2 Unix SMB/CIFS implementation.
4 Winbind ADS backend functions
6 Copyright (C) Andrew Tridgell 2001
7 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2003
8 Copyright (C) Gerald (Jerry) Carter 2004
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
20 You should have received a copy of the GNU General Public License
21 along with this program. If not, see <http://www.gnu.org/licenses/>.
30 #define DBGC_CLASS DBGC_WINBIND
32 extern struct winbindd_methods reconnect_methods
;
35 return our ads connections structure for a domain. We keep the connection
36 open to make things faster
38 static ADS_STRUCT
*ads_cached_connection(struct winbindd_domain
*domain
)
43 struct sockaddr_storage dc_ss
;
45 DEBUG(10,("ads_cached_connection\n"));
47 if (domain
->private_data
) {
50 time_t now
= time(NULL
);
52 /* check for a valid structure */
53 ads
= (ADS_STRUCT
*)domain
->private_data
;
55 expire
= MIN(ads
->auth
.tgt_expire
, ads
->auth
.tgs_expire
);
57 DEBUG(7, ("Current tickets expire in %d seconds (at %d, time is now %d)\n",
58 (uint32
)expire
-(uint32
)now
, (uint32
) expire
, (uint32
) now
));
60 if ( ads
->config
.realm
&& (expire
> now
)) {
63 /* we own this ADS_STRUCT so make sure it goes away */
64 DEBUG(7,("Deleting expired krb5 credential cache\n"));
67 ads_kdestroy("MEMORY:winbind_ccache");
68 domain
->private_data
= NULL
;
72 /* we don't want this to affect the users ccache */
73 setenv("KRB5CCNAME", "MEMORY:winbind_ccache", 1);
75 ads
= ads_init(domain
->alt_name
, domain
->name
, NULL
);
77 DEBUG(1,("ads_init for domain %s failed\n", domain
->name
));
81 /* the machine acct password might have change - fetch it every time */
83 SAFE_FREE(ads
->auth
.password
);
84 SAFE_FREE(ads
->auth
.realm
);
90 if ( !pdb_get_trusteddom_pw( domain
->name
, &ads
->auth
.password
, &sid
, &last_set_time
) ) {
94 ads
->auth
.realm
= SMB_STRDUP( ads
->server
.realm
);
95 strupper_m( ads
->auth
.realm
);
98 struct winbindd_domain
*our_domain
= domain
;
100 ads
->auth
.password
= secrets_fetch_machine_password(lp_workgroup(), NULL
, NULL
);
102 /* always give preference to the alt_name in our
103 primary domain if possible */
105 if ( !domain
->primary
)
106 our_domain
= find_our_domain();
108 if ( our_domain
->alt_name
[0] != '\0' ) {
109 ads
->auth
.realm
= SMB_STRDUP( our_domain
->alt_name
);
110 strupper_m( ads
->auth
.realm
);
113 ads
->auth
.realm
= SMB_STRDUP( lp_realm() );
116 ads
->auth
.renewable
= WINBINDD_PAM_AUTH_KRB5_RENEW_TIME
;
118 /* Setup the server affinity cache. We don't reaally care
119 about the name. Just setup affinity and the KRB5_CONFIG
122 get_dc_name( ads
->server
.workgroup
, ads
->server
.realm
, dc_name
, &dc_ss
);
124 status
= ads_connect(ads
);
125 if (!ADS_ERR_OK(status
) || !ads
->config
.realm
) {
126 DEBUG(1,("ads_connect for domain %s failed: %s\n",
127 domain
->name
, ads_errstr(status
)));
130 /* if we get ECONNREFUSED then it might be a NT4
131 server, fall back to MSRPC */
132 if (status
.error_type
== ENUM_ADS_ERROR_SYSTEM
&&
133 status
.err
.rc
== ECONNREFUSED
) {
134 /* 'reconnect_methods' is the MS-RPC backend. */
135 DEBUG(1,("Trying MSRPC methods\n"));
136 domain
->backend
= &reconnect_methods
;
141 /* set the flag that says we don't own the memory even
142 though we do so that ads_destroy() won't destroy the
143 structure we pass back by reference */
145 ads
->is_mine
= False
;
147 domain
->private_data
= (void *)ads
;
152 /* Query display info for a realm. This is the basic user list fn */
153 static NTSTATUS
query_user_list(struct winbindd_domain
*domain
,
156 WINBIND_USERINFO
**info
)
158 ADS_STRUCT
*ads
= NULL
;
159 const char *attrs
[] = { "*", NULL
};
162 LDAPMessage
*res
= NULL
;
163 LDAPMessage
*msg
= NULL
;
164 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
168 DEBUG(3,("ads: query_user_list\n"));
170 if ( !winbindd_can_contact_domain( domain
) ) {
171 DEBUG(10,("query_user_list: No incoming trust for domain %s\n",
176 ads
= ads_cached_connection(domain
);
179 domain
->last_status
= NT_STATUS_SERVER_DISABLED
;
183 rc
= ads_search_retry(ads
, &res
, "(objectCategory=user)", attrs
);
184 if (!ADS_ERR_OK(rc
) || !res
) {
185 DEBUG(1,("query_user_list ads_search: %s\n", ads_errstr(rc
)));
189 count
= ads_count_replies(ads
, res
);
191 DEBUG(1,("query_user_list: No users found\n"));
195 (*info
) = TALLOC_ZERO_ARRAY(mem_ctx
, WINBIND_USERINFO
, count
);
197 status
= NT_STATUS_NO_MEMORY
;
203 for (msg
= ads_first_entry(ads
, res
); msg
; msg
= ads_next_entry(ads
, msg
)) {
204 char *name
, *gecos
= NULL
;
205 char *homedir
= NULL
;
210 gid_t primary_gid
= (gid_t
)-1;
212 if (!ads_pull_uint32(ads
, msg
, "sAMAccountType", &atype
) ||
213 ads_atype_map(atype
) != SID_NAME_USER
) {
214 DEBUG(1,("Not a user account? atype=0x%x\n", atype
));
218 name
= ads_pull_username(ads
, mem_ctx
, msg
);
220 if ( ads_pull_sid( ads
, msg
, "objectSid", &user_sid
) ) {
221 status
= nss_get_info_cached( domain
, &user_sid
, mem_ctx
,
222 ads
, msg
, &homedir
, &shell
, &gecos
,
227 gecos
= ads_pull_string(ads
, mem_ctx
, msg
, "name");
230 if (!ads_pull_sid(ads
, msg
, "objectSid",
231 &(*info
)[i
].user_sid
)) {
232 DEBUG(1,("No sid for %s !?\n", name
));
235 if (!ads_pull_uint32(ads
, msg
, "primaryGroupID", &group
)) {
236 DEBUG(1,("No primary group for %s !?\n", name
));
240 (*info
)[i
].acct_name
= name
;
241 (*info
)[i
].full_name
= gecos
;
242 (*info
)[i
].homedir
= homedir
;
243 (*info
)[i
].shell
= shell
;
244 (*info
)[i
].primary_gid
= primary_gid
;
245 sid_compose(&(*info
)[i
].group_sid
, &domain
->sid
, group
);
250 status
= NT_STATUS_OK
;
252 DEBUG(3,("ads query_user_list gave %d entries\n", (*num_entries
)));
256 ads_msgfree(ads
, res
);
261 /* list all domain groups */
262 static NTSTATUS
enum_dom_groups(struct winbindd_domain
*domain
,
265 struct acct_info
**info
)
267 ADS_STRUCT
*ads
= NULL
;
268 const char *attrs
[] = {"userPrincipalName", "sAMAccountName",
269 "name", "objectSid", NULL
};
272 LDAPMessage
*res
= NULL
;
273 LDAPMessage
*msg
= NULL
;
274 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
276 bool enum_dom_local_groups
= False
;
280 DEBUG(3,("ads: enum_dom_groups\n"));
282 if ( !winbindd_can_contact_domain( domain
) ) {
283 DEBUG(10,("enum_dom_groups: No incoming trust for domain %s\n",
288 /* only grab domain local groups for our domain */
289 if ( domain
->active_directory
&& strequal(lp_realm(), domain
->alt_name
) ) {
290 enum_dom_local_groups
= True
;
293 /* Workaround ADS LDAP bug present in MS W2K3 SP0 and W2K SP4 w/o
296 * According to Section 5.1(4) of RFC 2251 if a value of a type is it's
297 * default value, it MUST be absent. In case of extensible matching the
298 * "dnattr" boolean defaults to FALSE and so it must be only be present
301 * When it is set to FALSE and the OpenLDAP lib (correctly) encodes a
302 * filter using bitwise matching rule then the buggy AD fails to decode
303 * the extensible match. As a workaround set it to TRUE and thereby add
304 * the dnAttributes "dn" field to cope with those older AD versions.
305 * It should not harm and won't put any additional load on the AD since
306 * none of the dn components have a bitmask-attribute.
308 * Thanks to Ralf Haferkamp for input and testing - Guenther */
310 filter
= talloc_asprintf(mem_ctx
, "(&(objectCategory=group)(&(groupType:dn:%s:=%d)(!(groupType:dn:%s:=%d))))",
311 ADS_LDAP_MATCHING_RULE_BIT_AND
, GROUP_TYPE_SECURITY_ENABLED
,
312 ADS_LDAP_MATCHING_RULE_BIT_AND
,
313 enum_dom_local_groups
? GROUP_TYPE_BUILTIN_LOCAL_GROUP
: GROUP_TYPE_RESOURCE_GROUP
);
315 if (filter
== NULL
) {
316 status
= NT_STATUS_NO_MEMORY
;
320 ads
= ads_cached_connection(domain
);
323 domain
->last_status
= NT_STATUS_SERVER_DISABLED
;
327 rc
= ads_search_retry(ads
, &res
, filter
, attrs
);
328 if (!ADS_ERR_OK(rc
) || !res
) {
329 DEBUG(1,("enum_dom_groups ads_search: %s\n", ads_errstr(rc
)));
333 count
= ads_count_replies(ads
, res
);
335 DEBUG(1,("enum_dom_groups: No groups found\n"));
339 (*info
) = TALLOC_ZERO_ARRAY(mem_ctx
, struct acct_info
, count
);
341 status
= NT_STATUS_NO_MEMORY
;
347 for (msg
= ads_first_entry(ads
, res
); msg
; msg
= ads_next_entry(ads
, msg
)) {
352 name
= ads_pull_username(ads
, mem_ctx
, msg
);
353 gecos
= ads_pull_string(ads
, mem_ctx
, msg
, "name");
354 if (!ads_pull_sid(ads
, msg
, "objectSid", &sid
)) {
355 DEBUG(1,("No sid for %s !?\n", name
));
359 if (!sid_peek_check_rid(&domain
->sid
, &sid
, &rid
)) {
360 DEBUG(1,("No rid for %s !?\n", name
));
364 fstrcpy((*info
)[i
].acct_name
, name
);
365 fstrcpy((*info
)[i
].acct_desc
, gecos
);
366 (*info
)[i
].rid
= rid
;
372 status
= NT_STATUS_OK
;
374 DEBUG(3,("ads enum_dom_groups gave %d entries\n", (*num_entries
)));
378 ads_msgfree(ads
, res
);
383 /* list all domain local groups */
384 static NTSTATUS
enum_local_groups(struct winbindd_domain
*domain
,
387 struct acct_info
**info
)
390 * This is a stub function only as we returned the domain
391 * local groups in enum_dom_groups() if the domain->native field
392 * was true. This is a simple performance optimization when
395 * if we ever need to enumerate domain local groups separately,
396 * then this optimization in enum_dom_groups() will need
404 /* convert a single name to a sid in a domain - use rpc methods */
405 static NTSTATUS
name_to_sid(struct winbindd_domain
*domain
,
407 enum winbindd_cmd orig_cmd
,
408 const char *domain_name
,
411 enum lsa_SidType
*type
)
413 return reconnect_methods
.name_to_sid(domain
, mem_ctx
, orig_cmd
,
418 /* convert a domain SID to a user or group name - use rpc methods */
419 static NTSTATUS
sid_to_name(struct winbindd_domain
*domain
,
424 enum lsa_SidType
*type
)
426 return reconnect_methods
.sid_to_name(domain
, mem_ctx
, sid
,
427 domain_name
, name
, type
);
430 /* convert a list of rids to names - use rpc methods */
431 static NTSTATUS
rids_to_names(struct winbindd_domain
*domain
,
438 enum lsa_SidType
**types
)
440 return reconnect_methods
.rids_to_names(domain
, mem_ctx
, sid
,
442 domain_name
, names
, types
);
445 /* If you are looking for "dn_lookup": Yes, it used to be here!
446 * It has gone now since it was a major speed bottleneck in
447 * lookup_groupmem (its only use). It has been replaced by
448 * an rpc lookup sids call... R.I.P. */
450 /* Lookup user information from a rid */
451 static NTSTATUS
query_user(struct winbindd_domain
*domain
,
454 WINBIND_USERINFO
*info
)
456 ADS_STRUCT
*ads
= NULL
;
457 const char *attrs
[] = { "*", NULL
};
460 LDAPMessage
*msg
= NULL
;
464 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
465 struct netr_SamInfo3
*user
= NULL
;
467 DEBUG(3,("ads: query_user\n"));
469 info
->homedir
= NULL
;
471 info
->primary_gid
= (gid_t
)-1;
473 /* try netsamlogon cache first */
475 if ( (user
= netsamlogon_cache_get( mem_ctx
, sid
)) != NULL
)
478 DEBUG(5,("query_user: Cache lookup succeeded for %s\n",
479 sid_string_dbg(sid
)));
481 sid_compose(&info
->user_sid
, &domain
->sid
, user
->base
.rid
);
482 sid_compose(&info
->group_sid
, &domain
->sid
, user
->base
.primary_gid
);
484 info
->acct_name
= talloc_strdup(mem_ctx
, user
->base
.account_name
.string
);
485 info
->full_name
= talloc_strdup(mem_ctx
, user
->base
.full_name
.string
);
487 nss_get_info_cached( domain
, sid
, mem_ctx
, NULL
, NULL
,
488 &info
->homedir
, &info
->shell
, &info
->full_name
,
489 &info
->primary_gid
);
496 if ( !winbindd_can_contact_domain(domain
)) {
497 DEBUG(8,("query_user: No incoming trust from domain %s\n",
500 /* We still need to generate some basic information
501 about the user even if we cannot contact the
502 domain. Most of this stuff we can deduce. */
504 sid_copy( &info
->user_sid
, sid
);
506 /* Assume "Domain Users" for the primary group */
508 sid_compose(&info
->group_sid
, &domain
->sid
, DOMAIN_GROUP_RID_USERS
);
510 /* Try to fill in what the nss_info backend can do */
512 nss_get_info_cached( domain
, sid
, mem_ctx
, NULL
, NULL
,
513 &info
->homedir
, &info
->shell
, &info
->full_name
,
514 &info
->primary_gid
);
516 status
= NT_STATUS_OK
;
520 /* no cache...do the query */
522 if ( (ads
= ads_cached_connection(domain
)) == NULL
) {
523 domain
->last_status
= NT_STATUS_SERVER_DISABLED
;
527 sidstr
= sid_binstring(sid
);
528 asprintf(&ldap_exp
, "(objectSid=%s)", sidstr
);
529 rc
= ads_search_retry(ads
, &msg
, ldap_exp
, attrs
);
532 if (!ADS_ERR_OK(rc
) || !msg
) {
533 DEBUG(1,("query_user(sid=%s) ads_search: %s\n",
534 sid_string_dbg(sid
), ads_errstr(rc
)));
538 count
= ads_count_replies(ads
, msg
);
540 DEBUG(1,("query_user(sid=%s): Not found\n",
541 sid_string_dbg(sid
)));
545 info
->acct_name
= ads_pull_username(ads
, mem_ctx
, msg
);
547 nss_get_info_cached( domain
, sid
, mem_ctx
, ads
, msg
,
548 &info
->homedir
, &info
->shell
, &info
->full_name
,
549 &info
->primary_gid
);
551 if (info
->full_name
== NULL
) {
552 info
->full_name
= ads_pull_string(ads
, mem_ctx
, msg
, "name");
555 if (!ads_pull_uint32(ads
, msg
, "primaryGroupID", &group_rid
)) {
556 DEBUG(1,("No primary group for %s !?\n",
557 sid_string_dbg(sid
)));
561 sid_copy(&info
->user_sid
, sid
);
562 sid_compose(&info
->group_sid
, &domain
->sid
, group_rid
);
564 status
= NT_STATUS_OK
;
566 DEBUG(3,("ads query_user gave %s\n", info
->acct_name
));
569 ads_msgfree(ads
, msg
);
574 /* Lookup groups a user is a member of - alternate method, for when
575 tokenGroups are not available. */
576 static NTSTATUS
lookup_usergroups_member(struct winbindd_domain
*domain
,
579 DOM_SID
*primary_group
,
580 size_t *p_num_groups
, DOM_SID
**user_sids
)
583 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
585 LDAPMessage
*res
= NULL
;
586 LDAPMessage
*msg
= NULL
;
589 const char *group_attrs
[] = {"objectSid", NULL
};
591 size_t num_groups
= 0;
593 DEBUG(3,("ads: lookup_usergroups_member\n"));
595 if ( !winbindd_can_contact_domain( domain
) ) {
596 DEBUG(10,("lookup_usergroups_members: No incoming trust for domain %s\n",
601 ads
= ads_cached_connection(domain
);
604 domain
->last_status
= NT_STATUS_SERVER_DISABLED
;
608 if (!(escaped_dn
= escape_ldap_string_alloc(user_dn
))) {
609 status
= NT_STATUS_NO_MEMORY
;
613 ldap_exp
= talloc_asprintf(mem_ctx
,
614 "(&(member=%s)(objectCategory=group)(groupType:dn:%s:=%d))",
616 ADS_LDAP_MATCHING_RULE_BIT_AND
,
617 GROUP_TYPE_SECURITY_ENABLED
);
619 DEBUG(1,("lookup_usergroups(dn=%s) asprintf failed!\n", user_dn
));
620 SAFE_FREE(escaped_dn
);
621 status
= NT_STATUS_NO_MEMORY
;
625 SAFE_FREE(escaped_dn
);
627 rc
= ads_search_retry(ads
, &res
, ldap_exp
, group_attrs
);
629 if (!ADS_ERR_OK(rc
) || !res
) {
630 DEBUG(1,("lookup_usergroups ads_search member=%s: %s\n", user_dn
, ads_errstr(rc
)));
631 return ads_ntstatus(rc
);
634 count
= ads_count_replies(ads
, res
);
639 /* always add the primary group to the sid array */
640 status
= add_sid_to_array(mem_ctx
, primary_group
, user_sids
,
642 if (!NT_STATUS_IS_OK(status
)) {
647 for (msg
= ads_first_entry(ads
, res
); msg
;
648 msg
= ads_next_entry(ads
, msg
)) {
651 if (!ads_pull_sid(ads
, msg
, "objectSid", &group_sid
)) {
652 DEBUG(1,("No sid for this group ?!?\n"));
656 /* ignore Builtin groups from ADS - Guenther */
657 if (sid_check_is_in_builtin(&group_sid
)) {
661 status
= add_sid_to_array(mem_ctx
, &group_sid
,
662 user_sids
, &num_groups
);
663 if (!NT_STATUS_IS_OK(status
)) {
670 *p_num_groups
= num_groups
;
671 status
= (user_sids
!= NULL
) ? NT_STATUS_OK
: NT_STATUS_NO_MEMORY
;
673 DEBUG(3,("ads lookup_usergroups (member) succeeded for dn=%s\n", user_dn
));
676 ads_msgfree(ads
, res
);
681 /* Lookup groups a user is a member of - alternate method, for when
682 tokenGroups are not available. */
683 static NTSTATUS
lookup_usergroups_memberof(struct winbindd_domain
*domain
,
686 DOM_SID
*primary_group
,
687 size_t *p_num_groups
,
691 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
693 const char *attrs
[] = {"memberOf", NULL
};
694 size_t num_groups
= 0;
695 DOM_SID
*group_sids
= NULL
;
697 char **strings
= NULL
;
698 size_t num_strings
= 0, num_sids
= 0;
701 DEBUG(3,("ads: lookup_usergroups_memberof\n"));
703 if ( !winbindd_can_contact_domain( domain
) ) {
704 DEBUG(10,("lookup_usergroups_memberof: No incoming trust for "
705 "domain %s\n", domain
->name
));
709 ads
= ads_cached_connection(domain
);
712 domain
->last_status
= NT_STATUS_SERVER_DISABLED
;
713 return NT_STATUS_UNSUCCESSFUL
;
716 rc
= ads_search_retry_extended_dn_ranged(ads
, mem_ctx
, user_dn
, attrs
,
717 ADS_EXTENDED_DN_HEX_STRING
,
718 &strings
, &num_strings
);
720 if (!ADS_ERR_OK(rc
)) {
721 DEBUG(1,("lookup_usergroups_memberof ads_search "
722 "member=%s: %s\n", user_dn
, ads_errstr(rc
)));
723 return ads_ntstatus(rc
);
729 /* always add the primary group to the sid array */
730 status
= add_sid_to_array(mem_ctx
, primary_group
, user_sids
,
732 if (!NT_STATUS_IS_OK(status
)) {
736 group_sids
= TALLOC_ZERO_ARRAY(mem_ctx
, DOM_SID
, num_strings
+ 1);
738 status
= NT_STATUS_NO_MEMORY
;
742 for (i
=0; i
<num_strings
; i
++) {
743 rc
= ads_get_sid_from_extended_dn(mem_ctx
, strings
[i
],
744 ADS_EXTENDED_DN_HEX_STRING
,
746 if (!ADS_ERR_OK(rc
)) {
747 /* ignore members without SIDs */
748 if (NT_STATUS_EQUAL(ads_ntstatus(rc
),
749 NT_STATUS_NOT_FOUND
)) {
753 status
= ads_ntstatus(rc
);
761 DEBUG(1,("No memberOf for this user?!?\n"));
762 status
= NT_STATUS_NO_MEMORY
;
766 for (i
=0; i
<num_sids
; i
++) {
768 /* ignore Builtin groups from ADS - Guenther */
769 if (sid_check_is_in_builtin(&group_sids
[i
])) {
773 status
= add_sid_to_array(mem_ctx
, &group_sids
[i
], user_sids
,
775 if (!NT_STATUS_IS_OK(status
)) {
781 *p_num_groups
= num_groups
;
782 status
= (*user_sids
!= NULL
) ? NT_STATUS_OK
: NT_STATUS_NO_MEMORY
;
784 DEBUG(3,("ads lookup_usergroups (memberof) succeeded for dn=%s\n",
788 TALLOC_FREE(strings
);
789 TALLOC_FREE(group_sids
);
795 /* Lookup groups a user is a member of. */
796 static NTSTATUS
lookup_usergroups(struct winbindd_domain
*domain
,
799 uint32
*p_num_groups
, DOM_SID
**user_sids
)
801 ADS_STRUCT
*ads
= NULL
;
802 const char *attrs
[] = {"tokenGroups", "primaryGroupID", NULL
};
805 LDAPMessage
*msg
= NULL
;
806 char *user_dn
= NULL
;
809 DOM_SID primary_group
;
810 uint32 primary_group_rid
;
811 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
812 size_t num_groups
= 0;
814 DEBUG(3,("ads: lookup_usergroups\n"));
817 status
= lookup_usergroups_cached(domain
, mem_ctx
, sid
,
818 p_num_groups
, user_sids
);
819 if (NT_STATUS_IS_OK(status
)) {
823 if ( !winbindd_can_contact_domain( domain
) ) {
824 DEBUG(10,("lookup_usergroups: No incoming trust for domain %s\n",
827 /* Tell the cache manager not to remember this one */
829 return NT_STATUS_SYNCHRONIZATION_REQUIRED
;
832 ads
= ads_cached_connection(domain
);
835 domain
->last_status
= NT_STATUS_SERVER_DISABLED
;
836 status
= NT_STATUS_SERVER_DISABLED
;
840 rc
= ads_search_retry_sid(ads
, &msg
, sid
, attrs
);
842 if (!ADS_ERR_OK(rc
)) {
843 status
= ads_ntstatus(rc
);
844 DEBUG(1, ("lookup_usergroups(sid=%s) ads_search tokenGroups: "
845 "%s\n", sid_string_dbg(sid
), ads_errstr(rc
)));
849 count
= ads_count_replies(ads
, msg
);
851 status
= NT_STATUS_UNSUCCESSFUL
;
852 DEBUG(1,("lookup_usergroups(sid=%s) ads_search tokenGroups: "
853 "invalid number of results (count=%d)\n",
854 sid_string_dbg(sid
), count
));
859 DEBUG(1,("lookup_usergroups(sid=%s) ads_search tokenGroups: NULL msg\n",
860 sid_string_dbg(sid
)));
861 status
= NT_STATUS_UNSUCCESSFUL
;
865 user_dn
= ads_get_dn(ads
, msg
);
866 if (user_dn
== NULL
) {
867 status
= NT_STATUS_NO_MEMORY
;
871 if (!ads_pull_uint32(ads
, msg
, "primaryGroupID", &primary_group_rid
)) {
872 DEBUG(1,("%s: No primary group for sid=%s !?\n",
873 domain
->name
, sid_string_dbg(sid
)));
877 sid_copy(&primary_group
, &domain
->sid
);
878 sid_append_rid(&primary_group
, primary_group_rid
);
880 count
= ads_pull_sids(ads
, mem_ctx
, msg
, "tokenGroups", &sids
);
882 /* there must always be at least one group in the token,
883 unless we are talking to a buggy Win2k server */
885 /* actually this only happens when the machine account has no read
886 * permissions on the tokenGroup attribute - gd */
892 /* lookup what groups this user is a member of by DN search on
895 status
= lookup_usergroups_memberof(domain
, mem_ctx
, user_dn
,
897 &num_groups
, user_sids
);
898 *p_num_groups
= (uint32
)num_groups
;
899 if (NT_STATUS_IS_OK(status
)) {
903 /* lookup what groups this user is a member of by DN search on
906 status
= lookup_usergroups_member(domain
, mem_ctx
, user_dn
,
908 &num_groups
, user_sids
);
909 *p_num_groups
= (uint32
)num_groups
;
916 status
= add_sid_to_array(mem_ctx
, &primary_group
, user_sids
,
918 if (!NT_STATUS_IS_OK(status
)) {
922 for (i
=0;i
<count
;i
++) {
924 /* ignore Builtin groups from ADS - Guenther */
925 if (sid_check_is_in_builtin(&sids
[i
])) {
929 status
= add_sid_to_array_unique(mem_ctx
, &sids
[i
],
930 user_sids
, &num_groups
);
931 if (!NT_STATUS_IS_OK(status
)) {
936 *p_num_groups
= (uint32
)num_groups
;
937 status
= (*user_sids
!= NULL
) ? NT_STATUS_OK
: NT_STATUS_NO_MEMORY
;
939 DEBUG(3,("ads lookup_usergroups (tokenGroups) succeeded for sid=%s\n",
940 sid_string_dbg(sid
)));
942 ads_memfree(ads
, user_dn
);
943 ads_msgfree(ads
, msg
);
947 /* Lookup aliases a user is member of - use rpc methods */
948 static NTSTATUS
lookup_useraliases(struct winbindd_domain
*domain
,
950 uint32 num_sids
, const DOM_SID
*sids
,
951 uint32
*num_aliases
, uint32
**alias_rids
)
953 return reconnect_methods
.lookup_useraliases(domain
, mem_ctx
,
960 find the members of a group, given a group rid and domain
962 static NTSTATUS
lookup_groupmem(struct winbindd_domain
*domain
,
964 const DOM_SID
*group_sid
, uint32
*num_names
,
965 DOM_SID
**sid_mem
, char ***names
,
969 ADS_STRUCT
*ads
= NULL
;
971 NTSTATUS status
= NT_STATUS_UNSUCCESSFUL
;
973 char **members
= NULL
;
975 size_t num_members
= 0;
977 struct rpc_pipe_client
*cli
;
978 POLICY_HND lsa_policy
;
979 DOM_SID
*sid_mem_nocache
= NULL
;
980 char **names_nocache
= NULL
;
981 enum lsa_SidType
*name_types_nocache
= NULL
;
982 char **domains_nocache
= NULL
; /* only needed for rpccli_lsa_lookup_sids */
983 uint32 num_nocache
= 0;
984 TALLOC_CTX
*tmp_ctx
= NULL
;
986 DEBUG(10,("ads: lookup_groupmem %s sid=%s\n", domain
->name
,
987 sid_string_dbg(group_sid
)));
991 tmp_ctx
= talloc_new(mem_ctx
);
993 DEBUG(1, ("ads: lookup_groupmem: talloc failed\n"));
994 status
= NT_STATUS_NO_MEMORY
;
998 if ( !winbindd_can_contact_domain( domain
) ) {
999 DEBUG(10,("lookup_groupmem: No incoming trust for domain %s\n",
1001 return NT_STATUS_OK
;
1004 ads
= ads_cached_connection(domain
);
1007 domain
->last_status
= NT_STATUS_SERVER_DISABLED
;
1011 if ((sidbinstr
= sid_binstring(group_sid
)) == NULL
) {
1012 status
= NT_STATUS_NO_MEMORY
;
1016 /* search for all members of the group */
1017 if (!(ldap_exp
= talloc_asprintf(tmp_ctx
, "(objectSid=%s)",
1020 SAFE_FREE(sidbinstr
);
1021 DEBUG(1, ("ads: lookup_groupmem: talloc_asprintf for ldap_exp failed!\n"));
1022 status
= NT_STATUS_NO_MEMORY
;
1025 SAFE_FREE(sidbinstr
);
1027 args
.control
= ADS_EXTENDED_DN_OID
;
1028 args
.val
= ADS_EXTENDED_DN_HEX_STRING
;
1029 args
.critical
= True
;
1031 rc
= ads_ranged_search(ads
, tmp_ctx
, LDAP_SCOPE_SUBTREE
, ads
->config
.bind_path
,
1032 ldap_exp
, &args
, "member", &members
, &num_members
);
1034 if (!ADS_ERR_OK(rc
)) {
1035 DEBUG(0,("ads_ranged_search failed with: %s\n", ads_errstr(rc
)));
1036 status
= NT_STATUS_UNSUCCESSFUL
;
1040 DEBUG(10, ("ads lookup_groupmem: got %d sids via extended dn call\n", (int)num_members
));
1042 /* Now that we have a list of sids, we need to get the
1043 * lists of names and name_types belonging to these sids.
1044 * even though conceptually not quite clean, we use the
1045 * RPC call lsa_lookup_sids for this since it can handle a
1046 * list of sids. ldap calls can just resolve one sid at a time.
1048 * At this stage, the sids are still hidden in the exetended dn
1049 * member output format. We actually do a little better than
1050 * stated above: In extracting the sids from the member strings,
1051 * we try to resolve as many sids as possible from the
1052 * cache. Only the rest is passed to the lsa_lookup_sids call. */
1055 (*sid_mem
) = TALLOC_ZERO_ARRAY(mem_ctx
, DOM_SID
, num_members
);
1056 (*names
) = TALLOC_ZERO_ARRAY(mem_ctx
, char *, num_members
);
1057 (*name_types
) = TALLOC_ZERO_ARRAY(mem_ctx
, uint32
, num_members
);
1058 (sid_mem_nocache
) = TALLOC_ZERO_ARRAY(tmp_ctx
, DOM_SID
, num_members
);
1060 if ((members
== NULL
) || (*sid_mem
== NULL
) ||
1061 (*names
== NULL
) || (*name_types
== NULL
) ||
1062 (sid_mem_nocache
== NULL
))
1064 DEBUG(1, ("ads: lookup_groupmem: talloc failed\n"));
1065 status
= NT_STATUS_NO_MEMORY
;
1072 (*name_types
) = NULL
;
1075 for (i
=0; i
<num_members
; i
++) {
1076 enum lsa_SidType name_type
;
1077 char *name
, *domain_name
;
1080 rc
= ads_get_sid_from_extended_dn(tmp_ctx
, members
[i
], args
.val
,
1082 if (!ADS_ERR_OK(rc
)) {
1083 if (NT_STATUS_EQUAL(ads_ntstatus(rc
),
1084 NT_STATUS_NOT_FOUND
)) {
1085 /* Group members can be objects, like Exchange
1086 * Public Folders, that don't have a SID. Skip
1091 status
= ads_ntstatus(rc
);
1095 if (lookup_cached_sid(mem_ctx
, &sid
, &domain_name
, &name
,
1097 DEBUG(10,("ads: lookup_groupmem: got sid %s from "
1098 "cache\n", sid_string_dbg(&sid
)));
1099 sid_copy(&(*sid_mem
)[*num_names
], &sid
);
1100 (*names
)[*num_names
] = fill_domain_username_talloc(
1106 (*name_types
)[*num_names
] = name_type
;
1110 DEBUG(10, ("ads: lookup_groupmem: sid %s not found in "
1111 "cache\n", sid_string_dbg(&sid
)));
1112 sid_copy(&(sid_mem_nocache
)[num_nocache
], &sid
);
1117 DEBUG(10, ("ads: lookup_groupmem: %d sids found in cache, "
1118 "%d left for lsa_lookupsids\n", *num_names
, num_nocache
));
1120 /* handle sids not resolved from cache by lsa_lookup_sids */
1121 if (num_nocache
> 0) {
1123 status
= cm_connect_lsa(domain
, tmp_ctx
, &cli
, &lsa_policy
);
1125 if (!NT_STATUS_IS_OK(status
)) {
1129 status
= rpccli_lsa_lookup_sids(cli
, tmp_ctx
,
1135 &name_types_nocache
);
1137 if (!(NT_STATUS_IS_OK(status
) ||
1138 NT_STATUS_EQUAL(status
, STATUS_SOME_UNMAPPED
) ||
1139 NT_STATUS_EQUAL(status
, NT_STATUS_NONE_MAPPED
)))
1141 DEBUG(1, ("lsa_lookupsids call failed with %s "
1142 "- retrying...\n", nt_errstr(status
)));
1144 status
= cm_connect_lsa(domain
, tmp_ctx
, &cli
,
1147 if (!NT_STATUS_IS_OK(status
)) {
1151 status
= rpccli_lsa_lookup_sids(cli
, tmp_ctx
,
1157 &name_types_nocache
);
1160 if (NT_STATUS_IS_OK(status
) ||
1161 NT_STATUS_EQUAL(status
, STATUS_SOME_UNMAPPED
))
1163 /* Copy the entries over from the "_nocache" arrays
1164 * to the result arrays, skipping the gaps the
1165 * lookup_sids call left. */
1166 for (i
=0; i
< num_nocache
; i
++) {
1167 if (((names_nocache
)[i
] != NULL
) &&
1168 ((name_types_nocache
)[i
] != SID_NAME_UNKNOWN
))
1170 sid_copy(&(*sid_mem
)[*num_names
],
1171 &sid_mem_nocache
[i
]);
1172 (*names
)[*num_names
] =
1173 fill_domain_username_talloc(
1178 (*name_types
)[*num_names
] = name_types_nocache
[i
];
1183 else if (NT_STATUS_EQUAL(status
, NT_STATUS_NONE_MAPPED
)) {
1184 DEBUG(10, ("lookup_groupmem: lsa_lookup_sids could "
1185 "not map any SIDs at all.\n"));
1186 /* Don't handle this as an error here.
1187 * There is nothing left to do with respect to the
1188 * overall result... */
1190 else if (!NT_STATUS_IS_OK(status
)) {
1191 DEBUG(10, ("lookup_groupmem: Error looking up %d "
1192 "sids via rpc_lsa_lookup_sids: %s\n",
1193 (int)num_members
, nt_errstr(status
)));
1198 status
= NT_STATUS_OK
;
1199 DEBUG(3,("ads lookup_groupmem for sid=%s succeeded\n",
1200 sid_string_dbg(group_sid
)));
1204 TALLOC_FREE(tmp_ctx
);
1209 /* find the sequence number for a domain */
1210 static NTSTATUS
sequence_number(struct winbindd_domain
*domain
, uint32
*seq
)
1212 ADS_STRUCT
*ads
= NULL
;
1215 DEBUG(3,("ads: fetch sequence_number for %s\n", domain
->name
));
1217 if ( !winbindd_can_contact_domain( domain
) ) {
1218 DEBUG(10,("sequence: No incoming trust for domain %s\n",
1221 return NT_STATUS_OK
;
1224 *seq
= DOM_SEQUENCE_NONE
;
1226 ads
= ads_cached_connection(domain
);
1229 domain
->last_status
= NT_STATUS_SERVER_DISABLED
;
1230 return NT_STATUS_UNSUCCESSFUL
;
1233 rc
= ads_USN(ads
, seq
);
1235 if (!ADS_ERR_OK(rc
)) {
1237 /* its a dead connection, destroy it */
1239 if (domain
->private_data
) {
1240 ads
= (ADS_STRUCT
*)domain
->private_data
;
1241 ads
->is_mine
= True
;
1243 ads_kdestroy("MEMORY:winbind_ccache");
1244 domain
->private_data
= NULL
;
1247 return ads_ntstatus(rc
);
1250 /* find the lockout policy of a domain - use rpc methods */
1251 static NTSTATUS
lockout_policy(struct winbindd_domain
*domain
,
1252 TALLOC_CTX
*mem_ctx
,
1253 struct samr_DomInfo12
*policy
)
1255 return reconnect_methods
.lockout_policy(domain
, mem_ctx
, policy
);
1258 /* find the password policy of a domain - use rpc methods */
1259 static NTSTATUS
password_policy(struct winbindd_domain
*domain
,
1260 TALLOC_CTX
*mem_ctx
,
1261 struct samr_DomInfo1
*policy
)
1263 return reconnect_methods
.password_policy(domain
, mem_ctx
, policy
);
1266 /* get a list of trusted domains */
1267 static NTSTATUS
trusted_domains(struct winbindd_domain
*domain
,
1268 TALLOC_CTX
*mem_ctx
,
1269 uint32
*num_domains
,
1274 NTSTATUS result
= NT_STATUS_UNSUCCESSFUL
;
1275 struct netr_DomainTrustList trusts
;
1278 struct rpc_pipe_client
*cli
;
1279 uint32 fr_flags
= (NETR_TRUST_FLAG_IN_FOREST
| NETR_TRUST_FLAG_TREEROOT
);
1282 DEBUG(3,("ads: trusted_domains\n"));
1289 /* If this is our primary domain or a root in our forest,
1290 query for all trusts. If not, then just look for domain
1291 trusts in the target forest */
1293 if ( domain
->primary
||
1294 ((domain
->domain_flags
&fr_flags
) == fr_flags
) )
1296 flags
= NETR_TRUST_FLAG_OUTBOUND
|
1297 NETR_TRUST_FLAG_INBOUND
|
1298 NETR_TRUST_FLAG_IN_FOREST
;
1300 flags
= NETR_TRUST_FLAG_IN_FOREST
;
1303 result
= cm_connect_netlogon(domain
, &cli
);
1305 if (!NT_STATUS_IS_OK(result
)) {
1306 DEBUG(5, ("trusted_domains: Could not open a connection to %s "
1307 "for PIPE_NETLOGON (%s)\n",
1308 domain
->name
, nt_errstr(result
)));
1309 return NT_STATUS_UNSUCCESSFUL
;
1312 result
= rpccli_netr_DsrEnumerateDomainTrusts(cli
, mem_ctx
,
1317 if ( NT_STATUS_IS_OK(result
) && trusts
.count
) {
1319 /* Allocate memory for trusted domain names and sids */
1321 if ( !(*names
= TALLOC_ARRAY(mem_ctx
, char *, trusts
.count
)) ) {
1322 DEBUG(0, ("trusted_domains: out of memory\n"));
1323 return NT_STATUS_NO_MEMORY
;
1326 if ( !(*alt_names
= TALLOC_ARRAY(mem_ctx
, char *, trusts
.count
)) ) {
1327 DEBUG(0, ("trusted_domains: out of memory\n"));
1328 return NT_STATUS_NO_MEMORY
;
1331 if ( !(*dom_sids
= TALLOC_ARRAY(mem_ctx
, DOM_SID
, trusts
.count
)) ) {
1332 DEBUG(0, ("trusted_domains: out of memory\n"));
1333 return NT_STATUS_NO_MEMORY
;
1336 /* Copy across names and sids */
1340 for (i
= 0; i
< trusts
.count
; i
++) {
1341 struct winbindd_domain d
;
1345 /* drop external trusts if this is not our primary
1346 domain. This means that the returned number of
1347 domains may be less that the ones actually trusted
1350 if ( (trusts
.array
[i
].trust_attributes
== NETR_TRUST_ATTRIBUTE_QUARANTINED_DOMAIN
) &&
1353 DEBUG(10,("trusted_domains: Skipping external trusted domain "
1354 "%s because it is outside of our primary domain\n",
1355 trusts
.array
[i
].netbios_name
));
1359 (*names
)[ret_count
] = CONST_DISCARD(char *, trusts
.array
[i
].netbios_name
);
1360 (*alt_names
)[ret_count
] = CONST_DISCARD(char *, trusts
.array
[i
].dns_name
);
1361 if (trusts
.array
[i
].sid
) {
1362 sid_copy(&(*dom_sids
)[ret_count
], trusts
.array
[i
].sid
);
1364 sid_copy(&(*dom_sids
)[ret_count
], &global_sid_NULL
);
1367 /* add to the trusted domain cache */
1369 fstrcpy( d
.name
, trusts
.array
[i
].netbios_name
);
1370 fstrcpy( d
.alt_name
, trusts
.array
[i
].dns_name
);
1371 if (trusts
.array
[i
].sid
) {
1372 sid_copy( &d
.sid
, trusts
.array
[i
].sid
);
1374 sid_copy(&d
.sid
, &global_sid_NULL
);
1377 if ( domain
->primary
) {
1378 DEBUG(10,("trusted_domains(ads): Searching "
1379 "trusted domain list of %s and storing "
1380 "trust flags for domain %s\n",
1381 domain
->name
, d
.alt_name
));
1383 d
.domain_flags
= trusts
.array
[i
].trust_flags
;
1384 d
.domain_type
= trusts
.array
[i
].trust_type
;
1385 d
.domain_trust_attribs
= trusts
.array
[i
].trust_attributes
;
1387 wcache_tdc_add_domain( &d
);
1389 } else if ( (domain
->domain_flags
&fr_flags
) == fr_flags
) {
1390 /* Check if we already have this record. If
1391 * we are following our forest root that is not
1392 * our primary domain, we want to keep trust
1393 * flags from the perspective of our primary
1394 * domain not our forest root. */
1395 struct winbindd_tdc_domain
*exist
= NULL
;
1398 wcache_tdc_fetch_domain(NULL
, trusts
.array
[i
].netbios_name
);
1400 DEBUG(10,("trusted_domains(ads): Searching "
1401 "trusted domain list of %s and storing "
1402 "trust flags for domain %s\n",
1403 domain
->name
, d
.alt_name
));
1404 d
.domain_flags
= trusts
.array
[i
].trust_flags
;
1405 d
.domain_type
= trusts
.array
[i
].trust_type
;
1406 d
.domain_trust_attribs
= trusts
.array
[i
].trust_attributes
;
1408 wcache_tdc_add_domain( &d
);
1413 /* This gets a little tricky. If we are
1414 following a transitive forest trust, then
1415 innerit the flags, type, and attribs from
1416 the domain we queried to make sure we don't
1417 record the view of the trust from the wrong
1418 side. Always view it from the side of our
1419 primary domain. --jerry */
1420 struct winbindd_tdc_domain
*parent
= NULL
;
1422 DEBUG(10,("trusted_domains(ads): Searching "
1423 "trusted domain list of %s and inheriting "
1424 "trust flags for domain %s\n",
1425 domain
->name
, d
.alt_name
));
1427 parent
= wcache_tdc_fetch_domain(NULL
, domain
->name
);
1429 d
.domain_flags
= parent
->trust_flags
;
1430 d
.domain_type
= parent
->trust_type
;
1431 d
.domain_trust_attribs
= parent
->trust_attribs
;
1433 d
.domain_flags
= domain
->domain_flags
;
1434 d
.domain_type
= domain
->domain_type
;
1435 d
.domain_trust_attribs
= domain
->domain_trust_attribs
;
1437 TALLOC_FREE(parent
);
1439 wcache_tdc_add_domain( &d
);
1444 *num_domains
= ret_count
;
1450 /* the ADS backend methods are exposed via this structure */
1451 struct winbindd_methods ads_methods
= {