ) Andrew Bartlett < abartlet @ samba . org > 2004 - 2008
2005-01-09 15:55:25 +03:00
Copyright ( C ) Stefan Metzmacher < metze @ samba . org > 2005
2004-05-15 11:51:38 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-10 06:07:03 +04:00
the Free Software Foundation ; either version 3 of the License , or
2004-05-15 11:51:38 +04:00
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
2007-07-10 06:07:03 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2004-05-15 11:51:38 +04:00
*/
# include "includes.h"
2004-11-02 10:42:47 +03:00
# include "rpc_server/dcerpc_server.h"
2004-05-15 11:51:38 +04:00
# include "rpc_server/common/common.h"
2004-11-16 12:00:52 +03:00
# include "lib/ldb/include/ldb.h"
2005-10-07 15:31:45 +04:00
# include "auth/auth.h"
2007-12-10 06:33:29 +03:00
# include "auth/auth_sam_reply.h"
2005-12-28 18:38:36 +03:00
# include "dsdb/samdb/samdb.h"
2008-02-28 00:50:00 +03:00
# include "dsdb/common/flags.h"
2006-03-07 02:28:18 +03:00
# include "rpc_server/samr/proto.h"
2007-11-16 22:12:00 +03:00
# include "util/util_ldb.h"
2006-03-14 18:03:25 +03:00
# include "libcli/auth/libcli_auth.h"
2006-03-07 16:36:26 +03:00
# include "auth/gensec/schannel_state.h"
2006-04-29 21:34:49 +04:00
# include "libcli/security/security.h"
2007-09-08 16:42:09 +04:00
# include "param/param.h"
2008-09-03 09:30:17 +04:00
# include "lib/messaging/irpc.h"
# include "librpc/gen_ndr/ndr_irpc.h"
2008-10-04 04:52:59 +04:00
# include "librpc/gen_ndr/ndr_netlogon.h"
2004-05-15 11:51:38 +04:00
struct server_pipe_state {
struct netr_Credential client_challenge ;
struct netr_Credential server_challenge ;
} ;
2004-06-14 12:12:50 +04:00
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_ServerReqChallenge ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 11:51:38 +04:00
struct netr_ServerReqChallenge * r )
{
2005-01-10 15:15:26 +03:00
struct server_pipe_state * pipe_state = dce_call - > context - > private ;
2004-05-15 11:51:38 +04:00
2004-05-30 17:15:15 +04:00
ZERO_STRUCTP ( r - > out . credentials ) ;
2004-05-15 11:51:38 +04:00
/* destroyed on pipe shutdown */
if ( pipe_state ) {
2004-09-25 17:28:38 +04:00
talloc_free ( pipe_state ) ;
2005-01-10 15:15:26 +03:00
dce_call - > context - > private = NULL ;
2004-05-15 11:51:38 +04:00
}
2005-01-27 10:08:20 +03:00
pipe_state = talloc ( dce_call - > context , struct server_pipe_state ) ;
2006-07-27 13:37:55 +04:00
NT_STATUS_HAVE_NO_MEMORY ( pipe_state ) ;
2004-05-15 11:51:38 +04:00
2004-05-30 17:15:15 +04:00
pipe_state - > client_challenge = * r - > in . credentials ;
2004-05-15 11:51:38 +04:00
generate_random_buffer ( pipe_state - > server_challenge . data ,
2004-07-14 16:14:07 +04:00
sizeof ( pipe_state - > server_challenge . data ) ) ;
2004-05-15 11:51:38 +04:00
2004-05-30 17:15:15 +04:00
* r - > out . credentials = pipe_state - > server_challenge ;
2004-05-15 11:51:38 +04:00
2005-01-10 15:15:26 +03:00
dce_call - > context - > private = pipe_state ;
2004-05-15 11:51:38 +04:00
return NT_STATUS_OK ;
}
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_ServerAuthenticate3 ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-30 17:15:15 +04:00
struct netr_ServerAuthenticate3 * r )
2004-05-15 11:51:38 +04:00
{
2005-01-10 15:15:26 +03:00
struct server_pipe_state * pipe_state = dce_call - > context - > private ;
2006-02-09 05:30:43 +03:00
struct creds_CredentialState * creds ;
2004-05-15 11:51:38 +04:00
void * sam_ctx ;
2004-06-05 07:22:10 +04:00
struct samr_Password * mach_pwd ;
2008-02-28 00:50:00 +03:00
uint32_t user_account_control ;
2004-05-15 11:51:38 +04:00
int num_records ;
struct ldb_message * * msgs ;
NTSTATUS nt_status ;
2007-02-15 15:54:58 +03:00
const char * attrs [ ] = { " unicodePwd " , " userAccountControl " ,
2004-05-30 17:15:15 +04:00
" objectSid " , NULL } ;
2004-05-15 11:51:38 +04:00
2004-05-30 17:15:15 +04:00
ZERO_STRUCTP ( r - > out . credentials ) ;
* r - > out . rid = 0 ;
2004-06-04 03:15:16 +04:00
* r - > out . negotiate_flags = * r - > in . negotiate_flags ;
2004-05-15 11:51:38 +04:00
if ( ! pipe_state ) {
2004-06-05 07:37:27 +04:00
DEBUG ( 1 , ( " No challenge requested by client, cannot authenticate \n " ) ) ;
2004-05-15 11:51:38 +04:00
return NT_STATUS_ACCESS_DENIED ;
}
2008-04-17 14:23:44 +04:00
sam_ctx = samdb_connect ( mem_ctx , dce_call - > event_ctx , dce_call - > conn - > dce_ctx - > lp_ctx ,
2007-12-06 18:36:54 +03:00
system_session ( mem_ctx , dce_call - > conn - > dce_ctx - > lp_ctx ) ) ;
2004-05-15 11:51:38 +04:00
if ( sam_ctx = = NULL ) {
return NT_STATUS_INVALID_SYSTEM_SERVICE ;
}
/* pull the user attributes */
2006-08-25 11:08:06 +04:00
num_records = gendb_search ( sam_ctx , mem_ctx , NULL , & msgs , attrs ,
2004-05-15 11:51:38 +04:00
" (&(sAMAccountName=%s)(objectclass=user)) " ,
2004-06-05 07:22:10 +04:00
r - > in . account_name ) ;
2004-05-15 11:51:38 +04:00
if ( num_records = = 0 ) {
2004-05-17 01:30:48 +04:00
DEBUG ( 3 , ( " Couldn't find user [%s] in samdb. \n " ,
2004-06-05 07:22:10 +04:00
r - > in . account_name ) ) ;
2005-10-07 15:31:45 +04:00
return NT_STATUS_ACCESS_DENIED ;
2004-05-15 11:51:38 +04:00
}
if ( num_records > 1 ) {
2004-07-05 11:24:14 +04:00
DEBUG ( 0 , ( " Found %d records matching user [%s] \n " , num_records , r - > in . account_name ) ) ;
2004-05-15 11:51:38 +04:00
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
2008-02-28 00:50:00 +03:00
user_account_control = ldb_msg_find_attr_as_uint ( msgs [ 0 ] , " userAccountControl " , 0 ) ;
2004-05-15 11:51:38 +04:00
2008-02-28 00:50:00 +03:00
if ( user_account_control & UF_ACCOUNTDISABLE ) {
2004-06-05 07:22:10 +04:00
DEBUG ( 1 , ( " Account [%s] is disabled \n " , r - > in . account_name ) ) ;
2004-05-15 11:51:38 +04:00
return NT_STATUS_ACCESS_DENIED ;
}
2004-05-30 17:15:15 +04:00
if ( r - > in . secure_channel_type = = SEC_CHAN_WKSTA ) {
2008-02-28 00:50:00 +03:00
if ( ! ( user_account_control & UF_WORKSTATION_TRUST_ACCOUNT ) ) {
DEBUG ( 1 , ( " Client asked for a workstation secure channel, but is not a workstation (member server) acb flags: 0x%x \n " , user_account_control ) ) ;
2004-05-15 11:51:38 +04:00
return NT_STATUS_ACCESS_DENIED ;
}
2004-05-30 17:15:15 +04:00
} else if ( r - > in . secure_channel_type = = SEC_CHAN_DOMAIN ) {
2008-02-28 00:50:00 +03:00
if ( ! ( user_account_control & UF_INTERDOMAIN_TRUST_ACCOUNT ) ) {
DEBUG ( 1 , ( " Client asked for a trusted domain secure channel, but is not a trusted domain: acb flags: 0x%x \n " , user_account_control ) ) ;
2004-05-15 11:51:38 +04:00
return NT_STATUS_ACCESS_DENIED ;
}
2004-05-30 17:15:15 +04:00
} else if ( r - > in . secure_channel_type = = SEC_CHAN_BDC ) {
2008-02-28 00:50:00 +03:00
if ( ! ( user_account_control & UF_SERVER_TRUST_ACCOUNT ) ) {
DEBUG ( 1 , ( " Client asked for a server secure channel, but is not a server (domain controller): acb flags: 0x%x \n " , user_account_control ) ) ;
2004-05-15 11:51:38 +04:00
return NT_STATUS_ACCESS_DENIED ;
}
} else {
2004-05-30 17:15:15 +04:00
DEBUG ( 1 , ( " Client asked for an invalid secure channel type: %d \n " ,
r - > in . secure_channel_type ) ) ;
2004-05-15 11:51:38 +04:00
return NT_STATUS_ACCESS_DENIED ;
}
2005-12-30 11:40:16 +03:00
* r - > out . rid = samdb_result_rid_from_sid ( mem_ctx , msgs [ 0 ] ,
" objectSid " , 0 ) ;
2004-05-30 17:15:15 +04:00
2007-02-15 15:54:58 +03:00
mach_pwd = samdb_result_hash ( mem_ctx , msgs [ 0 ] , " unicodePwd " ) ;
2005-12-30 11:40:16 +03:00
if ( mach_pwd = = NULL ) {
2004-05-15 11:51:38 +04:00
return NT_STATUS_ACCESS_DENIED ;
}
2006-02-09 05:30:43 +03:00
creds = talloc ( mem_ctx , struct creds_CredentialState ) ;
2006-07-27 13:37:55 +04:00
NT_STATUS_HAVE_NO_MEMORY ( creds ) ;
2004-05-15 11:51:38 +04:00
2006-02-09 05:30:43 +03:00
creds_server_init ( creds , & pipe_state - > client_challenge ,
2004-05-15 11:51:38 +04:00
& pipe_state - > server_challenge , mach_pwd ,
2004-06-04 03:15:16 +04:00
r - > out . credentials ,
* r - > in . negotiate_flags ) ;
2006-02-09 05:30:43 +03:00
if ( ! creds_server_check ( creds , r - > in . credentials ) ) {
talloc_free ( creds ) ;
2004-05-15 11:51:38 +04:00
return NT_STATUS_ACCESS_DENIED ;
}
2006-02-09 05:30:43 +03:00
creds - > account_name = talloc_steal ( creds , r - > in . account_name ) ;
2004-05-15 11:51:38 +04:00
2006-02-09 05:30:43 +03:00
creds - > computer_name = talloc_steal ( creds , r - > in . computer_name ) ;
2007-12-04 22:05:00 +03:00
creds - > domain = talloc_strdup ( creds , lp_workgroup ( dce_call - > conn - > dce_ctx - > lp_ctx ) ) ;
2004-05-15 11:51:38 +04:00
2006-02-09 05:30:43 +03:00
creds - > secure_channel_type = r - > in . secure_channel_type ;
2004-05-15 11:51:38 +04:00
2006-02-09 05:30:43 +03:00
creds - > sid = samdb_result_dom_sid ( creds , msgs [ 0 ] , " objectSid " ) ;
r5902: A rather large change...
I wanted to add a simple 'workstation' argument to the DCERPC
authenticated binding calls, but this patch kind of grew from there.
With SCHANNEL, the 'workstation' name (the netbios name of the client)
matters, as this is what ties the session between the NETLOGON ops and
the SCHANNEL bind. This changes a lot of files, and these will again
be changed when jelmer does the credentials work.
I also correct some schannel IDL to distinguish between workstation
names and account names. The distinction matters for domain trust
accounts.
Issues in handling this (issues with lifetime of talloc pointers)
caused me to change the 'creds_CredentialsState' and 'struct
dcerpc_binding' pointers to always be talloc()ed pointers.
In the schannel DB, we now store both the domain and computername, and
query on both. This should ensure we fault correctly when the domain
is specified incorrectly in the SCHANNEL bind.
In the RPC-SCHANNEL test, I finally fixed a bug that vl pointed out,
where the comment claimed we re-used a connection, but in fact we made
a new connection.
This was achived by breaking apart some of the
dcerpc_secondary_connection() logic.
The addition of workstation handling was also propogated to NTLMSSP
and GENSEC, for completeness.
The RPC-SAMSYNC test has been cleaned up a little, using a loop over
usernames/passwords rather than manually expanded tests. This will be
expanded further (the code in #if 0 in this patch) to use a newly
created user account for testing.
In making this test pass test_rpc.sh, I found a bug in the RPC-ECHO
server, caused by the removal of [ref] and the assoicated pointer from
the IDL. This has been re-added, until the underlying pidl issues are
solved.
(This used to be commit 824289dcc20908ddec957a4a892a103eec2da9b9)
2005-03-19 11:34:43 +03:00
2004-06-05 05:29:20 +04:00
/* remember this session key state */
2008-04-17 14:23:44 +04:00
nt_status = schannel_store_session_key ( mem_ctx , dce_call - > event_ctx , dce_call - > conn - > dce_ctx - > lp_ctx , creds ) ;
2006-02-09 05:30:43 +03:00
2004-06-05 05:29:20 +04:00
return nt_status ;
2004-05-15 11:51:38 +04:00
}
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_ServerAuthenticate ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 11:51:38 +04:00
struct netr_ServerAuthenticate * r )
{
2004-05-30 17:15:15 +04:00
struct netr_ServerAuthenticate3 r3 ;
2004-06-24 04:25:38 +04:00
uint32_t rid = 0 ;
2004-06-24 04:08:15 +04:00
/* TODO:
* negotiate_flags is used as an [ in ] parameter
* so it need to be initialised .
*
* ( I think . . . = 0 ; seems wrong here - - metze )
*/
2005-02-10 08:09:35 +03:00
uint32_t negotiate_flags = 0 ;
2004-05-30 17:15:15 +04:00
r3 . in . server_name = r - > in . server_name ;
2004-06-05 07:22:10 +04:00
r3 . in . account_name = r - > in . account_name ;
2004-05-30 17:15:15 +04:00
r3 . in . secure_channel_type = r - > in . secure_channel_type ;
r3 . in . computer_name = r - > in . computer_name ;
r3 . in . credentials = r - > in . credentials ;
r3 . out . credentials = r - > out . credentials ;
r3 . in . negotiate_flags = & negotiate_flags ;
r3 . out . negotiate_flags = & negotiate_flags ;
r3 . out . rid = & rid ;
2004-05-15 11:51:38 +04:00
2007-01-17 17:49:36 +03:00
return dcesrv_netr_ServerAuthenticate3 ( dce_call , mem_ctx , & r3 ) ;
2004-05-15 11:51:38 +04:00
}
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_ServerAuthenticate2 ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-30 17:15:15 +04:00
struct netr_ServerAuthenticate2 * r )
{
struct netr_ServerAuthenticate3 r3 ;
2005-02-10 08:09:35 +03:00
uint32_t rid = 0 ;
2004-05-30 17:15:15 +04:00
r3 . in . server_name = r - > in . server_name ;
2004-06-05 07:22:10 +04:00
r3 . in . account_name = r - > in . account_name ;
2004-05-30 17:15:15 +04:00
r3 . in . secure_channel_type = r - > in . secure_channel_type ;
r3 . in . computer_name = r - > in . computer_name ;
r3 . in . credentials = r - > in . credentials ;
r3 . out . credentials = r - > out . credentials ;
r3 . in . negotiate_flags = r - > in . negotiate_flags ;
r3 . out . negotiate_flags = r - > out . negotiate_flags ;
r3 . out . rid = & rid ;
2004-05-15 11:51:38 +04:00
2007-01-17 17:49:36 +03:00
return dcesrv_netr_ServerAuthenticate3 ( dce_call , mem_ctx , & r3 ) ;
2004-05-15 11:51:38 +04:00
}
2006-02-13 03:04:28 +03:00
/*
Validate an incoming authenticator against the credentials for the remote machine .
The credentials are ( re ) read and from the schannel database , and
written back after the caclulations are performed .
The creds_out parameter ( if not NULL ) returns the credentials , if
the caller needs some of that information .
2004-05-30 17:15:15 +04:00
2006-02-13 03:04:28 +03:00
*/
2008-04-17 14:23:44 +04:00
static NTSTATUS dcesrv_netr_creds_server_step_check ( struct event_context * event_ctx ,
struct loadparm_context * lp_ctx ,
2007-12-06 18:36:54 +03:00
const char * computer_name ,
2006-02-09 05:30:43 +03:00
TALLOC_CTX * mem_ctx ,
2005-01-03 09:23:02 +03:00
struct netr_Authenticator * received_authenticator ,
2006-02-09 05:30:43 +03:00
struct netr_Authenticator * return_authenticator ,
struct creds_CredentialState * * creds_out )
2004-05-17 01:30:48 +04:00
{
2006-02-09 05:30:43 +03:00
struct creds_CredentialState * creds ;
NTSTATUS nt_status ;
struct ldb_context * ldb ;
int ret ;
2008-04-17 14:23:44 +04:00
ldb = schannel_db_connect ( mem_ctx , event_ctx , lp_ctx ) ;
2006-02-09 05:30:43 +03:00
if ( ! ldb ) {
return NT_STATUS_ACCESS_DENIED ;
}
ret = ldb_transaction_start ( ldb ) ;
if ( ret ! = 0 ) {
talloc_free ( ldb ) ;
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
/* Because this is a shared structure (even across
* disconnects ) we must update the database every time we
* update the structure */
2007-09-28 05:17:46 +04:00
nt_status = schannel_fetch_session_key_ldb ( ldb , ldb , computer_name ,
2007-12-06 18:54:34 +03:00
lp_workgroup ( lp_ctx ) ,
2006-02-21 03:07:59 +03:00
& creds ) ;
2006-02-09 05:30:43 +03:00
if ( NT_STATUS_IS_OK ( nt_status ) ) {
nt_status = creds_server_step_check ( creds ,
received_authenticator ,
return_authenticator ) ;
}
if ( NT_STATUS_IS_OK ( nt_status ) ) {
nt_status = schannel_store_session_key_ldb ( ldb , ldb , creds ) ;
}
if ( NT_STATUS_IS_OK ( nt_status ) ) {
ldb_transaction_commit ( ldb ) ;
if ( creds_out ) {
* creds_out = creds ;
talloc_steal ( mem_ctx , creds ) ;
}
} else {
ldb_transaction_cancel ( ldb ) ;
}
talloc_free ( ldb ) ;
return nt_status ;
2004-05-17 01:30:48 +04:00
}
2006-02-09 05:30:43 +03:00
/*
Change the machine account password for the currently connected
client . Supplies only the NT # .
*/
2004-05-15 16:04:07 +04:00
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_ServerPasswordSet ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 16:04:07 +04:00
struct netr_ServerPasswordSet * r )
{
2006-02-09 05:30:43 +03:00
struct creds_CredentialState * creds ;
2005-10-20 07:17:42 +04:00
struct ldb_context * sam_ctx ;
2004-05-17 01:30:48 +04:00
NTSTATUS nt_status ;
2008-04-17 14:23:44 +04:00
nt_status = dcesrv_netr_creds_server_step_check ( dce_call - > event_ctx , dce_call - > conn - > dce_ctx - > lp_ctx ,
2007-12-06 18:36:54 +03:00
r - > in . computer_name , mem_ctx ,
2006-02-09 05:30:43 +03:00
& r - > in . credential , & r - > out . return_authenticator ,
& creds ) ;
2005-01-10 19:12:41 +03:00
NT_STATUS_NOT_OK_RETURN ( nt_status ) ;
2004-05-17 01:30:48 +04:00
2008-04-17 14:23:44 +04:00
sam_ctx = samdb_connect ( mem_ctx , dce_call - > event_ctx , dce_call - > conn - > dce_ctx - > lp_ctx , system_session ( mem_ctx , dce_call - > conn - > dce_ctx - > lp_ctx ) ) ;
2004-05-17 01:30:48 +04:00
if ( sam_ctx = = NULL ) {
return NT_STATUS_INVALID_SYSTEM_SERVICE ;
}
2006-02-09 05:30:43 +03:00
creds_des_decrypt ( creds , & r - > in . new_password ) ;
2004-05-17 01:30:48 +04:00
2005-10-20 07:17:42 +04:00
/* Using the sid for the account as the key, set the password */
nt_status = samdb_set_password_sid ( sam_ctx , mem_ctx ,
2006-02-09 05:30:43 +03:00
creds - > sid ,
2005-10-20 07:17:42 +04:00
NULL , /* Don't have plaintext */
NULL , & r - > in . new_password ,
2007-10-07 02:25:41 +04:00
false , /* This is not considered a password change */
2005-10-20 07:17:42 +04:00
NULL , NULL ) ;
return nt_status ;
2004-05-15 16:04:07 +04:00
}
2006-02-09 05:30:43 +03:00
/*
Change the machine account password for the currently connected
client . Supplies new plaintext .
*/
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_ServerPasswordSet2 ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2006-02-09 05:30:43 +03:00
struct netr_ServerPasswordSet2 * r )
{
struct creds_CredentialState * creds ;
struct ldb_context * sam_ctx ;
NTSTATUS nt_status ;
char new_pass [ 512 ] ;
2007-10-07 02:25:41 +04:00
bool ret ;
2006-02-09 05:30:43 +03:00
struct samr_CryptPassword password_buf ;
2008-04-17 14:23:44 +04:00
nt_status = dcesrv_netr_creds_server_step_check ( dce_call - > event_ctx , dce_call - > conn - > dce_ctx - > lp_ctx ,
2007-12-06 18:36:54 +03:00
r - > in . computer_name , mem_ctx ,
2006-02-09 05:30:43 +03:00
& r - > in . credential , & r - > out . return_authenticator ,
& creds ) ;
NT_STATUS_NOT_OK_RETURN ( nt_status ) ;
2008-04-17 14:23:44 +04:00
sam_ctx = samdb_connect ( mem_ctx , dce_call - > event_ctx , dce_call - > conn - > dce_ctx - > lp_ctx , system_session ( mem_ctx , dce_call - > conn - > dce_ctx - > lp_ctx ) ) ;
2006-02-09 05:30:43 +03:00
if ( sam_ctx = = NULL ) {
return NT_STATUS_INVALID_SYSTEM_SERVICE ;
}
memcpy ( password_buf . data , r - > in . new_password . data , 512 ) ;
SIVAL ( password_buf . data , 512 , r - > in . new_password . length ) ;
creds_arcfour_crypt ( creds , password_buf . data , 516 ) ;
ret = decode_pw_buffer ( password_buf . data , new_pass , sizeof ( new_pass ) ,
2008-09-23 04:50:43 +04:00
STR_UNICODE ) ;
2006-02-09 05:30:43 +03:00
if ( ! ret ) {
DEBUG ( 3 , ( " netr_ServerPasswordSet2: failed to decode password buffer \n " ) ) ;
return NT_STATUS_ACCESS_DENIED ;
}
/* Using the sid for the account as the key, set the password */
nt_status = samdb_set_password_sid ( sam_ctx , mem_ctx ,
creds - > sid ,
new_pass , /* we have plaintext */
NULL , NULL ,
2007-10-07 02:25:41 +04:00
false , /* This is not considered a password change */
2006-02-09 05:30:43 +03:00
NULL , NULL ) ;
return nt_status ;
}
2004-05-15 16:04:07 +04:00
2004-05-15 11:51:38 +04:00
/*
netr_LogonUasLogon
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_LogonUasLogon ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-27 08:13:58 +04:00
struct netr_LogonUasLogon * r )
2004-05-15 11:51:38 +04:00
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
netr_LogonUasLogoff
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_LogonUasLogoff ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 11:51:38 +04:00
struct netr_LogonUasLogoff * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
2006-02-21 03:07:59 +03:00
netr_LogonSamLogon_base
2004-05-15 11:51:38 +04:00
2005-01-03 09:23:02 +03:00
This version of the function allows other wrappers to say ' do not check the credentials '
2006-02-21 03:07:59 +03:00
We can ' t do the traditional ' wrapping ' format completly , as this function must only run under schannel
2004-05-15 11:51:38 +04:00
*/
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_LogonSamLogon_base ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2006-02-21 03:07:59 +03:00
struct netr_LogonSamLogonEx * r , struct creds_CredentialState * creds )
2004-06-07 07:46:32 +04:00
{
struct auth_context * auth_context ;
struct auth_usersupplied_info * user_info ;
struct auth_serversupplied_info * server_info ;
NTSTATUS nt_status ;
2004-06-07 12:54:49 +04:00
static const char zeros [ 16 ] ;
2004-06-14 16:06:53 +04:00
struct netr_SamBaseInfo * sam ;
2004-06-07 12:54:49 +04:00
struct netr_SamInfo2 * sam2 ;
2004-06-14 16:06:53 +04:00
struct netr_SamInfo3 * sam3 ;
struct netr_SamInfo6 * sam6 ;
2004-06-07 07:46:32 +04:00
2005-07-22 08:10:07 +04:00
user_info = talloc ( mem_ctx , struct auth_usersupplied_info ) ;
2006-07-27 13:37:55 +04:00
NT_STATUS_HAVE_NO_MEMORY ( user_info ) ;
2005-07-22 08:10:07 +04:00
user_info - > flags = 0 ;
2007-10-07 02:25:41 +04:00
user_info - > mapped_state = false ;
2005-07-22 08:10:07 +04:00
user_info - > remote_host = NULL ;
2004-06-07 07:46:32 +04:00
switch ( r - > in . logon_level ) {
2008-08-12 11:46:01 +04:00
case NetlogonInteractiveInformation :
case NetlogonServiceInformation :
case NetlogonInteractiveTransitiveInformation :
case NetlogonServiceTransitiveInformation :
2006-02-21 03:07:59 +03:00
if ( creds - > negotiate_flags & NETLOGON_NEG_ARCFOUR ) {
2006-02-09 05:30:43 +03:00
creds_arcfour_crypt ( creds ,
2005-01-03 09:23:02 +03:00
r - > in . logon . password - > lmpassword . hash ,
sizeof ( r - > in . logon . password - > lmpassword . hash ) ) ;
2006-02-09 05:30:43 +03:00
creds_arcfour_crypt ( creds ,
2005-01-03 09:23:02 +03:00
r - > in . logon . password - > ntpassword . hash ,
sizeof ( r - > in . logon . password - > ntpassword . hash ) ) ;
} else {
2006-02-09 05:30:43 +03:00
creds_des_decrypt ( creds , & r - > in . logon . password - > lmpassword ) ;
creds_des_decrypt ( creds , & r - > in . logon . password - > ntpassword ) ;
2005-01-03 09:23:02 +03:00
}
2004-06-07 07:46:32 +04:00
2005-01-09 15:55:25 +03:00
/* TODO: we need to deny anonymous access here */
2007-07-03 12:05:55 +04:00
nt_status = auth_context_create ( mem_ctx ,
2006-07-31 18:05:08 +04:00
dce_call - > event_ctx , dce_call - > msg_ctx ,
2007-12-04 22:05:00 +03:00
dce_call - > conn - > dce_ctx - > lp_ctx ,
2006-07-31 18:05:08 +04:00
& auth_context ) ;
2005-01-09 15:55:25 +03:00
NT_STATUS_NOT_OK_RETURN ( nt_status ) ;
2005-10-28 12:54:37 +04:00
user_info - > logon_parameters = r - > in . logon . password - > identity_info . parameter_control ;
user_info - > client . account_name = r - > in . logon . password - > identity_info . account_name . string ;
user_info - > client . domain_name = r - > in . logon . password - > identity_info . domain_name . string ;
user_info - > workstation_name = r - > in . logon . password - > identity_info . workstation . string ;
2005-07-22 08:10:07 +04:00
2006-07-27 13:37:55 +04:00
user_info - > flags | = USER_INFO_INTERACTIVE_LOGON ;
2005-07-22 08:10:07 +04:00
user_info - > password_state = AUTH_PASSWORD_HASH ;
2006-07-27 13:37:55 +04:00
2005-07-22 08:10:07 +04:00
user_info - > password . hash . lanman = talloc ( user_info , struct samr_Password ) ;
2006-07-27 13:37:55 +04:00
NT_STATUS_HAVE_NO_MEMORY ( user_info - > password . hash . lanman ) ;
2005-07-22 08:10:07 +04:00
* user_info - > password . hash . lanman = r - > in . logon . password - > lmpassword ;
2004-06-07 07:46:32 +04:00
2005-07-22 08:10:07 +04:00
user_info - > password . hash . nt = talloc ( user_info , struct samr_Password ) ;
2006-07-27 13:37:55 +04:00
NT_STATUS_HAVE_NO_MEMORY ( user_info - > password . hash . nt ) ;
2005-07-22 08:10:07 +04:00
* user_info - > password . hash . nt = r - > in . logon . password - > ntpassword ;
2005-10-28 15:20:48 +04:00
2006-07-27 13:37:55 +04:00
break ;
2008-08-12 11:46:01 +04:00
case NetlogonNetworkInformation :
case NetlogonNetworkTransitiveInformation :
2005-07-22 08:10:07 +04:00
2005-01-09 15:55:25 +03:00
/* TODO: we need to deny anonymous access here */
2007-07-03 12:05:55 +04:00
nt_status = auth_context_create ( mem_ctx ,
2006-07-31 18:05:08 +04:00
dce_call - > event_ctx , dce_call - > msg_ctx ,
2007-12-04 22:05:00 +03:00
dce_call - > conn - > dce_ctx - > lp_ctx ,
2006-07-31 18:05:08 +04:00
& auth_context ) ;
2005-01-09 15:55:25 +03:00
NT_STATUS_NOT_OK_RETURN ( nt_status ) ;
nt_status = auth_context_set_challenge ( auth_context , r - > in . logon . network - > challenge , " netr_LogonSamLogonWithFlags " ) ;
NT_STATUS_NOT_OK_RETURN ( nt_status ) ;
2004-06-07 07:46:32 +04:00
2005-10-28 12:54:37 +04:00
user_info - > logon_parameters = r - > in . logon . network - > identity_info . parameter_control ;
2005-07-22 08:10:07 +04:00
user_info - > client . account_name = r - > in . logon . network - > identity_info . account_name . string ;
user_info - > client . domain_name = r - > in . logon . network - > identity_info . domain_name . string ;
user_info - > workstation_name = r - > in . logon . network - > identity_info . workstation . string ;
user_info - > password_state = AUTH_PASSWORD_RESPONSE ;
2006-05-23 09:26:22 +04:00
user_info - > password . response . lanman = data_blob_talloc ( mem_ctx , r - > in . logon . network - > lm . data , r - > in . logon . network - > lm . length ) ;
user_info - > password . response . nt = data_blob_talloc ( mem_ctx , r - > in . logon . network - > nt . data , r - > in . logon . network - > nt . length ) ;
2005-07-22 08:10:07 +04:00
2004-06-07 07:46:32 +04:00
break ;
2008-08-12 11:46:01 +04:00
case NetlogonGenericInformation :
{
2008-08-29 12:05:06 +04:00
if ( creds - > negotiate_flags & NETLOGON_NEG_ARCFOUR ) {
creds_arcfour_crypt ( creds ,
r - > in . logon . generic - > data , r - > in . logon . generic - > length ) ;
} else {
/* Using DES to verify kerberos tickets makes no sense */
return NT_STATUS_INVALID_PARAMETER ;
}
2008-09-03 09:30:17 +04:00
if ( strcmp ( r - > in . logon . generic - > package_name . string , " Kerberos " ) = = 0 ) {
NTSTATUS status ;
struct server_id * kdc ;
struct kdc_check_generic_kerberos check ;
struct netr_GenericInfo2 * generic = talloc_zero ( mem_ctx , struct netr_GenericInfo2 ) ;
NT_STATUS_HAVE_NO_MEMORY ( generic ) ;
r - > out . authoritative = 1 ;
/* TODO: Describe and deal with these flags */
r - > out . flags = 0 ;
2008-08-29 12:05:06 +04:00
2008-09-03 09:30:17 +04:00
r - > out . validation . generic = generic ;
kdc = irpc_servers_byname ( dce_call - > msg_ctx , mem_ctx , " kdc_server " ) ;
if ( ( kdc = = NULL ) | | ( kdc [ 0 ] . id = = 0 ) ) {
return NT_STATUS_NO_LOGON_SERVERS ;
2008-08-29 12:05:06 +04:00
}
2008-09-03 09:30:17 +04:00
check . in . generic_request =
data_blob_const ( r - > in . logon . generic - > data ,
r - > in . logon . generic - > length ) ;
status = irpc_call ( dce_call - > msg_ctx , kdc [ 0 ] ,
& ndr_table_irpc , NDR_KDC_CHECK_GENERIC_KERBEROS ,
& check , mem_ctx ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return status ;
2008-08-29 12:05:06 +04:00
}
2008-09-03 09:30:17 +04:00
generic - > length = check . out . generic_reply . length ;
generic - > data = check . out . generic_reply . data ;
return NT_STATUS_OK ;
2008-08-29 12:05:06 +04:00
}
/* Until we get an implemetnation of these other packages */
2008-08-12 11:46:01 +04:00
return NT_STATUS_INVALID_PARAMETER ;
}
2004-06-07 07:46:32 +04:00
default :
return NT_STATUS_INVALID_PARAMETER ;
}
2005-01-09 15:55:25 +03:00
nt_status = auth_check_password ( auth_context , mem_ctx , user_info , & server_info ) ;
NT_STATUS_NOT_OK_RETURN ( nt_status ) ;
2004-06-07 07:46:32 +04:00
2005-06-29 17:55:09 +04:00
nt_status = auth_convert_server_info_sambaseinfo ( mem_ctx , server_info , & sam ) ;
NT_STATUS_NOT_OK_RETURN ( nt_status ) ;
2005-01-10 15:14:26 +03:00
2004-06-08 02:17:51 +04:00
/* Don't crypt an all-zero key, it would give away the NETLOGON pipe session key */
2004-09-22 16:17:51 +04:00
/* It appears that level 6 is not individually encrypted */
2006-07-27 13:37:55 +04:00
if ( ( r - > in . validation_level ! = 6 ) & &
memcmp ( sam - > key . key , zeros , sizeof ( sam - > key . key ) ) ! = 0 ) {
2005-01-03 09:23:02 +03:00
/* This key is sent unencrypted without the ARCFOUR flag set */
2006-02-09 05:30:43 +03:00
if ( creds - > negotiate_flags & NETLOGON_NEG_ARCFOUR ) {
creds_arcfour_crypt ( creds ,
2005-01-03 09:23:02 +03:00
sam - > key . key ,
sizeof ( sam - > key . key ) ) ;
}
2004-06-07 12:54:49 +04:00
}
2005-01-10 15:14:26 +03:00
2004-06-08 02:17:51 +04:00
/* Don't crypt an all-zero key, it would give away the NETLOGON pipe session key */
2004-09-22 16:17:51 +04:00
/* It appears that level 6 is not individually encrypted */
2006-07-27 13:37:55 +04:00
if ( ( r - > in . validation_level ! = 6 ) & &
memcmp ( sam - > LMSessKey . key , zeros , sizeof ( sam - > LMSessKey . key ) ) ! = 0 ) {
2006-02-09 05:30:43 +03:00
if ( creds - > negotiate_flags & NETLOGON_NEG_ARCFOUR ) {
creds_arcfour_crypt ( creds ,
2005-01-03 09:23:02 +03:00
sam - > LMSessKey . key ,
sizeof ( sam - > LMSessKey . key ) ) ;
} else {
2006-02-09 05:30:43 +03:00
creds_des_encrypt_LMKey ( creds ,
2005-01-03 09:23:02 +03:00
& sam - > LMSessKey ) ;
}
2004-06-07 12:54:49 +04:00
}
2004-06-07 07:46:32 +04:00
switch ( r - > in . validation_level ) {
case 2 :
2005-01-10 18:56:37 +03:00
sam2 = talloc_zero ( mem_ctx , struct netr_SamInfo2 ) ;
2005-01-09 15:55:25 +03:00
NT_STATUS_HAVE_NO_MEMORY ( sam2 ) ;
2004-06-14 16:06:53 +04:00
sam2 - > base = * sam ;
2004-06-07 12:54:49 +04:00
r - > out . validation . sam2 = sam2 ;
2004-06-07 07:46:32 +04:00
break ;
2004-06-14 16:06:53 +04:00
2004-06-07 07:46:32 +04:00
case 3 :
2005-01-10 18:56:37 +03:00
sam3 = talloc_zero ( mem_ctx , struct netr_SamInfo3 ) ;
2005-01-09 15:55:25 +03:00
NT_STATUS_HAVE_NO_MEMORY ( sam3 ) ;
2004-06-14 16:06:53 +04:00
sam3 - > base = * sam ;
r - > out . validation . sam3 = sam3 ;
2004-06-07 07:46:32 +04:00
break ;
2004-06-14 16:06:53 +04:00
case 6 :
2005-01-10 18:56:37 +03:00
sam6 = talloc_zero ( mem_ctx , struct netr_SamInfo6 ) ;
2005-01-09 15:55:25 +03:00
NT_STATUS_HAVE_NO_MEMORY ( sam6 ) ;
2004-06-14 16:06:53 +04:00
sam6 - > base = * sam ;
2007-12-04 22:05:00 +03:00
sam6 - > forest . string = lp_realm ( dce_call - > conn - > dce_ctx - > lp_ctx ) ;
2004-06-14 16:06:53 +04:00
sam6 - > principle . string = talloc_asprintf ( mem_ctx , " %s@%s " ,
2004-06-15 07:53:21 +04:00
sam - > account_name . string , sam6 - > forest . string ) ;
2005-01-10 18:56:37 +03:00
NT_STATUS_HAVE_NO_MEMORY ( sam6 - > principle . string ) ;
2004-06-14 16:06:53 +04:00
r - > out . validation . sam6 = sam6 ;
break ;
2004-06-07 07:46:32 +04:00
default :
break ;
}
r - > out . authoritative = 1 ;
2005-01-10 15:30:13 +03:00
/* TODO: Describe and deal with these flags */
r - > out . flags = 0 ;
2004-06-07 07:46:32 +04:00
return NT_STATUS_OK ;
}
2004-05-15 11:51:38 +04:00
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_LogonSamLogonEx ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2006-02-21 03:07:59 +03:00
struct netr_LogonSamLogonEx * r )
{
NTSTATUS nt_status ;
struct creds_CredentialState * creds ;
2008-04-17 14:23:44 +04:00
nt_status = schannel_fetch_session_key ( mem_ctx , dce_call - > event_ctx , dce_call - > conn - > dce_ctx - > lp_ctx , r - > in . computer_name , lp_workgroup ( dce_call - > conn - > dce_ctx - > lp_ctx ) , & creds ) ;
2006-02-21 03:07:59 +03:00
if ( ! NT_STATUS_IS_OK ( nt_status ) ) {
return nt_status ;
}
2006-07-27 13:37:55 +04:00
if ( ! dce_call - > conn - > auth_state . auth_info | |
dce_call - > conn - > auth_state . auth_info - > auth_type ! = DCERPC_AUTH_TYPE_SCHANNEL ) {
2006-02-21 03:07:59 +03:00
return NT_STATUS_INTERNAL_ERROR ;
}
2007-01-17 17:49:36 +03:00
return dcesrv_netr_LogonSamLogon_base ( dce_call , mem_ctx , r , creds ) ;
2006-02-21 03:07:59 +03:00
}
2005-01-03 09:23:02 +03:00
/*
netr_LogonSamLogonWithFlags
*/
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_LogonSamLogonWithFlags ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2005-01-03 09:23:02 +03:00
struct netr_LogonSamLogonWithFlags * r )
{
NTSTATUS nt_status ;
2006-02-21 03:07:59 +03:00
struct creds_CredentialState * creds ;
2005-01-03 09:23:02 +03:00
struct netr_LogonSamLogonEx r2 ;
2005-01-10 18:56:37 +03:00
struct netr_Authenticator * return_authenticator ;
2005-01-03 09:23:02 +03:00
2005-01-10 18:56:37 +03:00
return_authenticator = talloc ( mem_ctx , struct netr_Authenticator ) ;
NT_STATUS_HAVE_NO_MEMORY ( return_authenticator ) ;
2005-01-03 09:23:02 +03:00
2008-04-17 14:23:44 +04:00
nt_status = dcesrv_netr_creds_server_step_check ( dce_call - > event_ctx , dce_call - > conn - > dce_ctx - > lp_ctx ,
2007-12-06 18:36:54 +03:00
r - > in . computer_name , mem_ctx ,
2006-02-09 05:30:43 +03:00
r - > in . credential , return_authenticator ,
2006-02-21 03:07:59 +03:00
& creds ) ;
2005-01-10 18:56:37 +03:00
NT_STATUS_NOT_OK_RETURN ( nt_status ) ;
2005-01-03 09:23:02 +03:00
ZERO_STRUCT ( r2 ) ;
2005-01-10 18:56:37 +03:00
r2 . in . server_name = r - > in . server_name ;
2006-02-21 03:07:59 +03:00
r2 . in . computer_name = r - > in . computer_name ;
2005-01-10 18:56:37 +03:00
r2 . in . logon_level = r - > in . logon_level ;
r2 . in . logon = r - > in . logon ;
r2 . in . validation_level = r - > in . validation_level ;
r2 . in . flags = r - > in . flags ;
2005-01-03 09:23:02 +03:00
2007-01-17 17:49:36 +03:00
nt_status = dcesrv_netr_LogonSamLogon_base ( dce_call , mem_ctx , & r2 , creds ) ;
2005-01-03 09:23:02 +03:00
2005-01-10 18:56:37 +03:00
r - > out . return_authenticator = return_authenticator ;
r - > out . validation = r2 . out . validation ;
r - > out . authoritative = r2 . out . authoritative ;
r - > out . flags = r2 . out . flags ;
2005-01-03 09:23:02 +03:00
return nt_status ;
}
2004-06-14 13:31:47 +04:00
/*
netr_LogonSamLogon
*/
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_LogonSamLogon ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-06-14 13:31:47 +04:00
struct netr_LogonSamLogon * r )
{
struct netr_LogonSamLogonWithFlags r2 ;
NTSTATUS status ;
ZERO_STRUCT ( r2 ) ;
r2 . in . server_name = r - > in . server_name ;
2006-02-21 03:07:59 +03:00
r2 . in . computer_name = r - > in . computer_name ;
2004-06-14 13:31:47 +04:00
r2 . in . credential = r - > in . credential ;
r2 . in . return_authenticator = r - > in . return_authenticator ;
r2 . in . logon_level = r - > in . logon_level ;
r2 . in . logon = r - > in . logon ;
r2 . in . validation_level = r - > in . validation_level ;
r2 . in . flags = 0 ;
2007-01-17 17:49:36 +03:00
status = dcesrv_netr_LogonSamLogonWithFlags ( dce_call , mem_ctx , & r2 ) ;
2004-06-14 13:31:47 +04:00
r - > out . return_authenticator = r2 . out . return_authenticator ;
r - > out . validation = r2 . out . validation ;
r - > out . authoritative = r2 . out . authoritative ;
return status ;
}
2004-05-15 11:51:38 +04:00
/*
netr_LogonSamLogoff
*/
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_LogonSamLogoff ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 11:51:38 +04:00
struct netr_LogonSamLogoff * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
netr_DatabaseDeltas
*/
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_DatabaseDeltas ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 11:51:38 +04:00
struct netr_DatabaseDeltas * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
netr_DatabaseSync
*/
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_DatabaseSync ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 11:51:38 +04:00
struct netr_DatabaseSync * r )
{
2008-01-11 01:24:38 +03:00
/* win2k3 native mode returns "NOT IMPLEMENTED" for this call */
return NT_STATUS_NOT_IMPLEMENTED ;
2004-05-15 11:51:38 +04:00
}
/*
netr_AccountDeltas
*/
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_AccountDeltas ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 11:51:38 +04:00
struct netr_AccountDeltas * r )
{
2006-09-01 14:41:27 +04:00
/* w2k3 returns "NOT IMPLEMENTED" for this call */
return NT_STATUS_NOT_IMPLEMENTED ;
2004-05-15 11:51:38 +04:00
}
/*
netr_AccountSync
*/
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_AccountSync ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 11:51:38 +04:00
struct netr_AccountSync * r )
{
2006-09-01 14:41:27 +04:00
/* w2k3 returns "NOT IMPLEMENTED" for this call */
return NT_STATUS_NOT_IMPLEMENTED ;
2004-05-15 11:51:38 +04:00
}
/*
netr_GetDcName
*/
2007-06-08 14:32:29 +04:00
static WERROR dcesrv_netr_GetDcName ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 11:51:38 +04:00
struct netr_GetDcName * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
netr_LogonControl
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_LogonControl ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 11:51:38 +04:00
struct netr_LogonControl * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
netr_GetAnyDCName
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_GetAnyDCName ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 11:51:38 +04:00
struct netr_GetAnyDCName * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
netr_LogonControl2
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_LogonControl2 ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 11:51:38 +04:00
struct netr_LogonControl2 * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
netr_DatabaseSync2
*/
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_DatabaseSync2 ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 11:51:38 +04:00
struct netr_DatabaseSync2 * r )
{
2008-01-11 01:24:38 +03:00
/* win2k3 native mode returns "NOT IMPLEMENTED" for this call */
return NT_STATUS_NOT_IMPLEMENTED ;
2004-05-15 11:51:38 +04:00
}
/*
netr_DatabaseRedo
*/
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_DatabaseRedo ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 11:51:38 +04:00
struct netr_DatabaseRedo * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
netr_LogonControl2Ex
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_LogonControl2Ex ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-15 11:51:38 +04:00
struct netr_LogonControl2Ex * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
2004-05-28 17:23:30 +04:00
/*
2007-12-04 01:38:54 +03:00
netr_NetrEnumerateTurstedDomains
2004-05-28 17:23:30 +04:00
*/
2007-12-04 01:38:54 +03:00
static WERROR dcesrv_netr_NetrEnumerateTrustedDomains ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct netr_NetrEnumerateTrustedDomains * r )
2004-05-28 17:23:30 +04:00
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
netr_NETRLOGONDUMMYROUTINE1
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_NETRLOGONDUMMYROUTINE1 ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-28 17:23:30 +04:00
struct netr_NETRLOGONDUMMYROUTINE1 * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
netr_NETRLOGONSETSERVICEBITS
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_NETRLOGONSETSERVICEBITS ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-28 17:23:30 +04:00
struct netr_NETRLOGONSETSERVICEBITS * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
2008-01-25 02:04:24 +03:00
/*
netr_LogonGetTrustRid
2004-05-28 17:23:30 +04:00
*/
2008-01-25 02:04:24 +03:00
static WERROR dcesrv_netr_LogonGetTrustRid ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct netr_LogonGetTrustRid * r )
2004-05-28 17:23:30 +04:00
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
netr_NETRLOGONCOMPUTESERVERDIGEST
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_NETRLOGONCOMPUTESERVERDIGEST ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-28 17:23:30 +04:00
struct netr_NETRLOGONCOMPUTESERVERDIGEST * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
netr_NETRLOGONCOMPUTECLIENTDIGEST
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_NETRLOGONCOMPUTECLIENTDIGEST ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-28 17:23:30 +04:00
struct netr_NETRLOGONCOMPUTECLIENTDIGEST * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
2005-10-31 05:12:13 +03:00
netr_DsRGetSiteName
2004-05-28 17:23:30 +04:00
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_DsRGetSiteName ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2005-10-31 05:12:13 +03:00
struct netr_DsRGetSiteName * r )
2004-05-28 17:23:30 +04:00
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
2005-07-08 09:19:28 +04:00
/*
fill in a netr_DomainTrustInfo from a ldb search result
*/
2006-09-01 14:41:27 +04:00
static NTSTATUS fill_domain_trust_info ( TALLOC_CTX * mem_ctx ,
struct ldb_message * res ,
struct ldb_message * ref_res ,
2005-08-04 00:27:33 +04:00
struct netr_DomainTrustInfo * info ,
2008-10-04 04:52:59 +04:00
bool is_local , bool is_trust_list )
2004-06-14 12:12:50 +04:00
{
ZERO_STRUCTP ( info ) ;
2004-12-21 14:52:53 +03:00
2008-10-04 04:52:59 +04:00
info - > trust_extension . info = talloc_zero ( mem_ctx , struct netr_trust_extension ) ;
info - > trust_extension . length = 16 ;
info - > trust_extension . info - > flags =
NETR_TRUST_FLAG_TREEROOT |
NETR_TRUST_FLAG_IN_FOREST |
NETR_TRUST_FLAG_PRIMARY ;
info - > trust_extension . info - > parent_index = 0 ; /* should be index into array
of parent */
info - > trust_extension . info - > trust_type = LSA_TRUST_TYPE_UPLEVEL ; /* should be based on ldb search for trusts */
info - > trust_extension . info - > trust_attributes = LSA_TRUST_ATTRIBUTE_NON_TRANSITIVE ; /* needs to be based on ldb search */
if ( is_trust_list ) {
/* MS-NRPC 3.5.4.3.9 - must be set to NULL for trust list */
info - > forest . string = NULL ;
} else {
2008-10-05 08:48:46 +04:00
/* TODO: we need a common function for pulling the forest */
info - > forest . string = samdb_result_string ( ref_res , " dnsRoot " , NULL ) ;
2008-10-04 04:52:59 +04:00
}
2004-12-21 14:52:53 +03:00
if ( is_local ) {
2006-09-01 14:41:27 +04:00
info - > domainname . string = samdb_result_string ( ref_res , " nETBIOSName " , NULL ) ;
info - > fulldomainname . string = samdb_result_string ( ref_res , " dnsRoot " , NULL ) ;
2004-12-21 14:52:53 +03:00
info - > guid = samdb_result_guid ( res , " objectGUID " ) ;
info - > sid = samdb_result_dom_sid ( mem_ctx , res , " objectSid " ) ;
2004-06-14 12:12:50 +04:00
} else {
2004-12-21 14:52:53 +03:00
info - > domainname . string = samdb_result_string ( res , " flatName " , NULL ) ;
2006-09-01 14:41:27 +04:00
info - > fulldomainname . string = samdb_result_string ( res , " trustPartner " , NULL ) ;
2004-12-21 14:52:53 +03:00
info - > guid = samdb_result_guid ( res , " objectGUID " ) ;
info - > sid = samdb_result_dom_sid ( mem_ctx , res , " securityIdentifier " ) ;
2004-06-14 12:12:50 +04:00
}
return NT_STATUS_OK ;
}
2004-05-28 17:23:30 +04:00
/*
2004-06-14 12:12:50 +04:00
netr_LogonGetDomainInfo
this is called as part of the ADS domain logon procedure .
2008-01-11 01:24:38 +03:00
It has an important role in convaying details about the client , such
as Operating System , Version , Service Pack etc .
2004-05-28 17:23:30 +04:00
*/
2007-01-17 17:49:36 +03:00
static NTSTATUS dcesrv_netr_LogonGetDomainInfo ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-06-14 12:12:50 +04:00
struct netr_LogonGetDomainInfo * r )
2004-05-28 17:23:30 +04:00
{
2006-09-01 14:41:27 +04:00
const char * const attrs [ ] = { " objectSid " ,
2004-12-21 14:52:53 +03:00
" objectGUID " , " flatName " , " securityIdentifier " ,
2006-09-01 14:41:27 +04:00
" trustPartner " , NULL } ;
const char * const ref_attrs [ ] = { " nETBIOSName " , " dnsRoot " , NULL } ;
2005-08-04 00:27:33 +04:00
struct ldb_context * sam_ctx ;
struct ldb_message * * res1 , * * res2 , * * ref_res ;
2004-06-14 12:12:50 +04:00
struct netr_DomainInfo1 * info1 ;
2005-08-04 00:27:33 +04:00
int ret , ret1 , ret2 , i ;
2004-06-14 12:12:50 +04:00
NTSTATUS status ;
2006-11-22 03:59:34 +03:00
struct ldb_dn * partitions_basedn ;
2004-06-14 12:12:50 +04:00
2005-08-04 00:27:33 +04:00
const char * local_domain ;
2008-04-17 14:23:44 +04:00
status = dcesrv_netr_creds_server_step_check ( dce_call - > event_ctx , dce_call - > conn - > dce_ctx - > lp_ctx ,
2007-12-06 18:36:54 +03:00
r - > in . computer_name , mem_ctx ,
2006-02-09 05:30:43 +03:00
r - > in . credential ,
r - > out . return_authenticator ,
NULL ) ;
2008-10-04 04:52:59 +04:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 0 , ( __location__ " Bad credentials - error \n " ) ) ;
}
2006-07-27 13:37:55 +04:00
NT_STATUS_NOT_OK_RETURN ( status ) ;
2004-06-14 12:12:50 +04:00
2008-04-17 14:23:44 +04:00
sam_ctx = samdb_connect ( mem_ctx , dce_call - > event_ctx , dce_call - > conn - > dce_ctx - > lp_ctx , dce_call - > conn - > auth_state . session_info ) ;
2004-06-14 12:12:50 +04:00
if ( sam_ctx = = NULL ) {
return NT_STATUS_INVALID_SYSTEM_SERVICE ;
}
2006-08-31 12:22:13 +04:00
partitions_basedn = samdb_partitions_dn ( sam_ctx , mem_ctx ) ;
2004-06-14 12:12:50 +04:00
/* we need to do two searches. The first will pull our primary
domain and the second will pull any trusted domains . Our
primary domain is also a " trusted " domain , so we need to
put the primary domain into the lists of returned trusts as
well */
2006-09-01 14:41:27 +04:00
ret1 = gendb_search_dn ( sam_ctx , mem_ctx , samdb_base_dn ( sam_ctx ) , & res1 , attrs ) ;
2004-06-14 12:12:50 +04:00
if ( ret1 ! = 1 ) {
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
2005-08-04 00:27:33 +04:00
/* try and find the domain */
2006-06-15 03:47:45 +04:00
ret = gendb_search ( sam_ctx , mem_ctx , partitions_basedn ,
2005-08-04 00:27:33 +04:00
& ref_res , ref_attrs ,
" (&(objectClass=crossRef)(ncName=%s)) " ,
2006-11-22 05:05:19 +03:00
ldb_dn_get_linearized ( res1 [ 0 ] - > dn ) ) ;
2005-08-04 00:27:33 +04:00
if ( ret ! = 1 ) {
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
local_domain = samdb_result_string ( ref_res [ 0 ] , " nETBIOSName " , NULL ) ;
2006-08-25 11:08:06 +04:00
ret2 = gendb_search ( sam_ctx , mem_ctx , NULL , & res2 , attrs , " (objectClass=trustedDomain) " ) ;
2004-06-14 12:12:50 +04:00
if ( ret2 = = - 1 ) {
return NT_STATUS_INTERNAL_DB_CORRUPTION ;
}
2005-01-27 10:08:20 +03:00
info1 = talloc ( mem_ctx , struct netr_DomainInfo1 ) ;
2006-07-27 13:37:55 +04:00
NT_STATUS_HAVE_NO_MEMORY ( info1 ) ;
2004-06-14 12:12:50 +04:00
ZERO_STRUCTP ( info1 ) ;
info1 - > num_trusts = ret2 + 1 ;
2005-01-27 10:08:20 +03:00
info1 - > trusts = talloc_array ( mem_ctx , struct netr_DomainTrustInfo ,
2004-06-14 12:12:50 +04:00
info1 - > num_trusts ) ;
2006-07-27 13:37:55 +04:00
NT_STATUS_HAVE_NO_MEMORY ( info1 - > trusts ) ;
2004-06-14 12:12:50 +04:00
2008-10-04 04:52:59 +04:00
status = fill_domain_trust_info ( mem_ctx , res1 [ 0 ] , ref_res [ 0 ] , & info1 - > domaininfo ,
true , false ) ;
2006-07-27 13:37:55 +04:00
NT_STATUS_NOT_OK_RETURN ( status ) ;
2004-06-14 12:12:50 +04:00
for ( i = 0 ; i < ret2 ; i + + ) {
2008-10-04 04:52:59 +04:00
status = fill_domain_trust_info ( mem_ctx , res2 [ i ] , NULL , & info1 - > trusts [ i ] ,
false , true ) ;
2006-07-27 13:37:55 +04:00
NT_STATUS_NOT_OK_RETURN ( status ) ;
2004-06-14 12:12:50 +04:00
}
2008-10-04 04:52:59 +04:00
status = fill_domain_trust_info ( mem_ctx , res1 [ 0 ] , ref_res [ 0 ] , & info1 - > trusts [ i ] ,
true , true ) ;
2006-07-27 13:37:55 +04:00
NT_STATUS_NOT_OK_RETURN ( status ) ;
2005-07-08 09:19:28 +04:00
2008-10-05 08:48:46 +04:00
info1 - > dns_hostname . string = samdb_result_string ( ref_res [ 0 ] , " dnsRoot " , NULL ) ;
2008-10-04 04:52:59 +04:00
info1 - > workstation_flags =
NETR_WS_FLAG_HANDLES_INBOUND_TRUSTS | NETR_WS_FLAG_HANDLES_SPN_UPDATE ;
info1 - > supported_enc_types = 0 ; /* w2008 gives this 0 */
2004-06-14 12:12:50 +04:00
r - > out . info . info1 = info1 ;
return NT_STATUS_OK ;
2004-05-28 17:23:30 +04:00
}
2007-12-04 11:41:28 +03:00
/*
netr_ServerPasswordGet
2004-05-28 17:23:30 +04:00
*/
2007-12-04 11:41:28 +03:00
static WERROR dcesrv_netr_ServerPasswordGet ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct netr_ServerPasswordGet * r )
2004-05-28 17:23:30 +04:00
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
netr_NETRLOGONSENDTOSAM
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_NETRLOGONSENDTOSAM ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-28 17:23:30 +04:00
struct netr_NETRLOGONSENDTOSAM * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
2007-11-07 20:42:00 +03:00
netr_DsRAddressToSitenamesW
2004-05-28 17:23:30 +04:00
*/
2007-11-07 20:42:00 +03:00
static WERROR dcesrv_netr_DsRAddressToSitenamesW ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct netr_DsRAddressToSitenamesW * r )
2004-05-28 17:23:30 +04:00
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
2005-10-31 05:12:13 +03:00
netr_DsRGetDCNameEx2
2004-05-28 17:23:30 +04:00
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_DsRGetDCNameEx2 ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2005-10-31 05:12:13 +03:00
struct netr_DsRGetDCNameEx2 * r )
2004-05-28 17:23:30 +04:00
{
2004-11-22 20:14:57 +03:00
const char * const attrs [ ] = { " dnsDomain " , " objectGUID " , NULL } ;
void * sam_ctx ;
struct ldb_message * * res ;
2007-12-05 02:40:48 +03:00
struct ldb_dn * domain_dn ;
2004-11-22 20:14:57 +03:00
int ret ;
ZERO_STRUCT ( r - > out ) ;
2008-04-17 14:23:44 +04:00
sam_ctx = samdb_connect ( mem_ctx , dce_call - > event_ctx , dce_call - > conn - > dce_ctx - > lp_ctx , dce_call - > conn - > auth_state . session_info ) ;
2004-11-22 20:14:57 +03:00
if ( sam_ctx = = NULL ) {
return WERR_DS_SERVICE_UNAVAILABLE ;
}
2007-12-05 02:40:48 +03:00
domain_dn = samdb_dns_domain_to_dn ( sam_ctx , mem_ctx ,
r - > in . domain_name ) ;
if ( domain_dn = = NULL ) {
return WERR_DS_SERVICE_UNAVAILABLE ;
}
ret = gendb_search_dn ( sam_ctx , mem_ctx , domain_dn , & res , attrs ) ;
2004-11-22 20:14:57 +03:00
if ( ret ! = 1 ) {
return WERR_NO_SUCH_DOMAIN ;
}
2005-10-31 05:12:13 +03:00
r - > out . info = talloc ( mem_ctx , struct netr_DsRGetDCNameInfo ) ;
2006-07-27 13:37:55 +04:00
W_ERROR_HAVE_NO_MEMORY ( r - > out . info ) ;
2004-11-22 20:14:57 +03:00
/* TODO: - return real IP address
* - check all r - > in . * parameters ( server_unc is ignored by w2k3 ! )
*/
2007-09-28 05:17:46 +04:00
r - > out . info - > dc_unc = talloc_asprintf ( mem_ctx , " \\ \\ %s.%s " ,
2007-12-04 22:05:00 +03:00
lp_netbios_name ( dce_call - > conn - > dce_ctx - > lp_ctx ) ,
lp_realm ( dce_call - > conn - > dce_ctx - > lp_ctx ) ) ;
2006-07-27 13:37:55 +04:00
W_ERROR_HAVE_NO_MEMORY ( r - > out . info - > dc_unc ) ;
r - > out . info - > dc_address = talloc_strdup ( mem_ctx , " \\ \\ 0.0.0.0 " ) ;
W_ERROR_HAVE_NO_MEMORY ( r - > out . info - > dc_address ) ;
2007-05-25 03:38:46 +04:00
r - > out . info - > dc_address_type = DS_ADDRESS_TYPE_INET ;
2004-11-22 20:14:57 +03:00
r - > out . info - > domain_guid = samdb_result_guid ( res [ 0 ] , " objectGUID " ) ;
r - > out . info - > domain_name = samdb_result_string ( res [ 0 ] , " dnsDomain " , NULL ) ;
r - > out . info - > forest_name = samdb_result_string ( res [ 0 ] , " dnsDomain " , NULL ) ;
2007-05-25 03:38:46 +04:00
r - > out . info - > dc_flags = DS_DNS_FOREST |
DS_DNS_DOMAIN |
DS_DNS_CONTROLLER |
DS_SERVER_WRITABLE |
DS_SERVER_CLOSEST |
DS_SERVER_TIMESERV |
DS_SERVER_KDC |
DS_SERVER_DS |
DS_SERVER_LDAP |
DS_SERVER_GC |
DS_SERVER_PDC ;
2004-11-22 20:14:57 +03:00
r - > out . info - > dc_site_name = talloc_strdup ( mem_ctx , " Default-First-Site-Name " ) ;
2006-07-27 13:37:55 +04:00
W_ERROR_HAVE_NO_MEMORY ( r - > out . info - > dc_site_name ) ;
2004-11-22 20:14:57 +03:00
r - > out . info - > client_site_name = talloc_strdup ( mem_ctx , " Default-First-Site-Name " ) ;
2006-07-27 13:37:55 +04:00
W_ERROR_HAVE_NO_MEMORY ( r - > out . info - > client_site_name ) ;
2004-11-22 20:14:57 +03:00
return WERR_OK ;
2004-05-28 17:23:30 +04:00
}
2005-10-31 05:12:13 +03:00
/*
netr_DsRGetDCNameEx
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_DsRGetDCNameEx ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2005-10-31 05:12:13 +03:00
struct netr_DsRGetDCNameEx * r )
{
struct netr_DsRGetDCNameEx2 r2 ;
WERROR werr ;
ZERO_STRUCT ( r2 ) ;
r2 . in . server_unc = r - > in . server_unc ;
r2 . in . client_account = NULL ;
r2 . in . mask = 0 ;
r2 . in . domain_guid = r - > in . domain_guid ;
r2 . in . domain_name = r - > in . domain_name ;
r2 . in . site_name = r - > in . site_name ;
r2 . in . flags = r - > in . flags ;
r2 . out . info = NULL ;
2007-01-17 17:49:36 +03:00
werr = dcesrv_netr_DsRGetDCNameEx2 ( dce_call , mem_ctx , & r2 ) ;
2005-10-31 05:12:13 +03:00
r - > out . info = r2 . out . info ;
return werr ;
}
/*
netr_DsRGetDCName
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_DsRGetDCName ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2005-10-31 05:12:13 +03:00
struct netr_DsRGetDCName * r )
{
struct netr_DsRGetDCNameEx2 r2 ;
WERROR werr ;
ZERO_STRUCT ( r2 ) ;
r2 . in . server_unc = r - > in . server_unc ;
r2 . in . client_account = NULL ;
r2 . in . mask = 0 ;
r2 . in . domain_name = r - > in . domain_name ;
r2 . in . domain_guid = r - > in . domain_guid ;
r2 . in . site_name = NULL ; /* should fill in from site GUID */
r2 . in . flags = r - > in . flags ;
r2 . out . info = NULL ;
2007-01-17 17:49:36 +03:00
werr = dcesrv_netr_DsRGetDCNameEx2 ( dce_call , mem_ctx , & r2 ) ;
2005-10-31 05:12:13 +03:00
r - > out . info = r2 . out . info ;
return werr ;
}
2004-05-28 17:23:30 +04:00
/*
netr_NETRLOGONGETTIMESERVICEPARENTDOMAIN
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_NETRLOGONGETTIMESERVICEPARENTDOMAIN ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-28 17:23:30 +04:00
struct netr_NETRLOGONGETTIMESERVICEPARENTDOMAIN * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
2007-12-04 01:38:54 +03:00
/*
netr_NetrEnumerateTrustedDomainsEx
2004-05-28 17:23:30 +04:00
*/
2007-12-04 01:38:54 +03:00
static WERROR dcesrv_netr_NetrEnumerateTrustedDomainsEx ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct netr_NetrEnumerateTrustedDomainsEx * r )
2004-05-28 17:23:30 +04:00
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
2007-11-07 20:42:00 +03:00
netr_DsRAddressToSitenamesExW
2004-05-28 17:23:30 +04:00
*/
2007-11-07 20:42:00 +03:00
static WERROR dcesrv_netr_DsRAddressToSitenamesExW ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct netr_DsRAddressToSitenamesExW * r )
2004-05-28 17:23:30 +04:00
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
2007-05-30 14:24:40 +04:00
netr_DsrGetDcSiteCoverageW
2004-05-28 17:23:30 +04:00
*/
2007-05-30 14:24:40 +04:00
static WERROR dcesrv_netr_DsrGetDcSiteCoverageW ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct netr_DsrGetDcSiteCoverageW * r )
2004-05-28 17:23:30 +04:00
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
netr_DsrEnumerateDomainTrusts
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_DsrEnumerateDomainTrusts ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-28 17:23:30 +04:00
struct netr_DsrEnumerateDomainTrusts * r )
{
struct netr_DomainTrust * trusts ;
void * sam_ctx ;
2005-08-03 11:24:42 +04:00
int ret ;
struct ldb_message * * dom_res , * * ref_res ;
2006-09-01 14:41:27 +04:00
const char * const dom_attrs [ ] = { " objectSid " , " objectGUID " , NULL } ;
const char * const ref_attrs [ ] = { " nETBIOSName " , " dnsRoot " , NULL } ;
2006-11-22 03:59:34 +03:00
struct ldb_dn * partitions_basedn ;
2004-05-28 17:23:30 +04:00
ZERO_STRUCT ( r - > out ) ;
2008-04-17 14:23:44 +04:00
sam_ctx = samdb_connect ( mem_ctx , dce_call - > event_ctx , dce_call - > conn - > dce_ctx - > lp_ctx , dce_call - > conn - > auth_state . session_info ) ;
2004-05-28 17:23:30 +04:00
if ( sam_ctx = = NULL ) {
return WERR_GENERAL_FAILURE ;
}
2006-08-31 12:22:13 +04:00
partitions_basedn = samdb_partitions_dn ( sam_ctx , mem_ctx ) ;
2006-08-25 11:08:06 +04:00
ret = gendb_search_dn ( sam_ctx , mem_ctx , NULL , & dom_res , dom_attrs ) ;
2004-05-28 17:23:30 +04:00
if ( ret = = - 1 ) {
return WERR_GENERAL_FAILURE ;
}
2005-08-03 11:24:42 +04:00
if ( ret ! = 1 ) {
return WERR_GENERAL_FAILURE ;
}
2006-06-15 03:47:45 +04:00
ret = gendb_search ( sam_ctx , mem_ctx , partitions_basedn , & ref_res , ref_attrs ,
2005-08-18 19:02:01 +04:00
" (&(objectClass=crossRef)(ncName=%s)) " ,
2006-11-22 05:05:19 +03:00
ldb_dn_get_linearized ( dom_res [ 0 ] - > dn ) ) ;
2005-08-03 11:24:42 +04:00
if ( ret = = - 1 ) {
return WERR_GENERAL_FAILURE ;
}
if ( ret ! = 1 ) {
return WERR_GENERAL_FAILURE ;
2004-05-28 17:23:30 +04:00
}
2005-01-27 10:08:20 +03:00
trusts = talloc_array ( mem_ctx , struct netr_DomainTrust , ret ) ;
2006-07-27 13:37:55 +04:00
W_ERROR_HAVE_NO_MEMORY ( trusts ) ;
2004-05-28 17:23:30 +04:00
2005-08-03 11:24:42 +04:00
r - > out . count = 1 ;
2004-05-28 17:23:30 +04:00
r - > out . trusts = trusts ;
2004-05-30 17:15:15 +04:00
/* TODO: add filtering by trust_flags, and correct trust_type
and attributes */
2005-08-03 11:24:42 +04:00
trusts [ 0 ] . netbios_name = samdb_result_string ( ref_res [ 0 ] , " nETBIOSName " , NULL ) ;
2006-09-01 14:41:27 +04:00
trusts [ 0 ] . dns_name = samdb_result_string ( ref_res [ 0 ] , " dnsRoot " , NULL ) ;
2005-08-03 11:24:42 +04:00
trusts [ 0 ] . trust_flags =
NETR_TRUST_FLAG_TREEROOT |
NETR_TRUST_FLAG_IN_FOREST |
NETR_TRUST_FLAG_PRIMARY ;
trusts [ 0 ] . parent_index = 0 ;
trusts [ 0 ] . trust_type = 2 ;
trusts [ 0 ] . trust_attributes = 0 ;
trusts [ 0 ] . sid = samdb_result_dom_sid ( mem_ctx , dom_res [ 0 ] , " objectSid " ) ;
trusts [ 0 ] . guid = samdb_result_guid ( dom_res [ 0 ] , " objectGUID " ) ;
2004-05-28 17:23:30 +04:00
return WERR_OK ;
}
2008-01-26 00:42:14 +03:00
/*
netr_DsrDeregisterDNSHostRecords
2004-05-28 17:23:30 +04:00
*/
2008-01-26 00:42:14 +03:00
static WERROR dcesrv_netr_DsrDeregisterDNSHostRecords ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct netr_DsrDeregisterDNSHostRecords * r )
2004-05-28 17:23:30 +04:00
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
2007-12-04 12:20:13 +03:00
/*
netr_ServerTrustPasswordsGet
2004-05-28 17:23:30 +04:00
*/
2007-12-04 12:20:13 +03:00
static NTSTATUS dcesrv_netr_ServerTrustPasswordsGet ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct netr_ServerTrustPasswordsGet * r )
2004-05-28 17:23:30 +04:00
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
2007-06-08 14:49:46 +04:00
netr_DsRGetForestTrustInformation
2004-05-28 17:23:30 +04:00
*/
2007-06-08 14:49:46 +04:00
static WERROR dcesrv_netr_DsRGetForestTrustInformation ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct netr_DsRGetForestTrustInformation * r )
2004-05-28 17:23:30 +04:00
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
2007-12-22 08:52:14 +03:00
/*
netr_GetForestTrustInformation
2004-05-28 17:23:30 +04:00
*/
2007-12-22 08:52:14 +03:00
static WERROR dcesrv_netr_GetForestTrustInformation ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
struct netr_GetForestTrustInformation * r )
2004-05-28 17:23:30 +04:00
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
/*
netr_NETRSERVERGETTRUSTINFO
*/
2007-01-17 17:49:36 +03:00
static WERROR dcesrv_netr_NETRSERVERGETTRUSTINFO ( struct dcesrv_call_state * dce_call , TALLOC_CTX * mem_ctx ,
2004-05-28 17:23:30 +04:00
struct netr_NETRSERVERGETTRUSTINFO * r )
{
DCESRV_FAULT ( DCERPC_FAULT_OP_RNG_ERROR ) ;
}
2004-05-15 11:51:38 +04:00
/* include the generated boilerplate */
# include "librpc/gen_ndr/ndr_netlogon_s.c"