2007-11-29 17:25:41 -08:00
/*
2005-02-22 03:31:22 +00:00
Unix SMB / CIFS implementation .
client connect / disconnect routines
2005-02-24 21:54:52 +00:00
Copyright ( C ) Andrew Tridgell 1994 - 1998
2005-02-23 17:29:28 +00:00
Copyright ( C ) Gerald ( Jerry ) Carter 2004
2009-03-12 17:59:24 -07:00
Copyright ( C ) Jeremy Allison 2007 - 2009
2007-11-29 17:25:41 -08:00
2005-02-22 03:31:22 +00:00
This program is free software ; you can redistribute it and / or modify
it under the terms of the GNU General Public License as published by
2007-07-09 19:25:36 +00:00
the Free Software Foundation ; either version 3 of the License , or
2005-02-22 03:31:22 +00:00
( at your option ) any later version .
2007-11-29 17:25:41 -08:00
2005-02-22 03:31:22 +00:00
This program is distributed in the hope that it will be useful ,
but WITHOUT ANY WARRANTY ; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
GNU General Public License for more details .
2007-11-29 17:25:41 -08:00
2005-02-22 03:31:22 +00:00
You should have received a copy of the GNU General Public License
2007-07-10 00:52:41 +00:00
along with this program . If not , see < http : //www.gnu.org/licenses/>.
2005-02-22 03:31:22 +00:00
*/
# include "includes.h"
2011-05-06 11:47:43 +02:00
# include "libsmb/libsmb.h"
2011-02-24 10:46:55 +01:00
# include "libsmb/clirap.h"
2011-02-24 22:58:08 +01:00
# include "msdfs.h"
2011-02-25 00:03:01 +01:00
# include "trans2.h"
2011-03-23 14:18:59 +01:00
# include "libsmb/nmblib.h"
2012-05-19 17:31:50 +02:00
# include "../libcli/smb/smbXcli_base.h"
2016-12-12 06:07:56 +01:00
# include "auth/credentials/credentials.h"
2005-02-22 03:31:22 +00:00
2007-03-08 23:54:57 +00:00
/********************************************************************
Important point .
2007-03-12 17:55:24 +00:00
DFS paths are * always * of the form \ server \ share \ < pathname > ( the \ characters
2007-03-08 23:54:57 +00:00
are not C escaped here ) .
- but if we ' re using POSIX paths then < pathname > may contain
' / ' separators , not ' \\ ' separators . So cope with ' \\ ' or ' / '
as a separator when looking at the pathname part . . . . JRA .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-02-22 03:31:22 +00:00
2007-12-29 22:39:52 -08:00
/********************************************************************
Ensure a connection is encrypted .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2016-11-03 17:26:41 +01:00
NTSTATUS cli_cm_force_encryption_creds ( struct cli_state * c ,
struct cli_credentials * creds ,
const char * sharename )
2007-12-29 22:39:52 -08:00
{
2016-11-03 14:50:28 +01:00
uint16_t major , minor ;
uint32_t caplow , caphigh ;
2013-08-16 10:44:34 -07:00
NTSTATUS status ;
if ( smbXcli_conn_protocol ( c - > conn ) > = PROTOCOL_SMB2_02 ) {
status = smb2cli_session_encryption_on ( c - > smb2 . session ) ;
if ( NT_STATUS_EQUAL ( status , NT_STATUS_NOT_SUPPORTED ) ) {
d_printf ( " Encryption required and "
" server doesn't support "
" SMB3 encryption - failing connect \n " ) ;
} else if ( ! NT_STATUS_IS_OK ( status ) ) {
d_printf ( " Encryption required and "
" setup failed with error %s. \n " ,
nt_errstr ( status ) ) ;
}
return status ;
}
2016-11-03 14:50:28 +01:00
if ( ! SERVER_HAS_UNIX_CIFS ( c ) ) {
2007-12-29 22:39:52 -08:00
d_printf ( " Encryption required and "
" server that doesn't support "
" UNIX extensions - failing connect \n " ) ;
2016-11-03 14:50:28 +01:00
return NT_STATUS_NOT_SUPPORTED ;
}
status = cli_unix_extensions_version ( c , & major , & minor , & caplow ,
& caphigh ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-12-29 22:39:52 -08:00
d_printf ( " Encryption required and "
" can't get UNIX CIFS extensions "
" version from server. \n " ) ;
2016-11-03 14:50:28 +01:00
return NT_STATUS_UNKNOWN_REVISION ;
}
if ( ! ( caplow & CIFS_UNIX_TRANSPORT_ENCRYPTION_CAP ) ) {
2007-12-29 22:39:52 -08:00
d_printf ( " Encryption required and "
" share %s doesn't support "
" encryption. \n " , sharename ) ;
2016-11-03 14:50:28 +01:00
return NT_STATUS_UNSUPPORTED_COMPRESSION ;
}
2016-11-03 17:26:41 +01:00
status = cli_smb1_setup_encryption ( c , creds ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
d_printf ( " Encryption required and "
" setup failed with error %s. \n " ,
nt_errstr ( status ) ) ;
return status ;
}
return NT_STATUS_OK ;
}
NTSTATUS cli_cm_force_encryption ( struct cli_state * c ,
const char * username ,
const char * password ,
const char * domain ,
const char * sharename )
{
struct cli_credentials * creds = NULL ;
NTSTATUS status ;
2016-11-03 14:50:28 +01:00
creds = cli_session_creds_init ( c ,
username ,
domain ,
NULL , /* default realm */
password ,
c - > use_kerberos ,
c - > fallback_after_kerberos ,
c - > use_ccache ,
c - > pw_nt_hash ) ;
if ( creds = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
2016-11-03 17:26:41 +01:00
status = cli_cm_force_encryption_creds ( c , creds , sharename ) ;
2016-11-03 14:50:28 +01:00
/* gensec currently references the creds so we can't free them here */
talloc_unlink ( c , creds ) ;
2016-11-03 17:26:41 +01:00
return status ;
2007-12-29 22:39:52 -08:00
}
2009-03-12 17:59:24 -07:00
2005-02-24 21:54:52 +00:00
/********************************************************************
Return a connection to a server .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2011-07-03 12:08:54 +02:00
static NTSTATUS do_connect ( TALLOC_CTX * ctx ,
2007-11-29 17:25:41 -08:00
const char * server ,
const char * share ,
2009-03-17 14:53:06 -07:00
const struct user_auth_info * auth_info ,
2009-01-14 14:26:56 -08:00
bool force_encrypt ,
2009-01-14 16:08:19 -08:00
int max_protocol ,
int port ,
2011-07-03 12:08:54 +02:00
int name_type ,
struct cli_state * * pcli )
2005-02-24 21:54:52 +00:00
{
2006-07-11 18:01:26 +00:00
struct cli_state * c = NULL ;
2007-11-29 17:25:41 -08:00
char * servicename ;
2005-02-24 21:54:52 +00:00
char * sharename ;
2007-11-29 17:25:41 -08:00
char * newserver , * newshare ;
2007-06-20 17:38:42 +00:00
NTSTATUS status ;
2011-09-07 20:35:51 +02:00
int flags = 0 ;
2017-08-16 12:42:48 +02:00
enum protocol_types protocol = PROTOCOL_NONE ;
2015-09-30 21:17:02 +02:00
int signing_state = get_cmdline_auth_info_signing_state ( auth_info ) ;
2016-10-30 16:45:39 +01:00
struct cli_credentials * creds = NULL ;
2015-09-30 21:17:02 +02:00
if ( force_encrypt ) {
signing_state = SMB_SIGNING_REQUIRED ;
}
2007-11-29 17:25:41 -08:00
2005-02-24 21:54:52 +00:00
/* make a copy so we don't modify the global string 'service' */
2007-11-29 17:25:41 -08:00
servicename = talloc_strdup ( ctx , share ) ;
if ( ! servicename ) {
2011-07-03 12:08:54 +02:00
return NT_STATUS_NO_MEMORY ;
2007-11-29 17:25:41 -08:00
}
2005-02-24 21:54:52 +00:00
sharename = servicename ;
if ( * sharename = = ' \\ ' ) {
2009-01-02 12:49:49 -08:00
sharename + = 2 ;
if ( server = = NULL ) {
server = sharename ;
}
sharename = strchr_m ( sharename , ' \\ ' ) ;
2007-11-29 17:25:41 -08:00
if ( ! sharename ) {
2011-07-03 12:08:54 +02:00
return NT_STATUS_NO_MEMORY ;
2007-11-29 17:25:41 -08:00
}
2005-02-24 21:54:52 +00:00
* sharename = 0 ;
sharename + + ;
}
2011-05-29 13:17:23 +02:00
if ( server = = NULL ) {
2011-07-03 12:08:54 +02:00
return NT_STATUS_INVALID_PARAMETER ;
2005-02-24 21:54:52 +00:00
}
2009-01-14 16:08:19 -08:00
2011-09-07 20:35:51 +02:00
if ( get_cmdline_auth_info_use_kerberos ( auth_info ) ) {
flags | = CLI_FULL_CONNECTION_USE_KERBEROS ;
}
if ( get_cmdline_auth_info_fallback_after_kerberos ( auth_info ) ) {
flags | = CLI_FULL_CONNECTION_FALLBACK_AFTER_KERBEROS ;
}
if ( get_cmdline_auth_info_use_ccache ( auth_info ) ) {
flags | = CLI_FULL_CONNECTION_USE_CCACHE ;
}
2012-06-11 14:10:23 +02:00
if ( get_cmdline_auth_info_use_pw_nt_hash ( auth_info ) ) {
flags | = CLI_FULL_CONNECTION_USE_NT_HASH ;
}
2011-09-07 20:35:51 +02:00
2011-05-29 13:17:23 +02:00
status = cli_connect_nb (
server , NULL , port , name_type , NULL ,
2015-09-30 21:17:02 +02:00
signing_state ,
2011-09-07 20:35:51 +02:00
flags , & c ) ;
2011-05-29 13:17:23 +02:00
2007-06-20 17:38:42 +00:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-11-29 17:25:41 -08:00
d_printf ( " Connection to %s failed (Error %s) \n " ,
2011-05-29 13:17:23 +02:00
server ,
2007-11-29 17:25:41 -08:00
nt_errstr ( status ) ) ;
2011-07-03 12:08:54 +02:00
return status ;
2007-06-20 17:38:42 +00:00
}
2005-02-24 21:54:52 +00:00
2009-01-14 16:08:19 -08:00
if ( max_protocol = = 0 ) {
2017-08-16 12:42:48 +02:00
max_protocol = PROTOCOL_LATEST ;
2009-01-14 16:08:19 -08:00
}
2005-02-24 21:54:52 +00:00
DEBUG ( 4 , ( " session request ok \n " ) ) ;
2013-08-11 14:00:45 +02:00
status = smbXcli_negprot ( c - > conn , c - > timeout ,
2014-02-04 15:09:08 +13:00
lp_client_min_protocol ( ) ,
2012-05-20 17:54:29 +02:00
max_protocol ) ;
2008-09-11 18:57:49 +02:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
d_printf ( " protocol negotiation failed: %s \n " ,
nt_errstr ( status ) ) ;
2005-02-24 21:54:52 +00:00
cli_shutdown ( c ) ;
2011-07-03 12:08:54 +02:00
return status ;
2005-02-24 21:54:52 +00:00
}
2017-08-16 12:42:48 +02:00
protocol = smbXcli_conn_protocol ( c - > conn ) ;
DEBUG ( 4 , ( " negotiated dialect[%s] against server[%s] \n " ,
smb_protocol_types_string ( protocol ) ,
smbXcli_conn_remote_name ( c - > conn ) ) ) ;
2005-02-24 21:54:52 +00:00
2017-08-16 12:42:48 +02:00
if ( protocol > = PROTOCOL_SMB2_02 ) {
2013-08-09 11:15:48 -07:00
/* Ensure we ask for some initial credits. */
smb2cli_conn_set_max_credits ( c - > conn , DEFAULT_SMB2_MAX_CREDITS ) ;
}
2016-10-30 16:45:39 +01:00
creds = get_cmdline_auth_info_creds ( auth_info ) ;
status = cli_session_setup_creds ( c , creds ) ;
2011-07-03 12:04:24 +02:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-11-29 17:25:41 -08:00
/* If a password was not supplied then
* try again with a null username . */
2016-12-12 06:07:56 +01:00
if ( force_encrypt | | smbXcli_conn_signing_mandatory ( c - > conn ) | |
cli_credentials_authentication_requested ( creds ) | |
cli_credentials_is_anonymous ( creds ) | |
2016-10-28 12:15:20 +02:00
! NT_STATUS_IS_OK ( status = cli_session_setup_anon ( c ) ) )
{
2011-07-03 12:04:24 +02:00
d_printf ( " session setup failed: %s \n " ,
nt_errstr ( status ) ) ;
2011-11-16 16:37:24 +01:00
if ( NT_STATUS_EQUAL ( status ,
NT_STATUS_MORE_PROCESSING_REQUIRED ) )
2005-02-24 21:54:52 +00:00
d_printf ( " did you forget to run kinit? \n " ) ;
cli_shutdown ( c ) ;
2011-07-03 12:08:54 +02:00
return status ;
2005-02-24 21:54:52 +00:00
}
d_printf ( " Anonymous login successful \n " ) ;
2009-10-22 15:06:38 -07:00
}
if ( ! NT_STATUS_IS_OK ( status ) ) {
DEBUG ( 10 , ( " cli_init_creds() failed: %s \n " , nt_errstr ( status ) ) ) ;
cli_shutdown ( c ) ;
2011-07-03 12:08:54 +02:00
return status ;
2005-02-24 21:54:52 +00:00
}
DEBUG ( 4 , ( " session setup ok \n " ) ) ;
2005-05-09 22:39:20 +00:00
/* here's the fun part....to support 'msdfs proxy' shares
2007-11-29 17:25:41 -08:00
( on Samba or windows ) we have to issues a TRANS_GET_DFS_REFERRAL
2005-05-09 22:39:20 +00:00
here before trying to connect to the original share .
2009-10-28 12:48:36 -07:00
cli_check_msdfs_proxy ( ) will fail if it is a normal share . */
2005-05-09 22:39:20 +00:00
2013-05-17 20:46:24 +02:00
if ( smbXcli_conn_dfs_supported ( c - > conn ) & &
2007-11-29 17:25:41 -08:00
cli_check_msdfs_proxy ( ctx , c , sharename ,
2007-12-29 22:39:52 -08:00
& newserver , & newshare ,
2016-11-04 12:25:34 +01:00
force_encrypt , creds ) ) {
2005-05-09 22:39:20 +00:00
cli_shutdown ( c ) ;
2007-12-29 22:39:52 -08:00
return do_connect ( ctx , newserver ,
2017-06-23 17:03:05 +02:00
newshare , auth_info ,
2009-01-14 16:08:19 -08:00
force_encrypt , max_protocol ,
2011-07-03 12:08:54 +02:00
port , name_type , pcli ) ;
2005-05-09 22:39:20 +00:00
}
/* must be a normal share */
2016-12-09 09:06:38 +01:00
status = cli_tree_connect_creds ( c , sharename , " ????? " , creds ) ;
2009-01-26 08:37:13 +01:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
d_printf ( " tree connect failed: %s \n " , nt_errstr ( status ) ) ;
2005-02-24 21:54:52 +00:00
cli_shutdown ( c ) ;
2011-07-03 12:08:54 +02:00
return status ;
2005-02-24 21:54:52 +00:00
}
2008-01-05 00:23:35 -08:00
if ( force_encrypt ) {
2016-11-03 17:27:49 +01:00
status = cli_cm_force_encryption_creds ( c ,
creds ,
sharename ) ;
2008-01-05 00:23:35 -08:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
cli_shutdown ( c ) ;
2011-07-03 12:08:54 +02:00
return status ;
2008-01-05 00:23:35 -08:00
}
2007-12-29 22:39:52 -08:00
}
2005-02-24 21:54:52 +00:00
DEBUG ( 4 , ( " tconx ok \n " ) ) ;
2011-07-03 12:08:54 +02:00
* pcli = c ;
return NT_STATUS_OK ;
2005-02-24 21:54:52 +00:00
}
2005-02-26 14:42:55 +00:00
/****************************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2009-03-12 17:59:24 -07:00
static void cli_set_mntpoint ( struct cli_state * cli , const char * mnt )
2005-02-26 14:42:55 +00:00
{
2014-08-06 14:32:35 +05:30
TALLOC_CTX * frame = talloc_stackframe ( ) ;
char * name = clean_name ( frame , mnt ) ;
2009-03-12 17:59:24 -07:00
if ( ! name ) {
2014-08-06 14:32:35 +05:30
TALLOC_FREE ( frame ) ;
2009-03-12 17:59:24 -07:00
return ;
2007-11-29 17:25:41 -08:00
}
2009-03-12 17:59:24 -07:00
TALLOC_FREE ( cli - > dfs_mountpoint ) ;
cli - > dfs_mountpoint = talloc_strdup ( cli , name ) ;
2014-08-06 14:32:35 +05:30
TALLOC_FREE ( frame ) ;
2005-02-26 14:42:55 +00:00
}
2005-02-24 21:54:52 +00:00
/********************************************************************
2009-03-12 17:59:24 -07:00
Add a new connection to the list .
referring_cli = = NULL means a new initial connection .
2005-02-24 21:54:52 +00:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2011-07-03 12:12:45 +02:00
static NTSTATUS cli_cm_connect ( TALLOC_CTX * ctx ,
struct cli_state * referring_cli ,
const char * server ,
const char * share ,
const struct user_auth_info * auth_info ,
bool force_encrypt ,
int max_protocol ,
int port ,
int name_type ,
struct cli_state * * pcli )
2005-02-24 21:54:52 +00:00
{
2009-03-12 17:59:24 -07:00
struct cli_state * cli ;
2011-07-03 12:08:54 +02:00
NTSTATUS status ;
2007-11-29 13:24:54 -08:00
2011-07-03 12:08:54 +02:00
status = do_connect ( ctx , server , share ,
2009-03-17 14:53:06 -07:00
auth_info ,
2017-06-23 17:03:05 +02:00
force_encrypt , max_protocol ,
2011-07-03 12:08:54 +02:00
port , name_type , & cli ) ;
2005-02-24 21:54:52 +00:00
2011-07-03 12:08:54 +02:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2011-07-03 12:12:45 +02:00
return status ;
2005-02-24 21:54:52 +00:00
}
2009-03-12 17:59:24 -07:00
/* Enter into the list. */
if ( referring_cli ) {
2016-02-05 11:32:18 +01:00
DLIST_ADD_END ( referring_cli , cli ) ;
2009-03-12 17:59:24 -07:00
}
2005-02-26 14:42:55 +00:00
2010-04-13 18:41:14 -07:00
if ( referring_cli & & referring_cli - > requested_posix_capabilities ) {
2015-04-30 19:22:21 -07:00
uint16_t major , minor ;
uint32_t caplow , caphigh ;
2009-11-12 23:07:21 +01:00
status = cli_unix_extensions_version ( cli , & major , & minor ,
& caplow , & caphigh ) ;
if ( NT_STATUS_IS_OK ( status ) ) {
2009-03-12 17:59:24 -07:00
cli_set_unix_extensions_capabilities ( cli ,
2007-12-06 17:17:03 -08:00
major , minor ,
2007-12-06 17:16:33 -08:00
caplow , caphigh ) ;
}
}
2005-02-24 21:54:52 +00:00
2011-07-03 12:12:45 +02:00
* pcli = cli ;
return NT_STATUS_OK ;
2005-02-24 21:54:52 +00:00
}
/********************************************************************
2009-03-12 17:59:24 -07:00
Return a connection to a server on a particular share .
2005-02-24 21:54:52 +00:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2009-03-12 17:59:24 -07:00
static struct cli_state * cli_cm_find ( struct cli_state * cli ,
const char * server ,
const char * share )
2005-02-24 21:54:52 +00:00
{
2009-03-12 17:59:24 -07:00
struct cli_state * p ;
2005-02-24 21:54:52 +00:00
2009-03-12 17:59:24 -07:00
if ( cli = = NULL ) {
return NULL ;
}
/* Search to the start of the list. */
2010-02-06 12:40:38 +11:00
for ( p = cli ; p ; p = DLIST_PREV ( p ) ) {
2011-07-22 16:31:18 +02:00
const char * remote_name =
2012-05-19 17:31:50 +02:00
smbXcli_conn_remote_name ( p - > conn ) ;
2011-07-22 16:31:18 +02:00
if ( strequal ( server , remote_name ) & &
2009-03-12 17:59:24 -07:00
strequal ( share , p - > share ) ) {
return p ;
}
}
/* Search to the end of the list. */
for ( p = cli - > next ; p ; p = p - > next ) {
2011-07-22 16:31:18 +02:00
const char * remote_name =
2012-05-19 17:31:50 +02:00
smbXcli_conn_remote_name ( p - > conn ) ;
2011-07-22 16:31:18 +02:00
if ( strequal ( server , remote_name ) & &
2009-03-12 17:59:24 -07:00
strequal ( share , p - > share ) ) {
return p ;
2007-11-29 17:25:41 -08:00
}
2005-02-24 21:54:52 +00:00
}
return NULL ;
}
/****************************************************************************
2009-03-12 17:59:24 -07:00
Open a client connection to a \ \ server \ share .
2005-02-24 21:54:52 +00:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2011-07-03 19:59:37 +02:00
NTSTATUS cli_cm_open ( TALLOC_CTX * ctx ,
2007-12-06 17:16:33 -08:00
struct cli_state * referring_cli ,
2007-11-29 17:25:41 -08:00
const char * server ,
2007-03-12 17:55:24 +00:00
const char * share ,
2009-03-17 14:53:06 -07:00
const struct user_auth_info * auth_info ,
2009-01-14 14:26:56 -08:00
bool force_encrypt ,
2009-01-14 16:08:19 -08:00
int max_protocol ,
int port ,
2011-07-03 19:59:37 +02:00
int name_type ,
struct cli_state * * pcli )
2005-02-24 21:54:52 +00:00
{
2009-03-12 17:59:24 -07:00
/* Try to reuse an existing connection in this list. */
struct cli_state * c = cli_cm_find ( referring_cli , server , share ) ;
2011-07-03 12:12:45 +02:00
NTSTATUS status ;
2007-11-29 17:25:41 -08:00
2009-03-12 17:59:24 -07:00
if ( c ) {
2011-07-03 19:59:37 +02:00
* pcli = c ;
return NT_STATUS_OK ;
2009-03-12 17:59:24 -07:00
}
2005-02-24 21:54:52 +00:00
2009-03-17 14:53:06 -07:00
if ( auth_info = = NULL ) {
/* Can't do a new connection
* without auth info . */
d_printf ( " cli_cm_open() Unable to open connection [ \\ %s \\ %s] "
" without auth info \n " ,
server , share ) ;
2011-07-03 19:59:37 +02:00
return NT_STATUS_INVALID_PARAMETER ;
2009-03-17 14:53:06 -07:00
}
2011-07-03 12:12:45 +02:00
status = cli_cm_connect ( ctx ,
2009-03-17 14:53:06 -07:00
referring_cli ,
server ,
share ,
auth_info ,
force_encrypt ,
max_protocol ,
port ,
2011-07-03 12:12:45 +02:00
name_type ,
& c ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2011-07-03 19:59:37 +02:00
return status ;
2011-07-03 12:12:45 +02:00
}
2011-07-03 19:59:37 +02:00
* pcli = c ;
return NT_STATUS_OK ;
2005-02-24 21:54:52 +00:00
}
/****************************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2011-07-22 16:05:54 +02:00
void cli_cm_display ( struct cli_state * cli )
2005-02-24 21:54:52 +00:00
{
int i ;
2009-03-12 17:59:24 -07:00
for ( i = 0 ; cli ; cli = cli - > next , i + + ) {
2007-11-29 17:25:41 -08:00
d_printf ( " %d: \t server=%s, share=%s \n " ,
2012-05-19 17:31:50 +02:00
i , smbXcli_conn_remote_name ( cli - > conn ) , cli - > share ) ;
2005-02-24 21:54:52 +00:00
}
}
/****************************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2008-04-10 21:21:27 +02:00
/****************************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2009-03-17 14:53:06 -07:00
#if 0
2008-12-14 13:06:19 +01:00
void cli_cm_set_credentials ( struct user_auth_info * auth_info )
2005-02-24 21:54:52 +00:00
{
2007-11-29 17:25:41 -08:00
SAFE_FREE ( cm_creds . username ) ;
2008-12-14 13:06:19 +01:00
cm_creds . username = SMB_STRDUP ( get_cmdline_auth_info_username (
auth_info ) ) ;
2007-11-29 17:25:41 -08:00
2008-12-14 13:06:19 +01:00
if ( get_cmdline_auth_info_got_pass ( auth_info ) ) {
cm_set_password ( get_cmdline_auth_info_password ( auth_info ) ) ;
2007-11-29 17:25:41 -08:00
}
2008-12-14 13:06:19 +01:00
cm_creds . use_kerberos = get_cmdline_auth_info_use_kerberos ( auth_info ) ;
2008-04-10 21:21:27 +02:00
cm_creds . fallback_after_kerberos = false ;
2008-12-14 13:06:19 +01:00
cm_creds . signing_state = get_cmdline_auth_info_signing_state ( auth_info ) ;
2005-02-24 21:54:52 +00:00
}
2009-03-17 14:53:06 -07:00
# endif
2008-04-10 21:21:27 +02:00
2007-02-03 17:20:53 +00:00
/**********************************************************************
split a dfs path into the server , share name , and extrapath components
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2005-02-22 03:31:22 +00:00
2010-11-11 14:04:06 +01:00
static bool split_dfs_path ( TALLOC_CTX * ctx ,
2007-11-29 17:25:41 -08:00
const char * nodepath ,
char * * pp_server ,
char * * pp_share ,
char * * pp_extrapath )
2005-02-22 03:31:22 +00:00
{
2007-02-03 17:20:53 +00:00
char * p , * q ;
2007-11-29 17:25:41 -08:00
char * path ;
2005-02-22 03:31:22 +00:00
2007-11-29 17:25:41 -08:00
* pp_server = NULL ;
* pp_share = NULL ;
* pp_extrapath = NULL ;
path = talloc_strdup ( ctx , nodepath ) ;
if ( ! path ) {
2010-11-11 14:04:06 +01:00
goto fail ;
2007-11-29 17:25:41 -08:00
}
2005-02-22 03:31:22 +00:00
2007-03-12 17:55:24 +00:00
if ( path [ 0 ] ! = ' \\ ' ) {
2010-11-11 14:04:06 +01:00
goto fail ;
2007-03-12 17:55:24 +00:00
}
2005-02-22 03:31:22 +00:00
2007-02-03 17:20:53 +00:00
p = strchr_m ( path + 1 , ' \\ ' ) ;
2007-03-12 17:55:24 +00:00
if ( ! p ) {
2010-11-11 14:04:06 +01:00
goto fail ;
2007-03-12 17:55:24 +00:00
}
2005-02-22 03:31:22 +00:00
* p = ' \0 ' ;
p + + ;
2007-02-03 17:20:53 +00:00
/* Look for any extra/deep path */
q = strchr_m ( p , ' \\ ' ) ;
if ( q ! = NULL ) {
* q = ' \0 ' ;
q + + ;
2007-11-29 17:25:41 -08:00
* pp_extrapath = talloc_strdup ( ctx , q ) ;
2007-02-03 17:20:53 +00:00
} else {
2007-11-29 17:25:41 -08:00
* pp_extrapath = talloc_strdup ( ctx , " " ) ;
2007-02-03 17:20:53 +00:00
}
2010-11-11 14:04:06 +01:00
if ( * pp_extrapath = = NULL ) {
goto fail ;
}
2007-11-29 17:25:41 -08:00
* pp_share = talloc_strdup ( ctx , p ) ;
2010-11-11 14:04:06 +01:00
if ( * pp_share = = NULL ) {
goto fail ;
}
2007-11-29 17:25:41 -08:00
* pp_server = talloc_strdup ( ctx , & path [ 1 ] ) ;
2010-11-11 14:04:06 +01:00
if ( * pp_server = = NULL ) {
goto fail ;
}
TALLOC_FREE ( path ) ;
return true ;
fail :
TALLOC_FREE ( * pp_share ) ;
TALLOC_FREE ( * pp_extrapath ) ;
TALLOC_FREE ( path ) ;
return false ;
2005-02-22 03:31:22 +00:00
}
2005-02-23 17:29:28 +00:00
/****************************************************************************
2007-03-12 17:55:24 +00:00
Return the original path truncated at the directory component before
2007-11-29 17:25:41 -08:00
the first wildcard character . Trust the caller to provide a NULL
2005-02-23 17:29:28 +00:00
terminated string
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-11-29 17:25:41 -08:00
static char * clean_path ( TALLOC_CTX * ctx , const char * path )
2005-02-23 17:29:28 +00:00
{
2007-03-12 17:55:24 +00:00
size_t len ;
char * p1 , * p2 , * p ;
2007-11-29 17:25:41 -08:00
char * path_out ;
2007-03-12 17:55:24 +00:00
/* No absolute paths. */
while ( IS_DIRECTORY_SEP ( * path ) ) {
path + + ;
}
2007-11-29 17:25:41 -08:00
path_out = talloc_strdup ( ctx , path ) ;
if ( ! path_out ) {
return NULL ;
}
2007-03-12 17:55:24 +00:00
p1 = strchr_m ( path_out , ' * ' ) ;
p2 = strchr_m ( path_out , ' ? ' ) ;
if ( p1 | | p2 ) {
if ( p1 & & p2 ) {
p = MIN ( p1 , p2 ) ;
} else if ( ! p1 ) {
p = p2 ;
} else {
p = p1 ;
2005-02-23 17:29:28 +00:00
}
2007-03-12 17:55:24 +00:00
* p = ' \0 ' ;
/* Now go back to the start of this component. */
p1 = strrchr_m ( path_out , ' / ' ) ;
p2 = strrchr_m ( path_out , ' \\ ' ) ;
p = MAX ( p1 , p2 ) ;
if ( p ) {
2005-02-23 17:29:28 +00:00
* p = ' \0 ' ;
}
}
2007-03-12 17:55:24 +00:00
/* Strip any trailing separator */
len = strlen ( path_out ) ;
if ( ( len > 0 ) & & IS_DIRECTORY_SEP ( path_out [ len - 1 ] ) ) {
path_out [ len - 1 ] = ' \0 ' ;
}
2007-11-29 17:25:41 -08:00
return path_out ;
2005-02-23 17:29:28 +00:00
}
/****************************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2007-11-29 17:25:41 -08:00
static char * cli_dfs_make_full_path ( TALLOC_CTX * ctx ,
struct cli_state * cli ,
const char * dir )
2005-02-23 17:29:28 +00:00
{
2009-03-18 20:56:48 -07:00
char path_sep = ' \\ ' ;
2007-03-12 17:55:24 +00:00
/* Ensure the extrapath doesn't start with a separator. */
while ( IS_DIRECTORY_SEP ( * dir ) ) {
dir + + ;
2005-02-23 17:29:28 +00:00
}
2010-04-13 18:41:14 -07:00
if ( cli - > requested_posix_capabilities & CIFS_UNIX_POSIX_PATHNAMES_CAP ) {
2009-03-18 20:56:48 -07:00
path_sep = ' / ' ;
}
return talloc_asprintf ( ctx , " %c%s%c%s%c%s " ,
path_sep ,
2012-05-19 17:31:50 +02:00
smbXcli_conn_remote_name ( cli - > conn ) ,
2009-03-18 20:56:48 -07:00
path_sep ,
cli - > share ,
path_sep ,
dir ) ;
2005-02-23 17:29:28 +00:00
}
/********************************************************************
check for dfs referral
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2010-11-11 14:46:58 +01:00
static bool cli_dfs_check_error ( struct cli_state * cli , NTSTATUS expected ,
NTSTATUS status )
2005-02-23 17:29:28 +00:00
{
/* only deal with DS when we negotiated NT_STATUS codes and UNICODE */
2013-05-17 20:13:50 +02:00
if ( ! ( smbXcli_conn_use_unicode ( cli - > conn ) ) ) {
2007-11-29 17:25:41 -08:00
return false ;
2010-11-11 14:46:58 +01:00
}
2012-05-19 18:23:40 +02:00
if ( ! ( smb1cli_conn_capabilities ( cli - > conn ) & CAP_STATUS32 ) ) {
2010-11-11 14:46:58 +01:00
return false ;
}
if ( NT_STATUS_EQUAL ( status , expected ) ) {
2007-11-29 17:25:41 -08:00
return true ;
2010-11-11 14:46:58 +01:00
}
2007-11-29 17:25:41 -08:00
return false ;
2005-02-23 17:29:28 +00:00
}
2005-02-22 03:31:22 +00:00
/********************************************************************
2007-11-29 17:25:41 -08:00
Get the dfs referral link .
2005-02-22 03:31:22 +00:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2017-06-26 09:43:31 -07:00
NTSTATUS cli_dfs_get_referral_ex ( TALLOC_CTX * ctx ,
2007-12-07 12:02:44 -08:00
struct cli_state * cli ,
2007-11-29 17:25:41 -08:00
const char * path ,
2017-06-26 09:43:31 -07:00
uint16_t max_referral_level ,
2009-11-21 21:36:01 +01:00
struct client_dfs_referral * * refs ,
2007-03-12 17:55:24 +00:00
size_t * num_refs ,
2009-06-30 15:29:08 -07:00
size_t * consumed )
2005-02-22 03:31:22 +00:00
{
unsigned int param_len = 0 ;
2011-07-06 13:04:26 +02:00
uint16_t recv_flags2 ;
2010-11-11 14:54:25 +01:00
uint8_t * param = NULL ;
uint8_t * rdata = NULL ;
2005-02-22 03:31:22 +00:00
char * p ;
2007-12-07 12:02:44 -08:00
char * endp ;
2009-06-30 15:29:08 -07:00
smb_ucs2_t * path_ucs ;
char * consumed_path = NULL ;
uint16_t consumed_ucs ;
2015-04-30 19:22:21 -07:00
uint16_t num_referrals ;
2009-11-21 21:36:01 +01:00
struct client_dfs_referral * referrals = NULL ;
2010-11-11 14:54:25 +01:00
NTSTATUS status ;
2011-07-07 08:58:25 +02:00
TALLOC_CTX * frame = talloc_stackframe ( ) ;
2007-11-29 17:25:41 -08:00
2007-12-07 12:02:44 -08:00
* num_refs = 0 ;
* refs = NULL ;
2011-07-06 18:36:29 +02:00
param = talloc_array ( talloc_tos ( ) , uint8_t , 2 ) ;
2007-12-07 12:02:44 -08:00
if ( ! param ) {
2010-11-11 14:54:25 +01:00
status = NT_STATUS_NO_MEMORY ;
2009-06-30 15:29:08 -07:00
goto out ;
2007-12-07 12:02:44 -08:00
}
2017-06-26 09:43:31 -07:00
SSVAL ( param , 0 , max_referral_level ) ;
2005-02-22 03:31:22 +00:00
2012-05-26 12:14:51 +02:00
param = trans2_bytes_push_str ( param , smbXcli_conn_use_unicode ( cli - > conn ) ,
2011-07-06 18:36:29 +02:00
path , strlen ( path ) + 1 ,
NULL ) ;
if ( ! param ) {
status = NT_STATUS_NO_MEMORY ;
goto out ;
}
param_len = talloc_get_size ( param ) ;
path_ucs = ( smb_ucs2_t * ) & param [ 2 ] ;
2005-02-22 03:31:22 +00:00
2013-10-13 16:54:18 +02:00
if ( smbXcli_conn_protocol ( cli - > conn ) > = PROTOCOL_SMB2_02 ) {
DATA_BLOB in_input_buffer ;
DATA_BLOB in_output_buffer = data_blob_null ;
DATA_BLOB out_input_buffer = data_blob_null ;
DATA_BLOB out_output_buffer = data_blob_null ;
in_input_buffer . data = param ;
in_input_buffer . length = param_len ;
status = smb2cli_ioctl ( cli - > conn ,
cli - > timeout ,
cli - > smb2 . session ,
cli - > smb2 . tcon ,
UINT64_MAX , /* in_fid_persistent */
UINT64_MAX , /* in_fid_volatile */
FSCTL_DFS_GET_REFERRALS ,
0 , /* in_max_input_length */
& in_input_buffer ,
CLI_BUFFER_SIZE , /* in_max_output_length */
& in_output_buffer ,
SMB2_IOCTL_FLAG_IS_FSCTL ,
talloc_tos ( ) ,
& out_input_buffer ,
& out_output_buffer ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto out ;
}
2007-11-29 17:25:41 -08:00
2013-10-13 16:54:18 +02:00
if ( out_output_buffer . length < 4 ) {
status = NT_STATUS_INVALID_NETWORK_RESPONSE ;
goto out ;
}
recv_flags2 = FLAGS2_UNICODE_STRINGS ;
rdata = out_output_buffer . data ;
endp = ( char * ) rdata + out_output_buffer . length ;
} else {
unsigned int data_len = 0 ;
uint16_t setup [ 1 ] ;
SSVAL ( setup , 0 , TRANSACT2_GET_DFS_REFERRAL ) ;
status = cli_trans ( talloc_tos ( ) , cli , SMBtrans2 ,
NULL , 0xffff , 0 , 0 ,
setup , 1 , 0 ,
param , param_len , 2 ,
NULL , 0 , CLI_BUFFER_SIZE ,
& recv_flags2 ,
NULL , 0 , NULL , /* rsetup */
NULL , 0 , NULL ,
& rdata , 4 , & data_len ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
goto out ;
}
endp = ( char * ) rdata + data_len ;
}
2007-12-07 12:02:44 -08:00
2009-06-30 15:29:08 -07:00
consumed_ucs = SVAL ( rdata , 0 ) ;
2007-12-07 12:02:44 -08:00
num_referrals = SVAL ( rdata , 2 ) ;
2009-06-30 15:29:08 -07:00
/* consumed_ucs is the number of bytes
* of the UCS2 path consumed not counting any
* terminating null . We need to convert
* back to unix charset and count again
* to get the number of bytes consumed from
* the incoming path . */
2011-07-06 15:57:22 +02:00
errno = 0 ;
2009-06-30 15:29:08 -07:00
if ( pull_string_talloc ( talloc_tos ( ) ,
NULL ,
0 ,
& consumed_path ,
path_ucs ,
consumed_ucs ,
STR_UNICODE ) = = 0 ) {
2011-07-06 15:57:22 +02:00
if ( errno ! = 0 ) {
status = map_nt_error_from_unix ( errno ) ;
} else {
status = NT_STATUS_INVALID_NETWORK_RESPONSE ;
}
2009-06-30 15:29:08 -07:00
goto out ;
}
if ( consumed_path = = NULL ) {
2011-07-06 15:57:22 +02:00
status = map_nt_error_from_unix ( errno ) ;
2009-06-30 15:29:08 -07:00
goto out ;
}
* consumed = strlen ( consumed_path ) ;
2007-12-07 12:02:44 -08:00
if ( num_referrals ! = 0 ) {
2015-04-30 19:22:21 -07:00
uint16_t ref_version ;
uint16_t ref_size ;
2005-02-22 03:31:22 +00:00
int i ;
2015-04-30 19:22:21 -07:00
uint16_t node_offset ;
2007-03-12 17:55:24 +00:00
2009-11-21 21:36:01 +01:00
referrals = talloc_array ( ctx , struct client_dfs_referral ,
num_referrals ) ;
2007-03-12 17:55:24 +00:00
2007-12-07 12:02:44 -08:00
if ( ! referrals ) {
2011-07-06 15:57:22 +02:00
status = NT_STATUS_NO_MEMORY ;
2007-12-07 12:02:44 -08:00
goto out ;
}
2005-02-22 03:31:22 +00:00
/* start at the referrals array */
2007-11-29 17:25:41 -08:00
2010-11-11 14:54:25 +01:00
p = ( char * ) rdata + 8 ;
2007-12-07 12:02:44 -08:00
for ( i = 0 ; i < num_referrals & & p < endp ; i + + ) {
if ( p + 18 > endp ) {
goto out ;
}
ref_version = SVAL ( p , 0 ) ;
ref_size = SVAL ( p , 2 ) ;
node_offset = SVAL ( p , 16 ) ;
2007-11-29 17:25:41 -08:00
2007-12-07 12:02:44 -08:00
if ( ref_version ! = 3 ) {
2005-02-22 03:31:22 +00:00
p + = ref_size ;
continue ;
}
2007-11-29 17:25:41 -08:00
2007-12-07 12:02:44 -08:00
referrals [ i ] . proximity = SVAL ( p , 8 ) ;
referrals [ i ] . ttl = SVAL ( p , 10 ) ;
2005-02-22 03:31:22 +00:00
2007-12-07 12:02:44 -08:00
if ( p + node_offset > endp ) {
2011-07-06 15:57:22 +02:00
status = NT_STATUS_INVALID_NETWORK_RESPONSE ;
2007-12-07 12:02:44 -08:00
goto out ;
}
2011-07-06 13:04:26 +02:00
clistr_pull_talloc ( referrals ,
( const char * ) rdata ,
recv_flags2 ,
2009-01-26 03:38:05 +01:00
& referrals [ i ] . dfspath ,
2011-03-24 13:00:37 +11:00
p + node_offset ,
2011-07-06 13:04:26 +02:00
PTR_DIFF ( endp , p + node_offset ) ,
2009-01-26 03:38:05 +01:00
STR_TERMINATE | STR_UNICODE ) ;
2005-02-22 03:31:22 +00:00
2007-12-07 12:02:44 -08:00
if ( ! referrals [ i ] . dfspath ) {
2011-07-06 15:57:22 +02:00
status = map_nt_error_from_unix ( errno ) ;
2007-12-07 12:02:44 -08:00
goto out ;
}
2005-02-22 03:31:22 +00:00
p + = ref_size ;
}
2007-12-07 12:02:44 -08:00
if ( i < num_referrals ) {
2011-07-06 15:57:22 +02:00
status = NT_STATUS_INVALID_NETWORK_RESPONSE ;
2007-12-07 12:02:44 -08:00
goto out ;
}
2005-02-22 03:31:22 +00:00
}
2007-11-29 17:25:41 -08:00
2005-02-22 03:31:22 +00:00
* num_refs = num_referrals ;
* refs = referrals ;
2007-12-07 12:02:44 -08:00
out :
2011-07-07 08:58:25 +02:00
TALLOC_FREE ( frame ) ;
2010-11-11 14:54:25 +01:00
return status ;
2005-02-22 03:31:22 +00:00
}
2017-06-26 09:43:31 -07:00
NTSTATUS cli_dfs_get_referral ( TALLOC_CTX * ctx ,
struct cli_state * cli ,
const char * path ,
struct client_dfs_referral * * refs ,
size_t * num_refs ,
size_t * consumed )
{
return cli_dfs_get_referral_ex ( ctx ,
cli ,
path ,
3 ,
refs , /* Max referral level we want */
num_refs ,
consumed ) ;
}
2005-02-23 17:29:28 +00:00
/********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2015-01-16 16:21:22 +01:00
struct cli_dfs_path_split {
char * server ;
char * share ;
char * extrapath ;
} ;
2005-02-23 17:29:28 +00:00
2011-07-03 20:53:55 +02:00
NTSTATUS cli_resolve_path ( TALLOC_CTX * ctx ,
const char * mountpt ,
const struct user_auth_info * dfs_auth_info ,
struct cli_state * rootcli ,
const char * path ,
struct cli_state * * targetcli ,
char * * pp_targetpath )
2005-02-23 17:29:28 +00:00
{
2009-11-21 21:36:01 +01:00
struct client_dfs_referral * refs = NULL ;
2007-12-07 12:02:44 -08:00
size_t num_refs = 0 ;
2009-06-30 15:29:08 -07:00
size_t consumed = 0 ;
2007-11-29 17:25:41 -08:00
struct cli_state * cli_ipc = NULL ;
char * dfs_path = NULL ;
char * cleanpath = NULL ;
char * extrapath = NULL ;
2005-02-23 17:29:28 +00:00
int pathlen ;
2007-11-29 17:25:41 -08:00
struct cli_state * newcli = NULL ;
2015-01-16 16:21:22 +01:00
struct cli_state * ccli = NULL ;
int count = 0 ;
2007-11-29 17:25:41 -08:00
char * newpath = NULL ;
char * newmount = NULL ;
char * ppath = NULL ;
2005-02-23 17:29:28 +00:00
SMB_STRUCT_STAT sbuf ;
2015-04-30 19:22:21 -07:00
uint32_t attributes ;
2010-02-07 14:07:17 +01:00
NTSTATUS status ;
2013-09-27 05:44:33 +02:00
struct smbXcli_tcon * root_tcon = NULL ;
struct smbXcli_tcon * target_tcon = NULL ;
2015-01-16 16:21:22 +01:00
struct cli_dfs_path_split * dfs_refs = NULL ;
2007-11-29 17:25:41 -08:00
2007-03-08 23:54:57 +00:00
if ( ! rootcli | | ! path | | ! targetcli ) {
2011-07-03 20:53:55 +02:00
return NT_STATUS_INVALID_PARAMETER ;
2007-03-08 23:54:57 +00:00
}
2007-11-29 17:25:41 -08:00
2007-03-12 17:55:24 +00:00
/* Don't do anything if this is not a DFS root. */
2005-02-23 17:29:28 +00:00
2013-09-27 05:44:33 +02:00
if ( smbXcli_conn_protocol ( rootcli - > conn ) > = PROTOCOL_SMB2_02 ) {
root_tcon = rootcli - > smb2 . tcon ;
} else {
root_tcon = rootcli - > smb1 . tcon ;
}
2017-06-19 14:13:37 +02:00
/*
* Avoid more than one leading directory separator
*/
while ( IS_DIRECTORY_SEP ( path [ 0 ] ) & & IS_DIRECTORY_SEP ( path [ 1 ] ) ) {
path + + ;
}
2013-09-27 05:44:33 +02:00
if ( ! smbXcli_tcon_is_dfs_share ( root_tcon ) ) {
2005-02-23 17:29:28 +00:00
* targetcli = rootcli ;
2007-11-29 17:25:41 -08:00
* pp_targetpath = talloc_strdup ( ctx , path ) ;
if ( ! * pp_targetpath ) {
2011-07-03 20:53:55 +02:00
return NT_STATUS_NO_MEMORY ;
2007-11-29 17:25:41 -08:00
}
2011-07-03 20:53:55 +02:00
return NT_STATUS_OK ;
2005-02-23 17:29:28 +00:00
}
2007-03-12 17:55:24 +00:00
* targetcli = NULL ;
/* Send a trans2_query_path_info to check for a referral. */
2007-11-29 17:25:41 -08:00
cleanpath = clean_path ( ctx , path ) ;
if ( ! cleanpath ) {
2011-07-03 20:53:55 +02:00
return NT_STATUS_NO_MEMORY ;
2007-11-29 17:25:41 -08:00
}
dfs_path = cli_dfs_make_full_path ( ctx , rootcli , cleanpath ) ;
if ( ! dfs_path ) {
2011-07-03 20:53:55 +02:00
return NT_STATUS_NO_MEMORY ;
2007-11-29 17:25:41 -08:00
}
2007-03-12 17:55:24 +00:00
2010-02-07 14:07:17 +01:00
status = cli_qpathinfo_basic ( rootcli , dfs_path , & sbuf , & attributes ) ;
if ( NT_STATUS_IS_OK ( status ) ) {
2007-03-12 17:55:24 +00:00
/* This is an ordinary path, just return it. */
* targetcli = rootcli ;
2007-11-29 17:25:41 -08:00
* pp_targetpath = talloc_strdup ( ctx , path ) ;
if ( ! * pp_targetpath ) {
2011-07-03 20:53:55 +02:00
return NT_STATUS_NO_MEMORY ;
2007-11-29 17:25:41 -08:00
}
2007-03-12 17:55:24 +00:00
goto done ;
}
/* Special case where client asked for a path that does not exist */
2005-05-10 12:21:02 +00:00
2010-11-11 14:46:58 +01:00
if ( cli_dfs_check_error ( rootcli , NT_STATUS_OBJECT_NAME_NOT_FOUND ,
status ) ) {
2005-05-10 12:21:02 +00:00
* targetcli = rootcli ;
2007-11-29 17:25:41 -08:00
* pp_targetpath = talloc_strdup ( ctx , path ) ;
if ( ! * pp_targetpath ) {
2011-07-03 20:53:55 +02:00
return NT_STATUS_NO_MEMORY ;
2007-11-29 17:25:41 -08:00
}
2007-03-08 23:54:57 +00:00
goto done ;
2005-05-10 12:21:02 +00:00
}
2007-03-12 17:55:24 +00:00
/* We got an error, check for DFS referral. */
2010-11-11 14:46:58 +01:00
if ( ! cli_dfs_check_error ( rootcli , NT_STATUS_PATH_NOT_COVERED ,
status ) ) {
2011-07-03 20:53:55 +02:00
return status ;
2007-03-08 23:54:57 +00:00
}
2005-02-23 17:29:28 +00:00
2007-03-12 17:55:24 +00:00
/* Check for the referral. */
2005-02-23 17:29:28 +00:00
2011-07-03 19:59:37 +02:00
status = cli_cm_open ( ctx ,
rootcli ,
2012-05-19 17:31:50 +02:00
smbXcli_conn_remote_name ( rootcli - > conn ) ,
2011-07-03 19:59:37 +02:00
" IPC$ " ,
dfs_auth_info ,
2016-12-17 10:36:49 +01:00
cli_state_is_encryption_on ( rootcli ) ,
2012-05-19 18:09:30 +02:00
smbXcli_conn_protocol ( rootcli - > conn ) ,
2011-07-03 19:59:37 +02:00
0 ,
0x20 ,
& cli_ipc ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
2011-07-03 20:53:55 +02:00
return status ;
2007-03-08 23:54:57 +00:00
}
2007-11-29 17:25:41 -08:00
2010-11-11 14:54:25 +01:00
status = cli_dfs_get_referral ( ctx , cli_ipc , dfs_path , & refs ,
& num_refs , & consumed ) ;
2015-09-10 16:04:27 +05:30
if ( ! NT_STATUS_IS_OK ( status ) ) {
2011-07-03 20:53:55 +02:00
return status ;
2005-02-23 17:29:28 +00:00
}
2007-11-29 17:25:41 -08:00
2015-09-10 16:04:27 +05:30
if ( ! num_refs | | ! refs [ 0 ] . dfspath ) {
2011-07-03 20:53:55 +02:00
return NT_STATUS_NOT_FOUND ;
2007-12-07 12:02:44 -08:00
}
2015-01-16 16:21:22 +01:00
/*
* Bug # 10123 - DFS referal entries can be provided in a random order ,
* so check the connection cache for each item to avoid unnecessary
* reconnections .
*/
dfs_refs = talloc_array ( ctx , struct cli_dfs_path_split , num_refs ) ;
if ( dfs_refs = = NULL ) {
return NT_STATUS_NO_MEMORY ;
}
for ( count = 0 ; count < num_refs ; count + + ) {
if ( ! split_dfs_path ( dfs_refs , refs [ count ] . dfspath ,
& dfs_refs [ count ] . server ,
& dfs_refs [ count ] . share ,
& dfs_refs [ count ] . extrapath ) ) {
TALLOC_FREE ( dfs_refs ) ;
return NT_STATUS_NOT_FOUND ;
}
ccli = cli_cm_find ( rootcli , dfs_refs [ count ] . server ,
dfs_refs [ count ] . share ) ;
if ( ccli ! = NULL ) {
extrapath = dfs_refs [ count ] . extrapath ;
* targetcli = ccli ;
break ;
}
}
/*
* If no cached connection was found , then connect to the first live
* referral server in the list .
*/
for ( count = 0 ; ( ccli = = NULL ) & & ( count < num_refs ) ; count + + ) {
/* Connect to the target server & share */
status = cli_cm_connect ( ctx , rootcli ,
dfs_refs [ count ] . server ,
dfs_refs [ count ] . share ,
dfs_auth_info ,
2016-12-17 10:36:49 +01:00
cli_state_is_encryption_on ( rootcli ) ,
2015-01-16 16:21:22 +01:00
smbXcli_conn_protocol ( rootcli - > conn ) ,
0 ,
0x20 ,
targetcli ) ;
if ( ! NT_STATUS_IS_OK ( status ) ) {
d_printf ( " Unable to follow dfs referral [ \\ %s \\ %s] \n " ,
dfs_refs [ count ] . server ,
dfs_refs [ count ] . share ) ;
continue ;
} else {
extrapath = dfs_refs [ count ] . extrapath ;
break ;
}
}
/* No available referral server for the connection */
if ( * targetcli = = NULL ) {
TALLOC_FREE ( dfs_refs ) ;
return status ;
2007-11-29 17:25:41 -08:00
}
2007-03-12 17:55:24 +00:00
/* Make sure to recreate the original string including any wildcards. */
2007-11-29 17:25:41 -08:00
dfs_path = cli_dfs_make_full_path ( ctx , rootcli , path ) ;
if ( ! dfs_path ) {
2015-01-16 16:21:22 +01:00
TALLOC_FREE ( dfs_refs ) ;
2011-07-03 20:53:55 +02:00
return NT_STATUS_NO_MEMORY ;
2007-11-29 17:25:41 -08:00
}
2009-06-30 15:29:08 -07:00
pathlen = strlen ( dfs_path ) ;
2007-11-29 17:25:41 -08:00
consumed = MIN ( pathlen , consumed ) ;
2009-06-30 15:29:08 -07:00
* pp_targetpath = talloc_strdup ( ctx , & dfs_path [ consumed ] ) ;
2007-11-29 17:25:41 -08:00
if ( ! * pp_targetpath ) {
2015-01-16 16:21:22 +01:00
TALLOC_FREE ( dfs_refs ) ;
2011-07-03 20:53:55 +02:00
return NT_STATUS_NO_MEMORY ;
2007-11-29 17:25:41 -08:00
}
2009-06-30 15:29:08 -07:00
dfs_path [ consumed ] = ' \0 ' ;
2007-03-12 17:55:24 +00:00
/*
2007-11-29 17:25:41 -08:00
* * pp_targetpath is now the unconsumed part of the path .
* dfs_path is now the consumed part of the path
* ( in \ server \ share \ path format ) .
2007-03-12 17:55:24 +00:00
*/
2007-11-29 17:25:41 -08:00
if ( extrapath & & strlen ( extrapath ) > 0 ) {
2011-03-26 15:39:27 -07:00
/* EMC Celerra NAS version 5.6.50 (at least) doesn't appear to */
/* put the trailing \ on the path, so to be save we put one in if needed */
if ( extrapath [ strlen ( extrapath ) - 1 ] ! = ' \\ ' & & * * pp_targetpath ! = ' \\ ' ) {
* pp_targetpath = talloc_asprintf ( ctx ,
" %s \\ %s " ,
extrapath ,
* pp_targetpath ) ;
} else {
* pp_targetpath = talloc_asprintf ( ctx ,
" %s%s " ,
extrapath ,
* pp_targetpath ) ;
}
2007-11-29 17:25:41 -08:00
if ( ! * pp_targetpath ) {
2015-01-16 16:21:22 +01:00
TALLOC_FREE ( dfs_refs ) ;
2011-07-03 20:53:55 +02:00
return NT_STATUS_NO_MEMORY ;
2007-11-29 17:25:41 -08:00
}
2007-03-12 17:55:24 +00:00
}
2007-11-29 17:25:41 -08:00
2005-02-26 15:03:16 +00:00
/* parse out the consumed mount path */
/* trim off the \server\share\ */
2005-02-23 20:00:26 +00:00
2007-03-12 17:55:24 +00:00
ppath = dfs_path ;
if ( * ppath ! = ' \\ ' ) {
2007-11-29 17:25:41 -08:00
d_printf ( " cli_resolve_path: "
" dfs_path (%s) not in correct format. \n " ,
2007-03-12 17:55:24 +00:00
dfs_path ) ;
2015-01-16 16:21:22 +01:00
TALLOC_FREE ( dfs_refs ) ;
2011-07-03 20:53:55 +02:00
return NT_STATUS_NOT_FOUND ;
2007-03-08 23:54:57 +00:00
}
2007-03-12 17:55:24 +00:00
ppath + + ; /* Now pointing at start of server name. */
2007-11-29 17:25:41 -08:00
2007-03-12 17:55:24 +00:00
if ( ( ppath = strchr_m ( dfs_path , ' \\ ' ) ) = = NULL ) {
2015-01-16 16:21:22 +01:00
TALLOC_FREE ( dfs_refs ) ;
2011-07-03 20:53:55 +02:00
return NT_STATUS_NOT_FOUND ;
2007-03-08 23:54:57 +00:00
}
2007-03-12 17:55:24 +00:00
ppath + + ; /* Now pointing at start of share name. */
2007-03-08 23:54:57 +00:00
2007-03-12 17:55:24 +00:00
if ( ( ppath = strchr_m ( ppath + 1 , ' \\ ' ) ) = = NULL ) {
2015-01-16 16:21:22 +01:00
TALLOC_FREE ( dfs_refs ) ;
2011-07-03 20:53:55 +02:00
return NT_STATUS_NOT_FOUND ;
2007-03-08 23:54:57 +00:00
}
2007-03-12 17:55:24 +00:00
ppath + + ; /* Now pointing at path component. */
2007-11-29 17:25:41 -08:00
newmount = talloc_asprintf ( ctx , " %s \\ %s " , mountpt , ppath ) ;
if ( ! newmount ) {
2015-01-16 16:21:22 +01:00
TALLOC_FREE ( dfs_refs ) ;
2011-07-03 20:53:55 +02:00
return NT_STATUS_NOT_FOUND ;
2007-11-29 17:25:41 -08:00
}
2007-03-12 17:55:24 +00:00
2009-03-12 17:59:24 -07:00
cli_set_mntpoint ( * targetcli , newmount ) ;
2005-02-26 15:03:16 +00:00
2007-11-29 17:25:41 -08:00
/* Check for another dfs referral, note that we are not
2007-03-12 17:55:24 +00:00
checking for loops here . */
2005-02-23 20:00:26 +00:00
2007-11-29 17:25:41 -08:00
if ( ! strequal ( * pp_targetpath , " \\ " ) & & ! strequal ( * pp_targetpath , " / " ) ) {
2011-07-03 20:53:55 +02:00
status = cli_resolve_path ( ctx ,
newmount ,
dfs_auth_info ,
* targetcli ,
* pp_targetpath ,
& newcli ,
& newpath ) ;
if ( NT_STATUS_IS_OK ( status ) ) {
2007-03-12 17:55:24 +00:00
/*
* When cli_resolve_path returns true here it ' s always
* returning the complete path in newpath , so we ' re done
* here .
*/
2005-02-24 19:10:28 +00:00
* targetcli = newcli ;
2007-11-29 17:25:41 -08:00
* pp_targetpath = newpath ;
2015-01-16 16:21:22 +01:00
TALLOC_FREE ( dfs_refs ) ;
2011-07-03 20:53:55 +02:00
return status ;
2005-02-24 19:10:28 +00:00
}
2005-02-23 20:00:26 +00:00
}
2005-02-26 15:03:16 +00:00
2007-03-08 23:54:57 +00:00
done :
2013-09-27 05:44:33 +02:00
if ( smbXcli_conn_protocol ( ( * targetcli ) - > conn ) > = PROTOCOL_SMB2_02 ) {
target_tcon = ( * targetcli ) - > smb2 . tcon ;
} else {
target_tcon = ( * targetcli ) - > smb1 . tcon ;
}
2007-11-29 17:25:41 -08:00
/* If returning true ensure we return a dfs root full path. */
2013-09-27 05:44:33 +02:00
if ( smbXcli_tcon_is_dfs_share ( target_tcon ) ) {
2007-11-29 17:25:41 -08:00
dfs_path = talloc_strdup ( ctx , * pp_targetpath ) ;
if ( ! dfs_path ) {
2015-01-16 16:21:22 +01:00
TALLOC_FREE ( dfs_refs ) ;
2011-07-03 20:53:55 +02:00
return NT_STATUS_NO_MEMORY ;
2007-11-29 17:25:41 -08:00
}
* pp_targetpath = cli_dfs_make_full_path ( ctx , * targetcli , dfs_path ) ;
2011-07-03 20:53:55 +02:00
if ( * pp_targetpath = = NULL ) {
2015-01-16 16:21:22 +01:00
TALLOC_FREE ( dfs_refs ) ;
2011-07-03 20:53:55 +02:00
return NT_STATUS_NO_MEMORY ;
}
2007-03-08 23:54:57 +00:00
}
2015-01-16 16:21:22 +01:00
TALLOC_FREE ( dfs_refs ) ;
2011-07-03 20:53:55 +02:00
return NT_STATUS_OK ;
2007-11-29 17:25:41 -08:00
}
2005-05-09 22:39:20 +00:00
/********************************************************************
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
2009-10-28 12:48:36 -07:00
bool cli_check_msdfs_proxy ( TALLOC_CTX * ctx ,
2007-11-29 17:25:41 -08:00
struct cli_state * cli ,
const char * sharename ,
char * * pp_newserver ,
2007-12-29 22:39:52 -08:00
char * * pp_newshare ,
bool force_encrypt ,
2016-11-04 12:25:34 +01:00
struct cli_credentials * creds )
2005-05-09 22:39:20 +00:00
{
2009-11-21 21:36:01 +01:00
struct client_dfs_referral * refs = NULL ;
2007-12-07 12:02:44 -08:00
size_t num_refs = 0 ;
2009-06-30 15:29:08 -07:00
size_t consumed = 0 ;
2007-11-29 17:25:41 -08:00
char * fullpath = NULL ;
2007-10-18 17:40:25 -07:00
bool res ;
2017-06-13 16:56:48 -07:00
struct smbXcli_tcon * orig_tcon = NULL ;
2007-11-29 17:25:41 -08:00
char * newextrapath = NULL ;
2010-01-03 18:46:57 +01:00
NTSTATUS status ;
2011-07-24 15:21:32 +02:00
const char * remote_name ;
2007-11-29 17:25:41 -08:00
if ( ! cli | | ! sharename ) {
return false ;
}
2005-05-09 22:39:20 +00:00
2012-05-19 17:31:50 +02:00
remote_name = smbXcli_conn_remote_name ( cli - > conn ) ;
2006-02-03 22:19:41 +00:00
2005-05-09 22:39:20 +00:00
/* special case. never check for a referral on the IPC$ share */
2007-11-29 17:25:41 -08:00
if ( strequal ( sharename , " IPC$ " ) ) {
return false ;
2007-03-12 17:55:24 +00:00
}
2007-11-29 17:25:41 -08:00
2005-05-09 22:39:20 +00:00
/* send a trans2_query_path_info to check for a referral */
2007-11-29 17:25:41 -08:00
2011-07-22 16:31:18 +02:00
fullpath = talloc_asprintf ( ctx , " \\ %s \\ %s " , remote_name , sharename ) ;
2007-11-29 17:25:41 -08:00
if ( ! fullpath ) {
return false ;
}
2005-05-09 22:39:20 +00:00
2017-06-13 16:56:48 -07:00
/* Store tcon state. */
if ( cli_state_has_tcon ( cli ) ) {
orig_tcon = cli_state_save_tcon ( cli ) ;
if ( orig_tcon = = NULL ) {
return false ;
}
}
2005-05-09 22:39:20 +00:00
/* check for the referral */
2016-12-08 07:13:57 +01:00
if ( ! NT_STATUS_IS_OK ( cli_tree_connect ( cli , " IPC$ " , " IPC " , NULL ) ) ) {
2017-06-13 16:56:48 -07:00
cli_state_restore_tcon ( cli , orig_tcon ) ;
2007-11-29 17:25:41 -08:00
return false ;
2006-02-03 22:19:41 +00:00
}
2008-01-05 00:23:35 -08:00
if ( force_encrypt ) {
2016-11-04 12:25:34 +01:00
status = cli_cm_force_encryption_creds ( cli , creds , " IPC$ " ) ;
2008-01-05 00:23:35 -08:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2017-06-13 16:56:48 -07:00
cli_state_restore_tcon ( cli , orig_tcon ) ;
2008-01-05 00:23:35 -08:00
return false ;
}
2007-12-29 22:39:52 -08:00
}
2010-11-11 14:54:25 +01:00
status = cli_dfs_get_referral ( ctx , cli , fullpath , & refs ,
& num_refs , & consumed ) ;
res = NT_STATUS_IS_OK ( status ) ;
2006-02-03 22:19:41 +00:00
2010-01-03 18:46:57 +01:00
status = cli_tdis ( cli ) ;
2017-06-13 16:56:48 -07:00
cli_state_restore_tcon ( cli , orig_tcon ) ;
2010-01-03 18:46:57 +01:00
if ( ! NT_STATUS_IS_OK ( status ) ) {
2007-11-29 17:25:41 -08:00
return false ;
2006-02-03 22:19:41 +00:00
}
2007-11-29 17:25:41 -08:00
if ( ! res | | ! num_refs ) {
2007-12-07 12:02:44 -08:00
return false ;
}
if ( ! refs [ 0 ] . dfspath ) {
2007-11-29 17:25:41 -08:00
return false ;
}
2010-11-11 14:04:06 +01:00
if ( ! split_dfs_path ( ctx , refs [ 0 ] . dfspath , pp_newserver ,
pp_newshare , & newextrapath ) ) {
2007-11-29 17:25:41 -08:00
return false ;
2005-05-09 22:39:20 +00:00
}
/* check that this is not a self-referral */
2011-07-22 16:31:18 +02:00
if ( strequal ( remote_name , * pp_newserver ) & &
2007-11-29 17:25:41 -08:00
strequal ( sharename , * pp_newshare ) ) {
return false ;
2006-07-28 20:35:00 +00:00
}
2007-11-29 17:25:41 -08:00
return true ;
2005-05-09 22:39:20 +00:00
}