0001-01-01 02:30:17 +02:30
/*
Unix SMB / Netbios implementation .
0001-01-01 02:30:17 +02:30
Version 2.2
RPC pipe client
Copyright ( C ) Tim Potter 2000
0001-01-01 02:30:17 +02:30
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# include "includes.h"
0001-01-01 02:30:17 +02:30
extern int DEBUGLEVEL ;
extern pstring server ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
/* Look up domain related information on a remote host */
0001-01-01 02:30:17 +02:30
static uint32 cmd_lsa_query_info_policy ( struct cli_state * cli , int argc , char * * argv )
0001-01-01 02:30:17 +02:30
{
POLICY_HND pol ;
uint32 result = NT_STATUS_UNSUCCESSFUL ;
BOOL got_policy_hnd = False ;
DOM_SID dom_sid ;
fstring sid_str , domain_name ;
uint32 info_class = 3 ;
0001-01-01 02:30:17 +02:30
TALLOC_CTX * mem_ctx ;
0001-01-01 02:30:17 +02:30
if ( argc > 2 ) {
printf ( " Usage: %s [info_class] \n " , argv [ 0 ] ) ;
return 0 ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( ! ( mem_ctx = talloc_init ( ) ) )
{
DEBUG ( 0 , ( " cmd_lsa_query_info_poicy: talloc_init returned NULL! \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
0001-01-01 02:30:17 +02:30
if ( argc = = 2 ) {
info_class = atoi ( argv [ 1 ] ) ;
}
0001-01-01 02:30:17 +02:30
/* Initialise RPC connection */
if ( ! cli_nt_session_open ( cli , PIPE_LSARPC ) ) {
fprintf ( stderr , " Could not initialize samr pipe! \n " ) ;
return NT_STATUS_UNSUCCESSFUL ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( ( result = cli_lsa_open_policy ( cli , mem_ctx , True ,
0001-01-01 02:30:17 +02:30
SEC_RIGHTS_MAXIMUM_ALLOWED ,
& pol ) ) ! = NT_STATUS_NOPROBLEMO ) {
goto done ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
got_policy_hnd = True ;
0001-01-01 02:30:17 +02:30
/* Lookup info policy */
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( ( result = cli_lsa_query_info_policy ( cli , mem_ctx , & pol , info_class ,
0001-01-01 02:30:17 +02:30
domain_name , & dom_sid ) )
! = NT_STATUS_NOPROBLEMO ) {
goto done ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
sid_to_string ( sid_str , & dom_sid ) ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
printf ( " domain %s has sid %s \n " , domain_name , sid_str ) ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
done :
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( got_policy_hnd ) {
0001-01-01 02:30:17 +02:30
cli_lsa_close ( cli , mem_ctx , & pol ) ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
cli_nt_session_close ( cli ) ;
0001-01-01 02:30:17 +02:30
talloc_destroy ( mem_ctx ) ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
return result ;
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
/* Resolve a list of names to a list of sids */
0001-01-01 02:30:17 +02:30
static uint32 cmd_lsa_lookup_names ( struct cli_state * cli , int argc , char * * argv )
0001-01-01 02:30:17 +02:30
{
POLICY_HND pol ;
uint32 result = NT_STATUS_UNSUCCESSFUL ;
BOOL got_policy_hnd = False ;
DOM_SID * sids ;
uint32 * types ;
int num_names , i ;
0001-01-01 02:30:17 +02:30
TALLOC_CTX * mem_ctx ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( argc = = 1 ) {
printf ( " Usage: %s [name1 [name2 [...]]] \n " , argv [ 0 ] ) ;
return 0 ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( ! ( mem_ctx = talloc_init ( ) ) )
{
DEBUG ( 0 , ( " cmd_lsa_lookup_names: talloc_init returned NULL! \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
0001-01-01 02:30:17 +02:30
/* Initialise RPC connection */
if ( ! cli_nt_session_open ( cli , PIPE_LSARPC ) ) {
fprintf ( stderr , " Could not initialize samr pipe! \n " ) ;
return NT_STATUS_UNSUCCESSFUL ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( ( result = cli_lsa_open_policy ( cli , mem_ctx , True ,
0001-01-01 02:30:17 +02:30
SEC_RIGHTS_MAXIMUM_ALLOWED ,
& pol ) ) ! = NT_STATUS_NOPROBLEMO ) {
goto done ;
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
got_policy_hnd = True ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
/* Lookup the names */
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( ( result = cli_lsa_lookup_names ( cli , mem_ctx , & pol , argc - 1 ,
& argv [ 1 ] , & sids , & types , & num_names ) ! =
0001-01-01 02:30:17 +02:30
NT_STATUS_NOPROBLEMO ) ) {
goto done ;
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
/* Print results */
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
for ( i = 0 ; i < num_names ; i + + ) {
fstring sid_str ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
sid_to_string ( sid_str , & sids [ i ] ) ;
printf ( " %s \t \t %s (%d) \n " , argv [ i + 1 ] , sid_str ,
types [ i ] ) ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
#if 0 /* JERRY */
0001-01-01 02:30:17 +02:30
safe_free ( sids ) ;
safe_free ( types ) ;
0001-01-01 02:30:17 +02:30
# endif
0001-01-01 02:30:17 +02:30
done :
if ( got_policy_hnd ) {
0001-01-01 02:30:17 +02:30
cli_lsa_close ( cli , mem_ctx , & pol ) ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
cli_nt_session_close ( cli ) ;
0001-01-01 02:30:17 +02:30
talloc_destroy ( mem_ctx ) ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
return result ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
/* Resolve a list of SIDs to a list of names */
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
static uint32 cmd_lsa_lookup_sids ( struct cli_state * cli , int argc , char * * argv )
0001-01-01 02:30:17 +02:30
{
0001-01-01 02:30:17 +02:30
POLICY_HND pol ;
uint32 result = NT_STATUS_UNSUCCESSFUL ;
BOOL got_policy_hnd = False ;
0001-01-01 02:30:17 +02:30
DOM_SID * sids ;
char * * names ;
0001-01-01 02:30:17 +02:30
uint32 * types ;
int num_names , i ;
0001-01-01 02:30:17 +02:30
TALLOC_CTX * mem_ctx ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( argc = = 1 ) {
0001-01-01 02:30:17 +02:30
printf ( " Usage: %s [sid1 [sid2 [...]]] \n " , argv [ 0 ] ) ;
return 0 ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( ! ( mem_ctx = talloc_init ( ) ) )
{
DEBUG ( 0 , ( " cmd_lsa_lookup_sids: talloc_init returned NULL! \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
0001-01-01 02:30:17 +02:30
/* Initialise RPC connection */
if ( ! cli_nt_session_open ( cli , PIPE_LSARPC ) ) {
fprintf ( stderr , " Could not initialize samr pipe! \n " ) ;
return NT_STATUS_UNSUCCESSFUL ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( ( result = cli_lsa_open_policy ( cli , mem_ctx , True ,
0001-01-01 02:30:17 +02:30
SEC_RIGHTS_MAXIMUM_ALLOWED ,
& pol ) ) ! = NT_STATUS_NOPROBLEMO ) {
goto done ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
got_policy_hnd = True ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
/* Convert arguments to sids */
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
sids = ( DOM_SID * ) talloc ( mem_ctx , sizeof ( DOM_SID ) * ( argc - 1 ) ) ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( ! sids ) {
printf ( " out of memory \n " ) ;
goto done ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
for ( i = 0 ; i < argc - 1 ; i + + ) {
string_to_sid ( & sids [ i ] , argv [ i + 1 ] ) ;
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
/* Lookup the SIDs */
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( ( result = cli_lsa_lookup_sids ( cli , mem_ctx , & pol , argc - 1 , sids ,
0001-01-01 02:30:17 +02:30
& names , & types , & num_names ) ! =
NT_STATUS_NOPROBLEMO ) ) {
goto done ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
/* Print results */
for ( i = 0 ; i < num_names ; i + + ) {
fstring sid_str ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
sid_to_string ( sid_str , & sids [ i ] ) ;
printf ( " %s \t \t %s (%d) \n " , sid_str , names [ i ] ? names [ i ] :
" *unknown* " , types [ i ] ) ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
#if 0 /* JERRY */
0001-01-01 02:30:17 +02:30
safe_free ( sids ) ;
safe_free ( types ) ;
for ( i = 0 ; i < num_names ; i + + ) {
safe_free ( names [ i ] ) ;
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
safe_free ( names ) ;
0001-01-01 02:30:17 +02:30
# endif
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
done :
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( got_policy_hnd ) {
0001-01-01 02:30:17 +02:30
cli_lsa_close ( cli , mem_ctx , & pol ) ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
cli_nt_session_close ( cli ) ;
0001-01-01 02:30:17 +02:30
talloc_destroy ( mem_ctx ) ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
return result ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
/* Enumerate list of trusted domains */
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
static uint32 cmd_lsa_enum_trust_dom ( struct cli_state * cli , int argc , char * * argv )
0001-01-01 02:30:17 +02:30
{
POLICY_HND pol ;
uint32 result = NT_STATUS_UNSUCCESSFUL ;
BOOL got_policy_hnd = False ;
DOM_SID * domain_sids ;
char * * domain_names ;
0001-01-01 02:30:17 +02:30
uint32 enum_ctx = 0 ;
uint32 num_domains ;
int i ;
0001-01-01 02:30:17 +02:30
TALLOC_CTX * mem_ctx ;
0001-01-01 02:30:17 +02:30
if ( argc ! = 1 ) {
printf ( " Usage: %s \n " , argv [ 0 ] ) ;
return 0 ;
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( ! ( mem_ctx = talloc_init ( ) ) )
{
DEBUG ( 0 , ( " cmd_lsa_enum_trust_dom: talloc_init returned NULL! \n " ) ) ;
return NT_STATUS_UNSUCCESSFUL ;
}
0001-01-01 02:30:17 +02:30
/* Initialise RPC connection */
if ( ! cli_nt_session_open ( cli , PIPE_LSARPC ) ) {
fprintf ( stderr , " Could not initialize samr pipe! \n " ) ;
return NT_STATUS_UNSUCCESSFUL ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
if ( ( result = cli_lsa_open_policy ( cli , mem_ctx , True ,
0001-01-01 02:30:17 +02:30
SEC_RIGHTS_MAXIMUM_ALLOWED ,
& pol ) ) ! = NT_STATUS_NOPROBLEMO ) {
goto done ;
}
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
got_policy_hnd = True ;
/* Lookup list of trusted domains */
0001-01-01 02:30:17 +02:30
if ( ( result = cli_lsa_enum_trust_dom ( cli , mem_ctx , & pol , & enum_ctx ,
0001-01-01 02:30:17 +02:30
& num_domains , & domain_names ,
& domain_sids )
! = NT_STATUS_NOPROBLEMO ) ) {
goto done ;
}
/* Print results */
for ( i = 0 ; i < num_domains ; i + + ) {
fstring sid_str ;
sid_to_string ( sid_str , & domain_sids [ i ] ) ;
printf ( " %s \t \t %s \n " , domain_names [ i ] ? domain_names [ i ] :
" *unknown* " , sid_str ) ;
}
0001-01-01 02:30:17 +02:30
#if 0 /* JERRY */
0001-01-01 02:30:17 +02:30
safe_free ( domain_sids ) ;
for ( i = 0 ; i < num_domains ; i + + ) {
safe_free ( domain_names [ i ] ) ;
}
safe_free ( domain_names ) ;
0001-01-01 02:30:17 +02:30
# endif
0001-01-01 02:30:17 +02:30
done :
if ( got_policy_hnd ) {
0001-01-01 02:30:17 +02:30
cli_lsa_close ( cli , mem_ctx , & pol ) ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
cli_nt_session_close ( cli ) ;
0001-01-01 02:30:17 +02:30
talloc_destroy ( mem_ctx ) ;
0001-01-01 02:30:17 +02:30
0001-01-01 02:30:17 +02:30
return result ;
0001-01-01 02:30:17 +02:30
}
0001-01-01 02:30:17 +02:30
/* List of commands exported by this module */
struct cmd_set lsarpc_commands [ ] = {
0001-01-01 02:30:17 +02:30
{ " LSARPC " , NULL , " " } ,
0001-01-01 02:30:17 +02:30
{ " lsaquery " , cmd_lsa_query_info_policy , " Query info policy " } ,
{ " lookupsids " , cmd_lsa_lookup_sids , " Convert SIDs to names " } ,
{ " lookupnames " , cmd_lsa_lookup_names , " Convert names to SIDs " } ,
{ " enumtrust " , cmd_lsa_enum_trust_dom , " Enumerate trusted domains " } ,
0001-01-01 02:30:17 +02:30
{ NULL , NULL , NULL }
} ;