2 * Unix SMB/CIFS implementation.
3 * Helper routines for net
4 * Copyright (C) Volker Lendecke 2006
5 * Copyright (C) Kai Blin 2008
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 3 of the License, or
10 * (at your option) any later version.
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, see <http://www.gnu.org/licenses/>.
23 #include "utils/net.h"
24 #include "libsmb/namequery.h"
25 #include "rpc_client/cli_pipe.h"
26 #include "../librpc/gen_ndr/ndr_lsa_c.h"
27 #include "rpc_client/cli_lsarpc.h"
28 #include "../librpc/gen_ndr/ndr_dssetup_c.h"
30 #include "../libcli/security/security.h"
31 #include "libsmb/libsmb.h"
32 #include "lib/param/param.h"
33 #include "auth/gensec/gensec.h"
34 #include "libcli/auth/netlogon_creds_cli.h"
35 #include "lib/cmdline/cmdline.h"
37 NTSTATUS
net_rpc_lookup_name(struct net_context
*c
,
38 TALLOC_CTX
*mem_ctx
, struct cli_state
*cli
,
39 const char *name
, const char **ret_domain
,
40 const char **ret_name
, struct dom_sid
*ret_sid
,
41 enum lsa_SidType
*ret_type
)
43 struct rpc_pipe_client
*lsa_pipe
= NULL
;
44 struct policy_handle pol
;
45 NTSTATUS status
, result
;
46 const char **dom_names
;
48 enum lsa_SidType
*types
;
49 struct dcerpc_binding_handle
*b
;
53 status
= cli_rpc_pipe_open_noauth(cli
, &ndr_table_lsarpc
,
55 if (!NT_STATUS_IS_OK(status
)) {
56 d_fprintf(stderr
, _("Could not initialise lsa pipe\n"));
60 b
= lsa_pipe
->binding_handle
;
62 status
= rpccli_lsa_open_policy(lsa_pipe
, mem_ctx
, false,
63 SEC_FLAG_MAXIMUM_ALLOWED
,
65 if (!NT_STATUS_IS_OK(status
)) {
66 d_fprintf(stderr
, "open_policy %s: %s\n", _("failed"),
71 status
= rpccli_lsa_lookup_names(lsa_pipe
, mem_ctx
, &pol
, 1,
72 &name
, &dom_names
, 1, &sids
, &types
);
74 if (!NT_STATUS_IS_OK(status
)) {
75 /* This can happen easily, don't log an error */
79 if (ret_domain
!= NULL
) {
80 *ret_domain
= dom_names
[0];
82 if (ret_name
!= NULL
) {
83 *ret_name
= talloc_strdup(mem_ctx
, name
);
85 if (ret_sid
!= NULL
) {
86 sid_copy(ret_sid
, &sids
[0]);
88 if (ret_type
!= NULL
) {
93 if (is_valid_policy_hnd(&pol
)) {
94 dcerpc_lsa_Close(b
, mem_ctx
, &pol
, &result
);
96 TALLOC_FREE(lsa_pipe
);
101 /****************************************************************************
102 Connect to \\server\service.
103 ****************************************************************************/
105 NTSTATUS
connect_to_service(struct net_context
*c
,
106 struct cli_state
**cli_ctx
,
107 const struct sockaddr_storage
*server_ss
,
108 const char *server_name
,
109 const char *service_name
,
110 const char *service_type
)
115 if (strequal(service_type
, "IPC")) {
116 flags
|= CLI_FULL_CONNECTION_IPC
;
119 nt_status
= cli_full_connection_creds(cli_ctx
, NULL
, server_name
,
120 server_ss
, c
->opt_port
,
121 service_name
, service_type
,
124 if (!NT_STATUS_IS_OK(nt_status
)) {
125 d_fprintf(stderr
, _("Could not connect to server %s\n"),
128 /* Display a nicer message depending on the result */
130 if (NT_STATUS_V(nt_status
) ==
131 NT_STATUS_V(NT_STATUS_LOGON_FAILURE
))
133 _("The username or password was not "
136 if (NT_STATUS_V(nt_status
) ==
137 NT_STATUS_V(NT_STATUS_ACCOUNT_LOCKED_OUT
))
138 d_fprintf(stderr
, _("The account was locked out.\n"));
140 if (NT_STATUS_V(nt_status
) ==
141 NT_STATUS_V(NT_STATUS_ACCOUNT_DISABLED
))
142 d_fprintf(stderr
, _("The account was disabled.\n"));
149 /****************************************************************************
150 Connect to \\server\ipc$.
151 ****************************************************************************/
153 NTSTATUS
connect_to_ipc(struct net_context
*c
,
154 struct cli_state
**cli_ctx
,
155 const struct sockaddr_storage
*server_ss
,
156 const char *server_name
)
158 return connect_to_service(c
, cli_ctx
, server_ss
, server_name
, "IPC$",
162 /****************************************************************************
163 Connect to \\server\ipc$ anonymously.
164 ****************************************************************************/
166 NTSTATUS
connect_to_ipc_anonymous(struct net_context
*c
,
167 struct cli_state
**cli_ctx
,
168 const struct sockaddr_storage
*server_ss
,
169 const char *server_name
)
172 struct cli_credentials
*anon_creds
= NULL
;
174 anon_creds
= cli_credentials_init_anon(c
);
175 if (anon_creds
== NULL
) {
176 DBG_ERR("cli_credentials_init_anon() failed\n");
177 return NT_STATUS_NO_MEMORY
;
180 nt_status
= cli_full_connection_creds(cli_ctx
, c
->opt_requester_name
,
181 server_name
, server_ss
, c
->opt_port
,
184 CLI_FULL_CONNECTION_IPC
);
186 if (NT_STATUS_IS_OK(nt_status
)) {
189 DEBUG(1,("Cannot connect to server (anonymously). Error was %s\n", nt_errstr(nt_status
)));
195 * Connect a server and open a given pipe
197 * @param cli_dst A cli_state
198 * @param pipe The pipe to open
199 * @param got_pipe boolean that stores if we got a pipe
201 * @return Normal NTSTATUS return.
203 NTSTATUS
connect_dst_pipe(struct net_context
*c
, struct cli_state
**cli_dst
,
204 struct rpc_pipe_client
**pp_pipe_hnd
,
205 const struct ndr_interface_table
*table
)
208 char *server_name
= SMB_STRDUP("127.0.0.1");
209 struct cli_state
*cli_tmp
= NULL
;
210 struct rpc_pipe_client
*pipe_hnd
= NULL
;
212 if (server_name
== NULL
) {
213 return NT_STATUS_NO_MEMORY
;
216 if (c
->opt_destination
) {
217 SAFE_FREE(server_name
);
218 if ((server_name
= SMB_STRDUP(c
->opt_destination
)) == NULL
) {
219 return NT_STATUS_NO_MEMORY
;
223 /* make a connection to a named pipe */
224 nt_status
= connect_to_ipc(c
, &cli_tmp
, NULL
, server_name
);
225 if (!NT_STATUS_IS_OK(nt_status
)) {
226 SAFE_FREE(server_name
);
230 nt_status
= cli_rpc_pipe_open_noauth(cli_tmp
, table
,
232 if (!NT_STATUS_IS_OK(nt_status
)) {
233 DEBUG(0, ("couldn't not initialize pipe\n"));
234 cli_shutdown(cli_tmp
);
235 SAFE_FREE(server_name
);
240 *pp_pipe_hnd
= pipe_hnd
;
241 SAFE_FREE(server_name
);
246 /****************************************************************************
247 Use the local machine account (krb) and password for this session.
248 ****************************************************************************/
250 int net_use_krb_machine_account(struct net_context
*c
)
252 char *user_name
= NULL
;
254 if (!secrets_init()) {
255 d_fprintf(stderr
,_("ERROR: Unable to open secrets database\n"));
259 c
->opt_password
= secrets_fetch_machine_password(
260 c
->opt_target_workgroup
, NULL
, NULL
);
261 if (asprintf(&user_name
, "%s$@%s", lp_netbios_name(), lp_realm()) == -1) {
264 c
->opt_user_name
= user_name
;
265 c
->opt_user_specified
= true;
267 cli_credentials_set_machine_account(c
->creds
, c
->lp_ctx
);
271 bool net_find_server(struct net_context
*c
,
274 struct sockaddr_storage
*server_ss
,
277 const char *d
= domain
? domain
: c
->opt_target_workgroup
;
280 *server_name
= SMB_STRDUP(c
->opt_host
);
283 if (c
->opt_have_ip
) {
284 *server_ss
= c
->opt_dest_ip
;
286 char addr
[INET6_ADDRSTRLEN
];
287 print_sockaddr(addr
, sizeof(addr
), &c
->opt_dest_ip
);
288 *server_name
= SMB_STRDUP(addr
);
290 } else if (*server_name
) {
291 /* resolve the IP address */
292 if (!resolve_name(*server_name
, server_ss
, 0x20, false)) {
293 DEBUG(1,("Unable to resolve server name\n"));
296 } else if (flags
& NET_FLAGS_PDC
) {
298 struct sockaddr_storage pdc_ss
;
300 if (!get_pdc_ip(d
, &pdc_ss
)) {
301 DEBUG(1,("Unable to resolve PDC server address\n"));
305 if (is_zero_addr(&pdc_ss
)) {
309 if (!name_status_find(d
, 0x1b, 0x20, &pdc_ss
, dc_name
)) {
313 *server_name
= SMB_STRDUP(dc_name
);
315 } else if (flags
& NET_FLAGS_DMB
) {
316 struct sockaddr_storage msbrow_ss
;
317 char addr
[INET6_ADDRSTRLEN
];
319 /* if (!resolve_name(MSBROWSE, &msbrow_ip, 1, false)) */
320 if (!resolve_name(d
, &msbrow_ss
, 0x1B, false)) {
321 DEBUG(1,("Unable to resolve domain browser via name lookup\n"));
324 *server_ss
= msbrow_ss
;
325 print_sockaddr(addr
, sizeof(addr
), server_ss
);
326 *server_name
= SMB_STRDUP(addr
);
327 } else if (flags
& NET_FLAGS_MASTER
) {
328 struct sockaddr_storage brow_ss
;
329 char addr
[INET6_ADDRSTRLEN
];
330 if (!resolve_name(d
, &brow_ss
, 0x1D, false)) {
331 /* go looking for workgroups */
332 DEBUG(1,("Unable to resolve master browser via name lookup\n"));
335 *server_ss
= brow_ss
;
336 print_sockaddr(addr
, sizeof(addr
), server_ss
);
337 *server_name
= SMB_STRDUP(addr
);
338 } else if (!(flags
& NET_FLAGS_LOCALHOST_DEFAULT_INSANE
)) {
339 if (!interpret_string_addr(server_ss
,
340 "127.0.0.1", AI_NUMERICHOST
)) {
341 DEBUG(1,("Unable to resolve 127.0.0.1\n"));
344 *server_name
= SMB_STRDUP("127.0.0.1");
348 DEBUG(1,("no server to connect to\n"));
355 bool net_find_pdc(struct sockaddr_storage
*server_ss
,
357 const char *domain_name
)
359 if (!get_pdc_ip(domain_name
, server_ss
)) {
362 if (is_zero_addr(server_ss
)) {
366 if (!name_status_find(domain_name
, 0x1b, 0x20, server_ss
, server_name
)) {
373 NTSTATUS
net_make_ipc_connection(struct net_context
*c
, unsigned flags
,
374 struct cli_state
**pcli
)
376 return net_make_ipc_connection_ex(c
, c
->opt_workgroup
, NULL
, NULL
, flags
, pcli
);
379 NTSTATUS
net_make_ipc_connection_ex(struct net_context
*c
,const char *domain
,
381 const struct sockaddr_storage
*pss
,
382 unsigned flags
, struct cli_state
**pcli
)
384 char *server_name
= NULL
;
385 struct sockaddr_storage server_ss
;
386 struct cli_state
*cli
= NULL
;
389 if ( !server
|| !pss
) {
390 if (!net_find_server(c
, domain
, flags
, &server_ss
,
392 d_fprintf(stderr
, _("Unable to find a suitable server "
393 "for domain %s\n"), domain
);
394 nt_status
= NT_STATUS_UNSUCCESSFUL
;
398 server_name
= SMB_STRDUP( server
);
402 if (flags
& NET_FLAGS_ANONYMOUS
) {
403 nt_status
= connect_to_ipc_anonymous(c
, &cli
, &server_ss
,
406 nt_status
= connect_to_ipc(c
, &cli
, &server_ss
,
410 /* store the server in the affinity cache if it was a PDC */
412 if ( (flags
& NET_FLAGS_PDC
) && NT_STATUS_IS_OK(nt_status
) )
413 saf_store(cli
->server_domain
, server_name
);
415 SAFE_FREE(server_name
);
416 if (!NT_STATUS_IS_OK(nt_status
)) {
417 d_fprintf(stderr
, _("Connection failed: %s\n"),
418 nt_errstr(nt_status
));
420 } else if (c
->opt_request_timeout
) {
421 cli_set_timeout(cli
, c
->opt_request_timeout
* 1000);
431 /****************************************************************************
432 ****************************************************************************/
434 /* TODO FIXME: Pass cli_creds via net_context and get rid of this function. */
435 const char *net_prompt_pass(struct net_context
*c
, const char *user
)
437 struct cli_credentials
*creds
= samba_cmdline_get_creds();
439 if (c
->opt_password
== NULL
) {
440 c
->opt_password
= cli_credentials_get_password(creds
);
443 return c
->opt_password
;
446 int net_run_function(struct net_context
*c
, int argc
, const char **argv
,
447 const char *whoami
, struct functable
*table
)
452 for (i
=0; table
[i
].funcname
!= NULL
; i
++) {
453 if (strcasecmp_m(argv
[0], table
[i
].funcname
) == 0)
454 return table
[i
].fn(c
, argc
-1, argv
+1);
458 if (c
->display_usage
== false) {
459 d_fprintf(stderr
, _("Invalid command: %s %s\n"), whoami
,
460 (argc
> 0)?argv
[0]:"");
462 d_printf(_("Usage:\n"));
463 for (i
=0; table
[i
].funcname
!= NULL
; i
++) {
464 if(c
->display_usage
== false)
465 d_printf("%s %-15s %s\n", whoami
, table
[i
].funcname
,
466 _(table
[i
].description
));
468 d_printf("%s\n", _(table
[i
].usage
));
471 return c
->display_usage
?0:-1;
474 void net_display_usage_from_functable(struct functable
*table
)
477 for (i
=0; table
[i
].funcname
!= NULL
; i
++) {
478 d_printf("%s\n", _(table
[i
].usage
));
482 void net_warn_member_options(void)
484 TALLOC_CTX
*frame
= talloc_stackframe();
485 struct loadparm_context
*lp_ctx
= NULL
;
487 lp_ctx
= loadparm_init_s3(frame
, loadparm_s3_helpers());
488 if (lp_ctx
!= NULL
) {
489 netlogon_creds_cli_warn_options(lp_ctx
);
495 const char *net_share_type_str(int num_type
)
498 case 0: return _("Disk");
499 case 1: return _("Print");
500 case 2: return _("Dev");
501 case 3: return _("IPC");
502 default: return _("Unknown");
506 static NTSTATUS
net_scan_dc_noad(struct net_context
*c
,
507 struct cli_state
*cli
,
508 struct net_dc_info
*dc_info
)
510 TALLOC_CTX
*mem_ctx
= talloc_tos();
511 struct rpc_pipe_client
*pipe_hnd
= NULL
;
512 struct dcerpc_binding_handle
*b
;
513 NTSTATUS status
, result
;
514 struct policy_handle pol
;
515 union lsa_PolicyInformation
*info
;
517 ZERO_STRUCTP(dc_info
);
520 status
= cli_rpc_pipe_open_noauth(cli
, &ndr_table_lsarpc
,
522 if (!NT_STATUS_IS_OK(status
)) {
526 b
= pipe_hnd
->binding_handle
;
528 status
= dcerpc_lsa_open_policy(b
, mem_ctx
,
530 SEC_FLAG_MAXIMUM_ALLOWED
,
533 if (!NT_STATUS_IS_OK(status
)) {
536 if (!NT_STATUS_IS_OK(result
)) {
541 status
= dcerpc_lsa_QueryInfoPolicy(b
, mem_ctx
,
543 LSA_POLICY_INFO_ACCOUNT_DOMAIN
,
546 if (!NT_STATUS_IS_OK(status
)) {
549 if (!NT_STATUS_IS_OK(result
)) {
554 dc_info
->netbios_domain_name
= talloc_strdup(mem_ctx
, info
->account_domain
.name
.string
);
555 if (dc_info
->netbios_domain_name
== NULL
) {
556 status
= NT_STATUS_NO_MEMORY
;
561 if (is_valid_policy_hnd(&pol
)) {
562 dcerpc_lsa_Close(b
, mem_ctx
, &pol
, &result
);
565 TALLOC_FREE(pipe_hnd
);
570 NTSTATUS
net_scan_dc(struct net_context
*c
,
571 struct cli_state
*cli
,
572 struct net_dc_info
*dc_info
)
574 TALLOC_CTX
*mem_ctx
= talloc_tos();
575 struct rpc_pipe_client
*dssetup_pipe
= NULL
;
576 struct dcerpc_binding_handle
*dssetup_handle
= NULL
;
577 union dssetup_DsRoleInfo info
;
581 ZERO_STRUCTP(dc_info
);
583 status
= cli_rpc_pipe_open_noauth(cli
, &ndr_table_dssetup
,
585 if (!NT_STATUS_IS_OK(status
)) {
586 DEBUG(10,("net_scan_dc: failed to open dssetup pipe with %s, "
587 "retrying with lsa pipe\n", nt_errstr(status
)));
588 return net_scan_dc_noad(c
, cli
, dc_info
);
590 dssetup_handle
= dssetup_pipe
->binding_handle
;
592 status
= dcerpc_dssetup_DsRoleGetPrimaryDomainInformation(dssetup_handle
, mem_ctx
,
593 DS_ROLE_BASIC_INFORMATION
,
596 TALLOC_FREE(dssetup_pipe
);
598 if (NT_STATUS_IS_OK(status
)) {
599 status
= werror_to_ntstatus(werr
);
601 if (!NT_STATUS_IS_OK(status
)) {
605 dc_info
->is_dc
= (info
.basic
.role
& (DS_ROLE_PRIMARY_DC
|DS_ROLE_BACKUP_DC
));
606 dc_info
->is_pdc
= (info
.basic
.role
& DS_ROLE_PRIMARY_DC
);
607 dc_info
->is_ad
= (info
.basic
.flags
& DS_ROLE_PRIMARY_DS_RUNNING
);
608 dc_info
->is_mixed_mode
= (info
.basic
.flags
& DS_ROLE_PRIMARY_DS_MIXED_MODE
);
609 dc_info
->netbios_domain_name
= talloc_strdup(mem_ctx
, info
.basic
.domain
);
610 dc_info
->dns_domain_name
= talloc_strdup(mem_ctx
, info
.basic
.dns_domain
);
611 dc_info
->forest_name
= talloc_strdup(mem_ctx
, info
.basic
.forest
);