s4-torture: verify #8373 and add ndr nbt tests for LOGON_PRIMARY_QUERY nbt_netlogon_r...
[Samba/wip.git] / source3 / utils / net_rpc_sh_acct.c
blob3fc6568dac6efb2c54e9ffa73dffec5808ce1977
1 /*
2 Samba Unix/Linux SMB client library
3 Distributed SMB/CIFS Server Management Utility
4 Copyright (C) 2006 Volker Lendecke (vl@samba.org)
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3 of the License, or
9 (at your option) any later version.
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 You should have received a copy of the GNU General Public License
17 along with this program. If not, see <http://www.gnu.org/licenses/>.
19 #include "includes.h"
20 #include "utils/net.h"
21 #include "rpc_client/rpc_client.h"
22 #include "../librpc/gen_ndr/ndr_samr_c.h"
23 #include "../libcli/security/security.h"
26 * Do something with the account policies. Read them all, run a function on
27 * them and possibly write them back. "fn" has to return the container index
28 * it has modified, it can return 0 for no change.
31 static NTSTATUS rpc_sh_acct_do(struct net_context *c,
32 TALLOC_CTX *mem_ctx,
33 struct rpc_sh_ctx *ctx,
34 struct rpc_pipe_client *pipe_hnd,
35 int argc, const char **argv,
36 int (*fn)(struct net_context *c,
37 TALLOC_CTX *mem_ctx,
38 struct rpc_sh_ctx *ctx,
39 struct samr_DomInfo1 *i1,
40 struct samr_DomInfo3 *i3,
41 struct samr_DomInfo12 *i12,
42 int argc, const char **argv))
44 struct policy_handle connect_pol, domain_pol;
45 NTSTATUS status, result;
46 union samr_DomainInfo *info1 = NULL;
47 union samr_DomainInfo *info3 = NULL;
48 union samr_DomainInfo *info12 = NULL;
49 int store;
50 struct dcerpc_binding_handle *b = pipe_hnd->binding_handle;
52 ZERO_STRUCT(connect_pol);
53 ZERO_STRUCT(domain_pol);
55 /* Get sam policy handle */
57 status = dcerpc_samr_Connect2(b, mem_ctx,
58 pipe_hnd->desthost,
59 MAXIMUM_ALLOWED_ACCESS,
60 &connect_pol,
61 &result);
62 if (!NT_STATUS_IS_OK(status)) {
63 goto done;
65 if (!NT_STATUS_IS_OK(result)) {
66 status = result;
67 goto done;
70 /* Get domain policy handle */
72 status = dcerpc_samr_OpenDomain(b, mem_ctx,
73 &connect_pol,
74 MAXIMUM_ALLOWED_ACCESS,
75 ctx->domain_sid,
76 &domain_pol,
77 &result);
78 if (!NT_STATUS_IS_OK(status)) {
79 goto done;
81 if (!NT_STATUS_IS_OK(result)) {
82 status = result;
83 goto done;
86 status = dcerpc_samr_QueryDomainInfo(b, mem_ctx,
87 &domain_pol,
89 &info1,
90 &result);
91 if (!NT_STATUS_IS_OK(status)) {
92 goto done;
94 if (!NT_STATUS_IS_OK(result)) {
95 status = result;
96 d_fprintf(stderr, _("query_domain_info level 1 failed: %s\n"),
97 nt_errstr(result));
98 goto done;
101 status = dcerpc_samr_QueryDomainInfo(b, mem_ctx,
102 &domain_pol,
104 &info3,
105 &result);
106 if (!NT_STATUS_IS_OK(status)) {
107 goto done;
109 if (!NT_STATUS_IS_OK(result)) {
110 status = result;
111 d_fprintf(stderr, _("query_domain_info level 3 failed: %s\n"),
112 nt_errstr(result));
113 goto done;
116 status = dcerpc_samr_QueryDomainInfo(b, mem_ctx,
117 &domain_pol,
119 &info12,
120 &result);
121 if (!NT_STATUS_IS_OK(status)) {
122 goto done;
124 if (!NT_STATUS_IS_OK(result)) {
125 status = result;
126 d_fprintf(stderr, _("query_domain_info level 12 failed: %s\n"),
127 nt_errstr(result));
128 goto done;
131 store = fn(c, mem_ctx, ctx, &info1->info1, &info3->info3,
132 &info12->info12, argc, argv);
134 if (store <= 0) {
135 /* Don't save anything */
136 goto done;
139 switch (store) {
140 case 1:
141 status = dcerpc_samr_SetDomainInfo(b, mem_ctx,
142 &domain_pol,
144 info1,
145 &result);
146 break;
147 case 3:
148 status = dcerpc_samr_SetDomainInfo(b, mem_ctx,
149 &domain_pol,
151 info3,
152 &result);
153 break;
154 case 12:
155 status = dcerpc_samr_SetDomainInfo(b, mem_ctx,
156 &domain_pol,
158 info12,
159 &result);
160 break;
161 default:
162 d_fprintf(stderr, _("Got unexpected info level %d\n"), store);
163 status = NT_STATUS_INTERNAL_ERROR;
164 goto done;
167 if (!NT_STATUS_IS_OK(status)) {
168 goto done;
171 status = result;
173 done:
174 if (is_valid_policy_hnd(&domain_pol)) {
175 dcerpc_samr_Close(b, mem_ctx, &domain_pol, &result);
177 if (is_valid_policy_hnd(&connect_pol)) {
178 dcerpc_samr_Close(b, mem_ctx, &connect_pol, &result);
181 return status;
184 static int account_show(struct net_context *c,
185 TALLOC_CTX *mem_ctx, struct rpc_sh_ctx *ctx,
186 struct samr_DomInfo1 *i1,
187 struct samr_DomInfo3 *i3,
188 struct samr_DomInfo12 *i12,
189 int argc, const char **argv)
191 if (argc != 0) {
192 d_fprintf(stderr, "%s %s\n", _("Usage:"), ctx->whoami);
193 return -1;
196 d_printf(_("Minimum password length: %d\n"), i1->min_password_length);
197 d_printf(_("Password history length: %d\n"),
198 i1->password_history_length);
200 d_printf(_("Minimum password age: "));
201 if (!nt_time_is_zero((NTTIME *)&i1->min_password_age)) {
202 time_t t = nt_time_to_unix_abs((NTTIME *)&i1->min_password_age);
203 d_printf(_("%d seconds\n"), (int)t);
204 } else {
205 d_printf(_("not set\n"));
208 d_printf(_("Maximum password age: "));
209 if (nt_time_is_set((NTTIME *)&i1->max_password_age)) {
210 time_t t = nt_time_to_unix_abs((NTTIME *)&i1->max_password_age);
211 d_printf(_("%d seconds\n"), (int)t);
212 } else {
213 d_printf(_("not set\n"));
216 d_printf(_("Bad logon attempts: %d\n"), i12->lockout_threshold);
218 if (i12->lockout_threshold != 0) {
220 d_printf(_("Account lockout duration: "));
221 if (nt_time_is_set(&i12->lockout_duration)) {
222 time_t t = nt_time_to_unix_abs(&i12->lockout_duration);
223 d_printf(_("%d seconds\n"), (int)t);
224 } else {
225 d_printf(_("not set\n"));
228 d_printf(_("Bad password count reset after: "));
229 if (nt_time_is_set(&i12->lockout_window)) {
230 time_t t = nt_time_to_unix_abs(&i12->lockout_window);
231 d_printf(_("%d seconds\n"), (int)t);
232 } else {
233 d_printf(_("not set\n"));
237 d_printf(_("Disconnect users when logon hours expire: %s\n"),
238 nt_time_is_zero(&i3->force_logoff_time) ? _("yes") : _("no"));
240 d_printf(_("User must logon to change password: %s\n"),
241 (i1->password_properties & 0x2) ? _("yes") : _("no"));
243 return 0; /* Don't save */
246 static NTSTATUS rpc_sh_acct_pol_show(struct net_context *c,
247 TALLOC_CTX *mem_ctx,
248 struct rpc_sh_ctx *ctx,
249 struct rpc_pipe_client *pipe_hnd,
250 int argc, const char **argv) {
251 return rpc_sh_acct_do(c, mem_ctx, ctx, pipe_hnd, argc, argv,
252 account_show);
255 static int account_set_badpw(struct net_context *c,
256 TALLOC_CTX *mem_ctx, struct rpc_sh_ctx *ctx,
257 struct samr_DomInfo1 *i1,
258 struct samr_DomInfo3 *i3,
259 struct samr_DomInfo12 *i12,
260 int argc, const char **argv)
262 if (argc != 1) {
263 d_fprintf(stderr, "%s %s <count>\n", _("Usage:"), ctx->whoami);
264 return -1;
267 i12->lockout_threshold = atoi(argv[0]);
268 d_printf(_("Setting bad password count to %d\n"),
269 i12->lockout_threshold);
271 return 12;
274 static NTSTATUS rpc_sh_acct_set_badpw(struct net_context *c,
275 TALLOC_CTX *mem_ctx,
276 struct rpc_sh_ctx *ctx,
277 struct rpc_pipe_client *pipe_hnd,
278 int argc, const char **argv)
280 return rpc_sh_acct_do(c, mem_ctx, ctx, pipe_hnd, argc, argv,
281 account_set_badpw);
284 static int account_set_lockduration(struct net_context *c,
285 TALLOC_CTX *mem_ctx,
286 struct rpc_sh_ctx *ctx,
287 struct samr_DomInfo1 *i1,
288 struct samr_DomInfo3 *i3,
289 struct samr_DomInfo12 *i12,
290 int argc, const char **argv)
292 if (argc != 1) {
293 d_fprintf(stderr, _("Usage: %s <count>\n"), ctx->whoami);
294 return -1;
297 unix_to_nt_time_abs(&i12->lockout_duration, atoi(argv[0]));
298 d_printf(_("Setting lockout duration to %d seconds\n"),
299 (int)nt_time_to_unix_abs(&i12->lockout_duration));
301 return 12;
304 static NTSTATUS rpc_sh_acct_set_lockduration(struct net_context *c,
305 TALLOC_CTX *mem_ctx,
306 struct rpc_sh_ctx *ctx,
307 struct rpc_pipe_client *pipe_hnd,
308 int argc, const char **argv)
310 return rpc_sh_acct_do(c, mem_ctx, ctx, pipe_hnd, argc, argv,
311 account_set_lockduration);
314 static int account_set_resetduration(struct net_context *c,
315 TALLOC_CTX *mem_ctx,
316 struct rpc_sh_ctx *ctx,
317 struct samr_DomInfo1 *i1,
318 struct samr_DomInfo3 *i3,
319 struct samr_DomInfo12 *i12,
320 int argc, const char **argv)
322 if (argc != 1) {
323 d_fprintf(stderr, _("Usage: %s <count>\n"), ctx->whoami);
324 return -1;
327 unix_to_nt_time_abs(&i12->lockout_window, atoi(argv[0]));
328 d_printf(_("Setting bad password reset duration to %d seconds\n"),
329 (int)nt_time_to_unix_abs(&i12->lockout_window));
331 return 12;
334 static NTSTATUS rpc_sh_acct_set_resetduration(struct net_context *c,
335 TALLOC_CTX *mem_ctx,
336 struct rpc_sh_ctx *ctx,
337 struct rpc_pipe_client *pipe_hnd,
338 int argc, const char **argv)
340 return rpc_sh_acct_do(c, mem_ctx, ctx, pipe_hnd, argc, argv,
341 account_set_resetduration);
344 static int account_set_minpwage(struct net_context *c,
345 TALLOC_CTX *mem_ctx,
346 struct rpc_sh_ctx *ctx,
347 struct samr_DomInfo1 *i1,
348 struct samr_DomInfo3 *i3,
349 struct samr_DomInfo12 *i12,
350 int argc, const char **argv)
352 if (argc != 1) {
353 d_fprintf(stderr, _("Usage: %s <count>\n"), ctx->whoami);
354 return -1;
357 unix_to_nt_time_abs((NTTIME *)&i1->min_password_age, atoi(argv[0]));
358 d_printf(_("Setting minimum password age to %d seconds\n"),
359 (int)nt_time_to_unix_abs((NTTIME *)&i1->min_password_age));
361 return 1;
364 static NTSTATUS rpc_sh_acct_set_minpwage(struct net_context *c,
365 TALLOC_CTX *mem_ctx,
366 struct rpc_sh_ctx *ctx,
367 struct rpc_pipe_client *pipe_hnd,
368 int argc, const char **argv)
370 return rpc_sh_acct_do(c, mem_ctx, ctx, pipe_hnd, argc, argv,
371 account_set_minpwage);
374 static int account_set_maxpwage(struct net_context *c,
375 TALLOC_CTX *mem_ctx,
376 struct rpc_sh_ctx *ctx,
377 struct samr_DomInfo1 *i1,
378 struct samr_DomInfo3 *i3,
379 struct samr_DomInfo12 *i12,
380 int argc, const char **argv)
382 if (argc != 1) {
383 d_fprintf(stderr, _("Usage: %s <count>\n"), ctx->whoami);
384 return -1;
387 unix_to_nt_time_abs((NTTIME *)&i1->max_password_age, atoi(argv[0]));
388 d_printf(_("Setting maximum password age to %d seconds\n"),
389 (int)nt_time_to_unix_abs((NTTIME *)&i1->max_password_age));
391 return 1;
394 static NTSTATUS rpc_sh_acct_set_maxpwage(struct net_context *c,
395 TALLOC_CTX *mem_ctx,
396 struct rpc_sh_ctx *ctx,
397 struct rpc_pipe_client *pipe_hnd,
398 int argc, const char **argv)
400 return rpc_sh_acct_do(c, mem_ctx, ctx, pipe_hnd, argc, argv,
401 account_set_maxpwage);
404 static int account_set_minpwlen(struct net_context *c,
405 TALLOC_CTX *mem_ctx,
406 struct rpc_sh_ctx *ctx,
407 struct samr_DomInfo1 *i1,
408 struct samr_DomInfo3 *i3,
409 struct samr_DomInfo12 *i12,
410 int argc, const char **argv)
412 if (argc != 1) {
413 d_fprintf(stderr, _("Usage: %s <count>\n"), ctx->whoami);
414 return -1;
417 i1->min_password_length = atoi(argv[0]);
418 d_printf(_("Setting minimum password length to %d\n"),
419 i1->min_password_length);
421 return 1;
424 static NTSTATUS rpc_sh_acct_set_minpwlen(struct net_context *c,
425 TALLOC_CTX *mem_ctx,
426 struct rpc_sh_ctx *ctx,
427 struct rpc_pipe_client *pipe_hnd,
428 int argc, const char **argv)
430 return rpc_sh_acct_do(c, mem_ctx, ctx, pipe_hnd, argc, argv,
431 account_set_minpwlen);
434 static int account_set_pwhistlen(struct net_context *c,
435 TALLOC_CTX *mem_ctx,
436 struct rpc_sh_ctx *ctx,
437 struct samr_DomInfo1 *i1,
438 struct samr_DomInfo3 *i3,
439 struct samr_DomInfo12 *i12,
440 int argc, const char **argv)
442 if (argc != 1) {
443 d_fprintf(stderr, _("Usage: %s <count>\n"), ctx->whoami);
444 return -1;
447 i1->password_history_length = atoi(argv[0]);
448 d_printf(_("Setting password history length to %d\n"),
449 i1->password_history_length);
451 return 1;
454 static NTSTATUS rpc_sh_acct_set_pwhistlen(struct net_context *c,
455 TALLOC_CTX *mem_ctx,
456 struct rpc_sh_ctx *ctx,
457 struct rpc_pipe_client *pipe_hnd,
458 int argc, const char **argv)
460 return rpc_sh_acct_do(c, mem_ctx, ctx, pipe_hnd, argc, argv,
461 account_set_pwhistlen);
464 struct rpc_sh_cmd *net_rpc_acct_cmds(struct net_context *c, TALLOC_CTX *mem_ctx,
465 struct rpc_sh_ctx *ctx)
467 static struct rpc_sh_cmd cmds[9] = {
468 { "show", NULL, &ndr_table_samr, rpc_sh_acct_pol_show,
469 N_("Show current account policy settings") },
470 { "badpw", NULL, &ndr_table_samr, rpc_sh_acct_set_badpw,
471 N_("Set bad password count before lockout") },
472 { "lockduration", NULL, &ndr_table_samr, rpc_sh_acct_set_lockduration,
473 N_("Set account lockout duration") },
474 { "resetduration", NULL, &ndr_table_samr,
475 rpc_sh_acct_set_resetduration,
476 N_("Set bad password count reset duration") },
477 { "minpwage", NULL, &ndr_table_samr, rpc_sh_acct_set_minpwage,
478 N_("Set minimum password age") },
479 { "maxpwage", NULL, &ndr_table_samr, rpc_sh_acct_set_maxpwage,
480 N_("Set maximum password age") },
481 { "minpwlen", NULL, &ndr_table_samr, rpc_sh_acct_set_minpwlen,
482 N_("Set minimum password length") },
483 { "pwhistlen", NULL, &ndr_table_samr, rpc_sh_acct_set_pwhistlen,
484 N_("Set the password history length") },
485 { NULL, NULL, 0, NULL, NULL }
488 return cmds;