2 Unix SMB/CIFS implementation.
4 Winbind daemon for ntdom nss module
6 Copyright (C) Tim Potter 2000
7 Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2003
9 This library is free software; you can redistribute it and/or
10 modify it under the terms of the GNU Lesser General Public
11 License as published by the Free Software Foundation; either
12 version 3 of the License, or (at your option) any later version.
14 This library is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 Library General Public License for more details.
19 You should have received a copy of the GNU Lesser General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
26 #include "nsswitch/winbind_struct_protocol.h"
27 #include "nsswitch/libwbclient/wbclient.h"
28 #include "librpc/gen_ndr/dcerpc.h"
29 #include "librpc/gen_ndr/winbind.h"
31 #include "talloc_dict.h"
33 #include "../lib/util/tevent_ntstatus.h"
39 #ifdef HAVE_SYS_MMAN_H
44 #define DBGC_CLASS DBGC_WINBIND
46 #define WB_REPLACE_CHAR '_'
53 enum lsa_SidType type;
56 struct winbindd_cli_state {
57 struct winbindd_cli_state *prev, *next; /* Linked list pointers */
58 int sock; /* Open socket from client */
59 pid_t pid; /* pid of client */
60 time_t last_access; /* Time of last access (read or write) */
61 bool privileged; /* Is the client 'privileged' */
63 TALLOC_CTX *mem_ctx; /* memory per request */
65 NTSTATUS (*recv_fn)(struct tevent_req *req,
66 struct winbindd_response *presp);
67 struct winbindd_request *request; /* Request from client */
68 struct tevent_queue *out_queue;
69 struct winbindd_response *response; /* Respose to client */
70 struct tevent_req *io_req; /* wb_req_read_* or wb_resp_write_* */
72 struct getpwent_state *pwent_state; /* State for getpwent() */
73 struct getgrent_state *grent_state; /* State for getgrent() */
76 struct getpwent_state {
77 struct winbindd_domain *domain;
79 struct wbint_RidArray rids;
82 struct getgrent_state {
83 struct winbindd_domain *domain;
86 struct wbint_Principal *groups;
89 /* Storage for cached getpwent() user entries */
91 struct getpwent_user {
92 fstring name; /* Account name */
93 fstring gecos; /* User information */
94 fstring homedir; /* User Home Directory */
95 fstring shell; /* User Login Shell */
96 struct dom_sid user_sid; /* NT user and primary group SIDs */
97 struct dom_sid group_sid;
100 /* Our connection to the DC */
102 struct winbindd_cm_conn {
103 struct cli_state *cli;
105 enum dcerpc_AuthLevel auth_level;
107 struct rpc_pipe_client *samr_pipe;
108 struct policy_handle sam_connect_handle, sam_domain_handle;
110 struct rpc_pipe_client *lsa_pipe;
111 struct rpc_pipe_client *lsa_pipe_tcp;
112 struct policy_handle lsa_policy;
114 struct rpc_pipe_client *netlogon_pipe;
115 struct netlogon_creds_cli_context *netlogon_creds;
116 uint32_t netlogon_flags;
117 bool netlogon_force_reauth;
122 struct winbindd_domain;
124 struct winbindd_child_dispatch_table {
126 enum winbindd_cmd struct_cmd;
127 enum winbindd_result (*struct_fn)(struct winbindd_domain *domain,
128 struct winbindd_cli_state *state);
131 struct winbindd_child {
132 struct winbindd_child *next, *prev;
135 struct winbindd_domain *domain;
139 struct tevent_queue *queue;
140 struct dcerpc_binding_handle *binding_handle;
142 struct tevent_timer *lockout_policy_event;
143 struct tevent_timer *machine_password_change_event;
145 const struct winbindd_child_dispatch_table *table;
148 /* Structures to hold per domain information */
150 struct winbindd_domain {
151 char *name; /* Domain name (NetBIOS) */
152 char *alt_name; /* alt Domain name, if any (FQDN for ADS) */
153 char *forest_name; /* Name of the AD forest we're in */
154 struct dom_sid sid; /* SID for this domain */
155 uint32_t domain_flags; /* Domain flags from netlogon.h */
156 uint32_t domain_type; /* Domain type from netlogon.h */
157 uint32_t domain_trust_attribs; /* Trust attribs from netlogon.h */
158 bool initialized; /* Did we already ask for the domain mode? */
159 bool native_mode; /* is this a win2k domain in native mode ? */
160 bool active_directory; /* is this a win2k active directory ? */
161 bool primary; /* is this our primary domain ? */
162 bool internal; /* BUILTIN and member SAM */
163 bool rodc; /* Are we an RODC for this AD domain? (do some operations locally) */
164 bool online; /* is this domain available ? */
165 time_t startup_time; /* When we set "startup" true. monotonic clock */
166 bool startup; /* are we in the first 30 seconds after startup_time ? */
168 bool can_do_ncacn_ip_tcp;
171 * Lookup methods for this domain (LDAP or RPC). The backend
172 * methods are used by the cache layer.
174 struct winbindd_methods *backend;
176 /* Private data for the backends (used for connection cache) */
181 pid_t dc_probe_pid; /* Child we're using to detect the DC. */
183 struct sockaddr_storage dcaddr;
185 /* Sequence number stuff */
187 time_t last_seq_check;
188 uint32_t sequence_number;
189 NTSTATUS last_status;
191 /* The smb connection */
193 struct winbindd_cm_conn conn;
195 /* The child pid we're talking to */
197 struct winbindd_child *children;
199 /* Callback we use to try put us back online. */
201 uint32_t check_online_timeout;
202 struct tevent_timer *check_online_event;
204 /* Linked list info */
206 struct winbindd_domain *prev, *next;
209 struct wb_acct_info {
210 fstring acct_name; /* account name */
211 fstring acct_desc; /* account name */
212 uint32_t rid; /* domain-relative RID */
215 /* per-domain methods. This is how LDAP vs RPC is selected
217 struct winbindd_methods {
218 /* does this backend provide a consistent view of the data? (ie. is the primary group
222 /* get a list of users, returning a wbint_userinfo for each one */
223 NTSTATUS (*query_user_list)(struct winbindd_domain *domain,
225 uint32_t *num_entries,
226 struct wbint_userinfo **info);
228 /* get a list of domain groups */
229 NTSTATUS (*enum_dom_groups)(struct winbindd_domain *domain,
231 uint32_t *num_entries,
232 struct wb_acct_info **info);
234 /* get a list of domain local groups */
235 NTSTATUS (*enum_local_groups)(struct winbindd_domain *domain,
237 uint32_t *num_entries,
238 struct wb_acct_info **info);
240 /* convert one user or group name to a sid */
241 NTSTATUS (*name_to_sid)(struct winbindd_domain *domain,
243 const char *domain_name,
247 enum lsa_SidType *type);
249 /* convert a sid to a user or group name */
250 NTSTATUS (*sid_to_name)(struct winbindd_domain *domain,
252 const struct dom_sid *sid,
255 enum lsa_SidType *type);
257 NTSTATUS (*rids_to_names)(struct winbindd_domain *domain,
259 const struct dom_sid *domain_sid,
264 enum lsa_SidType **types);
266 /* lookup all groups that a user is a member of. The backend
267 can also choose to lookup by username or rid for this
269 NTSTATUS (*lookup_usergroups)(struct winbindd_domain *domain,
271 const struct dom_sid *user_sid,
272 uint32_t *num_groups, struct dom_sid **user_gids);
274 /* Lookup all aliases that the sids delivered are member of. This is
275 * to implement 'domain local groups' correctly */
276 NTSTATUS (*lookup_useraliases)(struct winbindd_domain *domain,
279 const struct dom_sid *sids,
280 uint32_t *num_aliases,
281 uint32_t **alias_rids);
283 /* find all members of the group with the specified group_rid */
284 NTSTATUS (*lookup_groupmem)(struct winbindd_domain *domain,
286 const struct dom_sid *group_sid,
287 enum lsa_SidType type,
289 struct dom_sid **sid_mem, char ***names,
290 uint32_t **name_types);
292 /* return the current global sequence number */
293 NTSTATUS (*sequence_number)(struct winbindd_domain *domain, uint32_t *seq);
295 /* return the lockout policy */
296 NTSTATUS (*lockout_policy)(struct winbindd_domain *domain,
298 struct samr_DomInfo12 *lockout_policy);
300 /* return the lockout policy */
301 NTSTATUS (*password_policy)(struct winbindd_domain *domain,
303 struct samr_DomInfo1 *password_policy);
305 /* enumerate trusted domains */
306 NTSTATUS (*trusted_domains)(struct winbindd_domain *domain,
308 struct netr_DomainTrustList *trusts);
311 /* Filled out by IDMAP backends */
312 struct winbindd_idmap_methods {
313 /* Called when backend is first loaded */
316 bool (*get_sid_from_uid)(uid_t uid, struct dom_sid *sid);
317 bool (*get_sid_from_gid)(gid_t gid, struct dom_sid *sid);
319 bool (*get_uid_from_sid)(struct dom_sid *sid, uid_t *uid);
320 bool (*get_gid_from_sid)(struct dom_sid *sid, gid_t *gid);
322 /* Called when backend is unloaded */
324 /* Called to dump backend status */
325 void (*status)(void);
328 /* Data structures for dealing with the trusted domain cache */
330 struct winbindd_tdc_domain {
331 const char *domain_name;
332 const char *dns_name;
334 uint32_t trust_flags;
335 uint32_t trust_attribs;
339 struct WINBINDD_MEMORY_CREDS {
340 struct WINBINDD_MEMORY_CREDS *next, *prev;
341 const char *username; /* lookup key. */
345 uint8_t *nt_hash; /* Base pointer for the following 2 */
350 struct WINBINDD_CCACHE_ENTRY {
351 struct WINBINDD_CCACHE_ENTRY *next, *prev;
352 const char *principal_name;
355 const char *username;
357 struct WINBINDD_MEMORY_CREDS *cred_ptr;
363 struct tevent_timer *event;
366 #include "winbindd/winbindd_proto.h"
368 #define WINBINDD_ESTABLISH_LOOP 30
369 #define WINBINDD_RESCAN_FREQ lp_winbind_cache_time()
370 #define WINBINDD_PAM_AUTH_KRB5_RENEW_TIME 2592000 /* one month */
371 #define DOM_SEQUENCE_NONE ((uint32_t)-1)
373 #endif /* _WINBINDD_H */