2 Unix SMB/CIFS implementation.
4 Winbind daemon connection manager
6 Copyright (C) Tim Potter 2001
7 Copyright (C) Andrew Bartlett 2002
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program; if not, write to the Free Software
21 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
25 We need to manage connections to domain controllers without having to
26 mess up the main winbindd code with other issues. The aim of the
27 connection manager is to:
29 - make connections to domain controllers and cache them
30 - re-establish connections when networks or servers go down
31 - centralise the policy on connection timeouts, domain controller
33 - manage re-entrancy for when winbindd becomes able to handle
34 multiple outstanding rpc requests
36 Why not have connection management as part of the rpc layer like tng?
37 Good question. This code may morph into libsmb/rpc_cache.c or something
38 like that but at the moment it's simply staying as part of winbind. I
39 think the TNG architecture of forcing every user of the rpc layer to use
40 the connection caching system is a bad idea. It should be an optional
41 method of using the routines.
43 The TNG design is quite good but I disagree with some aspects of the
51 - I'm pretty annoyed by all the make_nmb_name() stuff. It should be
52 moved down into another function.
54 - Take care when destroying cli_structs as they can be shared between
62 #define DBGC_CLASS DBGC_WINBIND
64 /* Global list of connections. Initially a DLIST but can become a hash
65 table or whatever later. */
67 struct winbindd_cm_conn {
68 struct winbindd_cm_conn *prev, *next;
72 size_t mutex_ref_count;
73 struct cli_state *cli;
77 static struct winbindd_cm_conn *cm_conns = NULL;
79 /* Get a domain controller name. Cache positive and negative lookups so we
80 don't go to the network too often when something is badly broken. */
82 #define GET_DC_NAME_CACHE_TIMEOUT 30 /* Seconds between dc lookups */
84 struct get_dc_name_cache {
88 struct get_dc_name_cache *prev, *next;
92 find the DC for a domain using methods appropriate for a ADS domain
94 static BOOL cm_ads_find_dc(const char *domain, struct in_addr *dc_ip, fstring srv_name)
97 const char *realm = domain;
99 if (strcasecmp(realm, lp_workgroup()) == 0)
102 ads = ads_init(realm, domain, NULL);
106 /* we don't need to bind, just connect */
107 ads->auth.flags |= ADS_AUTH_NO_BIND;
109 DEBUG(4,("cm_ads_find_dc: domain=%s\n", domain));
112 /* a full ads_connect() is actually overkill, as we don't srictly need
113 to do the SASL auth in order to get the info we need, but libads
114 doesn't offer a better way right now */
118 if (!ads->config.realm)
121 fstrcpy(srv_name, ads->config.ldap_server_name);
123 *dc_ip = ads->ldap_ip;
126 DEBUG(4,("cm_ads_find_dc: using server='%s' IP=%s\n",
127 srv_name, inet_ntoa(*dc_ip)));
132 /**********************************************************************
133 wrapper around ads and rpc methods of finds DC's
134 **********************************************************************/
136 static BOOL cm_get_dc_name(const char *domain, fstring srv_name,
137 struct in_addr *ip_out)
139 struct in_addr dc_ip;
145 if (lp_security() == SEC_ADS)
146 ret = cm_ads_find_dc(domain, &dc_ip, srv_name);
149 /* fall back on rpc methods if the ADS methods fail */
150 ret = rpc_dc_name(domain, srv_name, &dc_ip);
158 /* Choose between anonymous or authenticated connections. We need to use
159 an authenticated connection if DCs have the RestrictAnonymous registry
160 entry set > 0, or the "Additional restrictions for anonymous
161 connections" set in the win2k Local Security Policy.
163 Caller to free() result in domain, username, password
166 static void cm_get_ipc_userpass(char **username, char **domain, char **password)
168 *username = secrets_fetch(SECRETS_AUTH_USER, NULL);
169 *domain = secrets_fetch(SECRETS_AUTH_DOMAIN, NULL);
170 *password = secrets_fetch(SECRETS_AUTH_PASSWORD, NULL);
172 if (*username && **username) {
174 if (!*domain || !**domain)
175 *domain = smb_xstrdup(lp_workgroup());
177 if (!*password || !**password)
178 *password = smb_xstrdup("");
180 DEBUG(3, ("IPC$ connections done by user %s\\%s\n",
181 *domain, *username));
184 DEBUG(3, ("IPC$ connections done anonymously\n"));
185 *username = smb_xstrdup("");
186 *domain = smb_xstrdup("");
187 *password = smb_xstrdup("");
191 /* Open a connction to the remote server, cache failures for 30 seconds */
193 static NTSTATUS cm_open_connection(const char *domain, const int pipe_index,
194 struct winbindd_cm_conn *new_conn)
197 char *ipc_username, *ipc_domain, *ipc_password;
198 struct in_addr dc_ip;
204 fstrcpy(new_conn->domain, domain);
205 fstrcpy(new_conn->pipe_name, get_pipe_name_from_index(pipe_index));
207 /* connection failure cache has been moved inside of rpc_dc_name
208 so we can deal with half dead DC's --jerry */
210 if (!cm_get_dc_name(domain, new_conn->controller, &dc_ip)) {
211 result = NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND;
212 add_failed_connection_entry(domain, "", result);
216 /* Initialise SMB connection */
218 cm_get_ipc_userpass(&ipc_username, &ipc_domain, &ipc_password);
220 DEBUG(5, ("connecting to %s from %s with username [%s]\\[%s]\n",
221 new_conn->controller, global_myname(), ipc_domain, ipc_username));
223 for (i = 0; retry && (i < 3); i++) {
225 if (!(got_mutex = secrets_named_mutex(new_conn->controller, WINBIND_SERVER_MUTEX_WAIT_TIME))) {
226 DEBUG(0,("cm_open_connection: mutex grab failed for %s\n", new_conn->controller));
227 result = NT_STATUS_POSSIBLE_DEADLOCK;
231 result = cli_full_connection(&new_conn->cli, global_myname(), new_conn->controller,
232 &dc_ip, 0, "IPC$", "IPC", ipc_username, ipc_domain,
233 ipc_password, CLI_FULL_CONNECTION_ANNONYMOUS_FALLBACK, &retry);
235 secrets_named_mutex_release(new_conn->controller);
237 if (NT_STATUS_IS_OK(result))
241 SAFE_FREE(ipc_username);
242 SAFE_FREE(ipc_domain);
243 SAFE_FREE(ipc_password);
245 if (!NT_STATUS_IS_OK(result)) {
246 add_failed_connection_entry(domain, new_conn->controller, result);
250 if ( !cli_nt_session_open (new_conn->cli, pipe_index) ) {
251 result = NT_STATUS_PIPE_NOT_AVAILABLE;
253 * only cache a failure if we are not trying to open the
254 * **win2k** specific lsarpc UUID. This could be an NT PDC
255 * and therefore a failure is normal. This should probably
256 * be abstracted to a check for 2k specific pipes and wondering
257 * if the PDC is an NT4 box. but since there is only one 2k
258 * specific UUID right now, i'm not going to bother. --jerry
260 if ( !is_win2k_pipe(pipe_index) )
261 add_failed_connection_entry(domain, new_conn->controller, result);
262 cli_shutdown(new_conn->cli);
269 /* Return true if a connection is still alive */
271 static BOOL connection_ok(struct winbindd_cm_conn *conn)
274 smb_panic("Invalid parameter passed to connection_ok(): conn was NULL!\n");
279 DEBUG(3, ("Connection to %s for domain %s (pipe %s) has NULL conn->cli!\n",
280 conn->controller, conn->domain, conn->pipe_name));
284 if (!conn->cli->initialised) {
285 DEBUG(3, ("Connection to %s for domain %s (pipe %s) was never initialised!\n",
286 conn->controller, conn->domain, conn->pipe_name));
290 if (conn->cli->fd == -1) {
291 DEBUG(3, ("Connection to %s for domain %s (pipe %s) has died or was never started (fd == -1)\n",
292 conn->controller, conn->domain, conn->pipe_name));
299 /* Search the cache for a connection. If there is a broken one,
300 shut it down properly and return NULL. */
302 static void find_cm_connection(const char *domain, const char *pipe_name,
303 struct winbindd_cm_conn **conn_out)
305 struct winbindd_cm_conn *conn;
307 for (conn = cm_conns; conn; ) {
308 if (strequal(conn->domain, domain) &&
309 strequal(conn->pipe_name, pipe_name)) {
310 if (!connection_ok(conn)) {
311 /* Dead connection - remove it. */
312 struct winbindd_cm_conn *conn_temp = conn->next;
314 cli_shutdown(conn->cli);
315 DLIST_REMOVE(cm_conns, conn);
317 conn = conn_temp; /* Keep the loop moving */
329 /* Initialize a new connection up to the RPC BIND. */
331 static NTSTATUS new_cm_connection(const char *domain, const char *pipe_name,
332 struct winbindd_cm_conn **conn_out)
334 struct winbindd_cm_conn *conn;
337 if (!(conn = malloc(sizeof(*conn))))
338 return NT_STATUS_NO_MEMORY;
342 if (!NT_STATUS_IS_OK(result = cm_open_connection(domain, get_pipe_index(pipe_name), conn))) {
343 DEBUG(3, ("Could not open a connection to %s for %s (%s)\n",
344 domain, pipe_name, nt_errstr(result)));
348 DLIST_ADD(cm_conns, conn);
354 /* Get a connection to the remote DC and open the pipe. If there is already a connection, use that */
356 static NTSTATUS get_connection_from_cache(const char *domain, const char *pipe_name,
357 struct winbindd_cm_conn **conn_out)
359 find_cm_connection(domain, pipe_name, conn_out);
361 if (*conn_out != NULL)
364 return new_cm_connection(domain, pipe_name, conn_out);
367 /**********************************************************************************
368 **********************************************************************************/
370 BOOL cm_check_for_native_mode_win2k( const char *domain )
373 struct winbindd_cm_conn conn;
381 if ( !NT_STATUS_IS_OK(result = cm_open_connection(domain, PI_LSARPC_DS, &conn)) ) {
382 DEBUG(5, ("cm_check_for_native_mode_win2k: Could not open a connection to %s for PIPE_LSARPC (%s)\n",
383 domain, nt_errstr(result)));
388 if ( !NT_STATUS_IS_OK(cli_ds_getprimarydominfo( conn.cli,
389 conn.cli->mem_ctx, DsRolePrimaryDomainInfoBasic, &ctr)) ) {
395 if ( (ctr.basic->flags & DSROLE_PRIMARY_DS_RUNNING)
396 && !(ctr.basic->flags & DSROLE_PRIMARY_DS_MIXED_MODE) )
403 * I don't think we need to shutdown here ? JRA.
406 cli_shutdown( conn.cli );
414 /* Return a LSA policy handle on a domain */
416 NTSTATUS cm_get_lsa_handle(const char *domain, CLI_POLICY_HND **return_hnd)
418 struct winbindd_cm_conn *conn;
419 uint32 des_access = SEC_RIGHTS_MAXIMUM_ALLOWED;
421 static CLI_POLICY_HND hnd;
423 /* Look for existing connections */
425 if (!NT_STATUS_IS_OK(result = get_connection_from_cache(domain, PIPE_LSARPC, &conn)))
428 /* This *shitty* code needs scrapping ! JRA */
430 if (policy_handle_is_valid(&conn->pol)) {
438 result = cli_lsa_open_policy(conn->cli, conn->cli->mem_ctx, False,
439 des_access, &conn->pol);
441 if (!NT_STATUS_IS_OK(result)) {
442 /* Hit the cache code again. This cleans out the old connection and gets a new one */
443 if (conn->cli->fd == -1) { /* Try again, if the remote host disapeared */
444 if (!NT_STATUS_IS_OK(result = get_connection_from_cache(domain, PIPE_LSARPC, &conn)))
447 result = cli_lsa_open_policy(conn->cli, conn->cli->mem_ctx, False,
448 des_access, &conn->pol);
451 if (!NT_STATUS_IS_OK(result)) {
452 cli_shutdown(conn->cli);
453 DLIST_REMOVE(cm_conns, conn);
467 /* Return a SAM policy handle on a domain */
469 NTSTATUS cm_get_sam_handle(char *domain, CLI_POLICY_HND **return_hnd)
471 struct winbindd_cm_conn *conn;
472 uint32 des_access = SEC_RIGHTS_MAXIMUM_ALLOWED;
474 static CLI_POLICY_HND hnd;
476 /* Look for existing connections */
478 if (!NT_STATUS_IS_OK(result = get_connection_from_cache(domain, PIPE_SAMR, &conn)))
481 /* This *shitty* code needs scrapping ! JRA */
483 if (policy_handle_is_valid(&conn->pol)) {
492 result = cli_samr_connect(conn->cli, conn->cli->mem_ctx,
493 des_access, &conn->pol);
495 if (!NT_STATUS_IS_OK(result)) {
496 /* Hit the cache code again. This cleans out the old connection and gets a new one */
497 if (conn->cli->fd == -1) { /* Try again, if the remote host disapeared */
499 if (!NT_STATUS_IS_OK(result = get_connection_from_cache(domain, PIPE_SAMR, &conn)))
502 result = cli_samr_connect(conn->cli, conn->cli->mem_ctx,
503 des_access, &conn->pol);
506 if (!NT_STATUS_IS_OK(result)) {
508 cli_shutdown(conn->cli);
509 DLIST_REMOVE(cm_conns, conn);
524 /* Get a handle on a netlogon pipe. This is a bit of a hack to re-use the
525 netlogon pipe as no handle is returned. */
527 NTSTATUS cm_get_netlogon_cli(const char *domain,
528 const unsigned char *trust_passwd,
529 uint32 sec_channel_type,
531 struct cli_state **cli)
533 NTSTATUS result = NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND;
534 struct winbindd_cm_conn *conn;
539 return NT_STATUS_INVALID_PARAMETER;
541 /* Open an initial conection - keep the mutex. */
543 find_cm_connection(domain, PIPE_NETLOGON, &conn);
545 if ( fresh && (conn != NULL) ) {
546 cli_shutdown(conn->cli);
551 /* purge connection from cache */
552 find_cm_connection(domain, PIPE_NETLOGON, &conn);
554 DEBUG(0,("Could not purge connection\n"));
555 return NT_STATUS_UNSUCCESSFUL;
564 result = new_cm_connection(domain, PIPE_NETLOGON, &conn);
566 if (!NT_STATUS_IS_OK(result))
569 snprintf(lock_name, sizeof(lock_name), "NETLOGON\\%s", conn->controller);
571 if (!(got_mutex = secrets_named_mutex(lock_name, WINBIND_SERVER_MUTEX_WAIT_TIME))) {
572 DEBUG(0,("cm_get_netlogon_cli: mutex grab failed for %s\n", conn->controller));
575 result = cli_nt_establish_netlogon(conn->cli, sec_channel_type, trust_passwd);
578 secrets_named_mutex_release(lock_name);
580 if (!NT_STATUS_IS_OK(result)) {
581 cli_shutdown(conn->cli);
582 DLIST_REMOVE(cm_conns, conn);
592 /* Dump the current connection status */
594 static void dump_conn_list(void)
596 struct winbindd_cm_conn *con;
598 DEBUG(0, ("\tDomain Controller Pipe\n"));
600 for(con = cm_conns; con; con = con->next) {
603 /* Display pipe info */
605 if (asprintf(&msg, "\t%-15s %-15s %-16s", con->domain, con->controller, con->pipe_name) < 0) {
606 DEBUG(0, ("Error: not enough memory!\n"));
608 DEBUG(0, ("%s\n", msg));
614 void winbindd_cm_status(void)
616 /* List open connections */
618 DEBUG(0, ("winbindd connection manager status:\n"));
623 DEBUG(0, ("\tNo active connections\n"));
626 /* Close all cached connections */
628 void winbindd_cm_flush(void)
630 struct winbindd_cm_conn *conn, tmp;
632 /* Flush connection cache */
634 for (conn = cm_conns; conn; conn = conn->next) {
636 if (!connection_ok(conn))
639 DEBUG(10, ("Closing connection to %s on %s\n",
640 conn->pipe_name, conn->controller));
643 cli_shutdown(conn->cli);
645 tmp.next = conn->next;
647 DLIST_REMOVE(cm_conns, conn);
652 /* Flush failed connection cache */
654 flush_negative_conn_cache();