2 Samba Unix/Linux SMB client library
3 Distributed SMB/CIFS Server Management Utility
4 Copyright (C) 2006 Volker Lendecke (vl@samba.org)
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>. */
20 #include "utils/net.h"
23 * Do something with the account policies. Read them all, run a function on
24 * them and possibly write them back. "fn" has to return the container index
25 * it has modified, it can return 0 for no change.
28 static NTSTATUS
rpc_sh_acct_do(TALLOC_CTX
*mem_ctx
,
29 struct rpc_sh_ctx
*ctx
,
30 struct rpc_pipe_client
*pipe_hnd
,
31 int argc
, const char **argv
,
32 int (*fn
)(TALLOC_CTX
*mem_ctx
,
33 struct rpc_sh_ctx
*ctx
,
34 struct samr_DomInfo1
*i1
,
35 struct samr_DomInfo3
*i3
,
36 struct samr_DomInfo12
*i12
,
37 int argc
, const char **argv
))
39 POLICY_HND connect_pol
, domain_pol
;
40 NTSTATUS result
= NT_STATUS_UNSUCCESSFUL
;
41 union samr_DomainInfo
*info1
= NULL
;
42 union samr_DomainInfo
*info3
= NULL
;
43 union samr_DomainInfo
*info12
= NULL
;
46 ZERO_STRUCT(connect_pol
);
47 ZERO_STRUCT(domain_pol
);
49 /* Get sam policy handle */
51 result
= rpccli_samr_Connect2(pipe_hnd
, mem_ctx
,
53 MAXIMUM_ALLOWED_ACCESS
,
55 if (!NT_STATUS_IS_OK(result
)) {
59 /* Get domain policy handle */
61 result
= rpccli_samr_OpenDomain(pipe_hnd
, mem_ctx
,
63 MAXIMUM_ALLOWED_ACCESS
,
66 if (!NT_STATUS_IS_OK(result
)) {
70 result
= rpccli_samr_QueryDomainInfo(pipe_hnd
, mem_ctx
,
75 if (!NT_STATUS_IS_OK(result
)) {
76 d_fprintf(stderr
, "query_domain_info level 1 failed: %s\n",
81 result
= rpccli_samr_QueryDomainInfo(pipe_hnd
, mem_ctx
,
86 if (!NT_STATUS_IS_OK(result
)) {
87 d_fprintf(stderr
, "query_domain_info level 3 failed: %s\n",
92 result
= rpccli_samr_QueryDomainInfo(pipe_hnd
, mem_ctx
,
97 if (!NT_STATUS_IS_OK(result
)) {
98 d_fprintf(stderr
, "query_domain_info level 12 failed: %s\n",
103 store
= fn(mem_ctx
, ctx
, &info1
->info1
, &info3
->info3
,
104 &info12
->info12
, argc
, argv
);
107 /* Don't save anything */
113 result
= rpccli_samr_SetDomainInfo(pipe_hnd
, mem_ctx
,
119 result
= rpccli_samr_SetDomainInfo(pipe_hnd
, mem_ctx
,
125 result
= rpccli_samr_SetDomainInfo(pipe_hnd
, mem_ctx
,
131 d_fprintf(stderr
, "Got unexpected info level %d\n", store
);
132 result
= NT_STATUS_INTERNAL_ERROR
;
137 if (is_valid_policy_hnd(&domain_pol
)) {
138 rpccli_samr_Close(pipe_hnd
, mem_ctx
, &domain_pol
);
140 if (is_valid_policy_hnd(&connect_pol
)) {
141 rpccli_samr_Close(pipe_hnd
, mem_ctx
, &connect_pol
);
147 static int account_show(TALLOC_CTX
*mem_ctx
, struct rpc_sh_ctx
*ctx
,
148 struct samr_DomInfo1
*i1
,
149 struct samr_DomInfo3
*i3
,
150 struct samr_DomInfo12
*i12
,
151 int argc
, const char **argv
)
154 d_fprintf(stderr
, "usage: %s\n", ctx
->whoami
);
158 d_printf("Minimum password length: %d\n", i1
->min_password_length
);
159 d_printf("Password history length: %d\n", i1
->password_history_length
);
161 d_printf("Minimum password age: ");
162 if (!nt_time_is_zero((NTTIME
*)&i1
->min_password_age
)) {
163 time_t t
= nt_time_to_unix_abs((NTTIME
*)&i1
->min_password_age
);
164 d_printf("%d seconds\n", (int)t
);
166 d_printf("not set\n");
169 d_printf("Maximum password age: ");
170 if (nt_time_is_set((NTTIME
*)&i1
->max_password_age
)) {
171 time_t t
= nt_time_to_unix_abs((NTTIME
*)&i1
->max_password_age
);
172 d_printf("%d seconds\n", (int)t
);
174 d_printf("not set\n");
177 d_printf("Bad logon attempts: %d\n", i12
->lockout_threshold
);
179 if (i12
->lockout_threshold
!= 0) {
181 d_printf("Account lockout duration: ");
182 if (nt_time_is_set(&i12
->lockout_duration
)) {
183 time_t t
= nt_time_to_unix_abs(&i12
->lockout_duration
);
184 d_printf("%d seconds\n", (int)t
);
186 d_printf("not set\n");
189 d_printf("Bad password count reset after: ");
190 if (nt_time_is_set(&i12
->lockout_window
)) {
191 time_t t
= nt_time_to_unix_abs(&i12
->lockout_window
);
192 d_printf("%d seconds\n", (int)t
);
194 d_printf("not set\n");
198 d_printf("Disconnect users when logon hours expire: %s\n",
199 nt_time_is_zero(&i3
->force_logoff_time
) ? "yes" : "no");
201 d_printf("User must logon to change password: %s\n",
202 (i1
->password_properties
& 0x2) ? "yes" : "no");
204 return 0; /* Don't save */
207 static NTSTATUS
rpc_sh_acct_pol_show(TALLOC_CTX
*mem_ctx
,
208 struct rpc_sh_ctx
*ctx
,
209 struct rpc_pipe_client
*pipe_hnd
,
210 int argc
, const char **argv
) {
211 return rpc_sh_acct_do(mem_ctx
, ctx
, pipe_hnd
, argc
, argv
,
215 static int account_set_badpw(TALLOC_CTX
*mem_ctx
, struct rpc_sh_ctx
*ctx
,
216 struct samr_DomInfo1
*i1
,
217 struct samr_DomInfo3
*i3
,
218 struct samr_DomInfo12
*i12
,
219 int argc
, const char **argv
)
222 d_fprintf(stderr
, "usage: %s <count>\n", ctx
->whoami
);
226 i12
->lockout_threshold
= atoi(argv
[0]);
227 d_printf("Setting bad password count to %d\n",
228 i12
->lockout_threshold
);
233 static NTSTATUS
rpc_sh_acct_set_badpw(TALLOC_CTX
*mem_ctx
,
234 struct rpc_sh_ctx
*ctx
,
235 struct rpc_pipe_client
*pipe_hnd
,
236 int argc
, const char **argv
)
238 return rpc_sh_acct_do(mem_ctx
, ctx
, pipe_hnd
, argc
, argv
,
242 static int account_set_lockduration(TALLOC_CTX
*mem_ctx
,
243 struct rpc_sh_ctx
*ctx
,
244 struct samr_DomInfo1
*i1
,
245 struct samr_DomInfo3
*i3
,
246 struct samr_DomInfo12
*i12
,
247 int argc
, const char **argv
)
250 d_fprintf(stderr
, "usage: %s <count>\n", ctx
->whoami
);
254 unix_to_nt_time_abs(&i12
->lockout_duration
, atoi(argv
[0]));
255 d_printf("Setting lockout duration to %d seconds\n",
256 (int)nt_time_to_unix_abs(&i12
->lockout_duration
));
261 static NTSTATUS
rpc_sh_acct_set_lockduration(TALLOC_CTX
*mem_ctx
,
262 struct rpc_sh_ctx
*ctx
,
263 struct rpc_pipe_client
*pipe_hnd
,
264 int argc
, const char **argv
)
266 return rpc_sh_acct_do(mem_ctx
, ctx
, pipe_hnd
, argc
, argv
,
267 account_set_lockduration
);
270 static int account_set_resetduration(TALLOC_CTX
*mem_ctx
,
271 struct rpc_sh_ctx
*ctx
,
272 struct samr_DomInfo1
*i1
,
273 struct samr_DomInfo3
*i3
,
274 struct samr_DomInfo12
*i12
,
275 int argc
, const char **argv
)
278 d_fprintf(stderr
, "usage: %s <count>\n", ctx
->whoami
);
282 unix_to_nt_time_abs(&i12
->lockout_window
, atoi(argv
[0]));
283 d_printf("Setting bad password reset duration to %d seconds\n",
284 (int)nt_time_to_unix_abs(&i12
->lockout_window
));
289 static NTSTATUS
rpc_sh_acct_set_resetduration(TALLOC_CTX
*mem_ctx
,
290 struct rpc_sh_ctx
*ctx
,
291 struct rpc_pipe_client
*pipe_hnd
,
292 int argc
, const char **argv
)
294 return rpc_sh_acct_do(mem_ctx
, ctx
, pipe_hnd
, argc
, argv
,
295 account_set_resetduration
);
298 static int account_set_minpwage(TALLOC_CTX
*mem_ctx
,
299 struct rpc_sh_ctx
*ctx
,
300 struct samr_DomInfo1
*i1
,
301 struct samr_DomInfo3
*i3
,
302 struct samr_DomInfo12
*i12
,
303 int argc
, const char **argv
)
306 d_fprintf(stderr
, "usage: %s <count>\n", ctx
->whoami
);
310 unix_to_nt_time_abs((NTTIME
*)&i1
->min_password_age
, atoi(argv
[0]));
311 d_printf("Setting minimum password age to %d seconds\n",
312 (int)nt_time_to_unix_abs((NTTIME
*)&i1
->min_password_age
));
317 static NTSTATUS
rpc_sh_acct_set_minpwage(TALLOC_CTX
*mem_ctx
,
318 struct rpc_sh_ctx
*ctx
,
319 struct rpc_pipe_client
*pipe_hnd
,
320 int argc
, const char **argv
)
322 return rpc_sh_acct_do(mem_ctx
, ctx
, pipe_hnd
, argc
, argv
,
323 account_set_minpwage
);
326 static int account_set_maxpwage(TALLOC_CTX
*mem_ctx
,
327 struct rpc_sh_ctx
*ctx
,
328 struct samr_DomInfo1
*i1
,
329 struct samr_DomInfo3
*i3
,
330 struct samr_DomInfo12
*i12
,
331 int argc
, const char **argv
)
334 d_fprintf(stderr
, "usage: %s <count>\n", ctx
->whoami
);
338 unix_to_nt_time_abs((NTTIME
*)&i1
->max_password_age
, atoi(argv
[0]));
339 d_printf("Setting maximum password age to %d seconds\n",
340 (int)nt_time_to_unix_abs((NTTIME
*)&i1
->max_password_age
));
345 static NTSTATUS
rpc_sh_acct_set_maxpwage(TALLOC_CTX
*mem_ctx
,
346 struct rpc_sh_ctx
*ctx
,
347 struct rpc_pipe_client
*pipe_hnd
,
348 int argc
, const char **argv
)
350 return rpc_sh_acct_do(mem_ctx
, ctx
, pipe_hnd
, argc
, argv
,
351 account_set_maxpwage
);
354 static int account_set_minpwlen(TALLOC_CTX
*mem_ctx
,
355 struct rpc_sh_ctx
*ctx
,
356 struct samr_DomInfo1
*i1
,
357 struct samr_DomInfo3
*i3
,
358 struct samr_DomInfo12
*i12
,
359 int argc
, const char **argv
)
362 d_fprintf(stderr
, "usage: %s <count>\n", ctx
->whoami
);
366 i1
->min_password_length
= atoi(argv
[0]);
367 d_printf("Setting minimum password length to %d\n",
368 i1
->min_password_length
);
373 static NTSTATUS
rpc_sh_acct_set_minpwlen(TALLOC_CTX
*mem_ctx
,
374 struct rpc_sh_ctx
*ctx
,
375 struct rpc_pipe_client
*pipe_hnd
,
376 int argc
, const char **argv
)
378 return rpc_sh_acct_do(mem_ctx
, ctx
, pipe_hnd
, argc
, argv
,
379 account_set_minpwlen
);
382 static int account_set_pwhistlen(TALLOC_CTX
*mem_ctx
,
383 struct rpc_sh_ctx
*ctx
,
384 struct samr_DomInfo1
*i1
,
385 struct samr_DomInfo3
*i3
,
386 struct samr_DomInfo12
*i12
,
387 int argc
, const char **argv
)
390 d_fprintf(stderr
, "usage: %s <count>\n", ctx
->whoami
);
394 i1
->password_history_length
= atoi(argv
[0]);
395 d_printf("Setting password history length to %d\n",
396 i1
->password_history_length
);
401 static NTSTATUS
rpc_sh_acct_set_pwhistlen(TALLOC_CTX
*mem_ctx
,
402 struct rpc_sh_ctx
*ctx
,
403 struct rpc_pipe_client
*pipe_hnd
,
404 int argc
, const char **argv
)
406 return rpc_sh_acct_do(mem_ctx
, ctx
, pipe_hnd
, argc
, argv
,
407 account_set_pwhistlen
);
410 struct rpc_sh_cmd
*net_rpc_acct_cmds(TALLOC_CTX
*mem_ctx
,
411 struct rpc_sh_ctx
*ctx
)
413 static struct rpc_sh_cmd cmds
[9] = {
414 { "show", NULL
, PI_SAMR
, rpc_sh_acct_pol_show
,
415 "Show current account policy settings" },
416 { "badpw", NULL
, PI_SAMR
, rpc_sh_acct_set_badpw
,
417 "Set bad password count before lockout" },
418 { "lockduration", NULL
, PI_SAMR
, rpc_sh_acct_set_lockduration
,
419 "Set account lockout duration" },
420 { "resetduration", NULL
, PI_SAMR
,
421 rpc_sh_acct_set_resetduration
,
422 "Set bad password count reset duration" },
423 { "minpwage", NULL
, PI_SAMR
, rpc_sh_acct_set_minpwage
,
424 "Set minimum password age" },
425 { "maxpwage", NULL
, PI_SAMR
, rpc_sh_acct_set_maxpwage
,
426 "Set maximum password age" },
427 { "minpwlen", NULL
, PI_SAMR
, rpc_sh_acct_set_minpwlen
,
428 "Set minimum password length" },
429 { "pwhistlen", NULL
, PI_SAMR
, rpc_sh_acct_set_pwhistlen
,
430 "Set the password history length" },
431 { NULL
, NULL
, 0, NULL
, NULL
}