mirror of
https://github.com/samba-team/samba.git
synced 2024-12-24 21:34:56 +03:00
b324e2e1a1
ads_dns_query_srv() always fills it Signed-off-by: Volker Lendecke <vl@samba.org> Reviewed-by: Jeremy Allison <jra@samba.org>
543 lines
12 KiB
C
543 lines
12 KiB
C
/*
|
|
Samba Unix/Linux SMB client library
|
|
net lookup command
|
|
Copyright (C) 2001 Andrew Tridgell (tridge@samba.org)
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>. */
|
|
|
|
#include "includes.h"
|
|
#include "utils/net.h"
|
|
#include "libsmb/namequery.h"
|
|
#include "libads/sitename_cache.h"
|
|
#include "lib/addns/dnsquery_srv.h"
|
|
#include "../librpc/gen_ndr/ndr_netlogon.h"
|
|
#include "smb_krb5.h"
|
|
#include "../libcli/security/security.h"
|
|
#include "passdb/lookup_sid.h"
|
|
#include "libsmb/dsgetdcname.h"
|
|
|
|
int net_lookup_usage(struct net_context *c, int argc, const char **argv)
|
|
{
|
|
d_printf(_(
|
|
" net lookup [host] HOSTNAME[#<type>]\n\tgives IP for a hostname\n\n"
|
|
" net lookup ldap [domain] [sitename]\n\tgives IP of domain's ldap server\n\n"
|
|
" net lookup kdc [realm]\n\tgives IP of realm's kerberos KDC\n\n"
|
|
" net lookup pdc [domain|realm]\n\tgives IP of realm's kerberos KDC\n\n"
|
|
" net lookup dc [domain]\n\tgives IP of domains Domain Controllers\n\n"
|
|
" net lookup master [domain|wg]\n\tgive IP of master browser\n\n"
|
|
" net lookup name [name]\n\tLookup name's sid and type\n\n"
|
|
" net lookup sid [sid]\n\tGive sid's name and type\n\n"
|
|
" net lookup dsgetdcname [name] [flags] [sitename]\n\n"
|
|
));
|
|
return -1;
|
|
}
|
|
|
|
/* lookup a hostname giving an IP */
|
|
static int net_lookup_host(struct net_context *c, int argc, const char **argv)
|
|
{
|
|
struct sockaddr_storage ss;
|
|
int name_type = 0x20;
|
|
char addr[INET6_ADDRSTRLEN];
|
|
const char *name = argv[0];
|
|
char *p;
|
|
|
|
if (argc == 0)
|
|
return net_lookup_usage(c, argc, argv);
|
|
|
|
p = strchr_m(name,'#');
|
|
if (p) {
|
|
*p = '\0';
|
|
sscanf(++p,"%x",&name_type);
|
|
}
|
|
|
|
if (!resolve_name(name, &ss, name_type, false)) {
|
|
/* we deliberately use DEBUG() here to send it to stderr
|
|
so scripts aren't mucked up */
|
|
DEBUG(0,("Didn't find %s#%02x\n", name, name_type));
|
|
return -1;
|
|
}
|
|
|
|
print_sockaddr(addr, sizeof(addr), &ss);
|
|
d_printf("%s\n", addr);
|
|
return 0;
|
|
}
|
|
|
|
#ifdef HAVE_ADS
|
|
static void print_ldap_srvlist(struct dns_rr_srv *dclist, size_t numdcs)
|
|
{
|
|
size_t i;
|
|
|
|
for ( i=0; i<numdcs; i++ ) {
|
|
struct dns_rr_srv *dc = &dclist[i];
|
|
size_t j;
|
|
|
|
for (j=0; j<dc->num_ips; j++) {
|
|
struct sockaddr_storage *ss = &dc->ss_s[j];
|
|
char addr[INET6_ADDRSTRLEN];
|
|
|
|
print_sockaddr(addr, sizeof(addr), ss);
|
|
#ifdef HAVE_IPV6
|
|
if (ss->ss_family == AF_INET6) {
|
|
d_printf("[%s]:%"PRIu16"\n", addr, dc->port);
|
|
}
|
|
#endif
|
|
if (ss->ss_family == AF_INET) {
|
|
d_printf("%s:%"PRIu16"\n", addr, dc->port);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
|
|
static int net_lookup_ldap(struct net_context *c, int argc, const char **argv)
|
|
{
|
|
#ifdef HAVE_ADS
|
|
const char *domain;
|
|
struct sockaddr_storage ss;
|
|
struct dns_rr_srv *dcs = NULL;
|
|
size_t numdcs = 0;
|
|
const char *sitename = NULL;
|
|
TALLOC_CTX *ctx;
|
|
NTSTATUS status;
|
|
int ret;
|
|
char h_name[MAX_DNS_NAME_LENGTH];
|
|
char *query = NULL;
|
|
|
|
if (argc > 0)
|
|
domain = argv[0];
|
|
else
|
|
domain = c->opt_target_workgroup;
|
|
|
|
if (argc > 1) {
|
|
sitename = argv[1];
|
|
}
|
|
|
|
if ( (ctx = talloc_init("net_lookup_ldap")) == NULL ) {
|
|
d_fprintf(stderr,"net_lookup_ldap: talloc_init() %s!\n",
|
|
_("failed"));
|
|
return -1;
|
|
}
|
|
|
|
if (sitename == NULL) {
|
|
sitename = sitename_fetch(ctx, domain);
|
|
}
|
|
query = ads_dns_query_string_dcs(ctx, domain);
|
|
|
|
DEBUG(9, ("Lookup up ldap for domain %s\n", domain));
|
|
|
|
status = ads_dns_query_srv(
|
|
ctx,
|
|
lp_get_async_dns_timeout(),
|
|
sitename,
|
|
query,
|
|
&dcs,
|
|
&numdcs);
|
|
if ( NT_STATUS_IS_OK(status) && numdcs ) {
|
|
print_ldap_srvlist(dcs, numdcs);
|
|
TALLOC_FREE( ctx );
|
|
return 0;
|
|
}
|
|
|
|
DEBUG(9, ("Looking up PDC for domain %s\n", domain));
|
|
if (!get_pdc_ip(domain, &ss)) {
|
|
TALLOC_FREE( ctx );
|
|
return -1;
|
|
}
|
|
|
|
ret = sys_getnameinfo((struct sockaddr *)&ss,
|
|
sizeof(struct sockaddr_storage),
|
|
h_name, sizeof(h_name),
|
|
NULL, 0,
|
|
NI_NAMEREQD);
|
|
|
|
if (ret) {
|
|
TALLOC_FREE( ctx );
|
|
return -1;
|
|
}
|
|
|
|
DEBUG(9, ("Found PDC with DNS name %s\n", h_name));
|
|
domain = strchr(h_name, '.');
|
|
if (!domain) {
|
|
TALLOC_FREE( ctx );
|
|
return -1;
|
|
}
|
|
domain++;
|
|
|
|
DEBUG(9, ("Looking up ldap for domain %s\n", domain));
|
|
|
|
status = ads_dns_query_srv(
|
|
ctx,
|
|
lp_get_async_dns_timeout(),
|
|
sitename,
|
|
query,
|
|
&dcs,
|
|
&numdcs);
|
|
if ( NT_STATUS_IS_OK(status) && numdcs ) {
|
|
print_ldap_srvlist(dcs, numdcs);
|
|
TALLOC_FREE( ctx );
|
|
return 0;
|
|
}
|
|
|
|
TALLOC_FREE( ctx );
|
|
|
|
return -1;
|
|
#endif
|
|
DEBUG(1,("No ADS support\n"));
|
|
return -1;
|
|
}
|
|
|
|
static int net_lookup_dc(struct net_context *c, int argc, const char **argv)
|
|
{
|
|
struct samba_sockaddr *sa_list = NULL;
|
|
struct sockaddr_storage ss;
|
|
char *pdc_str = NULL;
|
|
const char *domain = NULL;
|
|
char *sitename = NULL;
|
|
size_t count = 0;
|
|
size_t i;
|
|
char addr[INET6_ADDRSTRLEN];
|
|
bool sec_ads = (lp_security() == SEC_ADS);
|
|
NTSTATUS status;
|
|
|
|
if (sec_ads) {
|
|
domain = lp_realm();
|
|
} else {
|
|
domain = c->opt_target_workgroup;
|
|
}
|
|
|
|
if (argc > 0)
|
|
domain=argv[0];
|
|
|
|
/* first get PDC */
|
|
if (!get_pdc_ip(domain, &ss))
|
|
return -1;
|
|
|
|
print_sockaddr(addr, sizeof(addr), &ss);
|
|
if (asprintf(&pdc_str, "%s", addr) == -1) {
|
|
return -1;
|
|
}
|
|
d_printf("%s\n", pdc_str);
|
|
|
|
sitename = sitename_fetch(talloc_tos(), domain);
|
|
status = get_sorted_dc_list(talloc_tos(),
|
|
domain,
|
|
sitename,
|
|
&sa_list,
|
|
&count,
|
|
sec_ads);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
SAFE_FREE(pdc_str);
|
|
TALLOC_FREE(sitename);
|
|
return 0;
|
|
}
|
|
TALLOC_FREE(sitename);
|
|
for (i=0;i<count;i++) {
|
|
print_sockaddr(addr, sizeof(addr), &sa_list[i].u.ss);
|
|
if (!strequal(pdc_str, addr))
|
|
d_printf("%s\n", addr);
|
|
}
|
|
TALLOC_FREE(sa_list);
|
|
SAFE_FREE(pdc_str);
|
|
return 0;
|
|
}
|
|
|
|
static int net_lookup_pdc(struct net_context *c, int argc, const char **argv)
|
|
{
|
|
struct sockaddr_storage ss;
|
|
char *pdc_str = NULL;
|
|
const char *domain;
|
|
char addr[INET6_ADDRSTRLEN];
|
|
|
|
if (lp_security() == SEC_ADS) {
|
|
domain = lp_realm();
|
|
} else {
|
|
domain = c->opt_target_workgroup;
|
|
}
|
|
|
|
if (argc > 0)
|
|
domain=argv[0];
|
|
|
|
/* first get PDC */
|
|
if (!get_pdc_ip(domain, &ss))
|
|
return -1;
|
|
|
|
print_sockaddr(addr, sizeof(addr), &ss);
|
|
if (asprintf(&pdc_str, "%s", addr) == -1) {
|
|
return -1;
|
|
}
|
|
d_printf("%s\n", pdc_str);
|
|
SAFE_FREE(pdc_str);
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int net_lookup_master(struct net_context *c, int argc, const char **argv)
|
|
{
|
|
struct sockaddr_storage master_ss;
|
|
const char *domain = c->opt_target_workgroup;
|
|
char addr[INET6_ADDRSTRLEN];
|
|
|
|
if (argc > 0)
|
|
domain=argv[0];
|
|
|
|
if (!find_master_ip(domain, &master_ss))
|
|
return -1;
|
|
print_sockaddr(addr, sizeof(addr), &master_ss);
|
|
d_printf("%s\n", addr);
|
|
return 0;
|
|
}
|
|
|
|
static int net_lookup_kdc(struct net_context *c, int argc, const char **argv)
|
|
{
|
|
#ifdef HAVE_KRB5
|
|
krb5_error_code rc;
|
|
krb5_context ctx;
|
|
struct samba_sockaddr *kdcs = NULL;
|
|
const char *realm;
|
|
char **get_host_realms = NULL;
|
|
size_t num_kdcs = 0;
|
|
size_t i;
|
|
NTSTATUS status;
|
|
|
|
rc = smb_krb5_init_context_common(&ctx);
|
|
if (rc) {
|
|
DBG_ERR("kerberos init context failed (%s)\n",
|
|
error_message(rc));
|
|
return -1;
|
|
}
|
|
|
|
if (argc > 0) {
|
|
realm = argv[0];
|
|
} else if (lp_realm() && *lp_realm()) {
|
|
realm = lp_realm();
|
|
} else {
|
|
rc = krb5_get_host_realm(ctx, NULL, &get_host_realms);
|
|
if (rc) {
|
|
DEBUG(1,("krb5_gethost_realm failed (%s)\n",
|
|
error_message(rc)));
|
|
krb5_free_context(ctx);
|
|
return -1;
|
|
}
|
|
realm = (const char *) *get_host_realms;
|
|
}
|
|
|
|
status = get_kdc_list(talloc_tos(),
|
|
realm,
|
|
NULL,
|
|
&kdcs,
|
|
&num_kdcs);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
DBG_WARNING("get_kdc_list failed (%s)\n",
|
|
nt_errstr(status));
|
|
krb5_free_host_realm(ctx, get_host_realms);
|
|
krb5_free_context(ctx);
|
|
return -1;
|
|
}
|
|
|
|
for (i = 0; i < num_kdcs; i++) {
|
|
char addr[INET6_ADDRSTRLEN];
|
|
|
|
print_sockaddr(addr, sizeof(addr), &kdcs[i].u.ss);
|
|
|
|
d_printf("%s:88\n", addr);
|
|
}
|
|
|
|
krb5_free_host_realm(ctx, get_host_realms);
|
|
krb5_free_context(ctx);
|
|
TALLOC_FREE(kdcs);
|
|
return 0;
|
|
#endif
|
|
DEBUG(1, ("No kerberos support\n"));
|
|
return -1;
|
|
}
|
|
|
|
static int net_lookup_name(struct net_context *c, int argc, const char **argv)
|
|
{
|
|
const char *dom, *name;
|
|
struct dom_sid sid;
|
|
struct dom_sid_buf buf;
|
|
enum lsa_SidType type;
|
|
|
|
if (argc != 1) {
|
|
d_printf("%s\n%s",
|
|
_("Usage:"),
|
|
_(" net lookup name <name>\n"));
|
|
return -1;
|
|
}
|
|
|
|
if (!lookup_name(talloc_tos(), argv[0], LOOKUP_NAME_ALL,
|
|
&dom, &name, &sid, &type)) {
|
|
d_printf(_("Could not lookup name %s\n"), argv[0]);
|
|
return -1;
|
|
}
|
|
|
|
d_printf("%s %d (%s) %s\\%s\n", dom_sid_str_buf(&sid, &buf),
|
|
type, sid_type_lookup(type), dom, name);
|
|
return 0;
|
|
}
|
|
|
|
static int net_lookup_sid(struct net_context *c, int argc, const char **argv)
|
|
{
|
|
const char *dom, *name;
|
|
struct dom_sid sid;
|
|
struct dom_sid_buf buf;
|
|
enum lsa_SidType type;
|
|
|
|
if (argc != 1) {
|
|
d_printf("%s\n%s",
|
|
_("Usage:"),
|
|
_(" net lookup sid <sid>\n"));
|
|
return -1;
|
|
}
|
|
|
|
if (!string_to_sid(&sid, argv[0])) {
|
|
d_printf(_("Could not convert %s to SID\n"), argv[0]);
|
|
return -1;
|
|
}
|
|
|
|
if (!lookup_sid(talloc_tos(), &sid,
|
|
&dom, &name, &type)) {
|
|
d_printf(_("Could not lookup name %s\n"), argv[0]);
|
|
return -1;
|
|
}
|
|
|
|
d_printf("%s %d (%s) %s\\%s\n", dom_sid_str_buf(&sid, &buf),
|
|
type, sid_type_lookup(type), dom, name);
|
|
return 0;
|
|
}
|
|
|
|
static int net_lookup_dsgetdcname(struct net_context *c, int argc, const char **argv)
|
|
{
|
|
NTSTATUS status;
|
|
const char *domain_name = NULL;
|
|
const char *site_name = NULL;
|
|
uint32_t flags = 0;
|
|
struct netr_DsRGetDCNameInfo *info = NULL;
|
|
TALLOC_CTX *mem_ctx;
|
|
char *s = NULL;
|
|
|
|
if (argc < 1 || argc > 3) {
|
|
d_printf("%s\n%s",
|
|
_("Usage:"),
|
|
_(" net lookup dsgetdcname "
|
|
"<name> <flags> <sitename>\n"));
|
|
return -1;
|
|
}
|
|
|
|
mem_ctx = talloc_init("net_lookup_dsgetdcname");
|
|
if (!mem_ctx) {
|
|
return -1;
|
|
}
|
|
|
|
domain_name = argv[0];
|
|
|
|
if (argc >= 2) {
|
|
sscanf(argv[1], "%x", &flags);
|
|
}
|
|
|
|
if (flags == 0) {
|
|
flags = DS_DIRECTORY_SERVICE_REQUIRED;
|
|
}
|
|
|
|
if (argc == 3) {
|
|
site_name = argv[2];
|
|
}
|
|
|
|
if (!c->msg_ctx) {
|
|
d_fprintf(stderr, _("Could not initialise message context. "
|
|
"Try running as root\n"));
|
|
return -1;
|
|
}
|
|
|
|
status = dsgetdcname(mem_ctx, c->msg_ctx, domain_name, NULL, site_name,
|
|
flags, &info);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
d_printf(_("failed with: %s\n"), nt_errstr(status));
|
|
TALLOC_FREE(mem_ctx);
|
|
return -1;
|
|
}
|
|
|
|
s = NDR_PRINT_STRUCT_STRING(mem_ctx, netr_DsRGetDCNameInfo, info);
|
|
printf("%s\n", s);
|
|
TALLOC_FREE(s);
|
|
|
|
TALLOC_FREE(mem_ctx);
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* lookup hosts or IP addresses using internal samba lookup fns */
|
|
int net_lookup(struct net_context *c, int argc, const char **argv)
|
|
{
|
|
int i;
|
|
|
|
struct functable table[] = {
|
|
{
|
|
.funcname = "HOST",
|
|
.fn = net_lookup_host,
|
|
},
|
|
{
|
|
.funcname = "LDAP",
|
|
.fn = net_lookup_ldap,
|
|
},
|
|
{
|
|
.funcname = "DC",
|
|
.fn = net_lookup_dc,
|
|
},
|
|
{
|
|
.funcname = "PDC",
|
|
.fn = net_lookup_pdc,
|
|
},
|
|
{
|
|
.funcname = "MASTER",
|
|
.fn = net_lookup_master,
|
|
},
|
|
{
|
|
.funcname = "KDC",
|
|
.fn = net_lookup_kdc,
|
|
},
|
|
{
|
|
.funcname = "NAME",
|
|
.fn = net_lookup_name,
|
|
},
|
|
{
|
|
.funcname = "SID",
|
|
.fn = net_lookup_sid,
|
|
},
|
|
{
|
|
.funcname = "DSGETDCNAME",
|
|
.fn = net_lookup_dsgetdcname,
|
|
},
|
|
{
|
|
.funcname = NULL,
|
|
},
|
|
};
|
|
|
|
if (argc < 1) {
|
|
d_printf(_("\nUsage: \n"));
|
|
return net_lookup_usage(c, argc, argv);
|
|
}
|
|
for (i=0; table[i].funcname; i++) {
|
|
if (strcasecmp_m(argv[0], table[i].funcname) == 0)
|
|
return table[i].fn(c, argc-1, argv+1);
|
|
}
|
|
|
|
/* Default to lookup a hostname so 'net lookup foo#1b' can be
|
|
used instead of 'net lookup host foo#1b'. The host syntax
|
|
is a bit confusing as non #00 names can't really be
|
|
considered hosts as such. */
|
|
|
|
return net_lookup_host(c, argc, argv);
|
|
}
|