2000-05-09 15:43:00 +04:00
/*
2002-01-30 09:08:46 +03:00
Unix SMB / CIFS implementation .
2000-05-09 15:43:00 +04:00
Winbind daemon for ntdom nss module
2001-11-23 06:54:07 +03:00
Copyright ( C ) Tim Potter 2000 - 2001
Copyright ( C ) 2001 by Martin Pool < mbp @ samba . org >
2000-05-09 15:43:00 +04:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation ; either version 2 of the License , or
( at your option ) any later version .
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
You should have received a copy of the GNU General Public License
along with this program ; if not , write to the Free Software
Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
2003-11-12 04:51:10 +03:00
# include "includes.h"
2000-05-09 15:43:00 +04:00
# include "winbindd.h"
2002-07-15 14:35:28 +04:00
# undef DBGC_CLASS
# define DBGC_CLASS DBGC_WINBIND
2000-05-09 15:43:00 +04:00
2001-11-23 06:54:07 +03:00
/**
* @ file winbindd_util . c
*
* Winbind daemon for NT domain authentication nss module .
* */
/**
* Used to clobber name fields that have an undefined value .
*
* Correct code should never look at a field that has this value .
* */
2002-01-11 08:33:45 +03:00
2001-11-23 06:54:07 +03:00
static const fstring name_deadbeef = " <deadbeef> " ;
2002-01-11 08:33:45 +03:00
/* The list of trusted domains. Note that the list can be deleted and
recreated using the init_domain_list ( ) function so pointers to
individual winbindd_domain structures cannot be made . Keep a copy of
the domain name instead . */
2001-11-23 06:54:07 +03:00
2002-01-11 08:33:45 +03:00
static struct winbindd_domain * _domain_list ;
2001-11-21 12:59:15 +03:00
2002-01-11 08:33:45 +03:00
struct winbindd_domain * domain_list ( void )
2001-11-21 12:59:15 +03:00
{
2002-01-11 08:33:45 +03:00
/* Initialise list */
2001-11-21 12:59:15 +03:00
2003-12-31 03:31:43 +03:00
if ( ! _domain_list )
if ( ! init_domain_list ( ) )
return NULL ;
2001-11-21 12:59:15 +03:00
2002-01-11 08:33:45 +03:00
return _domain_list ;
2001-11-21 12:59:15 +03:00
}
2002-01-11 08:33:45 +03:00
/* Free all entries in the trusted domain list */
2001-11-21 12:59:15 +03:00
2002-01-11 08:33:45 +03:00
void free_domain_list ( void )
2001-11-21 12:59:15 +03:00
{
2002-01-11 08:33:45 +03:00
struct winbindd_domain * domain = _domain_list ;
while ( domain ) {
struct winbindd_domain * next = domain - > next ;
DLIST_REMOVE ( _domain_list , domain ) ;
SAFE_FREE ( domain ) ;
domain = next ;
2001-11-21 12:59:15 +03:00
}
}
2002-10-05 01:42:04 +04:00
2001-05-07 08:32:40 +04:00
/* Add a trusted domain to our list of domains */
2002-08-17 21:00:51 +04:00
static struct winbindd_domain * add_trusted_domain ( const char * domain_name , const char * alt_name ,
struct winbindd_methods * methods ,
DOM_SID * sid )
2000-05-09 15:43:00 +04:00
{
2002-01-10 09:20:03 +03:00
struct winbindd_domain * domain ;
2003-09-05 21:57:45 +04:00
const char * alternative_name = NULL ;
/* ignore alt_name if we are not in an AD domain */
if ( ( lp_security ( ) = = SEC_ADS ) & & alt_name & & * alt_name ) {
alternative_name = alt_name ;
}
2001-10-11 03:08:13 +04:00
2002-01-11 08:33:45 +03:00
/* We can't call domain_list() as this function is called from
init_domain_list ( ) and we ' ll get stuck in a loop . */
for ( domain = _domain_list ; domain ; domain = domain - > next ) {
2003-10-23 03:38:20 +04:00
if ( strequal ( domain_name , domain - > name ) | |
strequal ( domain_name , domain - > alt_name ) ) {
2002-01-10 09:20:03 +03:00
return domain ;
2001-11-22 11:31:50 +03:00
}
2003-09-05 21:57:45 +04:00
if ( alternative_name & & * alternative_name ) {
2003-10-23 03:38:20 +04:00
if ( strequal ( alternative_name , domain - > name ) | |
strequal ( alternative_name , domain - > alt_name ) ) {
2002-09-25 19:19:00 +04:00
return domain ;
}
}
2001-11-22 11:31:50 +03:00
}
2001-10-11 03:08:13 +04:00
2001-11-22 11:31:50 +03:00
/* Create new domain entry */
2002-01-10 09:20:03 +03:00
if ( ( domain = ( struct winbindd_domain * )
malloc ( sizeof ( * domain ) ) ) = = NULL )
2001-11-22 11:31:50 +03:00
return NULL ;
2000-05-09 15:43:00 +04:00
2001-11-22 11:31:50 +03:00
/* Fill in fields */
2001-10-11 03:08:13 +04:00
2001-11-22 11:31:50 +03:00
ZERO_STRUCTP ( domain ) ;
2002-01-10 09:20:03 +03:00
2002-08-17 21:00:51 +04:00
/* prioritise the short name */
2003-09-05 21:57:45 +04:00
if ( strchr_m ( domain_name , ' . ' ) & & alternative_name & & * alternative_name ) {
fstrcpy ( domain - > name , alternative_name ) ;
2002-08-17 21:00:51 +04:00
fstrcpy ( domain - > alt_name , domain_name ) ;
} else {
2003-07-31 09:43:47 +04:00
fstrcpy ( domain - > name , domain_name ) ;
2003-09-05 21:57:45 +04:00
if ( alternative_name ) {
fstrcpy ( domain - > alt_name , alternative_name ) ;
2002-08-17 21:00:51 +04:00
}
}
2002-10-05 01:42:04 +04:00
domain - > methods = methods ;
2003-06-10 07:50:38 +04:00
domain - > backend = NULL ;
2001-12-10 02:59:42 +03:00
domain - > sequence_number = DOM_SEQUENCE_NONE ;
domain - > last_seq_check = 0 ;
2002-08-17 21:00:51 +04:00
if ( sid ) {
sid_copy ( & domain - > sid , sid ) ;
}
2002-10-05 01:42:04 +04:00
2004-01-05 07:10:28 +03:00
/* see if this is a native mode win2k domain */
2002-10-05 01:42:04 +04:00
2004-01-05 07:10:28 +03:00
domain - > native_mode = cm_check_for_native_mode_win2k ( domain ) ;
2003-08-09 03:53:13 +04:00
2004-01-05 07:10:28 +03:00
DEBUG ( 3 , ( " add_trusted_domain: %s is a %s mode domain \n " , domain - > name ,
2003-06-03 20:02:33 +04:00
domain - > native_mode ? " native " : " mixed (or NT4) " ) ) ;
2001-12-01 15:31:43 +03:00
2001-11-22 11:31:50 +03:00
/* Link to domain list */
2002-01-11 08:33:45 +03:00
DLIST_ADD ( _domain_list , domain ) ;
2001-10-11 03:08:13 +04:00
2002-08-17 21:00:51 +04:00
DEBUG ( 1 , ( " Added domain %s %s %s \n " ,
domain - > name , domain - > alt_name ,
sid ? sid_string_static ( & domain - > sid ) : " " ) ) ;
2001-11-22 11:31:50 +03:00
return domain ;
2000-05-09 15:43:00 +04:00
}
2003-08-26 01:45:57 +04:00
/********************************************************************
2003-08-28 02:05:52 +04:00
Periodically we need to refresh the trusted domain cache for smbd
2003-08-26 01:45:57 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2001-05-07 08:32:40 +04:00
2003-08-26 01:45:57 +04:00
void rescan_trusted_domains ( void )
{
static time_t last_scan ;
time_t now = time ( NULL ) ;
struct winbindd_domain * mydomain = NULL ;
/* see if the time has come... */
if ( ( now > last_scan ) & & ( ( now - last_scan ) < WINBINDD_RESCAN_FREQ ) )
return ;
2003-12-31 08:26:29 +03:00
if ( ( mydomain = find_our_domain ( ) ) = = NULL ) {
2003-08-26 01:45:57 +04:00
DEBUG ( 0 , ( " rescan_trusted_domains: Can't find my own domain! \n " ) ) ;
return ;
}
/* this will only add new domains we didn't already know about */
add_trusted_domains ( mydomain ) ;
2003-08-27 11:26:02 +04:00
last_scan = now ;
2003-08-26 01:45:57 +04:00
return ;
}
/********************************************************************
2002-08-17 21:00:51 +04:00
rescan our domains looking for new trusted domains
2003-08-26 01:45:57 +04:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2003-08-09 03:53:13 +04:00
void add_trusted_domains ( struct winbindd_domain * domain )
2002-08-17 21:00:51 +04:00
{
TALLOC_CTX * mem_ctx ;
2003-08-09 03:53:13 +04:00
NTSTATUS result ;
time_t t ;
char * * names ;
char * * alt_names ;
int num_domains = 0 ;
DOM_SID * dom_sids , null_sid ;
int i ;
struct winbindd_domain * new_domain ;
2002-08-17 21:00:51 +04:00
2002-11-06 03:10:04 +03:00
/* trusted domains might be disabled */
if ( ! lp_allow_trusted_domains ( ) ) {
return ;
}
2003-02-14 03:31:30 +03:00
2002-08-17 21:00:51 +04:00
DEBUG ( 1 , ( " scanning trusted domain list \n " ) ) ;
2002-12-20 23:21:31 +03:00
if ( ! ( mem_ctx = talloc_init ( " init_domain_list " ) ) )
2002-08-17 21:00:51 +04:00
return ;
2003-08-09 03:53:13 +04:00
ZERO_STRUCTP ( & null_sid ) ;
2002-08-17 21:00:51 +04:00
2003-08-09 03:53:13 +04:00
t = time ( NULL ) ;
/* ask the DC what domains it trusts */
2003-08-15 08:42:05 +04:00
result = domain - > methods - > trusted_domains ( domain , mem_ctx , ( unsigned int * ) & num_domains ,
2003-08-09 03:53:13 +04:00
& names , & alt_names , & dom_sids ) ;
2003-07-31 10:37:37 +04:00
2003-08-09 03:53:13 +04:00
if ( NT_STATUS_IS_OK ( result ) ) {
2002-08-17 21:00:51 +04:00
2003-07-31 09:43:47 +04:00
/* Add each domain to the trusted domain list */
2002-08-17 21:00:51 +04:00
for ( i = 0 ; i < num_domains ; i + + ) {
DEBUG ( 10 , ( " Found domain %s \n " , names [ i ] ) ) ;
2003-04-23 15:54:56 +04:00
add_trusted_domain ( names [ i ] , alt_names ? alt_names [ i ] : NULL ,
2003-08-09 03:53:13 +04:00
domain - > methods , & dom_sids [ i ] ) ;
2003-07-31 10:37:37 +04:00
/* if the SID was empty, we better set it now */
if ( sid_equal ( & dom_sids [ i ] , & null_sid ) ) {
2003-08-01 17:28:13 +04:00
new_domain = find_domain_from_name ( names [ i ] ) ;
2003-07-31 10:37:37 +04:00
2003-08-01 17:28:13 +04:00
/* this should never happen */
if ( ! new_domain ) {
DEBUG ( 0 , ( " rescan_trust_domains: can't find the domain I just added! [%s] \n " ,
2003-07-31 10:37:37 +04:00
names [ i ] ) ) ;
break ;
2003-08-01 17:28:13 +04:00
}
2003-07-31 10:37:37 +04:00
2003-08-01 17:28:13 +04:00
/* call the cache method; which will operate on the winbindd_domain \
passed in and choose either rpc or ads as appropriate */
result = domain - > methods - > domain_sid ( new_domain , & new_domain - > sid ) ;
2003-07-31 10:37:37 +04:00
2003-08-01 17:28:13 +04:00
if ( NT_STATUS_IS_OK ( result ) )
2003-08-09 03:53:13 +04:00
sid_copy ( & dom_sids [ i ] , & new_domain - > sid ) ;
2003-07-31 10:37:37 +04:00
}
2003-04-23 15:54:56 +04:00
/* store trusted domain in the cache */
trustdom_cache_store ( names [ i ] , alt_names ? alt_names [ i ] : NULL ,
& dom_sids [ i ] , t + WINBINDD_RESCAN_FREQ ) ;
2002-08-17 21:00:51 +04:00
}
}
talloc_destroy ( mem_ctx ) ;
}
/* Look up global info for the winbind daemon */
2002-01-11 08:33:45 +03:00
BOOL init_domain_list ( void )
2000-05-09 15:43:00 +04:00
{
2001-12-10 02:59:42 +03:00
extern struct winbindd_methods cache_methods ;
2001-12-10 05:25:19 +03:00
struct winbindd_domain * domain ;
2001-10-12 12:28:08 +04:00
2002-01-11 08:33:45 +03:00
/* Free existing list */
free_domain_list ( ) ;
2003-12-31 03:31:43 +03:00
/* Add ourselves as the first entry. It *must* be the first entry */
2003-08-09 03:53:13 +04:00
2003-09-05 21:57:45 +04:00
domain = add_trusted_domain ( lp_workgroup ( ) , lp_realm ( ) , & cache_methods , NULL ) ;
2003-12-31 08:26:29 +03:00
domain - > primary = True ;
2003-09-05 21:57:45 +04:00
/* get any alternate name for the primary domain */
cache_methods . alternate_name ( domain ) ;
/* now we have the correct netbios (short) domain name */
2003-08-09 03:53:13 +04:00
2003-09-05 21:57:45 +04:00
if ( * domain - > name )
set_global_myworkgroup ( domain - > name ) ;
2003-01-16 02:32:47 +03:00
if ( ! secrets_fetch_domain_sid ( domain - > name , & domain - > sid ) ) {
DEBUG ( 1 , ( " Could not fetch sid for our domain %s \n " ,
domain - > name ) ) ;
return False ;
2001-12-10 05:25:19 +03:00
}
2003-01-16 02:32:47 +03:00
2002-08-17 21:00:51 +04:00
/* do an initial scan for trusted domains */
2003-08-09 03:53:13 +04:00
add_trusted_domains ( domain ) ;
2001-10-12 12:28:08 +04:00
2001-12-10 05:25:19 +03:00
return True ;
2000-05-09 15:43:00 +04:00
}
2003-12-31 03:31:43 +03:00
/**
* Given a domain name , return the struct winbindd domain info for it
*
* @ note Do * not * pass lp_workgroup ( ) to this function . domain_list
* may modify it ' s value , and free that pointer . Instead , our local
2004-01-05 07:10:28 +03:00
* domain may be found by calling find_our_domain ( ) .
2003-12-31 03:31:43 +03:00
* directly .
*
*
* @ return The domain structure for the named domain , if it is working .
*/
2002-01-11 08:33:45 +03:00
2002-02-28 02:51:25 +03:00
struct winbindd_domain * find_domain_from_name ( const char * domain_name )
2002-01-11 08:33:45 +03:00
{
struct winbindd_domain * domain ;
/* Search through list */
for ( domain = domain_list ( ) ; domain ! = NULL ; domain = domain - > next ) {
if ( strequal ( domain_name , domain - > name ) | |
2003-12-31 03:31:43 +03:00
( domain - > alt_name [ 0 ] & & strequal ( domain_name , domain - > alt_name ) ) ) {
2002-01-11 08:33:45 +03:00
return domain ;
2003-12-31 03:31:43 +03:00
}
2002-01-11 08:33:45 +03:00
}
/* Not found */
return NULL ;
}
/* Given a domain sid, return the struct winbindd domain info for it */
struct winbindd_domain * find_domain_from_sid ( DOM_SID * sid )
{
struct winbindd_domain * domain ;
/* Search through list */
for ( domain = domain_list ( ) ; domain ! = NULL ; domain = domain - > next ) {
if ( sid_compare_domain ( sid , & domain - > sid ) = = 0 )
return domain ;
}
/* Not found */
return NULL ;
}
2000-05-09 15:43:00 +04:00
2003-12-31 08:26:29 +03:00
/* Given a domain sid, return the struct winbindd domain info for it */
2004-01-05 19:58:37 +03:00
struct winbindd_domain * find_our_domain ( void )
2003-12-31 08:26:29 +03:00
{
struct winbindd_domain * domain ;
/* Search through list */
for ( domain = domain_list ( ) ; domain ! = NULL ; domain = domain - > next ) {
if ( domain - > primary )
return domain ;
}
/* Not found */
return NULL ;
}
2001-12-10 05:25:19 +03:00
/* Lookup a sid in a domain from a name */
2002-01-11 08:33:45 +03:00
2001-12-03 11:17:46 +03:00
BOOL winbindd_lookup_sid_by_name ( struct winbindd_domain * domain ,
2002-01-11 08:33:45 +03:00
const char * name , DOM_SID * sid ,
enum SID_NAME_USE * type )
2000-05-09 15:43:00 +04:00
{
2001-11-21 12:59:15 +03:00
NTSTATUS result ;
2003-04-23 15:54:56 +04:00
TALLOC_CTX * mem_ctx ;
2001-11-21 12:59:15 +03:00
/* Don't bother with machine accounts */
2003-04-23 15:54:56 +04:00
2001-11-21 12:59:15 +03:00
if ( name [ strlen ( name ) - 1 ] = = ' $ ' )
return False ;
2001-10-12 12:28:08 +04:00
2003-04-23 15:54:56 +04:00
mem_ctx = talloc_init ( " lookup_sid_by_name for %s \n " , name ) ;
if ( ! mem_ctx )
return False ;
2001-11-21 12:59:15 +03:00
/* Lookup name */
2003-04-23 15:54:56 +04:00
result = domain - > methods - > name_to_sid ( domain , mem_ctx , name , sid , type ) ;
talloc_destroy ( mem_ctx ) ;
2001-10-05 04:20:06 +04:00
2001-11-21 12:59:15 +03:00
/* Return rid and type if lookup successful */
2001-12-10 02:59:42 +03:00
if ( ! NT_STATUS_IS_OK ( result ) ) {
2001-11-23 12:04:09 +03:00
* type = SID_NAME_UNKNOWN ;
2001-11-21 12:59:15 +03:00
}
2001-10-12 12:28:08 +04:00
2001-12-03 11:17:46 +03:00
return NT_STATUS_IS_OK ( result ) ;
2001-11-21 12:59:15 +03:00
}
2001-11-23 06:54:07 +03:00
/**
* @ brief Lookup a name in a domain from a sid .
*
* @ param sid Security ID you want to look up .
* @ param name On success , set to the name corresponding to @ p sid .
2002-01-20 04:24:59 +03:00
* @ param dom_name On success , set to the ' domain name ' corresponding to @ p sid .
2001-11-23 06:54:07 +03:00
* @ param type On success , contains the type of name : alias , group or
* user .
* @ retval True if the name exists , in which case @ p name and @ p type
* are set , otherwise False .
* */
BOOL winbindd_lookup_name_by_sid ( DOM_SID * sid ,
2002-01-20 04:24:59 +03:00
fstring dom_name ,
2001-11-23 06:54:07 +03:00
fstring name ,
enum SID_NAME_USE * type )
2000-05-09 15:43:00 +04:00
{
2001-12-03 14:11:14 +03:00
char * names ;
2001-11-21 12:59:15 +03:00
NTSTATUS result ;
TALLOC_CTX * mem_ctx ;
BOOL rv = False ;
2001-12-03 11:17:46 +03:00
struct winbindd_domain * domain ;
2001-10-12 12:28:08 +04:00
2001-12-03 11:17:46 +03:00
domain = find_domain_from_sid ( sid ) ;
2002-01-10 09:20:03 +03:00
2001-12-03 11:17:46 +03:00
if ( ! domain ) {
DEBUG ( 1 , ( " Can't find domain from sid \n " ) ) ;
return False ;
}
2001-11-21 12:59:15 +03:00
/* Lookup name */
2002-12-20 23:21:31 +03:00
if ( ! ( mem_ctx = talloc_init ( " winbindd_lookup_name_by_sid " ) ) )
2001-11-21 12:59:15 +03:00
return False ;
2001-10-05 04:20:06 +04:00
2001-12-03 14:11:14 +03:00
result = domain - > methods - > sid_to_name ( domain , mem_ctx , sid , & names , type ) ;
2000-05-09 15:43:00 +04:00
2001-11-21 12:59:15 +03:00
/* Return name and type if successful */
2001-10-05 04:20:06 +04:00
2001-11-23 06:54:07 +03:00
if ( ( rv = NT_STATUS_IS_OK ( result ) ) ) {
2002-01-20 04:24:59 +03:00
fstrcpy ( dom_name , domain - > name ) ;
2001-12-03 14:11:14 +03:00
fstrcpy ( name , names ) ;
2001-11-22 10:48:57 +03:00
} else {
2001-11-23 06:54:07 +03:00
* type = SID_NAME_UNKNOWN ;
fstrcpy ( name , name_deadbeef ) ;
2001-11-21 12:59:15 +03:00
}
2001-10-05 04:20:06 +04:00
2001-11-21 12:59:15 +03:00
talloc_destroy ( mem_ctx ) ;
return rv ;
2000-05-09 15:43:00 +04:00
}
2001-10-05 04:20:06 +04:00
2000-05-09 15:43:00 +04:00
/* Free state information held for {set,get,end}{pw,gr}ent() functions */
void free_getent_state ( struct getent_state * state )
{
2001-11-22 11:31:50 +03:00
struct getent_state * temp ;
2000-05-09 15:43:00 +04:00
2001-11-22 11:31:50 +03:00
/* Iterate over state list */
2000-05-09 15:43:00 +04:00
2001-11-22 11:31:50 +03:00
temp = state ;
2000-05-09 15:43:00 +04:00
2001-11-22 11:31:50 +03:00
while ( temp ! = NULL ) {
struct getent_state * next ;
2000-05-09 15:43:00 +04:00
2001-11-22 11:31:50 +03:00
/* Free sam entries then list entry */
2000-05-09 15:43:00 +04:00
2001-11-22 11:31:50 +03:00
SAFE_FREE ( state - > sam_entries ) ;
DLIST_REMOVE ( state , state ) ;
next = temp - > next ;
2000-05-09 15:43:00 +04:00
2001-11-22 11:31:50 +03:00
SAFE_FREE ( temp ) ;
temp = next ;
}
2000-05-09 15:43:00 +04:00
}
2002-11-07 10:17:09 +03:00
/* Parse winbindd related parameters */
2000-05-09 15:43:00 +04:00
BOOL winbindd_param_init ( void )
{
2002-01-11 08:33:45 +03:00
/* Parse winbind uid and winbind_gid parameters */
2003-05-12 22:12:31 +04:00
if ( ! lp_idmap_uid ( & server_state . uid_low , & server_state . uid_high ) ) {
2003-06-25 00:54:32 +04:00
DEBUG ( 0 , ( " winbindd: idmap uid range missing or invalid \n " ) ) ;
DEBUG ( 0 , ( " winbindd: cannot continue, exiting. \n " ) ) ;
2002-01-11 08:33:45 +03:00
return False ;
}
2003-05-12 22:12:31 +04:00
if ( ! lp_idmap_gid ( & server_state . gid_low , & server_state . gid_high ) ) {
2003-06-25 00:54:32 +04:00
DEBUG ( 0 , ( " winbindd: idmap gid range missing or invalid \n " ) ) ;
DEBUG ( 0 , ( " winbindd: cannot continue, exiting. \n " ) ) ;
2002-01-11 08:33:45 +03:00
return False ;
}
return True ;
2000-05-09 15:43:00 +04:00
}
2001-05-07 08:32:40 +04:00
/* Check if a domain is present in a comma-separated list of domains */
BOOL check_domain_env ( char * domain_env , char * domain )
{
fstring name ;
2002-11-13 02:20:50 +03:00
const char * tmp = domain_env ;
2001-05-07 08:32:40 +04:00
while ( next_token ( & tmp , name , " , " , sizeof ( fstring ) ) ) {
2001-10-14 12:31:54 +04:00
if ( strequal ( name , domain ) )
2001-05-07 08:32:40 +04:00
return True ;
}
return False ;
}
2003-12-31 03:31:43 +03:00
/* Is this a domain which we may assume no DOMAIN\ prefix? */
static BOOL assume_domain ( const char * domain ) {
if ( ( lp_winbind_use_default_domain ( )
| | lp_winbind_trusted_domains_only ( ) ) & &
strequal ( lp_workgroup ( ) , domain ) )
return True ;
if ( strequal ( get_global_sam_name ( ) , domain ) )
return True ;
return False ;
}
2001-05-07 08:32:40 +04:00
/* Parse a string of the form DOMAIN/user into a domain and a user */
2001-12-05 07:17:39 +03:00
BOOL parse_domain_user ( const char * domuser , fstring domain , fstring user )
2001-05-07 08:32:40 +04:00
{
2001-12-05 07:17:39 +03:00
char * p = strchr ( domuser , * lp_winbind_separator ( ) ) ;
2001-10-14 12:31:54 +04:00
2003-07-09 20:44:47 +04:00
if ( ! p ) {
2002-01-18 05:37:55 +03:00
fstrcpy ( user , domuser ) ;
2003-07-09 20:44:47 +04:00
2003-12-31 03:31:43 +03:00
if ( assume_domain ( lp_workgroup ( ) ) ) {
2003-07-09 20:44:47 +04:00
fstrcpy ( domain , lp_workgroup ( ) ) ;
2003-12-31 03:31:43 +03:00
} else {
2003-12-31 11:45:03 +03:00
fstrcpy ( domain , get_global_sam_name ( ) ) ;
2003-12-31 03:31:43 +03:00
}
2003-07-09 20:44:47 +04:00
}
else {
2002-01-18 05:37:55 +03:00
fstrcpy ( user , p + 1 ) ;
fstrcpy ( domain , domuser ) ;
domain [ PTR_DIFF ( p , domuser ) ] = 0 ;
}
2003-07-09 20:44:47 +04:00
2003-07-03 23:11:31 +04:00
strupper_m ( domain ) ;
2003-07-09 20:44:47 +04:00
2001-12-05 07:17:39 +03:00
return True ;
2001-05-07 08:32:40 +04:00
}
2002-01-18 05:37:55 +03:00
/*
Fill DOMAIN \ \ USERNAME entry accounting ' winbind use default domain ' and
' winbind separator ' options .
This means :
- omit DOMAIN when ' winbind use default domain = true ' and DOMAIN is
2003-12-31 03:31:43 +03:00
lp_workgroup ( )
If we are a PDC or BDC , and this is for our domain , do likewise .
Also , if omit DOMAIN if ' winbind trusted domains only = true ' , as the
username is then unqualified in unix
2002-01-18 05:37:55 +03:00
*/
void fill_domain_username ( fstring name , const char * domain , const char * user )
{
2003-12-31 03:31:43 +03:00
if ( assume_domain ( domain ) ) {
2002-01-18 05:37:55 +03:00
strlcpy ( name , user , sizeof ( fstring ) ) ;
} else {
slprintf ( name , sizeof ( fstring ) - 1 , " %s%s%s " ,
domain , lp_winbind_separator ( ) ,
user ) ;
}
}
2002-11-02 04:36:42 +03:00
/*
* Winbindd socket accessor functions
*/
2003-03-24 12:54:13 +03:00
char * get_winbind_priv_pipe_dir ( void )
{
return lock_path ( WINBINDD_PRIV_SOCKET_SUBDIR ) ;
}
2002-11-02 04:36:42 +03:00
/* Open the winbindd socket */
static int _winbindd_socket = - 1 ;
2003-03-24 12:54:13 +03:00
static int _winbindd_priv_socket = - 1 ;
2002-11-02 04:36:42 +03:00
int open_winbindd_socket ( void )
{
if ( _winbindd_socket = = - 1 ) {
_winbindd_socket = create_pipe_sock (
WINBINDD_SOCKET_DIR , WINBINDD_SOCKET_NAME , 0755 ) ;
DEBUG ( 10 , ( " open_winbindd_socket: opened socket fd %d \n " ,
_winbindd_socket ) ) ;
}
return _winbindd_socket ;
}
2003-03-24 12:54:13 +03:00
int open_winbindd_priv_socket ( void )
{
if ( _winbindd_priv_socket = = - 1 ) {
_winbindd_priv_socket = create_pipe_sock (
get_winbind_priv_pipe_dir ( ) , WINBINDD_SOCKET_NAME , 0750 ) ;
DEBUG ( 10 , ( " open_winbindd_priv_socket: opened socket fd %d \n " ,
_winbindd_priv_socket ) ) ;
}
return _winbindd_priv_socket ;
}
2002-11-02 04:36:42 +03:00
/* Close the winbindd socket */
void close_winbindd_socket ( void )
{
if ( _winbindd_socket ! = - 1 ) {
DEBUG ( 10 , ( " close_winbindd_socket: closing socket fd %d \n " ,
_winbindd_socket ) ) ;
close ( _winbindd_socket ) ;
_winbindd_socket = - 1 ;
}
2003-03-24 12:54:13 +03:00
if ( _winbindd_priv_socket ! = - 1 ) {
DEBUG ( 10 , ( " close_winbindd_socket: closing socket fd %d \n " ,
_winbindd_priv_socket ) ) ;
close ( _winbindd_priv_socket ) ;
_winbindd_priv_socket = - 1 ;
}
2002-11-02 04:36:42 +03:00
}
/*
* Client list accessor functions
*/
static struct winbindd_cli_state * _client_list ;
static int _num_clients ;
/* Return list of all connected clients */
struct winbindd_cli_state * winbindd_client_list ( void )
{
return _client_list ;
}
/* Add a connection to the list */
void winbindd_add_client ( struct winbindd_cli_state * cli )
{
DLIST_ADD ( _client_list , cli ) ;
_num_clients + + ;
}
/* Remove a client from the list */
void winbindd_remove_client ( struct winbindd_cli_state * cli )
{
DLIST_REMOVE ( _client_list , cli ) ;
_num_clients - - ;
}
/* Close all open clients */
void winbindd_kill_all_clients ( void )
{
struct winbindd_cli_state * cl = winbindd_client_list ( ) ;
DEBUG ( 10 , ( " winbindd_kill_all_clients: going postal \n " ) ) ;
while ( cl ) {
struct winbindd_cli_state * next ;
next = cl - > next ;
winbindd_remove_client ( cl ) ;
cl = next ;
}
}
/* Return number of open clients */
int winbindd_num_clients ( void )
{
return _num_clients ;
}
2003-04-23 15:54:56 +04:00
/* Help with RID -> SID conversion */
DOM_SID * rid_to_talloced_sid ( struct winbindd_domain * domain ,
TALLOC_CTX * mem_ctx ,
uint32 rid )
{
DOM_SID * sid ;
sid = talloc ( mem_ctx , sizeof ( * sid ) ) ;
if ( ! sid ) {
smb_panic ( " rid_to_to_talloced_sid: talloc for DOM_SID failed! \n " ) ;
}
sid_copy ( sid , & domain - > sid ) ;
sid_append_rid ( sid , rid ) ;
return sid ;
}
2003-06-24 18:02:21 +04:00
/*****************************************************************************
For idmap conversion : convert one record to new format
Ancient versions ( eg 2.2 .3 a ) of winbindd_idmap . tdb mapped DOMAINNAME / rid
instead of the SID .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static int convert_fn ( TDB_CONTEXT * tdb , TDB_DATA key , TDB_DATA data , void * state )
{
struct winbindd_domain * domain ;
char * p ;
DOM_SID sid ;
uint32 rid ;
fstring keystr ;
fstring dom_name ;
TDB_DATA key2 ;
BOOL * failed = ( BOOL * ) state ;
DEBUG ( 10 , ( " Converting %s \n " , key . dptr ) ) ;
p = strchr ( key . dptr , ' / ' ) ;
if ( ! p )
return 0 ;
* p = 0 ;
fstrcpy ( dom_name , key . dptr ) ;
* p + + = ' / ' ;
domain = find_domain_from_name ( dom_name ) ;
if ( domain = = NULL ) {
/* We must delete the old record. */
DEBUG ( 0 , ( " Unable to find domain %s \n " , dom_name ) ) ;
DEBUG ( 0 , ( " deleting record %s \n " , key . dptr ) ) ;
if ( tdb_delete ( tdb , key ) ! = 0 ) {
DEBUG ( 0 , ( " Unable to delete record %s \n " , key . dptr ) ) ;
* failed = True ;
return - 1 ;
}
return 0 ;
}
rid = atoi ( p ) ;
sid_copy ( & sid , & domain - > sid ) ;
sid_append_rid ( & sid , rid ) ;
sid_to_string ( keystr , & sid ) ;
key2 . dptr = keystr ;
key2 . dsize = strlen ( keystr ) + 1 ;
if ( tdb_store ( tdb , key2 , data , TDB_INSERT ) ! = 0 ) {
DEBUG ( 0 , ( " Unable to add record %s \n " , key2 . dptr ) ) ;
* failed = True ;
return - 1 ;
}
if ( tdb_store ( tdb , data , key2 , TDB_REPLACE ) ! = 0 ) {
DEBUG ( 0 , ( " Unable to update record %s \n " , data . dptr ) ) ;
* failed = True ;
return - 1 ;
}
if ( tdb_delete ( tdb , key ) ! = 0 ) {
DEBUG ( 0 , ( " Unable to delete record %s \n " , key . dptr ) ) ;
* failed = True ;
return - 1 ;
}
return 0 ;
}
/* These definitions are from sam/idmap_tdb.c. Replicated here just
out of laziness . . . . : - ( */
/* High water mark keys */
# define HWM_GROUP "GROUP HWM"
# define HWM_USER "USER HWM"
/* idmap version determines auto-conversion */
# define IDMAP_VERSION 2
/*****************************************************************************
Convert the idmap database from an older version .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static BOOL idmap_convert ( const char * idmap_name )
{
int32 vers ;
BOOL bigendianheader ;
BOOL failed = False ;
TDB_CONTEXT * idmap_tdb ;
if ( ! ( idmap_tdb = tdb_open_log ( idmap_name , 0 ,
TDB_DEFAULT , O_RDWR ,
0600 ) ) ) {
DEBUG ( 0 , ( " idmap_convert: Unable to open idmap database \n " ) ) ;
return False ;
}
bigendianheader = ( idmap_tdb - > flags & TDB_BIGENDIAN ) ? True : False ;
vers = tdb_fetch_int32 ( idmap_tdb , " IDMAP_VERSION " ) ;
if ( ( ( vers = = - 1 ) & & bigendianheader ) | | ( IREV ( vers ) = = IDMAP_VERSION ) ) {
/* Arrggghh ! Bytereversed or old big-endian - make order independent ! */
/*
* high and low records were created on a
* big endian machine and will need byte - reversing .
*/
int32 wm ;
wm = tdb_fetch_int32 ( idmap_tdb , HWM_USER ) ;
if ( wm ! = - 1 ) {
wm = IREV ( wm ) ;
} else {
wm = server_state . uid_low ;
}
if ( tdb_store_int32 ( idmap_tdb , HWM_USER , wm ) = = - 1 ) {
DEBUG ( 0 , ( " idmap_convert: Unable to byteswap user hwm in idmap database \n " ) ) ;
tdb_close ( idmap_tdb ) ;
return False ;
}
wm = tdb_fetch_int32 ( idmap_tdb , HWM_GROUP ) ;
if ( wm ! = - 1 ) {
wm = IREV ( wm ) ;
} else {
wm = server_state . gid_low ;
}
if ( tdb_store_int32 ( idmap_tdb , HWM_GROUP , wm ) = = - 1 ) {
DEBUG ( 0 , ( " idmap_convert: Unable to byteswap group hwm in idmap database \n " ) ) ;
tdb_close ( idmap_tdb ) ;
return False ;
}
}
/* the old format stored as DOMAIN/rid - now we store the SID direct */
tdb_traverse ( idmap_tdb , convert_fn , & failed ) ;
if ( failed ) {
DEBUG ( 0 , ( " Problem during conversion \n " ) ) ;
tdb_close ( idmap_tdb ) ;
return False ;
}
if ( tdb_store_int32 ( idmap_tdb , " IDMAP_VERSION " , IDMAP_VERSION ) = = - 1 ) {
DEBUG ( 0 , ( " idmap_convert: Unable to dtore idmap version in databse \n " ) ) ;
tdb_close ( idmap_tdb ) ;
return False ;
}
tdb_close ( idmap_tdb ) ;
return True ;
}
/*****************************************************************************
Convert the idmap database from an older version if necessary
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
BOOL winbindd_upgrade_idmap ( void )
{
pstring idmap_name ;
pstring backup_name ;
SMB_STRUCT_STAT stbuf ;
TDB_CONTEXT * idmap_tdb ;
pstrcpy ( idmap_name , lock_path ( " winbindd_idmap.tdb " ) ) ;
if ( ! file_exist ( idmap_name , & stbuf ) ) {
/* nothing to convert return */
return True ;
}
if ( ! ( idmap_tdb = tdb_open_log ( idmap_name , 0 ,
TDB_DEFAULT , O_RDWR ,
0600 ) ) ) {
DEBUG ( 0 , ( " idmap_convert: Unable to open idmap database \n " ) ) ;
return False ;
}
if ( tdb_fetch_int32 ( idmap_tdb , " IDMAP_VERSION " ) = = IDMAP_VERSION ) {
/* nothing to convert return */
tdb_close ( idmap_tdb ) ;
return True ;
}
/* backup_tdb expects the tdb not to be open */
tdb_close ( idmap_tdb ) ;
DEBUG ( 0 , ( " Upgrading winbindd_idmap.tdb from an old version \n " ) ) ;
pstrcpy ( backup_name , idmap_name ) ;
pstrcat ( backup_name , " .bak " ) ;
if ( backup_tdb ( idmap_name , backup_name ) ! = 0 ) {
DEBUG ( 0 , ( " Could not backup idmap database \n " ) ) ;
return False ;
}
return idmap_convert ( idmap_name ) ;
}
2003-07-31 09:43:47 +04:00
/*******************************************************************
wrapper around retrieving the trust account password
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
BOOL get_trust_pw ( const char * domain , uint8 ret_pwd [ 16 ] ,
time_t * pass_last_set_time , uint32 * channel )
{
DOM_SID sid ;
char * pwd ;
/* if we are a DC and this is not our domain, then lookup an account
for the domain trust */
if ( IS_DC & & ! strequal ( domain , lp_workgroup ( ) ) & & lp_allow_trusted_domains ( ) )
{
if ( ! secrets_fetch_trusted_domain_password ( domain , & pwd , & sid ,
pass_last_set_time ) )
{
DEBUG ( 0 , ( " get_trust_pw: could not fetch trust account "
" password for trusted domain %s \n " , domain ) ) ;
return False ;
}
* channel = SEC_CHAN_DOMAIN ;
E_md4hash ( pwd , ret_pwd ) ;
SAFE_FREE ( pwd ) ;
return True ;
}
else /* just get the account for our domain (covers
ROLE_DOMAIN_MEMBER as well */
{
/* get the machine trust account for our domain */
if ( ! secrets_fetch_trust_account_password ( lp_workgroup ( ) , ret_pwd ,
pass_last_set_time , channel ) )
{
DEBUG ( 0 , ( " get_trust_pw: could not fetch trust account "
" password for my domain %s \n " , domain ) ) ;
return False ;
}
return True ;
}
/* Failure */
}