mirror of
https://github.com/samba-team/samba.git
synced 2024-12-23 17:34:34 +03:00
a3cd315321
The remaining compat code (get_string, get_bytes, cmp) are useful helper routines which we should simply merge into common (especially since there is some duplication here). Signed-off-by: David Mulder <dmulder@suse.com> Reviewed-by: Douglas Bagnall <douglas.bagnall@catalyst.net.nz> Autobuild-User(master): David Mulder <dmulder@samba.org> Autobuild-Date(master): Fri Oct 2 14:49:36 UTC 2020 on sn-devel-184
255 lines
7.9 KiB
Python
Executable File
255 lines
7.9 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
#
|
|
# update our servicePrincipalName names from spn_update_list
|
|
#
|
|
# Copyright (C) Andrew Tridgell 2010
|
|
# Copyright (C) Matthieu Patou <mat@matws.net> 2012
|
|
#
|
|
# This program is free software; you can redistribute it and/or modify
|
|
# it under the terms of the GNU General Public License as published by
|
|
# the Free Software Foundation; either version 3 of the License, or
|
|
# (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
import os, sys, re
|
|
|
|
# ensure we get messages out immediately, so they get in the samba logs,
|
|
# and don't get swallowed by a timeout
|
|
os.environ['PYTHONUNBUFFERED'] = '1'
|
|
|
|
# forcing GMT avoids a problem in some timezones with kerberos. Both MIT
|
|
# heimdal can get mutual authentication errors due to the 24 second difference
|
|
# between UTC and GMT when using some zone files (eg. the PDT zone from
|
|
# the US)
|
|
os.environ["TZ"] = "GMT"
|
|
|
|
# Find right directory when running from source tree
|
|
sys.path.insert(0, "bin/python")
|
|
|
|
import samba, ldb
|
|
import optparse
|
|
from samba import Ldb
|
|
from samba import getopt as options
|
|
from samba.auth import system_session
|
|
from samba.samdb import SamDB
|
|
from samba.credentials import Credentials, DONT_USE_KERBEROS
|
|
from samba.common import get_string
|
|
|
|
parser = optparse.OptionParser("samba_spnupdate")
|
|
sambaopts = options.SambaOptions(parser)
|
|
parser.add_option_group(sambaopts)
|
|
parser.add_option_group(options.VersionOptions(parser))
|
|
parser.add_option("--verbose", action="store_true")
|
|
|
|
credopts = options.CredentialsOptions(parser)
|
|
parser.add_option_group(credopts)
|
|
|
|
ccachename = None
|
|
|
|
opts, args = parser.parse_args()
|
|
|
|
if len(args) != 0:
|
|
parser.print_usage()
|
|
sys.exit(1)
|
|
|
|
lp = sambaopts.get_loadparm()
|
|
creds = credopts.get_credentials(lp)
|
|
|
|
domain = lp.get("realm")
|
|
host = lp.get("netbios name")
|
|
|
|
|
|
# get the list of substitution vars
|
|
def get_subst_vars(samdb):
|
|
global lp
|
|
vars = {}
|
|
|
|
vars['DNSDOMAIN'] = samdb.domain_dns_name()
|
|
vars['DNSFOREST'] = samdb.forest_dns_name()
|
|
vars['HOSTNAME'] = samdb.host_dns_name()
|
|
vars['NETBIOSNAME'] = lp.get('netbios name').upper()
|
|
vars['WORKGROUP'] = lp.get('workgroup')
|
|
vars['NTDSGUID'] = samdb.get_ntds_GUID()
|
|
res = samdb.search(base=samdb.get_default_basedn(), scope=ldb.SCOPE_BASE, attrs=["objectGUID"])
|
|
guid = samdb.schema_format_value("objectGUID", res[0]['objectGUID'][0])
|
|
vars['DOMAINGUID'] = get_string(guid)
|
|
return vars
|
|
|
|
try:
|
|
private_dir = lp.get("private dir")
|
|
secrets_path = os.path.join(private_dir, "secrets.ldb")
|
|
|
|
secrets_db = Ldb(url=secrets_path, session_info=system_session(),
|
|
credentials=creds, lp=lp)
|
|
res = secrets_db.search(base=None,
|
|
expression="(&(objectclass=ldapSecret)(cn=SAMDB Credentials))",
|
|
attrs=["samAccountName", "secret"])
|
|
|
|
if len(res) == 1:
|
|
credentials = Credentials()
|
|
credentials.set_kerberos_state(DONT_USE_KERBEROS)
|
|
|
|
if "samAccountName" in res[0]:
|
|
credentials.set_username(res[0]["samAccountName"][0])
|
|
|
|
if "secret" in res[0]:
|
|
credentials.set_password(res[0]["secret"][0])
|
|
|
|
else:
|
|
credentials = None
|
|
|
|
samdb = SamDB(url=lp.samdb_url(), session_info=system_session(), credentials=credentials, lp=lp)
|
|
except ldb.LdbError as e:
|
|
(num, msg) = e.args
|
|
print("Unable to open sam database %s : %s" % (lp.samdb_url(), msg))
|
|
sys.exit(1)
|
|
|
|
|
|
# get the substitution dictionary
|
|
sub_vars = get_subst_vars(samdb)
|
|
|
|
# get the list of SPN entries we should have
|
|
spn_update_list = lp.private_path('spn_update_list')
|
|
|
|
file = open(spn_update_list, "r")
|
|
|
|
spn_list = []
|
|
|
|
has_forest_dns = False
|
|
has_domain_dns = False
|
|
# check if we "are DNS server"
|
|
res = samdb.search(base=samdb.get_config_basedn(),
|
|
expression='(objectguid=%s)' % sub_vars['NTDSGUID'],
|
|
attrs=["msDS-hasMasterNCs"])
|
|
|
|
basedn = str(samdb.get_default_basedn())
|
|
if len(res) == 1:
|
|
if "msDS-hasMasterNCs" in res[0]:
|
|
for e in res[0]["msDS-hasMasterNCs"]:
|
|
if str(e) == "DC=DomainDnsZones,%s" % basedn:
|
|
has_domain_dns = True
|
|
if str(e) == "DC=ForestDnsZones,%s" % basedn:
|
|
has_forest_dns = True
|
|
|
|
|
|
# build the spn list
|
|
for line in file:
|
|
line = line.strip()
|
|
if line == '' or line[0] == "#":
|
|
continue
|
|
if re.match(r".*/DomainDnsZones\..*", line) and not has_domain_dns:
|
|
continue
|
|
if re.match(r".*/ForestDnsZones\..*", line) and not has_forest_dns:
|
|
continue
|
|
line = samba.substitute_var(line, sub_vars)
|
|
spn_list.append(line)
|
|
|
|
# get the current list of SPNs in our sam
|
|
res = samdb.search(base=samdb.get_default_basedn(),
|
|
expression='(&(objectClass=computer)(samaccountname=%s$))' % sub_vars['NETBIOSNAME'],
|
|
attrs=["servicePrincipalName"])
|
|
if not res or len(res) != 1:
|
|
print("Failed to find computer object for %s$" % sub_vars['NETBIOSNAME'])
|
|
sys.exit(1)
|
|
|
|
machine_dn = res[0]["dn"]
|
|
|
|
old_spns = []
|
|
if "servicePrincipalName" in res[0]:
|
|
for s in res[0]["servicePrincipalName"]:
|
|
old_spns.append(str(s))
|
|
|
|
if opts.verbose:
|
|
print("Existing SPNs: %s" % old_spns)
|
|
|
|
add_list = []
|
|
|
|
# work out what needs to be added
|
|
for s in spn_list:
|
|
in_list = False
|
|
for s2 in old_spns:
|
|
if s2.upper() == s.upper():
|
|
in_list = True
|
|
break
|
|
if not in_list:
|
|
add_list.append(s)
|
|
|
|
if opts.verbose:
|
|
print("New SPNs: %s" % add_list)
|
|
|
|
if add_list == []:
|
|
if opts.verbose:
|
|
print("Nothing to add")
|
|
sys.exit(0)
|
|
|
|
def local_update(add_list):
|
|
'''store locally'''
|
|
global res
|
|
msg = ldb.Message()
|
|
msg.dn = res[0]['dn']
|
|
msg[""] = ldb.MessageElement(add_list,
|
|
ldb.FLAG_MOD_ADD, "servicePrincipalName")
|
|
res = samdb.modify(msg)
|
|
|
|
def call_rodc_update(d):
|
|
'''RODCs need to use the writeSPN DRS call'''
|
|
global lp, sub_vars
|
|
from samba import drs_utils
|
|
from samba.dcerpc import drsuapi, nbt
|
|
from samba.net import Net
|
|
|
|
if opts.verbose:
|
|
print("Using RODC SPN update")
|
|
|
|
creds = credopts.get_credentials(lp)
|
|
creds.set_machine_account(lp)
|
|
|
|
net = Net(creds=creds, lp=lp)
|
|
try:
|
|
cldap_ret = net.finddc(domain=domain, flags=nbt.NBT_SERVER_DS | nbt.NBT_SERVER_WRITABLE)
|
|
except Exception as reason:
|
|
print("Unable to find writeable DC for domain '%s' to send DRS writeSPN to : %s" % (domain, reason))
|
|
sys.exit(1)
|
|
server = cldap_ret.pdc_dns_name
|
|
try:
|
|
binding_options = "seal"
|
|
if lp.log_level() >= 5:
|
|
binding_options += ",print"
|
|
drs = drsuapi.drsuapi('ncacn_ip_tcp:%s[%s]' % (server, binding_options), lp, creds)
|
|
(drs_handle, supported_extensions) = drs_utils.drs_DsBind(drs)
|
|
except Exception as reason:
|
|
print("Unable to connect to DC '%s' for domain '%s' : %s" % (server, domain, reason))
|
|
sys.exit(1)
|
|
req1 = drsuapi.DsWriteAccountSpnRequest1()
|
|
req1.operation = drsuapi.DRSUAPI_DS_SPN_OPERATION_ADD
|
|
req1.object_dn = str(machine_dn)
|
|
req1.count = 0
|
|
spn_names = []
|
|
for n in add_list:
|
|
if n.find('E3514235-4B06-11D1-AB04-00C04FC2DCD2') != -1:
|
|
# this one isn't allowed for RODCs, but we don't know why yet
|
|
continue
|
|
ns = drsuapi.DsNameString()
|
|
ns.str = n
|
|
spn_names.append(ns)
|
|
req1.count = req1.count + 1
|
|
if spn_names == []:
|
|
return
|
|
req1.spn_names = spn_names
|
|
(level, res) = drs.DsWriteAccountSpn(drs_handle, 1, req1)
|
|
if (res.status != (0, 'WERR_OK')):
|
|
print("WriteAccountSpn has failed with error %s" % str(res.status))
|
|
|
|
if samdb.am_rodc():
|
|
call_rodc_update(add_list)
|
|
else:
|
|
local_update(add_list)
|