2 Unix SMB/CIFS implementation.
4 kpasswd Server implementation
6 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2005
7 Copyright (C) Andrew Tridgell 2005
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "dsdb/samdb/samdb.h"
25 #include "../lib/util/util_ldb.h"
26 #include "libcli/security/security.h"
27 #include "dsdb/common/util.h"
28 #include "auth/auth.h"
29 #include "kdc/kpasswd_glue.h"
32 A user password change
34 Return true if there is a valid error packet (or success) formed in
37 NTSTATUS
samdb_kpasswd_change_password(TALLOC_CTX
*mem_ctx
,
38 struct loadparm_context
*lp_ctx
,
39 struct tevent_context
*event_ctx
,
40 struct ldb_context
*samdb
,
41 struct auth_session_info
*session_info
,
42 const DATA_BLOB
*password
,
43 enum samPwdChangeReason
*reject_reason
,
44 struct samr_DomInfo1
**dominfo
,
45 const char **error_string
,
48 struct samr_Password
*oldLmHash
, *oldNtHash
;
49 const char * const attrs
[] = { "dBCSPwd", "unicodePwd", NULL
};
50 struct ldb_message
*msg
;
54 /* Fetch the old hashes to get the old password in order to perform
55 * the password change operation. Naturally it would be much better to
56 * have a password hash from an authentication around but this doesn't
57 * seem to be the case here. */
58 ret
= dsdb_search_one(samdb
, mem_ctx
, &msg
, ldb_get_default_basedn(samdb
),
61 DSDB_SEARCH_NO_GLOBAL_CATALOG
,
62 "(&(objectClass=user)(sAMAccountName=%s))",
63 session_info
->info
->account_name
);
64 if (ret
!= LDB_SUCCESS
) {
65 *error_string
= "No such user when changing password";
66 return NT_STATUS_NO_SUCH_USER
;
70 * No need to check for password lockout here, the KDC will
71 * have done that when issuing the ticket, which is not based
72 * on the user's password
74 status
= samdb_result_passwords_no_lockout(mem_ctx
, lp_ctx
, msg
,
75 &oldLmHash
, &oldNtHash
);
76 if (!NT_STATUS_IS_OK(status
)) {
77 *error_string
= "Not permitted to change password";
78 return NT_STATUS_ACCESS_DENIED
;
81 /* Start a SAM with user privileges for the password change */
82 samdb
= samdb_connect(mem_ctx
,
89 *error_string
= "Failed to open samdb";
90 return NT_STATUS_ACCESS_DENIED
;
93 DEBUG(3, ("Changing password of %s\\%s (%s)\n",
94 session_info
->info
->domain_name
,
95 session_info
->info
->account_name
,
96 dom_sid_string(mem_ctx
, &session_info
->security_token
->sids
[PRIMARY_USER_SID_INDEX
])));
98 /* Performs the password change */
99 status
= samdb_set_password_sid(samdb
,
101 &session_info
->security_token
->sids
[PRIMARY_USER_SID_INDEX
],
107 oldNtHash
, /* this is a user password change */
110 if (!NT_STATUS_IS_OK(status
)) {
111 *error_string
= nt_errstr(status
);