1
0
mirror of https://github.com/samba-team/samba.git synced 2025-01-11 05:18:09 +03:00

r10683: Samba3's wbinfo -t should give the correct answer now.

Tridge, if you have time, you might want to look at the segfault I was still
seeing. Now I store the handle to the netlogon pipe in the global winbind
state and free it on the next entry into check_machacc. The problem seems to
be that talloc_free()ing a pipe struct from within a callback function on that
pipe is not possible. I think I can live with that, but it has been not really
obvious. To reproduce the segfault you might want to look at putting a
talloc_free(state->getcreds->out.netlogon) into
wbsrv_samba3_check_machacc_receive_creds. This is called from a dcerpc
callback function.

In particular if the check failed it would be nice if I could delete the pipe
directly and not post a different event to some winbind queue.

I tried to delete the pipe from a timed event triggered immediately, but this
also fails because the inner loop seems to hit the same event again, calling
it twice.

Volker
This commit is contained in:
Volker Lendecke 2005-10-03 13:46:11 +00:00 committed by Gerald (Jerry) Carter
parent fd8eccd5bf
commit 5436d77648
6 changed files with 365 additions and 50 deletions

View File

@ -256,6 +256,7 @@ struct nbtd_interface;
struct wins_server;
struct wb_finddcs;
struct wb_get_schannel_creds;
struct cldap_socket;
struct cldapd_server;

View File

@ -470,7 +470,7 @@ static void pipe_open_recv(struct smbcli_request *req)
smb->fnum = state->open->ntcreatex.out.fnum;
smb->tree = talloc_reference(smb, state->tree);
smb->server_name= strupper_talloc(
smb, state->tree->session->transport->socket->hostname);
smb, state->tree->session->transport->called.name);
if (smb->server_name == NULL) {
ctx->status = NT_STATUS_NO_MEMORY;
goto done;

View File

@ -30,6 +30,10 @@
#include "lib/messaging/irpc.h"
#include "librpc/gen_ndr/irpc.h"
#include "librpc/gen_ndr/ndr_irpc.h"
#include "libcli/raw/libcliraw.h"
#include "librpc/rpc/dcerpc_composite.h"
#include "librpc/gen_ndr/ndr_netlogon.h"
#include "libcli/auth/credentials.h"
struct finddcs_state {
struct wb_finddcs *io;
@ -164,7 +168,6 @@ struct composite_context *wb_finddcs_send(struct wb_finddcs *io,
state = talloc(c, struct finddcs_state);
if (state == NULL) goto failed;
state->io = io;
make_nbt_name(&name, io->in.domain, 0x1c);
@ -204,3 +207,222 @@ NTSTATUS wb_finddcs(struct wb_finddcs *io, TALLOC_CTX *mem_ctx,
struct composite_context *c = wb_finddcs_send(io, ev);
return wb_finddcs_recv(c, mem_ctx);
}
struct get_schannel_creds_state {
struct composite_context *ctx;
struct dcerpc_pipe *p;
struct wb_get_schannel_creds *io;
struct netr_ServerReqChallenge *r;
struct creds_CredentialState creds_state;
struct netr_Credential netr_cred;
uint32_t negotiate_flags;
struct netr_ServerAuthenticate2 *a;
};
static void get_schannel_creds_recv_auth(struct rpc_request *req);
static void get_schannel_creds_recv_chal(struct rpc_request *req);
static void get_schannel_creds_recv_pipe(struct composite_context *ctx);
struct composite_context *wb_get_schannel_creds_send(struct wb_get_schannel_creds *io,
struct event_context *ev)
{
struct composite_context *result, *ctx;
struct get_schannel_creds_state *state;
result = talloc_zero(NULL, struct composite_context);
if (result == NULL) goto failed;
result->state = COMPOSITE_STATE_IN_PROGRESS;
result->event_ctx = ev;
state = talloc(result, struct get_schannel_creds_state);
if (state == NULL) goto failed;
result->private_data = state;
state->io = io;
state->p = dcerpc_pipe_init(state, ev);
if (state->p == NULL) goto failed;
ctx = dcerpc_pipe_open_smb_send(state->p->conn, state->io->in.tree,
"\\netlogon");
if (ctx == NULL) goto failed;
ctx->async.fn = get_schannel_creds_recv_pipe;
ctx->async.private_data = state;
state->ctx = result;
return result;
failed:
talloc_free(result);
return NULL;
}
static void get_schannel_creds_recv_pipe(struct composite_context *ctx)
{
struct get_schannel_creds_state *state =
talloc_get_type(ctx->async.private_data,
struct get_schannel_creds_state);
struct rpc_request *req;
state->ctx->status = dcerpc_pipe_open_smb_recv(ctx);
if (!NT_STATUS_IS_OK(state->ctx->status)) goto done;
state->ctx->status = dcerpc_bind_auth_none(state->p,
DCERPC_NETLOGON_UUID,
DCERPC_NETLOGON_VERSION);
if (!NT_STATUS_IS_OK(state->ctx->status)) goto done;
state->r = talloc(state, struct netr_ServerReqChallenge);
if (state->r == NULL) {
state->ctx->status = NT_STATUS_NO_MEMORY;
goto done;
}
state->r->in.computer_name =
cli_credentials_get_workstation(state->io->in.creds);
state->r->in.server_name =
talloc_asprintf(state->r, "\\\\%s",
dcerpc_server_name(state->p));
state->r->in.credentials = talloc(state->r, struct netr_Credential);
state->r->out.credentials = talloc(state->r, struct netr_Credential);
if ((state->r->in.server_name == NULL) ||
(state->r->in.credentials == NULL) ||
(state->r->out.credentials == NULL)) {
state->ctx->status = NT_STATUS_NO_MEMORY;
goto done;
}
generate_random_buffer(state->r->in.credentials->data,
sizeof(state->r->in.credentials->data));
req = dcerpc_netr_ServerReqChallenge_send(state->p, state, state->r);
if (req == NULL) {
state->ctx->status = NT_STATUS_NO_MEMORY;
goto done;
}
req->async.callback = get_schannel_creds_recv_chal;
req->async.private = state;
return;
done:
if (!NT_STATUS_IS_OK(state->ctx->status)) {
state->ctx->state = COMPOSITE_STATE_ERROR;
}
if ((state->ctx->state >= COMPOSITE_STATE_DONE) &&
(state->ctx->async.fn != NULL)) {
state->ctx->async.fn(state->ctx);
}
}
static void get_schannel_creds_recv_chal(struct rpc_request *req)
{
struct get_schannel_creds_state *state =
talloc_get_type(req->async.private,
struct get_schannel_creds_state);
const struct samr_Password *mach_pwd;
state->ctx->status = dcerpc_ndr_request_recv(req);
if (!NT_STATUS_IS_OK(state->ctx->status)) goto done;
state->ctx->status = state->r->out.result;
if (!NT_STATUS_IS_OK(state->ctx->status)) goto done;
mach_pwd = cli_credentials_get_nt_hash(state->io->in.creds, state);
if (mach_pwd == NULL) {
state->ctx->status = NT_STATUS_NO_MEMORY;
goto done;
}
state->negotiate_flags = NETLOGON_NEG_AUTH2_FLAGS;
creds_client_init(&state->creds_state, state->r->in.credentials,
state->r->out.credentials, mach_pwd,
&state->netr_cred, state->negotiate_flags);
state->a = talloc(state, struct netr_ServerAuthenticate2);
if (state->a == NULL) {
state->ctx->status = NT_STATUS_NO_MEMORY;
goto done;
}
state->a->in.server_name =
talloc_reference(state->a, state->r->in.server_name);
state->a->in.account_name =
cli_credentials_get_username(state->io->in.creds);
state->a->in.secure_channel_type =
cli_credentials_get_secure_channel_type(state->io->in.creds);
state->a->in.computer_name =
cli_credentials_get_workstation(state->io->in.creds);
state->a->in.negotiate_flags = &state->negotiate_flags;
state->a->out.negotiate_flags = &state->negotiate_flags;
state->a->in.credentials = &state->netr_cred;
state->a->out.credentials = &state->netr_cred;
req = dcerpc_netr_ServerAuthenticate2_send(state->p, state, state->a);
if (req == NULL) {
state->ctx->status = NT_STATUS_NO_MEMORY;
goto done;
}
req->async.callback = get_schannel_creds_recv_auth;
req->async.private = state;
return;
state->io->out.netlogon = state->p;
state->ctx->state = COMPOSITE_STATE_DONE;
done:
if (!NT_STATUS_IS_OK(state->ctx->status)) {
state->ctx->state = COMPOSITE_STATE_ERROR;
}
if ((state->ctx->state >= COMPOSITE_STATE_DONE) &&
(state->ctx->async.fn != NULL)) {
state->ctx->async.fn(state->ctx);
}
}
static void get_schannel_creds_recv_auth(struct rpc_request *req)
{
struct get_schannel_creds_state *state =
talloc_get_type(req->async.private,
struct get_schannel_creds_state);
state->ctx->status = dcerpc_ndr_request_recv(req);
DEBUG(5, ("result: %s\n", nt_errstr(state->ctx->status)));
if (!NT_STATUS_IS_OK(state->ctx->status)) goto done;
state->ctx->status = state->a->out.result;
DEBUG(5, ("result: %s\n", nt_errstr(state->ctx->status)));
if (!NT_STATUS_IS_OK(state->ctx->status)) goto done;
state->ctx->state = COMPOSITE_STATE_DONE;
done:
if (!NT_STATUS_IS_OK(state->ctx->status)) {
state->ctx->state = COMPOSITE_STATE_ERROR;
}
if ((state->ctx->state >= COMPOSITE_STATE_DONE) &&
(state->ctx->async.fn != NULL)) {
state->ctx->async.fn(state->ctx);
}
}
NTSTATUS wb_get_schannel_creds_recv(struct composite_context *c,
TALLOC_CTX *mem_ctx)
{
NTSTATUS status = composite_wait(c);
struct get_schannel_creds_state *state =
talloc_get_type(c->private_data,
struct get_schannel_creds_state);
state->io->out.netlogon = talloc_steal(mem_ctx, state->p);
talloc_free(c);
return status;
}
NTSTATUS wb_get_schannel_creds(struct wb_get_schannel_creds *io,
TALLOC_CTX *mem_ctx,
struct event_context *ev)
{
struct composite_context *c = wb_get_schannel_creds_send(io, ev);
return wb_get_schannel_creds_recv(c, mem_ctx);
}

View File

@ -34,3 +34,13 @@ struct wb_finddcs {
} *dcs;
} out;
};
struct wb_get_schannel_creds {
struct {
struct cli_credentials *creds;
struct smbcli_tree *tree;
} in;
struct {
struct dcerpc_pipe *netlogon;
} out;
};

View File

@ -32,6 +32,8 @@
#include "libcli/composite/composite.h"
#include "libcli/smb_composite/smb_composite.h"
#include "include/version.h"
#include "librpc/rpc/dcerpc_composite.h"
#include "lib/events/events.h"
NTSTATUS wbsrv_samba3_interface_version(struct wbsrv_samba3_call *s3call)
{
@ -77,46 +79,53 @@ NTSTATUS wbsrv_samba3_ping(struct wbsrv_samba3_call *s3call)
return NT_STATUS_OK;
}
#define null_no_memory_done(x) do { \
if ((x) == NULL) { status = NT_STATUS_NO_MEMORY; goto done; } \
} while (0)
struct check_machacc_state {
struct wb_finddcs *io;
struct smb_composite_connect *conn;
struct wb_get_schannel_creds *getcreds;
};
static void wbsrv_samba3_check_machacc_receive_tree(struct composite_context *action)
static void wbsrv_samba3_check_machacc_receive_creds(struct composite_context *action);
static void wbsrv_samba3_check_machacc_receive_tree(struct composite_context *action);
static void wbsrv_samba3_check_machacc_receive_dcs(struct composite_context *action);
NTSTATUS wbsrv_samba3_check_machacc(struct wbsrv_samba3_call *s3call)
{
struct wbsrv_samba3_call *s3call =
talloc_get_type(action->async.private_data,
struct wbsrv_samba3_call);
struct check_machacc_state *state =
talloc_get_type(s3call->private_data,
struct check_machacc_state);
NTSTATUS status;
struct composite_context *resolve_req;
struct check_machacc_state *state;
struct wbsrv_service *service =
s3call->call->wbconn->listen_socket->service;
status = smb_composite_connect_recv(action, state);
WBSRV_SAMBA3_SET_STRING(s3call->response.data.auth.nt_status_string,
nt_errstr(status));
WBSRV_SAMBA3_SET_STRING(s3call->response.data.auth.error_string,
nt_errstr(status));
s3call->response.data.auth.pam_error = nt_status_to_pam(status);
DEBUG(5, ("check_machacc called\n"));
if (!NT_STATUS_IS_OK(status)) {
DEBUG(5, ("Connect failed: %s\n", nt_errstr(status)));
goto done;
if (service->netlogon != NULL) {
talloc_free(service->netlogon);
}
s3call->response.result = WINBINDD_OK;
done:
if (!NT_STATUS_IS_OK(status)) {
s3call->response.result = WINBINDD_ERROR;
}
state = talloc(s3call, struct check_machacc_state);
NT_STATUS_HAVE_NO_MEMORY(state);
status = wbsrv_send_reply(s3call->call);
if (!NT_STATUS_IS_OK(status)) {
wbsrv_terminate_connection(s3call->call->wbconn,
"wbsrv_queue_reply() failed");
return;
}
state->io = talloc(s3call, struct wb_finddcs);
NT_STATUS_HAVE_NO_MEMORY(state->io);
s3call->private_data = state;
state->io->in.msg_ctx = s3call->call->wbconn->conn->msg_ctx;
state->io->in.domain = lp_workgroup();
resolve_req = wb_finddcs_send(state->io, s3call->call->event_ctx);
NT_STATUS_HAVE_NO_MEMORY(resolve_req);
/* setup the callbacks */
resolve_req->async.fn = wbsrv_samba3_check_machacc_receive_dcs;
resolve_req->async.private_data = s3call;
/* tell the caller we reply later */
s3call->call->flags |= WBSRV_CALL_FLAGS_REPLY_ASYNC;
return NT_STATUS_OK;
}
static void wbsrv_samba3_check_machacc_receive_dcs(struct composite_context *action)
@ -188,31 +197,103 @@ static void wbsrv_samba3_check_machacc_receive_dcs(struct composite_context *act
}
}
NTSTATUS wbsrv_samba3_check_machacc(struct wbsrv_samba3_call *s3call)
static void wbsrv_samba3_check_machacc_receive_tree(struct composite_context *action)
{
struct composite_context *resolve_req;
struct check_machacc_state *state;
struct wbsrv_samba3_call *s3call =
talloc_get_type(action->async.private_data,
struct wbsrv_samba3_call);
struct check_machacc_state *state =
talloc_get_type(s3call->private_data,
struct check_machacc_state);
struct composite_context *ctx;
NTSTATUS status;
struct cli_credentials *creds;
DEBUG(5, ("check_machacc called\n"));
status = smb_composite_connect_recv(action, state);
if (!NT_STATUS_IS_OK(status)) {
DEBUG(5, ("Connect failed: %s\n", nt_errstr(status)));
goto done;
}
state = talloc(s3call, struct check_machacc_state);
NT_STATUS_HAVE_NO_MEMORY(state);
state->getcreds = talloc(state, struct wb_get_schannel_creds);
null_no_memory_done(state->getcreds);
state->io = talloc(s3call, struct wb_finddcs);
NT_STATUS_HAVE_NO_MEMORY(state->io);
s3call->private_data = state;
creds = cli_credentials_init(state);
null_no_memory_done(creds);
cli_credentials_set_conf(creds);
status = cli_credentials_set_machine_account(creds);
if (!NT_STATUS_IS_OK(status)) goto done;
state->io->in.msg_ctx = s3call->call->wbconn->conn->msg_ctx;
state->io->in.domain = lp_workgroup();
state->getcreds->in.tree = state->conn->out.tree;
state->getcreds->in.creds = creds;
resolve_req = wb_finddcs_send(state->io, s3call->call->event_ctx);
NT_STATUS_HAVE_NO_MEMORY(resolve_req);
ctx = wb_get_schannel_creds_send(state->getcreds,
s3call->call->event_ctx);
null_no_memory_done(ctx);
/* setup the callbacks */
resolve_req->async.fn = wbsrv_samba3_check_machacc_receive_dcs;
resolve_req->async.private_data = s3call;
ctx->async.fn = wbsrv_samba3_check_machacc_receive_creds;
ctx->async.private_data = s3call;
/* tell the caller we reply later */
s3call->call->flags |= WBSRV_CALL_FLAGS_REPLY_ASYNC;
return NT_STATUS_OK;
return;
done:
s3call->response.result = WINBINDD_OK;
if (!NT_STATUS_IS_OK(status)) {
s3call->response.result = WINBINDD_ERROR;
WBSRV_SAMBA3_SET_STRING(s3call->response.data.auth.nt_status_string,
nt_errstr(status));
WBSRV_SAMBA3_SET_STRING(s3call->response.data.auth.error_string,
nt_errstr(status));
s3call->response.data.auth.pam_error = nt_status_to_pam(status);
}
status = wbsrv_send_reply(s3call->call);
if (!NT_STATUS_IS_OK(status)) {
wbsrv_terminate_connection(s3call->call->wbconn,
"wbsrv_queue_reply() failed");
return;
}
}
static void wbsrv_samba3_check_machacc_receive_creds(struct composite_context *action)
{
struct wbsrv_samba3_call *s3call =
talloc_get_type(action->async.private_data,
struct wbsrv_samba3_call);
struct check_machacc_state *state =
talloc_get_type(s3call->private_data,
struct check_machacc_state);
struct wbsrv_service *service =
s3call->call->wbconn->listen_socket->service;
NTSTATUS status;
status = wb_get_schannel_creds_recv(action, service);
service->netlogon = state->getcreds->out.netlogon;
talloc_unlink(state, state->conn->out.tree); /* The pipe owns it now */
state->conn->out.tree = NULL;
if (!NT_STATUS_IS_OK(status)) goto done;
s3call->response.result = WINBINDD_OK;
done:
if (!NT_STATUS_IS_OK(status)) {
s3call->response.result = WINBINDD_ERROR;
WBSRV_SAMBA3_SET_STRING(s3call->response.data.auth.nt_status_string,
nt_errstr(status));
WBSRV_SAMBA3_SET_STRING(s3call->response.data.auth.error_string,
nt_errstr(status));
s3call->response.data.auth.pam_error = nt_status_to_pam(status);
}
status = wbsrv_send_reply(s3call->call);
if (!NT_STATUS_IS_OK(status)) {
wbsrv_terminate_connection(s3call->call->wbconn,
"wbsrv_queue_reply() failed");
return;
}
}

View File

@ -32,6 +32,7 @@
/* this struct stores global data for the winbind task */
struct wbsrv_service {
struct task_server *task;
struct dcerpc_pipe *netlogon;
};
/*