Attempt to correctly find python on host sunx
[Samba/gebeck_regimport.git] / source4 / nbt_server / irpc.c
blob8f1f74afcf2bfe1d391c077fb78d8ac7e60b7eb7
1 /*
2 Unix SMB/CIFS implementation.
4 irpc services for the NBT server
6 Copyright (C) Andrew Tridgell 2005
7 Copyright (C) Volker Lendecke 2005
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "includes.h"
24 #include "smbd/service_task.h"
25 #include "smbd/service.h"
26 #include "nbt_server/nbt_server.h"
27 #include "nbt_server/wins/winsserver.h"
28 #include "librpc/gen_ndr/ndr_irpc.h"
29 #include "lib/socket/socket.h"
30 #include "libcli/resolve/resolve.h"
31 #include "librpc/gen_ndr/ndr_nbt.h"
34 serve out the nbt statistics
36 static NTSTATUS nbtd_information(struct irpc_message *msg,
37 struct nbtd_information *r)
39 struct nbtd_server *server = talloc_get_type(msg->private, struct nbtd_server);
41 switch (r->in.level) {
42 case NBTD_INFO_STATISTICS:
43 r->out.info.stats = &server->stats;
44 break;
47 return NT_STATUS_OK;
52 winbind needs to be able to do a getdc request, but most (all?) windows
53 servers always send the reply to port 138, regardless of the request
54 port. To cope with this we use a irpc request to the NBT server
55 which has port 138 open, and thus can receive the replies
57 struct getdc_state {
58 struct irpc_message *msg;
59 struct nbtd_getdcname *req;
62 static void getdc_recv_netlogon_reply(struct dgram_mailslot_handler *dgmslot,
63 struct nbt_dgram_packet *packet,
64 struct socket_address *src)
66 struct getdc_state *s =
67 talloc_get_type(dgmslot->private, struct getdc_state);
68 const char *p;
69 struct nbt_netlogon_response netlogon;
70 NTSTATUS status;
72 status = dgram_mailslot_netlogon_parse_response(dgmslot, packet, packet,
73 &netlogon);
74 if (!NT_STATUS_IS_OK(status)) {
75 DEBUG(5, ("dgram_mailslot_ntlogon_parse failed: %s\n",
76 nt_errstr(status)));
77 goto done;
80 /* We asked for version 1 only */
81 if (netlogon.response_type == NETLOGON_SAMLOGON
82 && netlogon.samlogon.ntver != NETLOGON_NT_VERSION_1) {
83 status = NT_STATUS_INVALID_NETWORK_RESPONSE;
84 goto done;
87 p = netlogon.samlogon.nt4.server;
89 DEBUG(10, ("NTLOGON_SAM_LOGON_REPLY: server: %s, user: %s, "
90 "domain: %s\n", p, netlogon.samlogon.nt4.user_name,
91 netlogon.samlogon.nt4.domain));
93 if (*p == '\\') p += 1;
94 if (*p == '\\') p += 1;
96 s->req->out.dcname = talloc_strdup(s->req, p);
97 if (s->req->out.dcname == NULL) {
98 DEBUG(0, ("talloc failed\n"));
99 status = NT_STATUS_NO_MEMORY;
100 goto done;
103 status = NT_STATUS_OK;
105 done:
106 irpc_send_reply(s->msg, status);
109 static NTSTATUS nbtd_getdcname(struct irpc_message *msg,
110 struct nbtd_getdcname *req)
112 struct nbtd_server *server =
113 talloc_get_type(msg->private, struct nbtd_server);
114 struct nbtd_interface *iface = nbtd_find_request_iface(server, req->in.ip_address, true);
115 struct getdc_state *s;
116 struct nbt_netlogon_packet p;
117 struct NETLOGON_SAM_LOGON_REQUEST *r;
118 struct nbt_name src, dst;
119 struct socket_address *dest;
120 struct dgram_mailslot_handler *handler;
121 NTSTATUS status = NT_STATUS_UNSUCCESSFUL;
123 DEBUG(0, ("nbtd_getdcname called\n"));
125 s = talloc(msg, struct getdc_state);
126 NT_STATUS_HAVE_NO_MEMORY(s);
128 s->msg = msg;
129 s->req = req;
131 handler = dgram_mailslot_temp(iface->dgmsock, NBT_MAILSLOT_GETDC,
132 getdc_recv_netlogon_reply, s);
133 NT_STATUS_HAVE_NO_MEMORY(handler);
135 ZERO_STRUCT(p);
136 p.command = LOGON_SAM_LOGON_REQUEST;
137 r = &p.req.logon;
138 r->request_count = 0;
139 r->computer_name = req->in.my_computername;
140 r->user_name = req->in.my_accountname;
141 r->mailslot_name = handler->mailslot_name;
142 r->acct_control = req->in.account_control;
143 r->sid = *req->in.domain_sid;
144 r->nt_version = NETLOGON_NT_VERSION_1;
145 r->lmnt_token = 0xffff;
146 r->lm20_token = 0xffff;
148 make_nbt_name_client(&src, req->in.my_computername);
149 make_nbt_name(&dst, req->in.domainname, 0x1c);
151 dest = socket_address_from_strings(msg, iface->dgmsock->sock->backend_name,
152 req->in.ip_address, 138);
153 NT_STATUS_HAVE_NO_MEMORY(dest);
155 status = dgram_mailslot_netlogon_send(iface->dgmsock,
156 &dst, dest,
157 NBT_MAILSLOT_NETLOGON,
158 &src, &p);
159 if (!NT_STATUS_IS_OK(status)) {
160 DEBUG(0, ("dgram_mailslot_ntlogon_send failed: %s\n",
161 nt_errstr(status)));
162 return status;
165 msg->defer_reply = true;
166 return NT_STATUS_OK;
171 register the irpc handlers for the nbt server
173 void nbtd_register_irpc(struct nbtd_server *nbtsrv)
175 NTSTATUS status;
176 struct task_server *task = nbtsrv->task;
178 status = IRPC_REGISTER(task->msg_ctx, irpc, NBTD_INFORMATION,
179 nbtd_information, nbtsrv);
180 if (!NT_STATUS_IS_OK(status)) {
181 task_server_terminate(task, "nbtd failed to setup monitoring");
182 return;
185 status = IRPC_REGISTER(task->msg_ctx, irpc, NBTD_GETDCNAME,
186 nbtd_getdcname, nbtsrv);
187 if (!NT_STATUS_IS_OK(status)) {
188 task_server_terminate(task, "nbtd failed to setup getdcname "
189 "handler");
190 return;
193 status = IRPC_REGISTER(task->msg_ctx, irpc, NBTD_PROXY_WINS_CHALLENGE,
194 nbtd_proxy_wins_challenge, nbtsrv);
195 if (!NT_STATUS_IS_OK(status)) {
196 task_server_terminate(task, "nbtd failed to setup wins challenge "
197 "handler");
198 return;
201 status = IRPC_REGISTER(task->msg_ctx, irpc, NBTD_PROXY_WINS_RELEASE_DEMAND,
202 nbtd_proxy_wins_release_demand, nbtsrv);
203 if (!NT_STATUS_IS_OK(status)) {
204 task_server_terminate(task, "nbtd failed to setup wins release demand "
205 "handler");
206 return;