2 Unix SMB/CIFS implementation.
3 dump the remote SAM using rpc samsync operations
5 Copyright (C) Andrew Tridgell 2002
6 Copyright (C) Tim Potter 2001,2002
7 Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2005
8 Modified by Volker Lendecke 2002
9 Copyright (C) Jeremy Allison 2005.
10 Copyright (C) Guenther Deschner 2008.
12 This program is free software; you can redistribute it and/or modify
13 it under the terms of the GNU General Public License as published by
14 the Free Software Foundation; either version 3 of the License, or
15 (at your option) any later version.
17 This program is distributed in the hope that it will be useful,
18 but WITHOUT ANY WARRANTY; without even the implied warranty of
19 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 GNU General Public License for more details.
22 You should have received a copy of the GNU General Public License
23 along with this program. If not, see <http://www.gnu.org/licenses/>.
27 #include "utils/net.h"
29 static void parse_samsync_partial_replication_objects(TALLOC_CTX *mem_ctx,
32 bool *do_single_object_replication,
33 struct samsync_object **objects,
34 uint32_t *num_objects)
39 *do_single_object_replication = true;
42 for (i=0; i<argc; i++) {
44 struct samsync_object o;
48 if (!StrnCaseCmp(argv[i], "user_rid=", strlen("user_rid="))) {
49 o.object_identifier.rid = get_int_param(argv[i]);
50 o.object_type = NETR_DELTA_USER;
51 o.database_id = SAM_DATABASE_DOMAIN;
53 if (!StrnCaseCmp(argv[i], "group_rid=", strlen("group_rid="))) {
54 o.object_identifier.rid = get_int_param(argv[i]);
55 o.object_type = NETR_DELTA_GROUP;
56 o.database_id = SAM_DATABASE_DOMAIN;
58 if (!StrnCaseCmp(argv[i], "group_member_rid=", strlen("group_member_rid="))) {
59 o.object_identifier.rid = get_int_param(argv[i]);
60 o.object_type = NETR_DELTA_GROUP_MEMBER;
61 o.database_id = SAM_DATABASE_DOMAIN;
63 if (!StrnCaseCmp(argv[i], "alias_rid=", strlen("alias_rid="))) {
64 o.object_identifier.rid = get_int_param(argv[i]);
65 o.object_type = NETR_DELTA_ALIAS;
66 o.database_id = SAM_DATABASE_BUILTIN;
68 if (!StrnCaseCmp(argv[i], "alias_member_rid=", strlen("alias_member_rid="))) {
69 o.object_identifier.rid = get_int_param(argv[i]);
70 o.object_type = NETR_DELTA_ALIAS_MEMBER;
71 o.database_id = SAM_DATABASE_BUILTIN;
73 if (!StrnCaseCmp(argv[i], "account_sid=", strlen("account_sid="))) {
74 const char *sid_str = get_string_param(argv[i]);
75 string_to_sid(&o.object_identifier.sid, sid_str);
76 o.object_type = NETR_DELTA_ACCOUNT;
77 o.database_id = SAM_DATABASE_PRIVS;
79 if (!StrnCaseCmp(argv[i], "policy_sid=", strlen("policy_sid="))) {
80 const char *sid_str = get_string_param(argv[i]);
81 string_to_sid(&o.object_identifier.sid, sid_str);
82 o.object_type = NETR_DELTA_POLICY;
83 o.database_id = SAM_DATABASE_PRIVS;
85 if (!StrnCaseCmp(argv[i], "trustdom_sid=", strlen("trustdom_sid="))) {
86 const char *sid_str = get_string_param(argv[i]);
87 string_to_sid(&o.object_identifier.sid, sid_str);
88 o.object_type = NETR_DELTA_TRUSTED_DOMAIN;
89 o.database_id = SAM_DATABASE_PRIVS;
91 if (!StrnCaseCmp(argv[i], "secret_name=", strlen("secret_name="))) {
92 o.object_identifier.name = get_string_param(argv[i]);
93 o.object_type = NETR_DELTA_SECRET;
94 o.database_id = SAM_DATABASE_PRIVS;
97 if (o.object_type > 0) {
98 ADD_TO_ARRAY(mem_ctx, struct samsync_object, o,
99 objects, num_objects);
104 /* dump sam database via samsync rpc calls */
105 NTSTATUS rpc_samdump_internals(struct net_context *c,
106 const DOM_SID *domain_sid,
107 const char *domain_name,
108 struct cli_state *cli,
109 struct rpc_pipe_client *pipe_hnd,
114 struct samsync_context *ctx = NULL;
117 status = libnet_samsync_init_context(mem_ctx,
120 if (!NT_STATUS_IS_OK(status)) {
124 ctx->mode = NET_SAMSYNC_MODE_DUMP;
126 ctx->ops = &libnet_samsync_display_ops;
127 ctx->domain_name = domain_name;
129 ctx->force_full_replication = c->opt_force_full_repl ? true : false;
130 ctx->clean_old_entries = c->opt_clean_old_entries ? true : false;
132 parse_samsync_partial_replication_objects(ctx, argc, argv,
133 &ctx->single_object_replication,
137 libnet_samsync(SAM_DATABASE_DOMAIN, ctx);
139 libnet_samsync(SAM_DATABASE_BUILTIN, ctx);
141 libnet_samsync(SAM_DATABASE_PRIVS, ctx);
149 * Basic usage function for 'net rpc vampire'
151 * @param c A net_context structure
152 * @param argc Standard main() style argc
153 * @param argc Standard main() style argv. Initial components are already
157 int rpc_vampire_usage(struct net_context *c, int argc, const char **argv)
159 d_printf("net rpc vampire ([ldif [<ldif-filename>] | [keytab] [<keytab-filename]) [options]\n"
160 "\t to pull accounts from a remote PDC where we are a BDC\n"
161 "\t\t no args puts accounts in local passdb from smb.conf\n"
162 "\t\t ldif - put accounts in ldif format (file defaults to "
164 "\t\t keytab - put account passwords in krb5 keytab (defaults "
165 "to system keytab)\n");
167 net_common_flags_usage(c, argc, argv);
172 /* dump sam database via samsync rpc calls */
173 NTSTATUS rpc_vampire_internals(struct net_context *c,
174 const DOM_SID *domain_sid,
175 const char *domain_name,
176 struct cli_state *cli,
177 struct rpc_pipe_client *pipe_hnd,
183 struct samsync_context *ctx = NULL;
185 if (!sid_equal(domain_sid, get_global_sam_sid())) {
186 d_printf("Cannot import users from %s at this time, "
187 "as the current domain:\n\t%s: %s\nconflicts "
188 "with the remote domain\n\t%s: %s\n"
189 "Perhaps you need to set: \n\n\tsecurity=user\n\t"
190 "workgroup=%s\n\n in your smb.conf?\n",
192 get_global_sam_name(),
193 sid_string_dbg(get_global_sam_sid()),
195 sid_string_dbg(domain_sid),
197 return NT_STATUS_UNSUCCESSFUL;
200 result = libnet_samsync_init_context(mem_ctx,
203 if (!NT_STATUS_IS_OK(result)) {
207 ctx->mode = NET_SAMSYNC_MODE_FETCH_PASSDB;
209 ctx->ops = &libnet_samsync_passdb_ops;
210 ctx->domain_name = domain_name;
212 ctx->force_full_replication = c->opt_force_full_repl ? true : false;
213 ctx->clean_old_entries = c->opt_clean_old_entries ? true : false;
215 parse_samsync_partial_replication_objects(ctx, argc, argv,
216 &ctx->single_object_replication,
221 result = libnet_samsync(SAM_DATABASE_DOMAIN, ctx);
223 if (!NT_STATUS_IS_OK(result) && ctx->error_message) {
224 d_fprintf(stderr, "%s\n", ctx->error_message);
228 if (ctx->result_message) {
229 d_fprintf(stdout, "%s\n", ctx->result_message);
233 ctx->domain_sid = sid_dup_talloc(mem_ctx, &global_sid_Builtin);
234 ctx->domain_sid_str = sid_string_talloc(mem_ctx, ctx->domain_sid);
235 result = libnet_samsync(SAM_DATABASE_BUILTIN, ctx);
237 if (!NT_STATUS_IS_OK(result) && ctx->error_message) {
238 d_fprintf(stderr, "%s\n", ctx->error_message);
242 if (ctx->result_message) {
243 d_fprintf(stdout, "%s\n", ctx->result_message);
251 int rpc_vampire_passdb(struct net_context *c, int argc, const char **argv)
253 if (c->display_usage) {
255 "net rpc vampire passdb\n"
256 " Dump remote SAM database to passdb\n");
260 return run_rpc_command(c, NULL, &ndr_table_netlogon.syntax_id, 0,
261 rpc_vampire_internals, argc, argv);
264 NTSTATUS rpc_vampire_ldif_internals(struct net_context *c,
265 const DOM_SID *domain_sid,
266 const char *domain_name,
267 struct cli_state *cli,
268 struct rpc_pipe_client *pipe_hnd,
274 struct samsync_context *ctx = NULL;
276 status = libnet_samsync_init_context(mem_ctx,
279 if (!NT_STATUS_IS_OK(status)) {
284 ctx->output_filename = argv[0];
287 parse_samsync_partial_replication_objects(ctx, argc-1, argv+1,
288 &ctx->single_object_replication,
293 ctx->mode = NET_SAMSYNC_MODE_FETCH_LDIF;
295 ctx->ops = &libnet_samsync_ldif_ops;
296 ctx->domain_name = domain_name;
298 ctx->force_full_replication = c->opt_force_full_repl ? true : false;
299 ctx->clean_old_entries = c->opt_clean_old_entries ? true : false;
302 status = libnet_samsync(SAM_DATABASE_DOMAIN, ctx);
304 if (!NT_STATUS_IS_OK(status) && ctx->error_message) {
305 d_fprintf(stderr, "%s\n", ctx->error_message);
309 if (ctx->result_message) {
310 d_fprintf(stdout, "%s\n", ctx->result_message);
314 ctx->domain_sid = sid_dup_talloc(mem_ctx, &global_sid_Builtin);
315 ctx->domain_sid_str = sid_string_talloc(mem_ctx, ctx->domain_sid);
316 status = libnet_samsync(SAM_DATABASE_BUILTIN, ctx);
318 if (!NT_STATUS_IS_OK(status) && ctx->error_message) {
319 d_fprintf(stderr, "%s\n", ctx->error_message);
323 if (ctx->result_message) {
324 d_fprintf(stdout, "%s\n", ctx->result_message);
332 int rpc_vampire_ldif(struct net_context *c, int argc, const char **argv)
334 if (c->display_usage) {
336 "net rpc vampire ldif\n"
337 " Dump remote SAM database to LDIF file or stdout\n");
341 return run_rpc_command(c, NULL, &ndr_table_netlogon.syntax_id, 0,
342 rpc_vampire_ldif_internals, argc, argv);
346 NTSTATUS rpc_vampire_keytab_internals(struct net_context *c,
347 const DOM_SID *domain_sid,
348 const char *domain_name,
349 struct cli_state *cli,
350 struct rpc_pipe_client *pipe_hnd,
356 struct samsync_context *ctx = NULL;
358 status = libnet_samsync_init_context(mem_ctx,
361 if (!NT_STATUS_IS_OK(status)) {
366 /* the caller should ensure that a filename is provided */
367 return NT_STATUS_INVALID_PARAMETER;
369 ctx->output_filename = argv[0];
372 parse_samsync_partial_replication_objects(ctx, argc-1, argv+1,
373 &ctx->single_object_replication,
378 ctx->mode = NET_SAMSYNC_MODE_FETCH_KEYTAB;
380 ctx->ops = &libnet_samsync_keytab_ops;
381 ctx->domain_name = domain_name;
382 ctx->username = c->opt_user_name;
383 ctx->password = c->opt_password;
385 ctx->force_full_replication = c->opt_force_full_repl ? true : false;
386 ctx->clean_old_entries = c->opt_clean_old_entries ? true : false;
389 status = libnet_samsync(SAM_DATABASE_DOMAIN, ctx);
391 if (!NT_STATUS_IS_OK(status) && ctx->error_message) {
392 d_fprintf(stderr, "%s\n", ctx->error_message);
396 if (ctx->result_message) {
397 d_fprintf(stdout, "%s\n", ctx->result_message);
406 static NTSTATUS rpc_vampire_keytab_ds_internals(struct net_context *c,
407 const DOM_SID *domain_sid,
408 const char *domain_name,
409 struct cli_state *cli,
410 struct rpc_pipe_client *pipe_hnd,
416 struct dssync_context *ctx = NULL;
418 status = libnet_dssync_init_context(mem_ctx,
420 if (!NT_STATUS_IS_OK(status)) {
424 ctx->force_full_replication = c->opt_force_full_repl ? true : false;
425 ctx->clean_old_entries = c->opt_clean_old_entries ? true : false;
428 /* the caller should ensure that a filename is provided */
429 return NT_STATUS_INVALID_PARAMETER;
431 ctx->output_filename = argv[0];
435 ctx->object_dns = &argv[1];
436 ctx->object_count = argc - 1;
437 ctx->single_object_replication = c->opt_single_obj_repl ? true
442 ctx->domain_name = domain_name;
443 ctx->ops = &libnet_dssync_keytab_ops;
445 status = libnet_dssync(mem_ctx, ctx);
446 if (!NT_STATUS_IS_OK(status) && ctx->error_message) {
447 d_fprintf(stderr, "%s\n", ctx->error_message);
451 if (ctx->result_message) {
452 d_fprintf(stdout, "%s\n", ctx->result_message);
462 * Basic function for 'net rpc vampire keytab'
464 * @param c A net_context structure
465 * @param argc Standard main() style argc
466 * @param argc Standard main() style argv. Initial components are already
470 int rpc_vampire_keytab(struct net_context *c, int argc, const char **argv)
474 struct cli_state *cli = NULL;
475 struct net_dc_info dc_info;
477 if (c->display_usage || (argc < 1)) {
479 "net rpc vampire keytab <keytabfile>\n"
480 " Dump remote SAM database to Kerberos keytab file\n");
484 status = net_make_ipc_connection(c, 0, &cli);
485 if (!NT_STATUS_IS_OK(status)) {
489 status = net_scan_dc(c, cli, &dc_info);
490 if (!NT_STATUS_IS_OK(status)) {
494 if (!dc_info.is_ad) {
495 printf("DC is not running Active Directory\n");
499 if (dc_info.is_mixed_mode) {
500 ret = run_rpc_command(c, cli, &ndr_table_netlogon.syntax_id,
502 rpc_vampire_keytab_internals, argc, argv);
504 ret = run_rpc_command(c, cli, &ndr_table_drsuapi.syntax_id,
506 rpc_vampire_keytab_ds_internals, argc, argv);