1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-25 23:21:54 +03:00
samba-mirror/source3/utils/net_ads.c

392 lines
8.9 KiB
C
Raw Normal View History

/*
Samba Unix/Linux SMB client library
Version 3.0
net ads commands
Copyright (C) 2001 Andrew Tridgell (tridge@samba.org)
Copyright (C) 2001 Remus Koos (remuskoos@yahoo.com)
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#include "includes.h"
#ifdef HAVE_ADS
int net_ads_usage(int argc, const char **argv)
{
d_printf(
"\nnet ads join <org_unit>"\
"\n\tjoins the local machine to a ADS realm\n"\
"\nnet ads leave"\
"\n\tremoves the local machine from a ADS realm\n"\
"\nnet ads user"\
"\n\tlist users in the realm\n"\
"\nnet ads group"\
"\n\tlist groups in the realm\n"\
"\nnet ads info"\
"\n\tshows some info on the server\n"\
"\nnet ads status"\
"\n\tdump the machine account details to stdout\n"
"\nnet ads password <username@realm> -Uadmin_username@realm%%admin_pass"\
"\n\tchange a user's password using an admin account"
"\n\t(note: use realm in UPPERCASE)\n"
"\nnet ads chostpass"
"\n\tchange the trust account password of this machine in the AD tree\n"
);
return -1;
}
static int net_ads_info(int argc, const char **argv)
{
ADS_STRUCT *ads;
ads = ads_init(NULL, NULL, NULL, NULL);
ads_connect(ads);
if (!ads) {
d_printf("Didn't find the ldap server!\n");
return -1;
}
d_printf("LDAP server: %s\n", ads->ldap_server);
d_printf("LDAP server name: %s\n", ads->ldap_server_name);
d_printf("Realm: %s\n", ads->realm);
d_printf("Bind Path: %s\n", ads->bind_path);
d_printf("LDAP port: %d\n", ads->ldap_port);
return 0;
}
static ADS_STRUCT *ads_startup(void)
{
ADS_STRUCT *ads;
ADS_STATUS status;
extern char *opt_password;
extern char *opt_user_name;
ads = ads_init(NULL, NULL, NULL, NULL);
if (!opt_user_name) {
opt_user_name = "administrator";
}
if (!opt_password) {
char *prompt;
asprintf(&prompt,"%s password: ", opt_user_name);
opt_password = getpass(prompt);
free(prompt);
}
ads->password = strdup(opt_password);
ads->user_name = strdup(opt_user_name);
status = ads_connect(ads);
if (!ADS_ERR_OK(status)) {
d_printf("ads_connect: %s\n", ads_errstr(status));
return NULL;
}
return ads;
}
static int net_ads_user(int argc, const char **argv)
{
ADS_STRUCT *ads;
ADS_STATUS rc;
void *res;
const char *attrs[] = {"sAMAccountName", "name", "objectSid", NULL};
if (!(ads = ads_startup())) return -1;
rc = ads_search(ads, &res, "(objectclass=user)", attrs);
if (!ADS_ERR_OK(rc)) {
d_printf("ads_search: %s\n", ads_errstr(rc));
return -1;
}
if (ads_count_replies(ads, res) == 0) {
d_printf("No users found\n");
return -1;
}
ads_dump(ads, res);
ads_destroy(&ads);
return 0;
}
static int net_ads_group(int argc, const char **argv)
{
ADS_STRUCT *ads;
ADS_STATUS rc;
void *res;
const char *attrs[] = {"sAMAccountName", "name", "objectSid", NULL};
if (!(ads = ads_startup())) return -1;
rc = ads_search(ads, &res, "(objectclass=group)", attrs);
if (!ADS_ERR_OK(rc)) {
d_printf("ads_search: %s\n", ads_errstr(rc));
return -1;
}
if (ads_count_replies(ads, res) == 0) {
d_printf("No groups found\n");
return -1;
}
ads_dump(ads, res);
return 0;
}
static int net_ads_status(int argc, const char **argv)
{
ADS_STRUCT *ads;
ADS_STATUS rc;
extern pstring global_myname;
void *res;
if (!(ads = ads_startup())) return -1;
rc = ads_find_machine_acct(ads, &res, global_myname);
if (!ADS_ERR_OK(rc)) {
d_printf("ads_find_machine_acct: %s\n", ads_errstr(rc));
return -1;
}
if (ads_count_replies(ads, res) == 0) {
d_printf("No machine account for '%s' found\n", global_myname);
return -1;
}
ads_dump(ads, res);
return 0;
}
static int net_ads_leave(int argc, const char **argv)
{
ADS_STRUCT *ads = NULL;
ADS_STATUS rc;
extern pstring global_myname;
if (!(ads = ads_startup())) {
return -1;
}
if (!secrets_init()) {
DEBUG(1,("Failed to initialise secrets database\n"));
return -1;
}
rc = ads_leave_realm(ads, global_myname);
if (!ADS_ERR_OK(rc)) {
d_printf("Failed to delete host '%s' from the '%s' realm.\n",
global_myname, ads->realm);
return -1;
}
d_printf("Removed '%s' from realm '%s'\n", global_myname, ads->realm);
return 0;
}
static int net_ads_join(int argc, const char **argv)
{
ADS_STRUCT *ads;
ADS_STATUS rc;
char *password;
char *tmp_password;
extern pstring global_myname;
const char *org_unit = "Computers";
char *dn;
void *res;
DOM_SID dom_sid;
if (argc > 0) org_unit = argv[0];
if (!secrets_init()) {
DEBUG(1,("Failed to initialise secrets database\n"));
return -1;
}
tmp_password = generate_random_str(DEFAULT_TRUST_ACCOUNT_PASSWORD_LENGTH);
password = strdup(tmp_password);
if (!(ads = ads_startup())) return -1;
asprintf(&dn, "cn=%s,%s", org_unit, ads->bind_path);
rc = ads_search_dn(ads, &res, dn, NULL);
free(dn);
ads_msgfree(ads, res);
if (rc.error_type == ADS_ERROR_LDAP && rc.rc == LDAP_NO_SUCH_OBJECT) {
d_printf("ads_join_realm: organisational unit %s does not exist\n", org_unit);
return -1;
}
if (!ADS_ERR_OK(rc)) {
d_printf("ads_join_realm: %s\n", ads_errstr(rc));
return -1;
}
rc = ads_join_realm(ads, global_myname, org_unit);
if (!ADS_ERR_OK(rc)) {
d_printf("ads_join_realm: %s\n", ads_errstr(rc));
return -1;
}
rc = ads_set_machine_password(ads, global_myname, password);
if (!ADS_ERR_OK(rc)) {
d_printf("ads_set_machine_password: %s\n", ads_errstr(rc));
return -1;
}
rc = ads_domain_sid(ads, &dom_sid);
if (!ADS_ERR_OK(rc)) {
d_printf("ads_domain_sid: %s\n", ads_errstr(rc));
return -1;
}
if (!secrets_store_domain_sid(lp_workgroup(), &dom_sid)) {
DEBUG(1,("Failed to save domain sid\n"));
return -1;
}
if (!secrets_store_machine_password(password)) {
DEBUG(1,("Failed to save machine password\n"));
return -1;
}
d_printf("Joined '%s' to realm '%s'\n", global_myname, ads->realm);
free(password);
return 0;
}
static int net_ads_password(int argc, const char **argv)
{
ADS_STRUCT *ads;
extern char *opt_user_name;
extern char *opt_password;
char *auth_principal = opt_user_name;
char *auth_password = opt_password;
char *realm = NULL;
char *new_password = NULL;
char *c;
char *prompt;
ADS_STATUS ret;
if ((argc != 1) || (opt_user_name == NULL) ||
(opt_password == NULL) || (strchr(opt_user_name, '@') == NULL) ||
(strchr(argv[0], '@') == NULL)) {
return net_ads_usage(argc, argv);
}
c = strchr(auth_principal, '@');
realm = ++c;
/* use the realm so we can eventually change passwords for users
in realms other than default */
if (!(ads = ads_init(realm, NULL, NULL, NULL))) return -1;
asprintf(&prompt, "Enter new password for %s:", argv[0]);
new_password = getpass(prompt);
ret = kerberos_set_password(ads->kdc_server, auth_principal,
auth_password, argv[0], new_password);
if (!ADS_ERR_OK(ret)) {
d_printf("Password change failed :-( ...\n");
ads_destroy(&ads);
free(prompt);
return -1;
}
d_printf("Password change for %s completed.\n", argv[0]);
ads_destroy(&ads);
free(prompt);
return 0;
}
static int net_ads_change_localhost_pass(int argc, const char **argv)
{
ADS_STRUCT *ads;
extern pstring global_myname;
char *host_principal;
char *hostname;
ADS_STATUS ret;
if (!(ads = ads_init(NULL, NULL, NULL, NULL))) return -1;
hostname = strdup(global_myname);
strlower(hostname);
asprintf(&host_principal, "%s@%s", hostname, ads->realm);
SAFE_FREE(hostname);
d_printf("Changing password for principal: HOST/%s\n", host_principal);
ret = ads_change_trust_account_password(ads, host_principal);
if (!ADS_ERR_OK(ret)) {
d_printf("Password change failed :-( ...\n");
ads_destroy(&ads);
SAFE_FREE(host_principal);
return -1;
}
d_printf("Password change for principal HOST/%s succeeded.\n", host_principal);
ads_destroy(&ads);
SAFE_FREE(host_principal);
return 0;
}
int net_ads(int argc, const char **argv)
{
struct functable func[] = {
{"INFO", net_ads_info},
{"JOIN", net_ads_join},
{"LEAVE", net_ads_leave},
{"STATUS", net_ads_status},
{"USER", net_ads_user},
{"GROUP", net_ads_group},
{"PASSWORD", net_ads_password},
{"CHOSTPASS", net_ads_change_localhost_pass},
{NULL, NULL}
};
return net_run_function(argc, argv, func, net_ads_usage);
}
#else
int net_ads_usage(int argc, const char **argv)
{
d_printf("ADS support not compiled in\n");
return -1;
}
int net_ads(int argc, const char **argv)
{
return net_ads_usage(argc, argv);
}
#endif