1998-03-11 21:11:04 +00:00
/*
* Unix SMB / Netbios implementation .
* Version 1.9 .
* RPC Pipe client / server routines
* Copyright ( C ) Andrew Tridgell 1992 - 1997 ,
* Copyright ( C ) Luke Kenneth Casson Leighton 1996 - 1997 ,
* Copyright ( C ) Paul Ashton 1997.
1998-04-28 01:24:40 +00:00
* Copyright ( C ) Jeremy Allison 1998.
*
1998-03-11 21:11:04 +00:00
* This program is free software ; you can redistribute it and / or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation ; either version 2 of the License , or
* ( at your option ) any later version .
*
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU General Public License for more details .
*
* You should have received a copy of the GNU General Public License
* along with this program ; if not , write to the Free Software
* Foundation , Inc . , 675 Mass Ave , Cambridge , MA 0213 9 , USA .
*/
# ifdef SYSLOG
# undef SYSLOG
# endif
# include "includes.h"
extern int DEBUGLEVEL ;
1998-09-25 21:01:52 +00:00
extern pstring scope ;
1998-04-28 01:24:40 +00:00
extern pstring global_myname ;
1998-03-11 21:11:04 +00:00
1998-04-29 00:02:57 +00:00
/****************************************************************************
Generate the next creds to use .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static void gen_next_creds ( struct cli_state * cli , DOM_CRED * new_clnt_cred )
{
/*
* Create the new client credentials .
*/
cli - > clnt_cred . timestamp . time = time ( NULL ) ;
memcpy ( new_clnt_cred , & cli - > clnt_cred , sizeof ( * new_clnt_cred ) ) ;
/* Calculate the new credentials. */
cred_create ( cli - > sess_key , & ( cli - > clnt_cred . challenge ) ,
new_clnt_cred - > timestamp , & ( new_clnt_cred - > challenge ) ) ;
1998-04-29 19:22:01 +00:00
1998-04-29 00:02:57 +00:00
}
1998-09-05 05:07:05 +00:00
# if UNUSED_CODE
1998-03-11 21:11:04 +00:00
/****************************************************************************
do a LSA Logon Control2
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1998-12-07 20:23:41 +00:00
BOOL cli_net_logon_ctrl2 ( struct cli_state * cli , uint16 nt_pipe_fnum , uint32 status_level )
1998-03-11 21:11:04 +00:00
{
1998-04-23 22:45:53 +00:00
prs_struct rbuf ;
prs_struct buf ;
NET_Q_LOGON_CTRL2 q_l ;
1998-04-28 01:24:40 +00:00
BOOL ok = False ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
prs_init ( & buf , 1024 , 4 , SAFETY_MARGIN , False ) ;
prs_init ( & rbuf , 0 , 4 , SAFETY_MARGIN , True ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* create and send a MSRPC command with api NET_LOGON_CTRL2 */
1998-03-11 21:11:04 +00:00
1998-04-28 01:24:40 +00:00
DEBUG ( 4 , ( " do_net_logon_ctrl2 from %s status level:%x \n " ,
global_myname , status_level ) ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* store the parameters */
1998-04-28 01:24:40 +00:00
make_q_logon_ctrl2 ( & q_l , cli - > srv_name_slash , status_level ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* turn parameters into data stream */
net_io_q_logon_ctrl2 ( " " , & q_l , & buf , 0 ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* send the data on \PIPE\ */
1998-12-07 20:23:41 +00:00
if ( rpc_api_pipe_req ( cli , nt_pipe_fnum , NET_LOGON_CTRL2 , & buf , & rbuf ) )
1998-04-23 22:45:53 +00:00
{
NET_R_LOGON_CTRL2 r_l ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
net_io_r_logon_ctrl2 ( " " , & r_l , & rbuf , 0 ) ;
ok = ( rbuf . offset ! = 0 ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
if ( ok & & r_l . status ! = 0 )
{
/* report error code */
1998-04-28 01:24:40 +00:00
DEBUG ( 0 , ( " do_net_logon_ctrl2: Error %s \n " , get_nt_error_msg ( r_l . status ) ) ) ;
1998-04-25 01:12:08 +00:00
cli - > nt_error = r_l . status ;
1998-04-23 22:45:53 +00:00
ok = False ;
}
}
prs_mem_free ( & rbuf ) ;
prs_mem_free ( & buf ) ;
1998-04-28 01:24:40 +00:00
return ok ;
1998-03-11 21:11:04 +00:00
}
1998-09-05 05:07:05 +00:00
# endif
1998-03-11 21:11:04 +00:00
/****************************************************************************
1998-04-28 01:24:40 +00:00
LSA Authenticate 2
Send the client credential , receive back a server credential .
Ensure that the server credential returned matches the session key
encrypt of the server challenge originally received . JRA .
1998-03-11 21:11:04 +00:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1998-04-23 22:45:53 +00:00
1999-03-12 05:47:06 +00:00
BOOL cli_net_auth2 ( struct cli_state * cli , uint16 nt_pipe_fnum ,
const char * trust_acct , uint16 sec_chan ,
uint32 neg_flags , DOM_CHAL * srv_chal )
1998-03-11 21:11:04 +00:00
{
1998-04-23 22:45:53 +00:00
prs_struct rbuf ;
prs_struct buf ;
NET_Q_AUTH_2 q_a ;
1998-04-28 01:24:40 +00:00
BOOL ok = False ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
prs_init ( & buf , 1024 , 4 , SAFETY_MARGIN , False ) ;
prs_init ( & rbuf , 0 , 4 , SAFETY_MARGIN , True ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* create and send a MSRPC command with api NET_AUTH2 */
1998-03-11 21:11:04 +00:00
1998-08-14 17:38:29 +00:00
DEBUG ( 4 , ( " cli_net_auth2: srv:%s acct:%s sc:%x mc: %s chal %s neg: %x \n " ,
1998-04-28 01:24:40 +00:00
cli - > srv_name_slash , cli - > mach_acct , sec_chan , global_myname ,
credstr ( cli - > clnt_cred . challenge . data ) , neg_flags ) ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* store the parameters */
1999-03-12 05:47:06 +00:00
make_q_auth_2 ( & q_a , cli - > srv_name_slash , trust_acct , sec_chan , global_myname ,
1998-04-28 01:24:40 +00:00
& cli - > clnt_cred . challenge , neg_flags ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* turn parameters into data stream */
net_io_q_auth_2 ( " " , & q_a , & buf , 0 ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* send the data on \PIPE\ */
1998-12-07 20:23:41 +00:00
if ( rpc_api_pipe_req ( cli , nt_pipe_fnum , NET_AUTH2 , & buf , & rbuf ) )
1998-04-23 22:45:53 +00:00
{
NET_R_AUTH_2 r_a ;
net_io_r_auth_2 ( " " , & r_a , & rbuf , 0 ) ;
ok = ( rbuf . offset ! = 0 ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
if ( ok & & r_a . status ! = 0 )
{
/* report error code */
1998-04-28 01:24:40 +00:00
DEBUG ( 0 , ( " cli_net_auth2: Error %s \n " , get_nt_error_msg ( r_a . status ) ) ) ;
1998-04-25 01:12:08 +00:00
cli - > nt_error = r_a . status ;
1998-04-23 22:45:53 +00:00
ok = False ;
}
1998-04-28 01:24:40 +00:00
if ( ok )
{
/*
* Check the returned value using the initial
* server received challenge .
*/
UTIME zerotime ;
zerotime . time = 0 ;
if ( cred_assert ( & r_a . srv_chal , cli - > sess_key , srv_chal , zerotime ) = = 0 ) {
/*
* Server replied with bad credential . Fail .
*/
DEBUG ( 0 , ( " cli_net_auth2: server %s replied with bad credential (bad machine \
password ? ) . \ n " , cli->desthost ));
ok = False ;
}
}
1998-11-20 20:44:21 +00:00
#if 0
/*
* Try commenting this out to see if this makes the connect
* work for a NT 3.51 PDC . JRA .
*/
1998-04-23 22:45:53 +00:00
if ( ok & & r_a . srv_flgs . neg_flags ! = q_a . clnt_flgs . neg_flags )
{
/* report different neg_flags */
1998-08-14 17:38:29 +00:00
DEBUG ( 0 , ( " cli_net_auth2: error neg_flags (q,r) differ - (%x,%x) \n " ,
1998-04-23 22:45:53 +00:00
q_a . clnt_flgs . neg_flags , r_a . srv_flgs . neg_flags ) ) ;
ok = False ;
}
1998-11-20 20:44:21 +00:00
# endif
1998-04-23 22:45:53 +00:00
}
prs_mem_free ( & rbuf ) ;
prs_mem_free ( & buf ) ;
1998-04-28 01:24:40 +00:00
return ok ;
1998-03-11 21:11:04 +00:00
}
/****************************************************************************
1998-04-28 01:24:40 +00:00
LSA Request Challenge . Sends our challenge to server , then gets
server response . These are used to generate the credentials .
1998-03-11 21:11:04 +00:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1998-04-23 22:45:53 +00:00
1998-12-07 20:23:41 +00:00
BOOL cli_net_req_chal ( struct cli_state * cli , uint16 nt_pipe_fnum , DOM_CHAL * clnt_chal , DOM_CHAL * srv_chal )
1998-03-11 21:11:04 +00:00
{
1998-04-23 22:45:53 +00:00
prs_struct rbuf ;
prs_struct buf ;
NET_Q_REQ_CHAL q_c ;
BOOL valid_chal = False ;
if ( srv_chal = = NULL | | clnt_chal = = NULL )
return False ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
prs_init ( & buf , 1024 , 4 , SAFETY_MARGIN , False ) ;
prs_init ( & rbuf , 0 , 4 , SAFETY_MARGIN , True ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* create and send a MSRPC command with api NET_REQCHAL */
1998-03-11 21:11:04 +00:00
1998-04-25 01:12:08 +00:00
DEBUG ( 4 , ( " cli_net_req_chal: LSA Request Challenge from %s to %s: %s \n " ,
cli - > desthost , global_myname , credstr ( clnt_chal - > data ) ) ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* store the parameters */
1998-04-28 01:24:40 +00:00
make_q_req_chal ( & q_c , cli - > srv_name_slash , global_myname , clnt_chal ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* turn parameters into data stream */
net_io_q_req_chal ( " " , & q_c , & buf , 0 ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* send the data on \PIPE\ */
1998-12-07 20:23:41 +00:00
if ( rpc_api_pipe_req ( cli , nt_pipe_fnum , NET_REQCHAL , & buf , & rbuf ) )
1998-04-23 22:45:53 +00:00
{
NET_R_REQ_CHAL r_c ;
BOOL ok ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
net_io_r_req_chal ( " " , & r_c , & rbuf , 0 ) ;
ok = ( rbuf . offset ! = 0 ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
if ( ok & & r_c . status ! = 0 )
{
/* report error code */
1998-04-28 01:24:40 +00:00
DEBUG ( 0 , ( " cli_net_req_chal: Error %s \n " , get_nt_error_msg ( r_c . status ) ) ) ;
cli - > nt_error = r_c . status ;
1998-04-23 22:45:53 +00:00
ok = False ;
}
if ( ok )
{
/* ok, at last: we're happy. return the challenge */
memcpy ( srv_chal , r_c . srv_chal . data , sizeof ( srv_chal - > data ) ) ;
valid_chal = True ;
}
}
prs_mem_free ( & rbuf ) ;
prs_mem_free ( & buf ) ;
return valid_chal ;
1998-03-11 21:11:04 +00:00
}
/***************************************************************************
1998-04-29 00:02:57 +00:00
LSA Server Password Set .
1998-03-11 21:11:04 +00:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1998-04-23 22:45:53 +00:00
1999-04-08 05:36:15 +00:00
BOOL cli_net_srv_pwset ( struct cli_state * cli , uint16 nt_pipe_fnum ,
uint8 hashed_mach_pwd [ 16 ] , uint16 sec_chan_type )
1998-03-11 21:11:04 +00:00
{
1998-04-23 22:45:53 +00:00
prs_struct rbuf ;
prs_struct buf ;
1998-04-29 00:02:57 +00:00
DOM_CRED new_clnt_cred ;
1998-04-23 22:45:53 +00:00
NET_Q_SRV_PWSET q_s ;
1998-04-29 00:02:57 +00:00
BOOL ok = False ;
1998-04-23 22:45:53 +00:00
1998-04-29 00:02:57 +00:00
gen_next_creds ( cli , & new_clnt_cred ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
prs_init ( & buf , 1024 , 4 , SAFETY_MARGIN , False ) ;
prs_init ( & rbuf , 0 , 4 , SAFETY_MARGIN , True ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* create and send a MSRPC command with api NET_SRV_PWSET */
1998-03-11 21:11:04 +00:00
1998-08-14 17:38:29 +00:00
DEBUG ( 4 , ( " cli_net_srv_pwset: srv:%s acct:%s sc: %d mc: %s clnt %s %x \n " ,
1998-04-29 00:02:57 +00:00
cli - > srv_name_slash , cli - > mach_acct , sec_chan_type , global_myname ,
credstr ( new_clnt_cred . challenge . data ) , new_clnt_cred . timestamp . time ) ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* store the parameters */
1998-04-29 00:02:57 +00:00
make_q_srv_pwset ( & q_s , cli - > srv_name_slash , cli - > mach_acct , sec_chan_type ,
1998-05-11 06:38:36 +00:00
global_myname , & new_clnt_cred , ( char * ) hashed_mach_pwd ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* turn parameters into data stream */
net_io_q_srv_pwset ( " " , & q_s , & buf , 0 ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* send the data on \PIPE\ */
1998-12-07 20:23:41 +00:00
if ( rpc_api_pipe_req ( cli , nt_pipe_fnum , NET_SRVPWSET , & buf , & rbuf ) )
1998-04-23 22:45:53 +00:00
{
NET_R_SRV_PWSET r_s ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
net_io_r_srv_pwset ( " " , & r_s , & rbuf , 0 ) ;
ok = ( rbuf . offset ! = 0 ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
if ( ok & & r_s . status ! = 0 )
{
/* report error code */
1998-04-29 19:22:01 +00:00
DEBUG ( 0 , ( " cli_net_srv_pwset: %s \n " , get_nt_error_msg ( r_s . status ) ) ) ;
1998-04-25 01:12:08 +00:00
cli - > nt_error = r_s . status ;
1998-04-23 22:45:53 +00:00
ok = False ;
}
1998-04-29 00:02:57 +00:00
/* Update the credentials. */
1998-04-29 19:22:01 +00:00
if ( ok & & ! clnt_deal_with_creds ( cli - > sess_key , & ( cli - > clnt_cred ) , & ( r_s . srv_cred ) ) )
1998-04-23 22:45:53 +00:00
{
1998-04-29 00:02:57 +00:00
/*
* Server replied with bad credential . Fail .
*/
DEBUG ( 0 , ( " cli_net_srv_pwset: server %s replied with bad credential (bad machine \
password ? ) . \ n " , cli->desthost ));
ok = False ;
1998-04-23 22:45:53 +00:00
}
}
prs_mem_free ( & rbuf ) ;
prs_mem_free ( & buf ) ;
1998-04-29 00:02:57 +00:00
return ok ;
1998-03-11 21:11:04 +00:00
}
/***************************************************************************
1998-04-29 00:02:57 +00:00
LSA SAM Logon - interactive or network .
1998-03-11 21:11:04 +00:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1998-04-23 22:45:53 +00:00
1998-12-07 20:23:41 +00:00
BOOL cli_net_sam_logon ( struct cli_state * cli , uint16 nt_pipe_fnum , NET_ID_INFO_CTR * ctr ,
1998-04-28 01:24:40 +00:00
NET_USER_INFO_3 * user_info3 )
1998-03-11 21:11:04 +00:00
{
1998-04-28 01:24:40 +00:00
DOM_CRED new_clnt_cred ;
1998-04-29 19:22:01 +00:00
DOM_CRED dummy_rtn_creds ;
1998-04-23 22:45:53 +00:00
prs_struct rbuf ;
prs_struct buf ;
1998-04-28 01:24:40 +00:00
uint16 validation_level = 3 ;
1998-04-23 22:45:53 +00:00
NET_Q_SAM_LOGON q_s ;
1998-04-28 01:24:40 +00:00
BOOL ok = False ;
1998-04-23 22:45:53 +00:00
1998-04-29 00:02:57 +00:00
gen_next_creds ( cli , & new_clnt_cred ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
prs_init ( & buf , 1024 , 4 , SAFETY_MARGIN , False ) ;
prs_init ( & rbuf , 0 , 4 , SAFETY_MARGIN , True ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* create and send a MSRPC command with api NET_SAMLOGON */
1998-03-11 21:11:04 +00:00
1998-08-14 17:38:29 +00:00
DEBUG ( 4 , ( " cli_net_sam_logon: srv:%s mc:%s clnt %s %x ll: %d \n " ,
1998-04-28 01:24:40 +00:00
cli - > srv_name_slash , global_myname ,
credstr ( new_clnt_cred . challenge . data ) , cli - > clnt_cred . timestamp . time ,
ctr - > switch_value ) ) ;
1998-03-11 21:11:04 +00:00
1998-04-29 19:22:01 +00:00
memset ( & dummy_rtn_creds , ' \0 ' , sizeof ( dummy_rtn_creds ) ) ;
1998-10-27 15:03:47 +00:00
dummy_rtn_creds . timestamp . time = time ( NULL ) ;
1998-04-29 19:22:01 +00:00
1998-04-23 22:45:53 +00:00
/* store the parameters */
1998-04-28 01:24:40 +00:00
make_sam_info ( & ( q_s . sam_id ) , cli - > srv_name_slash , global_myname ,
1998-04-29 19:22:01 +00:00
& new_clnt_cred , & dummy_rtn_creds , ctr - > switch_value , ctr , validation_level ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* turn parameters into data stream */
net_io_q_sam_logon ( " " , & q_s , & buf , 0 ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* send the data on \PIPE\ */
1998-12-07 20:23:41 +00:00
if ( rpc_api_pipe_req ( cli , nt_pipe_fnum , NET_SAMLOGON , & buf , & rbuf ) )
1998-04-23 22:45:53 +00:00
{
NET_R_SAM_LOGON r_s ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
r_s . user = user_info3 ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
net_io_r_sam_logon ( " " , & r_s , & rbuf , 0 ) ;
ok = ( rbuf . offset ! = 0 ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
if ( ok & & r_s . status ! = 0 )
{
/* report error code */
1998-04-28 01:24:40 +00:00
DEBUG ( 0 , ( " cli_net_sam_logon: %s \n " , get_nt_error_msg ( r_s . status ) ) ) ;
1998-04-25 01:12:08 +00:00
cli - > nt_error = r_s . status ;
1998-04-23 22:45:53 +00:00
ok = False ;
}
1998-04-28 01:24:40 +00:00
/* Update the credentials. */
1998-04-29 19:22:01 +00:00
if ( ok & & ! clnt_deal_with_creds ( cli - > sess_key , & ( cli - > clnt_cred ) , & ( r_s . srv_creds ) ) )
1998-04-28 01:24:40 +00:00
{
/*
* Server replied with bad credential . Fail .
*/
DEBUG ( 0 , ( " cli_net_sam_logon: server %s replied with bad credential (bad machine \
password ? ) . \ n " , cli->desthost ));
ok = False ;
}
1998-04-23 22:45:53 +00:00
if ( ok & & r_s . switch_value ! = 3 )
{
/* report different switch_value */
1998-04-28 01:24:40 +00:00
DEBUG ( 0 , ( " cli_net_sam_logon: switch_value of 3 expected %x \n " ,
1998-04-23 22:45:53 +00:00
r_s . switch_value ) ) ;
ok = False ;
}
}
prs_mem_free ( & rbuf ) ;
prs_mem_free ( & buf ) ;
1998-04-28 01:24:40 +00:00
return ok ;
1998-03-11 21:11:04 +00:00
}
/***************************************************************************
1998-04-28 01:24:40 +00:00
LSA SAM Logoff .
1998-04-29 19:22:01 +00:00
This currently doesnt work correctly as the domain controller
returns NT_STATUS_INVALID_INFO_CLASS - we obviously need to
send a different info level . Right now though , I ' m not sure
what that needs to be ( I need to see one on the wire before
I can be sure ) . JRA .
1998-03-11 21:11:04 +00:00
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1998-12-07 20:23:41 +00:00
BOOL cli_net_sam_logoff ( struct cli_state * cli , uint16 nt_pipe_fnum , NET_ID_INFO_CTR * ctr )
1998-03-11 21:11:04 +00:00
{
1998-04-28 01:24:40 +00:00
DOM_CRED new_clnt_cred ;
1998-04-29 19:22:01 +00:00
DOM_CRED dummy_rtn_creds ;
1998-04-23 22:45:53 +00:00
prs_struct rbuf ;
prs_struct buf ;
NET_Q_SAM_LOGOFF q_s ;
1998-04-28 01:24:40 +00:00
uint16 validation_level = 3 ;
BOOL ok = False ;
1998-03-11 21:11:04 +00:00
1998-04-29 00:02:57 +00:00
gen_next_creds ( cli , & new_clnt_cred ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
prs_init ( & buf , 1024 , 4 , SAFETY_MARGIN , False ) ;
prs_init ( & rbuf , 0 , 4 , SAFETY_MARGIN , True ) ;
1998-03-11 21:11:04 +00:00
1998-04-28 01:24:40 +00:00
/* create and send a MSRPC command with api NET_SAMLOGOFF */
1998-03-11 21:11:04 +00:00
1998-08-14 17:38:29 +00:00
DEBUG ( 4 , ( " cli_net_sam_logoff: srv:%s mc:%s clnt %s %x ll: %d \n " ,
1998-04-28 01:24:40 +00:00
cli - > srv_name_slash , global_myname ,
credstr ( new_clnt_cred . challenge . data ) , new_clnt_cred . timestamp . time ,
ctr - > switch_value ) ) ;
1998-03-11 21:11:04 +00:00
1998-04-29 19:22:01 +00:00
memset ( & dummy_rtn_creds , ' \0 ' , sizeof ( dummy_rtn_creds ) ) ;
1998-04-23 22:45:53 +00:00
/* store the parameters */
1998-04-28 01:24:40 +00:00
make_sam_info ( & ( q_s . sam_id ) , cli - > srv_name_slash , global_myname ,
1998-04-29 19:22:01 +00:00
& new_clnt_cred , & dummy_rtn_creds , ctr - > switch_value , ctr , validation_level ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* turn parameters into data stream */
net_io_q_sam_logoff ( " " , & q_s , & buf , 0 ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
/* send the data on \PIPE\ */
1998-12-07 20:23:41 +00:00
if ( rpc_api_pipe_req ( cli , nt_pipe_fnum , NET_SAMLOGOFF , & buf , & rbuf ) )
1998-04-23 22:45:53 +00:00
{
NET_R_SAM_LOGOFF r_s ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
net_io_r_sam_logoff ( " " , & r_s , & rbuf , 0 ) ;
ok = ( rbuf . offset ! = 0 ) ;
1998-03-11 21:11:04 +00:00
1998-04-23 22:45:53 +00:00
if ( ok & & r_s . status ! = 0 )
{
/* report error code */
1998-04-28 01:24:40 +00:00
DEBUG ( 0 , ( " cli_net_sam_logoff: %s \n " , get_nt_error_msg ( r_s . status ) ) ) ;
1998-04-25 01:12:08 +00:00
cli - > nt_error = r_s . status ;
1998-04-23 22:45:53 +00:00
ok = False ;
}
1998-04-28 01:24:40 +00:00
/* Update the credentials. */
1998-04-29 19:22:01 +00:00
if ( ok & & ! clnt_deal_with_creds ( cli - > sess_key , & ( cli - > clnt_cred ) , & ( r_s . srv_creds ) ) )
1998-04-23 22:45:53 +00:00
{
1998-04-28 01:24:40 +00:00
/*
* Server replied with bad credential . Fail .
*/
DEBUG ( 0 , ( " cli_net_sam_logoff: server %s replied with bad credential (bad machine \
password ? ) . \ n " , cli->desthost ));
1998-04-29 00:02:57 +00:00
ok = False ;
1998-04-23 22:45:53 +00:00
}
}
prs_mem_free ( & rbuf ) ;
prs_mem_free ( & buf ) ;
1998-04-28 01:24:40 +00:00
return ok ;
1998-03-11 21:11:04 +00:00
}
1998-05-27 00:30:52 +00:00
1999-04-08 05:36:15 +00:00
/***************************************************************************
Synchronise SAM Database ( requires SEC_CHAN_BDC ) .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-06-02 03:19:20 +00:00
BOOL cli_net_sam_sync ( struct cli_state * cli , uint16 nt_pipe_fnum , uint32 database_id , uint32 * num_deltas , SAM_DELTA_HDR * hdr_deltas , SAM_DELTA_CTR * deltas )
1999-04-08 05:36:15 +00:00
{
NET_Q_SAM_SYNC q_s ;
prs_struct rbuf ;
prs_struct buf ;
DOM_CRED new_clnt_cred ;
BOOL ok = False ;
gen_next_creds ( cli , & new_clnt_cred ) ;
prs_init ( & buf , 1024 , 4 , SAFETY_MARGIN , False ) ;
prs_init ( & rbuf , 0 , 4 , SAFETY_MARGIN , True ) ;
/* create and send a MSRPC command with api NET_SAM_SYNC */
make_q_sam_sync ( & q_s , cli - > srv_name_slash , global_myname ,
& new_clnt_cred , database_id ) ;
/* turn parameters into data stream */
net_io_q_sam_sync ( " " , & q_s , & buf , 0 ) ;
/* send the data on \PIPE\ */
if ( rpc_api_pipe_req ( cli , nt_pipe_fnum , NET_SAM_SYNC , & buf , & rbuf ) )
{
NET_R_SAM_SYNC r_s ;
1999-06-02 03:19:20 +00:00
r_s . hdr_deltas = hdr_deltas ;
r_s . deltas = deltas ;
1999-07-21 00:32:09 +00:00
net_io_r_sam_sync ( " " , cli - > sess_key , & r_s , & rbuf , 0 ) ;
1999-04-08 05:36:15 +00:00
ok = ( rbuf . offset ! = 0 ) ;
1999-06-02 03:19:20 +00:00
if ( ok & & r_s . status ! = 0 & & r_s . status ! = NT_STATUS_MORE_ENTRIES )
1999-04-08 05:36:15 +00:00
{
/* report error code */
DEBUG ( 0 , ( " cli_net_sam_sync: %s \n " , get_nt_error_msg ( r_s . status ) ) ) ;
cli - > nt_error = r_s . status ;
ok = False ;
}
/* Update the credentials. */
if ( ok & & ! clnt_deal_with_creds ( cli - > sess_key , & ( cli - > clnt_cred ) , & ( r_s . srv_creds ) ) )
{
DEBUG ( 0 , ( " cli_net_sam_sync: server %s replied with bad credential (bad machine password ?). \n " , cli - > desthost ) ) ;
ok = False ;
}
1999-06-02 03:19:20 +00:00
if ( ok )
{
* num_deltas = r_s . num_deltas2 ;
if ( r_s . status = = NT_STATUS_MORE_ENTRIES )
{
DEBUG ( 2 , ( " (More entries) \n " ) ) ;
}
}
1999-04-08 05:36:15 +00:00
}
prs_mem_free ( & rbuf ) ;
prs_mem_free ( & buf ) ;
return ok ;
}
1998-05-27 00:30:52 +00:00
/*********************************************************
Change the domain password on the PDC .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
static BOOL modify_trust_password ( char * domain , char * remote_machine ,
unsigned char orig_trust_passwd_hash [ 16 ] ,
1999-04-08 05:36:15 +00:00
unsigned char new_trust_passwd_hash [ 16 ] ,
uint16 sec_chan )
1998-05-27 00:30:52 +00:00
{
1999-07-06 21:29:54 +00:00
uint16 nt_pipe_fnum ;
struct cli_state cli ;
struct nmb_name calling , called ;
1998-05-27 00:30:52 +00:00
1999-07-06 21:29:54 +00:00
make_nmb_name ( & calling , global_myname , 0x0 , scope ) ;
make_nmb_name ( & called , remote_machine , 0x20 , scope ) ;
1998-05-27 00:30:52 +00:00
1999-07-06 21:29:54 +00:00
ZERO_STRUCT ( cli ) ;
if ( cli_initialise ( & cli ) = = NULL )
{
DEBUG ( 0 , ( " modify_trust_password: unable to initialize client \
connection . \ n " ));
return False ;
}
1998-05-27 00:30:52 +00:00
1999-07-06 21:29:54 +00:00
if ( ! resolve_name ( remote_machine , & cli . dest_ip , 0x20 ) )
{
DEBUG ( 0 , ( " modify_trust_password: Can't resolve address for \
% s \ n " , remote_machine));
return False ;
}
1998-05-27 00:30:52 +00:00
1999-07-06 21:29:54 +00:00
if ( ismyip ( cli . dest_ip ) )
{
DEBUG ( 0 , ( " modify_trust_password: Machine %s is one of our \
addresses . Cannot add to ourselves . \ n " , remote_machine));
return False ;
}
cli . protocol = PROTOCOL_NT1 ;
1998-09-25 21:01:52 +00:00
1999-07-22 10:54:49 +00:00
pwd_set_nullpwd ( & cli . pwd ) ;
1999-07-06 21:29:54 +00:00
if ( ! cli_establish_connection ( & cli , remote_machine , & cli . dest_ip ,
& calling , & called ,
" IPC$ " , " IPC " , False , True ) )
1998-09-25 21:01:52 +00:00
{
1999-07-06 21:29:54 +00:00
fstring errstr ;
cli_safe_errstr ( & cli , errstr , sizeof ( errstr ) ) ;
DEBUG ( 0 , ( " modify_trust_password: machine %s rejected the SMB \
session . Error was : % s . \ n " , remote_machine, errstr ));
cli_shutdown ( & cli ) ;
return False ;
}
1998-05-27 00:30:52 +00:00
1999-07-06 21:29:54 +00:00
if ( cli . protocol ! = PROTOCOL_NT1 )
{
DEBUG ( 0 , ( " modify_trust_password: machine %s didn't negotiate \
NT protocol . \ n " , remote_machine));
cli_shutdown ( & cli ) ;
return False ;
}
if ( ! ( IS_BITS_SET_ALL ( cli . sec_mode , 1 ) ) )
{
DEBUG ( 0 , ( " modify_trust_password: machine %s isn't in user \
level security mode \ n " , remote_machine));
cli_shutdown ( & cli ) ;
return False ;
}
/*
* Ok - we have an anonymous connection to the IPC $ share .
* Now start the NT Domain stuff : - ) .
*/
if ( ! cli_nt_session_open ( & cli , PIPE_NETLOGON , & nt_pipe_fnum ) )
{
fstring errstr ;
cli_safe_errstr ( & cli , errstr , sizeof ( errstr ) ) ;
DEBUG ( 0 , ( " modify_trust_password: unable to open the domain \
client session to server % s . Error was : % s . \ n " , remote_machine, errstr ));
cli_nt_session_close ( & cli , nt_pipe_fnum ) ;
cli_ulogoff ( & cli ) ;
cli_shutdown ( & cli ) ;
return False ;
}
if ( ! cli_nt_setup_creds ( & cli , nt_pipe_fnum ,
cli . mach_acct , orig_trust_passwd_hash , sec_chan ) )
{
fstring errstr ;
cli_safe_errstr ( & cli , errstr , sizeof ( errstr ) ) ;
DEBUG ( 0 , ( " modify_trust_password: unable to setup the PDC \
credentials to server % s . Error was : % s . \ n " , remote_machine, errstr ));
cli_nt_session_close ( & cli , nt_pipe_fnum ) ;
cli_ulogoff ( & cli ) ;
cli_shutdown ( & cli ) ;
return False ;
}
if ( ! cli_nt_srv_pwset ( & cli , nt_pipe_fnum , new_trust_passwd_hash ,
sec_chan ) )
{
fstring errstr ;
cli_safe_errstr ( & cli , errstr , sizeof ( errstr ) ) ;
DEBUG ( 0 , ( " modify_trust_password: unable to change password for \
workstation % s in domain % s to Domain controller % s . Error was % s . \ n " ,
global_myname , domain , remote_machine , errstr ) ) ;
cli_nt_session_close ( & cli , nt_pipe_fnum ) ;
cli_ulogoff ( & cli ) ;
cli_shutdown ( & cli ) ;
return False ;
}
1998-05-27 00:30:52 +00:00
1999-07-06 21:29:54 +00:00
cli_nt_session_close ( & cli , nt_pipe_fnum ) ;
cli_ulogoff ( & cli ) ;
cli_shutdown ( & cli ) ;
1998-05-27 00:30:52 +00:00
1999-07-06 21:29:54 +00:00
return True ;
1998-05-27 00:30:52 +00:00
}
/************************************************************************
Change the trust account password for a domain .
The user of this function must have locked the trust password file for
update .
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * */
1999-04-08 05:36:15 +00:00
BOOL change_trust_account_password ( char * domain , char * remote_machine_list ,
uint16 sec_chan )
1998-05-27 00:30:52 +00:00
{
fstring remote_machine ;
unsigned char old_trust_passwd_hash [ 16 ] ;
unsigned char new_trust_passwd_hash [ 16 ] ;
time_t lct ;
1998-10-15 23:51:07 +00:00
BOOL res ;
1998-05-27 00:30:52 +00:00
if ( ! get_trust_account_password ( old_trust_passwd_hash , & lct ) ) {
DEBUG ( 0 , ( " change_trust_account_password: unable to read the machine \
account password for domain % s . \ n " , domain));
return False ;
}
/*
* Create the new ( random ) password .
*/
generate_random_buffer ( new_trust_passwd_hash , 16 , True ) ;
1998-08-31 03:11:42 +00:00
while ( remote_machine_list & &
next_token ( & remote_machine_list , remote_machine ,
LIST_SEP , sizeof ( remote_machine ) ) ) {
1998-05-27 00:30:52 +00:00
strupper ( remote_machine ) ;
if ( modify_trust_password ( domain , remote_machine ,
1999-04-08 05:36:15 +00:00
old_trust_passwd_hash , new_trust_passwd_hash , sec_chan ) ) {
1998-05-27 00:30:52 +00:00
DEBUG ( 0 , ( " %s : change_trust_account_password: Changed password for \
domain % s . \ n " , timestring(), domain));
/*
* Return the result of trying to write the new password
* back into the trust account file .
*/
1998-10-15 23:51:07 +00:00
res = set_trust_account_password ( new_trust_passwd_hash ) ;
memset ( new_trust_passwd_hash , 0 , 16 ) ;
memset ( old_trust_passwd_hash , 0 , 16 ) ;
return res ;
1998-05-27 00:30:52 +00:00
}
}
1998-10-15 23:51:07 +00:00
memset ( new_trust_passwd_hash , 0 , 16 ) ;
memset ( old_trust_passwd_hash , 0 , 16 ) ;
1998-05-27 00:30:52 +00:00
DEBUG ( 0 , ( " %s : change_trust_account_password: Failed to change password for \
domain % s . \ n " , timestring(), domain));
return False ;
}
1999-06-02 03:19:20 +00:00
1999-09-21 21:28:27 +00:00
BOOL do_sam_sync ( struct cli_state * cli , uchar trust_passwd [ 16 ] ,
1999-07-21 00:32:09 +00:00
SAM_DELTA_HDR hdr_deltas [ MAX_SAM_DELTAS ] ,
SAM_DELTA_CTR deltas [ MAX_SAM_DELTAS ] ,
uint32 * num_deltas )
1999-06-02 03:19:20 +00:00
{
uint16 nt_pipe_fnum ;
BOOL res = True ;
1999-07-21 00:32:09 +00:00
* num_deltas = 0 ;
1999-06-02 03:19:20 +00:00
1999-07-21 00:32:09 +00:00
DEBUG ( 2 , ( " Attempting SAM sync with PDC, domain: %s name: %s \n " ,
cli - > domain , global_myname ) ) ;
1999-06-02 03:19:20 +00:00
/* open NETLOGON session. negotiate credentials */
res = res ? cli_nt_session_open ( cli , PIPE_NETLOGON , & nt_pipe_fnum ) : False ;
res = res ? cli_nt_setup_creds ( cli , nt_pipe_fnum , cli - > mach_acct ,
trust_passwd , SEC_CHAN_BDC ) : False ;
memset ( trust_passwd , 0 , 16 ) ;
1999-07-21 00:32:09 +00:00
res = res ? cli_net_sam_sync ( cli , nt_pipe_fnum , 0 , num_deltas , hdr_deltas , deltas ) : False ;
1999-06-02 03:19:20 +00:00
/* close the session */
cli_nt_session_close ( cli , nt_pipe_fnum ) ;
if ( ! res )
{
DEBUG ( 0 , ( " SAM synchronisation FAILED \n " ) ) ;
return False ;
}
1999-07-21 00:32:09 +00:00
DEBUG ( 0 , ( " SAM synchronisation returned %d entries \n " , * num_deltas ) ) ;
1999-06-02 03:19:20 +00:00
return True ;
}
1999-07-22 10:54:49 +00:00