PageRenderTime 44ms CodeModel.GetById 20ms RepoModel.GetById 0ms app.codeStats 0ms

/source4/nbt_server/dgram/netlogon.c

https://bitbucket.org/mikedep333/rdssamba4
C | 200 lines | 137 code | 27 blank | 36 comment | 23 complexity | c9a63c546b4e56be7a98c64aaa170e96 MD5 | raw file
Possible License(s): Apache-2.0, BSD-3-Clause, GPL-3.0, LGPL-2.1, LGPL-3.0
  1. /*
  2. Unix SMB/CIFS implementation.
  3. NBT datagram netlogon server
  4. Copyright (C) Andrew Tridgell 2005
  5. Copyright (C) Andrew Bartlett <abartlet@samba.org> 2008
  6. This program is free software; you can redistribute it and/or modify
  7. it under the terms of the GNU General Public License as published by
  8. the Free Software Foundation; either version 3 of the License, or
  9. (at your option) any later version.
  10. This program is distributed in the hope that it will be useful,
  11. but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. GNU General Public License for more details.
  14. You should have received a copy of the GNU General Public License
  15. along with this program. If not, see <http://www.gnu.org/licenses/>.
  16. */
  17. #include "includes.h"
  18. #include "nbt_server/nbt_server.h"
  19. #include "lib/socket/socket.h"
  20. #include <ldb.h>
  21. #include "dsdb/samdb/samdb.h"
  22. #include "auth/auth.h"
  23. #include "param/param.h"
  24. #include "smbd/service_task.h"
  25. #include "cldap_server/cldap_server.h"
  26. #include "libcli/security/security.h"
  27. #include "nbt_server/dgram/proto.h"
  28. /*
  29. reply to a GETDC request
  30. */
  31. static void nbtd_netlogon_getdc(struct dgram_mailslot_handler *dgmslot,
  32. struct nbtd_interface *iface,
  33. struct nbt_dgram_packet *packet,
  34. const struct socket_address *src,
  35. struct nbt_netlogon_packet *netlogon)
  36. {
  37. struct nbt_name *name = &packet->data.msg.dest_name;
  38. struct nbtd_interface *reply_iface = nbtd_find_reply_iface(iface, src->addr, false);
  39. struct nbt_netlogon_response_from_pdc *pdc;
  40. struct ldb_context *samctx;
  41. struct nbt_netlogon_response netlogon_response;
  42. /* only answer getdc requests on the PDC or LOGON names */
  43. if (name->type != NBT_NAME_PDC && name->type != NBT_NAME_LOGON) {
  44. return;
  45. }
  46. samctx = iface->nbtsrv->sam_ctx;
  47. if (lpcfg_server_role(iface->nbtsrv->task->lp_ctx) != ROLE_DOMAIN_CONTROLLER
  48. || !samdb_is_pdc(samctx)) {
  49. DEBUG(2, ("Not a PDC, so not processing LOGON_PRIMARY_QUERY\n"));
  50. return;
  51. }
  52. if (strcasecmp_m(name->name, lpcfg_workgroup(iface->nbtsrv->task->lp_ctx)) != 0) {
  53. DEBUG(5,("GetDC requested for a domian %s that we don't host\n", name->name));
  54. return;
  55. }
  56. /* setup a GETDC reply */
  57. ZERO_STRUCT(netlogon_response);
  58. netlogon_response.response_type = NETLOGON_GET_PDC;
  59. pdc = &netlogon_response.data.get_pdc;
  60. pdc->command = NETLOGON_RESPONSE_FROM_PDC;
  61. pdc->pdc_name = lpcfg_netbios_name(iface->nbtsrv->task->lp_ctx);
  62. pdc->unicode_pdc_name = pdc->pdc_name;
  63. pdc->domain_name = lpcfg_workgroup(iface->nbtsrv->task->lp_ctx);
  64. pdc->nt_version = 1;
  65. pdc->lmnt_token = 0xFFFF;
  66. pdc->lm20_token = 0xFFFF;
  67. dgram_mailslot_netlogon_reply(reply_iface->dgmsock,
  68. packet,
  69. lpcfg_netbios_name(iface->nbtsrv->task->lp_ctx),
  70. netlogon->req.pdc.mailslot_name,
  71. &netlogon_response);
  72. }
  73. /*
  74. reply to a ADS style GETDC request
  75. */
  76. static void nbtd_netlogon_samlogon(struct dgram_mailslot_handler *dgmslot,
  77. struct nbtd_interface *iface,
  78. struct nbt_dgram_packet *packet,
  79. const struct socket_address *src,
  80. struct nbt_netlogon_packet *netlogon)
  81. {
  82. struct nbt_name *name = &packet->data.msg.dest_name;
  83. struct nbtd_interface *reply_iface = nbtd_find_reply_iface(iface, src->addr, false);
  84. struct ldb_context *samctx;
  85. const char *my_ip = reply_iface->ip_address;
  86. struct dom_sid *sid;
  87. struct nbt_netlogon_response netlogon_response;
  88. NTSTATUS status;
  89. if (!my_ip) {
  90. DEBUG(0, ("Could not obtain own IP address for datagram socket\n"));
  91. return;
  92. }
  93. /* only answer getdc requests on the PDC or LOGON names */
  94. if (name->type != NBT_NAME_PDC && name->type != NBT_NAME_LOGON) {
  95. return;
  96. }
  97. samctx = iface->nbtsrv->sam_ctx;
  98. if (netlogon->req.logon.sid_size) {
  99. sid = &netlogon->req.logon.sid;
  100. } else {
  101. sid = NULL;
  102. }
  103. status = fill_netlogon_samlogon_response(samctx, packet, NULL, name->name, sid, NULL,
  104. netlogon->req.logon.user_name, netlogon->req.logon.acct_control, src->addr,
  105. netlogon->req.logon.nt_version, iface->nbtsrv->task->lp_ctx, &netlogon_response.data.samlogon, false);
  106. if (!NT_STATUS_IS_OK(status)) {
  107. DEBUG(2,("NBT netlogon query failed domain=%s sid=%s version=%d - %s\n",
  108. name->name, dom_sid_string(packet, sid), netlogon->req.logon.nt_version, nt_errstr(status)));
  109. return;
  110. }
  111. netlogon_response.response_type = NETLOGON_SAMLOGON;
  112. packet->data.msg.dest_name.type = 0;
  113. dgram_mailslot_netlogon_reply(reply_iface->dgmsock,
  114. packet,
  115. lpcfg_netbios_name(iface->nbtsrv->task->lp_ctx),
  116. netlogon->req.logon.mailslot_name,
  117. &netlogon_response);
  118. }
  119. /*
  120. handle incoming netlogon mailslot requests
  121. */
  122. void nbtd_mailslot_netlogon_handler(struct dgram_mailslot_handler *dgmslot,
  123. struct nbt_dgram_packet *packet,
  124. struct socket_address *src)
  125. {
  126. NTSTATUS status = NT_STATUS_NO_MEMORY;
  127. struct nbtd_interface *iface =
  128. talloc_get_type(dgmslot->private_data, struct nbtd_interface);
  129. struct nbt_netlogon_packet *netlogon =
  130. talloc(dgmslot, struct nbt_netlogon_packet);
  131. struct nbtd_iface_name *iname;
  132. struct nbt_name *name = &packet->data.msg.dest_name;
  133. if (netlogon == NULL) goto failed;
  134. /*
  135. see if the we are listening on the destination netbios name
  136. */
  137. iname = nbtd_find_iname(iface, name, 0);
  138. if (iname == NULL) {
  139. status = NT_STATUS_BAD_NETWORK_NAME;
  140. goto failed;
  141. }
  142. DEBUG(2,("netlogon request to %s from %s:%d\n",
  143. nbt_name_string(netlogon, name), src->addr, src->port));
  144. status = dgram_mailslot_netlogon_parse_request(dgmslot, netlogon, packet, netlogon);
  145. if (!NT_STATUS_IS_OK(status)) goto failed;
  146. switch (netlogon->command) {
  147. case LOGON_PRIMARY_QUERY:
  148. nbtd_netlogon_getdc(dgmslot, iface, packet,
  149. src, netlogon);
  150. break;
  151. case LOGON_SAM_LOGON_REQUEST:
  152. nbtd_netlogon_samlogon(dgmslot, iface, packet,
  153. src, netlogon);
  154. break;
  155. default:
  156. DEBUG(2,("unknown netlogon op %d from %s:%d\n",
  157. netlogon->command, src->addr, src->port));
  158. NDR_PRINT_DEBUG(nbt_netlogon_packet, netlogon);
  159. break;
  160. }
  161. talloc_free(netlogon);
  162. return;
  163. failed:
  164. DEBUG(2,("nbtd netlogon handler failed from %s:%d to %s - %s\n",
  165. src->addr, src->port, nbt_name_string(netlogon, name),
  166. nt_errstr(status)));
  167. talloc_free(netlogon);
  168. }