r5408: - added testing for the behaviour of the special 0x1c name
[Samba/gebeck_regimport.git] / source4 / nbt_server / defense.c
blob8d71b31c65bf12baa2e729046907678002f0db11
1 /*
2 Unix SMB/CIFS implementation.
4 defend our names against name registration requests
6 Copyright (C) Andrew Tridgell 2005
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
23 #include "includes.h"
24 #include "dlinklist.h"
25 #include "system/network.h"
26 #include "nbt_server/nbt_server.h"
30 defend our registered names against registration or name refresh
31 requests
33 void nbtd_request_defense(struct nbt_name_socket *nbtsock,
34 struct nbt_name_packet *packet,
35 const char *src_address, int src_port)
37 struct nbtd_iface_name *iname;
38 struct nbt_name *name;
39 struct nbtd_interface *iface = talloc_get_type(nbtsock->incoming.private,
40 struct nbtd_interface);
42 NBTD_ASSERT_PACKET(packet, src_address, packet->qdcount == 1);
43 NBTD_ASSERT_PACKET(packet, src_address, packet->arcount == 1);
44 NBTD_ASSERT_PACKET(packet, src_address,
45 packet->questions[0].question_type == NBT_QTYPE_NETBIOS);
46 NBTD_ASSERT_PACKET(packet, src_address,
47 packet->questions[0].question_class == NBT_QCLASS_IP);
48 NBTD_ASSERT_PACKET(packet, src_address,
49 packet->additional[0].rr_type == NBT_QTYPE_NETBIOS);
50 NBTD_ASSERT_PACKET(packet, src_address,
51 packet->additional[0].rr_class == NBT_QCLASS_IP);
52 NBTD_ASSERT_PACKET(packet, src_address,
53 packet->additional[0].rdata.netbios.length == 6);
55 /* see if we have the requested name on this interface */
56 name = &packet->questions[0].name;
58 iname = nbtd_find_iname(iface, name, NBT_NM_ACTIVE);
59 if (iname != NULL &&
60 !IS_GROUP_NAME(name, iname->nb_flags)) {
61 DEBUG(2,("Defending name %s on %s against %s\n",
62 nbt_name_string(packet, name),
63 iface->bcast_address, src_address));
64 nbtd_name_registration_reply(nbtsock, packet,
65 src_address, src_port, NBT_RCODE_ACT);
66 } else {
67 nbtd_winsserver_request(nbtsock, packet, src_address, src_port);