1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-28 07:21:54 +03:00
samba-mirror/source3/utils/net_ads_cldap.c
Andrew Bartlett e88eab35bc Merge from HEAD:
signed/unsigned (mostly i counters)

a little bit of const.

Andrew Bartlett
(This used to be commit 50f0ca752e)
2003-03-17 23:04:03 +00:00

355 lines
8.9 KiB
C

/*
Samba Unix/Linux SMB client library
net ads cldap functions
Copyright (C) 2001 Andrew Tridgell (tridge@samba.org)
Copyright (C) 2003 Jim McDonough (jmcd@us.ibm.com)
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#include "includes.h"
#include "../utils/net.h"
#ifdef HAVE_ADS
struct netlogon_string {
uint32 comp_len;
char **component;
uint8 extra_flag;
};
struct cldap_netlogon_reply {
uint32 type;
uint32 flags;
GUID guid;
struct netlogon_string forest;
struct netlogon_string domain;
struct netlogon_string hostname;
struct netlogon_string netbios_domain;
struct netlogon_string netbios_hostname;
struct netlogon_string user_name;
struct netlogon_string site_name;
struct netlogon_string unk0;
uint32 version;
uint16 lmnt_token;
uint16 lm20_token;
};
/*
These strings are rather interesting... They are composed of a series of
length encoded strings, terminated by either 1) a zero length string or 2)
a 0xc0 byte with what appears to be a one byte flags immediately following.
*/
static unsigned pull_netlogon_string(struct netlogon_string *ret,const char *d)
{
const char *p = (const char *)d;
ZERO_STRUCTP(ret);
do {
unsigned len = (unsigned char)*p;
p++;
if (len > 0 && len != 0xc0) {
ret->component = realloc(ret->component,
++ret->comp_len *
sizeof(char *));
ret->component[ret->comp_len - 1] =
smb_xstrndup(p, len);
p += len;
} else {
if (len == 0xc0) {
ret->extra_flag = *p;
p++;
};
break;
}
} while (1);
return (p - d);
}
/*
do a cldap netlogon query
*/
static int send_cldap_netlogon(int sock, const char *domain,
const char *hostname, unsigned ntversion)
{
ASN1_DATA data;
char ntver[4];
SIVAL(ntver, 0, ntversion);
memset(&data, 0, sizeof(data));
asn1_push_tag(&data,ASN1_SEQUENCE(0));
asn1_write_Integer(&data, 4);
asn1_push_tag(&data, ASN1_APPLICATION(3));
asn1_write_OctetString(&data, NULL, 0);
asn1_write_enumerated(&data, 0);
asn1_write_enumerated(&data, 0);
asn1_write_Integer(&data, 0);
asn1_write_Integer(&data, 0);
asn1_write_BOOLEAN2(&data, False);
asn1_push_tag(&data, ASN1_CONTEXT(0));
asn1_push_tag(&data, ASN1_CONTEXT(3));
asn1_write_OctetString(&data, "DnsDomain", 9);
asn1_write_OctetString(&data, domain, strlen(domain));
asn1_pop_tag(&data);
asn1_push_tag(&data, ASN1_CONTEXT(3));
asn1_write_OctetString(&data, "Host", 4);
asn1_write_OctetString(&data, hostname, strlen(hostname));
asn1_pop_tag(&data);
asn1_push_tag(&data, ASN1_CONTEXT(3));
asn1_write_OctetString(&data, "NtVer", 5);
asn1_write_OctetString(&data, ntver, 4);
asn1_pop_tag(&data);
asn1_pop_tag(&data);
asn1_push_tag(&data,ASN1_SEQUENCE(0));
asn1_write_OctetString(&data, "NetLogon", 8);
asn1_pop_tag(&data);
asn1_pop_tag(&data);
asn1_pop_tag(&data);
if (data.has_error) {
d_printf("Failed to build cldap netlogon at offset %d\n", (int)data.ofs);
asn1_free(&data);
return -1;
}
if (write(sock, data.data, data.length) != (ssize_t)data.length) {
d_printf("failed to send cldap query (%s)\n", strerror(errno));
}
file_save("cldap_query.dat", data.data, data.length);
asn1_free(&data);
return 0;
}
/*
receive a cldap netlogon reply
*/
static int recv_cldap_netlogon(int sock, struct cldap_netlogon_reply *reply)
{
int ret;
ASN1_DATA data;
DATA_BLOB blob;
DATA_BLOB os1, os2, os3;
uint32 i1;
char *p;
blob = data_blob(NULL, 8192);
ret = read(sock, blob.data, blob.length);
if (ret <= 0) {
d_printf("no reply received to cldap netlogon\n");
return -1;
}
blob.length = ret;
file_save("cldap_reply.dat", blob.data, blob.length);
asn1_load(&data, blob);
asn1_start_tag(&data, ASN1_SEQUENCE(0));
asn1_read_Integer(&data, &i1);
asn1_start_tag(&data, ASN1_APPLICATION(4));
asn1_read_OctetString(&data, &os1);
asn1_start_tag(&data, ASN1_SEQUENCE(0));
asn1_start_tag(&data, ASN1_SEQUENCE(0));
asn1_read_OctetString(&data, &os2);
asn1_start_tag(&data, ASN1_SET);
asn1_read_OctetString(&data, &os3);
asn1_end_tag(&data);
asn1_end_tag(&data);
asn1_end_tag(&data);
asn1_end_tag(&data);
asn1_end_tag(&data);
if (data.has_error) {
d_printf("Failed to parse cldap reply\n");
return -1;
}
file_save("cldap_reply_core.dat", os3.data, os3.length);
p = os3.data;
reply->type = IVAL(p, 0); p += 4;
reply->flags = IVAL(p, 0); p += 4;
memcpy(&reply->guid.info, p, GUID_SIZE);
p += GUID_SIZE;
p += pull_netlogon_string(&reply->forest, p);
p += pull_netlogon_string(&reply->domain, p);
p += pull_netlogon_string(&reply->hostname, p);
p += pull_netlogon_string(&reply->netbios_domain, p);
p += pull_netlogon_string(&reply->netbios_hostname, p);
p += pull_netlogon_string(&reply->user_name, p);
p += pull_netlogon_string(&reply->site_name, p);
p += pull_netlogon_string(&reply->unk0, p);
reply->version = IVAL(p, 0);
reply->lmnt_token = SVAL(p, 4);
reply->lm20_token = SVAL(p, 6);
data_blob_free(&os1);
data_blob_free(&os2);
data_blob_free(&os3);
data_blob_free(&blob);
return 0;
}
/*
free a netlogon string
*/
static void netlogon_string_free(struct netlogon_string *str)
{
unsigned int i;
for (i = 0; i < str->comp_len; ++i) {
SAFE_FREE(str->component[i]);
}
SAFE_FREE(str->component);
}
/*
free a cldap reply packet
*/
static void cldap_reply_free(struct cldap_netlogon_reply *reply)
{
netlogon_string_free(&reply->forest);
netlogon_string_free(&reply->domain);
netlogon_string_free(&reply->hostname);
netlogon_string_free(&reply->netbios_domain);
netlogon_string_free(&reply->netbios_hostname);
netlogon_string_free(&reply->user_name);
netlogon_string_free(&reply->site_name);
netlogon_string_free(&reply->unk0);
}
static void d_print_netlogon_string(const char *label,
struct netlogon_string *str)
{
unsigned int i;
if (str->comp_len) {
d_printf("%s", label);
if (str->extra_flag) {
d_printf("[%d]", str->extra_flag);
}
d_printf(": ");
for (i = 0; i < str->comp_len; ++i) {
d_printf("%s%s", (i ? "." : ""), str->component[i]);
}
d_printf("\n");
}
}
/*
do a cldap netlogon query
*/
int ads_cldap_netlogon(ADS_STRUCT *ads)
{
int sock;
int ret;
struct cldap_netlogon_reply reply;
sock = open_udp_socket(inet_ntoa(ads->ldap_ip), ads->ldap_port);
if (sock == -1) {
d_printf("Failed to open udp socket to %s:%u\n",
inet_ntoa(ads->ldap_ip),
ads->ldap_port);
return -1;
}
ret = send_cldap_netlogon(sock, ads->config.realm, global_myname(), 6);
if (ret != 0) {
return ret;
}
ret = recv_cldap_netlogon(sock, &reply);
close(sock);
if (ret == -1) {
return -1;
}
d_printf("Information for Domain Controller: %s\n\n",
ads->config.ldap_server_name);
d_printf("Response Type: 0x%x\n", reply.type);
d_printf("GUID: ");
print_guid(&reply.guid);
d_printf("Flags:\n"
"\tIs a PDC: %s\n"
"\tIs a GC of the forest: %s\n"
"\tIs an LDAP server: %s\n"
"\tSupports DS: %s\n"
"\tIs running a KDC: %s\n"
"\tIs running time services: %s\n"
"\tIs the closest DC: %s\n"
"\tIs writable: %s\n"
"\tHas a hardware clock: %s\n"
"\tIs a non-domain NC serviced by LDAP server: %s\n",
(reply.flags & ADS_PDC) ? "yes" : "no",
(reply.flags & ADS_GC) ? "yes" : "no",
(reply.flags & ADS_LDAP) ? "yes" : "no",
(reply.flags & ADS_DS) ? "yes" : "no",
(reply.flags & ADS_KDC) ? "yes" : "no",
(reply.flags & ADS_TIMESERV) ? "yes" : "no",
(reply.flags & ADS_CLOSEST) ? "yes" : "no",
(reply.flags & ADS_WRITABLE) ? "yes" : "no",
(reply.flags & ADS_GOOD_TIMESERV) ? "yes" : "no",
(reply.flags & ADS_NDNC) ? "yes" : "no");
d_print_netlogon_string("Forest", &reply.forest);
d_print_netlogon_string("Domain", &reply.domain);
d_print_netlogon_string("Hostname", &reply.hostname);
d_print_netlogon_string("Pre-Win2k Domain", &reply.netbios_domain);
d_print_netlogon_string("Pre-Win2k Hostname", &reply.netbios_hostname);
d_print_netlogon_string("User name", &reply.user_name);
d_print_netlogon_string("Site Name", &reply.site_name);
d_print_netlogon_string("Unknown Field", &reply.unk0);
d_printf("NT Version: %d\n", reply.version);
d_printf("LMNT Token: %.2x\n", reply.lmnt_token);
d_printf("LM20 Token: %.2x\n", reply.lm20_token);
cldap_reply_free(&reply);
return ret;
}
#endif