1998-03-12 00:11:04 +03:00
/*
* Unix SMB / Netbios implementation .
* Version 1.9 .
* RPC Pipe client / server routines
* Copyright ( C ) Andrew Tridgell 1992 - 1997 ,
* Copyright ( C ) Luke Kenneth Casson Leighton 1996 - 1997 ,
* Copyright ( C ) Paul Ashton 1997.
*
* This program is free software ; you can redistribute it and / or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation ; either version 2 of the License , or
* ( at your option ) any later version .
*
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU General Public License for more details .
*
* You should have received a copy of the GNU General Public License
* along with this program ; if not , write to the Free Software
* Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# ifdef SYSLOG
# undef SYSLOG
# endif
# include "includes.h"
extern int DEBUGLEVEL ;
/****************************************************************************
do a LSA Open Policy
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1998-09-26 01:01:52 +04:00
BOOL do_lsa_open_policy ( struct cli_state * cli ,
1998-09-30 23:09:57 +04:00
char * server_name , POLICY_HND * hnd ,
BOOL sec_qos )
1998-03-12 00:11:04 +03:00
{
prs_struct rbuf ;
prs_struct buf ;
LSA_Q_OPEN_POL q_o ;
1998-09-30 23:09:57 +04:00
LSA_SEC_QOS qos ;
BOOL valid_pol = False ;
1998-03-12 00:11:04 +03:00
if ( hnd = = NULL ) return False ;
prs_init ( & buf , 1024 , 4 , SAFETY_MARGIN , False ) ;
prs_init ( & rbuf , 0 , 4 , SAFETY_MARGIN , True ) ;
/* create and send a MSRPC command with api LSA_OPENPOLICY */
DEBUG ( 4 , ( " LSA Open Policy \n " ) ) ;
/* store the parameters */
1998-09-30 23:09:57 +04:00
if ( sec_qos )
{
make_lsa_sec_qos ( & qos , 2 , 1 , 0 , 0x20000000 ) ;
1998-10-16 03:51:07 +04:00
make_q_open_pol ( & q_o , 0x5c , 0 , 0 , & qos ) ;
1998-09-30 23:09:57 +04:00
}
else
{
1998-10-16 03:51:07 +04:00
make_q_open_pol ( & q_o , 0x5c , 0 , 0x1 , NULL ) ;
1998-09-30 23:09:57 +04:00
}
1998-03-12 00:11:04 +03:00
/* turn parameters into data stream */
lsa_io_q_open_pol ( " " , & q_o , & buf , 0 ) ;
/* send the data on \PIPE\ */
1998-09-26 01:01:52 +04:00
if ( rpc_api_pipe_req ( cli , LSA_OPENPOLICY , & buf , & rbuf ) )
1998-03-12 00:11:04 +03:00
{
LSA_R_OPEN_POL r_o ;
BOOL p ;
lsa_io_r_open_pol ( " " , & r_o , & rbuf , 0 ) ;
p = rbuf . offset ! = 0 ;
if ( p & & r_o . status ! = 0 )
{
/* report error code */
DEBUG ( 0 , ( " LSA_OPENPOLICY: %s \n " , get_nt_error_msg ( r_o . status ) ) ) ;
p = False ;
}
if ( p )
{
/* ok, at last: we're happy. return the policy handle */
memcpy ( hnd , r_o . pol . data , sizeof ( hnd - > data ) ) ;
valid_pol = True ;
}
}
prs_mem_free ( & rbuf ) ;
prs_mem_free ( & buf ) ;
return valid_pol ;
}
1998-09-30 23:09:57 +04:00
/****************************************************************************
do a LSA Lookup SIDs
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
BOOL do_lsa_lookup_sids ( struct cli_state * cli ,
POLICY_HND * hnd ,
int num_sids ,
DOM_SID * * sids ,
1998-11-11 17:23:55 +03:00
char * * * names ,
int * num_names )
1998-09-30 23:09:57 +04:00
{
prs_struct rbuf ;
prs_struct buf ;
LSA_Q_LOOKUP_SIDS q_l ;
BOOL valid_response = False ;
if ( hnd = = NULL | | num_sids = = 0 | | sids = = NULL ) return False ;
prs_init ( & buf , 1024 , 4 , SAFETY_MARGIN , False ) ;
prs_init ( & rbuf , 0 , 4 , SAFETY_MARGIN , True ) ;
/* create and send a MSRPC command with api LSA_LOOKUP_SIDS */
DEBUG ( 4 , ( " LSA Lookup SIDs \n " ) ) ;
/* store the parameters */
make_q_lookup_sids ( & q_l , hnd , num_sids , sids , 1 ) ;
/* turn parameters into data stream */
lsa_io_q_lookup_sids ( " " , & q_l , & buf , 0 ) ;
/* send the data on \PIPE\ */
if ( rpc_api_pipe_req ( cli , LSA_LOOKUPSIDS , & buf , & rbuf ) )
{
LSA_R_LOOKUP_SIDS r_l ;
DOM_R_REF ref ;
LSA_TRANS_NAME_ENUM t_names ;
BOOL p ;
r_l . dom_ref = & ref ;
r_l . names = & t_names ;
lsa_io_r_lookup_sids ( " " , & r_l , & rbuf , 0 ) ;
p = rbuf . offset ! = 0 ;
if ( p & & r_l . status ! = 0 )
{
/* report error code */
DEBUG ( 0 , ( " LSA_LOOKUP_SIDS: %s \n " , get_nt_error_msg ( r_l . status ) ) ) ;
p = False ;
}
if ( p )
{
1998-11-11 17:23:55 +03:00
if ( t_names . ptr_trans_names ! = 0 & & ref . undoc_buffer ! = 0 )
{
valid_response = True ;
}
}
if ( num_names ! = NULL & & valid_response )
{
( * num_names ) = t_names . num_entries ;
}
if ( valid_response )
{
int i ;
for ( i = 0 ; i < t_names . num_entries ; i + + )
{
if ( t_names . name [ i ] . domain_idx > = ref . num_ref_doms_1 )
{
DEBUG ( 0 , ( " LSA_LOOKUP_SIDS: domain index out of bounds \n " ) ) ;
valid_response = False ;
break ;
}
}
}
if ( names ! = NULL & & valid_response & & t_names . num_entries ! = 0 )
{
( * names ) = ( char * * ) malloc ( ( * num_names ) * sizeof ( char * ) ) ;
}
if ( names ! = NULL & & ( * names ) ! = NULL )
{
int i ;
/* take each name, construct a \DOMAIN\name string */
for ( i = 0 ; i < ( * num_names ) ; i + + )
{
fstring name ;
fstring dom_name ;
fstring full_name ;
uint32 dom_idx = t_names . name [ i ] . domain_idx ;
fstrcpy ( dom_name , unistr2 ( ref . ref_dom [ dom_idx ] . uni_dom_name . buffer ) ) ;
fstrcpy ( name , unistr2 ( t_names . uni_name [ i ] . buffer ) ) ;
- group database API. oops and oh dear, the threat has been carried out:
the pre-alpha "domain group" etc parameters have disappeared.
- interactive debug detection
- re-added mem_man (andrew's memory management, detects memory corruption)
- american spellings of "initialise" replaced with english spelling of
"initialise".
- started on "lookup_name()" and "lookup_sid()" functions. proper ones.
- moved lots of functions around. created some modules of commonly used
code. e.g the password file locking code, which is used in groupfile.c
and aliasfile.c and smbpass.c
- moved RID_TYPE_MASK up another bit. this is really unfortunate, but
there is no other "fast" way to identify users from groups from aliases.
i do not believe that this code saves us anything (the multipliers)
and puts us at a disadvantage (reduces the useable rid space).
the designers of NT aren't silly: if they can get away with a user-
interface-speed LsaLookupNames / LsaLookupSids, then so can we. i
spoke with isaac at the cifs conference, the only time for example that
they do a security context check is on file create. certainly not on
individual file reads / writes, which would drastically hit their
performance and ours, too.
- renamed myworkgroup to global_sam_name, amongst other things, when used
in the rpc code. there is also a global_member_name, as we are always
responsible for a SAM database, the scope of which is limited by the role
of the machine (e.g if a member of a workgroup, your SAM is for _local_
logins only, and its name is the name of your server. you even still
have a SID. see LsaQueryInfoPolicy, levels 3 and 5).
- updated functionality of groupname.c to be able to cope with names
like DOMAIN\group and SERVER\alias. used this code to be able to
do aliases as well as groups. this code may actually be better
off being used in username mapping, too.
- created a connect to serverlist function in clientgen.c and used it
in password.c
- initialisation in server.c depends on the role of the server. well,
it does now.
- rpctorture. smbtorture. EXERCISE EXTREME CAUTION.
(This used to be commit 0d21e1e6090b933f396c764af535ca3388a562db)
1998-11-17 19:19:04 +03:00
slprintf ( full_name , sizeof ( full_name ) , " \\ %s \\ %s " ,
1998-11-11 17:23:55 +03:00
dom_name , name ) ;
( * names ) [ i ] = strdup ( full_name ) ;
}
1998-09-30 23:09:57 +04:00
}
}
prs_mem_free ( & rbuf ) ;
prs_mem_free ( & buf ) ;
return valid_response ;
}
1998-03-12 00:11:04 +03:00
/****************************************************************************
do a LSA Query Info Policy
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1998-09-26 01:01:52 +04:00
BOOL do_lsa_query_info_pol ( struct cli_state * cli ,
1998-03-12 00:11:04 +03:00
POLICY_HND * hnd , uint16 info_class ,
1998-11-11 17:23:55 +03:00
fstring domain_name , DOM_SID * domain_sid )
1998-03-12 00:11:04 +03:00
{
prs_struct rbuf ;
prs_struct buf ;
LSA_Q_QUERY_INFO q_q ;
1998-09-30 23:09:57 +04:00
BOOL valid_response = False ;
1998-03-12 00:11:04 +03:00
1998-11-11 17:23:55 +03:00
ZERO_STRUCTP ( domain_sid ) ;
domain_name [ 0 ] = 0 ;
1998-03-12 00:11:04 +03:00
if ( hnd = = NULL | | domain_name = = NULL | | domain_sid = = NULL ) return False ;
prs_init ( & buf , 1024 , 4 , SAFETY_MARGIN , False ) ;
prs_init ( & rbuf , 0 , 4 , SAFETY_MARGIN , True ) ;
/* create and send a MSRPC command with api LSA_QUERYINFOPOLICY */
DEBUG ( 4 , ( " LSA Query Info Policy \n " ) ) ;
/* store the parameters */
make_q_query ( & q_q , hnd , info_class ) ;
/* turn parameters into data stream */
lsa_io_q_query ( " " , & q_q , & buf , 0 ) ;
/* send the data on \PIPE\ */
1998-09-26 01:01:52 +04:00
if ( rpc_api_pipe_req ( cli , LSA_QUERYINFOPOLICY , & buf , & rbuf ) )
1998-03-12 00:11:04 +03:00
{
LSA_R_QUERY_INFO r_q ;
BOOL p ;
lsa_io_r_query ( " " , & r_q , & rbuf , 0 ) ;
p = rbuf . offset ! = 0 ;
if ( p & & r_q . status ! = 0 )
{
/* report error code */
DEBUG ( 0 , ( " LSA_QUERYINFOPOLICY: %s \n " , get_nt_error_msg ( r_q . status ) ) ) ;
p = False ;
}
if ( p & & r_q . info_class ! = q_q . info_class )
{
/* report different info classes */
DEBUG ( 0 , ( " LSA_QUERYINFOPOLICY: error info_class (q,r) differ - (%x,%x) \n " ,
q_q . info_class , r_q . info_class ) ) ;
p = False ;
}
if ( p )
{
1998-11-11 17:23:55 +03:00
fstring sid_str ;
1998-03-12 00:11:04 +03:00
/* ok, at last: we're happy. */
switch ( r_q . info_class )
{
case 3 :
{
1998-11-11 17:23:55 +03:00
if ( r_q . dom . id3 . buffer_dom_name ! = 0 )
{
char * dom_name = unistrn2 ( r_q . dom . id3 . uni_domain_name . buffer ,
r_q . dom . id3 . uni_domain_name . uni_str_len ) ;
fstrcpy ( domain_name , dom_name ) ;
}
if ( r_q . dom . id3 . buffer_dom_sid ! = 0 )
{
* domain_sid = r_q . dom . id3 . dom_sid . sid ;
}
1998-03-12 00:11:04 +03:00
valid_response = True ;
break ;
}
case 5 :
{
1998-11-11 17:23:55 +03:00
if ( r_q . dom . id5 . buffer_dom_name ! = 0 )
{
char * dom_name = unistrn2 ( r_q . dom . id5 . uni_domain_name . buffer ,
r_q . dom . id5 . uni_domain_name . uni_str_len ) ;
fstrcpy ( domain_name , dom_name ) ;
}
if ( r_q . dom . id5 . buffer_dom_sid ! = 0 )
{
* domain_sid = r_q . dom . id5 . dom_sid . sid ;
}
1998-03-12 00:11:04 +03:00
valid_response = True ;
break ;
}
default :
{
DEBUG ( 3 , ( " LSA_QUERYINFOPOLICY: unknown info class \n " ) ) ;
domain_name [ 0 ] = 0 ;
break ;
}
}
1998-11-11 17:23:55 +03:00
sid_to_string ( sid_str , domain_sid ) ;
1998-03-12 00:11:04 +03:00
DEBUG ( 3 , ( " LSA_QUERYINFOPOLICY (level %x): domain:%s domain sid:%s \n " ,
1998-11-11 17:23:55 +03:00
r_q . info_class , domain_name , sid_str ) ) ;
1998-03-12 00:11:04 +03:00
}
}
prs_mem_free ( & rbuf ) ;
prs_mem_free ( & buf ) ;
return valid_response ;
}
/****************************************************************************
do a LSA Close
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1998-09-26 01:01:52 +04:00
BOOL do_lsa_close ( struct cli_state * cli , POLICY_HND * hnd )
1998-03-12 00:11:04 +03:00
{
prs_struct rbuf ;
prs_struct buf ;
LSA_Q_CLOSE q_c ;
BOOL valid_close = False ;
if ( hnd = = NULL ) return False ;
/* create and send a MSRPC command with api LSA_OPENPOLICY */
prs_init ( & buf , 1024 , 4 , SAFETY_MARGIN , False ) ;
prs_init ( & rbuf , 0 , 4 , SAFETY_MARGIN , True ) ;
DEBUG ( 4 , ( " LSA Close \n " ) ) ;
/* store the parameters */
make_lsa_q_close ( & q_c , hnd ) ;
/* turn parameters into data stream */
lsa_io_q_close ( " " , & q_c , & buf , 0 ) ;
/* send the data on \PIPE\ */
1998-09-26 01:01:52 +04:00
if ( rpc_api_pipe_req ( cli , LSA_CLOSE , & buf , & rbuf ) )
1998-03-12 00:11:04 +03:00
{
LSA_R_CLOSE r_c ;
BOOL p ;
lsa_io_r_close ( " " , & r_c , & rbuf , 0 ) ;
p = rbuf . offset ! = 0 ;
if ( p & & r_c . status ! = 0 )
{
/* report error code */
DEBUG ( 0 , ( " LSA_CLOSE: %s \n " , get_nt_error_msg ( r_c . status ) ) ) ;
p = False ;
}
if ( p )
{
/* check that the returned policy handle is all zeros */
int i ;
valid_close = True ;
for ( i = 0 ; i < sizeof ( r_c . pol . data ) ; i + + )
{
if ( r_c . pol . data [ i ] ! = 0 )
{
valid_close = False ;
break ;
}
}
if ( ! valid_close )
{
DEBUG ( 0 , ( " LSA_CLOSE: non-zero handle returned \n " ) ) ;
}
}
}
prs_mem_free ( & rbuf ) ;
prs_mem_free ( & buf ) ;
return valid_close ;
}
1998-09-26 01:01:52 +04:00