s3-passdb: use passdb headers where needed.
[samba.git] / source3 / utils / net_rpc_samsync.c
index 587fdf293e16e1322941ff44acb555ddad14a167..861f429559fea7499d4822a76600a7aadda6768b 100644 (file)
 
 #include "includes.h"
 #include "utils/net.h"
-
-static void display_group_mem_info(uint32_t rid,
-                                  struct netr_DELTA_GROUP_MEMBER *r)
-{
-       int i;
-       d_printf("Group mem %u: ", rid);
-       for (i=0; i< r->num_rids; i++) {
-               d_printf("%u ", r->rids[i]);
-       }
-       d_printf("\n");
-}
-
-static void display_alias_info(uint32_t rid,
-                              struct netr_DELTA_ALIAS *r)
-{
-       d_printf("Alias '%s' ", r->alias_name.string);
-       d_printf("desc='%s' rid=%u\n", r->description.string, r->rid);
-}
-
-static void display_alias_mem(uint32_t rid,
-                             struct netr_DELTA_ALIAS_MEMBER *r)
+#include "../librpc/gen_ndr/ndr_netlogon.h"
+#include "../librpc/gen_ndr/ndr_drsuapi.h"
+#include "libnet/libnet_samsync.h"
+#include "libnet/libnet_dssync.h"
+#include "../libcli/security/security.h"
+#include "passdb/machine_sid.h"
+
+static void parse_samsync_partial_replication_objects(TALLOC_CTX *mem_ctx,
+                                                     int argc,
+                                                     const char **argv,
+                                                     bool *do_single_object_replication,
+                                                     struct samsync_object **objects,
+                                                     uint32_t *num_objects)
 {
        int i;
-       d_printf("Alias rid %u: ", rid);
-       for (i=0; i< r->sids.num_sids; i++) {
-               d_printf("%s ", sid_string_tos(r->sids.sids[i].sid));
-       }
-       d_printf("\n");
-}
-
-static void display_account_info(uint32_t rid,
-                                struct netr_DELTA_USER *r)
-{
-       fstring hex_nt_passwd, hex_lm_passwd;
-       uchar lm_passwd[16], nt_passwd[16];
-       static uchar zero_buf[16];
-
-       /* Decode hashes from password hash (if they are not NULL) */
 
-       if (memcmp(r->lmpassword.hash, zero_buf, 16) != 0) {
-               sam_pwd_hash(r->rid, r->lmpassword.hash, lm_passwd, 0);
-               pdb_sethexpwd(hex_lm_passwd, lm_passwd, r->acct_flags);
-       } else {
-               pdb_sethexpwd(hex_lm_passwd, NULL, 0);
-       }
-
-       if (memcmp(r->ntpassword.hash, zero_buf, 16) != 0) {
-               sam_pwd_hash(r->rid, r->ntpassword.hash, nt_passwd, 0);
-               pdb_sethexpwd(hex_nt_passwd, nt_passwd, r->acct_flags);
-       } else {
-               pdb_sethexpwd(hex_nt_passwd, NULL, 0);
-       }
-
-       printf("%s:%d:%s:%s:%s:LCT-0\n",
-               r->account_name.string,
-               r->rid, hex_lm_passwd, hex_nt_passwd,
-               pdb_encode_acct_ctrl(r->acct_flags, NEW_PW_FORMAT_SPACE_PADDED_LEN));
-}
-
-static void display_domain_info(struct netr_DELTA_DOMAIN *r)
-{
-       time_t u_logout;
-       struct netr_AcctLockStr *lockstr = NULL;
-       NTSTATUS status;
-       TALLOC_CTX *mem_ctx = talloc_tos();
-
-       status = pull_netr_AcctLockStr(mem_ctx, &r->account_lockout,
-                                      &lockstr);
-       if (!NT_STATUS_IS_OK(status)) {
-               d_printf("failed to pull account lockout string: %s\n",
-                       nt_errstr(status));
+       if (argc > 0) {
+               *do_single_object_replication = true;
        }
 
-       u_logout = uint64s_nt_time_to_unix_abs((const uint64 *)&r->force_logoff_time);
-
-       d_printf("Domain name: %s\n", r->domain_name.string);
-
-       d_printf("Minimal Password Length: %d\n", r->min_password_length);
-       d_printf("Password History Length: %d\n", r->password_history_length);
-
-       d_printf("Force Logoff: %d\n", (int)u_logout);
-
-       d_printf("Max Password Age: %s\n", display_time(r->max_password_age));
-       d_printf("Min Password Age: %s\n", display_time(r->min_password_age));
-
-       if (lockstr) {
-               d_printf("Lockout Time: %s\n", display_time((NTTIME)lockstr->lockout_duration));
-               d_printf("Lockout Reset Time: %s\n", display_time((NTTIME)lockstr->reset_count));
-               d_printf("Bad Attempt Lockout: %d\n", lockstr->bad_attempt_lockout);
+       for (i=0; i<argc; i++) {
+
+               struct samsync_object o;
+
+               ZERO_STRUCT(o);
+
+               if (!StrnCaseCmp(argv[i], "user_rid=", strlen("user_rid="))) {
+                       o.object_identifier.rid         = get_int_param(argv[i]);
+                       o.object_type                   = NETR_DELTA_USER;
+                       o.database_id                   = SAM_DATABASE_DOMAIN;
+               }
+               if (!StrnCaseCmp(argv[i], "group_rid=", strlen("group_rid="))) {
+                       o.object_identifier.rid         = get_int_param(argv[i]);
+                       o.object_type                   = NETR_DELTA_GROUP;
+                       o.database_id                   = SAM_DATABASE_DOMAIN;
+               }
+               if (!StrnCaseCmp(argv[i], "group_member_rid=", strlen("group_member_rid="))) {
+                       o.object_identifier.rid         = get_int_param(argv[i]);
+                       o.object_type                   = NETR_DELTA_GROUP_MEMBER;
+                       o.database_id                   = SAM_DATABASE_DOMAIN;
+               }
+               if (!StrnCaseCmp(argv[i], "alias_rid=", strlen("alias_rid="))) {
+                       o.object_identifier.rid         = get_int_param(argv[i]);
+                       o.object_type                   = NETR_DELTA_ALIAS;
+                       o.database_id                   = SAM_DATABASE_BUILTIN;
+               }
+               if (!StrnCaseCmp(argv[i], "alias_member_rid=", strlen("alias_member_rid="))) {
+                       o.object_identifier.rid         = get_int_param(argv[i]);
+                       o.object_type                   = NETR_DELTA_ALIAS_MEMBER;
+                       o.database_id                   = SAM_DATABASE_BUILTIN;
+               }
+               if (!StrnCaseCmp(argv[i], "account_sid=", strlen("account_sid="))) {
+                       const char *sid_str = get_string_param(argv[i]);
+                       string_to_sid(&o.object_identifier.sid, sid_str);
+                       o.object_type                   = NETR_DELTA_ACCOUNT;
+                       o.database_id                   = SAM_DATABASE_PRIVS;
+               }
+               if (!StrnCaseCmp(argv[i], "policy_sid=", strlen("policy_sid="))) {
+                       const char *sid_str = get_string_param(argv[i]);
+                       string_to_sid(&o.object_identifier.sid, sid_str);
+                       o.object_type                   = NETR_DELTA_POLICY;
+                       o.database_id                   = SAM_DATABASE_PRIVS;
+               }
+               if (!StrnCaseCmp(argv[i], "trustdom_sid=", strlen("trustdom_sid="))) {
+                       const char *sid_str = get_string_param(argv[i]);
+                       string_to_sid(&o.object_identifier.sid, sid_str);
+                       o.object_type                   = NETR_DELTA_TRUSTED_DOMAIN;
+                       o.database_id                   = SAM_DATABASE_PRIVS;
+               }
+               if (!StrnCaseCmp(argv[i], "secret_name=", strlen("secret_name="))) {
+                       o.object_identifier.name        = get_string_param(argv[i]);
+                       o.object_type                   = NETR_DELTA_SECRET;
+                       o.database_id                   = SAM_DATABASE_PRIVS;
+               }
+
+               if (o.object_type > 0) {
+                       ADD_TO_ARRAY(mem_ctx, struct samsync_object, o,
+                                    objects, num_objects);
+               }
        }
-
-       d_printf("User must logon to change password: %d\n", r->logon_to_chgpass);
-}
-
-static void display_group_info(uint32_t rid, struct netr_DELTA_GROUP *r)
-{
-       d_printf("Group '%s' ", r->group_name.string);
-       d_printf("desc='%s', rid=%u\n", r->description.string, rid);
-}
-
-static void display_delete_group(uint32_t rid)
-{
-       d_printf("Delete Group '%d' ", rid);
-}
-
-static void display_rename_group(uint32_t rid, struct netr_DELTA_RENAME *r)
-{
-       d_printf("Rename Group '%d' ", rid);
-       d_printf("Rename Group: %s -> %s\n",
-               r->OldName.string, r->NewName.string);
-}
-
-static void display_delete_user(uint32_t rid)
-{
-       d_printf("Delete User '%d' ", rid);
-}
-
-static void display_rename_user(uint32_t rid, struct netr_DELTA_RENAME *r)
-{
-       d_printf("Rename User '%d' ", rid);
-       d_printf("Rename User: %s -> %s\n",
-               r->OldName.string, r->NewName.string);
-}
-
-static void display_delete_alias(uint32_t rid)
-{
-       d_printf("Delete Alias '%d' ", rid);
-}
-
-static void display_rename_alias(uint32_t rid, struct netr_DELTA_RENAME *r)
-{
-       d_printf("Rename Alias '%d' ", rid);
-       d_printf("Rename Alias: %s -> %s\n",
-               r->OldName.string, r->NewName.string);
-}
-
-static NTSTATUS display_sam_entry(TALLOC_CTX *mem_ctx,
-                                 enum netr_SamDatabaseID database_id,
-                                 struct netr_DELTA_ENUM *r,
-                                 NTSTATUS status,
-                                 struct samsync_context *ctx)
-{
-       union netr_DELTA_UNION u = r->delta_union;
-       union netr_DELTA_ID_UNION id = r->delta_id_union;
-
-       switch (r->delta_type) {
-       case NETR_DELTA_DOMAIN:
-               display_domain_info(u.domain);
-               break;
-       case NETR_DELTA_GROUP:
-               display_group_info(id.rid, u.group);
-               break;
-       case NETR_DELTA_DELETE_GROUP:
-               display_delete_group(id.rid);
-               break;
-       case NETR_DELTA_RENAME_GROUP:
-               display_rename_group(id.rid, u.rename_group);
-               break;
-       case NETR_DELTA_USER:
-               display_account_info(id.rid, u.user);
-               break;
-       case NETR_DELTA_DELETE_USER:
-               display_delete_user(id.rid);
-               break;
-       case NETR_DELTA_RENAME_USER:
-               display_rename_user(id.rid, u.rename_user);
-               break;
-       case NETR_DELTA_GROUP_MEMBER:
-               display_group_mem_info(id.rid, u.group_member);
-               break;
-       case NETR_DELTA_ALIAS:
-               display_alias_info(id.rid, u.alias);
-               break;
-       case NETR_DELTA_DELETE_ALIAS:
-               display_delete_alias(id.rid);
-               break;
-       case NETR_DELTA_RENAME_ALIAS:
-               display_rename_alias(id.rid, u.rename_alias);
-               break;
-       case NETR_DELTA_ALIAS_MEMBER:
-               display_alias_mem(id.rid, u.alias_member);
-               break;
-       case NETR_DELTA_POLICY:
-               printf("Policy\n");
-               break;
-       case NETR_DELTA_TRUSTED_DOMAIN:
-               printf("Trusted Domain: %s\n",
-                       u.trusted_domain->domain_name.string);
-               break;
-       case NETR_DELTA_DELETE_TRUST:
-               printf("Delete Trust: %d\n",
-                       u.delete_trust.unknown);
-               break;
-       case NETR_DELTA_ACCOUNT:
-               printf("Account\n");
-               break;
-       case NETR_DELTA_DELETE_ACCOUNT:
-               printf("Delete Account: %d\n",
-                       u.delete_account.unknown);
-               break;
-       case NETR_DELTA_SECRET:
-               printf("Secret\n");
-               break;
-       case NETR_DELTA_DELETE_SECRET:
-               printf("Delete Secret: %d\n",
-                       u.delete_secret.unknown);
-               break;
-       case NETR_DELTA_DELETE_GROUP2:
-               printf("Delete Group2: %s\n",
-                       u.delete_group->account_name);
-               break;
-       case NETR_DELTA_DELETE_USER2:
-               printf("Delete User2: %s\n",
-                       u.delete_user->account_name);
-               break;
-       case NETR_DELTA_MODIFY_COUNT:
-               printf("sam sequence update: 0x%016llx\n",
-                       (unsigned long long) *u.modified_count);
-               break;
-#if 0
-       /* The following types are recognised but not handled */
-       case NETR_DELTA_POLICY:
-               d_printf("NETR_DELTA_POLICY not handled\n");
-               break;
-       case NETR_DELTA_TRUSTED_DOMAIN:
-               d_printf("NETR_DELTA_TRUSTED_DOMAIN not handled\n");
-               break;
-       case NETR_DELTA_ACCOUNT:
-               d_printf("NETR_DELTA_ACCOUNT not handled\n");
-               break;
-       case NETR_DELTA_SECRET:
-               d_printf("NETR_DELTA_SECRET not handled\n");
-               break;
-       case NETR_DELTA_MODIFY_COUNT:
-               d_printf("NETR_DELTA_MODIFY_COUNT not handled\n");
-               break;
-       case NETR_DELTA_DELETE_TRUST:
-               d_printf("NETR_DELTA_DELETE_TRUST not handled\n");
-               break;
-       case NETR_DELTA_DELETE_ACCOUNT:
-               d_printf("NETR_DELTA_DELETE_ACCOUNT not handled\n");
-               break;
-       case NETR_DELTA_DELETE_SECRET:
-               d_printf("NETR_DELTA_DELETE_SECRET not handled\n");
-               break;
-       case NETR_DELTA_DELETE_GROUP2:
-               d_printf("NETR_DELTA_DELETE_GROUP2 not handled\n");
-               break;
-       case NETR_DELTA_DELETE_USER2:
-               d_printf("NETR_DELTA_DELETE_USER2 not handled\n");
-               break;
-#endif
-       default:
-               printf("unknown delta type 0x%02x\n",
-                       r->delta_type);
-               break;
-       }
-
-       return NT_STATUS_OK;
-}
-
-static NTSTATUS display_sam_entries(TALLOC_CTX *mem_ctx,
-                                   enum netr_SamDatabaseID database_id,
-                                   struct netr_DELTA_ENUM_ARRAY *r,
-                                   NTSTATUS status,
-                                   struct samsync_context *ctx)
-{
-       int i;
-
-       for (i = 0; i < r->num_deltas; i++) {
-               display_sam_entry(mem_ctx, database_id, &r->delta_enum[i], status, ctx);
-       }
-
-       return NT_STATUS_OK;
 }
 
 /* dump sam database via samsync rpc calls */
 NTSTATUS rpc_samdump_internals(struct net_context *c,
-                               const DOM_SID *domain_sid,
+                               const struct dom_sid *domain_sid,
                                const char *domain_name,
                                struct cli_state *cli,
                                struct rpc_pipe_client *pipe_hnd,
@@ -314,23 +120,31 @@ NTSTATUS rpc_samdump_internals(struct net_context *c,
        struct samsync_context *ctx = NULL;
        NTSTATUS status;
 
-       status = samsync_init_context(mem_ctx,
-                                     domain_sid,
-                                     domain_name,
-                                     NET_SAMSYNC_MODE_DUMP,
-                                     &ctx);
+       status = libnet_samsync_init_context(mem_ctx,
+                                            domain_sid,
+                                            &ctx);
        if (!NT_STATUS_IS_OK(status)) {
                return status;
        }
 
-       samsync_process_database(pipe_hnd, SAM_DATABASE_DOMAIN,
-                                display_sam_entries, ctx);
+       ctx->mode               = NET_SAMSYNC_MODE_DUMP;
+       ctx->cli                = pipe_hnd;
+       ctx->ops                = &libnet_samsync_display_ops;
+       ctx->domain_name        = domain_name;
+
+       ctx->force_full_replication = c->opt_force_full_repl ? true : false;
+       ctx->clean_old_entries = c->opt_clean_old_entries ? true : false;
+
+       parse_samsync_partial_replication_objects(ctx, argc, argv,
+                                                 &ctx->single_object_replication,
+                                                 &ctx->objects,
+                                                 &ctx->num_objects);
+
+       libnet_samsync(SAM_DATABASE_DOMAIN, ctx);
 
-       samsync_process_database(pipe_hnd, SAM_DATABASE_BUILTIN,
-                                display_sam_entries, ctx);
+       libnet_samsync(SAM_DATABASE_BUILTIN, ctx);
 
-       samsync_process_database(pipe_hnd, SAM_DATABASE_PRIVS,
-                                display_sam_entries, ctx);
+       libnet_samsync(SAM_DATABASE_PRIVS, ctx);
 
        TALLOC_FREE(ctx);
 
@@ -348,45 +162,91 @@ NTSTATUS rpc_samdump_internals(struct net_context *c,
 
 int rpc_vampire_usage(struct net_context *c, int argc, const char **argv)
 {
-       d_printf("net rpc vampire [ldif [<ldif-filename>] [options]\n"
-                "\t to pull accounts from a remote PDC where we are a BDC\n"
-                "\t\t no args puts accounts in local passdb from smb.conf\n"
-                "\t\t ldif - put accounts in ldif format (file defaults to "
-                "/tmp/tmp.ldif\n");
+       d_printf(_("net rpc vampire ([ldif [<ldif-filename>] | [keytab] "
+                  "[<keytab-filename]) [options]\n"
+                  "\t to pull accounts from a remote PDC where we are a BDC\n"
+                  "\t\t no args puts accounts in local passdb from smb.conf\n"
+                  "\t\t ldif - put accounts in ldif format (file defaults to "
+                  "/tmp/tmp.ldif)\n"
+                  "\t\t keytab - put account passwords in krb5 keytab "
+                  "(defaults to system keytab)\n"));
 
        net_common_flags_usage(c, argc, argv);
        return -1;
 }
 
+static NTSTATUS rpc_vampire_ds_internals(struct net_context *c,
+                                        const struct dom_sid *domain_sid,
+                                        const char *domain_name,
+                                        struct cli_state *cli,
+                                        struct rpc_pipe_client *pipe_hnd,
+                                        TALLOC_CTX *mem_ctx,
+                                        int argc,
+                                        const char **argv)
+{
+       NTSTATUS status;
+       struct dssync_context *ctx = NULL;
+
+       if (!dom_sid_equal(domain_sid, get_global_sam_sid())) {
+               d_printf(_("Cannot import users from %s at this time, "
+                          "as the current domain:\n\t%s: %s\nconflicts "
+                          "with the remote domain\n\t%s: %s\n"
+                          "Perhaps you need to set: \n\n\tsecurity=user\n\t"
+                          "workgroup=%s\n\n in your smb.conf?\n"),
+                        domain_name,
+                        get_global_sam_name(),
+                        sid_string_dbg(get_global_sam_sid()),
+                        domain_name,
+                        sid_string_dbg(domain_sid),
+                        domain_name);
+               return NT_STATUS_UNSUCCESSFUL;
+       }
+
+       status = libnet_dssync_init_context(mem_ctx,
+                                           &ctx);
+       if (!NT_STATUS_IS_OK(status)) {
+               return status;
+       }
+
+       ctx->cli                = pipe_hnd;
+       ctx->domain_name        = domain_name;
+       ctx->ops                = &libnet_dssync_passdb_ops;
+
+       status = libnet_dssync(mem_ctx, ctx);
+       if (!NT_STATUS_IS_OK(status) && ctx->error_message) {
+               d_fprintf(stderr, "%s\n", ctx->error_message);
+               goto out;
+       }
+
+       if (ctx->result_message) {
+               d_fprintf(stdout, "%s\n", ctx->result_message);
+       }
+
+ out:
+       TALLOC_FREE(ctx);
+
+       return status;
+}
 
 /* dump sam database via samsync rpc calls */
-NTSTATUS rpc_vampire_internals(struct net_context *c,
-                               const DOM_SID *domain_sid,
-                               const char *domain_name,
-                               struct cli_state *cli,
-                               struct rpc_pipe_client *pipe_hnd,
-                               TALLOC_CTX *mem_ctx,
-                               int argc,
-                               const char **argv)
+static NTSTATUS rpc_vampire_internals(struct net_context *c,
+                                     const struct dom_sid *domain_sid,
+                                     const char *domain_name,
+                                     struct cli_state *cli,
+                                     struct rpc_pipe_client *pipe_hnd,
+                                     TALLOC_CTX *mem_ctx,
+                                     int argc,
+                                     const char **argv)
 {
        NTSTATUS result;
        struct samsync_context *ctx = NULL;
 
-       result = samsync_init_context(mem_ctx,
-                                     domain_sid,
-                                     domain_name,
-                                     NET_SAMSYNC_MODE_FETCH_PASSDB,
-                                     &ctx);
-       if (!NT_STATUS_IS_OK(result)) {
-               return result;
-       }
-
-       if (!sid_equal(domain_sid, get_global_sam_sid())) {
-               d_printf("Cannot import users from %s at this time, "
-                        "as the current domain:\n\t%s: %s\nconflicts "
-                        "with the remote domain\n\t%s: %s\n"
-                        "Perhaps you need to set: \n\n\tsecurity=user\n\t"
-                        "workgroup=%s\n\n in your smb.conf?\n",
+       if (!dom_sid_equal(domain_sid, get_global_sam_sid())) {
+               d_printf(_("Cannot import users from %s at this time, "
+                          "as the current domain:\n\t%s: %s\nconflicts "
+                          "with the remote domain\n\t%s: %s\n"
+                          "Perhaps you need to set: \n\n\tsecurity=user\n\t"
+                          "workgroup=%s\n\n in your smb.conf?\n"),
                         domain_name,
                         get_global_sam_name(),
                         sid_string_dbg(get_global_sam_sid()),
@@ -396,9 +256,28 @@ NTSTATUS rpc_vampire_internals(struct net_context *c,
                return NT_STATUS_UNSUCCESSFUL;
        }
 
+       result = libnet_samsync_init_context(mem_ctx,
+                                            domain_sid,
+                                            &ctx);
+       if (!NT_STATUS_IS_OK(result)) {
+               return result;
+       }
+
+       ctx->mode               = NET_SAMSYNC_MODE_FETCH_PASSDB;
+       ctx->cli                = pipe_hnd;
+       ctx->ops                = &libnet_samsync_passdb_ops;
+       ctx->domain_name        = domain_name;
+
+       ctx->force_full_replication = c->opt_force_full_repl ? true : false;
+       ctx->clean_old_entries = c->opt_clean_old_entries ? true : false;
+
+       parse_samsync_partial_replication_objects(ctx, argc, argv,
+                                                 &ctx->single_object_replication,
+                                                 &ctx->objects,
+                                                 &ctx->num_objects);
+
        /* fetch domain */
-       result = samsync_process_database(pipe_hnd, SAM_DATABASE_DOMAIN,
-                                         fetch_sam_entries, ctx);
+       result = libnet_samsync(SAM_DATABASE_DOMAIN, ctx);
 
        if (!NT_STATUS_IS_OK(result) && ctx->error_message) {
                d_fprintf(stderr, "%s\n", ctx->error_message);
@@ -410,10 +289,9 @@ NTSTATUS rpc_vampire_internals(struct net_context *c,
        }
 
        /* fetch builtin */
-       ctx->domain_sid = sid_dup_talloc(mem_ctx, &global_sid_Builtin);
+       ctx->domain_sid = dom_sid_dup(mem_ctx, &global_sid_Builtin);
        ctx->domain_sid_str = sid_string_talloc(mem_ctx, ctx->domain_sid);
-       result = samsync_process_database(pipe_hnd, SAM_DATABASE_BUILTIN,
-                                         fetch_sam_entries, ctx);
+       result = libnet_samsync(SAM_DATABASE_BUILTIN, ctx);
 
        if (!NT_STATUS_IS_OK(result) && ctx->error_message) {
                d_fprintf(stderr, "%s\n", ctx->error_message);
@@ -429,23 +307,78 @@ NTSTATUS rpc_vampire_internals(struct net_context *c,
        return result;
 }
 
-NTSTATUS rpc_vampire_ldif_internals(struct net_context *c,
-                                   const DOM_SID *domain_sid,
-                                   const char *domain_name,
-                                   struct cli_state *cli,
-                                   struct rpc_pipe_client *pipe_hnd,
-                                   TALLOC_CTX *mem_ctx,
-                                   int argc,
-                                   const char **argv)
+int rpc_vampire_passdb(struct net_context *c, int argc, const char **argv)
+{
+       int ret = 0;
+       NTSTATUS status;
+       struct cli_state *cli = NULL;
+       struct net_dc_info dc_info;
+
+       if (c->display_usage) {
+               d_printf(  "%s\n"
+                          "net rpc vampire passdb\n"
+                          "    %s\n",
+                        _("Usage:"),
+                        _("Dump remote SAM database to passdb"));
+               return 0;
+       }
+
+       status = net_make_ipc_connection(c, 0, &cli);
+       if (!NT_STATUS_IS_OK(status)) {
+               return -1;
+       }
+
+       status = net_scan_dc(c, cli, &dc_info);
+       if (!NT_STATUS_IS_OK(status)) {
+               return -1;
+       }
+
+       if (!dc_info.is_ad) {
+               printf(_("DC is not running Active Directory\n"));
+               ret = run_rpc_command(c, cli, &ndr_table_netlogon.syntax_id,
+                                     0,
+                                     rpc_vampire_internals, argc, argv);
+               return ret;
+       }
+
+       if (!c->opt_force) {
+               d_printf(  "%s\n"
+                          "net rpc vampire passdb\n"
+                          "    %s\n",
+                        _("Usage:"),
+                        _("Should not be used against Active Directory, maybe use --force"));
+               return -1;
+       }
+
+       ret = run_rpc_command(c, cli, &ndr_table_drsuapi.syntax_id,
+                             NET_FLAGS_SEAL | NET_FLAGS_TCP,
+                             rpc_vampire_ds_internals, argc, argv);
+       if (ret != 0 && dc_info.is_mixed_mode) {
+               printf(_("Fallback to NT4 vampire on Mixed-Mode AD "
+                        "Domain\n"));
+               ret = run_rpc_command(c, cli, &ndr_table_netlogon.syntax_id,
+                                     0,
+                                     rpc_vampire_internals, argc, argv);
+       }
+
+       return ret;
+}
+
+static NTSTATUS rpc_vampire_ldif_internals(struct net_context *c,
+                                          const struct dom_sid *domain_sid,
+                                          const char *domain_name,
+                                          struct cli_state *cli,
+                                          struct rpc_pipe_client *pipe_hnd,
+                                          TALLOC_CTX *mem_ctx,
+                                          int argc,
+                                          const char **argv)
 {
        NTSTATUS status;
        struct samsync_context *ctx = NULL;
 
-       status = samsync_init_context(mem_ctx,
-                                     domain_sid,
-                                     domain_name,
-                                     NET_SAMSYNC_MODE_FETCH_LDIF,
-                                     &ctx);
+       status = libnet_samsync_init_context(mem_ctx,
+                                            domain_sid,
+                                            &ctx);
        if (!NT_STATUS_IS_OK(status)) {
                return status;
        }
@@ -453,10 +386,23 @@ NTSTATUS rpc_vampire_ldif_internals(struct net_context *c,
        if (argc >= 1) {
                ctx->output_filename = argv[0];
        }
+       if (argc >= 2) {
+               parse_samsync_partial_replication_objects(ctx, argc-1, argv+1,
+                                                         &ctx->single_object_replication,
+                                                         &ctx->objects,
+                                                         &ctx->num_objects);
+       }
+
+       ctx->mode               = NET_SAMSYNC_MODE_FETCH_LDIF;
+       ctx->cli                = pipe_hnd;
+       ctx->ops                = &libnet_samsync_ldif_ops;
+       ctx->domain_name        = domain_name;
+
+       ctx->force_full_replication = c->opt_force_full_repl ? true : false;
+       ctx->clean_old_entries = c->opt_clean_old_entries ? true : false;
 
        /* fetch domain */
-       status = samsync_process_database(pipe_hnd, SAM_DATABASE_DOMAIN,
-                                         fetch_sam_entries_ldif, ctx);
+       status = libnet_samsync(SAM_DATABASE_DOMAIN, ctx);
 
        if (!NT_STATUS_IS_OK(status) && ctx->error_message) {
                d_fprintf(stderr, "%s\n", ctx->error_message);
@@ -468,10 +414,9 @@ NTSTATUS rpc_vampire_ldif_internals(struct net_context *c,
        }
 
        /* fetch builtin */
-       ctx->domain_sid = sid_dup_talloc(mem_ctx, &global_sid_Builtin);
+       ctx->domain_sid = dom_sid_dup(mem_ctx, &global_sid_Builtin);
        ctx->domain_sid_str = sid_string_talloc(mem_ctx, ctx->domain_sid);
-       status = samsync_process_database(pipe_hnd, SAM_DATABASE_BUILTIN,
-                                         fetch_sam_entries_ldif, ctx);
+       status = libnet_samsync(SAM_DATABASE_BUILTIN, ctx);
 
        if (!NT_STATUS_IS_OK(status) && ctx->error_message) {
                d_fprintf(stderr, "%s\n", ctx->error_message);
@@ -490,12 +435,187 @@ NTSTATUS rpc_vampire_ldif_internals(struct net_context *c,
 int rpc_vampire_ldif(struct net_context *c, int argc, const char **argv)
 {
        if (c->display_usage) {
-               d_printf("Usage\n"
-                        "net rpc vampire ldif\n"
-                        "    Dump remote SAM database to LDIF file or stdout\n");
+               d_printf(  "%s\n"
+                          "net rpc vampire ldif\n"
+                          "    %s\n",
+                        _("Usage:"),
+                        _("Dump remote SAM database to LDIF file or "
+                          "stdout"));
                return 0;
        }
 
-       return run_rpc_command(c, NULL, PI_NETLOGON, 0, rpc_vampire_ldif_internals,
-                              argc, argv);
+       return run_rpc_command(c, NULL, &ndr_table_netlogon.syntax_id, 0,
+                              rpc_vampire_ldif_internals, argc, argv);
+}
+
+
+static NTSTATUS rpc_vampire_keytab_internals(struct net_context *c,
+                                            const struct dom_sid *domain_sid,
+                                            const char *domain_name,
+                                            struct cli_state *cli,
+                                            struct rpc_pipe_client *pipe_hnd,
+                                            TALLOC_CTX *mem_ctx,
+                                            int argc,
+                                            const char **argv)
+{
+       NTSTATUS status;
+       struct samsync_context *ctx = NULL;
+
+       status = libnet_samsync_init_context(mem_ctx,
+                                            domain_sid,
+                                            &ctx);
+       if (!NT_STATUS_IS_OK(status)) {
+               return status;
+       }
+
+       if (argc < 1) {
+               /* the caller should ensure that a filename is provided */
+               return NT_STATUS_INVALID_PARAMETER;
+       } else {
+               ctx->output_filename = argv[0];
+       }
+       if (argc >= 2) {
+               parse_samsync_partial_replication_objects(ctx, argc-1, argv+1,
+                                                         &ctx->single_object_replication,
+                                                         &ctx->objects,
+                                                         &ctx->num_objects);
+       }
+
+       ctx->mode               = NET_SAMSYNC_MODE_FETCH_KEYTAB;
+       ctx->cli                = pipe_hnd;
+       ctx->ops                = &libnet_samsync_keytab_ops;
+       ctx->domain_name        = domain_name;
+       ctx->username           = c->opt_user_name;
+       ctx->password           = c->opt_password;
+
+       ctx->force_full_replication = c->opt_force_full_repl ? true : false;
+       ctx->clean_old_entries = c->opt_clean_old_entries ? true : false;
+
+       /* fetch domain */
+       status = libnet_samsync(SAM_DATABASE_DOMAIN, ctx);
+
+       if (!NT_STATUS_IS_OK(status) && ctx->error_message) {
+               d_fprintf(stderr, "%s\n", ctx->error_message);
+               goto out;
+       }
+
+       if (ctx->result_message) {
+               d_fprintf(stdout, "%s\n", ctx->result_message);
+       }
+
+ out:
+       TALLOC_FREE(ctx);
+
+       return status;
+}
+
+static NTSTATUS rpc_vampire_keytab_ds_internals(struct net_context *c,
+                                               const struct dom_sid *domain_sid,
+                                               const char *domain_name,
+                                               struct cli_state *cli,
+                                               struct rpc_pipe_client *pipe_hnd,
+                                               TALLOC_CTX *mem_ctx,
+                                               int argc,
+                                               const char **argv)
+{
+       NTSTATUS status;
+       struct dssync_context *ctx = NULL;
+
+       status = libnet_dssync_init_context(mem_ctx,
+                                           &ctx);
+       if (!NT_STATUS_IS_OK(status)) {
+               return status;
+       }
+
+       ctx->force_full_replication = c->opt_force_full_repl ? true : false;
+       ctx->clean_old_entries = c->opt_clean_old_entries ? true : false;
+
+       if (argc < 1) {
+               /* the caller should ensure that a filename is provided */
+               return NT_STATUS_INVALID_PARAMETER;
+       } else {
+               ctx->output_filename = argv[0];
+       }
+
+       if (argc >= 2) {
+               ctx->object_dns = &argv[1];
+               ctx->object_count = argc - 1;
+               ctx->single_object_replication = c->opt_single_obj_repl ? true
+                                                                       : false;
+       }
+
+       ctx->cli                = pipe_hnd;
+       ctx->domain_name        = domain_name;
+       ctx->ops                = &libnet_dssync_keytab_ops;
+
+       status = libnet_dssync(mem_ctx, ctx);
+       if (!NT_STATUS_IS_OK(status) && ctx->error_message) {
+               d_fprintf(stderr, "%s\n", ctx->error_message);
+               goto out;
+       }
+
+       if (ctx->result_message) {
+               d_fprintf(stdout, "%s\n", ctx->result_message);
+       }
+
+ out:
+       TALLOC_FREE(ctx);
+
+       return status;
+}
+
+/**
+ * Basic function for 'net rpc vampire keytab'
+ *
+ * @param c    A net_context structure
+ * @param argc  Standard main() style argc
+ * @param argc  Standard main() style argv.  Initial components are already
+ *              stripped
+ **/
+
+int rpc_vampire_keytab(struct net_context *c, int argc, const char **argv)
+{
+       int ret = 0;
+       NTSTATUS status;
+       struct cli_state *cli = NULL;
+       struct net_dc_info dc_info;
+
+       if (c->display_usage || (argc < 1)) {
+               d_printf("%s\n%s",
+                        _("Usage:"),
+                        _("net rpc vampire keytab <keytabfile>\n"
+                          "    Dump remote SAM database to Kerberos keytab "
+                          "file\n"));
+               return 0;
+       }
+
+       status = net_make_ipc_connection(c, 0, &cli);
+       if (!NT_STATUS_IS_OK(status)) {
+               return -1;
+       }
+
+       status = net_scan_dc(c, cli, &dc_info);
+       if (!NT_STATUS_IS_OK(status)) {
+               return -1;
+       }
+
+       if (!dc_info.is_ad) {
+               printf(_("DC is not running Active Directory\n"));
+               ret = run_rpc_command(c, cli, &ndr_table_netlogon.syntax_id,
+                                     0,
+                                     rpc_vampire_keytab_internals, argc, argv);
+       } else {
+               ret = run_rpc_command(c, cli, &ndr_table_drsuapi.syntax_id,
+                                     NET_FLAGS_SEAL | NET_FLAGS_TCP,
+                                     rpc_vampire_keytab_ds_internals, argc, argv);
+               if (ret != 0 && dc_info.is_mixed_mode) {
+                       printf(_("Fallback to NT4 vampire on Mixed-Mode AD "
+                                "Domain\n"));
+                       ret = run_rpc_command(c, cli, &ndr_table_netlogon.syntax_id,
+                                             0,
+                                             rpc_vampire_keytab_internals, argc, argv);
+               }
+       }
+
+       return ret;
 }