#include "includes.h"
#include "utils/net.h"
-
-static void display_group_mem_info(uint32_t rid,
- struct netr_DELTA_GROUP_MEMBER *r)
-{
- int i;
- d_printf("Group mem %u: ", rid);
- for (i=0; i< r->num_rids; i++) {
- d_printf("%u ", r->rids[i]);
- }
- d_printf("\n");
-}
-
-static void display_alias_info(uint32_t rid,
- struct netr_DELTA_ALIAS *r)
-{
- d_printf("Alias '%s' ", r->alias_name.string);
- d_printf("desc='%s' rid=%u\n", r->description.string, r->rid);
-}
-
-static void display_alias_mem(uint32_t rid,
- struct netr_DELTA_ALIAS_MEMBER *r)
+#include "../librpc/gen_ndr/ndr_netlogon.h"
+#include "../librpc/gen_ndr/ndr_drsuapi.h"
+#include "libnet/libnet_samsync.h"
+#include "libnet/libnet_dssync.h"
+#include "../libcli/security/security.h"
+#include "passdb/machine_sid.h"
+
+static void parse_samsync_partial_replication_objects(TALLOC_CTX *mem_ctx,
+ int argc,
+ const char **argv,
+ bool *do_single_object_replication,
+ struct samsync_object **objects,
+ uint32_t *num_objects)
{
int i;
- d_printf("Alias rid %u: ", rid);
- for (i=0; i< r->sids.num_sids; i++) {
- d_printf("%s ", sid_string_tos(r->sids.sids[i].sid));
- }
- d_printf("\n");
-}
-
-static void display_account_info(uint32_t rid,
- struct netr_DELTA_USER *r)
-{
- fstring hex_nt_passwd, hex_lm_passwd;
- uchar lm_passwd[16], nt_passwd[16];
- static uchar zero_buf[16];
-
- /* Decode hashes from password hash (if they are not NULL) */
- if (memcmp(r->lmpassword.hash, zero_buf, 16) != 0) {
- sam_pwd_hash(r->rid, r->lmpassword.hash, lm_passwd, 0);
- pdb_sethexpwd(hex_lm_passwd, lm_passwd, r->acct_flags);
- } else {
- pdb_sethexpwd(hex_lm_passwd, NULL, 0);
- }
-
- if (memcmp(r->ntpassword.hash, zero_buf, 16) != 0) {
- sam_pwd_hash(r->rid, r->ntpassword.hash, nt_passwd, 0);
- pdb_sethexpwd(hex_nt_passwd, nt_passwd, r->acct_flags);
- } else {
- pdb_sethexpwd(hex_nt_passwd, NULL, 0);
- }
-
- printf("%s:%d:%s:%s:%s:LCT-0\n",
- r->account_name.string,
- r->rid, hex_lm_passwd, hex_nt_passwd,
- pdb_encode_acct_ctrl(r->acct_flags, NEW_PW_FORMAT_SPACE_PADDED_LEN));
-}
-
-static void display_domain_info(struct netr_DELTA_DOMAIN *r)
-{
- time_t u_logout;
- struct netr_AcctLockStr *lockstr = NULL;
- NTSTATUS status;
- TALLOC_CTX *mem_ctx = talloc_tos();
-
- status = pull_netr_AcctLockStr(mem_ctx, &r->account_lockout,
- &lockstr);
- if (!NT_STATUS_IS_OK(status)) {
- d_printf("failed to pull account lockout string: %s\n",
- nt_errstr(status));
+ if (argc > 0) {
+ *do_single_object_replication = true;
}
- u_logout = uint64s_nt_time_to_unix_abs((const uint64 *)&r->force_logoff_time);
-
- d_printf("Domain name: %s\n", r->domain_name.string);
-
- d_printf("Minimal Password Length: %d\n", r->min_password_length);
- d_printf("Password History Length: %d\n", r->password_history_length);
-
- d_printf("Force Logoff: %d\n", (int)u_logout);
-
- d_printf("Max Password Age: %s\n", display_time(r->max_password_age));
- d_printf("Min Password Age: %s\n", display_time(r->min_password_age));
-
- if (lockstr) {
- d_printf("Lockout Time: %s\n", display_time((NTTIME)lockstr->lockout_duration));
- d_printf("Lockout Reset Time: %s\n", display_time((NTTIME)lockstr->reset_count));
- d_printf("Bad Attempt Lockout: %d\n", lockstr->bad_attempt_lockout);
+ for (i=0; i<argc; i++) {
+
+ struct samsync_object o;
+
+ ZERO_STRUCT(o);
+
+ if (!StrnCaseCmp(argv[i], "user_rid=", strlen("user_rid="))) {
+ o.object_identifier.rid = get_int_param(argv[i]);
+ o.object_type = NETR_DELTA_USER;
+ o.database_id = SAM_DATABASE_DOMAIN;
+ }
+ if (!StrnCaseCmp(argv[i], "group_rid=", strlen("group_rid="))) {
+ o.object_identifier.rid = get_int_param(argv[i]);
+ o.object_type = NETR_DELTA_GROUP;
+ o.database_id = SAM_DATABASE_DOMAIN;
+ }
+ if (!StrnCaseCmp(argv[i], "group_member_rid=", strlen("group_member_rid="))) {
+ o.object_identifier.rid = get_int_param(argv[i]);
+ o.object_type = NETR_DELTA_GROUP_MEMBER;
+ o.database_id = SAM_DATABASE_DOMAIN;
+ }
+ if (!StrnCaseCmp(argv[i], "alias_rid=", strlen("alias_rid="))) {
+ o.object_identifier.rid = get_int_param(argv[i]);
+ o.object_type = NETR_DELTA_ALIAS;
+ o.database_id = SAM_DATABASE_BUILTIN;
+ }
+ if (!StrnCaseCmp(argv[i], "alias_member_rid=", strlen("alias_member_rid="))) {
+ o.object_identifier.rid = get_int_param(argv[i]);
+ o.object_type = NETR_DELTA_ALIAS_MEMBER;
+ o.database_id = SAM_DATABASE_BUILTIN;
+ }
+ if (!StrnCaseCmp(argv[i], "account_sid=", strlen("account_sid="))) {
+ const char *sid_str = get_string_param(argv[i]);
+ string_to_sid(&o.object_identifier.sid, sid_str);
+ o.object_type = NETR_DELTA_ACCOUNT;
+ o.database_id = SAM_DATABASE_PRIVS;
+ }
+ if (!StrnCaseCmp(argv[i], "policy_sid=", strlen("policy_sid="))) {
+ const char *sid_str = get_string_param(argv[i]);
+ string_to_sid(&o.object_identifier.sid, sid_str);
+ o.object_type = NETR_DELTA_POLICY;
+ o.database_id = SAM_DATABASE_PRIVS;
+ }
+ if (!StrnCaseCmp(argv[i], "trustdom_sid=", strlen("trustdom_sid="))) {
+ const char *sid_str = get_string_param(argv[i]);
+ string_to_sid(&o.object_identifier.sid, sid_str);
+ o.object_type = NETR_DELTA_TRUSTED_DOMAIN;
+ o.database_id = SAM_DATABASE_PRIVS;
+ }
+ if (!StrnCaseCmp(argv[i], "secret_name=", strlen("secret_name="))) {
+ o.object_identifier.name = get_string_param(argv[i]);
+ o.object_type = NETR_DELTA_SECRET;
+ o.database_id = SAM_DATABASE_PRIVS;
+ }
+
+ if (o.object_type > 0) {
+ ADD_TO_ARRAY(mem_ctx, struct samsync_object, o,
+ objects, num_objects);
+ }
}
-
- d_printf("User must logon to change password: %d\n", r->logon_to_chgpass);
-}
-
-static void display_group_info(uint32_t rid, struct netr_DELTA_GROUP *r)
-{
- d_printf("Group '%s' ", r->group_name.string);
- d_printf("desc='%s', rid=%u\n", r->description.string, rid);
-}
-
-static void display_delete_group(uint32_t rid)
-{
- d_printf("Delete Group '%d' ", rid);
-}
-
-static void display_rename_group(uint32_t rid, struct netr_DELTA_RENAME *r)
-{
- d_printf("Rename Group '%d' ", rid);
- d_printf("Rename Group: %s -> %s\n",
- r->OldName.string, r->NewName.string);
-}
-
-static void display_delete_user(uint32_t rid)
-{
- d_printf("Delete User '%d' ", rid);
-}
-
-static void display_rename_user(uint32_t rid, struct netr_DELTA_RENAME *r)
-{
- d_printf("Rename User '%d' ", rid);
- d_printf("Rename User: %s -> %s\n",
- r->OldName.string, r->NewName.string);
-}
-
-static void display_delete_alias(uint32_t rid)
-{
- d_printf("Delete Alias '%d' ", rid);
-}
-
-static void display_rename_alias(uint32_t rid, struct netr_DELTA_RENAME *r)
-{
- d_printf("Rename Alias '%d' ", rid);
- d_printf("Rename Alias: %s -> %s\n",
- r->OldName.string, r->NewName.string);
-}
-
-static NTSTATUS display_sam_entry(TALLOC_CTX *mem_ctx,
- enum netr_SamDatabaseID database_id,
- struct netr_DELTA_ENUM *r,
- NTSTATUS status,
- struct samsync_context *ctx)
-{
- union netr_DELTA_UNION u = r->delta_union;
- union netr_DELTA_ID_UNION id = r->delta_id_union;
-
- switch (r->delta_type) {
- case NETR_DELTA_DOMAIN:
- display_domain_info(u.domain);
- break;
- case NETR_DELTA_GROUP:
- display_group_info(id.rid, u.group);
- break;
- case NETR_DELTA_DELETE_GROUP:
- display_delete_group(id.rid);
- break;
- case NETR_DELTA_RENAME_GROUP:
- display_rename_group(id.rid, u.rename_group);
- break;
- case NETR_DELTA_USER:
- display_account_info(id.rid, u.user);
- break;
- case NETR_DELTA_DELETE_USER:
- display_delete_user(id.rid);
- break;
- case NETR_DELTA_RENAME_USER:
- display_rename_user(id.rid, u.rename_user);
- break;
- case NETR_DELTA_GROUP_MEMBER:
- display_group_mem_info(id.rid, u.group_member);
- break;
- case NETR_DELTA_ALIAS:
- display_alias_info(id.rid, u.alias);
- break;
- case NETR_DELTA_DELETE_ALIAS:
- display_delete_alias(id.rid);
- break;
- case NETR_DELTA_RENAME_ALIAS:
- display_rename_alias(id.rid, u.rename_alias);
- break;
- case NETR_DELTA_ALIAS_MEMBER:
- display_alias_mem(id.rid, u.alias_member);
- break;
- case NETR_DELTA_POLICY:
- printf("Policy\n");
- break;
- case NETR_DELTA_TRUSTED_DOMAIN:
- printf("Trusted Domain: %s\n",
- u.trusted_domain->domain_name.string);
- break;
- case NETR_DELTA_DELETE_TRUST:
- printf("Delete Trust: %d\n",
- u.delete_trust.unknown);
- break;
- case NETR_DELTA_ACCOUNT:
- printf("Account\n");
- break;
- case NETR_DELTA_DELETE_ACCOUNT:
- printf("Delete Account: %d\n",
- u.delete_account.unknown);
- break;
- case NETR_DELTA_SECRET:
- printf("Secret\n");
- break;
- case NETR_DELTA_DELETE_SECRET:
- printf("Delete Secret: %d\n",
- u.delete_secret.unknown);
- break;
- case NETR_DELTA_DELETE_GROUP2:
- printf("Delete Group2: %s\n",
- u.delete_group->account_name);
- break;
- case NETR_DELTA_DELETE_USER2:
- printf("Delete User2: %s\n",
- u.delete_user->account_name);
- break;
- case NETR_DELTA_MODIFY_COUNT:
- printf("sam sequence update: 0x%016llx\n",
- (unsigned long long) *u.modified_count);
- break;
-#if 0
- /* The following types are recognised but not handled */
- case NETR_DELTA_POLICY:
- d_printf("NETR_DELTA_POLICY not handled\n");
- break;
- case NETR_DELTA_TRUSTED_DOMAIN:
- d_printf("NETR_DELTA_TRUSTED_DOMAIN not handled\n");
- break;
- case NETR_DELTA_ACCOUNT:
- d_printf("NETR_DELTA_ACCOUNT not handled\n");
- break;
- case NETR_DELTA_SECRET:
- d_printf("NETR_DELTA_SECRET not handled\n");
- break;
- case NETR_DELTA_MODIFY_COUNT:
- d_printf("NETR_DELTA_MODIFY_COUNT not handled\n");
- break;
- case NETR_DELTA_DELETE_TRUST:
- d_printf("NETR_DELTA_DELETE_TRUST not handled\n");
- break;
- case NETR_DELTA_DELETE_ACCOUNT:
- d_printf("NETR_DELTA_DELETE_ACCOUNT not handled\n");
- break;
- case NETR_DELTA_DELETE_SECRET:
- d_printf("NETR_DELTA_DELETE_SECRET not handled\n");
- break;
- case NETR_DELTA_DELETE_GROUP2:
- d_printf("NETR_DELTA_DELETE_GROUP2 not handled\n");
- break;
- case NETR_DELTA_DELETE_USER2:
- d_printf("NETR_DELTA_DELETE_USER2 not handled\n");
- break;
-#endif
- default:
- printf("unknown delta type 0x%02x\n",
- r->delta_type);
- break;
- }
-
- return NT_STATUS_OK;
-}
-
-static NTSTATUS display_sam_entries(TALLOC_CTX *mem_ctx,
- enum netr_SamDatabaseID database_id,
- struct netr_DELTA_ENUM_ARRAY *r,
- NTSTATUS status,
- struct samsync_context *ctx)
-{
- int i;
-
- for (i = 0; i < r->num_deltas; i++) {
- display_sam_entry(mem_ctx, database_id, &r->delta_enum[i], status, ctx);
- }
-
- return NT_STATUS_OK;
}
/* dump sam database via samsync rpc calls */
NTSTATUS rpc_samdump_internals(struct net_context *c,
- const DOM_SID *domain_sid,
+ const struct dom_sid *domain_sid,
const char *domain_name,
struct cli_state *cli,
struct rpc_pipe_client *pipe_hnd,
struct samsync_context *ctx = NULL;
NTSTATUS status;
- status = samsync_init_context(mem_ctx,
- domain_sid,
- domain_name,
- NET_SAMSYNC_MODE_DUMP,
- &ctx);
+ status = libnet_samsync_init_context(mem_ctx,
+ domain_sid,
+ &ctx);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
- samsync_process_database(pipe_hnd, SAM_DATABASE_DOMAIN,
- display_sam_entries, ctx);
+ ctx->mode = NET_SAMSYNC_MODE_DUMP;
+ ctx->cli = pipe_hnd;
+ ctx->ops = &libnet_samsync_display_ops;
+ ctx->domain_name = domain_name;
+
+ ctx->force_full_replication = c->opt_force_full_repl ? true : false;
+ ctx->clean_old_entries = c->opt_clean_old_entries ? true : false;
+
+ parse_samsync_partial_replication_objects(ctx, argc, argv,
+ &ctx->single_object_replication,
+ &ctx->objects,
+ &ctx->num_objects);
+
+ libnet_samsync(SAM_DATABASE_DOMAIN, ctx);
- samsync_process_database(pipe_hnd, SAM_DATABASE_BUILTIN,
- display_sam_entries, ctx);
+ libnet_samsync(SAM_DATABASE_BUILTIN, ctx);
- samsync_process_database(pipe_hnd, SAM_DATABASE_PRIVS,
- display_sam_entries, ctx);
+ libnet_samsync(SAM_DATABASE_PRIVS, ctx);
TALLOC_FREE(ctx);
int rpc_vampire_usage(struct net_context *c, int argc, const char **argv)
{
- d_printf("net rpc vampire [ldif [<ldif-filename>] [options]\n"
- "\t to pull accounts from a remote PDC where we are a BDC\n"
- "\t\t no args puts accounts in local passdb from smb.conf\n"
- "\t\t ldif - put accounts in ldif format (file defaults to "
- "/tmp/tmp.ldif\n");
+ d_printf(_("net rpc vampire ([ldif [<ldif-filename>] | [keytab] "
+ "[<keytab-filename]) [options]\n"
+ "\t to pull accounts from a remote PDC where we are a BDC\n"
+ "\t\t no args puts accounts in local passdb from smb.conf\n"
+ "\t\t ldif - put accounts in ldif format (file defaults to "
+ "/tmp/tmp.ldif)\n"
+ "\t\t keytab - put account passwords in krb5 keytab "
+ "(defaults to system keytab)\n"));
net_common_flags_usage(c, argc, argv);
return -1;
}
+static NTSTATUS rpc_vampire_ds_internals(struct net_context *c,
+ const struct dom_sid *domain_sid,
+ const char *domain_name,
+ struct cli_state *cli,
+ struct rpc_pipe_client *pipe_hnd,
+ TALLOC_CTX *mem_ctx,
+ int argc,
+ const char **argv)
+{
+ NTSTATUS status;
+ struct dssync_context *ctx = NULL;
+
+ if (!dom_sid_equal(domain_sid, get_global_sam_sid())) {
+ d_printf(_("Cannot import users from %s at this time, "
+ "as the current domain:\n\t%s: %s\nconflicts "
+ "with the remote domain\n\t%s: %s\n"
+ "Perhaps you need to set: \n\n\tsecurity=user\n\t"
+ "workgroup=%s\n\n in your smb.conf?\n"),
+ domain_name,
+ get_global_sam_name(),
+ sid_string_dbg(get_global_sam_sid()),
+ domain_name,
+ sid_string_dbg(domain_sid),
+ domain_name);
+ return NT_STATUS_UNSUCCESSFUL;
+ }
+
+ status = libnet_dssync_init_context(mem_ctx,
+ &ctx);
+ if (!NT_STATUS_IS_OK(status)) {
+ return status;
+ }
+
+ ctx->cli = pipe_hnd;
+ ctx->domain_name = domain_name;
+ ctx->ops = &libnet_dssync_passdb_ops;
+
+ status = libnet_dssync(mem_ctx, ctx);
+ if (!NT_STATUS_IS_OK(status) && ctx->error_message) {
+ d_fprintf(stderr, "%s\n", ctx->error_message);
+ goto out;
+ }
+
+ if (ctx->result_message) {
+ d_fprintf(stdout, "%s\n", ctx->result_message);
+ }
+
+ out:
+ TALLOC_FREE(ctx);
+
+ return status;
+}
/* dump sam database via samsync rpc calls */
-NTSTATUS rpc_vampire_internals(struct net_context *c,
- const DOM_SID *domain_sid,
- const char *domain_name,
- struct cli_state *cli,
- struct rpc_pipe_client *pipe_hnd,
- TALLOC_CTX *mem_ctx,
- int argc,
- const char **argv)
+static NTSTATUS rpc_vampire_internals(struct net_context *c,
+ const struct dom_sid *domain_sid,
+ const char *domain_name,
+ struct cli_state *cli,
+ struct rpc_pipe_client *pipe_hnd,
+ TALLOC_CTX *mem_ctx,
+ int argc,
+ const char **argv)
{
NTSTATUS result;
struct samsync_context *ctx = NULL;
- result = samsync_init_context(mem_ctx,
- domain_sid,
- domain_name,
- NET_SAMSYNC_MODE_FETCH_PASSDB,
- &ctx);
- if (!NT_STATUS_IS_OK(result)) {
- return result;
- }
-
- if (!sid_equal(domain_sid, get_global_sam_sid())) {
- d_printf("Cannot import users from %s at this time, "
- "as the current domain:\n\t%s: %s\nconflicts "
- "with the remote domain\n\t%s: %s\n"
- "Perhaps you need to set: \n\n\tsecurity=user\n\t"
- "workgroup=%s\n\n in your smb.conf?\n",
+ if (!dom_sid_equal(domain_sid, get_global_sam_sid())) {
+ d_printf(_("Cannot import users from %s at this time, "
+ "as the current domain:\n\t%s: %s\nconflicts "
+ "with the remote domain\n\t%s: %s\n"
+ "Perhaps you need to set: \n\n\tsecurity=user\n\t"
+ "workgroup=%s\n\n in your smb.conf?\n"),
domain_name,
get_global_sam_name(),
sid_string_dbg(get_global_sam_sid()),
return NT_STATUS_UNSUCCESSFUL;
}
+ result = libnet_samsync_init_context(mem_ctx,
+ domain_sid,
+ &ctx);
+ if (!NT_STATUS_IS_OK(result)) {
+ return result;
+ }
+
+ ctx->mode = NET_SAMSYNC_MODE_FETCH_PASSDB;
+ ctx->cli = pipe_hnd;
+ ctx->ops = &libnet_samsync_passdb_ops;
+ ctx->domain_name = domain_name;
+
+ ctx->force_full_replication = c->opt_force_full_repl ? true : false;
+ ctx->clean_old_entries = c->opt_clean_old_entries ? true : false;
+
+ parse_samsync_partial_replication_objects(ctx, argc, argv,
+ &ctx->single_object_replication,
+ &ctx->objects,
+ &ctx->num_objects);
+
/* fetch domain */
- result = samsync_process_database(pipe_hnd, SAM_DATABASE_DOMAIN,
- fetch_sam_entries, ctx);
+ result = libnet_samsync(SAM_DATABASE_DOMAIN, ctx);
if (!NT_STATUS_IS_OK(result) && ctx->error_message) {
d_fprintf(stderr, "%s\n", ctx->error_message);
}
/* fetch builtin */
- ctx->domain_sid = sid_dup_talloc(mem_ctx, &global_sid_Builtin);
+ ctx->domain_sid = dom_sid_dup(mem_ctx, &global_sid_Builtin);
ctx->domain_sid_str = sid_string_talloc(mem_ctx, ctx->domain_sid);
- result = samsync_process_database(pipe_hnd, SAM_DATABASE_BUILTIN,
- fetch_sam_entries, ctx);
+ result = libnet_samsync(SAM_DATABASE_BUILTIN, ctx);
if (!NT_STATUS_IS_OK(result) && ctx->error_message) {
d_fprintf(stderr, "%s\n", ctx->error_message);
return result;
}
-NTSTATUS rpc_vampire_ldif_internals(struct net_context *c,
- const DOM_SID *domain_sid,
- const char *domain_name,
- struct cli_state *cli,
- struct rpc_pipe_client *pipe_hnd,
- TALLOC_CTX *mem_ctx,
- int argc,
- const char **argv)
+int rpc_vampire_passdb(struct net_context *c, int argc, const char **argv)
+{
+ int ret = 0;
+ NTSTATUS status;
+ struct cli_state *cli = NULL;
+ struct net_dc_info dc_info;
+
+ if (c->display_usage) {
+ d_printf( "%s\n"
+ "net rpc vampire passdb\n"
+ " %s\n",
+ _("Usage:"),
+ _("Dump remote SAM database to passdb"));
+ return 0;
+ }
+
+ status = net_make_ipc_connection(c, 0, &cli);
+ if (!NT_STATUS_IS_OK(status)) {
+ return -1;
+ }
+
+ status = net_scan_dc(c, cli, &dc_info);
+ if (!NT_STATUS_IS_OK(status)) {
+ return -1;
+ }
+
+ if (!dc_info.is_ad) {
+ printf(_("DC is not running Active Directory\n"));
+ ret = run_rpc_command(c, cli, &ndr_table_netlogon.syntax_id,
+ 0,
+ rpc_vampire_internals, argc, argv);
+ return ret;
+ }
+
+ if (!c->opt_force) {
+ d_printf( "%s\n"
+ "net rpc vampire passdb\n"
+ " %s\n",
+ _("Usage:"),
+ _("Should not be used against Active Directory, maybe use --force"));
+ return -1;
+ }
+
+ ret = run_rpc_command(c, cli, &ndr_table_drsuapi.syntax_id,
+ NET_FLAGS_SEAL | NET_FLAGS_TCP,
+ rpc_vampire_ds_internals, argc, argv);
+ if (ret != 0 && dc_info.is_mixed_mode) {
+ printf(_("Fallback to NT4 vampire on Mixed-Mode AD "
+ "Domain\n"));
+ ret = run_rpc_command(c, cli, &ndr_table_netlogon.syntax_id,
+ 0,
+ rpc_vampire_internals, argc, argv);
+ }
+
+ return ret;
+}
+
+static NTSTATUS rpc_vampire_ldif_internals(struct net_context *c,
+ const struct dom_sid *domain_sid,
+ const char *domain_name,
+ struct cli_state *cli,
+ struct rpc_pipe_client *pipe_hnd,
+ TALLOC_CTX *mem_ctx,
+ int argc,
+ const char **argv)
{
NTSTATUS status;
struct samsync_context *ctx = NULL;
- status = samsync_init_context(mem_ctx,
- domain_sid,
- domain_name,
- NET_SAMSYNC_MODE_FETCH_LDIF,
- &ctx);
+ status = libnet_samsync_init_context(mem_ctx,
+ domain_sid,
+ &ctx);
if (!NT_STATUS_IS_OK(status)) {
return status;
}
if (argc >= 1) {
ctx->output_filename = argv[0];
}
+ if (argc >= 2) {
+ parse_samsync_partial_replication_objects(ctx, argc-1, argv+1,
+ &ctx->single_object_replication,
+ &ctx->objects,
+ &ctx->num_objects);
+ }
+
+ ctx->mode = NET_SAMSYNC_MODE_FETCH_LDIF;
+ ctx->cli = pipe_hnd;
+ ctx->ops = &libnet_samsync_ldif_ops;
+ ctx->domain_name = domain_name;
+
+ ctx->force_full_replication = c->opt_force_full_repl ? true : false;
+ ctx->clean_old_entries = c->opt_clean_old_entries ? true : false;
/* fetch domain */
- status = samsync_process_database(pipe_hnd, SAM_DATABASE_DOMAIN,
- fetch_sam_entries_ldif, ctx);
+ status = libnet_samsync(SAM_DATABASE_DOMAIN, ctx);
if (!NT_STATUS_IS_OK(status) && ctx->error_message) {
d_fprintf(stderr, "%s\n", ctx->error_message);
}
/* fetch builtin */
- ctx->domain_sid = sid_dup_talloc(mem_ctx, &global_sid_Builtin);
+ ctx->domain_sid = dom_sid_dup(mem_ctx, &global_sid_Builtin);
ctx->domain_sid_str = sid_string_talloc(mem_ctx, ctx->domain_sid);
- status = samsync_process_database(pipe_hnd, SAM_DATABASE_BUILTIN,
- fetch_sam_entries_ldif, ctx);
+ status = libnet_samsync(SAM_DATABASE_BUILTIN, ctx);
if (!NT_STATUS_IS_OK(status) && ctx->error_message) {
d_fprintf(stderr, "%s\n", ctx->error_message);
int rpc_vampire_ldif(struct net_context *c, int argc, const char **argv)
{
if (c->display_usage) {
- d_printf("Usage\n"
- "net rpc vampire ldif\n"
- " Dump remote SAM database to LDIF file or stdout\n");
+ d_printf( "%s\n"
+ "net rpc vampire ldif\n"
+ " %s\n",
+ _("Usage:"),
+ _("Dump remote SAM database to LDIF file or "
+ "stdout"));
return 0;
}
- return run_rpc_command(c, NULL, PI_NETLOGON, 0, rpc_vampire_ldif_internals,
- argc, argv);
+ return run_rpc_command(c, NULL, &ndr_table_netlogon.syntax_id, 0,
+ rpc_vampire_ldif_internals, argc, argv);
+}
+
+
+static NTSTATUS rpc_vampire_keytab_internals(struct net_context *c,
+ const struct dom_sid *domain_sid,
+ const char *domain_name,
+ struct cli_state *cli,
+ struct rpc_pipe_client *pipe_hnd,
+ TALLOC_CTX *mem_ctx,
+ int argc,
+ const char **argv)
+{
+ NTSTATUS status;
+ struct samsync_context *ctx = NULL;
+
+ status = libnet_samsync_init_context(mem_ctx,
+ domain_sid,
+ &ctx);
+ if (!NT_STATUS_IS_OK(status)) {
+ return status;
+ }
+
+ if (argc < 1) {
+ /* the caller should ensure that a filename is provided */
+ return NT_STATUS_INVALID_PARAMETER;
+ } else {
+ ctx->output_filename = argv[0];
+ }
+ if (argc >= 2) {
+ parse_samsync_partial_replication_objects(ctx, argc-1, argv+1,
+ &ctx->single_object_replication,
+ &ctx->objects,
+ &ctx->num_objects);
+ }
+
+ ctx->mode = NET_SAMSYNC_MODE_FETCH_KEYTAB;
+ ctx->cli = pipe_hnd;
+ ctx->ops = &libnet_samsync_keytab_ops;
+ ctx->domain_name = domain_name;
+ ctx->username = c->opt_user_name;
+ ctx->password = c->opt_password;
+
+ ctx->force_full_replication = c->opt_force_full_repl ? true : false;
+ ctx->clean_old_entries = c->opt_clean_old_entries ? true : false;
+
+ /* fetch domain */
+ status = libnet_samsync(SAM_DATABASE_DOMAIN, ctx);
+
+ if (!NT_STATUS_IS_OK(status) && ctx->error_message) {
+ d_fprintf(stderr, "%s\n", ctx->error_message);
+ goto out;
+ }
+
+ if (ctx->result_message) {
+ d_fprintf(stdout, "%s\n", ctx->result_message);
+ }
+
+ out:
+ TALLOC_FREE(ctx);
+
+ return status;
+}
+
+static NTSTATUS rpc_vampire_keytab_ds_internals(struct net_context *c,
+ const struct dom_sid *domain_sid,
+ const char *domain_name,
+ struct cli_state *cli,
+ struct rpc_pipe_client *pipe_hnd,
+ TALLOC_CTX *mem_ctx,
+ int argc,
+ const char **argv)
+{
+ NTSTATUS status;
+ struct dssync_context *ctx = NULL;
+
+ status = libnet_dssync_init_context(mem_ctx,
+ &ctx);
+ if (!NT_STATUS_IS_OK(status)) {
+ return status;
+ }
+
+ ctx->force_full_replication = c->opt_force_full_repl ? true : false;
+ ctx->clean_old_entries = c->opt_clean_old_entries ? true : false;
+
+ if (argc < 1) {
+ /* the caller should ensure that a filename is provided */
+ return NT_STATUS_INVALID_PARAMETER;
+ } else {
+ ctx->output_filename = argv[0];
+ }
+
+ if (argc >= 2) {
+ ctx->object_dns = &argv[1];
+ ctx->object_count = argc - 1;
+ ctx->single_object_replication = c->opt_single_obj_repl ? true
+ : false;
+ }
+
+ ctx->cli = pipe_hnd;
+ ctx->domain_name = domain_name;
+ ctx->ops = &libnet_dssync_keytab_ops;
+
+ status = libnet_dssync(mem_ctx, ctx);
+ if (!NT_STATUS_IS_OK(status) && ctx->error_message) {
+ d_fprintf(stderr, "%s\n", ctx->error_message);
+ goto out;
+ }
+
+ if (ctx->result_message) {
+ d_fprintf(stdout, "%s\n", ctx->result_message);
+ }
+
+ out:
+ TALLOC_FREE(ctx);
+
+ return status;
+}
+
+/**
+ * Basic function for 'net rpc vampire keytab'
+ *
+ * @param c A net_context structure
+ * @param argc Standard main() style argc
+ * @param argc Standard main() style argv. Initial components are already
+ * stripped
+ **/
+
+int rpc_vampire_keytab(struct net_context *c, int argc, const char **argv)
+{
+ int ret = 0;
+ NTSTATUS status;
+ struct cli_state *cli = NULL;
+ struct net_dc_info dc_info;
+
+ if (c->display_usage || (argc < 1)) {
+ d_printf("%s\n%s",
+ _("Usage:"),
+ _("net rpc vampire keytab <keytabfile>\n"
+ " Dump remote SAM database to Kerberos keytab "
+ "file\n"));
+ return 0;
+ }
+
+ status = net_make_ipc_connection(c, 0, &cli);
+ if (!NT_STATUS_IS_OK(status)) {
+ return -1;
+ }
+
+ status = net_scan_dc(c, cli, &dc_info);
+ if (!NT_STATUS_IS_OK(status)) {
+ return -1;
+ }
+
+ if (!dc_info.is_ad) {
+ printf(_("DC is not running Active Directory\n"));
+ ret = run_rpc_command(c, cli, &ndr_table_netlogon.syntax_id,
+ 0,
+ rpc_vampire_keytab_internals, argc, argv);
+ } else {
+ ret = run_rpc_command(c, cli, &ndr_table_drsuapi.syntax_id,
+ NET_FLAGS_SEAL | NET_FLAGS_TCP,
+ rpc_vampire_keytab_ds_internals, argc, argv);
+ if (ret != 0 && dc_info.is_mixed_mode) {
+ printf(_("Fallback to NT4 vampire on Mixed-Mode AD "
+ "Domain\n"));
+ ret = run_rpc_command(c, cli, &ndr_table_netlogon.syntax_id,
+ 0,
+ rpc_vampire_keytab_internals, argc, argv);
+ }
+ }
+
+ return ret;
}