1
0
mirror of https://github.com/samba-team/samba.git synced 2025-01-11 05:18:09 +03:00

Merge of sam sync code from TNG.

Reverse-engineered the sam replication protocol from staring at hex dumps
for a while.  It's pretty similar to the sam sync protocol with a couple of
different delta header types.

I wasn't able to figure out the format of the privilege stuff - needs more
time and a whiteboard.  (-:

The impressive bit is that the sam sync stuff from tng basically just
worked thanks mainly to Luke Leighton's efforts in this area.
This commit is contained in:
Tim Potter 0001-01-01 00:00:00 +00:00
parent b0c8090396
commit 3a60cb44f2
5 changed files with 1276 additions and 6 deletions

View File

@ -348,5 +348,24 @@ typedef struct uint64_s
uint32 high;
} UINT64_S;
/* BUFHDR2 - another buffer header, with info level */
typedef struct bufhdr2_info
{
uint32 info_level;
uint32 length; /* uint8 chars */
uint32 buffer;
}
BUFHDR2;
/* BUFFER4 - simple length and buffer */
typedef struct buffer4_info
{
uint32 buf_len;
uint8 buffer[MAX_BUFFERLEN];
}
BUFFER4;
#endif /* _RPC_MISC_H */

View File

@ -34,13 +34,13 @@ struct cli_state *cli_netlogon_initialise(struct cli_state *cli,
/* Logon Control 2 */
uint32 cli_netlogon_logon_ctrl2(struct cli_state *cli, TALLOC_CTX *mem_ctx,
uint32 query_level)
NTSTATUS cli_netlogon_logon_ctrl2(struct cli_state *cli, TALLOC_CTX *mem_ctx,
uint32 query_level)
{
prs_struct qbuf, rbuf;
NET_Q_LOGON_CTRL2 q;
NET_R_LOGON_CTRL2 r;
uint32 result = NT_STATUS_UNSUCCESSFUL;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
ZERO_STRUCT(q);
ZERO_STRUCT(r);
@ -77,3 +77,142 @@ uint32 cli_netlogon_logon_ctrl2(struct cli_state *cli, TALLOC_CTX *mem_ctx,
return result;
}
/****************************************************************************
Generate the next creds to use. Yuck - this is a cut&paste from another
file. They should be combined at some stage. )-:
****************************************************************************/
static void gen_next_creds( struct cli_state *cli, DOM_CRED *new_clnt_cred)
{
/*
* Create the new client credentials.
*/
cli->clnt_cred.timestamp.time = time(NULL);
memcpy(new_clnt_cred, &cli->clnt_cred, sizeof(*new_clnt_cred));
/* Calculate the new credentials. */
cred_create(cli->sess_key, &(cli->clnt_cred.challenge),
new_clnt_cred->timestamp, &(new_clnt_cred->challenge));
}
/* Sam synchronisation */
NTSTATUS cli_netlogon_sam_sync(struct cli_state *cli, TALLOC_CTX *mem_ctx,
uint32 database_id, uint32 *num_deltas,
SAM_DELTA_HDR **hdr_deltas,
SAM_DELTA_CTR **deltas)
{
prs_struct qbuf, rbuf;
NET_Q_SAM_SYNC q;
NET_R_SAM_SYNC r;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
DOM_CRED clnt_creds;
char sess_key[16];
ZERO_STRUCT(q);
ZERO_STRUCT(r);
/* Initialise parse structures */
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
/* Initialise input parameters */
gen_next_creds(cli, &clnt_creds);
init_net_q_sam_sync(&q, cli->srv_name_slash, cli->clnt_name_slash + 2,
&clnt_creds, database_id);
/* Marshall data and send request */
if (!net_io_q_sam_sync("", &q, &qbuf, 0) ||
!rpc_api_pipe_req(cli, NET_SAM_SYNC, &qbuf, &rbuf)) {
result = NT_STATUS_UNSUCCESSFUL;
goto done;
}
/* Unmarshall response */
if (!net_io_r_sam_sync("", sess_key, &r, &rbuf, 0)) {
result = NT_STATUS_UNSUCCESSFUL;
goto done;
}
/* Return results */
result = r.status;
*num_deltas = r.num_deltas2;
*hdr_deltas = r.hdr_deltas;
*deltas = r.deltas;
done:
prs_mem_free(&qbuf);
prs_mem_free(&rbuf);
return result;
}
/* Sam synchronisation */
NTSTATUS cli_netlogon_sam_deltas(struct cli_state *cli, TALLOC_CTX *mem_ctx,
uint32 database_id, UINT64_S seqnum,
uint32 *num_deltas,
SAM_DELTA_HDR **hdr_deltas,
SAM_DELTA_CTR **deltas)
{
prs_struct qbuf, rbuf;
NET_Q_SAM_DELTAS q;
NET_R_SAM_DELTAS r;
NTSTATUS result = NT_STATUS_UNSUCCESSFUL;
DOM_CRED clnt_creds;
char sess_key[16];
ZERO_STRUCT(q);
ZERO_STRUCT(r);
/* Initialise parse structures */
prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL);
prs_init(&rbuf, 0, mem_ctx, UNMARSHALL);
/* Initialise input parameters */
gen_next_creds(cli, &clnt_creds);
init_net_q_sam_deltas(&q, cli->srv_name_slash,
cli->clnt_name_slash + 2, &clnt_creds,
database_id, seqnum);
/* Marshall data and send request */
if (!net_io_q_sam_deltas("", &q, &qbuf, 0) ||
!rpc_api_pipe_req(cli, NET_SAM_DELTAS, &qbuf, &rbuf)) {
result = NT_STATUS_UNSUCCESSFUL;
goto done;
}
/* Unmarshall response */
if (!net_io_r_sam_deltas("", sess_key, &r, &rbuf, 0)) {
result = NT_STATUS_UNSUCCESSFUL;
goto done;
}
/* Return results */
result = r.status;
*num_deltas = r.num_deltas2;
*hdr_deltas = r.hdr_deltas;
*deltas = r.deltas;
done:
prs_mem_free(&qbuf);
prs_mem_free(&rbuf);
return result;
}

View File

@ -1528,4 +1528,68 @@ BOOL prs_uint64(char *name, prs_struct *ps, int depth, UINT64_S *data64)
prs_uint32(name, ps, depth+1, &data64->high);
}
/*******************************************************************
reads or writes a BUFHDR2 structure.
********************************************************************/
BOOL smb_io_bufhdr2(char *desc, BUFHDR2 *hdr, prs_struct *ps, int depth)
{
prs_debug(ps, depth, desc, "smb_io_bufhdr2");
depth++;
prs_align(ps);
prs_uint32("info_level", ps, depth, &(hdr->info_level));
prs_uint32("length ", ps, depth, &(hdr->length ));
prs_uint32("buffer ", ps, depth, &(hdr->buffer ));
return True;
}
/*******************************************************************
reads or writes a BUFFER4 structure.
********************************************************************/
BOOL smb_io_buffer4(char *desc, BUFFER4 *buf4, uint32 buffer, prs_struct *ps, int depth)
{
prs_debug(ps, depth, desc, "smb_io_buffer4");
depth++;
prs_align(ps);
prs_uint32("buf_len", ps, depth, &(buf4->buf_len));
if (buf4->buf_len > MAX_BUFFERLEN)
{
buf4->buf_len = MAX_BUFFERLEN;
}
prs_uint8s(True, "buffer", ps, depth, buf4->buffer, buf4->buf_len);
return True;
}
/*******************************************************************
creates a UNIHDR structure.
********************************************************************/
BOOL make_uni_hdr(UNIHDR *hdr, int len)
{
if (hdr == NULL)
{
return False;
}
hdr->uni_str_len = 2 * len;
hdr->uni_max_len = 2 * len;
hdr->buffer = len != 0 ? 1 : 0;
return True;
}
/*******************************************************************
creates a BUFHDR2 structure.
********************************************************************/
BOOL make_bufhdr2(BUFHDR2 *hdr, uint32 info_level, uint32 length, uint32 buffer)
{
hdr->info_level = info_level;
hdr->length = length;
hdr->buffer = buffer;
return True;
}

View File

@ -1589,3 +1589,837 @@ BOOL net_io_r_sam_logoff(char *desc, NET_R_SAM_LOGOFF *r_l, prs_struct *ps, int
return True;
}
/*******************************************************************
makes a NET_Q_SAM_SYNC structure.
********************************************************************/
BOOL init_net_q_sam_sync(NET_Q_SAM_SYNC * q_s, const char *srv_name,
const char *cli_name, DOM_CRED * cli_creds,
uint32 database_id)
{
DEBUG(5, ("init_q_sam_sync\n"));
init_unistr2(&q_s->uni_srv_name, srv_name, strlen(srv_name) + 1);
init_unistr2(&q_s->uni_cli_name, cli_name, strlen(cli_name) + 1);
if (cli_creds) {
memcpy(&q_s->cli_creds, cli_creds, sizeof(q_s->cli_creds));
memset(&q_s->ret_creds, 0, sizeof(q_s->ret_creds));
}
q_s->database_id = database_id;
q_s->restart_state = 0;
q_s->sync_context = 0;
q_s->max_size = 0xffff;
return True;
}
/*******************************************************************
reads or writes a structure.
********************************************************************/
BOOL net_io_q_sam_sync(char *desc, NET_Q_SAM_SYNC * q_s, prs_struct *ps,
int depth)
{
prs_debug(ps, depth, desc, "net_io_q_sam_sync");
depth++;
smb_io_unistr2("", &(q_s->uni_srv_name), True, ps, depth);
smb_io_unistr2("", &(q_s->uni_cli_name), True, ps, depth);
smb_io_cred("", &(q_s->cli_creds), ps, depth);
smb_io_cred("", &(q_s->ret_creds), ps, depth);
prs_uint32("database_id ", ps, depth, &(q_s->database_id));
prs_uint32("restart_state", ps, depth, &(q_s->restart_state));
prs_uint32("sync_context ", ps, depth, &(q_s->sync_context));
prs_uint32("max_size", ps, depth, &(q_s->max_size));
return True;
}
/*******************************************************************
reads or writes a structure.
********************************************************************/
static BOOL net_io_sam_delta_hdr(char *desc, SAM_DELTA_HDR * delta,
prs_struct *ps, int depth)
{
prs_debug(ps, depth, desc, "net_io_sam_delta_hdr");
depth++;
prs_uint16("type", ps, depth, &(delta->type));
prs_uint16("type2", ps, depth, &(delta->type2));
prs_uint32("target_rid", ps, depth, &(delta->target_rid));
prs_uint32("type3", ps, depth, &(delta->type3));
/* Not sure why we need this but it seems to be necessary to get
sam deltas working. */
if (delta->type != 0x16)
prs_uint32("ptr_delta", ps, depth, &(delta->ptr_delta));
return True;
}
/*******************************************************************
reads or writes a structure.
********************************************************************/
static BOOL net_io_sam_delta_hdr2(char *desc, SAM_DELTA_HDR *delta,
prs_struct *ps, int depth)
{
uint32 unk;
prs_debug(ps, depth, desc, "net_io_sam_delta_stamp");
depth++;
prs_uint16("type", ps, depth, &(delta->type));
prs_uint16("type2", ps, depth, &(delta->type2));
prs_uint32("rid", ps, depth, &unk);
prs_uint32("unknown_ptr", ps, depth, &unk);
return True;
}
/*******************************************************************
reads or writes a structure.
********************************************************************/
static BOOL net_io_sam_delta_stamp(char *desc, SAM_DELTA_STAMP *info,
prs_struct *ps, int depth)
{
prs_debug(ps, depth, desc, "net_io_sam_delta_stamp");
depth++;
prs_uint32("seqnum", ps, depth, &info->seqnum);
prs_uint32("dom_mod_count_ptr", ps, depth, &info->dom_mod_count_ptr);
if (info->dom_mod_count_ptr)
prs_uint64("dom_mod_count", ps, depth, &info->dom_mod_count);
return True;
}
/*******************************************************************
reads or writes a structure.
********************************************************************/
static BOOL net_io_sam_domain_info(char *desc, SAM_DOMAIN_INFO * info,
prs_struct *ps, int depth)
{
prs_debug(ps, depth, desc, "net_io_sam_domain_info");
depth++;
smb_io_unihdr("hdr_dom_name", &(info->hdr_dom_name), ps, depth);
smb_io_unihdr("hdr_oem_info", &(info->hdr_oem_info), ps, depth);
prs_uint64("force_logoff", ps, depth, &info->force_logoff);
prs_uint16("min_pwd_len", ps, depth, &(info->min_pwd_len));
prs_uint16("pwd_history_len", ps, depth, &info->pwd_history_len);
prs_uint64("max_pwd_age", ps, depth, &info->max_pwd_age);
prs_uint64("min_pwd_age", ps, depth, &info->min_pwd_age);
prs_uint64("dom_mod_count", ps, depth, &info->dom_mod_count);
smb_io_time("creation_time", &info->creation_time, ps, depth);
smb_io_bufhdr2("hdr_sec_desc", &(info->hdr_sec_desc), ps, depth);
smb_io_unihdr("hdr_unknown", &(info->hdr_unknown), ps, depth);
ps->data_offset += 40;
smb_io_unistr2("uni_dom_name", &(info->uni_dom_name),
info->hdr_dom_name.buffer, ps, depth);
smb_io_unistr2("buf_oem_info", &(info->buf_oem_info),
info->hdr_oem_info.buffer, ps, depth);
smb_io_buffer4("buf_sec_desc", &(info->buf_sec_desc),
info->hdr_sec_desc.buffer, ps, depth);
smb_io_unistr2("buf_unknown", &(info->buf_unknown),
info->hdr_unknown.buffer, ps, depth);
return True;
}
/*******************************************************************
reads or writes a structure.
********************************************************************/
static BOOL net_io_sam_group_info(char *desc, SAM_GROUP_INFO * info,
prs_struct *ps, int depth)
{
prs_debug(ps, depth, desc, "net_io_sam_group_info");
depth++;
smb_io_unihdr("hdr_grp_name", &(info->hdr_grp_name), ps, depth);
smb_io_gid("gid", &(info->gid), ps, depth);
smb_io_unihdr("hdr_grp_desc", &(info->hdr_grp_desc), ps, depth);
smb_io_bufhdr2("hdr_sec_desc", &(info->hdr_sec_desc), ps, depth);
ps->data_offset += 48;
smb_io_unistr2("uni_grp_name", &(info->uni_grp_name),
info->hdr_grp_name.buffer, ps, depth);
smb_io_unistr2("uni_grp_desc", &(info->uni_grp_desc),
info->hdr_grp_desc.buffer, ps, depth);
smb_io_buffer4("buf_sec_desc", &(info->buf_sec_desc),
info->hdr_sec_desc.buffer, ps, depth);
return True;
}
/*******************************************************************
reads or writes a structure.
********************************************************************/
static BOOL net_io_sam_passwd_info(char *desc, SAM_PWD * pwd,
prs_struct *ps, int depth)
{
prs_debug(ps, depth, desc, "net_io_sam_passwd_info");
depth++;
prs_uint32("unk_0 ", ps, depth, &(pwd->unk_0));
smb_io_unihdr("hdr_lm_pwd", &(pwd->hdr_lm_pwd), ps, depth);
prs_uint8s(False, "buf_lm_pwd", ps, depth, pwd->buf_lm_pwd, 16);
smb_io_unihdr("hdr_nt_pwd", &(pwd->hdr_nt_pwd), ps, depth);
prs_uint8s(False, "buf_nt_pwd", ps, depth, pwd->buf_nt_pwd, 16);
smb_io_unihdr("", &(pwd->hdr_empty_lm), ps, depth);
smb_io_unihdr("", &(pwd->hdr_empty_nt), ps, depth);
return True;
}
/*******************************************************************
makes a SAM_ACCOUNT_INFO structure.
********************************************************************/
BOOL make_sam_account_info(SAM_ACCOUNT_INFO * info,
const UNISTR2 *user_name,
const UNISTR2 *full_name,
uint32 user_rid, uint32 group_rid,
const UNISTR2 *home_dir,
const UNISTR2 *dir_drive,
const UNISTR2 *log_scr,
const UNISTR2 *desc,
uint32 acb_info,
const UNISTR2 *prof_path,
const UNISTR2 *wkstas,
const UNISTR2 *unk_str, const UNISTR2 *mung_dial)
{
int len_user_name = user_name != NULL ? user_name->uni_str_len : 0;
int len_full_name = full_name != NULL ? full_name->uni_str_len : 0;
int len_home_dir = home_dir != NULL ? home_dir->uni_str_len : 0;
int len_dir_drive = dir_drive != NULL ? dir_drive->uni_str_len : 0;
int len_logon_script = log_scr != NULL ? log_scr->uni_str_len : 0;
int len_profile_path = prof_path != NULL ? prof_path->uni_str_len : 0;
int len_description = desc != NULL ? desc->uni_str_len : 0;
int len_workstations = wkstas != NULL ? wkstas->uni_str_len : 0;
int len_unknown_str = unk_str != NULL ? unk_str->uni_str_len : 0;
int len_munged_dial = mung_dial != NULL ? mung_dial->uni_str_len : 0;
DEBUG(5, ("make_sam_account_info\n"));
make_uni_hdr(&(info->hdr_acct_name), len_user_name);
make_uni_hdr(&(info->hdr_full_name), len_full_name);
make_uni_hdr(&(info->hdr_home_dir), len_home_dir);
make_uni_hdr(&(info->hdr_dir_drive), len_dir_drive);
make_uni_hdr(&(info->hdr_logon_script), len_logon_script);
make_uni_hdr(&(info->hdr_profile), len_profile_path);
make_uni_hdr(&(info->hdr_acct_desc), len_description);
make_uni_hdr(&(info->hdr_workstations), len_workstations);
make_uni_hdr(&(info->hdr_comment), len_unknown_str);
make_uni_hdr(&(info->hdr_parameters), len_munged_dial);
/* not present */
make_bufhdr2(&(info->hdr_sec_desc), 0, 0, 0);
info->user_rid = user_rid;
info->group_rid = group_rid;
init_nt_time(&(info->logon_time));
init_nt_time(&(info->logoff_time));
init_nt_time(&(info->pwd_last_set_time));
init_nt_time(&(info->acct_expiry_time));
info->logon_divs = 0xA8;
info->ptr_logon_hrs = 0; /* Don't care right now */
info->bad_pwd_count = 0;
info->logon_count = 0;
info->acb_info = acb_info;
info->nt_pwd_present = 0;
info->lm_pwd_present = 0;
info->pwd_expired = 0;
info->country = 0;
info->codepage = 0;
info->unknown1 = 0x4EC;
info->unknown2 = 0;
copy_unistr2(&(info->uni_acct_name), user_name);
copy_unistr2(&(info->uni_full_name), full_name);
copy_unistr2(&(info->uni_home_dir), home_dir);
copy_unistr2(&(info->uni_dir_drive), dir_drive);
copy_unistr2(&(info->uni_logon_script), log_scr);
copy_unistr2(&(info->uni_profile), prof_path);
copy_unistr2(&(info->uni_acct_desc), desc);
copy_unistr2(&(info->uni_workstations), wkstas);
copy_unistr2(&(info->uni_comment), unk_str);
copy_unistr2(&(info->uni_parameters), mung_dial);
return True;
}
/*******************************************************************
reads or writes a structure.
********************************************************************/
static BOOL net_io_sam_account_info(char *desc, uint8 sess_key[16],
SAM_ACCOUNT_INFO * info, prs_struct *ps,
int depth)
{
BUFHDR2 hdr_priv_data;
uint32 i;
prs_debug(ps, depth, desc, "net_io_sam_account_info");
depth++;
smb_io_unihdr("hdr_acct_name", &(info->hdr_acct_name), ps, depth);
smb_io_unihdr("hdr_full_name", &(info->hdr_full_name), ps, depth);
prs_uint32("user_rid ", ps, depth, &(info->user_rid));
prs_uint32("group_rid", ps, depth, &(info->group_rid));
smb_io_unihdr("hdr_home_dir ", &(info->hdr_home_dir), ps, depth);
smb_io_unihdr("hdr_dir_drive", &(info->hdr_dir_drive), ps, depth);
smb_io_unihdr("hdr_logon_script", &(info->hdr_logon_script), ps,
depth);
smb_io_unihdr("hdr_acct_desc", &(info->hdr_acct_desc), ps, depth);
smb_io_unihdr("hdr_workstations", &(info->hdr_workstations), ps,
depth);
smb_io_time("logon_time", &(info->logon_time), ps, depth);
smb_io_time("logoff_time", &(info->logoff_time), ps, depth);
prs_uint32("logon_divs ", ps, depth, &(info->logon_divs));
prs_uint32("ptr_logon_hrs", ps, depth, &(info->ptr_logon_hrs));
prs_uint16("bad_pwd_count", ps, depth, &(info->bad_pwd_count));
prs_uint16("logon_count", ps, depth, &(info->logon_count));
smb_io_time("pwd_last_set_time", &(info->pwd_last_set_time), ps,
depth);
smb_io_time("acct_expiry_time", &(info->acct_expiry_time), ps, depth);
prs_uint32("acb_info", ps, depth, &(info->acb_info));
prs_uint8s(False, "nt_pwd", ps, depth, info->nt_pwd, 16);
prs_uint8s(False, "lm_pwd", ps, depth, info->lm_pwd, 16);
prs_uint8("lm_pwd_present", ps, depth, &(info->lm_pwd_present));
prs_uint8("nt_pwd_present", ps, depth, &(info->nt_pwd_present));
prs_uint8("pwd_expired", ps, depth, &(info->pwd_expired));
smb_io_unihdr("hdr_comment", &(info->hdr_comment), ps, depth);
smb_io_unihdr("hdr_parameters", &(info->hdr_parameters), ps, depth);
prs_uint16("country", ps, depth, &(info->country));
prs_uint16("codepage", ps, depth, &(info->codepage));
smb_io_bufhdr2("hdr_priv_data", &(hdr_priv_data), ps, depth);
smb_io_bufhdr2("hdr_sec_desc", &(info->hdr_sec_desc), ps, depth);
smb_io_unihdr("hdr_profile", &(info->hdr_profile), ps, depth);
for (i = 0; i < 3; i++)
{
smb_io_unihdr("hdr_reserved", &(info->hdr_reserved[i]), ps,
depth);
}
for (i = 0; i < 4; i++)
{
prs_uint32("dw_reserved", ps, depth, &(info->dw_reserved[i]));
}
smb_io_unistr2("uni_acct_name", &(info->uni_acct_name),
info->hdr_acct_name.buffer, ps, depth);
prs_align(ps);
smb_io_unistr2("uni_full_name", &(info->uni_full_name),
info->hdr_full_name.buffer, ps, depth);
prs_align(ps);
smb_io_unistr2("uni_home_dir ", &(info->uni_home_dir),
info->hdr_home_dir.buffer, ps, depth);
prs_align(ps);
smb_io_unistr2("uni_dir_drive", &(info->uni_dir_drive),
info->hdr_dir_drive.buffer, ps, depth);
prs_align(ps);
smb_io_unistr2("uni_logon_script", &(info->uni_logon_script),
info->hdr_logon_script.buffer, ps, depth);
prs_align(ps);
smb_io_unistr2("uni_acct_desc", &(info->uni_acct_desc),
info->hdr_acct_desc.buffer, ps, depth);
prs_align(ps);
smb_io_unistr2("uni_workstations", &(info->uni_workstations),
info->hdr_workstations.buffer, ps, depth);
prs_align(ps);
prs_uint32("unknown1", ps, depth, &(info->unknown1));
prs_uint32("unknown2", ps, depth, &(info->unknown2));
smb_io_buffer4("buf_logon_hrs", &(info->buf_logon_hrs),
info->ptr_logon_hrs, ps, depth);
prs_align(ps);
smb_io_unistr2("uni_comment", &(info->uni_comment),
info->hdr_comment.buffer, ps, depth);
prs_align(ps);
smb_io_unistr2("uni_parameters", &(info->uni_parameters),
info->hdr_parameters.buffer, ps, depth);
prs_align(ps);
if (hdr_priv_data.buffer != 0)
{
int old_offset = 0;
uint32 len = 0x44;
prs_uint32("pwd_len", ps, depth, &len);
old_offset = ps->data_offset;
if (len == 0x44)
{
if (ps->io)
{
/* reading */
// FIXME prs_hash1(ps, ps->offset, sess_key);
}
net_io_sam_passwd_info("pass", &(info->pass), ps,
depth);
if (!ps->io)
{
/* writing */
// FIXME TOO prs_hash1(ps, old_offset, sess_key);
}
}
ps->data_offset = old_offset + len;
}
smb_io_buffer4("buf_sec_desc", &(info->buf_sec_desc),
info->hdr_sec_desc.buffer, ps, depth);
prs_align(ps);
smb_io_unistr2("uni_profile", &(info->uni_profile),
info->hdr_profile.buffer, ps, depth);
prs_align(ps);
return True;
}
/*******************************************************************
reads or writes a structure.
********************************************************************/
static BOOL net_io_sam_group_mem_info(char *desc, SAM_GROUP_MEM_INFO * info,
prs_struct *ps, int depth)
{
uint32 i;
fstring tmp;
prs_debug(ps, depth, desc, "net_io_sam_group_mem_info");
depth++;
prs_align(ps);
prs_uint32("ptr_rids ", ps, depth, &(info->ptr_rids));
prs_uint32("ptr_attribs", ps, depth, &(info->ptr_attribs));
prs_uint32("num_members", ps, depth, &(info->num_members));
ps->data_offset += 16;
if (info->ptr_rids != 0)
{
prs_uint32("num_members2", ps, depth, &(info->num_members2));
if (info->num_members2 != info->num_members)
{
/* RPC fault */
return False;
}
info->rids = talloc(ps->mem_ctx, sizeof(uint32) *
info->num_members2);
if (info->rids == NULL) {
DEBUG(0, ("out of memory allocating %d rids\n",
info->num_members2));
return False;
}
for (i = 0; i < info->num_members2; i++)
{
slprintf(tmp, sizeof(tmp) - 1, "rids[%02d]", i);
prs_uint32(tmp, ps, depth, &(info->rids[i]));
}
}
if (info->ptr_attribs != 0)
{
prs_uint32("num_members3", ps, depth, &(info->num_members3));
if (info->num_members3 != info->num_members)
{
/* RPC fault */
return False;
}
info->attribs = talloc(ps->mem_ctx, sizeof(uint32) *
info->num_members3);
if (info->attribs == NULL) {
DEBUG(0, ("out of memory allocating %d attribs\n",
info->num_members3));
return False;
}
for (i = 0; i < info->num_members3; i++)
{
slprintf(tmp, sizeof(tmp) - 1, "attribs[%02d]", i);
prs_uint32(tmp, ps, depth, &(info->attribs[i]));
}
}
return True;
}
/*******************************************************************
reads or writes a structure.
********************************************************************/
static BOOL net_io_sam_alias_info(char *desc, SAM_ALIAS_INFO * info,
prs_struct *ps, int depth)
{
prs_debug(ps, depth, desc, "net_io_sam_alias_info");
depth++;
smb_io_unihdr("hdr_als_name", &(info->hdr_als_name), ps, depth);
prs_uint32("als_rid", ps, depth, &(info->als_rid));
smb_io_bufhdr2("hdr_sec_desc", &(info->hdr_sec_desc), ps, depth);
smb_io_unihdr("hdr_als_desc", &(info->hdr_als_desc), ps, depth);
ps->data_offset += 40;
smb_io_unistr2("uni_als_name", &(info->uni_als_name),
info->hdr_als_name.buffer, ps, depth);
smb_io_buffer4("buf_sec_desc", &(info->buf_sec_desc),
info->hdr_sec_desc.buffer, ps, depth);
smb_io_unistr2("uni_als_desc", &(info->uni_als_desc),
info->hdr_als_name.buffer, ps, depth);
return True;
}
/*******************************************************************
reads or writes a structure.
********************************************************************/
static BOOL net_io_sam_alias_mem_info(char *desc, SAM_ALIAS_MEM_INFO * info,
prs_struct *ps, int depth)
{
uint32 i;
fstring tmp;
prs_debug(ps, depth, desc, "net_io_sam_alias_mem_info");
depth++;
prs_align(ps);
prs_uint32("num_members", ps, depth, &(info->num_members));
prs_uint32("ptr_members", ps, depth, &(info->ptr_members));
ps->data_offset += 16;
if (info->ptr_members != 0)
{
prs_uint32("num_sids", ps, depth, &(info->num_sids));
if (info->num_sids != info->num_members)
{
/* RPC fault */
return False;
}
info->ptr_sids = talloc(ps->mem_ctx, sizeof(uint32) *
info->num_sids);
if (info->ptr_sids == NULL) {
DEBUG(0, ("out of memory allocating %d ptr_sids\n",
info->num_sids));
return False;
}
for (i = 0; i < info->num_sids; i++)
{
slprintf(tmp, sizeof(tmp) - 1, "ptr_sids[%02d]", i);
prs_uint32(tmp, ps, depth, &(info->ptr_sids[i]));
}
info->sids = talloc(ps->mem_ctx, sizeof(DOM_SID2) *
info->num_sids);
if (info->sids == NULL) {
DEBUG(0, ("error allocating %d sids\n",
info->num_sids));
return False;
}
for (i = 0; i < info->num_sids; i++)
{
if (info->ptr_sids[i] != 0)
{
slprintf(tmp, sizeof(tmp) - 1, "sids[%02d]",
i);
smb_io_dom_sid2(tmp, &(info->sids[i]), ps,
depth);
}
}
}
return True;
}
/*******************************************************************
reads or writes a structure.
********************************************************************/
static BOOL net_io_sam_delta_ctr(char *desc, uint8 sess_key[16],
SAM_DELTA_CTR * delta, uint16 type,
prs_struct *ps, int depth)
{
prs_debug(ps, depth, desc, "net_io_sam_delta_ctr");
depth++;
switch (type)
{
/* Seen in sam deltas */
case SAM_DELTA_SAM_STAMP:
{
net_io_sam_delta_stamp("", &delta->stamp,
ps, depth);
break;
}
case SAM_DELTA_DOMAIN_INFO:
{
net_io_sam_domain_info("", &delta->domain_info,
ps, depth);
break;
}
case SAM_DELTA_GROUP_INFO:
{
net_io_sam_group_info("", &delta->group_info,
ps, depth);
break;
}
case SAM_DELTA_ACCOUNT_INFO:
{
net_io_sam_account_info("", sess_key,
&delta->account_info,
ps, depth);
break;
}
case SAM_DELTA_GROUP_MEM:
{
net_io_sam_group_mem_info("", &delta->grp_mem_info,
ps, depth);
break;
}
case SAM_DELTA_ALIAS_INFO:
{
net_io_sam_alias_info("", &delta->alias_info,
ps, depth);
break;
}
case SAM_DELTA_ALIAS_MEM:
{
net_io_sam_alias_mem_info("", &delta->als_mem_info,
ps, depth);
break;
}
default:
{
DEBUG(0,
("Replication error: Unknown delta type 0x%x\n",
type));
break;
}
}
return True;
}
/*******************************************************************
reads or writes a structure.
********************************************************************/
BOOL net_io_r_sam_sync(char *desc, uint8 sess_key[16],
NET_R_SAM_SYNC * r_s, prs_struct *ps, int depth)
{
uint32 i;
prs_debug(ps, depth, desc, "net_io_r_sam_sync");
depth++;
smb_io_cred("srv_creds", &(r_s->srv_creds), ps, depth);
prs_uint32("sync_context", ps, depth, &(r_s->sync_context));
prs_uint32("ptr_deltas", ps, depth, &(r_s->ptr_deltas));
if (r_s->ptr_deltas != 0)
{
prs_uint32("num_deltas ", ps, depth, &(r_s->num_deltas));
prs_uint32("ptr_deltas2", ps, depth, &(r_s->ptr_deltas2));
if (r_s->ptr_deltas2 != 0)
{
prs_uint32("num_deltas2", ps, depth,
&(r_s->num_deltas2));
if (r_s->num_deltas2 != r_s->num_deltas)
{
/* RPC fault */
return False;
}
if (r_s->num_deltas2 > 0) {
r_s->hdr_deltas = (SAM_DELTA_HDR *)
talloc(ps->mem_ctx, r_s->num_deltas2 *
sizeof(SAM_DELTA_HDR));
if (r_s->hdr_deltas == NULL) {
DEBUG(0, ("error tallocating memory "
"for %d delta headers\n",
r_s->num_deltas2));
return False;
}
}
for (i = 0; i < r_s->num_deltas2; i++)
{
net_io_sam_delta_hdr("", &r_s->hdr_deltas[i],
ps, depth);
}
if (r_s->num_deltas2 > 0) {
r_s->deltas = (SAM_DELTA_CTR *)
talloc(ps->mem_ctx, r_s->num_deltas2 *
sizeof(SAM_DELTA_CTR));
if (r_s->deltas == NULL) {
DEBUG(0, ("error tallocating memory "
"for %d deltas\n",
r_s->num_deltas2));
return False;
}
}
for (i = 0; i < r_s->num_deltas2; i++)
{
net_io_sam_delta_ctr("", sess_key,
&r_s->deltas[i],
r_s->hdr_deltas[i].type3,
ps, depth);
}
}
}
prs_align(ps);
prs_uint32("status", ps, depth, &(r_s->status));
return True;
}
/*******************************************************************
makes a NET_Q_SAM_DELTAS structure.
********************************************************************/
BOOL init_net_q_sam_deltas(NET_Q_SAM_DELTAS *q_s, const char *srv_name,
const char *cli_name, DOM_CRED *cli_creds,
uint32 database_id, UINT64_S dom_mod_count)
{
DEBUG(5, ("init_net_q_sam_deltas\n"));
init_unistr2(&q_s->uni_srv_name, srv_name, strlen(srv_name) + 1);
init_unistr2(&q_s->uni_cli_name, cli_name, strlen(cli_name) + 1);
memcpy(&q_s->cli_creds, cli_creds, sizeof(q_s->cli_creds));
memset(&q_s->ret_creds, 0, sizeof(q_s->ret_creds));
q_s->database_id = database_id;
q_s->dom_mod_count.low = dom_mod_count.low;
q_s->dom_mod_count.high = dom_mod_count.high;
q_s->max_size = 0xffff;
return True;
}
/*******************************************************************
reads or writes a structure.
********************************************************************/
BOOL net_io_q_sam_deltas(char *desc, NET_Q_SAM_DELTAS *q_s, prs_struct *ps,
int depth)
{
prs_debug(ps, depth, desc, "net_io_q_sam_deltas");
depth++;
smb_io_unistr2("", &q_s->uni_srv_name, True, ps, depth);
smb_io_unistr2("", &q_s->uni_cli_name, True, ps, depth);
smb_io_cred("", &q_s->cli_creds, ps, depth);
smb_io_cred("", &q_s->ret_creds, ps, depth);
prs_uint32("database_id ", ps, depth, &q_s->database_id);
prs_uint64("dom_mod_count", ps, depth, &q_s->dom_mod_count);
prs_uint32("max_size", ps, depth, &q_s->max_size);
return True;
}
/*******************************************************************
reads or writes a structure.
********************************************************************/
BOOL net_io_r_sam_deltas(char *desc, uint8 sess_key[16],
NET_R_SAM_DELTAS *r_s, prs_struct *ps, int depth)
{
int i;
prs_debug(ps, depth, desc, "net_io_r_sam_deltas");
depth++;
smb_io_cred("srv_creds", &r_s->srv_creds, ps, depth);
prs_uint64("dom_mod_count", ps, depth, &r_s->dom_mod_count);
prs_uint32("ptr_deltas", ps, depth, &r_s->ptr_deltas);
prs_uint32("num_deltas", ps, depth, &r_s->num_deltas);
prs_uint32("ptr_deltas2", ps, depth, &r_s->num_deltas2);
if (r_s->num_deltas2 != 0)
{
prs_uint32("num_deltas2 ", ps, depth, &(r_s->num_deltas2));
if (r_s->ptr_deltas != 0)
{
if (r_s->num_deltas > 0) {
r_s->hdr_deltas = (SAM_DELTA_HDR *)
talloc(ps->mem_ctx, r_s->num_deltas *
sizeof(SAM_DELTA_HDR));
if (r_s->hdr_deltas == NULL) {
DEBUG(0, ("error tallocating memory "
"for %d delta headers\n",
r_s->num_deltas));
return False;
}
}
for (i = 0; i < r_s->num_deltas; i++)
{
net_io_sam_delta_hdr("", &r_s->hdr_deltas[i],
ps, depth);
}
if (r_s->num_deltas > 0) {
r_s->deltas = (SAM_DELTA_CTR *)
talloc(ps->mem_ctx, r_s->num_deltas *
sizeof(SAM_DELTA_CTR));
if (r_s->deltas == NULL) {
DEBUG(0, ("error tallocating memory "
"for %d deltas\n",
r_s->num_deltas));
return False;
}
}
for (i = 0; i < r_s->num_deltas; i++)
{
net_io_sam_delta_ctr("", sess_key,
&r_s->deltas[i],
r_s->hdr_deltas[i].type2,
ps, depth);
}
}
}
prs_align(ps);
prs_uint32("status", ps, depth, &(r_s->status));
return True;
}

View File

@ -81,7 +81,7 @@ static uint32 cmd_netlogon_logon_ctrl(struct cli_state *cli, int argc,
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_NETLOGON)) {
DEBUG(0, ("Could not initialize srvsvc pipe!\n"));
DEBUG(0, ("Could not initialize netlogon pipe!\n"));
goto done;
}
@ -98,14 +98,228 @@ static uint32 cmd_netlogon_logon_ctrl(struct cli_state *cli, int argc,
return result;
}
/* Display sam synchronisation information */
static void display_sam_sync(uint32 num_deltas, SAM_DELTA_HDR *hdr_deltas,
SAM_DELTA_CTR *deltas)
{
fstring name;
uint32 i, j;
for (i = 0; i < num_deltas; i++) {
switch (hdr_deltas[i].type) {
case SAM_DELTA_DOMAIN_INFO:
unistr2_to_ascii(name,
&deltas[i].domain_info.uni_dom_name,
sizeof(name) - 1);
DEBUG(0, ("Domain: %s\n", name));
break;
case SAM_DELTA_GROUP_INFO:
unistr2_to_ascii(name,
&deltas[i].group_info.uni_grp_name,
sizeof(name) - 1);
DEBUG(0, ("Group: %s\n", name));
break;
case SAM_DELTA_ACCOUNT_INFO:
unistr2_to_ascii(name,
&deltas[i].account_info.uni_acct_name,
sizeof(name) - 1);
DEBUG(0, ("Account: %s\n", name));
break;
case SAM_DELTA_ALIAS_INFO:
unistr2_to_ascii(name,
&deltas[i].alias_info.uni_als_name,
sizeof(name) - 1);
DEBUG(0, ("Alias: %s\n", name));
break;
case SAM_DELTA_ALIAS_MEM: {
SAM_ALIAS_MEM_INFO *alias = &deltas[i].als_mem_info;
for (j = 0; j < alias->num_members; j++) {
fstring sid_str;
sid_to_string(sid_str, &alias->sids[j].sid);
DEBUG(0, ("%s\n", sid_str));
}
break;
}
case SAM_DELTA_GROUP_MEM: {
SAM_GROUP_MEM_INFO *group = &deltas[i].grp_mem_info;
for (j = 0; j < group->num_members; j++)
DEBUG(0, ("rid 0x%x, attrib 0x%08x\n",
group->rids[j], group->attribs[j]));
break;
}
case SAM_DELTA_SAM_STAMP: {
SAM_DELTA_STAMP *stamp = &deltas[i].stamp;
DEBUG(0, ("sam sequence update: 0x%04x\n",
stamp->seqnum));
break;
}
default:
DEBUG(0, ("unknown delta type 0x%02x\n",
hdr_deltas[i].type));
break;
}
}
}
/* Perform sam synchronisation */
static uint32 cmd_netlogon_sam_sync(struct cli_state *cli, int argc,
char **argv)
{
uint32 result = NT_STATUS_UNSUCCESSFUL;
unsigned char trust_passwd[16];
TALLOC_CTX *mem_ctx;
uint32 database_id = 0, num_deltas;
SAM_DELTA_HDR *hdr_deltas;
SAM_DELTA_CTR *deltas;
if (argc > 2) {
printf("Usage: %s [database_id]\n", argv[0]);
return 0;
}
if (argc == 2)
database_id = atoi(argv[1]);
if (!secrets_init()) {
DEBUG(0, ("Unable to initialise secrets database\n"));
return result;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("talloc_init failed\n"));
return result;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_NETLOGON)) {
DEBUG(0, ("Could not initialize netlogon pipe!\n"));
goto done;
}
/* Initialise session credentials */
if (!secrets_fetch_trust_account_password(lp_workgroup(), trust_passwd,
NULL)) {
DEBUG(0, ("could not fetch trust account password\n"));
goto done;
}
if (!cli_nt_setup_creds(cli, trust_passwd)) {
DEBUG(0, ("Error initialising session creds\n"));
goto done;
}
/* Synchronise sam database */
if ((result = cli_netlogon_sam_sync(cli, mem_ctx, database_id,
&num_deltas, &hdr_deltas, &deltas))
!= NT_STATUS_OK) {
goto done;
}
/* Display results */
display_sam_sync(num_deltas, hdr_deltas, deltas);
done:
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
/* Perform sam delta synchronisation */
static uint32 cmd_netlogon_sam_deltas(struct cli_state *cli, int argc,
char **argv)
{
uint32 result = NT_STATUS_UNSUCCESSFUL;
unsigned char trust_passwd[16];
TALLOC_CTX *mem_ctx = NULL;
uint32 database_id, num_deltas, tmp;
SAM_DELTA_HDR *hdr_deltas;
SAM_DELTA_CTR *deltas;
UINT64_S seqnum;
if (argc != 3) {
printf("Usage: %s database_id seqnum\n", argv[0]);
return 0;
}
database_id = atoi(argv[1]);
tmp = atoi(argv[2]);
seqnum.low = tmp & 0xffff;
seqnum.high = 0;
if (!secrets_init()) {
DEBUG(0, ("Unable to initialise secrets database\n"));
goto done;
}
if (!(mem_ctx = talloc_init())) {
DEBUG(0,("talloc_init failed\n"));
goto done;
}
/* Initialise RPC connection */
if (!cli_nt_session_open (cli, PIPE_NETLOGON)) {
DEBUG(0, ("Could not initialize netlogon pipe!\n"));
goto done;
}
/* Initialise session credentials */
if (!secrets_fetch_trust_account_password(lp_workgroup(), trust_passwd,
NULL)) {
DEBUG(0, ("could not fetch trust account password\n"));
goto done;
}
if (!cli_nt_setup_creds(cli, trust_passwd)) {
DEBUG(0, ("Error initialising session creds\n"));
goto done;
}
/* Synchronise sam database */
if ((result = cli_netlogon_sam_deltas(cli, mem_ctx, database_id,
seqnum, &num_deltas,
&hdr_deltas, &deltas))
!= NT_STATUS_OK) {
goto done;
}
/* Display results */
display_sam_sync(num_deltas, hdr_deltas, deltas);
done:
cli_nt_session_close(cli);
talloc_destroy(mem_ctx);
return result;
}
/* List of commands exported by this module */
struct cmd_set netlogon_commands[] = {
{ "NETLOGON" },
{ "logonctrl2", cmd_netlogon_logon_ctrl2, "Logon Control 2", "" },
{ "logonctrl", cmd_netlogon_logon_ctrl, "Logon Control", "" },
{ "logonctrl2", cmd_netlogon_logon_ctrl2, "Logon Control 2", "" },
{ "logonctrl", cmd_netlogon_logon_ctrl, "Logon Control", "" },
{ "samsync", cmd_netlogon_sam_sync, "Sam Synchronisation", "" },
{ "samdeltas", cmd_netlogon_sam_deltas, "Query Sam Deltas", "" },
{ NULL }
};