mirror of
https://github.com/samba-team/samba.git
synced 2024-12-25 23:21:54 +03:00
5ab43ae0d8
Guenther
(This used to be commit fd490d236b
)
455 lines
10 KiB
C
455 lines
10 KiB
C
/*
|
|
Samba Unix/Linux SMB client library
|
|
net lookup command
|
|
Copyright (C) 2001 Andrew Tridgell (tridge@samba.org)
|
|
|
|
This program is free software; you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation; either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>. */
|
|
|
|
#include "includes.h"
|
|
#include "utils/net.h"
|
|
|
|
int net_lookup_usage(int argc, const char **argv)
|
|
{
|
|
d_printf(
|
|
" net lookup [host] HOSTNAME[#<type>]\n\tgives IP for a hostname\n\n"
|
|
" net lookup ldap [domain]\n\tgives IP of domain's ldap server\n\n"
|
|
" net lookup kdc [realm]\n\tgives IP of realm's kerberos KDC\n\n"
|
|
" net lookup pdc [domain|realm]\n\tgives IP of realm's kerberos KDC\n\n"
|
|
" net lookup dc [domain]\n\tgives IP of domains Domain Controllers\n\n"
|
|
" net lookup master [domain|wg]\n\tgive IP of master browser\n\n"
|
|
" net lookup name [name]\n\tLookup name's sid and type\n\n"
|
|
" net lookup sid [sid]\n\tGive sid's name and type\n\n"
|
|
" net lookup dsgetdcname [name] [flags] [sitename]\n\n"
|
|
);
|
|
return -1;
|
|
}
|
|
|
|
/* lookup a hostname giving an IP */
|
|
static int net_lookup_host(int argc, const char **argv)
|
|
{
|
|
struct sockaddr_storage ss;
|
|
int name_type = 0x20;
|
|
char addr[INET6_ADDRSTRLEN];
|
|
const char *name = argv[0];
|
|
char *p;
|
|
|
|
if (argc == 0)
|
|
return net_lookup_usage(argc, argv);
|
|
|
|
p = strchr_m(name,'#');
|
|
if (p) {
|
|
*p = '\0';
|
|
sscanf(++p,"%x",&name_type);
|
|
}
|
|
|
|
if (!resolve_name(name, &ss, name_type)) {
|
|
/* we deliberately use DEBUG() here to send it to stderr
|
|
so scripts aren't mucked up */
|
|
DEBUG(0,("Didn't find %s#%02x\n", name, name_type));
|
|
return -1;
|
|
}
|
|
|
|
print_sockaddr(addr, sizeof(addr), &ss);
|
|
d_printf("%s\n", addr);
|
|
return 0;
|
|
}
|
|
|
|
#ifdef HAVE_ADS
|
|
static void print_ldap_srvlist(struct dns_rr_srv *dclist, int numdcs )
|
|
{
|
|
struct sockaddr_storage ss;
|
|
int i;
|
|
|
|
for ( i=0; i<numdcs; i++ ) {
|
|
if (resolve_name(dclist[i].hostname, &ss, 0x20) ) {
|
|
char addr[INET6_ADDRSTRLEN];
|
|
print_sockaddr(addr, sizeof(addr), &ss);
|
|
#ifdef HAVE_IPV6
|
|
if (ss.ss_family == AF_INET6) {
|
|
d_printf("[%s]:%d\n", addr, dclist[i].port);
|
|
}
|
|
#endif
|
|
if (ss.ss_family == AF_INET) {
|
|
d_printf("%s:%d\n", addr, dclist[i].port);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
|
|
static int net_lookup_ldap(int argc, const char **argv)
|
|
{
|
|
#ifdef HAVE_ADS
|
|
const char *domain;
|
|
struct sockaddr_storage ss;
|
|
struct dns_rr_srv *dcs = NULL;
|
|
int numdcs = 0;
|
|
char *sitename;
|
|
TALLOC_CTX *ctx;
|
|
NTSTATUS status;
|
|
int ret;
|
|
char h_name[MAX_DNS_NAME_LENGTH];
|
|
|
|
if (argc > 0)
|
|
domain = argv[0];
|
|
else
|
|
domain = opt_target_workgroup;
|
|
|
|
sitename = sitename_fetch(domain);
|
|
|
|
if ( (ctx = talloc_init("net_lookup_ldap")) == NULL ) {
|
|
d_fprintf(stderr, "net_lookup_ldap: talloc_init() failed!\n");
|
|
SAFE_FREE(sitename);
|
|
return -1;
|
|
}
|
|
|
|
DEBUG(9, ("Lookup up ldap for domain %s\n", domain));
|
|
|
|
status = ads_dns_query_dcs( ctx, domain, sitename, &dcs, &numdcs );
|
|
if ( NT_STATUS_IS_OK(status) && numdcs ) {
|
|
print_ldap_srvlist(dcs, numdcs);
|
|
TALLOC_FREE( ctx );
|
|
SAFE_FREE(sitename);
|
|
return 0;
|
|
}
|
|
|
|
DEBUG(9, ("Looking up PDC for domain %s\n", domain));
|
|
if (!get_pdc_ip(domain, &ss)) {
|
|
TALLOC_FREE( ctx );
|
|
SAFE_FREE(sitename);
|
|
return -1;
|
|
}
|
|
|
|
ret = sys_getnameinfo((struct sockaddr *)&ss,
|
|
sizeof(struct sockaddr_storage),
|
|
h_name, sizeof(h_name),
|
|
NULL, 0,
|
|
NI_NAMEREQD);
|
|
|
|
if (ret) {
|
|
TALLOC_FREE( ctx );
|
|
SAFE_FREE(sitename);
|
|
return -1;
|
|
}
|
|
|
|
DEBUG(9, ("Found PDC with DNS name %s\n", h_name));
|
|
domain = strchr(h_name, '.');
|
|
if (!domain) {
|
|
TALLOC_FREE( ctx );
|
|
SAFE_FREE(sitename);
|
|
return -1;
|
|
}
|
|
domain++;
|
|
|
|
DEBUG(9, ("Looking up ldap for domain %s\n", domain));
|
|
|
|
status = ads_dns_query_dcs( ctx, domain, sitename, &dcs, &numdcs );
|
|
if ( NT_STATUS_IS_OK(status) && numdcs ) {
|
|
print_ldap_srvlist(dcs, numdcs);
|
|
TALLOC_FREE( ctx );
|
|
SAFE_FREE(sitename);
|
|
return 0;
|
|
}
|
|
|
|
TALLOC_FREE( ctx );
|
|
SAFE_FREE(sitename);
|
|
|
|
return -1;
|
|
#endif
|
|
DEBUG(1,("No ADS support\n"));
|
|
return -1;
|
|
}
|
|
|
|
static int net_lookup_dc(int argc, const char **argv)
|
|
{
|
|
struct ip_service *ip_list;
|
|
struct sockaddr_storage ss;
|
|
char *pdc_str = NULL;
|
|
const char *domain = NULL;
|
|
char *sitename = NULL;
|
|
int count, i;
|
|
char addr[INET6_ADDRSTRLEN];
|
|
bool sec_ads = (lp_security() == SEC_ADS);
|
|
|
|
if (sec_ads) {
|
|
domain = lp_realm();
|
|
} else {
|
|
domain = opt_target_workgroup;
|
|
}
|
|
|
|
if (argc > 0)
|
|
domain=argv[0];
|
|
|
|
/* first get PDC */
|
|
if (!get_pdc_ip(domain, &ss))
|
|
return -1;
|
|
|
|
print_sockaddr(addr, sizeof(addr), &ss);
|
|
asprintf(&pdc_str, "%s", addr);
|
|
d_printf("%s\n", pdc_str);
|
|
|
|
sitename = sitename_fetch(domain);
|
|
if (!NT_STATUS_IS_OK(get_sorted_dc_list(domain, sitename,
|
|
&ip_list, &count, sec_ads))) {
|
|
SAFE_FREE(pdc_str);
|
|
SAFE_FREE(sitename);
|
|
return 0;
|
|
}
|
|
SAFE_FREE(sitename);
|
|
for (i=0;i<count;i++) {
|
|
print_sockaddr(addr, sizeof(addr), &ip_list[i].ss);
|
|
if (!strequal(pdc_str, addr))
|
|
d_printf("%s\n", addr);
|
|
}
|
|
SAFE_FREE(pdc_str);
|
|
return 0;
|
|
}
|
|
|
|
static int net_lookup_pdc(int argc, const char **argv)
|
|
{
|
|
struct sockaddr_storage ss;
|
|
char *pdc_str = NULL;
|
|
const char *domain;
|
|
char addr[INET6_ADDRSTRLEN];
|
|
|
|
if (lp_security() == SEC_ADS) {
|
|
domain = lp_realm();
|
|
} else {
|
|
domain = opt_target_workgroup;
|
|
}
|
|
|
|
if (argc > 0)
|
|
domain=argv[0];
|
|
|
|
/* first get PDC */
|
|
if (!get_pdc_ip(domain, &ss))
|
|
return -1;
|
|
|
|
print_sockaddr(addr, sizeof(addr), &ss);
|
|
asprintf(&pdc_str, "%s", addr);
|
|
d_printf("%s\n", pdc_str);
|
|
SAFE_FREE(pdc_str);
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int net_lookup_master(int argc, const char **argv)
|
|
{
|
|
struct sockaddr_storage master_ss;
|
|
const char *domain=opt_target_workgroup;
|
|
char addr[INET6_ADDRSTRLEN];
|
|
|
|
if (argc > 0)
|
|
domain=argv[0];
|
|
|
|
if (!find_master_ip(domain, &master_ss))
|
|
return -1;
|
|
print_sockaddr(addr, sizeof(addr), &master_ss);
|
|
d_printf("%s\n", addr);
|
|
return 0;
|
|
}
|
|
|
|
static int net_lookup_kdc(int argc, const char **argv)
|
|
{
|
|
#ifdef HAVE_KRB5
|
|
krb5_error_code rc;
|
|
krb5_context ctx;
|
|
struct sockaddr_in *addrs;
|
|
int num_kdcs,i;
|
|
krb5_data realm;
|
|
char **realms;
|
|
|
|
initialize_krb5_error_table();
|
|
rc = krb5_init_context(&ctx);
|
|
if (rc) {
|
|
DEBUG(1,("krb5_init_context failed (%s)\n",
|
|
error_message(rc)));
|
|
return -1;
|
|
}
|
|
|
|
if (argc>0) {
|
|
realm.data = CONST_DISCARD(char *, argv[0]);
|
|
realm.length = strlen(argv[0]);
|
|
} else if (lp_realm() && *lp_realm()) {
|
|
realm.data = lp_realm();
|
|
realm.length = strlen((const char *)realm.data);
|
|
} else {
|
|
rc = krb5_get_host_realm(ctx, NULL, &realms);
|
|
if (rc) {
|
|
DEBUG(1,("krb5_gethost_realm failed (%s)\n",
|
|
error_message(rc)));
|
|
return -1;
|
|
}
|
|
realm.data = (char *) *realms;
|
|
realm.length = strlen((const char *)realm.data);
|
|
}
|
|
|
|
rc = smb_krb5_locate_kdc(ctx, &realm, (struct sockaddr **)(void *)&addrs, &num_kdcs, 0);
|
|
if (rc) {
|
|
DEBUG(1, ("smb_krb5_locate_kdc failed (%s)\n", error_message(rc)));
|
|
return -1;
|
|
}
|
|
for (i=0;i<num_kdcs;i++)
|
|
if (addrs[i].sin_family == AF_INET)
|
|
d_printf("%s:%hd\n", inet_ntoa(addrs[i].sin_addr),
|
|
ntohs(addrs[i].sin_port));
|
|
return 0;
|
|
|
|
#endif
|
|
DEBUG(1, ("No kerberos support\n"));
|
|
return -1;
|
|
}
|
|
|
|
static int net_lookup_name(int argc, const char **argv)
|
|
{
|
|
const char *dom, *name;
|
|
DOM_SID sid;
|
|
enum lsa_SidType type;
|
|
|
|
if (argc != 1) {
|
|
d_printf("usage: net lookup name <name>\n");
|
|
return -1;
|
|
}
|
|
|
|
if (!lookup_name(talloc_tos(), argv[0], LOOKUP_NAME_ALL,
|
|
&dom, &name, &sid, &type)) {
|
|
d_printf("Could not lookup name %s\n", argv[0]);
|
|
return -1;
|
|
}
|
|
|
|
d_printf("%s %d (%s) %s\\%s\n", sid_string_tos(&sid),
|
|
type, sid_type_lookup(type), dom, name);
|
|
return 0;
|
|
}
|
|
|
|
static int net_lookup_sid(int argc, const char **argv)
|
|
{
|
|
const char *dom, *name;
|
|
DOM_SID sid;
|
|
enum lsa_SidType type;
|
|
|
|
if (argc != 1) {
|
|
d_printf("usage: net lookup sid <sid>\n");
|
|
return -1;
|
|
}
|
|
|
|
if (!string_to_sid(&sid, argv[0])) {
|
|
d_printf("Could not convert %s to SID\n", argv[0]);
|
|
return -1;
|
|
}
|
|
|
|
if (!lookup_sid(talloc_tos(), &sid,
|
|
&dom, &name, &type)) {
|
|
d_printf("Could not lookup name %s\n", argv[0]);
|
|
return -1;
|
|
}
|
|
|
|
d_printf("%s %d (%s) %s\\%s\n", sid_string_tos(&sid),
|
|
type, sid_type_lookup(type), dom, name);
|
|
return 0;
|
|
}
|
|
|
|
static int net_lookup_dsgetdcname(int argc, const char **argv)
|
|
{
|
|
NTSTATUS status;
|
|
const char *domain_name = NULL;
|
|
char *site_name = NULL;
|
|
uint32_t flags = 0;
|
|
struct DS_DOMAIN_CONTROLLER_INFO *info = NULL;
|
|
TALLOC_CTX *mem_ctx;
|
|
|
|
if (argc < 1 || argc > 3) {
|
|
d_printf("usage: net lookup dsgetdcname "
|
|
"<name> <flags> <sitename>\n");
|
|
return -1;
|
|
}
|
|
|
|
mem_ctx = talloc_init("net_lookup_dsgetdcname");
|
|
if (!mem_ctx) {
|
|
return -1;
|
|
}
|
|
|
|
domain_name = argv[0];
|
|
|
|
if (argc >= 2)
|
|
sscanf(argv[1], "%x", &flags);
|
|
|
|
if (!flags) {
|
|
flags |= DS_DIRECTORY_SERVICE_REQUIRED;
|
|
}
|
|
|
|
if (argc == 3) {
|
|
site_name = SMB_STRDUP(argv[2]);
|
|
if (!site_name) {
|
|
TALLOC_FREE(mem_ctx);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
if (!site_name) {
|
|
site_name = sitename_fetch(domain_name);
|
|
}
|
|
|
|
status = dsgetdcname(mem_ctx, domain_name, NULL, site_name,
|
|
flags, &info);
|
|
if (!NT_STATUS_IS_OK(status)) {
|
|
d_printf("failed with: %s\n", nt_errstr(status));
|
|
SAFE_FREE(site_name);
|
|
TALLOC_FREE(mem_ctx);
|
|
return -1;
|
|
}
|
|
|
|
display_ds_domain_controller_info(mem_ctx, info);
|
|
|
|
SAFE_FREE(site_name);
|
|
TALLOC_FREE(mem_ctx);
|
|
return 0;
|
|
}
|
|
|
|
|
|
/* lookup hosts or IP addresses using internal samba lookup fns */
|
|
int net_lookup(int argc, const char **argv)
|
|
{
|
|
int i;
|
|
|
|
struct functable table[] = {
|
|
{"HOST", net_lookup_host},
|
|
{"LDAP", net_lookup_ldap},
|
|
{"DC", net_lookup_dc},
|
|
{"PDC", net_lookup_pdc},
|
|
{"MASTER", net_lookup_master},
|
|
{"KDC", net_lookup_kdc},
|
|
{"NAME", net_lookup_name},
|
|
{"SID", net_lookup_sid},
|
|
{"DSGETDCNAME", net_lookup_dsgetdcname},
|
|
{NULL, NULL}
|
|
};
|
|
|
|
if (argc < 1) {
|
|
d_printf("\nUsage: \n");
|
|
return net_lookup_usage(argc, argv);
|
|
}
|
|
for (i=0; table[i].funcname; i++) {
|
|
if (StrCaseCmp(argv[0], table[i].funcname) == 0)
|
|
return table[i].fn(argc-1, argv+1);
|
|
}
|
|
|
|
/* Default to lookup a hostname so 'net lookup foo#1b' can be
|
|
used instead of 'net lookup host foo#1b'. The host syntax
|
|
is a bit confusing as non #00 names can't really be
|
|
considered hosts as such. */
|
|
|
|
return net_lookup_host(argc, argv);
|
|
}
|