| 1 | /*
|
|---|
| 2 | * Unix SMB/CIFS implementation.
|
|---|
| 3 | * Helper routines for net
|
|---|
| 4 | * Copyright (C) Volker Lendecke 2006
|
|---|
| 5 | * Copyright (C) Kai Blin 2008
|
|---|
| 6 | *
|
|---|
| 7 | * This program is free software; you can redistribute it and/or modify
|
|---|
| 8 | * it under the terms of the GNU General Public License as published by
|
|---|
| 9 | * the Free Software Foundation; either version 3 of the License, or
|
|---|
| 10 | * (at your option) any later version.
|
|---|
| 11 | *
|
|---|
| 12 | * This program is distributed in the hope that it will be useful,
|
|---|
| 13 | * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|---|
| 14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|---|
| 15 | * GNU General Public License for more details.
|
|---|
| 16 | *
|
|---|
| 17 | * You should have received a copy of the GNU General Public License
|
|---|
| 18 | * along with this program; if not, see <http://www.gnu.org/licenses/>.
|
|---|
| 19 | */
|
|---|
| 20 |
|
|---|
| 21 |
|
|---|
| 22 | #include "includes.h"
|
|---|
| 23 | #include "utils/net.h"
|
|---|
| 24 | #include "../librpc/gen_ndr/cli_lsa.h"
|
|---|
| 25 | #include "../librpc/gen_ndr/cli_dssetup.h"
|
|---|
| 26 |
|
|---|
| 27 | NTSTATUS net_rpc_lookup_name(struct net_context *c,
|
|---|
| 28 | TALLOC_CTX *mem_ctx, struct cli_state *cli,
|
|---|
| 29 | const char *name, const char **ret_domain,
|
|---|
| 30 | const char **ret_name, DOM_SID *ret_sid,
|
|---|
| 31 | enum lsa_SidType *ret_type)
|
|---|
| 32 | {
|
|---|
| 33 | struct rpc_pipe_client *lsa_pipe = NULL;
|
|---|
| 34 | struct policy_handle pol;
|
|---|
| 35 | NTSTATUS result = NT_STATUS_OK;
|
|---|
| 36 | const char **dom_names;
|
|---|
| 37 | DOM_SID *sids;
|
|---|
| 38 | enum lsa_SidType *types;
|
|---|
| 39 |
|
|---|
| 40 | ZERO_STRUCT(pol);
|
|---|
| 41 |
|
|---|
| 42 | result = cli_rpc_pipe_open_noauth(cli, &ndr_table_lsarpc.syntax_id,
|
|---|
| 43 | &lsa_pipe);
|
|---|
| 44 | if (!NT_STATUS_IS_OK(result)) {
|
|---|
| 45 | d_fprintf(stderr, _("Could not initialise lsa pipe\n"));
|
|---|
| 46 | return result;
|
|---|
| 47 | }
|
|---|
| 48 |
|
|---|
| 49 | result = rpccli_lsa_open_policy(lsa_pipe, mem_ctx, false,
|
|---|
| 50 | SEC_FLAG_MAXIMUM_ALLOWED,
|
|---|
| 51 | &pol);
|
|---|
| 52 | if (!NT_STATUS_IS_OK(result)) {
|
|---|
| 53 | d_fprintf(stderr, "open_policy %s: %s\n", _("failed"),
|
|---|
| 54 | nt_errstr(result));
|
|---|
| 55 | return result;
|
|---|
| 56 | }
|
|---|
| 57 |
|
|---|
| 58 | result = rpccli_lsa_lookup_names(lsa_pipe, mem_ctx, &pol, 1,
|
|---|
| 59 | &name, &dom_names, 1, &sids, &types);
|
|---|
| 60 |
|
|---|
| 61 | if (!NT_STATUS_IS_OK(result)) {
|
|---|
| 62 | /* This can happen easily, don't log an error */
|
|---|
| 63 | goto done;
|
|---|
| 64 | }
|
|---|
| 65 |
|
|---|
| 66 | if (ret_domain != NULL) {
|
|---|
| 67 | *ret_domain = dom_names[0];
|
|---|
| 68 | }
|
|---|
| 69 | if (ret_name != NULL) {
|
|---|
| 70 | *ret_name = talloc_strdup(mem_ctx, name);
|
|---|
| 71 | }
|
|---|
| 72 | if (ret_sid != NULL) {
|
|---|
| 73 | sid_copy(ret_sid, &sids[0]);
|
|---|
| 74 | }
|
|---|
| 75 | if (ret_type != NULL) {
|
|---|
| 76 | *ret_type = types[0];
|
|---|
| 77 | }
|
|---|
| 78 |
|
|---|
| 79 | done:
|
|---|
| 80 | if (is_valid_policy_hnd(&pol)) {
|
|---|
| 81 | rpccli_lsa_Close(lsa_pipe, mem_ctx, &pol);
|
|---|
| 82 | }
|
|---|
| 83 | TALLOC_FREE(lsa_pipe);
|
|---|
| 84 |
|
|---|
| 85 | return result;
|
|---|
| 86 | }
|
|---|
| 87 |
|
|---|
| 88 | /****************************************************************************
|
|---|
| 89 | Connect to \\server\service.
|
|---|
| 90 | ****************************************************************************/
|
|---|
| 91 |
|
|---|
| 92 | NTSTATUS connect_to_service(struct net_context *c,
|
|---|
| 93 | struct cli_state **cli_ctx,
|
|---|
| 94 | struct sockaddr_storage *server_ss,
|
|---|
| 95 | const char *server_name,
|
|---|
| 96 | const char *service_name,
|
|---|
| 97 | const char *service_type)
|
|---|
| 98 | {
|
|---|
| 99 | NTSTATUS nt_status;
|
|---|
| 100 | int flags = 0;
|
|---|
| 101 |
|
|---|
| 102 | c->opt_password = net_prompt_pass(c, c->opt_user_name);
|
|---|
| 103 |
|
|---|
| 104 | if (c->opt_kerberos) {
|
|---|
| 105 | flags |= CLI_FULL_CONNECTION_USE_KERBEROS;
|
|---|
| 106 | }
|
|---|
| 107 |
|
|---|
| 108 | if (c->opt_kerberos && c->opt_password) {
|
|---|
| 109 | flags |= CLI_FULL_CONNECTION_FALLBACK_AFTER_KERBEROS;
|
|---|
| 110 | }
|
|---|
| 111 |
|
|---|
| 112 | if (c->opt_ccache) {
|
|---|
| 113 | flags |= CLI_FULL_CONNECTION_USE_CCACHE;
|
|---|
| 114 | }
|
|---|
| 115 |
|
|---|
| 116 | nt_status = cli_full_connection(cli_ctx, NULL, server_name,
|
|---|
| 117 | server_ss, c->opt_port,
|
|---|
| 118 | service_name, service_type,
|
|---|
| 119 | c->opt_user_name, c->opt_workgroup,
|
|---|
| 120 | c->opt_password, flags, Undefined, NULL);
|
|---|
| 121 | if (!NT_STATUS_IS_OK(nt_status)) {
|
|---|
| 122 | d_fprintf(stderr, _("Could not connect to server %s\n"),
|
|---|
| 123 | server_name);
|
|---|
| 124 |
|
|---|
| 125 | /* Display a nicer message depending on the result */
|
|---|
| 126 |
|
|---|
| 127 | if (NT_STATUS_V(nt_status) ==
|
|---|
| 128 | NT_STATUS_V(NT_STATUS_LOGON_FAILURE))
|
|---|
| 129 | d_fprintf(stderr,
|
|---|
| 130 | _("The username or password was not "
|
|---|
| 131 | "correct.\n"));
|
|---|
| 132 |
|
|---|
| 133 | if (NT_STATUS_V(nt_status) ==
|
|---|
| 134 | NT_STATUS_V(NT_STATUS_ACCOUNT_LOCKED_OUT))
|
|---|
| 135 | d_fprintf(stderr, _("The account was locked out.\n"));
|
|---|
| 136 |
|
|---|
| 137 | if (NT_STATUS_V(nt_status) ==
|
|---|
| 138 | NT_STATUS_V(NT_STATUS_ACCOUNT_DISABLED))
|
|---|
| 139 | d_fprintf(stderr, _("The account was disabled.\n"));
|
|---|
| 140 | return nt_status;
|
|---|
| 141 | }
|
|---|
| 142 |
|
|---|
| 143 | if (c->smb_encrypt) {
|
|---|
| 144 | nt_status = cli_force_encryption(*cli_ctx,
|
|---|
| 145 | c->opt_user_name,
|
|---|
| 146 | c->opt_password,
|
|---|
| 147 | c->opt_workgroup);
|
|---|
| 148 |
|
|---|
| 149 | if (NT_STATUS_EQUAL(nt_status,NT_STATUS_NOT_SUPPORTED)) {
|
|---|
| 150 | d_printf(_("Encryption required and "
|
|---|
| 151 | "server that doesn't support "
|
|---|
| 152 | "UNIX extensions - failing connect\n"));
|
|---|
| 153 | } else if (NT_STATUS_EQUAL(nt_status,NT_STATUS_UNKNOWN_REVISION)) {
|
|---|
| 154 | d_printf(_("Encryption required and "
|
|---|
| 155 | "can't get UNIX CIFS extensions "
|
|---|
| 156 | "version from server.\n"));
|
|---|
| 157 | } else if (NT_STATUS_EQUAL(nt_status,NT_STATUS_UNSUPPORTED_COMPRESSION)) {
|
|---|
| 158 | d_printf(_("Encryption required and "
|
|---|
| 159 | "share %s doesn't support "
|
|---|
| 160 | "encryption.\n"), service_name);
|
|---|
| 161 | } else if (!NT_STATUS_IS_OK(nt_status)) {
|
|---|
| 162 | d_printf(_("Encryption required and "
|
|---|
| 163 | "setup failed with error %s.\n"),
|
|---|
| 164 | nt_errstr(nt_status));
|
|---|
| 165 | }
|
|---|
| 166 |
|
|---|
| 167 | if (!NT_STATUS_IS_OK(nt_status)) {
|
|---|
| 168 | cli_shutdown(*cli_ctx);
|
|---|
| 169 | *cli_ctx = NULL;
|
|---|
| 170 | }
|
|---|
| 171 | }
|
|---|
| 172 |
|
|---|
| 173 | return nt_status;
|
|---|
| 174 | }
|
|---|
| 175 |
|
|---|
| 176 | /****************************************************************************
|
|---|
| 177 | Connect to \\server\ipc$.
|
|---|
| 178 | ****************************************************************************/
|
|---|
| 179 |
|
|---|
| 180 | NTSTATUS connect_to_ipc(struct net_context *c,
|
|---|
| 181 | struct cli_state **cli_ctx,
|
|---|
| 182 | struct sockaddr_storage *server_ss,
|
|---|
| 183 | const char *server_name)
|
|---|
| 184 | {
|
|---|
| 185 | return connect_to_service(c, cli_ctx, server_ss, server_name, "IPC$",
|
|---|
| 186 | "IPC");
|
|---|
| 187 | }
|
|---|
| 188 |
|
|---|
| 189 | /****************************************************************************
|
|---|
| 190 | Connect to \\server\ipc$ anonymously.
|
|---|
| 191 | ****************************************************************************/
|
|---|
| 192 |
|
|---|
| 193 | NTSTATUS connect_to_ipc_anonymous(struct net_context *c,
|
|---|
| 194 | struct cli_state **cli_ctx,
|
|---|
| 195 | struct sockaddr_storage *server_ss,
|
|---|
| 196 | const char *server_name)
|
|---|
| 197 | {
|
|---|
| 198 | NTSTATUS nt_status;
|
|---|
| 199 |
|
|---|
| 200 | nt_status = cli_full_connection(cli_ctx, c->opt_requester_name,
|
|---|
| 201 | server_name, server_ss, c->opt_port,
|
|---|
| 202 | "IPC$", "IPC",
|
|---|
| 203 | "", "",
|
|---|
| 204 | "", 0, Undefined, NULL);
|
|---|
| 205 |
|
|---|
| 206 | if (NT_STATUS_IS_OK(nt_status)) {
|
|---|
| 207 | return nt_status;
|
|---|
| 208 | } else {
|
|---|
| 209 | DEBUG(1,("Cannot connect to server (anonymously). Error was %s\n", nt_errstr(nt_status)));
|
|---|
| 210 | return nt_status;
|
|---|
| 211 | }
|
|---|
| 212 | }
|
|---|
| 213 |
|
|---|
| 214 | /****************************************************************************
|
|---|
| 215 | Return malloced user@realm for krb5 login.
|
|---|
| 216 | ****************************************************************************/
|
|---|
| 217 |
|
|---|
| 218 | static char *get_user_and_realm(const char *username)
|
|---|
| 219 | {
|
|---|
| 220 | char *user_and_realm = NULL;
|
|---|
| 221 |
|
|---|
| 222 | if (!username) {
|
|---|
| 223 | return NULL;
|
|---|
| 224 | }
|
|---|
| 225 | if (strchr_m(username, '@')) {
|
|---|
| 226 | user_and_realm = SMB_STRDUP(username);
|
|---|
| 227 | } else {
|
|---|
| 228 | if (asprintf(&user_and_realm, "%s@%s", username, lp_realm()) == -1) {
|
|---|
| 229 | user_and_realm = NULL;
|
|---|
| 230 | }
|
|---|
| 231 | }
|
|---|
| 232 | return user_and_realm;
|
|---|
| 233 | }
|
|---|
| 234 |
|
|---|
| 235 | /****************************************************************************
|
|---|
| 236 | Connect to \\server\ipc$ using KRB5.
|
|---|
| 237 | ****************************************************************************/
|
|---|
| 238 |
|
|---|
| 239 | NTSTATUS connect_to_ipc_krb5(struct net_context *c,
|
|---|
| 240 | struct cli_state **cli_ctx,
|
|---|
| 241 | struct sockaddr_storage *server_ss,
|
|---|
| 242 | const char *server_name)
|
|---|
| 243 | {
|
|---|
| 244 | NTSTATUS nt_status;
|
|---|
| 245 | char *user_and_realm = NULL;
|
|---|
| 246 |
|
|---|
| 247 | /* FIXME: Should get existing kerberos ticket if possible. */
|
|---|
| 248 | c->opt_password = net_prompt_pass(c, c->opt_user_name);
|
|---|
| 249 | if (!c->opt_password) {
|
|---|
| 250 | return NT_STATUS_NO_MEMORY;
|
|---|
| 251 | }
|
|---|
| 252 |
|
|---|
| 253 | user_and_realm = get_user_and_realm(c->opt_user_name);
|
|---|
| 254 | if (!user_and_realm) {
|
|---|
| 255 | return NT_STATUS_NO_MEMORY;
|
|---|
| 256 | }
|
|---|
| 257 |
|
|---|
| 258 | nt_status = cli_full_connection(cli_ctx, NULL, server_name,
|
|---|
| 259 | server_ss, c->opt_port,
|
|---|
| 260 | "IPC$", "IPC",
|
|---|
| 261 | user_and_realm, c->opt_workgroup,
|
|---|
| 262 | c->opt_password,
|
|---|
| 263 | CLI_FULL_CONNECTION_USE_KERBEROS,
|
|---|
| 264 | Undefined, NULL);
|
|---|
| 265 |
|
|---|
| 266 | SAFE_FREE(user_and_realm);
|
|---|
| 267 |
|
|---|
| 268 | if (!NT_STATUS_IS_OK(nt_status)) {
|
|---|
| 269 | DEBUG(1,("Cannot connect to server using kerberos. Error was %s\n", nt_errstr(nt_status)));
|
|---|
| 270 | return nt_status;
|
|---|
| 271 | }
|
|---|
| 272 |
|
|---|
| 273 | if (c->smb_encrypt) {
|
|---|
| 274 | nt_status = cli_cm_force_encryption(*cli_ctx,
|
|---|
| 275 | user_and_realm,
|
|---|
| 276 | c->opt_password,
|
|---|
| 277 | c->opt_workgroup,
|
|---|
| 278 | "IPC$");
|
|---|
| 279 | if (!NT_STATUS_IS_OK(nt_status)) {
|
|---|
| 280 | cli_shutdown(*cli_ctx);
|
|---|
| 281 | *cli_ctx = NULL;
|
|---|
| 282 | }
|
|---|
| 283 | }
|
|---|
| 284 |
|
|---|
| 285 | return nt_status;
|
|---|
| 286 | }
|
|---|
| 287 |
|
|---|
| 288 | /**
|
|---|
| 289 | * Connect a server and open a given pipe
|
|---|
| 290 | *
|
|---|
| 291 | * @param cli_dst A cli_state
|
|---|
| 292 | * @param pipe The pipe to open
|
|---|
| 293 | * @param got_pipe boolean that stores if we got a pipe
|
|---|
| 294 | *
|
|---|
| 295 | * @return Normal NTSTATUS return.
|
|---|
| 296 | **/
|
|---|
| 297 | NTSTATUS connect_dst_pipe(struct net_context *c, struct cli_state **cli_dst,
|
|---|
| 298 | struct rpc_pipe_client **pp_pipe_hnd,
|
|---|
| 299 | const struct ndr_syntax_id *interface)
|
|---|
| 300 | {
|
|---|
| 301 | NTSTATUS nt_status;
|
|---|
| 302 | char *server_name = SMB_STRDUP("127.0.0.1");
|
|---|
| 303 | struct cli_state *cli_tmp = NULL;
|
|---|
| 304 | struct rpc_pipe_client *pipe_hnd = NULL;
|
|---|
| 305 |
|
|---|
| 306 | if (server_name == NULL) {
|
|---|
| 307 | return NT_STATUS_NO_MEMORY;
|
|---|
| 308 | }
|
|---|
| 309 |
|
|---|
| 310 | if (c->opt_destination) {
|
|---|
| 311 | SAFE_FREE(server_name);
|
|---|
| 312 | if ((server_name = SMB_STRDUP(c->opt_destination)) == NULL) {
|
|---|
| 313 | return NT_STATUS_NO_MEMORY;
|
|---|
| 314 | }
|
|---|
| 315 | }
|
|---|
| 316 |
|
|---|
| 317 | /* make a connection to a named pipe */
|
|---|
| 318 | nt_status = connect_to_ipc(c, &cli_tmp, NULL, server_name);
|
|---|
| 319 | if (!NT_STATUS_IS_OK(nt_status)) {
|
|---|
| 320 | SAFE_FREE(server_name);
|
|---|
| 321 | return nt_status;
|
|---|
| 322 | }
|
|---|
| 323 |
|
|---|
| 324 | nt_status = cli_rpc_pipe_open_noauth(cli_tmp, interface,
|
|---|
| 325 | &pipe_hnd);
|
|---|
| 326 | if (!NT_STATUS_IS_OK(nt_status)) {
|
|---|
| 327 | DEBUG(0, ("couldn't not initialize pipe\n"));
|
|---|
| 328 | cli_shutdown(cli_tmp);
|
|---|
| 329 | SAFE_FREE(server_name);
|
|---|
| 330 | return nt_status;
|
|---|
| 331 | }
|
|---|
| 332 |
|
|---|
| 333 | *cli_dst = cli_tmp;
|
|---|
| 334 | *pp_pipe_hnd = pipe_hnd;
|
|---|
| 335 | SAFE_FREE(server_name);
|
|---|
| 336 |
|
|---|
| 337 | return nt_status;
|
|---|
| 338 | }
|
|---|
| 339 |
|
|---|
| 340 | /****************************************************************************
|
|---|
|
|---|