2 Unix SMB/CIFS implementation.
4 NBT datagram netlogon server
6 Copyright (C) Andrew Tridgell 2005
7 Copyright (C) Andrew Bartlett <abartlet@samba.org> 2008
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "nbt_server/nbt_server.h"
25 #include "lib/socket/socket.h"
26 #include "lib/ldb/include/ldb.h"
27 #include "dsdb/samdb/samdb.h"
28 #include "auth/auth.h"
29 #include "util/util_ldb.h"
30 #include "param/param.h"
31 #include "smbd/service_task.h"
32 #include "cldap_server/cldap_server.h"
33 #include "libcli/security/security.h"
36 reply to a GETDC request
38 static void nbtd_netlogon_getdc(struct dgram_mailslot_handler *dgmslot,
39 struct nbtd_interface *iface,
40 struct nbt_dgram_packet *packet,
41 const char *mailslot_name,
42 const struct socket_address *src,
43 struct nbt_netlogon_packet *netlogon)
45 struct nbt_name *name = &packet->data.msg.dest_name;
46 struct nbtd_interface *reply_iface = nbtd_find_reply_iface(iface, src->addr, false);
47 struct nbt_netlogon_response_from_pdc *pdc;
48 const char *ref_attrs[] = {"nETBIOSName", NULL};
49 struct ldb_message **ref_res;
50 struct ldb_context *samctx;
51 struct ldb_dn *partitions_basedn;
52 struct nbt_netlogon_response netlogon_response;
55 /* only answer getdc requests on the PDC or LOGON names */
56 if (name->type != NBT_NAME_PDC && name->type != NBT_NAME_LOGON) {
60 samctx = samdb_connect(packet, iface->nbtsrv->task->event_ctx, iface->nbtsrv->task->lp_ctx, anonymous_session(packet, iface->nbtsrv->task->event_ctx, iface->nbtsrv->task->lp_ctx));
62 DEBUG(2,("Unable to open sam in getdc reply\n"));
66 if (!samdb_is_pdc(samctx)) {
67 DEBUG(2, ("Not a PDC, so not processing LOGON_PRIMARY_QUERY\n"));
71 partitions_basedn = samdb_partitions_dn(samctx, packet);
73 ret = gendb_search(samctx, packet, partitions_basedn, &ref_res, ref_attrs,
74 "(&(&(nETBIOSName=%s)(objectclass=crossRef))(ncName=*))",
78 DEBUG(2,("Unable to find domain reference '%s' in sam\n", name->name));
82 /* setup a GETDC reply */
83 ZERO_STRUCT(netlogon_response);
84 netlogon_response.response_type = NETLOGON_GET_PDC;
85 pdc = &netlogon_response.get_pdc;
87 pdc->command = NETLOGON_RESPONSE_FROM_PDC;
88 pdc->pdc_name = lp_netbios_name(iface->nbtsrv->task->lp_ctx);
89 pdc->unicode_pdc_name = pdc->pdc_name;
90 pdc->domain_name = samdb_result_string(ref_res[0], "nETBIOSName", name->name);;
92 pdc->lmnt_token = 0xFFFF;
93 pdc->lm20_token = 0xFFFF;
95 dgram_mailslot_netlogon_reply(reply_iface->dgmsock,
97 lp_netbios_name(iface->nbtsrv->task->lp_ctx),
98 netlogon->req.pdc.mailslot_name,
104 reply to a ADS style GETDC request
106 static void nbtd_netlogon_samlogon(struct dgram_mailslot_handler *dgmslot,
107 struct nbtd_interface *iface,
108 struct nbt_dgram_packet *packet,
109 const char *mailslot_name,
110 const struct socket_address *src,
111 struct nbt_netlogon_packet *netlogon)
113 struct nbt_name *name = &packet->data.msg.dest_name;
114 struct nbtd_interface *reply_iface = nbtd_find_reply_iface(iface, src->addr, false);
115 struct ldb_context *samctx;
116 const char *my_ip = reply_iface->ip_address;
118 struct nbt_netlogon_response netlogon_response;
122 DEBUG(0, ("Could not obtain own IP address for datagram socket\n"));
126 /* only answer getdc requests on the PDC or LOGON names */
127 if (name->type != NBT_NAME_PDC && name->type != NBT_NAME_LOGON) {
131 samctx = samdb_connect(packet, iface->nbtsrv->task->event_ctx, iface->nbtsrv->task->lp_ctx, anonymous_session(packet, iface->nbtsrv->task->event_ctx, iface->nbtsrv->task->lp_ctx));
132 if (samctx == NULL) {
133 DEBUG(2,("Unable to open sam in getdc reply\n"));
137 if (netlogon->req.logon.sid_size) {
138 if (strcasecmp(mailslot_name, NBT_MAILSLOT_NTLOGON) == 0) {
139 DEBUG(2,("NBT netlogon query failed because SID specified in request to NTLOGON\n"));
140 /* SID not permitted on NTLOGON (for some reason...) */
143 sid = &netlogon->req.logon.sid;
148 status = fill_netlogon_samlogon_response(samctx, packet, NULL, name->name, sid, NULL,
149 netlogon->req.logon.user_name, src->addr,
150 netlogon->req.logon.nt_version, iface->nbtsrv->task->lp_ctx, &netlogon_response.samlogon);
151 if (!NT_STATUS_IS_OK(status)) {
152 DEBUG(2,("NBT netlogon query failed domain=%s sid=%s version=%d - %s\n",
153 name->name, dom_sid_string(packet, sid), netlogon->req.logon.nt_version, nt_errstr(status)));
157 netlogon_response.response_type = NETLOGON_SAMLOGON;
159 packet->data.msg.dest_name.type = 0;
161 dgram_mailslot_netlogon_reply(reply_iface->dgmsock,
163 lp_netbios_name(iface->nbtsrv->task->lp_ctx),
164 netlogon->req.logon.mailslot_name,
170 handle incoming netlogon mailslot requests
172 void nbtd_mailslot_netlogon_handler(struct dgram_mailslot_handler *dgmslot,
173 struct nbt_dgram_packet *packet,
174 const char *mailslot_name,
175 struct socket_address *src)
177 NTSTATUS status = NT_STATUS_NO_MEMORY;
178 struct nbtd_interface *iface =
179 talloc_get_type(dgmslot->private, struct nbtd_interface);
180 struct nbt_netlogon_packet *netlogon =
181 talloc(dgmslot, struct nbt_netlogon_packet);
182 struct nbtd_iface_name *iname;
183 struct nbt_name *name = &packet->data.msg.dest_name;
185 if (netlogon == NULL) goto failed;
188 see if the we are listening on the destination netbios name
190 iname = nbtd_find_iname(iface, name, 0);
192 status = NT_STATUS_BAD_NETWORK_NAME;
196 DEBUG(2,("netlogon request to %s from %s:%d\n",
197 nbt_name_string(netlogon, name), src->addr, src->port));
198 status = dgram_mailslot_netlogon_parse_request(dgmslot, netlogon, packet, netlogon);
199 if (!NT_STATUS_IS_OK(status)) goto failed;
201 switch (netlogon->command) {
202 case LOGON_PRIMARY_QUERY:
203 nbtd_netlogon_getdc(dgmslot, iface, packet, mailslot_name,
206 case LOGON_SAM_LOGON_REQUEST:
207 nbtd_netlogon_samlogon(dgmslot, iface, packet, mailslot_name,
211 DEBUG(2,("unknown netlogon op %d from %s:%d\n",
212 netlogon->command, src->addr, src->port));
213 NDR_PRINT_DEBUG(nbt_netlogon_packet, netlogon);
217 talloc_free(netlogon);
221 DEBUG(2,("nbtd netlogon handler failed from %s:%d to %s - %s\n",
222 src->addr, src->port, nbt_name_string(netlogon, name),
224 talloc_free(netlogon);