2 Unix SMB/CIFS implementation.
4 Copyright Matthieu Patou <mat@matws.net> 2010-2011
5 Copyright Stefan Metzmacher 2011
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
17 You should have received a copy of the GNU General Public License
18 along with this program. If not, see <http://www.gnu.org/licenses/>.
22 #include "librpc/gen_ndr/dfsblobs.h"
23 #include "librpc/gen_ndr/ndr_dfsblobs.h"
24 #include "dsdb/samdb/samdb.h"
25 #include "auth/session.h"
26 #include "param/param.h"
27 #include "lib/tsocket/tsocket.h"
28 #include "dfs_server/dfs_server_ad.h"
30 #define MAX_DFS_RESPONSE 56*1024 /* 56 Kb */
32 /* A DC set is a group of DC, they might have been grouped together
33 because they belong to the same site, or to site with same cost ...
41 fill a referral type structure
43 static NTSTATUS
fill_normal_dfs_referraltype(TALLOC_CTX
*mem_ctx
,
44 struct dfs_referral_type
*ref
,
47 const char *server_path
, int isfirstoffset
)
54 /* For the moment there is a bug with XP that don't seems to appriciate much
55 * level4 so we return just level 3 for everyone
57 ref
->referral
.v4
.server_type
= DFS_SERVER_NON_ROOT
;
58 /* "normal" referral seems to always include the GUID */
59 ref
->referral
.v4
.size
= 34;
62 ref
->referral
.v4
.entry_flags
= DFS_HEADER_FLAG_TARGET_BCK
;
64 ref
->referral
.v4
.ttl
= 900; /* As w2k8r2 */
65 ref
->referral
.v4
.referrals
.r1
.DFS_path
= talloc_strdup(mem_ctx
, dfs_path
);
66 if (ref
->referral
.v4
.referrals
.r1
.DFS_path
== NULL
) {
67 return NT_STATUS_NO_MEMORY
;
69 ref
->referral
.v4
.referrals
.r1
.DFS_alt_path
= talloc_strdup(mem_ctx
, dfs_path
);
70 if (ref
->referral
.v4
.referrals
.r1
.DFS_alt_path
== NULL
) {
71 return NT_STATUS_NO_MEMORY
;
73 ref
->referral
.v4
.referrals
.r1
.netw_address
= talloc_strdup(mem_ctx
, server_path
);
74 if (ref
->referral
.v4
.referrals
.r1
.netw_address
== NULL
) {
75 return NT_STATUS_NO_MEMORY
;
80 ref
->version
= version
;
81 ref
->referral
.v3
.server_type
= DFS_SERVER_NON_ROOT
;
82 /* "normal" referral seems to always include the GUID */
83 ref
->referral
.v3
.size
= 34;
85 ref
->referral
.v3
.entry_flags
= 0;
86 ref
->referral
.v3
.ttl
= 600; /* As w2k3 */
87 ref
->referral
.v3
.referrals
.r1
.DFS_path
= talloc_strdup(mem_ctx
, dfs_path
);
88 if (ref
->referral
.v3
.referrals
.r1
.DFS_path
== NULL
) {
89 return NT_STATUS_NO_MEMORY
;
91 ref
->referral
.v3
.referrals
.r1
.DFS_alt_path
= talloc_strdup(mem_ctx
, dfs_path
);
92 if (ref
->referral
.v3
.referrals
.r1
.DFS_alt_path
== NULL
) {
93 return NT_STATUS_NO_MEMORY
;
95 ref
->referral
.v3
.referrals
.r1
.netw_address
= talloc_strdup(mem_ctx
, server_path
);
96 if (ref
->referral
.v3
.referrals
.r1
.netw_address
== NULL
) {
97 return NT_STATUS_NO_MEMORY
;
101 return NT_STATUS_INVALID_LEVEL
;
105 fill a domain refererral
107 static NTSTATUS
fill_domain_dfs_referraltype(TALLOC_CTX
*mem_ctx
,
108 struct dfs_referral_type
*ref
,
117 DEBUG(8, ("Called fill_domain_dfs_referraltype\n"));
118 ref
->version
= version
;
119 ref
->referral
.v3
.server_type
= DFS_SERVER_NON_ROOT
;
121 * It's hard coded ... don't think it's a good way but the
122 * sizeof return not the correct values
124 * We have 18 if the GUID is not included 34 otherwise
127 /* Windows return without the guid when returning domain list
129 ref
->referral
.v3
.size
= 18;
131 ref
->referral
.v3
.size
= 34;
133 ref
->referral
.v3
.entry_flags
= DFS_FLAG_REFERRAL_DOMAIN_RESP
;
134 ref
->referral
.v3
.ttl
= 600; /* As w2k3 */
135 ref
->referral
.v3
.referrals
.r2
.special_name
= talloc_strdup(mem_ctx
,
137 if (ref
->referral
.v3
.referrals
.r2
.special_name
== NULL
) {
138 return NT_STATUS_NO_MEMORY
;
140 ref
->referral
.v3
.referrals
.r2
.nb_expanded_names
= numnames
;
141 /* Put the final terminator */
144 const char **names2
= talloc_array(mem_ctx
, const char *,
146 NT_STATUS_HAVE_NO_MEMORY(names2
);
147 for (i
= 0; i
<numnames
; i
++) {
148 names2
[i
] = talloc_asprintf(names2
, "\\%s", names
[i
]);
149 NT_STATUS_HAVE_NO_MEMORY(names2
[i
]);
151 names2
[numnames
] = NULL
;
152 ref
->referral
.v3
.referrals
.r2
.expanded_names
= names2
;
156 return NT_STATUS_INVALID_LEVEL
;
160 get the DCs list within a site
162 static NTSTATUS
get_dcs_insite(TALLOC_CTX
*ctx
, struct ldb_context
*ldb
,
163 struct ldb_dn
*sitedn
, struct dc_set
*list
,
166 static const char *attrs
[] = { "serverReference", NULL
};
167 static const char *attrs2
[] = { "dNSHostName", "sAMAccountName", NULL
};
168 struct ldb_result
*r
;
171 const char **dc_list
;
173 ret
= ldb_search(ldb
, ctx
, &r
, sitedn
, LDB_SCOPE_SUBTREE
, attrs
,
174 "(&(objectClass=server)(serverReference=*))");
175 if (ret
!= LDB_SUCCESS
) {
176 DEBUG(2,(__location__
": Failed to get list of servers - %s\n",
177 ldb_errstring(ldb
)));
178 return NT_STATUS_INTERNAL_ERROR
;
182 /* none in this site */
188 * need to search for all server object to know the size of the array.
189 * Search all the object of class server in this site
191 dc_list
= talloc_array(r
, const char *, r
->count
);
192 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(dc_list
, r
);
194 /* TODO put some random here in the order */
195 list
->names
= talloc_realloc(list
, list
->names
, const char *, list
->count
+ r
->count
);
196 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(list
->names
, r
);
198 for (i
= 0; i
<r
->count
; i
++) {
200 struct ldb_result
*r2
;
202 dn
= ldb_msg_find_attr_as_dn(ldb
, ctx
, r
->msgs
[i
], "serverReference");
204 return NT_STATUS_INTERNAL_ERROR
;
207 ret
= ldb_search(ldb
, r
, &r2
, dn
, LDB_SCOPE_BASE
, attrs2
, "(objectClass=computer)");
208 if (ret
!= LDB_SUCCESS
) {
209 DEBUG(2,(__location__
": Search for computer on %s failed - %s\n",
210 ldb_dn_get_linearized(dn
), ldb_errstring(ldb
)));
211 return NT_STATUS_INTERNAL_ERROR
;
215 const char *dns
= ldb_msg_find_attr_as_string(r2
->msgs
[0], "dNSHostName", NULL
);
217 DEBUG(2,(__location__
": dNSHostName missing on %s\n",
218 ldb_dn_get_linearized(dn
)));
220 return NT_STATUS_INTERNAL_ERROR
;
223 list
->names
[list
->count
] = talloc_strdup(list
->names
, dns
);
224 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(list
->names
[list
->count
], r
);
227 const char *acct
= ldb_msg_find_attr_as_string(r2
->msgs
[0], "sAMAccountName", NULL
);
229 DEBUG(2,(__location__
": sAMAccountName missing on %s\n",
230 ldb_dn_get_linearized(dn
)));
232 return NT_STATUS_INTERNAL_ERROR
;
235 tmp
= talloc_strdup(list
->names
, acct
);
236 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(tmp
, r
);
238 /* Netbios name is also the sAMAccountName for
239 computer but without the final $ */
240 tmp
[strlen(tmp
) - 1] = '\0';
241 list
->names
[list
->count
] = tmp
;
255 static NTSTATUS
get_dcs(TALLOC_CTX
*ctx
, struct ldb_context
*ldb
,
256 const char *searched_site
, bool need_fqdn
,
257 struct dc_set
***pset_list
, uint32_t flags
)
260 * Flags will be used later to indicate things like least-expensive
261 * or same-site options
263 const char *attrs_none
[] = { NULL
};
264 const char *attrs3
[] = { "name", NULL
};
265 struct ldb_dn
*configdn
, *sitedn
, *dn
, *sitescontainerdn
;
266 struct ldb_result
*r
;
267 struct dc_set
**set_list
= NULL
;
270 uint32_t current_pos
= 0;
272 TALLOC_CTX
*subctx
= talloc_new(ctx
);
274 *pset_list
= set_list
= NULL
;
276 subctx
= talloc_new(ctx
);
277 NT_STATUS_HAVE_NO_MEMORY(subctx
);
279 configdn
= ldb_get_config_basedn(ldb
);
281 /* Let's search for the Site container */
282 ret
= ldb_search(ldb
, subctx
, &r
, configdn
, LDB_SCOPE_SUBTREE
, attrs_none
,
283 "(objectClass=sitesContainer)");
284 if (ret
!= LDB_SUCCESS
) {
285 DEBUG(2,(__location__
": Failed to find sitesContainer within %s - %s\n",
286 ldb_dn_get_linearized(configdn
), ldb_errstring(ldb
)));
288 return NT_STATUS_INTERNAL_ERROR
;
291 DEBUG(2,(__location__
": Expected 1 sitesContainer - found %u within %s\n",
292 r
->count
, ldb_dn_get_linearized(configdn
)));
294 return NT_STATUS_INTERNAL_ERROR
;
297 sitescontainerdn
= talloc_steal(subctx
, r
->msgs
[0]->dn
);
301 * TODO: Here we should have a more subtle handling
302 * for the case "same-site"
304 ret
= ldb_search(ldb
, subctx
, &r
, sitescontainerdn
, LDB_SCOPE_SUBTREE
,
305 attrs_none
, "(objectClass=server)");
306 if (ret
!= LDB_SUCCESS
) {
307 DEBUG(2,(__location__
": Failed to find servers within %s - %s\n",
308 ldb_dn_get_linearized(sitescontainerdn
), ldb_errstring(ldb
)));
310 return NT_STATUS_INTERNAL_ERROR
;
314 if (searched_site
!= NULL
&& searched_site
[0] != '\0') {
315 ret
= ldb_search(ldb
, subctx
, &r
, configdn
, LDB_SCOPE_SUBTREE
,
316 attrs_none
, "(&(name=%s)(objectClass=site))", searched_site
);
317 if (ret
!= LDB_SUCCESS
) {
319 return NT_STATUS_FOOBAR
;
320 } else if (r
->count
!= 1) {
322 return NT_STATUS_FOOBAR
;
325 /* All of this was to get the DN of the searched_site */
326 sitedn
= r
->msgs
[0]->dn
;
328 set_list
= talloc_realloc(subctx
, set_list
, struct dc_set
*, current_pos
+1);
329 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(set_list
, subctx
);
331 set_list
[current_pos
] = talloc(set_list
, struct dc_set
);
332 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(set_list
[current_pos
], subctx
);
334 set_list
[current_pos
]->names
= NULL
;
335 set_list
[current_pos
]->count
= 0;
336 status
= get_dcs_insite(subctx
, ldb
, sitedn
,
337 set_list
[current_pos
], need_fqdn
);
338 if (!NT_STATUS_IS_OK(status
)) {
339 DEBUG(2,(__location__
": Failed to get DC from site %s - %s\n",
340 ldb_dn_get_linearized(sitedn
), nt_errstr(status
)));
348 /* Let's find all the sites */
349 ret
= ldb_search(ldb
, subctx
, &r
, configdn
, LDB_SCOPE_SUBTREE
, attrs3
, "(objectClass=site)");
350 if (ret
!= LDB_SUCCESS
) {
351 DEBUG(2,(__location__
": Failed to find any site containers in %s\n",
352 ldb_dn_get_linearized(configdn
)));
354 return NT_STATUS_INTERNAL_DB_CORRUPTION
;
359 * We should randomize the order in the main site,
360 * it's mostly needed for sysvol/netlogon referral.
361 * Depending of flag we either randomize order of the
362 * not "in the same site DCs"
363 * or we randomize by group of site that have the same cost
364 * In the long run we want to manipulate an array of site_set
365 * All the site in one set have the same cost (if least-expansive options is selected)
366 * and we will put all the dc related to 1 site set into 1 DCs set.
367 * Within a site set, site order has to be randomized
369 * But for the moment we just return the list of sites
373 * We will realloc + 2 because we will need one additional place
374 * for element at current_pos + 1 for the NULL element
376 set_list
= talloc_realloc(subctx
, set_list
, struct dc_set
*,
378 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(set_list
, subctx
);
380 set_list
[current_pos
] = talloc(ctx
, struct dc_set
);
381 NT_STATUS_HAVE_NO_MEMORY_AND_FREE(set_list
[current_pos
], subctx
);
383 set_list
[current_pos
]->names
= NULL
;
384 set_list
[current_pos
]->count
= 0;
386 set_list
[current_pos
+1] = NULL
;
389 for (i
=0; i
<r
->count
; i
++) {
390 const char *site_name
= ldb_msg_find_attr_as_string(r
->msgs
[i
], "name", NULL
);
391 if (site_name
== NULL
) {
392 DEBUG(2,(__location__
": Failed to find name attribute in %s\n",
393 ldb_dn_get_linearized(r
->msgs
[i
]->dn
)));
395 return NT_STATUS_INTERNAL_DB_CORRUPTION
;
398 if (searched_site
== NULL
||
399 strcmp(searched_site
, site_name
) != 0) {
400 DEBUG(2,(__location__
": Site: %s %s\n",
401 searched_site
, site_name
));
404 * Do all the site but the one of the client
405 * (because it has already been done ...)
409 status
= get_dcs_insite(subctx
, ldb
, dn
,
410 set_list
[current_pos
],
412 if (!NT_STATUS_IS_OK(status
)) {
419 set_list
[current_pos
] = NULL
;
421 *pset_list
= talloc_move(ctx
, &set_list
);
426 static NTSTATUS
dodomain_referral(struct loadparm_context
*lp_ctx
,
427 struct ldb_context
*sam_ctx
,
428 const struct tsocket_address
*client
,
429 struct dfs_GetDFSReferral
*r
)
432 * TODO for the moment we just return the local domain
435 const char *dns_domain
= lpcfg_dnsdomain(lp_ctx
);
436 const char *netbios_domain
= lpcfg_workgroup(lp_ctx
);
437 struct dfs_referral_type
*referrals
;
438 const char *referral_str
;
439 /* In the future this needs to be fetched from the ldb */
440 uint32_t found_domain
= 2;
442 if (lpcfg_server_role(lp_ctx
) != ROLE_DOMAIN_CONTROLLER
) {
443 DEBUG(10 ,("Received a domain referral request on a non DC\n"));
444 return NT_STATUS_INVALID_PARAMETER
;
447 if (r
->in
.req
.max_referral_level
< 3) {
448 DEBUG(2,("invalid max_referral_level %u\n",
449 r
->in
.req
.max_referral_level
));
450 return NT_STATUS_UNSUCCESSFUL
;
453 r
->out
.resp
= talloc_zero(r
, struct dfs_referral_resp
);
454 if (r
->out
.resp
== NULL
) {
455 return NT_STATUS_NO_MEMORY
;
458 r
->out
.resp
->path_consumed
= 0;
459 r
->out
.resp
->header_flags
= 0; /* Do like w2k3 */
460 r
->out
.resp
->nb_referrals
= found_domain
; /* the fqdn one + the NT domain */
462 referrals
= talloc_zero_array(r
->out
.resp
,
463 struct dfs_referral_type
,
464 r
->out
.resp
->nb_referrals
);
465 if (referrals
== NULL
) {
466 return NT_STATUS_NO_MEMORY
;
468 r
->out
.resp
->referral_entries
= referrals
;
470 referral_str
= talloc_asprintf(r
, "\\%s", netbios_domain
);
471 if (referral_str
== NULL
) {
472 return NT_STATUS_NO_MEMORY
;
475 status
= fill_domain_dfs_referraltype(referrals
,
479 if (!NT_STATUS_IS_OK(status
)) {
480 DEBUG(2,("%s: Unable to fill domain referral structure - %s\n",
481 __location__
, nt_errstr(status
)));
485 referral_str
= talloc_asprintf(r
, "\\%s", dns_domain
);
486 if (referral_str
== NULL
) {
487 return NT_STATUS_NO_MEMORY
;
490 status
= fill_domain_dfs_referraltype(referrals
,
494 if (!NT_STATUS_IS_OK(status
)) {
495 DEBUG(2,("%s: Unable to fill domain referral structure - %s\n",
496 __location__
, nt_errstr(status
)));
504 * Handle the logic for dfs referral request like
505 * \\dns_domain or \\netbios_domain.
507 static NTSTATUS
dodc_referral(struct loadparm_context
*lp_ctx
,
508 struct ldb_context
*sam_ctx
,
509 const struct tsocket_address
*client
,
510 struct dfs_GetDFSReferral
*r
,
511 const char *domain_name
)
514 const char *site_name
= NULL
; /* Name of the site where the client is */
515 bool need_fqdn
= false;
517 const char **dc_list
= NULL
;
518 uint32_t num_dcs
= 0;
520 char *client_str
= NULL
;
521 struct dfs_referral_type
*referrals
;
522 const char *referral_str
;
524 if (lpcfg_server_role(lp_ctx
) != ROLE_DOMAIN_CONTROLLER
) {
525 return NT_STATUS_INVALID_PARAMETER
;
528 if (r
->in
.req
.max_referral_level
< 3) {
529 DEBUG(2,("invalid max_referral_level %u\n",
530 r
->in
.req
.max_referral_level
));
531 return NT_STATUS_UNSUCCESSFUL
;
534 DEBUG(10, ("in this we have request for %s requested is %s\n",
535 domain_name
, r
->in
.req
.servername
));
537 if (strchr(domain_name
,'.')) {
541 if (tsocket_address_is_inet(client
, "ip")) {
542 client_str
= tsocket_address_inet_addr_string(client
, r
);
543 if (client_str
== NULL
) {
544 return NT_STATUS_NO_MEMORY
;
548 site_name
= samdb_client_site_name(sam_ctx
, r
, client_str
, NULL
);
550 status
= get_dcs(r
, sam_ctx
, site_name
, need_fqdn
, &set
, 0);
551 if (!NT_STATUS_IS_OK(status
)) {
552 DEBUG(3,("Unable to get list of DCs - %s\n",
557 for(i
=0; set
[i
]; i
++) {
560 dc_list
= talloc_realloc(r
, dc_list
, const char*,
561 num_dcs
+ set
[i
]->count
+ 1);
562 if (dc_list
== NULL
) {
563 return NT_STATUS_NO_MEMORY
;
566 for(j
=0; j
<set
[i
]->count
; j
++) {
567 dc_list
[num_dcs
+ j
] = talloc_move(dc_list
,
570 num_dcs
= num_dcs
+ set
[i
]->count
;
572 dc_list
[num_dcs
] = NULL
;
575 r
->out
.resp
= talloc_zero(r
, struct dfs_referral_resp
);
576 if (r
->out
.resp
== NULL
) {
577 return NT_STATUS_NO_MEMORY
;
580 r
->out
.resp
->path_consumed
= 0;
581 r
->out
.resp
->header_flags
= 0; /* Do like w2k3 */
582 r
->out
.resp
->nb_referrals
= 1;
584 referrals
= talloc_zero_array(r
->out
.resp
,
585 struct dfs_referral_type
,
586 r
->out
.resp
->nb_referrals
);
587 if (referrals
== NULL
) {
588 return NT_STATUS_NO_MEMORY
;
590 r
->out
.resp
->referral_entries
= referrals
;
592 if (r
->in
.req
.servername
[0] == '\\') {
593 referral_str
= talloc_asprintf(referrals
, "%s",
596 referral_str
= talloc_asprintf(referrals
, "\\%s",
599 if (referral_str
== NULL
) {
600 return NT_STATUS_NO_MEMORY
;
603 status
= fill_domain_dfs_referraltype(referrals
,
607 if (!NT_STATUS_IS_OK(status
)) {
608 DEBUG(2,("%s: Unable to fill domain referral structure - %s\n",
609 __location__
, nt_errstr(status
)));
617 * Handle the logic for dfs referral request like
618 * \\domain\sysvol or \\domain\netlogon
620 static NTSTATUS
dosysvol_referral(struct loadparm_context
*lp_ctx
,
621 struct ldb_context
*sam_ctx
,
622 const struct tsocket_address
*client
,
623 struct dfs_GetDFSReferral
*r
,
624 const char *domain_name
,
625 const char *dfs_name
)
627 const char *site_name
= NULL
; /* Name of the site where the client is */
628 bool need_fqdn
= false;
629 unsigned int i
, c
= 0, nb_entries
= 0;
631 char *client_str
= NULL
;
633 struct dfs_referral_type
*referrals
;
635 if (lpcfg_server_role(lp_ctx
) != ROLE_DOMAIN_CONTROLLER
) {
636 return NT_STATUS_INVALID_PARAMETER
;
639 if (r
->in
.req
.max_referral_level
< 3) {
640 DEBUG(2,("invalid max_referral_level %u\n",
641 r
->in
.req
.max_referral_level
));
642 return NT_STATUS_UNSUCCESSFUL
;
645 DEBUG(10, ("in this we have request for %s and share %s requested is %s\n",
646 domain_name
, dfs_name
, r
->in
.req
.servername
));
648 if (strchr(domain_name
,'.')) {
652 if (tsocket_address_is_inet(client
, "ip")) {
653 client_str
= tsocket_address_inet_addr_string(client
, r
);
654 if (client_str
== NULL
) {
655 return NT_STATUS_NO_MEMORY
;
659 site_name
= samdb_client_site_name(sam_ctx
, r
, client_str
, NULL
);
661 status
= get_dcs(r
, sam_ctx
, site_name
, need_fqdn
, &set
, 0);
662 if (!NT_STATUS_IS_OK(status
)) {
663 DEBUG(3,("Unable to get list of DCs - %s\n",
668 for(i
=0; set
[i
]; i
++) {
669 nb_entries
= nb_entries
+ set
[i
]->count
;
672 r
->out
.resp
= talloc_zero(r
, struct dfs_referral_resp
);
673 if (r
->out
.resp
== NULL
) {
674 return NT_STATUS_NO_MEMORY
;
677 /* The length is expected in bytes */
678 r
->out
.resp
->path_consumed
= strlen_m(r
->in
.req
.servername
) * 2;
679 /* Do like w2k3 and like in 3.3.5.3 of MS-DFSC*/
680 r
->out
.resp
->header_flags
= DFS_HEADER_FLAG_STORAGE_SVR
;
681 r
->out
.resp
->nb_referrals
= nb_entries
;
683 referrals
= talloc_zero_array(r
->out
.resp
,
684 struct dfs_referral_type
,
685 r
->out
.resp
->nb_referrals
);
686 if (referrals
== NULL
) {
687 return NT_STATUS_NO_MEMORY
;
689 r
->out
.resp
->referral_entries
= referrals
;
692 for(i
=0; set
[i
]; i
++) {
695 for(j
=0; j
< set
[i
]->count
; j
++) {
696 struct dfs_referral_type
*ref
= &referrals
[c
];
697 const char *referral_str
;
699 referral_str
= talloc_asprintf(referrals
, "\\%s\\%s",
700 set
[i
]->names
[j
], dfs_name
);
701 if (referral_str
== NULL
) {
702 return NT_STATUS_NO_MEMORY
;
705 DEBUG(8,("Doing a dfs referral for %s with this value "
707 set
[i
]->names
[j
], referral_str
,
708 r
->in
.req
.servername
));
710 status
= fill_normal_dfs_referraltype(referrals
, ref
,
711 r
->in
.req
.max_referral_level
,
712 r
->in
.req
.servername
,
716 if (!NT_STATUS_IS_OK(status
)) {
717 DEBUG(2,("%s: Unable to fill domain referral "
719 __location__
, nt_errstr(status
)));
731 trans2 getdfsreferral implementation
733 NTSTATUS
dfs_server_ad_get_referrals(struct loadparm_context
*lp_ctx
,
734 struct ldb_context
*sam_ctx
,
735 const struct tsocket_address
*client
,
736 struct dfs_GetDFSReferral
*r
)
738 char *server_name
= NULL
;
739 char *dfs_name
= NULL
;
740 char *link_path
= NULL
;
741 const char *netbios_domain
;
742 const char *dns_domain
;
743 const char *netbios_name
;
744 const char *dns_name
;
746 if (!lpcfg_host_msdfs(lp_ctx
)) {
747 return NT_STATUS_FS_DRIVER_REQUIRED
;
750 if (r
->in
.req
.servername
== NULL
) {
751 return NT_STATUS_INVALID_PARAMETER
;
754 DEBUG(8, ("Requested DFS name: %s length: %u\n",
755 r
->in
.req
.servername
,
756 (unsigned int)strlen_m(r
->in
.req
.servername
)*2));
759 * If the servername is "" then we are in a case of domain dfs
760 * and the client just searches for the list of local domain
761 * it is attached and also trusted ones.
763 if (strlen(r
->in
.req
.servername
) == 0) {
764 return dodomain_referral(lp_ctx
, sam_ctx
, client
, r
);
767 server_name
= talloc_strdup(r
, r
->in
.req
.servername
);
768 if (server_name
== NULL
) {
769 return NT_STATUS_NO_MEMORY
;
772 while(*server_name
&& *server_name
== '\\') {
776 dfs_name
= strchr(server_name
, '\\');
777 if (dfs_name
!= NULL
) {
781 link_path
= strchr(dfs_name
, '\\');
782 if (link_path
!= NULL
) {
788 if (link_path
!= NULL
) {
790 * If it is a DFS Link we do not
793 return NT_STATUS_NOT_FOUND
;
796 netbios_domain
= lpcfg_workgroup(lp_ctx
);
797 dns_domain
= lpcfg_dnsdomain(lp_ctx
);
798 netbios_name
= lpcfg_netbios_name(lp_ctx
);
799 dns_name
= talloc_asprintf(r
, "%s.%s", netbios_name
, dns_domain
);
800 if (dns_name
== NULL
) {
801 return NT_STATUS_NO_MEMORY
;
804 if ((strcasecmp_m(server_name
, netbios_name
) == 0) ||
805 (strcasecmp_m(server_name
, dns_name
) == 0)) {
807 * If it is not domain related do not
810 return NT_STATUS_NOT_FOUND
;
814 if ((strcasecmp_m(server_name
, netbios_domain
) != 0) &&
815 (strcasecmp_m(server_name
, dns_domain
) != 0)) {
817 * Not a domain we handle.
819 return NT_STATUS_INVALID_PARAMETER
;
823 * Here we have filtered the thing the requested name don't contain our DNS name.
824 * So if the share == NULL or if share in ("sysvol", "netlogon")
825 * then we proceed. In the first case it will be a dc refereal in the second it will
826 * be just a sysvol/netlogon referral.
828 if (dfs_name
== NULL
) {
829 return dodc_referral(lp_ctx
, sam_ctx
,
830 client
, r
, server_name
);
834 * Here we have filtered the thing the requested name don't contain our DNS name.
835 * So if the share == NULL or if share in ("sysvol", "netlogon")
836 * then we proceed. In the first case it will be a dc refereal in the second it will
837 * be just a sysvol/netlogon referral.
839 if (strcasecmp(dfs_name
, "sysvol") == 0 ||
840 strcasecmp(dfs_name
, "netlogon") == 0) {
841 return dosysvol_referral(lp_ctx
, sam_ctx
, client
, r
,
842 server_name
, dfs_name
);
845 /* By default until all the case are handled */
846 return NT_STATUS_NOT_FOUND
;