s4: smbd: implement stream_socket_named_pipe()
authorStefan Metzmacher <metze@samba.org>
Fri, 16 May 2008 23:52:47 +0000 (01:52 +0200)
committerStefan Metzmacher <metze@samba.org>
Thu, 6 Nov 2008 20:39:13 +0000 (21:39 +0100)
For now implement just a very simple protocol
to negotiate the transport session info.

We may need to pass more info later,
e.g. client ip or name...

metze

source4/smbd/config.mk
source4/smbd/service_named_pipe.c [new file with mode: 0644]

index b5babd4d6999c51b57f9ddc6803e631d772b279d..63105d368c5549439c289e720fca67fd0fad11af 100644 (file)
@@ -2,11 +2,12 @@
 
 [SUBSYSTEM::service]
 PRIVATE_DEPENDENCIES = \
-               MESSAGING samba-socket
+               MESSAGING samba-socket NDR_NAMED_PIPE_AUTH
 
 service_OBJ_FILES = $(addprefix $(smbdsrcdir)/, \
                service.o \
                service_stream.o \
+               service_named_pipe.o \
                service_task.o)
 
 $(eval $(call proto_header_template,$(smbdsrcdir)/service_proto.h,$(service_OBJ_FILES:.o=.c)))
diff --git a/source4/smbd/service_named_pipe.c b/source4/smbd/service_named_pipe.c
new file mode 100644 (file)
index 0000000..b2b102c
--- /dev/null
@@ -0,0 +1,366 @@
+/*
+   Unix SMB/CIFS implementation.
+
+   helper functions for NAMED PIPE servers
+
+   Copyright (C) Stefan (metze) Metzmacher     2008
+
+   This program is free software; you can redistribute it and/or modify
+   it under the terms of the GNU General Public License as published by
+   the Free Software Foundation; either version 3 of the License, or
+   (at your option) any later version.
+
+   This program is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+   GNU General Public License for more details.
+
+   You should have received a copy of the GNU General Public License
+   along with this program.  If not, see <http://www.gnu.org/licenses/>.
+*/
+
+#include "includes.h"
+#include "lib/socket/socket.h"
+#include "smbd/service.h"
+#include "param/param.h"
+#include "auth/session.h"
+#include "lib/stream/packet.h"
+#include "librpc/gen_ndr/ndr_named_pipe_auth.h"
+#include "system/passwd.h"
+
+struct named_pipe_socket {
+       const char *pipe_name;
+       const char *pipe_path;
+       const struct stream_server_ops *ops;
+       void *private_data;
+};
+
+struct named_pipe_connection {
+       struct stream_connection *connection;
+       struct packet_context *packet;
+       const struct named_pipe_socket *pipe_sock;
+       NTSTATUS status;
+};
+
+static void named_pipe_handover_connection(void *private_data)
+{
+       struct named_pipe_connection *pipe_conn = talloc_get_type(
+               private_data, struct named_pipe_connection);
+       struct stream_connection *conn = pipe_conn->connection;
+
+       EVENT_FD_NOT_WRITEABLE(conn->event.fde);
+
+       if (!NT_STATUS_IS_OK(pipe_conn->status)) {
+               stream_terminate_connection(conn, nt_errstr(pipe_conn->status));
+               return;
+       }
+
+       /*
+        * remove the named_pipe layer together with its packet layer
+        */
+       conn->ops       = pipe_conn->pipe_sock->ops;
+       conn->private   = pipe_conn->pipe_sock->private_data;
+       talloc_free(pipe_conn);
+
+       /* we're now ready to start receiving events on this stream */
+       EVENT_FD_READABLE(conn->event.fde);
+
+       /*
+        * hand over to the real pipe implementation,
+        * now that we have setup the transport session_info
+        */
+       conn->ops->accept_connection(conn);
+
+       DEBUG(10,("named_pipe_handover_connection[%s]: succeeded\n",
+             conn->ops->name));
+}
+
+static NTSTATUS named_pipe_recv_auth_request(void *private_data,
+                                            DATA_BLOB req_blob)
+{
+       struct named_pipe_connection *pipe_conn = talloc_get_type(
+               private_data, struct named_pipe_connection);
+       struct stream_connection *conn = pipe_conn->connection;
+       enum ndr_err_code ndr_err;
+       struct named_pipe_auth_req req;
+       union netr_Validation val;
+       struct auth_serversupplied_info *server_info;
+       struct named_pipe_auth_rep rep;
+       DATA_BLOB rep_blob;
+       NTSTATUS status;
+
+       /*
+        * make sure nothing happens on the socket untill the
+        * real implemenation takes over
+        */
+       packet_recv_disable(pipe_conn->packet);
+
+       /*
+        * TODO: check it's a root (uid == 0) pipe
+        */
+
+       ZERO_STRUCT(rep);
+       rep.level = 0;
+       rep.status = NT_STATUS_INTERNAL_ERROR;
+
+       DEBUG(10,("named_pipe_auth: req_blob.length[%u]\n",
+                 (unsigned int)req_blob.length));
+       dump_data(10, req_blob.data, req_blob.length);
+
+       /* parse the passed credentials */
+       ndr_err = ndr_pull_struct_blob_all(
+                       &req_blob,
+                       pipe_conn,
+                       lp_iconv_convenience(conn->lp_ctx),
+                       &req,
+                       (ndr_pull_flags_fn_t)ndr_pull_named_pipe_auth_req);
+       if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
+               rep.status = ndr_map_error2ntstatus(ndr_err);
+               DEBUG(2, ("Could not unmarshall named_pipe_auth_req: %s\n",
+                         nt_errstr(rep.status)));
+               goto reply;
+       }
+
+       if (strcmp(NAMED_PIPE_AUTH_MAGIC, req.magic) != 0) {
+               DEBUG(2, ("named_pipe_auth_req: invalid magic '%s' != %s\n",
+                         req.magic, NAMED_PIPE_AUTH_MAGIC));
+               rep.status = NT_STATUS_INVALID_PARAMETER;
+               goto reply;
+       }
+
+       switch (req.level) {
+       case 0:
+               /*
+                * anon connection, we don't create a session info
+                * and leave it NULL
+                */
+               rep.level = 0;
+               rep.status = NT_STATUS_OK;
+               break;
+       case 1:
+               val.sam3 = &req.info.info1;
+
+               rep.level = 1;
+               rep.status = make_server_info_netlogon_validation(pipe_conn,
+                                                                 "TODO",
+                                                                 3, &val,
+                                                                 &server_info);
+               if (!NT_STATUS_IS_OK(rep.status)) {
+                       DEBUG(2, ("make_server_info_netlogon_validation returned "
+                                 "%s\n", nt_errstr(rep.status)));
+                       goto reply;
+               }
+
+               /* setup the session_info on the connection */
+               rep.status = auth_generate_session_info(conn,
+                                                       conn->event.ctx,
+                                                       conn->lp_ctx,
+                                                       server_info,
+                                                       &conn->session_info);
+               if (!NT_STATUS_IS_OK(rep.status)) {
+                       DEBUG(2, ("auth_generate_session_info failed: %s\n",
+                                 nt_errstr(rep.status)));
+                       goto reply;
+               }
+
+               break;
+       default:
+               DEBUG(2, ("named_pipe_auth_req: unknown level %u\n",
+                         req.level));
+               rep.level = 0;
+               rep.status = NT_STATUS_INVALID_LEVEL;
+               goto reply;
+       }
+
+reply:
+       /* create the output */
+       ndr_err = ndr_push_struct_blob(&rep_blob, pipe_conn,
+                       lp_iconv_convenience(conn->lp_ctx),
+                       &rep,
+                       (ndr_push_flags_fn_t)ndr_push_named_pipe_auth_rep);
+       if (!NDR_ERR_CODE_IS_SUCCESS(ndr_err)) {
+               status = ndr_map_error2ntstatus(ndr_err);
+               DEBUG(2, ("Could not marshall named_pipe_auth_rep: %s\n",
+                         nt_errstr(status)));
+               return status;
+       }
+
+       pipe_conn->status = rep.status;
+
+       DEBUG(10,("named_pipe_auth reply[%u]\n", rep_blob.length));
+       dump_data(10, rep_blob.data, rep_blob.length);
+       status = packet_send_callback(pipe_conn->packet, rep_blob,
+                                     named_pipe_handover_connection,
+                                     pipe_conn);
+       if (!NT_STATUS_IS_OK(status)) {
+               DEBUG(0, ("packet_send_callback returned %s\n",
+                         nt_errstr(status)));
+               return status;
+       }
+
+       return NT_STATUS_OK;
+}
+
+/*
+  called when a pipe socket becomes readable
+*/
+static void named_pipe_recv(struct stream_connection *conn, uint16_t flags)
+{
+       struct named_pipe_connection *pipe_conn = talloc_get_type(
+               conn->private, struct named_pipe_connection);
+
+       DEBUG(10,("named_pipe_recv\n"));
+
+       packet_recv(pipe_conn->packet);
+}
+
+/*
+  called when a pipe socket becomes writable
+*/
+static void named_pipe_send(struct stream_connection *conn, uint16_t flags)
+{
+       struct named_pipe_connection *pipe_conn = talloc_get_type(
+               conn->private, struct named_pipe_connection);
+
+       packet_queue_run(pipe_conn->packet);
+}
+
+/*
+  handle socket recv errors
+*/
+static void named_pipe_recv_error(void *private_data, NTSTATUS status)
+{
+       struct named_pipe_connection *pipe_conn = talloc_get_type(
+               private_data, struct named_pipe_connection);
+
+       stream_terminate_connection(pipe_conn->connection, nt_errstr(status));
+}
+
+static NTSTATUS named_pipe_full_request(void *private, DATA_BLOB blob, size_t *size)
+{
+       if (blob.length < 8) {
+               return STATUS_MORE_ENTRIES;
+       }
+
+       if (memcmp(NAMED_PIPE_AUTH_MAGIC, &blob.data[4], 4) != 0) {
+               DEBUG(0,("named_pipe_full_request: wrong protocol\n"));
+               *size = blob.length;
+               /* the error will be handled in named_pipe_recv_auth_request */
+               return NT_STATUS_OK;
+       }
+
+       *size = 4 + RIVAL(blob.data, 0);
+       if (*size > blob.length) {
+               return STATUS_MORE_ENTRIES;
+       }
+
+       return NT_STATUS_OK;
+}
+
+static void named_pipe_accept(struct stream_connection *conn)
+{
+       struct named_pipe_socket *pipe_sock = talloc_get_type(
+               conn->private, struct named_pipe_socket);
+       struct named_pipe_connection *pipe_conn;
+
+       DEBUG(5,("named_pipe_accept\n"));
+
+       pipe_conn = talloc_zero(conn, struct named_pipe_connection);
+       if (!pipe_conn) {
+               stream_terminate_connection(conn, "out of memory");
+               return;
+       }
+
+       pipe_conn->packet = packet_init(pipe_conn);
+       if (!pipe_conn->packet) {
+               stream_terminate_connection(conn, "out of memory");
+               return;
+       }
+       packet_set_private(pipe_conn->packet, pipe_conn);
+       packet_set_socket(pipe_conn->packet, conn->socket);
+       packet_set_callback(pipe_conn->packet, named_pipe_recv_auth_request);
+       packet_set_full_request(pipe_conn->packet, named_pipe_full_request);
+       packet_set_error_handler(pipe_conn->packet, named_pipe_recv_error);
+       packet_set_event_context(pipe_conn->packet, conn->event.ctx);
+       packet_set_fde(pipe_conn->packet, conn->event.fde);
+       packet_set_serialise(pipe_conn->packet);
+       packet_set_initial_read(pipe_conn->packet, 8);
+
+       pipe_conn->pipe_sock = pipe_sock;
+
+       pipe_conn->connection = conn;
+       conn->private = pipe_conn;
+}
+
+static const struct stream_server_ops named_pipe_stream_ops = {
+       .name                   = "named_pipe",
+       .accept_connection      = named_pipe_accept,
+       .recv_handler           = named_pipe_recv,
+       .send_handler           = named_pipe_send,
+};
+
+NTSTATUS stream_setup_named_pipe(struct event_context *event_context,
+                                struct loadparm_context *lp_ctx,
+                                const struct model_ops *model_ops,
+                                const struct stream_server_ops *stream_ops,
+                                const char *pipe_name,
+                                void *private_data)
+{
+       char *dirname;
+       struct named_pipe_socket *pipe_sock;
+       NTSTATUS status = NT_STATUS_NO_MEMORY;;
+
+       pipe_sock = talloc(event_context, struct named_pipe_socket);
+       if (pipe_sock == NULL) {
+               goto fail;
+       }
+
+       /* remember the details about the pipe */
+       pipe_sock->pipe_name    = talloc_strdup(pipe_sock, pipe_name);
+       if (pipe_sock->pipe_name == NULL) {
+               goto fail;
+       }
+
+       dirname = talloc_asprintf(pipe_sock, "%s/np", lp_ncalrpc_dir(lp_ctx));
+       if (dirname == NULL) {
+               goto fail;
+       }
+
+       if (!directory_create_or_exist(dirname, geteuid(), 0700)) {
+               status = map_nt_error_from_unix(errno);
+               goto fail;
+       }
+
+       if (strncmp(pipe_name, "\\pipe\\", 6) == 0) {
+               pipe_name += 6;
+       }
+
+       pipe_sock->pipe_path = talloc_asprintf(pipe_sock, "%s/%s", dirname,
+                                              pipe_name);
+       if (pipe_sock->pipe_path == NULL) {
+               goto fail;
+       }
+
+       talloc_free(dirname);
+
+       pipe_sock->ops          = stream_ops;
+       pipe_sock->private_data = talloc_reference(pipe_sock, private_data);
+
+       status = stream_setup_socket(event_context,
+                                    lp_ctx,
+                                    model_ops,
+                                    &named_pipe_stream_ops,
+                                    "unix",
+                                    pipe_sock->pipe_path,
+                                    NULL,
+                                    NULL,
+                                    pipe_sock);
+       if (!NT_STATUS_IS_OK(status)) {
+               goto fail;
+       }
+       return NT_STATUS_OK;
+
+ fail:
+       talloc_free(pipe_sock);
+       return status;
+}