5 # Copyright Matthias Dieter Wallnoefer 2009
6 # Copyright Andrew Kroeger 2009
7 # Copyright Jelmer Vernooij 2009
8 # Copyright Giampaolo Lauria 2011
10 # This program is free software; you can redistribute it and/or modify
11 # it under the terms of the GNU General Public License as published by
12 # the Free Software Foundation; either version 3 of the License, or
13 # (at your option) any later version.
15 # This program is distributed in the hope that it will be useful,
16 # but WITHOUT ANY WARRANTY; without even the implied warranty of
17 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 # GNU General Public License for more details.
20 # You should have received a copy of the GNU General Public License
21 # along with this program. If not, see <http://www.gnu.org/licenses/>.
26 import samba.getopt as options
30 from samba.net import Net, LIBNET_JOIN_AUTOMATIC
31 from samba.dcerpc.misc import SEC_CHAN_WKSTA
32 from samba.join import join_RODC, join_DC
33 from samba.auth import system_session
34 from samba.samdb import SamDB
35 from samba.dcerpc.samr import DOMAIN_PASSWORD_COMPLEX, DOMAIN_PASSWORD_STORE_CLEARTEXT
36 from samba.netcmd import (
43 from samba.dsdb import (
44 DS_DOMAIN_FUNCTION_2000,
45 DS_DOMAIN_FUNCTION_2003,
46 DS_DOMAIN_FUNCTION_2003_MIXED,
47 DS_DOMAIN_FUNCTION_2008,
48 DS_DOMAIN_FUNCTION_2008_R2,
53 class cmd_domain_dumpkeys(Command):
54 """Dumps kerberos keys of the domain into a keytab"""
55 synopsis = "%prog domain dumpkeys <keytab>"
57 takes_optiongroups = {
58 "sambaopts": options.SambaOptions,
59 "credopts": options.CredentialsOptions,
60 "versionopts": options.VersionOptions,
66 takes_args = ["keytab"]
68 def run(self, keytab, credopts=None, sambaopts=None, versionopts=None):
69 lp = sambaopts.get_loadparm()
70 net = Net(None, lp, server=credopts.ipaddress)
71 net.export_keytab(keytab=keytab)
75 class cmd_domain_join(Command):
76 """Joins domain as either member or backup domain controller [server connection needed]"""
78 synopsis = "%prog domain join <dnsdomain> [DC | RODC | MEMBER] [options]"
80 takes_optiongroups = {
81 "sambaopts": options.SambaOptions,
82 "versionopts": options.VersionOptions,
83 "credopts": options.CredentialsOptions,
87 Option("--server", help="DC to join", type=str),
88 Option("--site", help="site to join", type=str),
89 Option("--targetdir", help="where to store provision", type=str),
92 takes_args = ["domain", "role?"]
94 def run(self, domain, role=None, sambaopts=None, credopts=None,
95 versionopts=None, server=None, site=None, targetdir=None):
96 lp = sambaopts.get_loadparm()
97 creds = credopts.get_credentials(lp)
98 net = Net(creds, lp, server=credopts.ipaddress)
101 site = "Default-First-Site-Name"
103 netbios_name = lp.get("netbios name")
108 if role is None or role == "MEMBER":
109 (join_password, sid, domain_name) = net.join_member(domain,
111 LIBNET_JOIN_AUTOMATIC)
113 self.outf.write("Joined domain %s (%s)\n" % (domain_name, sid))
116 join_DC(server=server, creds=creds, lp=lp, domain=domain,
117 site=site, netbios_name=netbios_name, targetdir=targetdir)
120 join_RODC(server=server, creds=creds, lp=lp, domain=domain,
121 site=site, netbios_name=netbios_name, targetdir=targetdir)
124 raise CommandError("Invalid role %s (possible values: MEMBER, BDC, RODC)" % role)
128 class cmd_domain_level(Command):
129 """Raises domain and forest function levels"""
131 synopsis = "%prog domain level (show | raise <options>)"
133 takes_optiongroups = {
134 "sambaopts": options.SambaOptions,
135 "credopts": options.CredentialsOptions,
136 "versionopts": options.VersionOptions,
140 Option("-H", help="LDB URL for database or target server", type=str),
141 Option("--quiet", help="Be quiet", action="store_true"),
142 Option("--forest", type="choice", choices=["2003", "2008", "2008_R2"],
143 help="The forest function level (2003 | 2008 | 2008_R2)"),
146 takes_args = ["subcommand"]
148 def run(self, subcommand, H=None, forest=None, domain=None, quiet=False,
149 credopts=None, sambaopts=None, versionopts=None):
150 lp = sambaopts.get_loadparm()
151 creds = credopts.get_credentials(lp, fallback_machine=True)
153 samdb = SamDB(url=H, session_info=system_session(),
154 credentials=creds, lp=lp)
156 domain_dn = samdb.domain_dn()
158 res_forest = samdb.search("CN=Partitions,CN=Configuration," + domain_dn,
159 scope=ldb.SCOPE_BASE, attrs=["msDS-Behavior-Version"])
160 assert len(res_forest) == 1
162 res_domain = samdb.search(domain_dn, scope=ldb.SCOPE_BASE,
163 attrs=["msDS-Behavior-Version", "nTMixedDomain"])
164 assert len(res_domain) == 1
166 res_dc_s = samdb.search("CN=Sites,CN=Configuration," + domain_dn,
167 scope=ldb.SCOPE_SUBTREE, expression="(objectClass=nTDSDSA)",
168 attrs=["msDS-Behavior-Version"])
169 assert len(res_dc_s) >= 1
172 level_forest = int(res_forest[0]["msDS-Behavior-Version"][0])
173 level_domain = int(res_domain[0]["msDS-Behavior-Version"][0])
174 level_domain_mixed = int(res_domain[0]["nTMixedDomain"][0])
176 min_level_dc = int(res_dc_s[0]["msDS-Behavior-Version"][0]) # Init value
178 if int(msg["msDS-Behavior-Version"][0]) < min_level_dc:
179 min_level_dc = int(msg["msDS-Behavior-Version"][0])
181 if level_forest < 0 or level_domain < 0:
182 raise CommandError("Domain and/or forest function level(s) is/are invalid. Correct them or reprovision!")
184 raise CommandError("Lowest function level of a DC is invalid. Correct this or reprovision!")
185 if level_forest > level_domain:
186 raise CommandError("Forest function level is higher than the domain level(s). Correct this or reprovision!")
187 if level_domain > min_level_dc:
188 raise CommandError("Domain function level is higher than the lowest function level of a DC. Correct this or reprovision!")
191 raise CommandError("Could not retrieve the actual domain, forest level and/or lowest DC function level!")
193 if subcommand == "show":
194 self.message("Domain and forest function level for domain '%s'" % domain_dn)
195 if level_forest == DS_DOMAIN_FUNCTION_2000 and level_domain_mixed != 0:
196 self.message("\nATTENTION: You run SAMBA 4 on a forest function level lower than Windows 2000 (Native). This isn't supported! Please raise!")
197 if level_domain == DS_DOMAIN_FUNCTION_2000 and level_domain_mixed != 0:
198 self.message("\nATTENTION: You run SAMBA 4 on a domain function level lower than Windows 2000 (Native). This isn't supported! Please raise!")
199 if min_level_dc == DS_DOMAIN_FUNCTION_2000 and level_domain_mixed != 0:
200 self.message("\nATTENTION: You run SAMBA 4 on a lowest function level of a DC lower than Windows 2003. This isn't supported! Please step-up or upgrade the concerning DC(s)!")
204 if level_forest == DS_DOMAIN_FUNCTION_2000:
206 elif level_forest == DS_DOMAIN_FUNCTION_2003_MIXED:
207 outstr = "2003 with mixed domains/interim (NT4 DC support)"
208 elif level_forest == DS_DOMAIN_FUNCTION_2003:
210 elif level_forest == DS_DOMAIN_FUNCTION_2008:
212 elif level_forest == DS_DOMAIN_FUNCTION_2008_R2:
215 outstr = "higher than 2008 R2"
216 self.message("Forest function level: (Windows) " + outstr)
218 if level_domain == DS_DOMAIN_FUNCTION_2000 and level_domain_mixed != 0:
219 outstr = "2000 mixed (NT4 DC support)"
220 elif level_domain == DS_DOMAIN_FUNCTION_2000 and level_domain_mixed == 0:
222 elif level_domain == DS_DOMAIN_FUNCTION_2003_MIXED:
223 outstr = "2003 with mixed domains/interim (NT4 DC support)"
224 elif level_domain == DS_DOMAIN_FUNCTION_2003:
226 elif level_domain == DS_DOMAIN_FUNCTION_2008:
228 elif level_domain == DS_DOMAIN_FUNCTION_2008_R2:
231 outstr = "higher than 2008 R2"
232 self.message("Lowest function level of a DC: (Windows) " + outstr)
234 elif subcommand == "raise":
237 if domain is not None:
239 new_level_domain = DS_DOMAIN_FUNCTION_2003
240 elif domain == "2008":
241 new_level_domain = DS_DOMAIN_FUNCTION_2008
242 elif domain == "2008_R2":
243 new_level_domain = DS_DOMAIN_FUNCTION_2008_R2
245 if new_level_domain <= level_domain and level_domain_mixed == 0:
246 raise CommandError("Domain function level can't be smaller equal to the actual one!")
248 if new_level_domain > min_level_dc:
249 raise CommandError("Domain function level can't be higher than the lowest function level of a DC!")
251 # Deactivate mixed/interim domain support
252 if level_domain_mixed != 0:
253 # Directly on the base DN
255 m.dn = ldb.Dn(samdb, domain_dn)
256 m["nTMixedDomain"] = ldb.MessageElement("0",
257 ldb.FLAG_MOD_REPLACE, "nTMixedDomain")
261 m.dn = ldb.Dn(samdb, "CN=" + lp.get("workgroup")
262 + ",CN=Partitions,CN=Configuration," + domain_dn)
263 m["nTMixedDomain"] = ldb.MessageElement("0",
264 ldb.FLAG_MOD_REPLACE, "nTMixedDomain")
267 except ldb.LdbError, (enum, emsg):
268 if enum != ldb.ERR_UNWILLING_TO_PERFORM:
271 # Directly on the base DN
273 m.dn = ldb.Dn(samdb, domain_dn)
274 m["msDS-Behavior-Version"]= ldb.MessageElement( str(new_level_domain), ldb.FLAG_MOD_REPLACE,
275 "msDS-Behavior-Version")
279 m.dn = ldb.Dn(samdb, "CN=" + lp.get("workgroup")
280 + ",CN=Partitions,CN=Configuration," + domain_dn)
281 m["msDS-Behavior-Version"]= ldb.MessageElement(
282 str(new_level_domain), ldb.FLAG_MOD_REPLACE,
283 "msDS-Behavior-Version")
286 except ldb.LdbError, (enum, emsg):
287 if enum != ldb.ERR_UNWILLING_TO_PERFORM:
290 level_domain = new_level_domain
291 msgs.append("Domain function level changed!")
293 if forest is not None:
295 new_level_forest = DS_DOMAIN_FUNCTION_2003
296 elif forest == "2008":
297 new_level_forest = DS_DOMAIN_FUNCTION_2008
298 elif forest == "2008_R2":
299 new_level_forest = DS_DOMAIN_FUNCTION_2008_R2
300 if new_level_forest <= level_forest:
301 raise CommandError("Forest function level can't be smaller equal to the actual one!")
302 if new_level_forest > level_domain:
303 raise CommandError("Forest function level can't be higher than the domain function level(s). Please raise it/them first!")
305 m.dn = ldb.Dn(samdb, "CN=Partitions,CN=Configuration,"
307 m["msDS-Behavior-Version"]= ldb.MessageElement(
308 str(new_level_forest), ldb.FLAG_MOD_REPLACE,
309 "msDS-Behavior-Version")
311 msgs.append("Forest function level changed!")
312 msgs.append("All changes applied successfully!")
313 self.message("\n".join(msgs))
315 raise CommandError("Wrong argument '%s'!" % subcommand)
319 class cmd_domain_machinepassword(Command):
320 """Gets a machine password out of our SAM"""
322 synopsis = "%prog domain machinepassword <accountname>"
324 takes_optiongroups = {
325 "sambaopts": options.SambaOptions,
326 "versionopts": options.VersionOptions,
327 "credopts": options.CredentialsOptions,
330 takes_args = ["secret"]
332 def run(self, secret, sambaopts=None, credopts=None, versionopts=None):
333 lp = sambaopts.get_loadparm()
334 creds = credopts.get_credentials(lp, fallback_machine=True)
335 name = lp.get("secrets database")
336 path = lp.get("private dir")
337 url = os.path.join(path, name)
338 if not os.path.exists(url):
339 raise CommandError("secret database not found at %s " % url)
340 secretsdb = Ldb(url=url, session_info=system_session(),
341 credentials=creds, lp=lp)
342 result = secretsdb.search(attrs=["secret"],
343 expression="(&(objectclass=primaryDomain)(samaccountname=%s))" % secret)
346 raise CommandError("search returned %d records, expected 1" % len(result))
348 self.outf.write("%s\n" % result[0]["secret"])
352 class cmd_domain_passwordsettings(Command):
353 """Sets password settings
355 Password complexity, history length, minimum password length, the minimum
356 and maximum password age) on a Samba4 server.
359 synopsis = "%prog domain passwordsettings (show | set <options>)"
361 takes_optiongroups = {
362 "sambaopts": options.SambaOptions,
363 "versionopts": options.VersionOptions,
364 "credopts": options.CredentialsOptions,
368 Option("-H", help="LDB URL for database or target server", type=str),
369 Option("--quiet", help="Be quiet", action="store_true"),
370 Option("--complexity", type="choice", choices=["on","off","default"],
371 help="The password complexity (on | off | default). Default is 'on'"),
372 Option("--store-plaintext", type="choice", choices=["on","off","default"],
373 help="Store plaintext passwords where account have 'store passwords with reversible encryption' set (on | off | default). Default is 'off'"),
374 Option("--history-length",
375 help="The password history length (<integer> | default). Default is 24.", type=str),
376 Option("--min-pwd-length",
377 help="The minimum password length (<integer> | default). Default is 7.", type=str),
378 Option("--min-pwd-age",
379 help="The minimum password age (<integer in days> | default). Default is 1.", type=str),
380 Option("--max-pwd-age",
381 help="The maximum password age (<integer in days> | default). Default is 43.", type=str),
384 takes_args = ["subcommand"]
386 def run(self, subcommand, H=None, min_pwd_age=None, max_pwd_age=None,
387 quiet=False, complexity=None, store_plaintext=None, history_length=None,
388 min_pwd_length=None, credopts=None, sambaopts=None,
390 lp = sambaopts.get_loadparm()
391 creds = credopts.get_credentials(lp)
393 samdb = SamDB(url=H, session_info=system_session(),
394 credentials=creds, lp=lp)
396 domain_dn = samdb.domain_dn()
397 res = samdb.search(domain_dn, scope=ldb.SCOPE_BASE,
398 attrs=["pwdProperties", "pwdHistoryLength", "minPwdLength",
399 "minPwdAge", "maxPwdAge"])
400 assert(len(res) == 1)
402 pwd_props = int(res[0]["pwdProperties"][0])
403 pwd_hist_len = int(res[0]["pwdHistoryLength"][0])
404 cur_min_pwd_len = int(res[0]["minPwdLength"][0])
406 cur_min_pwd_age = int(abs(int(res[0]["minPwdAge"][0])) / (1e7 * 60 * 60 * 24))
407 cur_max_pwd_age = int(abs(int(res[0]["maxPwdAge"][0])) / (1e7 * 60 * 60 * 24))
409 raise CommandError("Could not retrieve password properties!", e)
411 if subcommand == "show":
412 self.message("Password informations for domain '%s'" % domain_dn)
414 if pwd_props & DOMAIN_PASSWORD_COMPLEX != 0:
415 self.message("Password complexity: on")
417 self.message("Password complexity: off")
418 if pwd_props & DOMAIN_PASSWORD_STORE_CLEARTEXT != 0:
419 self.message("Store plaintext passwords: on")
421 self.message("Store plaintext passwords: off")
422 self.message("Password history length: %d" % pwd_hist_len)
423 self.message("Minimum password length: %d" % cur_min_pwd_len)
424 self.message("Minimum password age (days): %d" % cur_min_pwd_age)
425 self.message("Maximum password age (days): %d" % cur_max_pwd_age)
426 elif subcommand == "set":
429 m.dn = ldb.Dn(samdb, domain_dn)
431 if complexity is not None:
432 if complexity == "on" or complexity == "default":
433 pwd_props = pwd_props | DOMAIN_PASSWORD_COMPLEX
434 msgs.append("Password complexity activated!")
435 elif complexity == "off":
436 pwd_props = pwd_props & (~DOMAIN_PASSWORD_COMPLEX)
437 msgs.append("Password complexity deactivated!")
439 if store_plaintext is not None:
440 if store_plaintext == "on" or store_plaintext == "default":
441 pwd_props = pwd_props | DOMAIN_PASSWORD_STORE_CLEARTEXT
442 msgs.append("Plaintext password storage for changed passwords activated!")
443 elif store_plaintext == "off":
444 pwd_props = pwd_props & (~DOMAIN_PASSWORD_STORE_CLEARTEXT)
445 msgs.append("Plaintext password storage for changed passwords deactivated!")
447 if complexity is not None or store_plaintext is not None:
448 m["pwdProperties"] = ldb.MessageElement(str(pwd_props),
449 ldb.FLAG_MOD_REPLACE, "pwdProperties")
451 if history_length is not None:
452 if history_length == "default":
455 pwd_hist_len = int(history_length)
457 if pwd_hist_len < 0 or pwd_hist_len > 24:
458 raise CommandError("Password history length must be in the range of 0 to 24!")
460 m["pwdHistoryLength"] = ldb.MessageElement(str(pwd_hist_len),
461 ldb.FLAG_MOD_REPLACE, "pwdHistoryLength")
462 msgs.append("Password history length changed!")
464 if min_pwd_length is not None:
465 if min_pwd_length == "default":
468 min_pwd_len = int(min_pwd_length)
470 if min_pwd_len < 0 or min_pwd_len > 14:
471 raise CommandError("Minimum password length must be in the range of 0 to 14!")
473 m["minPwdLength"] = ldb.MessageElement(str(min_pwd_len),
474 ldb.FLAG_MOD_REPLACE, "minPwdLength")
475 msgs.append("Minimum password length changed!")
477 if min_pwd_age is not None:
478 if min_pwd_age == "default":
481 min_pwd_age = int(min_pwd_age)
483 if min_pwd_age < 0 or min_pwd_age > 998:
484 raise CommandError("Minimum password age must be in the range of 0 to 998!")
487 min_pwd_age_ticks = -int(min_pwd_age * (24 * 60 * 60 * 1e7))
489 m["minPwdAge"] = ldb.MessageElement(str(min_pwd_age_ticks),
490 ldb.FLAG_MOD_REPLACE, "minPwdAge")
491 msgs.append("Minimum password age changed!")
493 if max_pwd_age is not None:
494 if max_pwd_age == "default":
497 max_pwd_age = int(max_pwd_age)
499 if max_pwd_age < 0 or max_pwd_age > 999:
500 raise CommandError("Maximum password age must be in the range of 0 to 999!")
503 max_pwd_age_ticks = -int(max_pwd_age * (24 * 60 * 60 * 1e7))
505 m["maxPwdAge"] = ldb.MessageElement(str(max_pwd_age_ticks),
506 ldb.FLAG_MOD_REPLACE, "maxPwdAge")
507 msgs.append("Maximum password age changed!")
509 if max_pwd_age > 0 and min_pwd_age >= max_pwd_age:
510 raise CommandError("Maximum password age (%d) must be greater than minimum password age (%d)!" % (max_pwd_age, min_pwd_age))
513 msgs.append("All changes applied successfully!")
514 self.message("\n".join(msgs))
516 raise CommandError("Wrong argument '%s'!" % subcommand)
520 class cmd_domain(SuperCommand):
521 """Domain management"""
524 subcommands["dumpkeys"] = cmd_domain_dumpkeys()
525 subcommands["join"] = cmd_domain_join()
526 subcommands["level"] = cmd_domain_level()
527 subcommands["machinepassword"] = cmd_domain_machinepassword()
528 subcommands["passwordsettings"] = cmd_domain_passwordsettings()