2 Unix SMB/CIFS implementation.
4 NBT datagram netlogon server
6 Copyright (C) Andrew Tridgell 2005
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "nbt_server/nbt_server.h"
24 #include "lib/socket/socket.h"
25 #include "lib/ldb/include/ldb.h"
26 #include "dsdb/samdb/samdb.h"
27 #include "auth/auth.h"
28 #include "util/util_ldb.h"
29 #include "librpc/gen_ndr/ndr_nbt.h"
30 #include "param/param.h"
31 #include "smbd/service_task.h"
34 reply to a GETDC request
36 static void nbtd_netlogon_getdc(struct dgram_mailslot_handler *dgmslot,
37 struct nbtd_interface *iface,
38 struct nbt_dgram_packet *packet,
39 const struct socket_address *src,
40 struct nbt_netlogon_packet *netlogon)
42 struct nbt_name *name = &packet->data.msg.dest_name;
43 struct nbtd_interface *reply_iface = nbtd_find_reply_iface(iface, src->addr, false);
44 struct nbt_netlogon_packet reply;
45 struct nbt_netlogon_response_from_pdc *pdc;
46 const char *ref_attrs[] = {"nETBIOSName", NULL};
47 struct ldb_message **ref_res;
48 struct ldb_context *samctx;
49 struct ldb_dn *partitions_basedn;
52 /* only answer getdc requests on the PDC or LOGON names */
53 if (name->type != NBT_NAME_PDC && name->type != NBT_NAME_LOGON) {
57 samctx = samdb_connect(packet, iface->nbtsrv->task->event_ctx, iface->nbtsrv->task->lp_ctx, anonymous_session(packet, iface->nbtsrv->task->event_ctx, iface->nbtsrv->task->lp_ctx));
59 DEBUG(2,("Unable to open sam in getdc reply\n"));
63 partitions_basedn = samdb_partitions_dn(samctx, packet);
65 ret = gendb_search(samctx, packet, partitions_basedn, &ref_res, ref_attrs,
66 "(&(&(nETBIOSName=%s)(objectclass=crossRef))(ncName=*))",
70 DEBUG(2,("Unable to find domain reference '%s' in sam\n", name->name));
74 /* setup a GETDC reply */
76 reply.command = NETLOGON_RESPONSE_FROM_PDC;
77 pdc = &reply.req.response;
79 pdc->pdc_name = lp_netbios_name(iface->nbtsrv->task->lp_ctx);
80 pdc->unicode_pdc_name = pdc->pdc_name;
81 pdc->domain_name = samdb_result_string(ref_res[0], "nETBIOSName", name->name);;
83 pdc->lmnt_token = 0xFFFF;
84 pdc->lm20_token = 0xFFFF;
87 packet->data.msg.dest_name.type = 0;
89 dgram_mailslot_netlogon_reply(reply_iface->dgmsock,
91 lp_netbios_name(iface->nbtsrv->task->lp_ctx),
92 netlogon->req.pdc.mailslot_name,
98 reply to a ADS style GETDC request
100 static void nbtd_netlogon_getdc2(struct dgram_mailslot_handler *dgmslot,
101 struct nbtd_interface *iface,
102 struct nbt_dgram_packet *packet,
103 const struct socket_address *src,
104 struct nbt_netlogon_packet *netlogon)
106 struct nbt_name *name = &packet->data.msg.dest_name;
107 struct nbtd_interface *reply_iface = nbtd_find_reply_iface(iface, src->addr, false);
108 struct nbt_netlogon_packet reply;
109 struct nbt_netlogon_response_from_pdc2 *pdc;
110 struct ldb_context *samctx;
111 const char *ref_attrs[] = {"nETBIOSName", "dnsRoot", "ncName", NULL};
112 const char *dom_attrs[] = {"objectGUID", NULL};
113 struct ldb_message **ref_res, **dom_res;
115 const char **services = lp_server_services(iface->nbtsrv->task->lp_ctx);
116 const char *my_ip = reply_iface->ip_address;
117 struct ldb_dn *partitions_basedn;
119 DEBUG(0, ("Could not obtain own IP address for datagram socket\n"));
123 /* only answer getdc requests on the PDC or LOGON names */
124 if (name->type != NBT_NAME_PDC && name->type != NBT_NAME_LOGON) {
128 samctx = samdb_connect(packet, iface->nbtsrv->task->event_ctx, iface->nbtsrv->task->lp_ctx, anonymous_session(packet, iface->nbtsrv->task->event_ctx, iface->nbtsrv->task->lp_ctx));
129 if (samctx == NULL) {
130 DEBUG(2,("Unable to open sam in getdc reply\n"));
134 partitions_basedn = samdb_partitions_dn(samctx, packet);
136 ret = gendb_search(samctx, packet, partitions_basedn, &ref_res, ref_attrs,
137 "(&(&(nETBIOSName=%s)(objectclass=crossRef))(ncName=*))",
141 DEBUG(2,("Unable to find domain reference '%s' in sam\n", name->name));
145 /* try and find the domain */
146 ret = gendb_search_dn(samctx, packet,
147 samdb_result_dn(samctx, samctx, ref_res[0], "ncName", NULL),
148 &dom_res, dom_attrs);
150 DEBUG(2,("Unable to find domain from reference '%s' in sam\n",
151 ldb_dn_get_linearized(ref_res[0]->dn)));
155 /* setup a GETDC reply */
157 reply.command = NETLOGON_RESPONSE_FROM_PDC2;
160 /* newer testing shows that the reply command type is not
161 changed based on whether a username is given in the
162 reply. This was what was causing the w2k join to be so
164 if (netlogon->req.pdc2.user_name[0]) {
165 reply.command = NETLOGON_RESPONSE_FROM_PDC_USER;
169 pdc = &reply.req.response2;
171 /* TODO: accurately depict which services we are running */
173 NBT_SERVER_PDC | NBT_SERVER_GC |
174 NBT_SERVER_DS | NBT_SERVER_TIMESERV |
175 NBT_SERVER_CLOSEST | NBT_SERVER_WRITABLE |
176 NBT_SERVER_GOOD_TIMESERV;
178 /* hmm, probably a better way to do this */
179 if (str_list_check(services, "ldap")) {
180 pdc->server_type |= NBT_SERVER_LDAP;
183 if (str_list_check(services, "kdc")) {
184 pdc->server_type |= NBT_SERVER_KDC;
187 pdc->domain_uuid = samdb_result_guid(dom_res[0], "objectGUID");
188 pdc->forest = samdb_result_string(ref_res[0], "dnsRoot",
189 lp_realm(iface->nbtsrv->task->lp_ctx));
190 pdc->dns_domain = samdb_result_string(ref_res[0], "dnsRoot",
191 lp_realm(iface->nbtsrv->task->lp_ctx));
193 /* TODO: get our full DNS name from somewhere else */
194 pdc->pdc_dns_name = talloc_asprintf(packet, "%s.%s",
195 strlower_talloc(packet,
196 lp_netbios_name(iface->nbtsrv->task->lp_ctx)),
198 pdc->domain = samdb_result_string(ref_res[0], "nETBIOSName", name->name);;
199 pdc->pdc_name = lp_netbios_name(iface->nbtsrv->task->lp_ctx);
200 pdc->user_name = netlogon->req.pdc2.user_name;
201 /* TODO: we need to make sure these are in our DNS zone */
202 pdc->server_site = "Default-First-Site-Name";
203 pdc->client_site = "Default-First-Site-Name";
204 pdc->unknown = 0x10; /* what is this? */
205 pdc->unknown2 = 2; /* and this ... */
207 pdc->nt_version = 13;
208 pdc->lmnt_token = 0xFFFF;
209 pdc->lm20_token = 0xFFFF;
211 packet->data.msg.dest_name.type = 0;
213 dgram_mailslot_netlogon_reply(reply_iface->dgmsock,
215 lp_netbios_name(iface->nbtsrv->task->lp_ctx),
216 netlogon->req.pdc2.mailslot_name,
222 handle incoming netlogon mailslot requests
224 void nbtd_mailslot_netlogon_handler(struct dgram_mailslot_handler *dgmslot,
225 struct nbt_dgram_packet *packet,
226 struct socket_address *src)
228 NTSTATUS status = NT_STATUS_NO_MEMORY;
229 struct nbtd_interface *iface =
230 talloc_get_type(dgmslot->private, struct nbtd_interface);
231 struct nbt_netlogon_packet *netlogon =
232 talloc(dgmslot, struct nbt_netlogon_packet);
233 struct nbtd_iface_name *iname;
234 struct nbt_name *name = &packet->data.msg.dest_name;
236 if (netlogon == NULL) goto failed;
239 see if the we are listening on the destination netbios name
241 iname = nbtd_find_iname(iface, name, 0);
243 status = NT_STATUS_BAD_NETWORK_NAME;
247 DEBUG(2,("netlogon request to %s from %s:%d\n",
248 nbt_name_string(netlogon, name), src->addr, src->port));
249 status = dgram_mailslot_netlogon_parse(dgmslot, netlogon, packet, netlogon);
250 if (!NT_STATUS_IS_OK(status)) goto failed;
252 switch (netlogon->command) {
253 case NETLOGON_QUERY_FOR_PDC:
254 nbtd_netlogon_getdc(dgmslot, iface, packet, src, netlogon);
256 case NETLOGON_QUERY_FOR_PDC2:
257 nbtd_netlogon_getdc2(dgmslot, iface, packet, src, netlogon);
260 DEBUG(2,("unknown netlogon op %d from %s:%d\n",
261 netlogon->command, src->addr, src->port));
262 NDR_PRINT_DEBUG(nbt_netlogon_packet, netlogon);
266 talloc_free(netlogon);
270 DEBUG(2,("nbtd netlogon handler failed from %s:%d to %s - %s\n",
271 src->addr, src->port, nbt_name_string(netlogon, name),
273 talloc_free(netlogon);