1998-09-26 01:01:52 +04:00
/*
2002-01-30 09:08:46 +03:00
Unix SMB / CIFS implementation .
2001-05-24 04:20:32 +04:00
RPC pipe client
Copyright ( C ) Tim Potter 2000
2008-02-27 21:38:48 +03:00
Copyright ( C ) Guenther Deschner 2008
2001-05-24 04:20:32 +04:00
1998-09-26 01:01:52 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-09 23:25:36 +04:00
the Free Software Foundation ; either version 3 of the License , or
1998-09-26 01:01:52 +04:00
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
2007-07-10 04:52:41 +04:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
1998-09-26 01:01:52 +04:00
*/
# include "includes.h"
2001-10-12 09:56:23 +04:00
# include "rpcclient.h"
1998-09-26 01:01:52 +04:00
2008-02-14 00:54:43 +03:00
static WERROR cmd_netlogon_logon_ctrl2 ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
2001-05-24 12:10:50 +04:00
{
2008-02-14 00:54:43 +03:00
NTSTATUS status = NT_STATUS_UNSUCCESSFUL ;
WERROR werr ;
const char * logon_server = cli - > cli - > desthost ;
enum netr_LogonControlCode function_code = NETLOGON_CONTROL_REDISCOVER ;
uint32_t level = 1 ;
union netr_CONTROL_DATA_INFORMATION data ;
union netr_CONTROL_QUERY_INFORMATION query ;
2008-02-14 03:45:07 +03:00
const char * domain = lp_workgroup ( ) ;
2001-05-24 12:10:50 +04:00
2008-02-14 00:54:43 +03:00
if ( argc > 5 ) {
fprintf ( stderr , " Usage: %s <logon_server> <function_code> "
" <level> <domain> \n " , argv [ 0 ] ) ;
return WERR_OK ;
}
if ( argc > = 2 ) {
logon_server = argv [ 1 ] ;
2001-05-24 12:10:50 +04:00
}
2008-02-14 00:54:43 +03:00
if ( argc > = 3 ) {
function_code = atoi ( argv [ 2 ] ) ;
}
2001-10-12 09:56:23 +04:00
2008-02-14 00:54:43 +03:00
if ( argc > = 4 ) {
level = atoi ( argv [ 3 ] ) ;
}
if ( argc > = 5 ) {
domain = argv [ 4 ] ;
}
switch ( function_code ) {
case NETLOGON_CONTROL_REDISCOVER :
case NETLOGON_CONTROL_TC_QUERY :
data . domain = domain ;
break ;
default :
break ;
}
status = rpccli_netr_LogonControl2 ( cli , mem_ctx ,
logon_server ,
function_code ,
level ,
& data ,
& query ,
& werr ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return ntstatus_to_werror ( status ) ;
}
if ( ! W_ERROR_IS_OK ( werr ) ) {
return werr ;
}
2001-05-24 12:10:50 +04:00
/* Display results */
2008-02-14 00:54:43 +03:00
return werr ;
2001-05-24 12:10:50 +04:00
}
2007-05-29 19:27:13 +04:00
static WERROR cmd_netlogon_getanydcname ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
2004-04-02 16:56:18 +04:00
{
2008-02-07 12:24:18 +03:00
const char * dcname = NULL ;
WERROR werr ;
NTSTATUS status ;
2006-10-07 09:26:21 +04:00
int old_timeout ;
2004-04-02 16:56:18 +04:00
if ( argc ! = 2 ) {
fprintf ( stderr , " Usage: %s domainname \n " , argv [ 0 ] ) ;
2006-10-06 20:13:10 +04:00
return WERR_OK ;
2004-04-02 16:56:18 +04:00
}
2006-10-07 09:26:21 +04:00
/* Make sure to wait for our DC's reply */
2006-10-17 03:27:38 +04:00
old_timeout = cli_set_timeout ( cli - > cli , MAX ( cli - > cli - > timeout , 30000 ) ) ; /* 30 seconds. */
2006-10-07 09:26:21 +04:00
2008-02-07 12:24:18 +03:00
status = rpccli_netr_GetAnyDCName ( cli , mem_ctx ,
cli - > cli - > desthost ,
argv [ 1 ] ,
& dcname ,
& werr ) ;
2006-10-07 09:26:21 +04:00
cli_set_timeout ( cli - > cli , old_timeout ) ;
2008-02-07 12:24:18 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return ntstatus_to_werror ( status ) ;
}
if ( ! W_ERROR_IS_OK ( werr ) ) {
return werr ;
}
2006-10-07 09:26:21 +04:00
/* Display results */
printf ( " %s \n " , dcname ) ;
2008-02-07 12:24:18 +03:00
return werr ;
2006-10-07 09:26:21 +04:00
}
2008-02-07 12:24:18 +03:00
static WERROR cmd_netlogon_getdcname ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx , int argc ,
2007-06-08 14:29:46 +04:00
const char * * argv )
2006-10-07 09:26:21 +04:00
{
2008-02-07 12:24:18 +03:00
const char * dcname = NULL ;
NTSTATUS status ;
WERROR werr ;
2006-10-07 09:26:21 +04:00
int old_timeout ;
if ( argc ! = 2 ) {
fprintf ( stderr , " Usage: %s domainname \n " , argv [ 0 ] ) ;
2007-06-08 14:29:46 +04:00
return WERR_OK ;
2006-10-07 09:26:21 +04:00
}
/* Make sure to wait for our DC's reply */
2006-10-17 03:27:38 +04:00
old_timeout = cli_set_timeout ( cli - > cli , MAX ( cli - > cli - > timeout , 30000 ) ) ; /* 30 seconds. */
2006-10-07 09:26:21 +04:00
2008-02-07 12:24:18 +03:00
status = rpccli_netr_GetDcName ( cli , mem_ctx ,
cli - > cli - > desthost ,
argv [ 1 ] ,
& dcname ,
& werr ) ;
2006-10-07 09:26:21 +04:00
cli_set_timeout ( cli - > cli , old_timeout ) ;
2008-02-07 12:24:18 +03:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
return ntstatus_to_werror ( status ) ;
}
if ( ! W_ERROR_IS_OK ( werr ) ) {
return werr ;
}
2004-04-02 16:56:18 +04:00
/* Display results */
printf ( " %s \n " , dcname ) ;
2008-02-07 12:24:18 +03:00
return werr ;
2004-04-02 16:56:18 +04:00
}
2005-11-13 14:38:17 +03:00
static WERROR cmd_netlogon_dsr_getdcname ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
{
2008-02-09 01:28:02 +03:00
NTSTATUS result ;
WERROR werr = WERR_OK ;
2007-05-25 03:11:11 +04:00
uint32 flags = DS_RETURN_DNS_NAME ;
const char * server_name = cli - > cli - > desthost ;
const char * domain_name ;
struct GUID domain_guid = GUID_zero ( ) ;
struct GUID site_guid = GUID_zero ( ) ;
2008-02-09 01:28:02 +03:00
struct netr_DsRGetDCNameInfo * info = NULL ;
2007-05-25 03:11:11 +04:00
if ( argc < 2 ) {
2007-08-28 19:01:23 +04:00
fprintf ( stderr , " Usage: %s [domain_name] [domain_guid] "
" [site_guid] [flags] \n " , argv [ 0 ] ) ;
2005-11-13 14:38:17 +03:00
return WERR_OK ;
}
2007-05-25 03:11:11 +04:00
if ( argc > = 2 )
domain_name = argv [ 1 ] ;
if ( argc > = 3 ) {
if ( ! NT_STATUS_IS_OK ( GUID_from_string ( argv [ 2 ] , & domain_guid ) ) ) {
return WERR_NOMEM ;
}
}
if ( argc > = 4 ) {
if ( ! NT_STATUS_IS_OK ( GUID_from_string ( argv [ 3 ] , & site_guid ) ) ) {
return WERR_NOMEM ;
}
}
if ( argc > = 5 )
sscanf ( argv [ 4 ] , " %x " , & flags ) ;
2007-08-28 19:01:23 +04:00
debug_dsdcinfo_flags ( 1 , flags ) ;
2008-02-09 01:28:02 +03:00
result = rpccli_netr_DsRGetDCName ( cli , mem_ctx ,
server_name ,
domain_name ,
& domain_guid ,
& site_guid ,
flags ,
& info ,
& werr ) ;
2005-11-13 14:38:17 +03:00
2008-02-09 01:28:02 +03:00
if ( W_ERROR_IS_OK ( werr ) ) {
d_printf ( " DsGetDcName gave: %s \n " ,
NDR_PRINT_STRUCT_STRING ( mem_ctx , netr_DsRGetDCNameInfo , info ) ) ;
2005-11-13 14:38:17 +03:00
return WERR_OK ;
}
printf ( " rpccli_netlogon_dsr_getdcname returned %s \n " ,
2008-02-09 01:28:02 +03:00
dos_errstr ( werr ) ) ;
2007-05-25 03:11:11 +04:00
2008-02-09 01:28:02 +03:00
return werr ;
2007-05-25 03:11:11 +04:00
}
static WERROR cmd_netlogon_dsr_getdcnameex ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
{
WERROR result ;
2008-01-25 23:17:44 +03:00
NTSTATUS status ;
uint32_t flags = DS_RETURN_DNS_NAME ;
2007-05-25 03:11:11 +04:00
const char * server_name = cli - > cli - > desthost ;
const char * domain_name ;
const char * site_name = NULL ;
struct GUID domain_guid = GUID_zero ( ) ;
2008-01-25 23:17:44 +03:00
struct netr_DsRGetDCNameInfo * info = NULL ;
2007-05-25 03:11:11 +04:00
if ( argc < 2 ) {
2007-08-28 19:01:23 +04:00
fprintf ( stderr , " Usage: %s [domain_name] [domain_guid] "
" [site_name] [flags] \n " , argv [ 0 ] ) ;
2007-05-25 03:11:11 +04:00
return WERR_OK ;
}
2008-01-25 23:17:44 +03:00
domain_name = argv [ 1 ] ;
2007-05-25 03:11:11 +04:00
if ( argc > = 3 ) {
if ( ! NT_STATUS_IS_OK ( GUID_from_string ( argv [ 2 ] , & domain_guid ) ) ) {
return WERR_NOMEM ;
}
}
2008-01-25 23:17:44 +03:00
if ( argc > = 4 ) {
2007-05-25 03:11:11 +04:00
site_name = argv [ 3 ] ;
2008-01-25 23:17:44 +03:00
}
2007-05-25 03:11:11 +04:00
2008-01-25 23:17:44 +03:00
if ( argc > = 5 ) {
2007-05-25 03:11:11 +04:00
sscanf ( argv [ 4 ] , " %x " , & flags ) ;
2008-01-25 23:17:44 +03:00
}
2007-05-25 03:11:11 +04:00
2007-08-28 19:01:23 +04:00
debug_dsdcinfo_flags ( 1 , flags ) ;
2008-01-25 23:17:44 +03:00
status = rpccli_netr_DsRGetDCNameEx ( cli , mem_ctx ,
server_name ,
domain_name ,
& domain_guid ,
site_name ,
flags ,
& info ,
& result ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return ntstatus_to_werror ( status ) ;
}
2007-05-25 03:11:11 +04:00
2008-01-25 23:17:44 +03:00
if ( ! W_ERROR_IS_OK ( result ) ) {
return result ;
2007-05-25 03:11:11 +04:00
}
2008-01-25 23:17:44 +03:00
d_printf ( " DsRGetDCNameEx gave %s \n " ,
NDR_PRINT_STRUCT_STRING ( mem_ctx , netr_DsRGetDCNameInfo , info ) ) ;
2007-05-25 03:11:11 +04:00
return result ;
}
static WERROR cmd_netlogon_dsr_getdcnameex2 ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
{
WERROR result ;
2008-01-25 23:17:44 +03:00
NTSTATUS status ;
uint32_t flags = DS_RETURN_DNS_NAME ;
2007-05-25 03:11:11 +04:00
const char * server_name = cli - > cli - > desthost ;
2007-05-29 21:57:52 +04:00
const char * domain_name = NULL ;
2007-05-25 03:11:11 +04:00
const char * client_account = NULL ;
2008-01-25 23:17:44 +03:00
uint32_t mask = 0 ;
2007-05-25 03:11:11 +04:00
const char * site_name = NULL ;
struct GUID domain_guid = GUID_zero ( ) ;
2008-01-25 23:17:44 +03:00
struct netr_DsRGetDCNameInfo * info = NULL ;
2007-05-25 03:11:11 +04:00
if ( argc < 2 ) {
2007-08-28 19:01:23 +04:00
fprintf ( stderr , " Usage: %s [client_account] [acb_mask] "
" [domain_name] [domain_guid] [site_name] "
" [flags] \n " , argv [ 0 ] ) ;
2007-05-25 03:11:11 +04:00
return WERR_OK ;
}
2008-01-25 23:17:44 +03:00
if ( argc > = 2 ) {
2007-05-25 03:11:11 +04:00
client_account = argv [ 1 ] ;
2008-01-25 23:17:44 +03:00
}
2007-05-25 03:11:11 +04:00
2008-01-25 23:17:44 +03:00
if ( argc > = 3 ) {
2007-05-25 03:11:11 +04:00
mask = atoi ( argv [ 2 ] ) ;
2008-01-25 23:17:44 +03:00
}
2007-08-28 19:01:23 +04:00
2008-01-25 23:17:44 +03:00
if ( argc > = 4 ) {
2007-05-25 03:11:11 +04:00
domain_name = argv [ 3 ] ;
2008-01-25 23:17:44 +03:00
}
2007-05-25 03:11:11 +04:00
if ( argc > = 5 ) {
if ( ! NT_STATUS_IS_OK ( GUID_from_string ( argv [ 4 ] , & domain_guid ) ) ) {
return WERR_NOMEM ;
}
}
2008-01-25 23:17:44 +03:00
if ( argc > = 6 ) {
2007-05-25 03:11:11 +04:00
site_name = argv [ 5 ] ;
2008-01-25 23:17:44 +03:00
}
2007-05-25 03:11:11 +04:00
2008-01-25 23:17:44 +03:00
if ( argc > = 7 ) {
2007-05-25 03:11:11 +04:00
sscanf ( argv [ 6 ] , " %x " , & flags ) ;
2008-01-25 23:17:44 +03:00
}
2007-05-25 03:11:11 +04:00
2007-08-28 19:01:23 +04:00
debug_dsdcinfo_flags ( 1 , flags ) ;
2008-01-25 23:17:44 +03:00
status = rpccli_netr_DsRGetDCNameEx2 ( cli , mem_ctx ,
server_name ,
client_account ,
mask ,
domain_name ,
& domain_guid ,
site_name ,
flags ,
& info ,
& result ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return ntstatus_to_werror ( status ) ;
}
2007-05-25 03:11:11 +04:00
2008-01-25 23:17:44 +03:00
if ( ! W_ERROR_IS_OK ( result ) ) {
return result ;
2007-05-25 03:11:11 +04:00
}
2008-01-25 23:17:44 +03:00
d_printf ( " DsRGetDCNameEx2 gave %s \n " ,
NDR_PRINT_STRUCT_STRING ( mem_ctx , netr_DsRGetDCNameInfo , info ) ) ;
2005-11-13 14:38:17 +03:00
return result ;
}
2007-05-25 03:11:11 +04:00
2005-11-22 17:10:49 +03:00
static WERROR cmd_netlogon_dsr_getsitename ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
{
2008-02-07 12:39:08 +03:00
WERROR werr ;
NTSTATUS status ;
const char * sitename = NULL ;
2005-11-22 17:10:49 +03:00
if ( argc ! = 2 ) {
fprintf ( stderr , " Usage: %s computername \n " , argv [ 0 ] ) ;
return WERR_OK ;
}
2008-02-07 12:39:08 +03:00
status = rpccli_netr_DsRGetSiteName ( cli , mem_ctx ,
argv [ 1 ] ,
& sitename ,
& werr ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return ntstatus_to_werror ( status ) ;
}
2005-11-22 17:10:49 +03:00
2008-02-07 12:39:08 +03:00
if ( ! W_ERROR_IS_OK ( werr ) ) {
2005-11-22 17:10:49 +03:00
printf ( " rpccli_netlogon_dsr_gesitename returned %s \n " ,
2008-02-07 12:39:08 +03:00
nt_errstr ( werror_to_ntstatus ( werr ) ) ) ;
return werr ;
2005-11-22 17:10:49 +03:00
}
printf ( " Computer %s is on Site: %s \n " , argv [ 1 ] , sitename ) ;
return WERR_OK ;
}
2008-01-31 01:43:57 +03:00
static WERROR cmd_netlogon_logon_ctrl ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
2001-05-24 12:10:50 +04:00
{
2008-01-31 01:43:57 +03:00
NTSTATUS status = NT_STATUS_UNSUCCESSFUL ;
WERROR werr ;
const char * logon_server = cli - > cli - > desthost ;
enum netr_LogonControlCode function_code = 1 ;
uint32_t level = 1 ;
union netr_CONTROL_QUERY_INFORMATION info ;
if ( argc > 4 ) {
fprintf ( stderr , " Usage: %s <logon_server> <function_code> "
" <level> \n " , argv [ 0 ] ) ;
return WERR_OK ;
}
2001-05-24 12:10:50 +04:00
2008-01-31 01:43:57 +03:00
if ( argc > = 2 ) {
logon_server = argv [ 1 ] ;
2001-05-24 12:10:50 +04:00
}
2008-01-31 01:43:57 +03:00
if ( argc > = 3 ) {
function_code = atoi ( argv [ 2 ] ) ;
}
if ( argc > = 4 ) {
level = atoi ( argv [ 3 ] ) ;
}
status = rpccli_netr_LogonControl ( cli , mem_ctx ,
logon_server ,
function_code ,
level ,
& info ,
& werr ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
return ntstatus_to_werror ( status ) ;
}
if ( ! W_ERROR_IS_OK ( werr ) ) {
return werr ;
2001-05-24 12:10:50 +04:00
}
/* Display results */
2008-01-31 01:43:57 +03:00
return werr ;
2001-05-24 12:10:50 +04:00
}
2001-08-28 10:43:43 +04:00
/* Display sam synchronisation information */
2008-02-15 15:55:18 +03:00
static void display_sam_sync ( struct netr_DELTA_ENUM_ARRAY * r )
2001-08-28 10:43:43 +04:00
{
2008-02-15 15:55:18 +03:00
uint32_t i , j ;
for ( i = 0 ; i < r - > num_deltas ; i + + ) {
union netr_DELTA_UNION u = r - > delta_enum [ i ] . delta_union ;
union netr_DELTA_ID_UNION id = r - > delta_enum [ i ] . delta_id_union ;
switch ( r - > delta_enum [ i ] . delta_type ) {
case NETR_DELTA_DOMAIN :
printf ( " Domain: %s \n " ,
u . domain - > domain_name . string ) ;
break ;
case NETR_DELTA_GROUP :
printf ( " Group: %s \n " ,
u . group - > group_name . string ) ;
break ;
case NETR_DELTA_DELETE_GROUP :
printf ( " Delete Group: %d \n " ,
u . delete_account . unknown ) ;
break ;
case NETR_DELTA_RENAME_GROUP :
printf ( " Rename Group: %s -> %s \n " ,
u . rename_group - > OldName . string ,
u . rename_group - > NewName . string ) ;
break ;
case NETR_DELTA_USER :
printf ( " Account: %s \n " ,
u . user - > account_name . string ) ;
break ;
case NETR_DELTA_DELETE_USER :
printf ( " Delete User: %d \n " ,
id . rid ) ;
break ;
case NETR_DELTA_RENAME_USER :
printf ( " Rename user: %s -> %s \n " ,
u . rename_user - > OldName . string ,
u . rename_user - > NewName . string ) ;
break ;
case NETR_DELTA_GROUP_MEMBER :
for ( j = 0 ; j < u . group_member - > num_rids ; j + + ) {
printf ( " rid 0x%x, attrib 0x%08x \n " ,
u . group_member - > rids [ j ] ,
u . group_member - > attribs [ j ] ) ;
}
break ;
case NETR_DELTA_ALIAS :
printf ( " Alias: %s \n " ,
u . alias - > alias_name . string ) ;
break ;
case NETR_DELTA_DELETE_ALIAS :
printf ( " Delete Alias: %d \n " ,
r - > delta_enum [ i ] . delta_id_union . rid ) ;
break ;
case NETR_DELTA_RENAME_ALIAS :
printf ( " Rename alias: %s -> %s \n " ,
u . rename_alias - > OldName . string ,
u . rename_alias - > NewName . string ) ;
break ;
case NETR_DELTA_ALIAS_MEMBER :
for ( j = 0 ; j < u . alias_member - > sids . num_sids ; j + + ) {
fstring sid_str ;
sid_to_fstring ( sid_str ,
u . alias_member - > sids . sids [ j ] . sid ) ;
printf ( " %s \n " , sid_str ) ;
}
break ;
case NETR_DELTA_POLICY :
printf ( " Policy \n " ) ;
break ;
case NETR_DELTA_TRUSTED_DOMAIN :
printf ( " Trusted Domain: %s \n " ,
u . trusted_domain - > domain_name . string ) ;
break ;
case NETR_DELTA_DELETE_TRUST :
printf ( " Delete Trust: %d \n " ,
u . delete_trust . unknown ) ;
break ;
case NETR_DELTA_ACCOUNT :
printf ( " Account \n " ) ;
break ;
case NETR_DELTA_DELETE_ACCOUNT :
printf ( " Delete Account: %d \n " ,
u . delete_account . unknown ) ;
break ;
case NETR_DELTA_SECRET :
printf ( " Secret \n " ) ;
break ;
case NETR_DELTA_DELETE_SECRET :
printf ( " Delete Secret: %d \n " ,
u . delete_secret . unknown ) ;
break ;
case NETR_DELTA_DELETE_GROUP2 :
printf ( " Delete Group2: %s \n " ,
u . delete_group - > account_name ) ;
break ;
case NETR_DELTA_DELETE_USER2 :
printf ( " Delete User2: %s \n " ,
u . delete_user - > account_name ) ;
break ;
case NETR_DELTA_MODIFY_COUNT :
printf ( " sam sequence update: 0x%016llx \n " ,
( unsigned long long ) * u . modified_count ) ;
break ;
default :
printf ( " unknown delta type 0x%02x \n " ,
r - > delta_enum [ i ] . delta_type ) ;
break ;
}
}
2001-08-28 10:43:43 +04:00
}
/* Perform sam synchronisation */
2008-02-15 16:11:20 +03:00
static NTSTATUS cmd_netlogon_sam_sync ( struct rpc_pipe_client * cli ,
2001-10-12 09:56:23 +04:00
TALLOC_CTX * mem_ctx , int argc ,
2003-02-26 02:51:56 +03:00
const char * * argv )
2001-08-28 10:43:43 +04:00
{
2001-09-04 14:57:29 +04:00
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2008-02-15 16:11:20 +03:00
const char * logon_server = cli - > cli - > desthost ;
const char * computername = global_myname ( ) ;
struct netr_Authenticator credential ;
struct netr_Authenticator return_authenticator ;
enum netr_SamDatabaseID database_id = SAM_DATABASE_DOMAIN ;
uint16_t restart_state = 0 ;
uint32_t sync_context = 0 ;
2001-08-28 10:43:43 +04:00
if ( argc > 2 ) {
2001-10-12 09:56:23 +04:00
fprintf ( stderr , " Usage: %s [database_id] \n " , argv [ 0 ] ) ;
2001-09-04 14:57:29 +04:00
return NT_STATUS_OK ;
2001-08-28 10:43:43 +04:00
}
2008-02-15 16:11:20 +03:00
if ( argc = = 2 ) {
database_id = atoi ( argv [ 1 ] ) ;
}
2001-08-28 10:43:43 +04:00
2008-02-15 16:11:20 +03:00
/* Synchronise sam database */
2001-08-28 10:43:43 +04:00
2008-02-15 16:11:20 +03:00
do {
struct netr_DELTA_ENUM_ARRAY * delta_enum_array = NULL ;
2001-10-12 09:56:23 +04:00
2008-02-15 16:11:20 +03:00
netlogon_creds_client_step ( cli - > dc , & credential ) ;
2001-08-28 10:43:43 +04:00
2008-02-15 16:11:20 +03:00
result = rpccli_netr_DatabaseSync2 ( cli , mem_ctx ,
logon_server ,
computername ,
& credential ,
& return_authenticator ,
database_id ,
restart_state ,
& sync_context ,
& delta_enum_array ,
0xffff ) ;
2001-08-28 10:43:43 +04:00
2008-02-15 16:11:20 +03:00
/* Check returned credentials. */
if ( ! netlogon_creds_client_check ( cli - > dc ,
& return_authenticator . cred ) ) {
DEBUG ( 0 , ( " credentials chain check failed \n " ) ) ;
return NT_STATUS_ACCESS_DENIED ;
}
2001-08-28 10:43:43 +04:00
2008-02-15 16:11:20 +03:00
if ( NT_STATUS_IS_ERR ( result ) ) {
break ;
}
/* Display results */
display_sam_sync ( delta_enum_array ) ;
TALLOC_FREE ( delta_enum_array ) ;
} while ( NT_STATUS_EQUAL ( result , STATUS_MORE_ENTRIES ) ) ;
return result ;
2001-08-28 10:43:43 +04:00
}
/* Perform sam delta synchronisation */
2008-02-15 15:55:18 +03:00
static NTSTATUS cmd_netlogon_sam_deltas ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
2001-08-28 10:43:43 +04:00
{
2001-09-04 14:57:29 +04:00
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
2008-02-15 15:55:18 +03:00
uint32_t tmp ;
const char * logon_server = cli - > cli - > desthost ;
const char * computername = global_myname ( ) ;
struct netr_Authenticator credential ;
struct netr_Authenticator return_authenticator ;
enum netr_SamDatabaseID database_id = SAM_DATABASE_DOMAIN ;
uint64_t sequence_num ;
if ( argc ! = 3 ) {
fprintf ( stderr , " Usage: %s database_id seqnum \n " , argv [ 0 ] ) ;
return NT_STATUS_OK ;
}
database_id = atoi ( argv [ 1 ] ) ;
tmp = atoi ( argv [ 2 ] ) ;
sequence_num = tmp & 0xffff ;
do {
struct netr_DELTA_ENUM_ARRAY * delta_enum_array = NULL ;
netlogon_creds_client_step ( cli - > dc , & credential ) ;
result = rpccli_netr_DatabaseDeltas ( cli , mem_ctx ,
logon_server ,
computername ,
& credential ,
& return_authenticator ,
database_id ,
& sequence_num ,
& delta_enum_array ,
0xffff ) ;
/* Check returned credentials. */
if ( ! netlogon_creds_client_check ( cli - > dc ,
& return_authenticator . cred ) ) {
DEBUG ( 0 , ( " credentials chain check failed \n " ) ) ;
return NT_STATUS_ACCESS_DENIED ;
}
2001-08-28 10:43:43 +04:00
2008-02-15 15:55:18 +03:00
if ( NT_STATUS_IS_ERR ( result ) ) {
break ;
}
2001-08-28 10:43:43 +04:00
2008-02-15 15:55:18 +03:00
/* Display results */
2001-08-28 10:43:43 +04:00
2008-02-15 15:55:18 +03:00
display_sam_sync ( delta_enum_array ) ;
2001-10-12 09:56:23 +04:00
2008-02-15 15:55:18 +03:00
TALLOC_FREE ( delta_enum_array ) ;
2001-08-28 10:43:43 +04:00
2008-02-15 15:55:18 +03:00
} while ( NT_STATUS_EQUAL ( result , STATUS_MORE_ENTRIES ) ) ;
2001-08-28 10:43:43 +04:00
return result ;
}
2001-10-30 04:49:44 +03:00
/* Log on a domain user */
2005-09-30 21:13:37 +04:00
static NTSTATUS cmd_netlogon_sam_logon ( struct rpc_pipe_client * cli ,
2006-03-17 01:54:07 +03:00
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
2001-10-30 04:49:44 +03:00
{
2006-03-17 01:54:07 +03:00
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
int logon_type = NET_LOGON_TYPE ;
const char * username , * password ;
2002-09-25 19:19:00 +04:00
int auth_level = 2 ;
2006-03-17 01:54:07 +03:00
uint32 logon_param = 0 ;
2007-01-23 13:51:35 +03:00
const char * workstation = NULL ;
2001-10-30 04:49:44 +03:00
2006-03-17 01:54:07 +03:00
/* Check arguments */
2001-10-30 04:49:44 +03:00
2007-02-09 08:16:25 +03:00
if ( argc < 3 | | argc > 7 ) {
2007-01-23 13:51:35 +03:00
fprintf ( stderr , " Usage: samlogon <username> <password> [workstation] "
2006-03-17 01:54:07 +03:00
" [logon_type (1 or 2)] [auth level (2 or 3)] [logon_parameter] \n " ) ;
return NT_STATUS_OK ;
}
2001-10-30 04:49:44 +03:00
2006-03-17 01:54:07 +03:00
username = argv [ 1 ] ;
password = argv [ 2 ] ;
2001-10-30 04:49:44 +03:00
2007-01-23 13:51:35 +03:00
if ( argc > = 4 )
workstation = argv [ 3 ] ;
2001-10-30 04:49:44 +03:00
2004-07-26 14:08:03 +04:00
if ( argc > = 5 )
2007-01-23 13:51:35 +03:00
sscanf ( argv [ 4 ] , " %i " , & logon_type ) ;
2002-09-25 19:19:00 +04:00
2007-01-23 13:51:35 +03:00
if ( argc > = 6 )
sscanf ( argv [ 5 ] , " %i " , & auth_level ) ;
if ( argc = = 7 )
sscanf ( argv [ 6 ] , " %x " , & logon_param ) ;
2002-09-25 19:19:00 +04:00
2006-03-17 01:54:07 +03:00
/* Perform the sam logon */
2001-10-30 04:49:44 +03:00
2007-01-23 13:51:35 +03:00
result = rpccli_netlogon_sam_logon ( cli , mem_ctx , logon_param , lp_workgroup ( ) , username , password , workstation , logon_type ) ;
2003-05-08 12:02:52 +04:00
2001-10-30 04:49:44 +03:00
if ( ! NT_STATUS_IS_OK ( result ) )
goto done ;
done :
2006-03-17 01:54:07 +03:00
return result ;
2001-10-30 04:49:44 +03:00
}
2003-08-20 00:39:32 +04:00
/* Change the trust account password */
2005-09-30 21:13:37 +04:00
static NTSTATUS cmd_netlogon_change_trust_pw ( struct rpc_pipe_client * cli ,
2003-08-20 00:39:32 +04:00
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
{
NTSTATUS result = NT_STATUS_UNSUCCESSFUL ;
/* Check arguments */
if ( argc > 1 ) {
fprintf ( stderr , " Usage: change_trust_pw " ) ;
return NT_STATUS_OK ;
}
/* Perform the sam logon */
result = trust_pw_find_change_and_store_it ( cli , mem_ctx ,
lp_workgroup ( ) ) ;
if ( ! NT_STATUS_IS_OK ( result ) )
goto done ;
done :
return result ;
}
2008-01-25 01:38:43 +03:00
static WERROR cmd_netlogon_gettrustrid ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
{
NTSTATUS status = NT_STATUS_UNSUCCESSFUL ;
WERROR werr = WERR_GENERAL_FAILURE ;
const char * server_name = cli - > cli - > desthost ;
const char * domain_name = lp_workgroup ( ) ;
uint32_t rid = 0 ;
if ( argc < 1 | | argc > 3 ) {
fprintf ( stderr , " Usage: %s <server_name> <domain_name> \n " ,
argv [ 0 ] ) ;
return WERR_OK ;
}
if ( argc > = 2 ) {
server_name = argv [ 1 ] ;
}
if ( argc > = 3 ) {
domain_name = argv [ 2 ] ;
}
status = rpccli_netr_LogonGetTrustRid ( cli , mem_ctx ,
server_name ,
domain_name ,
& rid ,
& werr ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto done ;
}
if ( W_ERROR_IS_OK ( werr ) ) {
printf ( " Rid: %d \n " , rid ) ;
}
done :
return werr ;
}
2008-01-25 18:35:09 +03:00
static WERROR cmd_netlogon_dsr_enumtrustdom ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
{
NTSTATUS status = NT_STATUS_UNSUCCESSFUL ;
WERROR werr = WERR_GENERAL_FAILURE ;
const char * server_name = cli - > cli - > desthost ;
uint32_t trust_flags = NETR_TRUST_FLAG_IN_FOREST ;
struct netr_DomainTrustList trusts ;
if ( argc < 1 | | argc > 3 ) {
fprintf ( stderr , " Usage: %s <server_name> <trust_flags> \n " ,
argv [ 0 ] ) ;
return WERR_OK ;
}
if ( argc > = 2 ) {
server_name = argv [ 1 ] ;
}
if ( argc > = 3 ) {
sscanf ( argv [ 2 ] , " %x " , & trust_flags ) ;
}
status = rpccli_netr_DsrEnumerateDomainTrusts ( cli , mem_ctx ,
server_name ,
trust_flags ,
& trusts ,
& werr ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto done ;
}
if ( W_ERROR_IS_OK ( werr ) ) {
int i ;
printf ( " %d domains returned \n " , trusts . count ) ;
for ( i = 0 ; i < trusts . count ; i + + ) {
printf ( " %s (%s) \n " ,
trusts . array [ i ] . dns_name ,
trusts . array [ i ] . netbios_name ) ;
}
}
done :
return werr ;
}
2008-01-25 01:38:43 +03:00
2008-01-25 23:17:44 +03:00
static WERROR cmd_netlogon_deregisterdnsrecords ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
{
NTSTATUS status = NT_STATUS_UNSUCCESSFUL ;
WERROR werr = WERR_GENERAL_FAILURE ;
const char * server_name = cli - > cli - > desthost ;
const char * domain = lp_workgroup ( ) ;
const char * dns_host = NULL ;
if ( argc < 1 | | argc > 4 ) {
fprintf ( stderr , " Usage: %s <server_name> <domain_name> "
" <dns_host> \n " , argv [ 0 ] ) ;
return WERR_OK ;
}
if ( argc > = 2 ) {
server_name = argv [ 1 ] ;
}
if ( argc > = 3 ) {
domain = argv [ 2 ] ;
}
if ( argc > = 4 ) {
dns_host = argv [ 3 ] ;
}
status = rpccli_netr_DsrDeregisterDNSHostRecords ( cli , mem_ctx ,
server_name ,
domain ,
NULL ,
NULL ,
dns_host ,
& werr ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto done ;
}
if ( W_ERROR_IS_OK ( werr ) ) {
printf ( " success \n " ) ;
}
done :
return werr ;
}
2003-08-20 00:39:32 +04:00
2008-01-25 23:21:33 +03:00
static WERROR cmd_netlogon_dsr_getforesttrustinfo ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
{
NTSTATUS status = NT_STATUS_UNSUCCESSFUL ;
WERROR werr = WERR_GENERAL_FAILURE ;
const char * server_name = cli - > cli - > desthost ;
const char * trusted_domain_name = NULL ;
struct lsa_ForestTrustInformation * info = NULL ;
uint32_t flags = 0 ;
if ( argc < 1 | | argc > 4 ) {
fprintf ( stderr , " Usage: %s <server_name> <trusted_domain_name> "
" <flags> \n " , argv [ 0 ] ) ;
return WERR_OK ;
}
if ( argc > = 2 ) {
server_name = argv [ 1 ] ;
}
if ( argc > = 3 ) {
trusted_domain_name = argv [ 2 ] ;
}
if ( argc > = 4 ) {
sscanf ( argv [ 3 ] , " %x " , & flags ) ;
}
status = rpccli_netr_DsRGetForestTrustInformation ( cli , mem_ctx ,
server_name ,
trusted_domain_name ,
flags ,
& info ,
& werr ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto done ;
}
if ( W_ERROR_IS_OK ( werr ) ) {
printf ( " success \n " ) ;
}
done :
return werr ;
}
2008-01-30 04:08:23 +03:00
static WERROR cmd_netlogon_enumtrusteddomains ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
{
NTSTATUS status = NT_STATUS_UNSUCCESSFUL ;
WERROR werr = WERR_GENERAL_FAILURE ;
const char * server_name = cli - > cli - > desthost ;
struct netr_Blob blob ;
if ( argc < 1 | | argc > 3 ) {
fprintf ( stderr , " Usage: %s <server_name> \n " , argv [ 0 ] ) ;
return WERR_OK ;
}
if ( argc > = 2 ) {
server_name = argv [ 1 ] ;
}
status = rpccli_netr_NetrEnumerateTrustedDomains ( cli , mem_ctx ,
server_name ,
& blob ,
& werr ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto done ;
}
if ( W_ERROR_IS_OK ( werr ) ) {
printf ( " success \n " ) ;
dump_data ( 1 , blob . data , blob . length ) ;
}
done :
return werr ;
}
static WERROR cmd_netlogon_enumtrusteddomainsex ( struct rpc_pipe_client * cli ,
TALLOC_CTX * mem_ctx , int argc ,
const char * * argv )
{
NTSTATUS status = NT_STATUS_UNSUCCESSFUL ;
WERROR werr = WERR_GENERAL_FAILURE ;
const char * server_name = cli - > cli - > desthost ;
struct netr_DomainTrustList list ;
if ( argc < 1 | | argc > 3 ) {
fprintf ( stderr , " Usage: %s <server_name> \n " , argv [ 0 ] ) ;
return WERR_OK ;
}
if ( argc > = 2 ) {
server_name = argv [ 1 ] ;
}
status = rpccli_netr_NetrEnumerateTrustedDomainsEx ( cli , mem_ctx ,
server_name ,
& list ,
& werr ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto done ;
}
if ( W_ERROR_IS_OK ( werr ) ) {
printf ( " success \n " ) ;
}
done :
return werr ;
}
2001-05-24 04:20:32 +04:00
/* List of commands exported by this module */
1999-03-12 08:47:06 +03:00
2001-05-24 04:20:32 +04:00
struct cmd_set netlogon_commands [ ] = {
2001-07-20 08:38:58 +04:00
{ " NETLOGON " } ,
2008-02-14 00:54:43 +03:00
{ " logonctrl2 " , RPC_RTYPE_WERROR , NULL , cmd_netlogon_logon_ctrl2 , PI_NETLOGON , NULL , " Logon Control 2 " , " " } ,
2006-10-07 09:26:21 +04:00
{ " getanydcname " , RPC_RTYPE_WERROR , NULL , cmd_netlogon_getanydcname , PI_NETLOGON , NULL , " Get trusted DC name " , " " } ,
2007-06-08 14:29:46 +04:00
{ " getdcname " , RPC_RTYPE_WERROR , NULL , cmd_netlogon_getdcname , PI_NETLOGON , NULL , " Get trusted PDC name " , " " } ,
2005-11-13 14:38:17 +03:00
{ " dsr_getdcname " , RPC_RTYPE_WERROR , NULL , cmd_netlogon_dsr_getdcname , PI_NETLOGON , NULL , " Get trusted DC name " , " " } ,
2007-05-25 03:11:11 +04:00
{ " dsr_getdcnameex " , RPC_RTYPE_WERROR , NULL , cmd_netlogon_dsr_getdcnameex , PI_NETLOGON , NULL , " Get trusted DC name " , " " } ,
{ " dsr_getdcnameex2 " , RPC_RTYPE_WERROR , NULL , cmd_netlogon_dsr_getdcnameex2 , PI_NETLOGON , NULL , " Get trusted DC name " , " " } ,
2005-11-22 17:10:49 +03:00
{ " dsr_getsitename " , RPC_RTYPE_WERROR , NULL , cmd_netlogon_dsr_getsitename , PI_NETLOGON , NULL , " Get sitename " , " " } ,
2008-01-25 23:21:33 +03:00
{ " dsr_getforesttrustinfo " , RPC_RTYPE_WERROR , NULL , cmd_netlogon_dsr_getforesttrustinfo , PI_NETLOGON , NULL , " Get Forest Trust Info " , " " } ,
2008-01-31 01:43:57 +03:00
{ " logonctrl " , RPC_RTYPE_WERROR , NULL , cmd_netlogon_logon_ctrl , PI_NETLOGON , NULL , " Logon Control " , " " } ,
2005-09-30 21:13:37 +04:00
{ " samsync " , RPC_RTYPE_NTSTATUS , cmd_netlogon_sam_sync , NULL , PI_NETLOGON , NULL , " Sam Synchronisation " , " " } ,
{ " samdeltas " , RPC_RTYPE_NTSTATUS , cmd_netlogon_sam_deltas , NULL , PI_NETLOGON , NULL , " Query Sam Deltas " , " " } ,
{ " samlogon " , RPC_RTYPE_NTSTATUS , cmd_netlogon_sam_logon , NULL , PI_NETLOGON , NULL , " Sam Logon " , " " } ,
{ " change_trust_pw " , RPC_RTYPE_NTSTATUS , cmd_netlogon_change_trust_pw , NULL , PI_NETLOGON , NULL , " Change Trust Account Password " , " " } ,
2008-01-25 01:38:43 +03:00
{ " gettrustrid " , RPC_RTYPE_WERROR , NULL , cmd_netlogon_gettrustrid , PI_NETLOGON , NULL , " Get trust rid " , " " } ,
2008-01-25 18:35:09 +03:00
{ " dsr_enumtrustdom " , RPC_RTYPE_WERROR , NULL , cmd_netlogon_dsr_enumtrustdom , PI_NETLOGON , NULL , " Enumerate trusted domains " , " " } ,
2008-01-29 17:05:56 +03:00
{ " dsenumdomtrusts " , RPC_RTYPE_WERROR , NULL , cmd_netlogon_dsr_enumtrustdom , PI_NETLOGON , NULL , " Enumerate all trusted domains in an AD forest " , " " } ,
2008-01-25 23:21:33 +03:00
{ " deregisterdnsrecords " , RPC_RTYPE_WERROR , NULL , cmd_netlogon_deregisterdnsrecords , PI_NETLOGON , NULL , " Deregister DNS records " , " " } ,
2008-01-30 04:08:23 +03:00
{ " netrenumtrusteddomains " , RPC_RTYPE_WERROR , NULL , cmd_netlogon_enumtrusteddomains , PI_NETLOGON , NULL , " Enumerate trusted domains " , " " } ,
{ " netrenumtrusteddomainsex " , RPC_RTYPE_WERROR , NULL , cmd_netlogon_enumtrusteddomainsex , PI_NETLOGON , NULL , " Enumerate trusted domains " , " " } ,
2001-07-20 08:38:58 +04:00
{ NULL }
2001-05-24 04:20:32 +04:00
} ;