Line data Source code
1 : /*
2 : Unix SMB/CIFS implementation.
3 :
4 : In-Child server implementation of the routines defined in wbint.idl
5 :
6 : Copyright (C) Volker Lendecke 2009
7 : Copyright (C) Guenther Deschner 2009
8 :
9 : This program is free software; you can redistribute it and/or modify
10 : it under the terms of the GNU General Public License as published by
11 : the Free Software Foundation; either version 3 of the License, or
12 : (at your option) any later version.
13 :
14 : This program is distributed in the hope that it will be useful,
15 : but WITHOUT ANY WARRANTY; without even the implied warranty of
16 : MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 : GNU General Public License for more details.
18 :
19 : You should have received a copy of the GNU General Public License
20 : along with this program. If not, see <http://www.gnu.org/licenses/>.
21 : */
22 :
23 : #include "includes.h"
24 : #include "winbindd/winbindd.h"
25 : #include "winbindd/winbindd_proto.h"
26 : #include "rpc_client/cli_pipe.h"
27 : #include "ntdomain.h"
28 : #include "librpc/rpc/dcesrv_core.h"
29 : #include "librpc/gen_ndr/ndr_winbind.h"
30 : #include "librpc/gen_ndr/ndr_winbind_scompat.h"
31 : #include "../librpc/gen_ndr/ndr_netlogon_c.h"
32 : #include "../librpc/gen_ndr/ndr_lsa_c.h"
33 : #include "idmap.h"
34 : #include "../libcli/security/security.h"
35 : #include "../libcli/auth/netlogon_creds_cli.h"
36 : #include "passdb.h"
37 : #include "../source4/dsdb/samdb/samdb.h"
38 : #include "rpc_client/cli_netlogon.h"
39 : #include "rpc_client/util_netlogon.h"
40 : #include "libsmb/dsgetdcname.h"
41 : #include "lib/global_contexts.h"
42 :
43 0 : NTSTATUS _wbint_Ping(struct pipes_struct *p, struct wbint_Ping *r)
44 : {
45 0 : *r->out.out_data = r->in.in_data;
46 0 : return NT_STATUS_OK;
47 : }
48 :
49 0 : NTSTATUS _wbint_InitConnection(struct pipes_struct *p,
50 : struct wbint_InitConnection *r)
51 : {
52 0 : struct winbindd_domain *domain = wb_child_domain();
53 :
54 0 : if (r->in.dcname != NULL && strlen(r->in.dcname) > 0) {
55 0 : TALLOC_FREE(domain->dcname);
56 0 : domain->dcname = talloc_strdup(domain, r->in.dcname);
57 0 : if (domain->dcname == NULL) {
58 0 : return NT_STATUS_NO_MEMORY;
59 : }
60 : }
61 :
62 0 : init_dc_connection(domain, false);
63 :
64 0 : if (!domain->initialized) {
65 : /*
66 : * If we return error here we can't do any cached
67 : * authentication, but we may be in disconnected mode and can't
68 : * initialize correctly. Do what the previous code did and just
69 : * return without initialization, once we go online we'll
70 : * re-initialize.
71 : */
72 0 : DBG_INFO("%s returning without initialization online = %d\n",
73 : domain->name, (int)domain->online);
74 : }
75 :
76 0 : *r->out.name = talloc_strdup(p->mem_ctx, domain->name);
77 0 : if (*r->out.name == NULL) {
78 0 : return NT_STATUS_NO_MEMORY;
79 : }
80 :
81 0 : if (domain->alt_name != NULL) {
82 0 : *r->out.alt_name = talloc_strdup(p->mem_ctx, domain->alt_name);
83 0 : if (*r->out.alt_name == NULL) {
84 0 : return NT_STATUS_NO_MEMORY;
85 : }
86 : }
87 :
88 0 : r->out.sid = dom_sid_dup(p->mem_ctx, &domain->sid);
89 0 : if (r->out.sid == NULL) {
90 0 : return NT_STATUS_NO_MEMORY;
91 : }
92 :
93 0 : *r->out.flags = 0;
94 0 : if (domain->native_mode) {
95 0 : *r->out.flags |= WB_DOMINFO_DOMAIN_NATIVE;
96 : }
97 0 : if (domain->active_directory) {
98 0 : *r->out.flags |= WB_DOMINFO_DOMAIN_AD;
99 : }
100 0 : if (domain->primary) {
101 0 : *r->out.flags |= WB_DOMINFO_DOMAIN_PRIMARY;
102 : }
103 :
104 0 : return NT_STATUS_OK;
105 : }
106 :
107 0 : bool reset_cm_connection_on_error(struct winbindd_domain *domain,
108 : struct dcerpc_binding_handle *b,
109 : NTSTATUS status)
110 : {
111 0 : if (NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED) ||
112 0 : NT_STATUS_EQUAL(status, NT_STATUS_RPC_SEC_PKG_ERROR) ||
113 0 : NT_STATUS_EQUAL(status, NT_STATUS_NETWORK_ACCESS_DENIED)) {
114 0 : invalidate_cm_connection(domain);
115 0 : domain->conn.netlogon_force_reauth = true;
116 0 : return true;
117 : }
118 :
119 0 : if (NT_STATUS_EQUAL(status, NT_STATUS_IO_TIMEOUT) ||
120 0 : NT_STATUS_EQUAL(status, NT_STATUS_IO_DEVICE_ERROR))
121 : {
122 0 : invalidate_cm_connection(domain);
123 : /* We invalidated the connection. */
124 0 : return true;
125 : }
126 :
127 0 : if (b != NULL && !dcerpc_binding_handle_is_connected(b)) {
128 0 : invalidate_cm_connection(domain);
129 0 : return true;
130 : }
131 :
132 0 : return false;
133 : }
134 :
135 0 : NTSTATUS _wbint_LookupSid(struct pipes_struct *p, struct wbint_LookupSid *r)
136 : {
137 0 : struct winbindd_domain *domain = wb_child_domain();
138 0 : char *dom_name;
139 0 : char *name;
140 0 : enum lsa_SidType type;
141 0 : NTSTATUS status;
142 :
143 0 : if (domain == NULL) {
144 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
145 : }
146 :
147 0 : status = wb_cache_sid_to_name(domain, p->mem_ctx, r->in.sid,
148 : &dom_name, &name, &type);
149 0 : reset_cm_connection_on_error(domain, NULL, status);
150 0 : if (!NT_STATUS_IS_OK(status)) {
151 0 : return status;
152 : }
153 :
154 0 : *r->out.domain = dom_name;
155 0 : *r->out.name = name;
156 0 : *r->out.type = type;
157 0 : return NT_STATUS_OK;
158 : }
159 :
160 0 : NTSTATUS _wbint_LookupSids(struct pipes_struct *p, struct wbint_LookupSids *r)
161 : {
162 0 : struct winbindd_domain *domain = wb_child_domain();
163 0 : struct lsa_RefDomainList *domains = r->out.domains;
164 0 : NTSTATUS status;
165 0 : bool retry = false;
166 :
167 0 : if (domain == NULL) {
168 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
169 : }
170 :
171 : /*
172 : * This breaks the winbindd_domain->methods abstraction: This
173 : * is only called for remote domains, and both winbindd_msrpc
174 : * and winbindd_ad call into lsa_lookupsids anyway. Caching is
175 : * done at the wbint RPC layer.
176 : */
177 0 : again:
178 0 : status = rpc_lookup_sids(p->mem_ctx, domain, r->in.sids,
179 : &domains, &r->out.names);
180 :
181 0 : if (domains != NULL) {
182 0 : r->out.domains = domains;
183 : }
184 :
185 0 : if (!retry && reset_cm_connection_on_error(domain, NULL, status)) {
186 0 : retry = true;
187 0 : goto again;
188 : }
189 :
190 0 : return status;
191 : }
192 :
193 0 : NTSTATUS _wbint_LookupName(struct pipes_struct *p, struct wbint_LookupName *r)
194 : {
195 0 : struct winbindd_domain *domain = wb_child_domain();
196 0 : NTSTATUS status;
197 :
198 0 : if (domain == NULL) {
199 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
200 : }
201 :
202 0 : status = wb_cache_name_to_sid(domain, p->mem_ctx, r->in.domain,
203 : r->in.name, r->in.flags,
204 : r->out.sid, r->out.type);
205 0 : reset_cm_connection_on_error(domain, NULL, status);
206 0 : return status;
207 : }
208 :
209 0 : NTSTATUS _wbint_Sids2UnixIDs(struct pipes_struct *p,
210 : struct wbint_Sids2UnixIDs *r)
211 : {
212 0 : uint32_t i;
213 :
214 0 : struct lsa_DomainInfo *d;
215 0 : struct wbint_TransID *ids;
216 0 : uint32_t num_ids;
217 :
218 0 : struct id_map **id_map_ptrs = NULL;
219 0 : struct idmap_domain *dom;
220 0 : NTSTATUS status = NT_STATUS_NO_MEMORY;
221 :
222 0 : if (r->in.domains->count != 1) {
223 0 : return NT_STATUS_INVALID_PARAMETER;
224 : }
225 :
226 0 : d = &r->in.domains->domains[0];
227 0 : ids = r->in.ids->ids;
228 0 : num_ids = r->in.ids->num_ids;
229 :
230 0 : dom = idmap_find_domain_with_sid(d->name.string, d->sid);
231 0 : if (dom == NULL) {
232 0 : struct dom_sid_buf buf;
233 0 : DEBUG(10, ("idmap domain %s:%s not found\n",
234 : d->name.string,
235 : dom_sid_str_buf(d->sid, &buf)));
236 :
237 0 : for (i=0; i<num_ids; i++) {
238 :
239 0 : ids[i].xid = (struct unixid) {
240 : .id = UINT32_MAX,
241 : .type = ID_TYPE_NOT_SPECIFIED
242 : };
243 : }
244 :
245 0 : return NT_STATUS_OK;
246 : }
247 :
248 0 : id_map_ptrs = id_map_ptrs_init(talloc_tos(), num_ids);
249 0 : if (id_map_ptrs == NULL) {
250 0 : goto nomem;
251 : }
252 :
253 : /*
254 : * Convert the input data into a list of id_map structs
255 : * suitable for handing in to the idmap sids_to_unixids
256 : * method.
257 : */
258 :
259 0 : for (i=0; i<num_ids; i++) {
260 0 : struct id_map *m = id_map_ptrs[i];
261 :
262 0 : sid_compose(m->sid, d->sid, ids[i].rid);
263 0 : m->status = ID_UNKNOWN;
264 0 : m->xid = (struct unixid) { .type = ids[i].type_hint };
265 : }
266 :
267 0 : status = dom->methods->sids_to_unixids(dom, id_map_ptrs);
268 :
269 0 : if (NT_STATUS_EQUAL(status, STATUS_SOME_UNMAPPED)) {
270 : /*
271 : * This is okay. We need to transfer the mapped ones
272 : * up to our caller. The individual mappings carry the
273 : * information whether they are mapped or not.
274 : */
275 0 : status = NT_STATUS_OK;
276 : }
277 :
278 0 : if (!NT_STATUS_IS_OK(status)) {
279 0 : DEBUG(10, ("sids_to_unixids returned %s\n",
280 : nt_errstr(status)));
281 0 : goto done;
282 : }
283 :
284 : /*
285 : * Extract the results for handing them back to the caller.
286 : */
287 :
288 0 : for (i=0; i<num_ids; i++) {
289 0 : struct id_map *m = id_map_ptrs[i];
290 :
291 0 : if (m->status == ID_REQUIRE_TYPE) {
292 0 : ids[i].xid.id = UINT32_MAX;
293 0 : ids[i].xid.type = ID_TYPE_WB_REQUIRE_TYPE;
294 0 : continue;
295 : }
296 :
297 0 : if (!idmap_unix_id_is_in_range(m->xid.id, dom)) {
298 0 : DBG_DEBUG("id %"PRIu32" is out of range "
299 : "%"PRIu32"-%"PRIu32" for domain %s\n",
300 : m->xid.id, dom->low_id, dom->high_id,
301 : dom->name);
302 0 : m->status = ID_UNMAPPED;
303 : }
304 :
305 0 : if (m->status == ID_MAPPED) {
306 0 : ids[i].xid = m->xid;
307 : } else {
308 0 : ids[i].xid.id = UINT32_MAX;
309 0 : ids[i].xid.type = ID_TYPE_NOT_SPECIFIED;
310 : }
311 : }
312 :
313 0 : goto done;
314 0 : nomem:
315 0 : status = NT_STATUS_NO_MEMORY;
316 0 : done:
317 0 : TALLOC_FREE(id_map_ptrs);
318 0 : return status;
319 : }
320 :
321 0 : NTSTATUS _wbint_UnixIDs2Sids(struct pipes_struct *p,
322 : struct wbint_UnixIDs2Sids *r)
323 : {
324 0 : struct id_map **maps;
325 0 : NTSTATUS status;
326 0 : uint32_t i;
327 :
328 0 : maps = id_map_ptrs_init(talloc_tos(), r->in.num_ids);
329 0 : if (maps == NULL) {
330 0 : return NT_STATUS_NO_MEMORY;
331 : }
332 :
333 0 : for (i=0; i<r->in.num_ids; i++) {
334 0 : maps[i]->status = ID_UNKNOWN;
335 0 : maps[i]->xid = r->in.xids[i];
336 : }
337 :
338 0 : status = idmap_backend_unixids_to_sids(maps, r->in.domain_name,
339 : r->in.domain_sid);
340 0 : if (!NT_STATUS_IS_OK(status)) {
341 0 : TALLOC_FREE(maps);
342 0 : return status;
343 : }
344 :
345 0 : for (i=0; i<r->in.num_ids; i++) {
346 0 : if (maps[i]->status == ID_MAPPED) {
347 0 : r->out.xids[i] = maps[i]->xid;
348 0 : sid_copy(&r->out.sids[i], maps[i]->sid);
349 : } else {
350 0 : r->out.sids[i] = (struct dom_sid) { 0 };
351 : }
352 : }
353 :
354 0 : TALLOC_FREE(maps);
355 :
356 0 : return NT_STATUS_OK;
357 : }
358 :
359 0 : NTSTATUS _wbint_AllocateUid(struct pipes_struct *p, struct wbint_AllocateUid *r)
360 : {
361 0 : struct unixid xid;
362 0 : NTSTATUS status;
363 :
364 0 : status = idmap_allocate_uid(&xid);
365 0 : if (!NT_STATUS_IS_OK(status)) {
366 0 : return status;
367 : }
368 0 : *r->out.uid = xid.id;
369 0 : return NT_STATUS_OK;
370 : }
371 :
372 0 : NTSTATUS _wbint_AllocateGid(struct pipes_struct *p, struct wbint_AllocateGid *r)
373 : {
374 0 : struct unixid xid;
375 0 : NTSTATUS status;
376 :
377 0 : status = idmap_allocate_gid(&xid);
378 0 : if (!NT_STATUS_IS_OK(status)) {
379 0 : return status;
380 : }
381 0 : *r->out.gid = xid.id;
382 0 : return NT_STATUS_OK;
383 : }
384 :
385 0 : NTSTATUS _wbint_GetNssInfo(struct pipes_struct *p, struct wbint_GetNssInfo *r)
386 : {
387 0 : struct idmap_domain *domain;
388 0 : NTSTATUS status;
389 :
390 0 : domain = idmap_find_domain(r->in.info->domain_name);
391 0 : if ((domain == NULL) || (domain->query_user == NULL)) {
392 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
393 : }
394 :
395 0 : status = domain->query_user(domain, r->in.info);
396 0 : return status;
397 : }
398 :
399 0 : NTSTATUS _wbint_LookupUserAliases(struct pipes_struct *p,
400 : struct wbint_LookupUserAliases *r)
401 : {
402 0 : struct winbindd_domain *domain = wb_child_domain();
403 0 : NTSTATUS status;
404 :
405 0 : if (domain == NULL) {
406 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
407 : }
408 :
409 0 : status = wb_cache_lookup_useraliases(domain, p->mem_ctx,
410 0 : r->in.sids->num_sids,
411 0 : r->in.sids->sids,
412 0 : &r->out.rids->num_rids,
413 0 : &r->out.rids->rids);
414 0 : reset_cm_connection_on_error(domain, NULL, status);
415 0 : return status;
416 : }
417 :
418 0 : NTSTATUS _wbint_LookupUserGroups(struct pipes_struct *p,
419 : struct wbint_LookupUserGroups *r)
420 : {
421 0 : struct winbindd_domain *domain = wb_child_domain();
422 0 : NTSTATUS status;
423 :
424 0 : if (domain == NULL) {
425 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
426 : }
427 :
428 0 : status = wb_cache_lookup_usergroups(domain, p->mem_ctx, r->in.sid,
429 0 : &r->out.sids->num_sids,
430 0 : &r->out.sids->sids);
431 0 : reset_cm_connection_on_error(domain, NULL, status);
432 0 : return status;
433 : }
434 :
435 0 : NTSTATUS _wbint_QuerySequenceNumber(struct pipes_struct *p,
436 : struct wbint_QuerySequenceNumber *r)
437 : {
438 0 : struct winbindd_domain *domain = wb_child_domain();
439 0 : NTSTATUS status;
440 :
441 0 : if (domain == NULL) {
442 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
443 : }
444 :
445 0 : status = wb_cache_sequence_number(domain, r->out.sequence);
446 0 : reset_cm_connection_on_error(domain, NULL, status);
447 0 : return status;
448 : }
449 :
450 0 : NTSTATUS _wbint_LookupGroupMembers(struct pipes_struct *p,
451 : struct wbint_LookupGroupMembers *r)
452 : {
453 0 : struct winbindd_domain *domain = wb_child_domain();
454 0 : uint32_t i, num_names;
455 0 : struct dom_sid *sid_mem;
456 0 : char **names;
457 0 : uint32_t *name_types;
458 0 : NTSTATUS status;
459 :
460 0 : if (domain == NULL) {
461 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
462 : }
463 :
464 0 : status = wb_cache_lookup_groupmem(domain, p->mem_ctx, r->in.sid,
465 : r->in.type, &num_names, &sid_mem,
466 : &names, &name_types);
467 0 : reset_cm_connection_on_error(domain, NULL, status);
468 0 : if (!NT_STATUS_IS_OK(status)) {
469 0 : return status;
470 : }
471 :
472 0 : r->out.members->num_principals = num_names;
473 0 : r->out.members->principals = talloc_array(
474 : r->out.members, struct wbint_Principal, num_names);
475 0 : if (r->out.members->principals == NULL) {
476 0 : return NT_STATUS_NO_MEMORY;
477 : }
478 :
479 0 : for (i=0; i<num_names; i++) {
480 0 : struct wbint_Principal *m = &r->out.members->principals[i];
481 0 : sid_copy(&m->sid, &sid_mem[i]);
482 0 : m->name = talloc_move(r->out.members->principals, &names[i]);
483 0 : m->type = (enum lsa_SidType)name_types[i];
484 : }
485 :
486 0 : return NT_STATUS_OK;
487 : }
488 :
489 0 : NTSTATUS _wbint_LookupAliasMembers(struct pipes_struct *p,
490 : struct wbint_LookupAliasMembers *r)
491 : {
492 0 : struct winbindd_domain *domain = wb_child_domain();
493 0 : NTSTATUS status;
494 :
495 0 : if (domain == NULL) {
496 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
497 : }
498 0 : status = wb_cache_lookup_aliasmem(domain,
499 : p->mem_ctx,
500 0 : r->in.sid,
501 : r->in.type,
502 0 : &r->out.sids->num_sids,
503 0 : &r->out.sids->sids);
504 0 : reset_cm_connection_on_error(domain, NULL, status);
505 0 : if (!NT_STATUS_IS_OK(status)) {
506 0 : return status;
507 : }
508 :
509 0 : return NT_STATUS_OK;
510 : }
511 :
512 0 : NTSTATUS _wbint_QueryGroupList(struct pipes_struct *p,
513 : struct wbint_QueryGroupList *r)
514 : {
515 0 : TALLOC_CTX *frame = NULL;
516 0 : struct winbindd_domain *domain = wb_child_domain();
517 0 : uint32_t i;
518 0 : uint32_t num_local_groups = 0;
519 0 : struct wb_acct_info *local_groups = NULL;
520 0 : uint32_t num_dom_groups = 0;
521 0 : struct wb_acct_info *dom_groups = NULL;
522 0 : uint32_t ti = 0;
523 0 : uint64_t num_total = 0;
524 0 : struct wbint_Principal *result;
525 0 : NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
526 0 : bool include_local_groups = false;
527 :
528 0 : if (domain == NULL) {
529 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
530 : }
531 :
532 0 : frame = talloc_stackframe();
533 :
534 0 : switch (lp_server_role()) {
535 0 : case ROLE_ACTIVE_DIRECTORY_DC:
536 0 : if (domain->internal) {
537 : /*
538 : * we want to include local groups
539 : * for BUILTIN and WORKGROUP
540 : */
541 0 : include_local_groups = true;
542 : }
543 0 : break;
544 0 : case ROLE_DOMAIN_MEMBER:
545 : /*
546 : * This is needed for GETGRENT to show also e.g. BUILTIN/users.
547 : * Otherwise the test_membership_user (smbtorture
548 : * local.nss.membership) would fail (getgrouplist() would
549 : * reports BUILTIN/users).
550 : */
551 0 : if (domain->internal) {
552 : /*
553 : * we want to include local groups
554 : * for BUILTIN and LOCALSAM
555 : */
556 0 : include_local_groups = true;
557 : }
558 0 : break;
559 0 : default:
560 : /*
561 : * We might include local groups in more
562 : * setups later, but that requires more work
563 : * elsewhere.
564 : */
565 0 : break;
566 : }
567 :
568 0 : if (include_local_groups) {
569 0 : status = wb_cache_enum_local_groups(domain, frame,
570 : &num_local_groups,
571 : &local_groups);
572 0 : reset_cm_connection_on_error(domain, NULL, status);
573 0 : if (!NT_STATUS_IS_OK(status)) {
574 0 : goto out;
575 : }
576 : }
577 :
578 0 : status = wb_cache_enum_dom_groups(domain, frame,
579 : &num_dom_groups,
580 : &dom_groups);
581 0 : reset_cm_connection_on_error(domain, NULL, status);
582 0 : if (!NT_STATUS_IS_OK(status)) {
583 0 : goto out;
584 : }
585 :
586 0 : num_total = num_local_groups + num_dom_groups;
587 0 : if (num_total > UINT32_MAX) {
588 0 : status = NT_STATUS_INTERNAL_ERROR;
589 0 : goto out;
590 : }
591 :
592 0 : result = talloc_array(frame, struct wbint_Principal, num_total);
593 0 : if (result == NULL) {
594 0 : status = NT_STATUS_NO_MEMORY;
595 0 : goto out;
596 : }
597 :
598 0 : for (i = 0; i < num_local_groups; i++) {
599 0 : struct wb_acct_info *lg = &local_groups[i];
600 0 : struct wbint_Principal *rg = &result[ti++];
601 :
602 0 : sid_compose(&rg->sid, &domain->sid, lg->rid);
603 0 : rg->type = SID_NAME_ALIAS;
604 0 : rg->name = talloc_strdup(result, lg->acct_name);
605 0 : if (rg->name == NULL) {
606 0 : status = NT_STATUS_NO_MEMORY;
607 0 : goto out;
608 : }
609 : }
610 0 : num_local_groups = 0;
611 :
612 0 : for (i = 0; i < num_dom_groups; i++) {
613 0 : struct wb_acct_info *dg = &dom_groups[i];
614 0 : struct wbint_Principal *rg = &result[ti++];
615 :
616 0 : sid_compose(&rg->sid, &domain->sid, dg->rid);
617 0 : rg->type = SID_NAME_DOM_GRP;
618 0 : rg->name = talloc_strdup(result, dg->acct_name);
619 0 : if (rg->name == NULL) {
620 0 : status = NT_STATUS_NO_MEMORY;
621 0 : goto out;
622 : }
623 : }
624 0 : num_dom_groups = 0;
625 :
626 0 : r->out.groups->num_principals = ti;
627 0 : r->out.groups->principals = talloc_move(r->out.groups, &result);
628 :
629 0 : status = NT_STATUS_OK;
630 0 : out:
631 0 : TALLOC_FREE(frame);
632 0 : return status;
633 : }
634 :
635 0 : NTSTATUS _wbint_QueryUserRidList(struct pipes_struct *p,
636 : struct wbint_QueryUserRidList *r)
637 : {
638 0 : struct winbindd_domain *domain = wb_child_domain();
639 0 : NTSTATUS status;
640 :
641 0 : if (domain == NULL) {
642 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
643 : }
644 :
645 : /*
646 : * Right now this is overkill. We should add a backend call
647 : * just querying the rids.
648 : */
649 :
650 0 : status = wb_cache_query_user_list(domain, p->mem_ctx,
651 0 : &r->out.rids->rids);
652 0 : reset_cm_connection_on_error(domain, NULL, status);
653 :
654 0 : if (!NT_STATUS_IS_OK(status)) {
655 0 : return status;
656 : }
657 :
658 0 : r->out.rids->num_rids = talloc_array_length(r->out.rids->rids);
659 :
660 0 : return NT_STATUS_OK;
661 : }
662 :
663 0 : NTSTATUS _wbint_DsGetDcName(struct pipes_struct *p, struct wbint_DsGetDcName *r)
664 : {
665 0 : struct winbindd_domain *domain = wb_child_domain();
666 0 : struct rpc_pipe_client *netlogon_pipe;
667 0 : struct netr_DsRGetDCNameInfo *dc_info;
668 0 : NTSTATUS status;
669 0 : WERROR werr;
670 0 : unsigned int orig_timeout;
671 0 : struct dcerpc_binding_handle *b;
672 0 : bool retry = false;
673 0 : bool try_dsrgetdcname = false;
674 :
675 0 : if (domain == NULL) {
676 0 : return dsgetdcname(p->mem_ctx, global_messaging_context(),
677 0 : r->in.domain_name, r->in.domain_guid,
678 0 : r->in.site_name ? r->in.site_name : "",
679 : r->in.flags,
680 : r->out.dc_info);
681 : }
682 :
683 0 : if (domain->active_directory) {
684 0 : try_dsrgetdcname = true;
685 : }
686 :
687 0 : reconnect:
688 0 : status = cm_connect_netlogon(domain, &netlogon_pipe);
689 :
690 0 : reset_cm_connection_on_error(domain, NULL, status);
691 0 : if (!NT_STATUS_IS_OK(status)) {
692 0 : DEBUG(10, ("Can't contact the NETLOGON pipe\n"));
693 0 : return status;
694 : }
695 :
696 0 : b = netlogon_pipe->binding_handle;
697 :
698 : /* This call can take a long time - allow the server to time out.
699 : 35 seconds should do it. */
700 :
701 0 : orig_timeout = rpccli_set_timeout(netlogon_pipe, 35000);
702 :
703 0 : if (try_dsrgetdcname) {
704 0 : status = dcerpc_netr_DsRGetDCName(b,
705 0 : p->mem_ctx, domain->dcname,
706 : r->in.domain_name, NULL, r->in.domain_guid,
707 : r->in.flags, r->out.dc_info, &werr);
708 0 : if (NT_STATUS_IS_OK(status) && W_ERROR_IS_OK(werr)) {
709 0 : goto done;
710 : }
711 0 : if (!retry &&
712 0 : reset_cm_connection_on_error(domain, NULL, status))
713 : {
714 0 : retry = true;
715 0 : goto reconnect;
716 : }
717 0 : try_dsrgetdcname = false;
718 0 : retry = false;
719 : }
720 :
721 : /*
722 : * Fallback to less capable methods
723 : */
724 :
725 0 : dc_info = talloc_zero(r->out.dc_info, struct netr_DsRGetDCNameInfo);
726 0 : if (dc_info == NULL) {
727 0 : status = NT_STATUS_NO_MEMORY;
728 0 : goto done;
729 : }
730 :
731 0 : if (r->in.flags & DS_PDC_REQUIRED) {
732 0 : status = dcerpc_netr_GetDcName(b,
733 0 : p->mem_ctx, domain->dcname,
734 : r->in.domain_name, &dc_info->dc_unc, &werr);
735 : } else {
736 0 : status = dcerpc_netr_GetAnyDCName(b,
737 0 : p->mem_ctx, domain->dcname,
738 : r->in.domain_name, &dc_info->dc_unc, &werr);
739 : }
740 :
741 0 : if (!retry && reset_cm_connection_on_error(domain, b, status)) {
742 0 : retry = true;
743 0 : goto reconnect;
744 : }
745 0 : if (!NT_STATUS_IS_OK(status)) {
746 0 : DEBUG(10, ("dcerpc_netr_Get[Any]DCName failed: %s\n",
747 : nt_errstr(status)));
748 0 : goto done;
749 : }
750 0 : if (!W_ERROR_IS_OK(werr)) {
751 0 : DEBUG(10, ("dcerpc_netr_Get[Any]DCName failed: %s\n",
752 : win_errstr(werr)));
753 0 : status = werror_to_ntstatus(werr);
754 0 : goto done;
755 : }
756 :
757 0 : *r->out.dc_info = dc_info;
758 0 : status = NT_STATUS_OK;
759 :
760 0 : done:
761 : /* And restore our original timeout. */
762 0 : rpccli_set_timeout(netlogon_pipe, orig_timeout);
763 :
764 0 : return status;
765 : }
766 :
767 0 : NTSTATUS _wbint_LookupRids(struct pipes_struct *p, struct wbint_LookupRids *r)
768 : {
769 0 : struct winbindd_domain *domain = wb_child_domain();
770 0 : char *domain_name;
771 0 : char **names;
772 0 : enum lsa_SidType *types;
773 0 : struct wbint_Principal *result;
774 0 : NTSTATUS status;
775 0 : uint32_t i;
776 :
777 0 : if (domain == NULL) {
778 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
779 : }
780 :
781 0 : status = wb_cache_rids_to_names(domain, talloc_tos(), r->in.domain_sid,
782 0 : r->in.rids->rids, r->in.rids->num_rids,
783 : &domain_name, &names, &types);
784 0 : reset_cm_connection_on_error(domain, NULL, status);
785 0 : if (!NT_STATUS_IS_OK(status) &&
786 0 : !NT_STATUS_EQUAL(status, STATUS_SOME_UNMAPPED)) {
787 0 : return status;
788 : }
789 :
790 0 : *r->out.domain_name = talloc_move(r->out.domain_name, &domain_name);
791 :
792 0 : result = talloc_array(p->mem_ctx, struct wbint_Principal,
793 : r->in.rids->num_rids);
794 0 : if (result == NULL) {
795 0 : return NT_STATUS_NO_MEMORY;
796 : }
797 :
798 0 : for (i=0; i<r->in.rids->num_rids; i++) {
799 0 : sid_compose(&result[i].sid, r->in.domain_sid,
800 0 : r->in.rids->rids[i]);
801 0 : result[i].type = types[i];
802 0 : result[i].name = talloc_move(result, &names[i]);
803 : }
804 0 : TALLOC_FREE(types);
805 0 : TALLOC_FREE(names);
806 :
807 0 : r->out.names->num_principals = r->in.rids->num_rids;
808 0 : r->out.names->principals = result;
809 0 : return NT_STATUS_OK;
810 : }
811 :
812 0 : NTSTATUS _wbint_CheckMachineAccount(struct pipes_struct *p,
813 : struct wbint_CheckMachineAccount *r)
814 : {
815 0 : struct winbindd_domain *domain;
816 0 : int num_retries = 0;
817 0 : NTSTATUS status;
818 :
819 0 : domain = wb_child_domain();
820 0 : if (domain == NULL) {
821 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
822 : }
823 :
824 0 : again:
825 0 : invalidate_cm_connection(domain);
826 0 : domain->conn.netlogon_force_reauth = true;
827 :
828 : {
829 0 : struct rpc_pipe_client *netlogon_pipe = NULL;
830 0 : struct netlogon_creds_cli_context *netlogon_creds_ctx = NULL;
831 0 : status = cm_connect_netlogon_secure(domain,
832 : &netlogon_pipe,
833 : &netlogon_creds_ctx);
834 : }
835 :
836 : /* There is a race condition between fetching the trust account
837 : password and the periodic machine password change. So it's
838 : possible that the trust account password has been changed on us.
839 : We are returned NT_STATUS_ACCESS_DENIED if this happens. */
840 :
841 : #define MAX_RETRIES 3
842 :
843 0 : if ((num_retries < MAX_RETRIES)
844 0 : && NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED)) {
845 0 : num_retries++;
846 0 : goto again;
847 : }
848 :
849 0 : if (!NT_STATUS_IS_OK(status)) {
850 0 : DEBUG(3, ("could not open handle to NETLOGON pipe\n"));
851 0 : goto done;
852 : }
853 :
854 : /* Pass back result code - zero for success, other values for
855 : specific failures. */
856 :
857 0 : DEBUG(3,("domain %s secret is %s\n", domain->name,
858 : NT_STATUS_IS_OK(status) ? "good" : "bad"));
859 :
860 0 : done:
861 0 : DEBUG(NT_STATUS_IS_OK(status) ? 5 : 2,
862 : ("Checking the trust account password for domain %s returned %s\n",
863 : domain->name, nt_errstr(status)));
864 :
865 0 : return status;
866 : }
867 :
868 0 : NTSTATUS _wbint_ChangeMachineAccount(struct pipes_struct *p,
869 : struct wbint_ChangeMachineAccount *r)
870 : {
871 0 : struct messaging_context *msg_ctx = global_messaging_context();
872 0 : struct winbindd_domain *domain;
873 0 : NTSTATUS status;
874 0 : struct rpc_pipe_client *netlogon_pipe = NULL;
875 0 : struct netlogon_creds_cli_context *netlogon_creds_ctx = NULL;
876 :
877 0 : domain = wb_child_domain();
878 0 : if (domain == NULL) {
879 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
880 : }
881 :
882 0 : if (r->in.dcname != NULL && r->in.dcname[0] != '\0') {
883 0 : invalidate_cm_connection(domain);
884 0 : TALLOC_FREE(domain->dcname);
885 :
886 0 : domain->dcname = talloc_strdup(domain, r->in.dcname);
887 0 : if (domain->dcname == NULL) {
888 0 : status = NT_STATUS_NO_MEMORY;
889 0 : goto done;
890 : }
891 0 : domain->force_dc = true;
892 :
893 0 : DBG_NOTICE("attempt connection to change trust account "
894 : "password for %s at %s\n",
895 : domain->name, domain->dcname);
896 : }
897 :
898 0 : status = cm_connect_netlogon_secure(domain,
899 : &netlogon_pipe,
900 : &netlogon_creds_ctx);
901 0 : if (!NT_STATUS_IS_OK(status)) {
902 0 : DEBUG(3, ("could not open handle to NETLOGON pipe\n"));
903 0 : goto done;
904 : }
905 :
906 0 : status = trust_pw_change(netlogon_creds_ctx,
907 : msg_ctx,
908 0 : netlogon_pipe->binding_handle,
909 0 : domain->name,
910 0 : domain->dcname,
911 : true); /* force */
912 :
913 : /* Pass back result code - zero for success, other values for
914 : specific failures. */
915 :
916 0 : DEBUG(3,("domain %s secret %s\n", domain->name,
917 : NT_STATUS_IS_OK(status) ? "changed" : "unchanged"));
918 :
919 0 : done:
920 0 : DEBUG(NT_STATUS_IS_OK(status) ? 5 :
921 : domain->force_dc ? 0 : 2,
922 : ("Changing the trust account password for domain %s at %s "
923 : "(forced: %s) returned %s\n",
924 : domain->name, domain->dcname, domain->force_dc ? "yes" : "no",
925 : nt_errstr(status)));
926 0 : domain->force_dc = false;
927 :
928 0 : return status;
929 : }
930 :
931 0 : NTSTATUS _wbint_PingDc(struct pipes_struct *p, struct wbint_PingDc *r)
932 : {
933 0 : NTSTATUS status;
934 0 : struct winbindd_domain *domain;
935 0 : struct rpc_pipe_client *netlogon_pipe;
936 0 : union netr_CONTROL_QUERY_INFORMATION info;
937 0 : WERROR werr;
938 0 : fstring logon_server;
939 0 : struct dcerpc_binding_handle *b;
940 0 : bool retry = false;
941 :
942 0 : domain = wb_child_domain();
943 0 : if (domain == NULL) {
944 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
945 : }
946 :
947 0 : reconnect:
948 0 : status = cm_connect_netlogon(domain, &netlogon_pipe);
949 0 : reset_cm_connection_on_error(domain, NULL, status);
950 0 : if (!NT_STATUS_IS_OK(status)) {
951 0 : DEBUG(3, ("could not open handle to NETLOGON pipe: %s\n",
952 : nt_errstr(status)));
953 0 : return status;
954 : }
955 :
956 0 : b = netlogon_pipe->binding_handle;
957 :
958 0 : fstr_sprintf(logon_server, "\\\\%s", domain->dcname);
959 0 : *r->out.dcname = talloc_strdup(p->mem_ctx, domain->dcname);
960 0 : if (*r->out.dcname == NULL) {
961 0 : DEBUG(2, ("Could not allocate memory\n"));
962 0 : return NT_STATUS_NO_MEMORY;
963 : }
964 :
965 : /*
966 : * This provokes a WERR_NOT_SUPPORTED error message. This is
967 : * documented in the wspp docs. I could not get a successful
968 : * call to work, but the main point here is testing that the
969 : * netlogon pipe works.
970 : */
971 0 : status = dcerpc_netr_LogonControl(b, p->mem_ctx,
972 : logon_server, NETLOGON_CONTROL_QUERY,
973 : 2, &info, &werr);
974 :
975 0 : if (!retry && reset_cm_connection_on_error(domain, b, status)) {
976 0 : retry = true;
977 0 : goto reconnect;
978 : }
979 :
980 0 : if (!NT_STATUS_IS_OK(status)) {
981 0 : DEBUG(2, ("dcerpc_netr_LogonControl failed: %s\n",
982 : nt_errstr(status)));
983 0 : return status;
984 : }
985 :
986 0 : if (!W_ERROR_EQUAL(werr, WERR_NOT_SUPPORTED)) {
987 0 : DEBUG(2, ("dcerpc_netr_LogonControl returned %s, expected "
988 : "WERR_NOT_SUPPORTED\n",
989 : win_errstr(werr)));
990 0 : return werror_to_ntstatus(werr);
991 : }
992 :
993 0 : DEBUG(5, ("winbindd_dual_ping_dc succeeded\n"));
994 0 : return NT_STATUS_OK;
995 : }
996 :
997 0 : NTSTATUS _winbind_DsrUpdateReadOnlyServerDnsRecords(struct pipes_struct *p,
998 : struct winbind_DsrUpdateReadOnlyServerDnsRecords *r)
999 : {
1000 0 : struct winbindd_domain *domain;
1001 0 : NTSTATUS status;
1002 0 : struct rpc_pipe_client *netlogon_pipe = NULL;
1003 0 : struct netlogon_creds_cli_context *netlogon_creds_ctx = NULL;
1004 0 : struct dcerpc_binding_handle *b = NULL;
1005 0 : bool retry = false;
1006 :
1007 0 : domain = wb_child_domain();
1008 0 : if (domain == NULL) {
1009 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
1010 : }
1011 :
1012 0 : reconnect:
1013 0 : status = cm_connect_netlogon_secure(domain,
1014 : &netlogon_pipe,
1015 : &netlogon_creds_ctx);
1016 0 : if (!NT_STATUS_IS_OK(status)) {
1017 0 : DEBUG(3, ("could not open handle to NETLOGON pipe\n"));
1018 0 : goto done;
1019 : }
1020 :
1021 0 : b = netlogon_pipe->binding_handle;
1022 :
1023 0 : status = netlogon_creds_cli_DsrUpdateReadOnlyServerDnsRecords(netlogon_creds_ctx,
1024 0 : netlogon_pipe->binding_handle,
1025 : r->in.site_name,
1026 : r->in.dns_ttl,
1027 : r->in.dns_names);
1028 :
1029 0 : if (!retry && reset_cm_connection_on_error(domain, b, status)) {
1030 0 : retry = true;
1031 0 : goto reconnect;
1032 : }
1033 :
1034 : /* Pass back result code - zero for success, other values for
1035 : specific failures. */
1036 :
1037 0 : DEBUG(3,("DNS records for domain %s %s\n", domain->name,
1038 : NT_STATUS_IS_OK(status) ? "changed" : "unchanged"));
1039 :
1040 0 : done:
1041 0 : DEBUG(NT_STATUS_IS_OK(status) ? 5 : 2,
1042 : ("Update of DNS records via RW DC %s returned %s\n",
1043 : domain->name, nt_errstr(status)));
1044 :
1045 0 : return status;
1046 : }
1047 :
1048 0 : NTSTATUS _winbind_SamLogon(struct pipes_struct *p,
1049 : struct winbind_SamLogon *r)
1050 : {
1051 0 : struct dcesrv_call_state *dce_call = p->dce_call;
1052 0 : struct dcesrv_connection *dcesrv_conn = dce_call->conn;
1053 0 : const struct tsocket_address *local_address =
1054 0 : dcesrv_connection_get_local_address(dcesrv_conn);
1055 0 : const struct tsocket_address *remote_address =
1056 0 : dcesrv_connection_get_remote_address(dcesrv_conn);
1057 0 : struct winbindd_domain *domain;
1058 0 : NTSTATUS status;
1059 0 : struct netr_IdentityInfo *identity_info = NULL;
1060 0 : DATA_BLOB lm_response, nt_response;
1061 0 : DATA_BLOB challenge = data_blob_null;
1062 0 : uint32_t flags = 0;
1063 0 : uint16_t validation_level;
1064 0 : union netr_Validation *validation = NULL;
1065 0 : bool interactive = false;
1066 :
1067 : /*
1068 : * Make sure we start with authoritative=true,
1069 : * it will only set to false if we don't know the
1070 : * domain.
1071 : */
1072 0 : r->out.authoritative = true;
1073 :
1074 0 : domain = wb_child_domain();
1075 0 : if (domain == NULL) {
1076 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
1077 : }
1078 :
1079 0 : switch (r->in.validation_level) {
1080 0 : case 3:
1081 : case 6:
1082 0 : break;
1083 0 : default:
1084 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
1085 : }
1086 :
1087 0 : switch (r->in.logon_level) {
1088 0 : case NetlogonInteractiveInformation:
1089 : case NetlogonServiceInformation:
1090 : case NetlogonInteractiveTransitiveInformation:
1091 : case NetlogonServiceTransitiveInformation:
1092 0 : if (r->in.logon.password == NULL) {
1093 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
1094 : }
1095 :
1096 0 : interactive = true;
1097 0 : identity_info = &r->in.logon.password->identity_info;
1098 :
1099 0 : challenge = data_blob_null;
1100 0 : lm_response = data_blob_talloc(p->mem_ctx,
1101 : r->in.logon.password->lmpassword.hash,
1102 : sizeof(r->in.logon.password->lmpassword.hash));
1103 0 : nt_response = data_blob_talloc(p->mem_ctx,
1104 : r->in.logon.password->ntpassword.hash,
1105 : sizeof(r->in.logon.password->ntpassword.hash));
1106 0 : break;
1107 :
1108 0 : case NetlogonNetworkInformation:
1109 : case NetlogonNetworkTransitiveInformation:
1110 0 : if (r->in.logon.network == NULL) {
1111 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
1112 : }
1113 :
1114 0 : interactive = false;
1115 0 : identity_info = &r->in.logon.network->identity_info;
1116 :
1117 0 : challenge = data_blob_talloc(p->mem_ctx,
1118 : r->in.logon.network->challenge,
1119 : 8);
1120 0 : lm_response = data_blob_talloc(p->mem_ctx,
1121 : r->in.logon.network->lm.data,
1122 : r->in.logon.network->lm.length);
1123 0 : nt_response = data_blob_talloc(p->mem_ctx,
1124 : r->in.logon.network->nt.data,
1125 : r->in.logon.network->nt.length);
1126 0 : break;
1127 :
1128 0 : case NetlogonGenericInformation:
1129 0 : if (r->in.logon.generic == NULL) {
1130 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
1131 : }
1132 :
1133 0 : identity_info = &r->in.logon.generic->identity_info;
1134 : /*
1135 : * Not implemented here...
1136 : */
1137 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
1138 :
1139 0 : default:
1140 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
1141 : }
1142 :
1143 0 : status = winbind_dual_SamLogon(domain, p->mem_ctx,
1144 : interactive,
1145 : identity_info->parameter_control,
1146 : identity_info->account_name.string,
1147 : identity_info->domain_name.string,
1148 : identity_info->workstation.string,
1149 : identity_info->logon_id,
1150 : "SamLogon",
1151 : 0,
1152 : challenge,
1153 : lm_response, nt_response,
1154 : remote_address,
1155 : local_address,
1156 : &r->out.authoritative,
1157 : true, /* skip_sam */
1158 : &flags,
1159 : &validation_level,
1160 : &validation);
1161 0 : if (!NT_STATUS_IS_OK(status)) {
1162 0 : return status;
1163 : }
1164 0 : switch (r->in.validation_level) {
1165 0 : case 3:
1166 0 : status = map_validation_to_info3(p->mem_ctx,
1167 : validation_level,
1168 : validation,
1169 : &r->out.validation.sam3);
1170 0 : TALLOC_FREE(validation);
1171 0 : if (!NT_STATUS_IS_OK(status)) {
1172 0 : return status;
1173 : }
1174 0 : return NT_STATUS_OK;
1175 0 : case 6:
1176 0 : status = map_validation_to_info6(p->mem_ctx,
1177 : validation_level,
1178 : validation,
1179 : &r->out.validation.sam6);
1180 0 : TALLOC_FREE(validation);
1181 0 : if (!NT_STATUS_IS_OK(status)) {
1182 0 : return status;
1183 : }
1184 0 : return NT_STATUS_OK;
1185 : }
1186 :
1187 0 : smb_panic(__location__);
1188 : return NT_STATUS_INTERNAL_ERROR;
1189 : }
1190 :
1191 0 : static WERROR _winbind_LogonControl_REDISCOVER(struct pipes_struct *p,
1192 : struct winbindd_domain *domain,
1193 : struct winbind_LogonControl *r)
1194 : {
1195 0 : NTSTATUS status;
1196 0 : struct rpc_pipe_client *netlogon_pipe = NULL;
1197 0 : struct netlogon_creds_cli_context *netlogon_creds_ctx = NULL;
1198 0 : struct netr_NETLOGON_INFO_2 *info2 = NULL;
1199 0 : WERROR check_result = WERR_INTERNAL_ERROR;
1200 :
1201 0 : info2 = talloc_zero(p->mem_ctx, struct netr_NETLOGON_INFO_2);
1202 0 : if (info2 == NULL) {
1203 0 : return WERR_NOT_ENOUGH_MEMORY;
1204 : }
1205 :
1206 0 : if (domain->internal) {
1207 0 : check_result = WERR_OK;
1208 0 : goto check_return;
1209 : }
1210 :
1211 : /*
1212 : * For now we just force a reconnect
1213 : *
1214 : * TODO: take care of the optional '\dcname'
1215 : */
1216 0 : invalidate_cm_connection(domain);
1217 0 : domain->conn.netlogon_force_reauth = true;
1218 0 : status = cm_connect_netlogon_secure(domain,
1219 : &netlogon_pipe,
1220 : &netlogon_creds_ctx);
1221 0 : reset_cm_connection_on_error(domain, NULL, status);
1222 0 : if (NT_STATUS_EQUAL(status, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND)) {
1223 0 : status = NT_STATUS_NO_LOGON_SERVERS;
1224 : }
1225 0 : if (!NT_STATUS_IS_OK(status)) {
1226 0 : DEBUG(2, ("%s: domain[%s/%s] cm_connect_netlogon() returned %s\n",
1227 : __func__, domain->name, domain->alt_name,
1228 : nt_errstr(status)));
1229 : /*
1230 : * Here we return a top level error!
1231 : * This is different than TC_QUERY or TC_VERIFY.
1232 : */
1233 0 : return ntstatus_to_werror(status);
1234 : }
1235 0 : check_result = WERR_OK;
1236 :
1237 0 : check_return:
1238 0 : info2->pdc_connection_status = WERR_OK;
1239 0 : if (domain->dcname != NULL) {
1240 0 : info2->flags |= NETLOGON_HAS_IP;
1241 0 : info2->flags |= NETLOGON_HAS_TIMESERV;
1242 0 : info2->trusted_dc_name = talloc_asprintf(info2, "\\\\%s",
1243 : domain->dcname);
1244 0 : if (info2->trusted_dc_name == NULL) {
1245 0 : return WERR_NOT_ENOUGH_MEMORY;
1246 : }
1247 : } else {
1248 0 : info2->trusted_dc_name = talloc_strdup(info2, "");
1249 0 : if (info2->trusted_dc_name == NULL) {
1250 0 : return WERR_NOT_ENOUGH_MEMORY;
1251 : }
1252 : }
1253 0 : info2->tc_connection_status = check_result;
1254 :
1255 0 : if (!W_ERROR_IS_OK(info2->pdc_connection_status) ||
1256 0 : !W_ERROR_IS_OK(info2->tc_connection_status))
1257 : {
1258 0 : DEBUG(2, ("%s: domain[%s/%s] dcname[%s] "
1259 : "pdc_connection[%s] tc_connection[%s]\n",
1260 : __func__, domain->name, domain->alt_name,
1261 : domain->dcname,
1262 : win_errstr(info2->pdc_connection_status),
1263 : win_errstr(info2->tc_connection_status)));
1264 : }
1265 :
1266 0 : r->out.query->info2 = info2;
1267 :
1268 0 : DEBUG(5, ("%s: succeeded.\n", __func__));
1269 0 : return WERR_OK;
1270 : }
1271 :
1272 0 : static WERROR _winbind_LogonControl_TC_QUERY(struct pipes_struct *p,
1273 : struct winbindd_domain *domain,
1274 : struct winbind_LogonControl *r)
1275 : {
1276 0 : NTSTATUS status;
1277 0 : struct rpc_pipe_client *netlogon_pipe = NULL;
1278 0 : struct netlogon_creds_cli_context *netlogon_creds_ctx = NULL;
1279 0 : struct netr_NETLOGON_INFO_2 *info2 = NULL;
1280 0 : WERROR check_result = WERR_INTERNAL_ERROR;
1281 :
1282 0 : info2 = talloc_zero(p->mem_ctx, struct netr_NETLOGON_INFO_2);
1283 0 : if (info2 == NULL) {
1284 0 : return WERR_NOT_ENOUGH_MEMORY;
1285 : }
1286 :
1287 0 : if (domain->internal) {
1288 0 : check_result = WERR_OK;
1289 0 : goto check_return;
1290 : }
1291 :
1292 0 : status = cm_connect_netlogon_secure(domain,
1293 : &netlogon_pipe,
1294 : &netlogon_creds_ctx);
1295 0 : reset_cm_connection_on_error(domain, NULL, status);
1296 0 : if (NT_STATUS_EQUAL(status, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND)) {
1297 0 : status = NT_STATUS_NO_LOGON_SERVERS;
1298 : }
1299 0 : if (!NT_STATUS_IS_OK(status)) {
1300 0 : DEBUG(3, ("could not open handle to NETLOGON pipe: %s\n",
1301 : nt_errstr(status)));
1302 0 : check_result = ntstatus_to_werror(status);
1303 0 : goto check_return;
1304 : }
1305 0 : check_result = WERR_OK;
1306 :
1307 0 : check_return:
1308 0 : info2->pdc_connection_status = WERR_OK;
1309 0 : if (domain->dcname != NULL) {
1310 0 : info2->flags |= NETLOGON_HAS_IP;
1311 0 : info2->flags |= NETLOGON_HAS_TIMESERV;
1312 0 : info2->trusted_dc_name = talloc_asprintf(info2, "\\\\%s",
1313 : domain->dcname);
1314 0 : if (info2->trusted_dc_name == NULL) {
1315 0 : return WERR_NOT_ENOUGH_MEMORY;
1316 : }
1317 : } else {
1318 0 : info2->trusted_dc_name = talloc_strdup(info2, "");
1319 0 : if (info2->trusted_dc_name == NULL) {
1320 0 : return WERR_NOT_ENOUGH_MEMORY;
1321 : }
1322 : }
1323 0 : info2->tc_connection_status = check_result;
1324 :
1325 0 : if (!W_ERROR_IS_OK(info2->pdc_connection_status) ||
1326 0 : !W_ERROR_IS_OK(info2->tc_connection_status))
1327 : {
1328 0 : DEBUG(2, ("%s: domain[%s/%s] dcname[%s] "
1329 : "pdc_connection[%s] tc_connection[%s]\n",
1330 : __func__, domain->name, domain->alt_name,
1331 : domain->dcname,
1332 : win_errstr(info2->pdc_connection_status),
1333 : win_errstr(info2->tc_connection_status)));
1334 : }
1335 :
1336 0 : r->out.query->info2 = info2;
1337 :
1338 0 : DEBUG(5, ("%s: succeeded.\n", __func__));
1339 0 : return WERR_OK;
1340 : }
1341 :
1342 0 : static WERROR _winbind_LogonControl_TC_VERIFY(struct pipes_struct *p,
1343 : struct winbindd_domain *domain,
1344 : struct winbind_LogonControl *r)
1345 : {
1346 0 : TALLOC_CTX *frame = talloc_stackframe();
1347 0 : NTSTATUS status;
1348 0 : NTSTATUS result;
1349 0 : struct lsa_String trusted_domain_name = {};
1350 0 : struct lsa_StringLarge trusted_domain_name_l = {};
1351 0 : struct rpc_pipe_client *local_lsa_pipe = NULL;
1352 0 : struct policy_handle local_lsa_policy = {};
1353 0 : struct dcerpc_binding_handle *local_lsa = NULL;
1354 0 : struct rpc_pipe_client *netlogon_pipe = NULL;
1355 0 : struct netlogon_creds_cli_context *netlogon_creds_ctx = NULL;
1356 0 : struct cli_credentials *creds = NULL;
1357 0 : struct samr_Password *cur_nt_hash = NULL;
1358 0 : uint32_t trust_attributes = 0;
1359 0 : struct samr_Password new_owf_password = {};
1360 0 : bool cmp_new = false;
1361 0 : struct samr_Password old_owf_password = {};
1362 0 : bool cmp_old = false;
1363 0 : const struct lsa_TrustDomainInfoInfoEx *local_tdo = NULL;
1364 0 : bool fetch_fti = false;
1365 0 : struct lsa_ForestTrustInformation *new_fti = NULL;
1366 0 : struct netr_TrustInfo *trust_info = NULL;
1367 0 : struct netr_NETLOGON_INFO_2 *info2 = NULL;
1368 0 : struct dcerpc_binding_handle *b = NULL;
1369 0 : WERROR check_result = WERR_INTERNAL_ERROR;
1370 0 : WERROR verify_result = WERR_INTERNAL_ERROR;
1371 0 : bool retry = false;
1372 :
1373 0 : trusted_domain_name.string = domain->name;
1374 0 : trusted_domain_name_l.string = domain->name;
1375 :
1376 0 : info2 = talloc_zero(p->mem_ctx, struct netr_NETLOGON_INFO_2);
1377 0 : if (info2 == NULL) {
1378 0 : TALLOC_FREE(frame);
1379 0 : return WERR_NOT_ENOUGH_MEMORY;
1380 : }
1381 :
1382 0 : if (domain->internal) {
1383 0 : check_result = WERR_OK;
1384 0 : goto check_return;
1385 : }
1386 :
1387 0 : status = pdb_get_trust_credentials(domain->name,
1388 0 : domain->alt_name,
1389 : frame,
1390 : &creds);
1391 0 : if (NT_STATUS_IS_OK(status)) {
1392 0 : cur_nt_hash = cli_credentials_get_nt_hash(creds, frame);
1393 0 : TALLOC_FREE(creds);
1394 : }
1395 :
1396 0 : if (!domain->primary) {
1397 0 : union lsa_TrustedDomainInfo *tdi = NULL;
1398 :
1399 0 : status = open_internal_lsa_conn(frame, &local_lsa_pipe,
1400 : &local_lsa_policy);
1401 0 : if (!NT_STATUS_IS_OK(status)) {
1402 0 : DEBUG(0,("%s:%s: open_internal_lsa_conn() failed - %s\n",
1403 : __location__, __func__, nt_errstr(status)));
1404 0 : TALLOC_FREE(frame);
1405 0 : return WERR_INTERNAL_ERROR;
1406 : }
1407 0 : local_lsa = local_lsa_pipe->binding_handle;
1408 :
1409 0 : status = dcerpc_lsa_QueryTrustedDomainInfoByName(local_lsa, frame,
1410 : &local_lsa_policy,
1411 : &trusted_domain_name,
1412 : LSA_TRUSTED_DOMAIN_INFO_INFO_EX,
1413 : &tdi, &result);
1414 0 : if (!NT_STATUS_IS_OK(status)) {
1415 0 : DEBUG(0,("%s:%s: local_lsa.QueryTrustedDomainInfoByName(%s) failed - %s\n",
1416 : __location__, __func__, domain->name, nt_errstr(status)));
1417 0 : TALLOC_FREE(frame);
1418 0 : return WERR_INTERNAL_ERROR;
1419 : }
1420 0 : if (NT_STATUS_EQUAL(result, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
1421 0 : DEBUG(1,("%s:%s: domain[%s] not found via LSA, might be removed already.\n",
1422 : __location__, __func__, domain->name));
1423 0 : TALLOC_FREE(frame);
1424 0 : return WERR_NO_SUCH_DOMAIN;
1425 : }
1426 0 : if (!NT_STATUS_IS_OK(result)) {
1427 0 : DEBUG(0,("%s:%s: local_lsa.QueryTrustedDomainInfoByName(%s) returned %s\n",
1428 : __location__, __func__, domain->name, nt_errstr(result)));
1429 0 : TALLOC_FREE(frame);
1430 0 : return WERR_INTERNAL_ERROR;
1431 : }
1432 0 : if (tdi == NULL) {
1433 0 : DEBUG(0,("%s:%s: local_lsa.QueryTrustedDomainInfoByName() "
1434 : "returned no trusted domain information\n",
1435 : __location__, __func__));
1436 0 : TALLOC_FREE(frame);
1437 0 : return WERR_INTERNAL_ERROR;
1438 : }
1439 :
1440 0 : local_tdo = &tdi->info_ex;
1441 0 : trust_attributes = local_tdo->trust_attributes;
1442 : }
1443 :
1444 0 : if (trust_attributes & LSA_TRUST_ATTRIBUTE_FOREST_TRANSITIVE) {
1445 0 : struct lsa_ForestTrustInformation *old_fti = NULL;
1446 :
1447 0 : status = dcerpc_lsa_lsaRQueryForestTrustInformation(local_lsa, frame,
1448 : &local_lsa_policy,
1449 : &trusted_domain_name,
1450 : LSA_FOREST_TRUST_DOMAIN_INFO,
1451 : &old_fti, &result);
1452 0 : if (!NT_STATUS_IS_OK(status)) {
1453 0 : DEBUG(0,("%s:%s: local_lsa.lsaRQueryForestTrustInformation(%s) failed %s\n",
1454 : __location__, __func__, domain->name, nt_errstr(status)));
1455 0 : TALLOC_FREE(frame);
1456 0 : return WERR_INTERNAL_ERROR;
1457 : }
1458 0 : if (NT_STATUS_EQUAL(result, NT_STATUS_NOT_FOUND)) {
1459 0 : DEBUG(2,("%s: no forest trust information available for domain[%s] yet.\n",
1460 : __func__, domain->name));
1461 0 : old_fti = NULL;
1462 0 : fetch_fti = true;
1463 0 : result = NT_STATUS_OK;
1464 : }
1465 0 : if (!NT_STATUS_IS_OK(result)) {
1466 0 : DEBUG(0,("%s:%s: local_lsa.lsaRQueryForestTrustInformation(%s) returned %s\n",
1467 : __location__, __func__, domain->name, nt_errstr(result)));
1468 0 : TALLOC_FREE(frame);
1469 0 : return WERR_INTERNAL_ERROR;
1470 : }
1471 :
1472 0 : TALLOC_FREE(old_fti);
1473 : }
1474 :
1475 0 : reconnect:
1476 0 : status = cm_connect_netlogon_secure(domain,
1477 : &netlogon_pipe,
1478 : &netlogon_creds_ctx);
1479 0 : reset_cm_connection_on_error(domain, NULL, status);
1480 0 : if (NT_STATUS_EQUAL(status, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND)) {
1481 0 : status = NT_STATUS_NO_LOGON_SERVERS;
1482 : }
1483 0 : if (!NT_STATUS_IS_OK(status)) {
1484 0 : DEBUG(3, ("could not open handle to NETLOGON pipe: %s\n",
1485 : nt_errstr(status)));
1486 0 : check_result = ntstatus_to_werror(status);
1487 0 : goto check_return;
1488 : }
1489 0 : check_result = WERR_OK;
1490 0 : b = netlogon_pipe->binding_handle;
1491 :
1492 0 : if (cur_nt_hash == NULL) {
1493 0 : verify_result = WERR_NO_TRUST_LSA_SECRET;
1494 0 : goto verify_return;
1495 : }
1496 :
1497 0 : if (fetch_fti) {
1498 0 : status = netlogon_creds_cli_GetForestTrustInformation(netlogon_creds_ctx,
1499 : b, frame,
1500 : &new_fti);
1501 0 : if (NT_STATUS_EQUAL(status, NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE)) {
1502 0 : status = NT_STATUS_NOT_SUPPORTED;
1503 : }
1504 0 : if (NT_STATUS_EQUAL(status, NT_STATUS_NOT_SUPPORTED)) {
1505 0 : new_fti = NULL;
1506 0 : status = NT_STATUS_OK;
1507 : }
1508 0 : if (!NT_STATUS_IS_OK(status)) {
1509 0 : if (!retry &&
1510 0 : reset_cm_connection_on_error(domain, b, status))
1511 : {
1512 0 : retry = true;
1513 0 : goto reconnect;
1514 : }
1515 0 : DEBUG(2, ("netlogon_creds_cli_GetForestTrustInformation(%s)"
1516 : "failed: %s\n",
1517 : domain->name, nt_errstr(status)));
1518 0 : check_result = ntstatus_to_werror(status);
1519 0 : goto check_return;
1520 : }
1521 : }
1522 :
1523 0 : if (new_fti != NULL) {
1524 0 : struct lsa_ForestTrustInformation old_fti = {};
1525 0 : struct lsa_ForestTrustInformation *merged_fti = NULL;
1526 0 : struct lsa_ForestTrustCollisionInfo *collision_info = NULL;
1527 :
1528 0 : status = dsdb_trust_merge_forest_info(frame, local_tdo,
1529 : &old_fti, new_fti,
1530 : &merged_fti);
1531 0 : if (!NT_STATUS_IS_OK(status)) {
1532 0 : DEBUG(0,("%s:%s: dsdb_trust_merge_forest_info(%s) failed %s\n",
1533 : __location__, __func__,
1534 : domain->name, nt_errstr(status)));
1535 0 : TALLOC_FREE(frame);
1536 0 : return ntstatus_to_werror(status);
1537 : }
1538 :
1539 0 : status = dcerpc_lsa_lsaRSetForestTrustInformation(local_lsa, frame,
1540 : &local_lsa_policy,
1541 : &trusted_domain_name_l,
1542 : LSA_FOREST_TRUST_DOMAIN_INFO,
1543 : merged_fti,
1544 : 0, /* check_only=0 => store it! */
1545 : &collision_info,
1546 : &result);
1547 0 : if (!NT_STATUS_IS_OK(status)) {
1548 0 : DEBUG(0,("%s:%s: local_lsa.lsaRSetForestTrustInformation(%s) failed %s\n",
1549 : __location__, __func__, domain->name, nt_errstr(status)));
1550 0 : TALLOC_FREE(frame);
1551 0 : return WERR_INTERNAL_ERROR;
1552 : }
1553 0 : if (!NT_STATUS_IS_OK(result)) {
1554 0 : DEBUG(0,("%s:%s: local_lsa.lsaRSetForestTrustInformation(%s) returned %s\n",
1555 : __location__, __func__, domain->name, nt_errstr(result)));
1556 0 : TALLOC_FREE(frame);
1557 0 : return ntstatus_to_werror(result);
1558 : }
1559 : }
1560 :
1561 0 : status = netlogon_creds_cli_ServerGetTrustInfo(netlogon_creds_ctx,
1562 : b, frame,
1563 : &new_owf_password,
1564 : &old_owf_password,
1565 : &trust_info);
1566 0 : if (NT_STATUS_EQUAL(status, NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE)) {
1567 0 : status = NT_STATUS_NOT_SUPPORTED;
1568 : }
1569 0 : if (NT_STATUS_EQUAL(status, NT_STATUS_NOT_SUPPORTED)) {
1570 0 : DEBUG(5, ("netlogon_creds_cli_ServerGetTrustInfo failed: %s\n",
1571 : nt_errstr(status)));
1572 0 : verify_result = WERR_OK;
1573 0 : goto verify_return;
1574 : }
1575 0 : if (!NT_STATUS_IS_OK(status)) {
1576 0 : if (!retry && reset_cm_connection_on_error(domain, b, status)) {
1577 0 : retry = true;
1578 0 : goto reconnect;
1579 : }
1580 0 : DEBUG(2, ("netlogon_creds_cli_ServerGetTrustInfo failed: %s\n",
1581 : nt_errstr(status)));
1582 :
1583 0 : if (!dcerpc_binding_handle_is_connected(b)) {
1584 0 : check_result = ntstatus_to_werror(status);
1585 0 : goto check_return;
1586 : } else {
1587 0 : verify_result = ntstatus_to_werror(status);
1588 0 : goto verify_return;
1589 : }
1590 : }
1591 :
1592 0 : if (trust_info != NULL && trust_info->count >= 1) {
1593 0 : uint32_t diff = trust_info->data[0] ^ trust_attributes;
1594 :
1595 0 : if (diff & LSA_TRUST_ATTRIBUTE_FOREST_TRANSITIVE) {
1596 0 : verify_result = WERR_DOMAIN_TRUST_INCONSISTENT;
1597 0 : goto verify_return;
1598 : }
1599 : }
1600 :
1601 0 : cmp_new = mem_equal_const_time(new_owf_password.hash,
1602 0 : cur_nt_hash->hash,
1603 : sizeof(cur_nt_hash->hash));
1604 0 : cmp_old = mem_equal_const_time(old_owf_password.hash,
1605 0 : cur_nt_hash->hash,
1606 : sizeof(cur_nt_hash->hash));
1607 0 : if (!cmp_new && !cmp_old) {
1608 0 : DEBUG(1,("%s:Error: credentials for domain[%s/%s] doesn't match "
1609 : "any password known to dcname[%s]\n",
1610 : __func__, domain->name, domain->alt_name,
1611 : domain->dcname));
1612 0 : verify_result = WERR_WRONG_PASSWORD;
1613 0 : goto verify_return;
1614 : }
1615 :
1616 0 : if (!cmp_new) {
1617 0 : DEBUG(2,("%s:Warning: credentials for domain[%s/%s] only match "
1618 : "against the old password known to dcname[%s]\n",
1619 : __func__, domain->name, domain->alt_name,
1620 : domain->dcname));
1621 : }
1622 :
1623 0 : verify_result = WERR_OK;
1624 0 : goto verify_return;
1625 :
1626 0 : check_return:
1627 0 : verify_result = check_result;
1628 0 : verify_return:
1629 0 : info2->flags |= NETLOGON_VERIFY_STATUS_RETURNED;
1630 0 : info2->pdc_connection_status = verify_result;
1631 0 : if (domain->dcname != NULL) {
1632 0 : info2->flags |= NETLOGON_HAS_IP;
1633 0 : info2->flags |= NETLOGON_HAS_TIMESERV;
1634 0 : info2->trusted_dc_name = talloc_asprintf(info2, "\\\\%s",
1635 : domain->dcname);
1636 0 : if (info2->trusted_dc_name == NULL) {
1637 0 : TALLOC_FREE(frame);
1638 0 : return WERR_NOT_ENOUGH_MEMORY;
1639 : }
1640 : } else {
1641 0 : info2->trusted_dc_name = talloc_strdup(info2, "");
1642 0 : if (info2->trusted_dc_name == NULL) {
1643 0 : TALLOC_FREE(frame);
1644 0 : return WERR_NOT_ENOUGH_MEMORY;
1645 : }
1646 : }
1647 0 : info2->tc_connection_status = check_result;
1648 :
1649 0 : if (!W_ERROR_IS_OK(info2->pdc_connection_status) ||
1650 0 : !W_ERROR_IS_OK(info2->tc_connection_status))
1651 : {
1652 0 : DEBUG(2, ("%s: domain[%s/%s] dcname[%s] "
1653 : "pdc_connection[%s] tc_connection[%s]\n",
1654 : __func__, domain->name, domain->alt_name,
1655 : domain->dcname,
1656 : win_errstr(info2->pdc_connection_status),
1657 : win_errstr(info2->tc_connection_status)));
1658 : }
1659 :
1660 0 : r->out.query->info2 = info2;
1661 :
1662 0 : DEBUG(5, ("%s: succeeded.\n", __func__));
1663 0 : TALLOC_FREE(frame);
1664 0 : return WERR_OK;
1665 : }
1666 :
1667 0 : static WERROR _winbind_LogonControl_CHANGE_PASSWORD(struct pipes_struct *p,
1668 : struct winbindd_domain *domain,
1669 : struct winbind_LogonControl *r)
1670 : {
1671 0 : struct messaging_context *msg_ctx = global_messaging_context();
1672 0 : NTSTATUS status;
1673 0 : struct rpc_pipe_client *netlogon_pipe = NULL;
1674 0 : struct netlogon_creds_cli_context *netlogon_creds_ctx = NULL;
1675 0 : struct cli_credentials *creds = NULL;
1676 0 : struct samr_Password *cur_nt_hash = NULL;
1677 0 : struct netr_NETLOGON_INFO_1 *info1 = NULL;
1678 0 : struct dcerpc_binding_handle *b;
1679 0 : WERROR change_result = WERR_OK;
1680 0 : bool retry = false;
1681 :
1682 0 : info1 = talloc_zero(p->mem_ctx, struct netr_NETLOGON_INFO_1);
1683 0 : if (info1 == NULL) {
1684 0 : return WERR_NOT_ENOUGH_MEMORY;
1685 : }
1686 :
1687 0 : if (domain->internal) {
1688 0 : return WERR_NOT_SUPPORTED;
1689 : }
1690 :
1691 0 : status = pdb_get_trust_credentials(domain->name,
1692 0 : domain->alt_name,
1693 : p->mem_ctx,
1694 : &creds);
1695 0 : if (NT_STATUS_IS_OK(status)) {
1696 0 : cur_nt_hash = cli_credentials_get_nt_hash(creds, p->mem_ctx);
1697 0 : TALLOC_FREE(creds);
1698 : }
1699 :
1700 0 : reconnect:
1701 0 : status = cm_connect_netlogon_secure(domain,
1702 : &netlogon_pipe,
1703 : &netlogon_creds_ctx);
1704 0 : reset_cm_connection_on_error(domain, NULL, status);
1705 0 : if (NT_STATUS_EQUAL(status, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND)) {
1706 0 : status = NT_STATUS_NO_LOGON_SERVERS;
1707 : }
1708 0 : if (!NT_STATUS_IS_OK(status)) {
1709 0 : DEBUG(2, ("%s: domain[%s/%s] cm_connect_netlogon() returned %s\n",
1710 : __func__, domain->name, domain->alt_name,
1711 : nt_errstr(status)));
1712 : /*
1713 : * Here we return a top level error!
1714 : * This is different than TC_QUERY or TC_VERIFY.
1715 : */
1716 0 : return ntstatus_to_werror(status);
1717 : }
1718 0 : b = netlogon_pipe->binding_handle;
1719 :
1720 0 : if (cur_nt_hash == NULL) {
1721 0 : change_result = WERR_NO_TRUST_LSA_SECRET;
1722 0 : goto change_return;
1723 : }
1724 0 : TALLOC_FREE(cur_nt_hash);
1725 :
1726 0 : status = trust_pw_change(netlogon_creds_ctx,
1727 0 : msg_ctx, b, domain->name,
1728 0 : domain->dcname,
1729 : true); /* force */
1730 0 : if (!NT_STATUS_IS_OK(status)) {
1731 0 : if (!retry && reset_cm_connection_on_error(domain, b, status)) {
1732 0 : retry = true;
1733 0 : goto reconnect;
1734 : }
1735 :
1736 0 : DEBUG(1, ("trust_pw_change(%s): %s\n",
1737 : domain->name, nt_errstr(status)));
1738 :
1739 0 : change_result = ntstatus_to_werror(status);
1740 0 : goto change_return;
1741 : }
1742 :
1743 0 : change_result = WERR_OK;
1744 :
1745 0 : change_return:
1746 0 : info1->pdc_connection_status = change_result;
1747 :
1748 0 : if (!W_ERROR_IS_OK(info1->pdc_connection_status)) {
1749 0 : DEBUG(2, ("%s: domain[%s/%s] dcname[%s] "
1750 : "pdc_connection[%s]\n",
1751 : __func__, domain->name, domain->alt_name,
1752 : domain->dcname,
1753 : win_errstr(info1->pdc_connection_status)));
1754 : }
1755 :
1756 0 : r->out.query->info1 = info1;
1757 :
1758 0 : DEBUG(5, ("%s: succeeded.\n", __func__));
1759 0 : return WERR_OK;
1760 : }
1761 :
1762 0 : WERROR _winbind_LogonControl(struct pipes_struct *p,
1763 : struct winbind_LogonControl *r)
1764 : {
1765 0 : struct winbindd_domain *domain;
1766 :
1767 0 : domain = wb_child_domain();
1768 0 : if (domain == NULL) {
1769 0 : return WERR_NO_SUCH_DOMAIN;
1770 : }
1771 :
1772 0 : switch (r->in.function_code) {
1773 0 : case NETLOGON_CONTROL_REDISCOVER:
1774 0 : if (r->in.level != 2) {
1775 0 : return WERR_INVALID_PARAMETER;
1776 : }
1777 0 : return _winbind_LogonControl_REDISCOVER(p, domain, r);
1778 0 : case NETLOGON_CONTROL_TC_QUERY:
1779 0 : if (r->in.level != 2) {
1780 0 : return WERR_INVALID_PARAMETER;
1781 : }
1782 0 : return _winbind_LogonControl_TC_QUERY(p, domain, r);
1783 0 : case NETLOGON_CONTROL_TC_VERIFY:
1784 0 : if (r->in.level != 2) {
1785 0 : return WERR_INVALID_PARAMETER;
1786 : }
1787 0 : return _winbind_LogonControl_TC_VERIFY(p, domain, r);
1788 0 : case NETLOGON_CONTROL_CHANGE_PASSWORD:
1789 0 : if (r->in.level != 1) {
1790 0 : return WERR_INVALID_PARAMETER;
1791 : }
1792 0 : return _winbind_LogonControl_CHANGE_PASSWORD(p, domain, r);
1793 0 : default:
1794 0 : break;
1795 : }
1796 :
1797 0 : DEBUG(4, ("%s: function_code[0x%x] not supported\n",
1798 : __func__, r->in.function_code));
1799 0 : return WERR_NOT_SUPPORTED;
1800 : }
1801 :
1802 0 : WERROR _winbind_GetForestTrustInformation(struct pipes_struct *p,
1803 : struct winbind_GetForestTrustInformation *r)
1804 : {
1805 0 : TALLOC_CTX *frame = talloc_stackframe();
1806 0 : NTSTATUS status, result;
1807 0 : struct winbindd_domain *domain;
1808 0 : struct rpc_pipe_client *netlogon_pipe = NULL;
1809 0 : struct netlogon_creds_cli_context *netlogon_creds_ctx = NULL;
1810 0 : struct dcerpc_binding_handle *b;
1811 0 : bool retry = false;
1812 0 : struct lsa_String trusted_domain_name = {};
1813 0 : struct lsa_StringLarge trusted_domain_name_l = {};
1814 0 : union lsa_TrustedDomainInfo *tdi = NULL;
1815 0 : const struct lsa_TrustDomainInfoInfoEx *tdo = NULL;
1816 0 : struct lsa_ForestTrustInformation _old_fti = {};
1817 0 : struct lsa_ForestTrustInformation *old_fti = NULL;
1818 0 : struct lsa_ForestTrustInformation *new_fti = NULL;
1819 0 : struct lsa_ForestTrustInformation *merged_fti = NULL;
1820 0 : struct lsa_ForestTrustCollisionInfo *collision_info = NULL;
1821 0 : bool update_fti = false;
1822 0 : struct rpc_pipe_client *local_lsa_pipe;
1823 0 : struct policy_handle local_lsa_policy;
1824 0 : struct dcerpc_binding_handle *local_lsa = NULL;
1825 :
1826 0 : domain = wb_child_domain();
1827 0 : if (domain == NULL) {
1828 0 : TALLOC_FREE(frame);
1829 0 : return WERR_NO_SUCH_DOMAIN;
1830 : }
1831 :
1832 : /*
1833 : * checking for domain->internal and domain->primary
1834 : * makes sure we only do some work when running as DC.
1835 : */
1836 :
1837 0 : if (domain->internal) {
1838 0 : TALLOC_FREE(frame);
1839 0 : return WERR_NO_SUCH_DOMAIN;
1840 : }
1841 :
1842 0 : if (domain->primary) {
1843 0 : TALLOC_FREE(frame);
1844 0 : return WERR_NO_SUCH_DOMAIN;
1845 : }
1846 :
1847 0 : trusted_domain_name.string = domain->name;
1848 0 : trusted_domain_name_l.string = domain->name;
1849 :
1850 0 : status = open_internal_lsa_conn(frame, &local_lsa_pipe,
1851 : &local_lsa_policy);
1852 0 : if (!NT_STATUS_IS_OK(status)) {
1853 0 : DEBUG(0,("%s:%s: open_internal_lsa_conn() failed - %s\n",
1854 : __location__, __func__, nt_errstr(status)));
1855 0 : TALLOC_FREE(frame);
1856 0 : return WERR_INTERNAL_ERROR;
1857 : }
1858 0 : local_lsa = local_lsa_pipe->binding_handle;
1859 :
1860 0 : status = dcerpc_lsa_QueryTrustedDomainInfoByName(local_lsa, frame,
1861 : &local_lsa_policy,
1862 : &trusted_domain_name,
1863 : LSA_TRUSTED_DOMAIN_INFO_INFO_EX,
1864 : &tdi, &result);
1865 0 : if (!NT_STATUS_IS_OK(status)) {
1866 0 : DEBUG(0,("%s:%s: local_lsa.QueryTrustedDomainInfoByName(%s) failed - %s\n",
1867 : __location__, __func__, domain->name, nt_errstr(status)));
1868 0 : TALLOC_FREE(frame);
1869 0 : return WERR_INTERNAL_ERROR;
1870 : }
1871 0 : if (NT_STATUS_EQUAL(result, NT_STATUS_OBJECT_NAME_NOT_FOUND)) {
1872 0 : DEBUG(1,("%s:%s: domain[%s] not found via LSA, might be removed already.\n",
1873 : __location__, __func__, domain->name));
1874 0 : TALLOC_FREE(frame);
1875 0 : return WERR_NO_SUCH_DOMAIN;
1876 : }
1877 0 : if (!NT_STATUS_IS_OK(result)) {
1878 0 : DEBUG(0,("%s:%s: local_lsa.QueryTrustedDomainInfoByName(%s) returned %s\n",
1879 : __location__, __func__, domain->name, nt_errstr(result)));
1880 0 : TALLOC_FREE(frame);
1881 0 : return WERR_INTERNAL_ERROR;
1882 : }
1883 0 : if (tdi == NULL) {
1884 0 : DEBUG(0,("%s:%s: local_lsa.QueryTrustedDomainInfoByName() "
1885 : "returned no trusted domain information\n",
1886 : __location__, __func__));
1887 0 : TALLOC_FREE(frame);
1888 0 : return WERR_INTERNAL_ERROR;
1889 : }
1890 :
1891 0 : tdo = &tdi->info_ex;
1892 :
1893 0 : if (!(tdo->trust_attributes & LSA_TRUST_ATTRIBUTE_FOREST_TRANSITIVE)) {
1894 0 : DEBUG(2,("%s: tdo[%s/%s] is no forest trust attributes[0x%08X]\n",
1895 : __func__, tdo->netbios_name.string,
1896 : tdo->domain_name.string,
1897 : (unsigned)tdo->trust_attributes));
1898 0 : TALLOC_FREE(frame);
1899 0 : return WERR_NO_SUCH_DOMAIN;
1900 : }
1901 :
1902 0 : if (r->in.flags & ~DS_GFTI_UPDATE_TDO) {
1903 0 : TALLOC_FREE(frame);
1904 0 : return WERR_INVALID_FLAGS;
1905 : }
1906 :
1907 0 : reconnect:
1908 0 : status = cm_connect_netlogon_secure(domain,
1909 : &netlogon_pipe,
1910 : &netlogon_creds_ctx);
1911 0 : reset_cm_connection_on_error(domain, NULL, status);
1912 0 : if (NT_STATUS_EQUAL(status, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND)) {
1913 0 : status = NT_STATUS_NO_LOGON_SERVERS;
1914 : }
1915 0 : if (!NT_STATUS_IS_OK(status)) {
1916 0 : DEBUG(3, ("could not open handle to NETLOGON pipe: %s\n",
1917 : nt_errstr(status)));
1918 0 : TALLOC_FREE(frame);
1919 0 : return ntstatus_to_werror(status);
1920 : }
1921 0 : b = netlogon_pipe->binding_handle;
1922 :
1923 0 : status = netlogon_creds_cli_GetForestTrustInformation(netlogon_creds_ctx,
1924 : b, p->mem_ctx,
1925 : &new_fti);
1926 0 : if (!NT_STATUS_IS_OK(status)) {
1927 0 : if (!retry && reset_cm_connection_on_error(domain, b, status)) {
1928 0 : retry = true;
1929 0 : goto reconnect;
1930 : }
1931 0 : DEBUG(2, ("netlogon_creds_cli_GetForestTrustInformation(%s) failed: %s\n",
1932 : domain->name, nt_errstr(status)));
1933 0 : TALLOC_FREE(frame);
1934 0 : return ntstatus_to_werror(status);
1935 : }
1936 :
1937 0 : *r->out.forest_trust_info = new_fti;
1938 :
1939 0 : if (r->in.flags & DS_GFTI_UPDATE_TDO) {
1940 0 : update_fti = true;
1941 : }
1942 :
1943 0 : status = dcerpc_lsa_lsaRQueryForestTrustInformation(local_lsa, frame,
1944 : &local_lsa_policy,
1945 : &trusted_domain_name,
1946 : LSA_FOREST_TRUST_DOMAIN_INFO,
1947 : &old_fti, &result);
1948 0 : if (!NT_STATUS_IS_OK(status)) {
1949 0 : DEBUG(0,("%s:%s: local_lsa.lsaRQueryForestTrustInformation(%s) failed %s\n",
1950 : __location__, __func__, domain->name, nt_errstr(status)));
1951 0 : TALLOC_FREE(frame);
1952 0 : return WERR_INTERNAL_ERROR;
1953 : }
1954 0 : if (NT_STATUS_EQUAL(result, NT_STATUS_NOT_FOUND)) {
1955 0 : DEBUG(2,("%s: no forest trust information available for domain[%s] yet.\n",
1956 : __func__, domain->name));
1957 0 : update_fti = true;
1958 0 : old_fti = &_old_fti;
1959 0 : result = NT_STATUS_OK;
1960 : }
1961 0 : if (!NT_STATUS_IS_OK(result)) {
1962 0 : DEBUG(0,("%s:%s: local_lsa.lsaRQueryForestTrustInformation(%s) returned %s\n",
1963 : __location__, __func__, domain->name, nt_errstr(result)));
1964 0 : TALLOC_FREE(frame);
1965 0 : return WERR_INTERNAL_ERROR;
1966 : }
1967 :
1968 0 : if (old_fti == NULL) {
1969 0 : DEBUG(0,("%s:%s: local_lsa.lsaRQueryForestTrustInformation() "
1970 : "returned success without returning forest trust information\n",
1971 : __location__, __func__));
1972 0 : TALLOC_FREE(frame);
1973 0 : return WERR_INTERNAL_ERROR;
1974 : }
1975 :
1976 0 : if (!update_fti) {
1977 0 : goto done;
1978 : }
1979 :
1980 0 : status = dsdb_trust_merge_forest_info(frame, tdo, old_fti, new_fti,
1981 : &merged_fti);
1982 0 : if (!NT_STATUS_IS_OK(status)) {
1983 0 : DEBUG(0,("%s:%s: dsdb_trust_merge_forest_info(%s) failed %s\n",
1984 : __location__, __func__, domain->name, nt_errstr(status)));
1985 0 : TALLOC_FREE(frame);
1986 0 : return ntstatus_to_werror(status);
1987 : }
1988 :
1989 0 : status = dcerpc_lsa_lsaRSetForestTrustInformation(local_lsa, frame,
1990 : &local_lsa_policy,
1991 : &trusted_domain_name_l,
1992 : LSA_FOREST_TRUST_DOMAIN_INFO,
1993 : merged_fti,
1994 : 0, /* check_only=0 => store it! */
1995 : &collision_info,
1996 : &result);
1997 0 : if (!NT_STATUS_IS_OK(status)) {
1998 0 : DEBUG(0,("%s:%s: local_lsa.lsaRSetForestTrustInformation(%s) failed %s\n",
1999 : __location__, __func__, domain->name, nt_errstr(status)));
2000 0 : TALLOC_FREE(frame);
2001 0 : return WERR_INTERNAL_ERROR;
2002 : }
2003 0 : if (!NT_STATUS_IS_OK(result)) {
2004 0 : DEBUG(0,("%s:%s: local_lsa.lsaRSetForestTrustInformation(%s) returned %s\n",
2005 : __location__, __func__, domain->name, nt_errstr(result)));
2006 0 : TALLOC_FREE(frame);
2007 0 : return ntstatus_to_werror(result);
2008 : }
2009 :
2010 0 : done:
2011 0 : DEBUG(5, ("_winbind_GetForestTrustInformation succeeded\n"));
2012 0 : TALLOC_FREE(frame);
2013 0 : return WERR_OK;
2014 : }
2015 :
2016 0 : NTSTATUS _winbind_SendToSam(struct pipes_struct *p, struct winbind_SendToSam *r)
2017 : {
2018 0 : struct winbindd_domain *domain;
2019 0 : NTSTATUS status;
2020 0 : struct rpc_pipe_client *netlogon_pipe;
2021 0 : struct netlogon_creds_cli_context *netlogon_creds_ctx = NULL;
2022 0 : struct dcerpc_binding_handle *b = NULL;
2023 0 : bool retry = false;
2024 :
2025 0 : DEBUG(5, ("_winbind_SendToSam received\n"));
2026 0 : domain = wb_child_domain();
2027 0 : if (domain == NULL) {
2028 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
2029 : }
2030 :
2031 0 : reconnect:
2032 0 : status = cm_connect_netlogon_secure(domain,
2033 : &netlogon_pipe,
2034 : &netlogon_creds_ctx);
2035 0 : reset_cm_connection_on_error(domain, NULL, status);
2036 0 : if (!NT_STATUS_IS_OK(status)) {
2037 0 : DEBUG(3, ("could not open handle to NETLOGON pipe\n"));
2038 0 : return status;
2039 : }
2040 :
2041 0 : b = netlogon_pipe->binding_handle;
2042 :
2043 0 : status = netlogon_creds_cli_SendToSam(netlogon_creds_ctx,
2044 : b,
2045 : &r->in.message);
2046 0 : if (!retry && reset_cm_connection_on_error(domain, b, status)) {
2047 0 : retry = true;
2048 0 : goto reconnect;
2049 : }
2050 :
2051 0 : return status;
2052 : }
2053 :
2054 0 : NTSTATUS _wbint_ListTrustedDomains(struct pipes_struct *p,
2055 : struct wbint_ListTrustedDomains *r)
2056 : {
2057 0 : struct winbindd_domain *domain = wb_child_domain();
2058 0 : uint32_t i;
2059 0 : NTSTATUS result;
2060 0 : struct netr_DomainTrustList trusts;
2061 0 : uint32_t count = 0;
2062 0 : struct netr_DomainTrust *array = NULL;
2063 0 : pid_t client_pid;
2064 :
2065 0 : if (domain == NULL) {
2066 0 : return NT_STATUS_REQUEST_NOT_ACCEPTED;
2067 : }
2068 :
2069 : /* Cut client_pid to 32bit */
2070 0 : client_pid = r->in.client_pid;
2071 0 : if ((uint64_t)client_pid != r->in.client_pid) {
2072 0 : DBG_DEBUG("pid out of range\n");
2073 0 : return NT_STATUS_INVALID_PARAMETER;
2074 : }
2075 :
2076 0 : DBG_NOTICE("[%s %"PRIu32"]: list trusted domains\n",
2077 : r->in.client_name, client_pid);
2078 :
2079 0 : result = wb_cache_trusted_domains(domain, p->mem_ctx, &trusts);
2080 0 : if (!NT_STATUS_IS_OK(result)) {
2081 0 : DBG_NOTICE("wb_cache_trusted_domains returned %s\n",
2082 : nt_errstr(result));
2083 0 : return result;
2084 : }
2085 :
2086 0 : for (i=0; i<trusts.count; i++) {
2087 0 : struct netr_DomainTrust *st = &trusts.array[i];
2088 0 : struct netr_DomainTrust *dt = NULL;
2089 :
2090 0 : if (st->sid == NULL) {
2091 0 : continue;
2092 : }
2093 0 : if (dom_sid_equal(st->sid, &global_sid_NULL)) {
2094 0 : continue;
2095 : }
2096 :
2097 0 : array = talloc_realloc(r->out.domains, array,
2098 : struct netr_DomainTrust,
2099 : count + 1);
2100 0 : if (array == NULL) {
2101 0 : return NT_STATUS_NO_MEMORY;
2102 : }
2103 :
2104 0 : dt = &array[count];
2105 :
2106 0 : *dt = (struct netr_DomainTrust) {
2107 0 : .trust_flags = st->trust_flags,
2108 0 : .trust_type = st->trust_type,
2109 0 : .trust_attributes = st->trust_attributes,
2110 0 : .netbios_name = talloc_move(array, &st->netbios_name),
2111 0 : .dns_name = talloc_move(array, &st->dns_name),
2112 : };
2113 :
2114 0 : dt->sid = dom_sid_dup(array, st->sid);
2115 0 : if (dt->sid == NULL) {
2116 0 : return NT_STATUS_NO_MEMORY;
2117 : }
2118 :
2119 0 : count++;
2120 : }
2121 :
2122 0 : r->out.domains->array = array;
2123 0 : r->out.domains->count = count;
2124 0 : return NT_STATUS_OK;
2125 : }
2126 :
2127 : #include "librpc/gen_ndr/ndr_winbind_scompat.c"
|