Merge branch 'v4-0-test' of ssh://git.samba.org/data/git/samba into 4-0-local
[kamenim/samba.git] / source4 / nbt_server / dgram / netlogon.c
1 /* 
2    Unix SMB/CIFS implementation.
3
4    NBT datagram netlogon server
5
6    Copyright (C) Andrew Tridgell        2005
7    Copyright (C) Andrew Bartlett <abartlet@samba.org> 2008
8   
9    This program is free software; you can redistribute it and/or modify
10    it under the terms of the GNU General Public License as published by
11    the Free Software Foundation; either version 3 of the License, or
12    (at your option) any later version.
13    
14    This program is distributed in the hope that it will be useful,
15    but WITHOUT ANY WARRANTY; without even the implied warranty of
16    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
17    GNU General Public License for more details.
18    
19    You should have received a copy of the GNU General Public License
20    along with this program.  If not, see <http://www.gnu.org/licenses/>.
21 */
22
23 #include "includes.h"
24 #include "nbt_server/nbt_server.h"
25 #include "lib/socket/socket.h"
26 #include "lib/ldb/include/ldb.h"
27 #include "dsdb/samdb/samdb.h"
28 #include "auth/auth.h"
29 #include "util/util_ldb.h"
30 #include "param/param.h"
31 #include "smbd/service_task.h"
32 #include "cldap_server/cldap_server.h"
33 #include "libcli/security/security.h"
34
35 /*
36   reply to a GETDC request
37  */
38 static void nbtd_netlogon_getdc(struct dgram_mailslot_handler *dgmslot, 
39                                 struct nbtd_interface *iface,
40                                 struct nbt_dgram_packet *packet, 
41                                 const char *mailslot_name,
42                                 const struct socket_address *src,
43                                 struct nbt_netlogon_packet *netlogon)
44 {
45         struct nbt_name *name = &packet->data.msg.dest_name;
46         struct nbtd_interface *reply_iface = nbtd_find_reply_iface(iface, src->addr, false);
47         struct nbt_netlogon_response_from_pdc *pdc;
48         const char *ref_attrs[] = {"nETBIOSName", NULL};
49         struct ldb_message **ref_res;
50         struct ldb_context *samctx;
51         struct ldb_dn *partitions_basedn;
52         struct nbt_netlogon_response netlogon_response;
53         int ret;
54
55         /* only answer getdc requests on the PDC or LOGON names */
56         if (name->type != NBT_NAME_PDC && name->type != NBT_NAME_LOGON) {
57                 return;
58         }
59
60         samctx = samdb_connect(packet, iface->nbtsrv->task->event_ctx, iface->nbtsrv->task->lp_ctx, anonymous_session(packet, iface->nbtsrv->task->event_ctx, iface->nbtsrv->task->lp_ctx));
61         if (samctx == NULL) {
62                 DEBUG(2,("Unable to open sam in getdc reply\n"));
63                 return;
64         }
65
66         if (!samdb_is_pdc(samctx)) {
67                 DEBUG(2, ("Not a PDC, so not processing LOGON_PRIMARY_QUERY\n"));
68                 return;         
69         }
70
71         partitions_basedn = samdb_partitions_dn(samctx, packet);
72
73         ret = gendb_search(samctx, packet, partitions_basedn, &ref_res, ref_attrs,
74                            "(&(&(nETBIOSName=%s)(objectclass=crossRef))(ncName=*))", 
75                            name->name);
76         
77         if (ret != 1) {
78                 DEBUG(2,("Unable to find domain reference '%s' in sam\n", name->name));
79                 return;
80         }
81
82         /* setup a GETDC reply */
83         ZERO_STRUCT(netlogon_response);
84         netlogon_response.response_type = NETLOGON_GET_PDC;
85         pdc = &netlogon_response.get_pdc;
86
87         pdc->command = NETLOGON_RESPONSE_FROM_PDC;
88         pdc->pdc_name         = lp_netbios_name(iface->nbtsrv->task->lp_ctx);
89         pdc->unicode_pdc_name = pdc->pdc_name;
90         pdc->domain_name      = samdb_result_string(ref_res[0], "nETBIOSName", name->name);;
91         pdc->nt_version       = 1;
92         pdc->lmnt_token       = 0xFFFF;
93         pdc->lm20_token       = 0xFFFF;
94
95         dgram_mailslot_netlogon_reply(reply_iface->dgmsock, 
96                                       packet, 
97                                       lp_netbios_name(iface->nbtsrv->task->lp_ctx),
98                                       netlogon->req.pdc.mailslot_name,
99                                       &netlogon_response);
100 }
101
102
103 /*
104   reply to a ADS style GETDC request
105  */
106 static void nbtd_netlogon_samlogon(struct dgram_mailslot_handler *dgmslot,
107                                    struct nbtd_interface *iface,
108                                    struct nbt_dgram_packet *packet, 
109                                    const char *mailslot_name,
110                                    const struct socket_address *src,
111                                    struct nbt_netlogon_packet *netlogon)
112 {
113         struct nbt_name *name = &packet->data.msg.dest_name;
114         struct nbtd_interface *reply_iface = nbtd_find_reply_iface(iface, src->addr, false);
115         struct ldb_context *samctx;
116         const char *my_ip = reply_iface->ip_address; 
117         struct dom_sid *sid;
118         struct nbt_netlogon_response netlogon_response;
119         NTSTATUS status;
120
121         if (!my_ip) {
122                 DEBUG(0, ("Could not obtain own IP address for datagram socket\n"));
123                 return;
124         }
125
126         /* only answer getdc requests on the PDC or LOGON names */
127         if (name->type != NBT_NAME_PDC && name->type != NBT_NAME_LOGON) {
128                 return;
129         }
130
131         samctx = samdb_connect(packet, iface->nbtsrv->task->event_ctx, iface->nbtsrv->task->lp_ctx, anonymous_session(packet, iface->nbtsrv->task->event_ctx, iface->nbtsrv->task->lp_ctx));
132         if (samctx == NULL) {
133                 DEBUG(2,("Unable to open sam in getdc reply\n"));
134                 return;
135         }
136
137         if (netlogon->req.logon.sid_size) {
138                 if (strcasecmp(mailslot_name, NBT_MAILSLOT_NTLOGON) == 0) {
139                         DEBUG(2,("NBT netlogon query failed because SID specified in request to NTLOGON\n"));
140                         /* SID not permitted on NTLOGON (for some reason...) */ 
141                         return;
142                 }
143                 sid = &netlogon->req.logon.sid;
144         } else {
145                 sid = NULL;
146         }
147
148         status = fill_netlogon_samlogon_response(samctx, packet, NULL, name->name, sid, NULL, 
149                                                  netlogon->req.logon.user_name, src->addr, 
150                                                  netlogon->req.logon.nt_version, iface->nbtsrv->task->lp_ctx, &netlogon_response.samlogon);
151         if (!NT_STATUS_IS_OK(status)) {
152                 DEBUG(2,("NBT netlogon query failed domain=%s sid=%s version=%d - %s\n",
153                          name->name, dom_sid_string(packet, sid), netlogon->req.logon.nt_version, nt_errstr(status)));
154                 return;
155         }
156
157         netlogon_response.response_type = NETLOGON_SAMLOGON;
158
159         packet->data.msg.dest_name.type = 0;
160
161         dgram_mailslot_netlogon_reply(reply_iface->dgmsock, 
162                                       packet, 
163                                       lp_netbios_name(iface->nbtsrv->task->lp_ctx),
164                                       netlogon->req.logon.mailslot_name,
165                                       &netlogon_response);
166 }
167
168
169 /*
170   handle incoming netlogon mailslot requests
171 */
172 void nbtd_mailslot_netlogon_handler(struct dgram_mailslot_handler *dgmslot, 
173                                     struct nbt_dgram_packet *packet, 
174                                     const char *mailslot_name,
175                                     struct socket_address *src)
176 {
177         NTSTATUS status = NT_STATUS_NO_MEMORY;
178         struct nbtd_interface *iface = 
179                 talloc_get_type(dgmslot->private, struct nbtd_interface);
180         struct nbt_netlogon_packet *netlogon = 
181                 talloc(dgmslot, struct nbt_netlogon_packet);
182         struct nbtd_iface_name *iname;
183         struct nbt_name *name = &packet->data.msg.dest_name;
184
185         if (netlogon == NULL) goto failed;
186
187         /*
188           see if the we are listening on the destination netbios name
189         */
190         iname = nbtd_find_iname(iface, name, 0);
191         if (iname == NULL) {
192                 status = NT_STATUS_BAD_NETWORK_NAME;
193                 goto failed;
194         }
195
196         DEBUG(2,("netlogon request to %s from %s:%d\n", 
197                  nbt_name_string(netlogon, name), src->addr, src->port));
198         status = dgram_mailslot_netlogon_parse_request(dgmslot, netlogon, packet, netlogon);
199         if (!NT_STATUS_IS_OK(status)) goto failed;
200
201         switch (netlogon->command) {
202         case LOGON_PRIMARY_QUERY:
203                 nbtd_netlogon_getdc(dgmslot, iface, packet, mailslot_name, 
204                                     src, netlogon);
205                 break;
206         case LOGON_SAM_LOGON_REQUEST:
207                 nbtd_netlogon_samlogon(dgmslot, iface, packet, mailslot_name, 
208                                        src, netlogon);
209                 break;
210         default:
211                 DEBUG(2,("unknown netlogon op %d from %s:%d\n", 
212                          netlogon->command, src->addr, src->port));
213                 NDR_PRINT_DEBUG(nbt_netlogon_packet, netlogon);
214                 break;
215         }
216
217         talloc_free(netlogon);
218         return;
219
220 failed:
221         DEBUG(2,("nbtd netlogon handler failed from %s:%d to %s - %s\n",
222                  src->addr, src->port, nbt_name_string(netlogon, name),
223                  nt_errstr(status)));
224         talloc_free(netlogon);
225 }