Correctly check for errors in strlower_m() returns.
[samba.git] / source3 / libnet / libnet_join.c
1 /*
2  *  Unix SMB/CIFS implementation.
3  *  libnet Join Support
4  *  Copyright (C) Gerald (Jerry) Carter 2006
5  *  Copyright (C) Guenther Deschner 2007-2008
6  *
7  *  This program is free software; you can redistribute it and/or modify
8  *  it under the terms of the GNU General Public License as published by
9  *  the Free Software Foundation; either version 3 of the License, or
10  *  (at your option) any later version.
11  *
12  *  This program is distributed in the hope that it will be useful,
13  *  but WITHOUT ANY WARRANTY; without even the implied warranty of
14  *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
15  *  GNU General Public License for more details.
16  *
17  *  You should have received a copy of the GNU General Public License
18  *  along with this program; if not, see <http://www.gnu.org/licenses/>.
19  */
20
21 #include "includes.h"
22 #include "ads.h"
23 #include "librpc/gen_ndr/ndr_libnet_join.h"
24 #include "libnet/libnet_join.h"
25 #include "libcli/auth/libcli_auth.h"
26 #include "../librpc/gen_ndr/ndr_samr_c.h"
27 #include "rpc_client/init_samr.h"
28 #include "../librpc/gen_ndr/ndr_lsa_c.h"
29 #include "rpc_client/cli_lsarpc.h"
30 #include "../librpc/gen_ndr/ndr_netlogon.h"
31 #include "rpc_client/cli_netlogon.h"
32 #include "lib/smbconf/smbconf.h"
33 #include "lib/smbconf/smbconf_reg.h"
34 #include "../libds/common/flags.h"
35 #include "secrets.h"
36 #include "rpc_client/init_lsa.h"
37 #include "rpc_client/cli_pipe.h"
38 #include "../libcli/security/security.h"
39 #include "passdb.h"
40 #include "libsmb/libsmb.h"
41 #include "../libcli/smb/smbXcli_base.h"
42 #include "lib/param/loadparm.h"
43
44 /****************************************************************
45 ****************************************************************/
46
47 #define LIBNET_JOIN_DUMP_CTX(ctx, r, f) \
48         do { \
49                 char *str = NULL; \
50                 str = NDR_PRINT_FUNCTION_STRING(ctx, libnet_JoinCtx, f, r); \
51                 DEBUG(1,("libnet_Join:\n%s", str)); \
52                 TALLOC_FREE(str); \
53         } while (0)
54
55 #define LIBNET_JOIN_IN_DUMP_CTX(ctx, r) \
56         LIBNET_JOIN_DUMP_CTX(ctx, r, NDR_IN | NDR_SET_VALUES)
57 #define LIBNET_JOIN_OUT_DUMP_CTX(ctx, r) \
58         LIBNET_JOIN_DUMP_CTX(ctx, r, NDR_OUT)
59
60 #define LIBNET_UNJOIN_DUMP_CTX(ctx, r, f) \
61         do { \
62                 char *str = NULL; \
63                 str = NDR_PRINT_FUNCTION_STRING(ctx, libnet_UnjoinCtx, f, r); \
64                 DEBUG(1,("libnet_Unjoin:\n%s", str)); \
65                 TALLOC_FREE(str); \
66         } while (0)
67
68 #define LIBNET_UNJOIN_IN_DUMP_CTX(ctx, r) \
69         LIBNET_UNJOIN_DUMP_CTX(ctx, r, NDR_IN | NDR_SET_VALUES)
70 #define LIBNET_UNJOIN_OUT_DUMP_CTX(ctx, r) \
71         LIBNET_UNJOIN_DUMP_CTX(ctx, r, NDR_OUT)
72
73 /****************************************************************
74 ****************************************************************/
75
76 static void libnet_join_set_error_string(TALLOC_CTX *mem_ctx,
77                                          struct libnet_JoinCtx *r,
78                                          const char *format, ...)
79 {
80         va_list args;
81
82         if (r->out.error_string) {
83                 return;
84         }
85
86         va_start(args, format);
87         r->out.error_string = talloc_vasprintf(mem_ctx, format, args);
88         va_end(args);
89 }
90
91 /****************************************************************
92 ****************************************************************/
93
94 static void libnet_unjoin_set_error_string(TALLOC_CTX *mem_ctx,
95                                            struct libnet_UnjoinCtx *r,
96                                            const char *format, ...)
97 {
98         va_list args;
99
100         if (r->out.error_string) {
101                 return;
102         }
103
104         va_start(args, format);
105         r->out.error_string = talloc_vasprintf(mem_ctx, format, args);
106         va_end(args);
107 }
108
109 #ifdef HAVE_ADS
110
111 /****************************************************************
112 ****************************************************************/
113
114 static ADS_STATUS libnet_connect_ads(const char *dns_domain_name,
115                                      const char *netbios_domain_name,
116                                      const char *dc_name,
117                                      const char *user_name,
118                                      const char *password,
119                                      ADS_STRUCT **ads)
120 {
121         ADS_STATUS status;
122         ADS_STRUCT *my_ads = NULL;
123         char *cp;
124
125         my_ads = ads_init(dns_domain_name,
126                           netbios_domain_name,
127                           dc_name);
128         if (!my_ads) {
129                 return ADS_ERROR_LDAP(LDAP_NO_MEMORY);
130         }
131
132         if (user_name) {
133                 SAFE_FREE(my_ads->auth.user_name);
134                 my_ads->auth.user_name = SMB_STRDUP(user_name);
135                 if ((cp = strchr_m(my_ads->auth.user_name, '@'))!=0) {
136                         *cp++ = '\0';
137                         SAFE_FREE(my_ads->auth.realm);
138                         my_ads->auth.realm = smb_xstrdup(cp);
139                         if (!strupper_m(my_ads->auth.realm)) {
140                                 ads_destroy(&my_ads);
141                                 return ADS_ERROR_LDAP(LDAP_NO_MEMORY);
142                         }
143                 }
144         }
145
146         if (password) {
147                 SAFE_FREE(my_ads->auth.password);
148                 my_ads->auth.password = SMB_STRDUP(password);
149         }
150
151         status = ads_connect_user_creds(my_ads);
152         if (!ADS_ERR_OK(status)) {
153                 ads_destroy(&my_ads);
154                 return status;
155         }
156
157         *ads = my_ads;
158         return ADS_SUCCESS;
159 }
160
161 /****************************************************************
162 ****************************************************************/
163
164 static ADS_STATUS libnet_join_connect_ads(TALLOC_CTX *mem_ctx,
165                                           struct libnet_JoinCtx *r)
166 {
167         ADS_STATUS status;
168
169         status = libnet_connect_ads(r->out.dns_domain_name,
170                                     r->out.netbios_domain_name,
171                                     r->in.dc_name,
172                                     r->in.admin_account,
173                                     r->in.admin_password,
174                                     &r->in.ads);
175         if (!ADS_ERR_OK(status)) {
176                 libnet_join_set_error_string(mem_ctx, r,
177                         "failed to connect to AD: %s",
178                         ads_errstr(status));
179                 return status;
180         }
181
182         if (!r->out.netbios_domain_name) {
183                 r->out.netbios_domain_name = talloc_strdup(mem_ctx,
184                                                            r->in.ads->server.workgroup);
185                 ADS_ERROR_HAVE_NO_MEMORY(r->out.netbios_domain_name);
186         }
187
188         if (!r->out.dns_domain_name) {
189                 r->out.dns_domain_name = talloc_strdup(mem_ctx,
190                                                        r->in.ads->config.realm);
191                 ADS_ERROR_HAVE_NO_MEMORY(r->out.dns_domain_name);
192         }
193
194         r->out.domain_is_ad = true;
195
196         return ADS_SUCCESS;
197 }
198
199 /****************************************************************
200 ****************************************************************/
201
202 static ADS_STATUS libnet_unjoin_connect_ads(TALLOC_CTX *mem_ctx,
203                                             struct libnet_UnjoinCtx *r)
204 {
205         ADS_STATUS status;
206
207         status = libnet_connect_ads(r->in.domain_name,
208                                     r->in.domain_name,
209                                     r->in.dc_name,
210                                     r->in.admin_account,
211                                     r->in.admin_password,
212                                     &r->in.ads);
213         if (!ADS_ERR_OK(status)) {
214                 libnet_unjoin_set_error_string(mem_ctx, r,
215                         "failed to connect to AD: %s",
216                         ads_errstr(status));
217         }
218
219         return status;
220 }
221
222 /****************************************************************
223  join a domain using ADS (LDAP mods)
224 ****************************************************************/
225
226 static ADS_STATUS libnet_join_precreate_machine_acct(TALLOC_CTX *mem_ctx,
227                                                      struct libnet_JoinCtx *r)
228 {
229         ADS_STATUS status;
230         LDAPMessage *res = NULL;
231         const char *attrs[] = { "dn", NULL };
232         bool moved = false;
233
234         status = ads_check_ou_dn(mem_ctx, r->in.ads, &r->in.account_ou);
235         if (!ADS_ERR_OK(status)) {
236                 return status;
237         }
238
239         status = ads_search_dn(r->in.ads, &res, r->in.account_ou, attrs);
240         if (!ADS_ERR_OK(status)) {
241                 return status;
242         }
243
244         if (ads_count_replies(r->in.ads, res) != 1) {
245                 ads_msgfree(r->in.ads, res);
246                 return ADS_ERROR_LDAP(LDAP_NO_SUCH_OBJECT);
247         }
248
249         ads_msgfree(r->in.ads, res);
250
251         /* Attempt to create the machine account and bail if this fails.
252            Assume that the admin wants exactly what they requested */
253
254         status = ads_create_machine_acct(r->in.ads,
255                                          r->in.machine_name,
256                                          r->in.account_ou);
257
258         if (ADS_ERR_OK(status)) {
259                 DEBUG(1,("machine account creation created\n"));
260                 return status;
261         } else  if ((status.error_type == ENUM_ADS_ERROR_LDAP) &&
262                     (status.err.rc == LDAP_ALREADY_EXISTS)) {
263                 status = ADS_SUCCESS;
264         }
265
266         if (!ADS_ERR_OK(status)) {
267                 DEBUG(1,("machine account creation failed\n"));
268                 return status;
269         }
270
271         status = ads_move_machine_acct(r->in.ads,
272                                        r->in.machine_name,
273                                        r->in.account_ou,
274                                        &moved);
275         if (!ADS_ERR_OK(status)) {
276                 DEBUG(1,("failure to locate/move pre-existing "
277                         "machine account\n"));
278                 return status;
279         }
280
281         DEBUG(1,("The machine account %s the specified OU.\n",
282                 moved ? "was moved into" : "already exists in"));
283
284         return status;
285 }
286
287 /****************************************************************
288 ****************************************************************/
289
290 static ADS_STATUS libnet_unjoin_remove_machine_acct(TALLOC_CTX *mem_ctx,
291                                                     struct libnet_UnjoinCtx *r)
292 {
293         ADS_STATUS status;
294
295         if (!r->in.ads) {
296                 status = libnet_unjoin_connect_ads(mem_ctx, r);
297                 if (!ADS_ERR_OK(status)) {
298                         libnet_unjoin_set_error_string(mem_ctx, r,
299                                 "failed to connect to AD: %s",
300                                 ads_errstr(status));
301                         return status;
302                 }
303         }
304
305         status = ads_leave_realm(r->in.ads, r->in.machine_name);
306         if (!ADS_ERR_OK(status)) {
307                 libnet_unjoin_set_error_string(mem_ctx, r,
308                         "failed to leave realm: %s",
309                         ads_errstr(status));
310                 return status;
311         }
312
313         return ADS_SUCCESS;
314 }
315
316 /****************************************************************
317 ****************************************************************/
318
319 static ADS_STATUS libnet_join_find_machine_acct(TALLOC_CTX *mem_ctx,
320                                                 struct libnet_JoinCtx *r)
321 {
322         ADS_STATUS status;
323         LDAPMessage *res = NULL;
324         char *dn = NULL;
325
326         if (!r->in.machine_name) {
327                 return ADS_ERROR(LDAP_NO_MEMORY);
328         }
329
330         status = ads_find_machine_acct(r->in.ads,
331                                        &res,
332                                        r->in.machine_name);
333         if (!ADS_ERR_OK(status)) {
334                 return status;
335         }
336
337         if (ads_count_replies(r->in.ads, res) != 1) {
338                 status = ADS_ERROR_LDAP(LDAP_NO_MEMORY);
339                 goto done;
340         }
341
342         dn = ads_get_dn(r->in.ads, mem_ctx, res);
343         if (!dn) {
344                 status = ADS_ERROR_LDAP(LDAP_NO_MEMORY);
345                 goto done;
346         }
347
348         r->out.dn = talloc_strdup(mem_ctx, dn);
349         if (!r->out.dn) {
350                 status = ADS_ERROR_LDAP(LDAP_NO_MEMORY);
351                 goto done;
352         }
353
354  done:
355         ads_msgfree(r->in.ads, res);
356         TALLOC_FREE(dn);
357
358         return status;
359 }
360
361 /****************************************************************
362  Set a machines dNSHostName and servicePrincipalName attributes
363 ****************************************************************/
364
365 static ADS_STATUS libnet_join_set_machine_spn(TALLOC_CTX *mem_ctx,
366                                               struct libnet_JoinCtx *r)
367 {
368         ADS_STATUS status;
369         ADS_MODLIST mods;
370         fstring my_fqdn;
371         const char *spn_array[3] = {NULL, NULL, NULL};
372         char *spn = NULL;
373
374         /* Find our DN */
375
376         status = libnet_join_find_machine_acct(mem_ctx, r);
377         if (!ADS_ERR_OK(status)) {
378                 return status;
379         }
380
381         /* Windows only creates HOST/shortname & HOST/fqdn. */
382
383         spn = talloc_asprintf(mem_ctx, "HOST/%s", r->in.machine_name);
384         if (!spn) {
385                 return ADS_ERROR_LDAP(LDAP_NO_MEMORY);
386         }
387         if (!strupper_m(spn)) {
388                 return ADS_ERROR_LDAP(LDAP_NO_MEMORY);
389         }
390         spn_array[0] = spn;
391
392         if (!name_to_fqdn(my_fqdn, r->in.machine_name)
393             || (strchr(my_fqdn, '.') == NULL)) {
394                 fstr_sprintf(my_fqdn, "%s.%s", r->in.machine_name,
395                              r->out.dns_domain_name);
396         }
397
398         if (!strlower_m(my_fqdn)) {
399                 return ADS_ERROR_LDAP(LDAP_NO_MEMORY);
400         }
401
402         if (!strequal(my_fqdn, r->in.machine_name)) {
403                 spn = talloc_asprintf(mem_ctx, "HOST/%s", my_fqdn);
404                 if (!spn) {
405                         return ADS_ERROR_LDAP(LDAP_NO_MEMORY);
406                 }
407                 spn_array[1] = spn;
408         }
409
410         mods = ads_init_mods(mem_ctx);
411         if (!mods) {
412                 return ADS_ERROR_LDAP(LDAP_NO_MEMORY);
413         }
414
415         /* fields of primary importance */
416
417         status = ads_mod_str(mem_ctx, &mods, "dNSHostName", my_fqdn);
418         if (!ADS_ERR_OK(status)) {
419                 return ADS_ERROR_LDAP(LDAP_NO_MEMORY);
420         }
421
422         status = ads_mod_strlist(mem_ctx, &mods, "servicePrincipalName",
423                                  spn_array);
424         if (!ADS_ERR_OK(status)) {
425                 return ADS_ERROR_LDAP(LDAP_NO_MEMORY);
426         }
427
428         return ads_gen_mod(r->in.ads, r->out.dn, mods);
429 }
430
431 /****************************************************************
432 ****************************************************************/
433
434 static ADS_STATUS libnet_join_set_machine_upn(TALLOC_CTX *mem_ctx,
435                                               struct libnet_JoinCtx *r)
436 {
437         ADS_STATUS status;
438         ADS_MODLIST mods;
439
440         if (!r->in.create_upn) {
441                 return ADS_SUCCESS;
442         }
443
444         /* Find our DN */
445
446         status = libnet_join_find_machine_acct(mem_ctx, r);
447         if (!ADS_ERR_OK(status)) {
448                 return status;
449         }
450
451         if (!r->in.upn) {
452                 r->in.upn = talloc_asprintf(mem_ctx,
453                                             "host/%s@%s",
454                                             r->in.machine_name,
455                                             r->out.dns_domain_name);
456                 if (!r->in.upn) {
457                         return ADS_ERROR(LDAP_NO_MEMORY);
458                 }
459         }
460
461         /* now do the mods */
462
463         mods = ads_init_mods(mem_ctx);
464         if (!mods) {
465                 return ADS_ERROR_LDAP(LDAP_NO_MEMORY);
466         }
467
468         /* fields of primary importance */
469
470         status = ads_mod_str(mem_ctx, &mods, "userPrincipalName", r->in.upn);
471         if (!ADS_ERR_OK(status)) {
472                 return ADS_ERROR_LDAP(LDAP_NO_MEMORY);
473         }
474
475         return ads_gen_mod(r->in.ads, r->out.dn, mods);
476 }
477
478
479 /****************************************************************
480 ****************************************************************/
481
482 static ADS_STATUS libnet_join_set_os_attributes(TALLOC_CTX *mem_ctx,
483                                                 struct libnet_JoinCtx *r)
484 {
485         ADS_STATUS status;
486         ADS_MODLIST mods;
487         char *os_sp = NULL;
488
489         if (!r->in.os_name || !r->in.os_version ) {
490                 return ADS_SUCCESS;
491         }
492
493         /* Find our DN */
494
495         status = libnet_join_find_machine_acct(mem_ctx, r);
496         if (!ADS_ERR_OK(status)) {
497                 return status;
498         }
499
500         /* now do the mods */
501
502         mods = ads_init_mods(mem_ctx);
503         if (!mods) {
504                 return ADS_ERROR(LDAP_NO_MEMORY);
505         }
506
507         os_sp = talloc_asprintf(mem_ctx, "Samba %s", samba_version_string());
508         if (!os_sp) {
509                 return ADS_ERROR(LDAP_NO_MEMORY);
510         }
511
512         /* fields of primary importance */
513
514         status = ads_mod_str(mem_ctx, &mods, "operatingSystem",
515                              r->in.os_name);
516         if (!ADS_ERR_OK(status)) {
517                 return status;
518         }
519
520         status = ads_mod_str(mem_ctx, &mods, "operatingSystemVersion",
521                              r->in.os_version);
522         if (!ADS_ERR_OK(status)) {
523                 return status;
524         }
525
526         status = ads_mod_str(mem_ctx, &mods, "operatingSystemServicePack",
527                              os_sp);
528         if (!ADS_ERR_OK(status)) {
529                 return status;
530         }
531
532         return ads_gen_mod(r->in.ads, r->out.dn, mods);
533 }
534
535 /****************************************************************
536 ****************************************************************/
537
538 static bool libnet_join_create_keytab(TALLOC_CTX *mem_ctx,
539                                       struct libnet_JoinCtx *r)
540 {
541         if (!USE_SYSTEM_KEYTAB) {
542                 return true;
543         }
544
545         if (ads_keytab_create_default(r->in.ads) != 0) {
546                 return false;
547         }
548
549         return true;
550 }
551
552 /****************************************************************
553 ****************************************************************/
554
555 static bool libnet_join_derive_salting_principal(TALLOC_CTX *mem_ctx,
556                                                  struct libnet_JoinCtx *r)
557 {
558         uint32_t domain_func;
559         ADS_STATUS status;
560         const char *salt = NULL;
561         char *std_salt = NULL;
562
563         status = ads_domain_func_level(r->in.ads, &domain_func);
564         if (!ADS_ERR_OK(status)) {
565                 libnet_join_set_error_string(mem_ctx, r,
566                         "failed to determine domain functional level: %s",
567                         ads_errstr(status));
568                 return false;
569         }
570
571         /* go ahead and setup the default salt */
572
573         std_salt = kerberos_standard_des_salt();
574         if (!std_salt) {
575                 libnet_join_set_error_string(mem_ctx, r,
576                         "failed to obtain standard DES salt");
577                 return false;
578         }
579
580         salt = talloc_strdup(mem_ctx, std_salt);
581         if (!salt) {
582                 return false;
583         }
584
585         SAFE_FREE(std_salt);
586
587         /* if it's a Windows functional domain, we have to look for the UPN */
588
589         if (domain_func == DS_DOMAIN_FUNCTION_2000) {
590                 char *upn;
591
592                 upn = ads_get_upn(r->in.ads, mem_ctx,
593                                   r->in.machine_name);
594                 if (upn) {
595                         salt = talloc_strdup(mem_ctx, upn);
596                         if (!salt) {
597                                 return false;
598                         }
599                 }
600         }
601
602         return kerberos_secrets_store_des_salt(salt);
603 }
604
605 /****************************************************************
606 ****************************************************************/
607
608 static ADS_STATUS libnet_join_post_processing_ads(TALLOC_CTX *mem_ctx,
609                                                   struct libnet_JoinCtx *r)
610 {
611         ADS_STATUS status;
612
613         if (!r->in.ads) {
614                 status = libnet_join_connect_ads(mem_ctx, r);
615                 if (!ADS_ERR_OK(status)) {
616                         return status;
617                 }
618         }
619
620         status = libnet_join_set_machine_spn(mem_ctx, r);
621         if (!ADS_ERR_OK(status)) {
622                 libnet_join_set_error_string(mem_ctx, r,
623                         "failed to set machine spn: %s",
624                         ads_errstr(status));
625                 return status;
626         }
627
628         status = libnet_join_set_os_attributes(mem_ctx, r);
629         if (!ADS_ERR_OK(status)) {
630                 libnet_join_set_error_string(mem_ctx, r,
631                         "failed to set machine os attributes: %s",
632                         ads_errstr(status));
633                 return status;
634         }
635
636         status = libnet_join_set_machine_upn(mem_ctx, r);
637         if (!ADS_ERR_OK(status)) {
638                 libnet_join_set_error_string(mem_ctx, r,
639                         "failed to set machine upn: %s",
640                         ads_errstr(status));
641                 return status;
642         }
643
644         if (!libnet_join_derive_salting_principal(mem_ctx, r)) {
645                 return ADS_ERROR_NT(NT_STATUS_UNSUCCESSFUL);
646         }
647
648         if (!libnet_join_create_keytab(mem_ctx, r)) {
649                 libnet_join_set_error_string(mem_ctx, r,
650                         "failed to create kerberos keytab");
651                 return ADS_ERROR_NT(NT_STATUS_UNSUCCESSFUL);
652         }
653
654         return ADS_SUCCESS;
655 }
656 #endif /* HAVE_ADS */
657
658 /****************************************************************
659  Store the machine password and domain SID
660 ****************************************************************/
661
662 static bool libnet_join_joindomain_store_secrets(TALLOC_CTX *mem_ctx,
663                                                  struct libnet_JoinCtx *r)
664 {
665         if (!secrets_store_domain_sid(r->out.netbios_domain_name,
666                                       r->out.domain_sid))
667         {
668                 DEBUG(1,("Failed to save domain sid\n"));
669                 return false;
670         }
671
672         if (!secrets_store_machine_password(r->in.machine_password,
673                                             r->out.netbios_domain_name,
674                                             r->in.secure_channel_type))
675         {
676                 DEBUG(1,("Failed to save machine password\n"));
677                 return false;
678         }
679
680         return true;
681 }
682
683 /****************************************************************
684  Connect dc's IPC$ share
685 ****************************************************************/
686
687 static NTSTATUS libnet_join_connect_dc_ipc(const char *dc,
688                                            const char *user,
689                                            const char *pass,
690                                            bool use_kerberos,
691                                            struct cli_state **cli)
692 {
693         int flags = 0;
694
695         if (use_kerberos) {
696                 flags |= CLI_FULL_CONNECTION_USE_KERBEROS;
697         }
698
699         if (use_kerberos && pass) {
700                 flags |= CLI_FULL_CONNECTION_FALLBACK_AFTER_KERBEROS;
701         }
702
703         return cli_full_connection(cli, NULL,
704                                    dc,
705                                    NULL, 0,
706                                    "IPC$", "IPC",
707                                    user,
708                                    NULL,
709                                    pass,
710                                    flags,
711                                    SMB_SIGNING_DEFAULT);
712 }
713
714 /****************************************************************
715  Lookup domain dc's info
716 ****************************************************************/
717
718 static NTSTATUS libnet_join_lookup_dc_rpc(TALLOC_CTX *mem_ctx,
719                                           struct libnet_JoinCtx *r,
720                                           struct cli_state **cli)
721 {
722         struct rpc_pipe_client *pipe_hnd = NULL;
723         struct policy_handle lsa_pol;
724         NTSTATUS status, result;
725         union lsa_PolicyInformation *info = NULL;
726         struct dcerpc_binding_handle *b;
727
728         status = libnet_join_connect_dc_ipc(r->in.dc_name,
729                                             r->in.admin_account,
730                                             r->in.admin_password,
731                                             r->in.use_kerberos,
732                                             cli);
733         if (!NT_STATUS_IS_OK(status)) {
734                 goto done;
735         }
736
737         status = cli_rpc_pipe_open_noauth(*cli, &ndr_table_lsarpc.syntax_id,
738                                           &pipe_hnd);
739         if (!NT_STATUS_IS_OK(status)) {
740                 DEBUG(0,("Error connecting to LSA pipe. Error was %s\n",
741                         nt_errstr(status)));
742                 goto done;
743         }
744
745         b = pipe_hnd->binding_handle;
746
747         status = rpccli_lsa_open_policy(pipe_hnd, mem_ctx, true,
748                                         SEC_FLAG_MAXIMUM_ALLOWED, &lsa_pol);
749         if (!NT_STATUS_IS_OK(status)) {
750                 goto done;
751         }
752
753         status = dcerpc_lsa_QueryInfoPolicy2(b, mem_ctx,
754                                              &lsa_pol,
755                                              LSA_POLICY_INFO_DNS,
756                                              &info,
757                                              &result);
758         if (NT_STATUS_IS_OK(status) && NT_STATUS_IS_OK(result)) {
759                 r->out.domain_is_ad = true;
760                 r->out.netbios_domain_name = info->dns.name.string;
761                 r->out.dns_domain_name = info->dns.dns_domain.string;
762                 r->out.forest_name = info->dns.dns_forest.string;
763                 r->out.domain_sid = dom_sid_dup(mem_ctx, info->dns.sid);
764                 NT_STATUS_HAVE_NO_MEMORY(r->out.domain_sid);
765         }
766
767         if (!NT_STATUS_IS_OK(status)) {
768                 status = dcerpc_lsa_QueryInfoPolicy(b, mem_ctx,
769                                                     &lsa_pol,
770                                                     LSA_POLICY_INFO_ACCOUNT_DOMAIN,
771                                                     &info,
772                                                     &result);
773                 if (!NT_STATUS_IS_OK(status)) {
774                         goto done;
775                 }
776                 if (!NT_STATUS_IS_OK(result)) {
777                         status = result;
778                         goto done;
779                 }
780
781                 r->out.netbios_domain_name = info->account_domain.name.string;
782                 r->out.domain_sid = dom_sid_dup(mem_ctx, info->account_domain.sid);
783                 NT_STATUS_HAVE_NO_MEMORY(r->out.domain_sid);
784         }
785
786         dcerpc_lsa_Close(b, mem_ctx, &lsa_pol, &result);
787         TALLOC_FREE(pipe_hnd);
788
789  done:
790         return status;
791 }
792
793 /****************************************************************
794  Do the domain join unsecure
795 ****************************************************************/
796
797 static NTSTATUS libnet_join_joindomain_rpc_unsecure(TALLOC_CTX *mem_ctx,
798                                                     struct libnet_JoinCtx *r,
799                                                     struct cli_state *cli)
800 {
801         struct rpc_pipe_client *pipe_hnd = NULL;
802         unsigned char orig_trust_passwd_hash[16];
803         unsigned char new_trust_passwd_hash[16];
804         fstring trust_passwd;
805         NTSTATUS status;
806
807         status = cli_rpc_pipe_open_noauth(cli, &ndr_table_netlogon.syntax_id,
808                                           &pipe_hnd);
809         if (!NT_STATUS_IS_OK(status)) {
810                 return status;
811         }
812
813         if (!r->in.machine_password) {
814                 r->in.machine_password = generate_random_str(mem_ctx, DEFAULT_TRUST_ACCOUNT_PASSWORD_LENGTH);
815                 NT_STATUS_HAVE_NO_MEMORY(r->in.machine_password);
816         }
817
818         E_md4hash(r->in.machine_password, new_trust_passwd_hash);
819
820         /* according to WKSSVC_JOIN_FLAGS_MACHINE_PWD_PASSED */
821         fstrcpy(trust_passwd, r->in.admin_password);
822         if (!strlower_m(trust_passwd)) {
823                 return NT_STATUS_INVALID_PARAMETER;
824         }
825
826         /*
827          * Machine names can be 15 characters, but the max length on
828          * a password is 14.  --jerry
829          */
830
831         trust_passwd[14] = '\0';
832
833         E_md4hash(trust_passwd, orig_trust_passwd_hash);
834
835         status = rpccli_netlogon_set_trust_password(pipe_hnd, mem_ctx,
836                                                     r->in.machine_name,
837                                                     orig_trust_passwd_hash,
838                                                     r->in.machine_password,
839                                                     new_trust_passwd_hash,
840                                                     r->in.secure_channel_type);
841
842         return status;
843 }
844
845 /****************************************************************
846  Do the domain join
847 ****************************************************************/
848
849 static NTSTATUS libnet_join_joindomain_rpc(TALLOC_CTX *mem_ctx,
850                                            struct libnet_JoinCtx *r,
851                                            struct cli_state *cli)
852 {
853         struct rpc_pipe_client *pipe_hnd = NULL;
854         struct policy_handle sam_pol, domain_pol, user_pol;
855         NTSTATUS status = NT_STATUS_UNSUCCESSFUL, result;
856         char *acct_name;
857         struct lsa_String lsa_acct_name;
858         uint32_t user_rid;
859         uint32_t acct_flags = ACB_WSTRUST;
860         struct samr_Ids user_rids;
861         struct samr_Ids name_types;
862         union samr_UserInfo user_info;
863         struct dcerpc_binding_handle *b = NULL;
864
865         DATA_BLOB session_key = data_blob_null;
866         struct samr_CryptPassword crypt_pwd;
867         struct samr_CryptPasswordEx crypt_pwd_ex;
868
869         ZERO_STRUCT(sam_pol);
870         ZERO_STRUCT(domain_pol);
871         ZERO_STRUCT(user_pol);
872
873         switch (r->in.secure_channel_type) {
874         case SEC_CHAN_WKSTA:
875                 acct_flags = ACB_WSTRUST;
876                 break;
877         case SEC_CHAN_BDC:
878                 acct_flags = ACB_SVRTRUST;
879                 break;
880         default:
881                 return NT_STATUS_INVALID_PARAMETER;
882         }
883
884         if (!r->in.machine_password) {
885                 r->in.machine_password = generate_random_str(mem_ctx, DEFAULT_TRUST_ACCOUNT_PASSWORD_LENGTH);
886                 NT_STATUS_HAVE_NO_MEMORY(r->in.machine_password);
887         }
888
889         /* Open the domain */
890
891         status = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr.syntax_id,
892                                           &pipe_hnd);
893         if (!NT_STATUS_IS_OK(status)) {
894                 DEBUG(0,("Error connecting to SAM pipe. Error was %s\n",
895                         nt_errstr(status)));
896                 goto done;
897         }
898
899         b = pipe_hnd->binding_handle;
900
901         status = cli_get_session_key(mem_ctx, pipe_hnd, &session_key);
902         if (!NT_STATUS_IS_OK(status)) {
903                 DEBUG(0,("Error getting session_key of SAM pipe. Error was %s\n",
904                         nt_errstr(status)));
905                 goto done;
906         }
907
908         status = dcerpc_samr_Connect2(b, mem_ctx,
909                                       pipe_hnd->desthost,
910                                       SAMR_ACCESS_ENUM_DOMAINS
911                                       | SAMR_ACCESS_LOOKUP_DOMAIN,
912                                       &sam_pol,
913                                       &result);
914         if (!NT_STATUS_IS_OK(status)) {
915                 goto done;
916         }
917         if (!NT_STATUS_IS_OK(result)) {
918                 status = result;
919                 goto done;
920         }
921
922         status = dcerpc_samr_OpenDomain(b, mem_ctx,
923                                         &sam_pol,
924                                         SAMR_DOMAIN_ACCESS_LOOKUP_INFO_1
925                                         | SAMR_DOMAIN_ACCESS_CREATE_USER
926                                         | SAMR_DOMAIN_ACCESS_OPEN_ACCOUNT,
927                                         r->out.domain_sid,
928                                         &domain_pol,
929                                         &result);
930         if (!NT_STATUS_IS_OK(status)) {
931                 goto done;
932         }
933         if (!NT_STATUS_IS_OK(result)) {
934                 status = result;
935                 goto done;
936         }
937
938         /* Create domain user */
939
940         acct_name = talloc_asprintf(mem_ctx, "%s$", r->in.machine_name);
941         if (!strlower_m(acct_name)) {
942                 status = NT_STATUS_INVALID_PARAMETER;
943                 goto done;
944         }
945
946         init_lsa_String(&lsa_acct_name, acct_name);
947
948         if (r->in.join_flags & WKSSVC_JOIN_FLAGS_ACCOUNT_CREATE) {
949                 uint32_t access_desired =
950                         SEC_GENERIC_READ | SEC_GENERIC_WRITE | SEC_GENERIC_EXECUTE |
951                         SEC_STD_WRITE_DAC | SEC_STD_DELETE |
952                         SAMR_USER_ACCESS_SET_PASSWORD |
953                         SAMR_USER_ACCESS_GET_ATTRIBUTES |
954                         SAMR_USER_ACCESS_SET_ATTRIBUTES;
955                 uint32_t access_granted = 0;
956
957                 DEBUG(10,("Creating account with desired access mask: %d\n",
958                         access_desired));
959
960                 status = dcerpc_samr_CreateUser2(b, mem_ctx,
961                                                  &domain_pol,
962                                                  &lsa_acct_name,
963                                                  acct_flags,
964                                                  access_desired,
965                                                  &user_pol,
966                                                  &access_granted,
967                                                  &user_rid,
968                                                  &result);
969                 if (!NT_STATUS_IS_OK(status)) {
970                         goto done;
971                 }
972
973                 status = result;
974                 if (!NT_STATUS_IS_OK(status) &&
975                     !NT_STATUS_EQUAL(status, NT_STATUS_USER_EXISTS)) {
976
977                         DEBUG(10,("Creation of workstation account failed: %s\n",
978                                 nt_errstr(status)));
979
980                         /* If NT_STATUS_ACCESS_DENIED then we have a valid
981                            username/password combo but the user does not have
982                            administrator access. */
983
984                         if (NT_STATUS_EQUAL(status, NT_STATUS_ACCESS_DENIED)) {
985                                 libnet_join_set_error_string(mem_ctx, r,
986                                         "User specified does not have "
987                                         "administrator privileges");
988                         }
989
990                         goto done;
991                 }
992
993                 if (NT_STATUS_EQUAL(status, NT_STATUS_USER_EXISTS)) {
994                         if (!(r->in.join_flags &
995                               WKSSVC_JOIN_FLAGS_DOMAIN_JOIN_IF_JOINED)) {
996                                 goto done;
997                         }
998                 }
999
1000                 /* We *must* do this.... don't ask... */
1001
1002                 if (NT_STATUS_IS_OK(status)) {
1003                         dcerpc_samr_Close(b, mem_ctx, &user_pol, &result);
1004                 }
1005         }
1006
1007         status = dcerpc_samr_LookupNames(b, mem_ctx,
1008                                          &domain_pol,
1009                                          1,
1010                                          &lsa_acct_name,
1011                                          &user_rids,
1012                                          &name_types,
1013                                          &result);
1014         if (!NT_STATUS_IS_OK(status)) {
1015                 goto done;
1016         }
1017         if (!NT_STATUS_IS_OK(result)) {
1018                 status = result;
1019                 goto done;
1020         }
1021
1022         if (name_types.ids[0] != SID_NAME_USER) {
1023                 DEBUG(0,("%s is not a user account (type=%d)\n",
1024                         acct_name, name_types.ids[0]));
1025                 status = NT_STATUS_INVALID_WORKSTATION;
1026                 goto done;
1027         }
1028
1029         user_rid = user_rids.ids[0];
1030
1031         /* Open handle on user */
1032
1033         status = dcerpc_samr_OpenUser(b, mem_ctx,
1034                                       &domain_pol,
1035                                       SEC_FLAG_MAXIMUM_ALLOWED,
1036                                       user_rid,
1037                                       &user_pol,
1038                                       &result);
1039         if (!NT_STATUS_IS_OK(status)) {
1040                 goto done;
1041         }
1042         if (!NT_STATUS_IS_OK(result)) {
1043                 status = result;
1044                 goto done;
1045         }
1046
1047         /* Fill in the additional account flags now */
1048
1049         acct_flags |= ACB_PWNOEXP;
1050
1051         /* Set account flags on machine account */
1052         ZERO_STRUCT(user_info.info16);
1053         user_info.info16.acct_flags = acct_flags;
1054
1055         status = dcerpc_samr_SetUserInfo(b, mem_ctx,
1056                                          &user_pol,
1057                                          16,
1058                                          &user_info,
1059                                          &result);
1060         if (!NT_STATUS_IS_OK(status)) {
1061                 dcerpc_samr_DeleteUser(b, mem_ctx,
1062                                        &user_pol,
1063                                        &result);
1064
1065                 libnet_join_set_error_string(mem_ctx, r,
1066                         "Failed to set account flags for machine account (%s)\n",
1067                         nt_errstr(status));
1068                 goto done;
1069         }
1070
1071         if (!NT_STATUS_IS_OK(result)) {
1072                 status = result;
1073
1074                 dcerpc_samr_DeleteUser(b, mem_ctx,
1075                                        &user_pol,
1076                                        &result);
1077
1078                 libnet_join_set_error_string(mem_ctx, r,
1079                         "Failed to set account flags for machine account (%s)\n",
1080                         nt_errstr(status));
1081                 goto done;
1082         }
1083
1084         /* Set password on machine account - first try level 26 */
1085
1086         init_samr_CryptPasswordEx(r->in.machine_password,
1087                                   &session_key,
1088                                   &crypt_pwd_ex);
1089
1090         user_info.info26.password = crypt_pwd_ex;
1091         user_info.info26.password_expired = PASS_DONT_CHANGE_AT_NEXT_LOGON;
1092
1093         status = dcerpc_samr_SetUserInfo2(b, mem_ctx,
1094                                           &user_pol,
1095                                           26,
1096                                           &user_info,
1097                                           &result);
1098
1099         if (NT_STATUS_EQUAL(status, NT_STATUS_RPC_ENUM_VALUE_OUT_OF_RANGE)) {
1100
1101                 /* retry with level 24 */
1102
1103                 init_samr_CryptPassword(r->in.machine_password,
1104                                         &session_key,
1105                                         &crypt_pwd);
1106
1107                 user_info.info24.password = crypt_pwd;
1108                 user_info.info24.password_expired = PASS_DONT_CHANGE_AT_NEXT_LOGON;
1109
1110                 status = dcerpc_samr_SetUserInfo2(b, mem_ctx,
1111                                                   &user_pol,
1112                                                   24,
1113                                                   &user_info,
1114                                                   &result);
1115         }
1116
1117         if (!NT_STATUS_IS_OK(status)) {
1118
1119                 dcerpc_samr_DeleteUser(b, mem_ctx,
1120                                        &user_pol,
1121                                        &result);
1122
1123                 libnet_join_set_error_string(mem_ctx, r,
1124                         "Failed to set password for machine account (%s)\n",
1125                         nt_errstr(status));
1126                 goto done;
1127         }
1128         if (!NT_STATUS_IS_OK(result)) {
1129                 status = result;
1130
1131                 dcerpc_samr_DeleteUser(b, mem_ctx,
1132                                        &user_pol,
1133                                        &result);
1134
1135                 libnet_join_set_error_string(mem_ctx, r,
1136                         "Failed to set password for machine account (%s)\n",
1137                         nt_errstr(status));
1138                 goto done;
1139         }
1140
1141         status = NT_STATUS_OK;
1142
1143  done:
1144         if (!pipe_hnd) {
1145                 return status;
1146         }
1147
1148         data_blob_clear_free(&session_key);
1149
1150         if (is_valid_policy_hnd(&sam_pol)) {
1151                 dcerpc_samr_Close(b, mem_ctx, &sam_pol, &result);
1152         }
1153         if (is_valid_policy_hnd(&domain_pol)) {
1154                 dcerpc_samr_Close(b, mem_ctx, &domain_pol, &result);
1155         }
1156         if (is_valid_policy_hnd(&user_pol)) {
1157                 dcerpc_samr_Close(b, mem_ctx, &user_pol, &result);
1158         }
1159         TALLOC_FREE(pipe_hnd);
1160
1161         return status;
1162 }
1163
1164 /****************************************************************
1165 ****************************************************************/
1166
1167 NTSTATUS libnet_join_ok(const char *netbios_domain_name,
1168                         const char *machine_name,
1169                         const char *dc_name)
1170 {
1171         uint32_t neg_flags = NETLOGON_NEG_AUTH2_ADS_FLAGS;
1172         struct cli_state *cli = NULL;
1173         struct rpc_pipe_client *pipe_hnd = NULL;
1174         struct rpc_pipe_client *netlogon_pipe = NULL;
1175         NTSTATUS status;
1176         char *machine_password = NULL;
1177         char *machine_account = NULL;
1178
1179         if (!dc_name) {
1180                 return NT_STATUS_INVALID_PARAMETER;
1181         }
1182
1183         if (!secrets_init()) {
1184                 return NT_STATUS_CANT_ACCESS_DOMAIN_INFO;
1185         }
1186
1187         machine_password = secrets_fetch_machine_password(netbios_domain_name,
1188                                                           NULL, NULL);
1189         if (!machine_password) {
1190                 return NT_STATUS_NO_TRUST_LSA_SECRET;
1191         }
1192
1193         if (asprintf(&machine_account, "%s$", machine_name) == -1) {
1194                 SAFE_FREE(machine_password);
1195                 return NT_STATUS_NO_MEMORY;
1196         }
1197
1198         status = cli_full_connection(&cli, NULL,
1199                                      dc_name,
1200                                      NULL, 0,
1201                                      "IPC$", "IPC",
1202                                      machine_account,
1203                                      NULL,
1204                                      machine_password,
1205                                      0,
1206                                      SMB_SIGNING_DEFAULT);
1207         free(machine_account);
1208         free(machine_password);
1209
1210         if (!NT_STATUS_IS_OK(status)) {
1211                 status = cli_full_connection(&cli, NULL,
1212                                              dc_name,
1213                                              NULL, 0,
1214                                              "IPC$", "IPC",
1215                                              "",
1216                                              NULL,
1217                                              "",
1218                                              0,
1219                                              SMB_SIGNING_DEFAULT);
1220         }
1221
1222         if (!NT_STATUS_IS_OK(status)) {
1223                 return status;
1224         }
1225
1226         status = get_schannel_session_key(cli, netbios_domain_name,
1227                                           &neg_flags, &netlogon_pipe);
1228         if (!NT_STATUS_IS_OK(status)) {
1229                 if (NT_STATUS_EQUAL(status, NT_STATUS_INVALID_NETWORK_RESPONSE)) {
1230                         cli_shutdown(cli);
1231                         return NT_STATUS_OK;
1232                 }
1233
1234                 DEBUG(0,("libnet_join_ok: failed to get schannel session "
1235                         "key from server %s for domain %s. Error was %s\n",
1236                         smbXcli_conn_remote_name(cli->conn),
1237                         netbios_domain_name, nt_errstr(status)));
1238                 cli_shutdown(cli);
1239                 return status;
1240         }
1241
1242         if (!lp_client_schannel()) {
1243                 cli_shutdown(cli);
1244                 return NT_STATUS_OK;
1245         }
1246
1247         status = cli_rpc_pipe_open_schannel_with_key(
1248                 cli, &ndr_table_netlogon.syntax_id, NCACN_NP,
1249                 DCERPC_AUTH_LEVEL_PRIVACY,
1250                 netbios_domain_name, &netlogon_pipe->dc, &pipe_hnd);
1251
1252         cli_shutdown(cli);
1253
1254         if (!NT_STATUS_IS_OK(status)) {
1255                 DEBUG(0,("libnet_join_ok: failed to open schannel session "
1256                         "on netlogon pipe to server %s for domain %s. "
1257                         "Error was %s\n",
1258                         smbXcli_conn_remote_name(cli->conn),
1259                         netbios_domain_name, nt_errstr(status)));
1260                 return status;
1261         }
1262
1263         return NT_STATUS_OK;
1264 }
1265
1266 /****************************************************************
1267 ****************************************************************/
1268
1269 static WERROR libnet_join_post_verify(TALLOC_CTX *mem_ctx,
1270                                       struct libnet_JoinCtx *r)
1271 {
1272         NTSTATUS status;
1273
1274         status = libnet_join_ok(r->out.netbios_domain_name,
1275                                 r->in.machine_name,
1276                                 r->in.dc_name);
1277         if (!NT_STATUS_IS_OK(status)) {
1278                 libnet_join_set_error_string(mem_ctx, r,
1279                         "failed to verify domain membership after joining: %s",
1280                         get_friendly_nt_error_msg(status));
1281                 return WERR_SETUP_NOT_JOINED;
1282         }
1283
1284         return WERR_OK;
1285 }
1286
1287 /****************************************************************
1288 ****************************************************************/
1289
1290 static bool libnet_join_unjoindomain_remove_secrets(TALLOC_CTX *mem_ctx,
1291                                                     struct libnet_UnjoinCtx *r)
1292 {
1293         if (!secrets_delete_machine_password_ex(lp_workgroup())) {
1294                 return false;
1295         }
1296
1297         if (!secrets_delete_domain_sid(lp_workgroup())) {
1298                 return false;
1299         }
1300
1301         return true;
1302 }
1303
1304 /****************************************************************
1305 ****************************************************************/
1306
1307 static NTSTATUS libnet_join_unjoindomain_rpc(TALLOC_CTX *mem_ctx,
1308                                              struct libnet_UnjoinCtx *r)
1309 {
1310         struct cli_state *cli = NULL;
1311         struct rpc_pipe_client *pipe_hnd = NULL;
1312         struct policy_handle sam_pol, domain_pol, user_pol;
1313         NTSTATUS status = NT_STATUS_UNSUCCESSFUL, result;
1314         char *acct_name;
1315         uint32_t user_rid;
1316         struct lsa_String lsa_acct_name;
1317         struct samr_Ids user_rids;
1318         struct samr_Ids name_types;
1319         union samr_UserInfo *info = NULL;
1320         struct dcerpc_binding_handle *b = NULL;
1321
1322         ZERO_STRUCT(sam_pol);
1323         ZERO_STRUCT(domain_pol);
1324         ZERO_STRUCT(user_pol);
1325
1326         status = libnet_join_connect_dc_ipc(r->in.dc_name,
1327                                             r->in.admin_account,
1328                                             r->in.admin_password,
1329                                             r->in.use_kerberos,
1330                                             &cli);
1331         if (!NT_STATUS_IS_OK(status)) {
1332                 goto done;
1333         }
1334
1335         /* Open the domain */
1336
1337         status = cli_rpc_pipe_open_noauth(cli, &ndr_table_samr.syntax_id,
1338                                           &pipe_hnd);
1339         if (!NT_STATUS_IS_OK(status)) {
1340                 DEBUG(0,("Error connecting to SAM pipe. Error was %s\n",
1341                         nt_errstr(status)));
1342                 goto done;
1343         }
1344
1345         b = pipe_hnd->binding_handle;
1346
1347         status = dcerpc_samr_Connect2(b, mem_ctx,
1348                                       pipe_hnd->desthost,
1349                                       SEC_FLAG_MAXIMUM_ALLOWED,
1350                                       &sam_pol,
1351                                       &result);
1352         if (!NT_STATUS_IS_OK(status)) {
1353                 goto done;
1354         }
1355         if (!NT_STATUS_IS_OK(result)) {
1356                 status = result;
1357                 goto done;
1358         }
1359
1360         status = dcerpc_samr_OpenDomain(b, mem_ctx,
1361                                         &sam_pol,
1362                                         SEC_FLAG_MAXIMUM_ALLOWED,
1363                                         r->in.domain_sid,
1364                                         &domain_pol,
1365                                         &result);
1366         if (!NT_STATUS_IS_OK(status)) {
1367                 goto done;
1368         }
1369         if (!NT_STATUS_IS_OK(result)) {
1370                 status = result;
1371                 goto done;
1372         }
1373
1374         /* Create domain user */
1375
1376         acct_name = talloc_asprintf(mem_ctx, "%s$", r->in.machine_name);
1377         if (!strlower_m(acct_name)) {
1378                 status = NT_STATUS_INVALID_PARAMETER;
1379                 goto done;
1380         }
1381
1382         init_lsa_String(&lsa_acct_name, acct_name);
1383
1384         status = dcerpc_samr_LookupNames(b, mem_ctx,
1385                                          &domain_pol,
1386                                          1,
1387                                          &lsa_acct_name,
1388                                          &user_rids,
1389                                          &name_types,
1390                                          &result);
1391
1392         if (!NT_STATUS_IS_OK(status)) {
1393                 goto done;
1394         }
1395         if (!NT_STATUS_IS_OK(result)) {
1396                 status = result;
1397                 goto done;
1398         }
1399
1400         if (name_types.ids[0] != SID_NAME_USER) {
1401                 DEBUG(0, ("%s is not a user account (type=%d)\n", acct_name,
1402                         name_types.ids[0]));
1403                 status = NT_STATUS_INVALID_WORKSTATION;
1404                 goto done;
1405         }
1406
1407         user_rid = user_rids.ids[0];
1408
1409         /* Open handle on user */
1410
1411         status = dcerpc_samr_OpenUser(b, mem_ctx,
1412                                       &domain_pol,
1413                                       SEC_FLAG_MAXIMUM_ALLOWED,
1414                                       user_rid,
1415                                       &user_pol,
1416                                       &result);
1417         if (!NT_STATUS_IS_OK(status)) {
1418                 goto done;
1419         }
1420         if (!NT_STATUS_IS_OK(result)) {
1421                 status = result;
1422                 goto done;
1423         }
1424
1425         /* Get user info */
1426
1427         status = dcerpc_samr_QueryUserInfo(b, mem_ctx,
1428                                            &user_pol,
1429                                            16,
1430                                            &info,
1431                                            &result);
1432         if (!NT_STATUS_IS_OK(status)) {
1433                 dcerpc_samr_Close(b, mem_ctx, &user_pol, &result);
1434                 goto done;
1435         }
1436         if (!NT_STATUS_IS_OK(result)) {
1437                 status = result;
1438                 dcerpc_samr_Close(b, mem_ctx, &user_pol, &result);
1439                 goto done;
1440         }
1441
1442         /* now disable and setuser info */
1443
1444         info->info16.acct_flags |= ACB_DISABLED;
1445
1446         status = dcerpc_samr_SetUserInfo(b, mem_ctx,
1447                                          &user_pol,
1448                                          16,
1449                                          info,
1450                                          &result);
1451         if (!NT_STATUS_IS_OK(status)) {
1452                 dcerpc_samr_Close(b, mem_ctx, &user_pol, &result);
1453                 goto done;
1454         }
1455         if (!NT_STATUS_IS_OK(result)) {
1456                 status = result;
1457                 dcerpc_samr_Close(b, mem_ctx, &user_pol, &result);
1458                 goto done;
1459         }
1460         status = result;
1461         dcerpc_samr_Close(b, mem_ctx, &user_pol, &result);
1462
1463 done:
1464         if (pipe_hnd && b) {
1465                 if (is_valid_policy_hnd(&domain_pol)) {
1466                         dcerpc_samr_Close(b, mem_ctx, &domain_pol, &result);
1467                 }
1468                 if (is_valid_policy_hnd(&sam_pol)) {
1469                         dcerpc_samr_Close(b, mem_ctx, &sam_pol, &result);
1470                 }
1471                 TALLOC_FREE(pipe_hnd);
1472         }
1473
1474         if (cli) {
1475                 cli_shutdown(cli);
1476         }
1477
1478         return status;
1479 }
1480
1481 /****************************************************************
1482 ****************************************************************/
1483
1484 static WERROR do_join_modify_vals_config(struct libnet_JoinCtx *r)
1485 {
1486         WERROR werr = WERR_OK;
1487         sbcErr err;
1488         struct smbconf_ctx *ctx;
1489
1490         err = smbconf_init_reg(r, &ctx, NULL);
1491         if (!SBC_ERROR_IS_OK(err)) {
1492                 werr = WERR_NO_SUCH_SERVICE;
1493                 goto done;
1494         }
1495
1496         if (!(r->in.join_flags & WKSSVC_JOIN_FLAGS_JOIN_TYPE)) {
1497
1498                 err = smbconf_set_global_parameter(ctx, "security", "user");
1499                 if (!SBC_ERROR_IS_OK(err)) {
1500                         werr = WERR_NO_SUCH_SERVICE;
1501                         goto done;
1502                 }
1503
1504                 err = smbconf_set_global_parameter(ctx, "workgroup",
1505                                                    r->in.domain_name);
1506                 if (!SBC_ERROR_IS_OK(err)) {
1507                         werr = WERR_NO_SUCH_SERVICE;
1508                         goto done;
1509                 }
1510
1511                 smbconf_delete_global_parameter(ctx, "realm");
1512                 goto done;
1513         }
1514
1515         err = smbconf_set_global_parameter(ctx, "security", "domain");
1516         if (!SBC_ERROR_IS_OK(err)) {
1517                 werr = WERR_NO_SUCH_SERVICE;
1518                 goto done;
1519         }
1520
1521         err = smbconf_set_global_parameter(ctx, "workgroup",
1522                                            r->out.netbios_domain_name);
1523         if (!SBC_ERROR_IS_OK(err)) {
1524                 werr = WERR_NO_SUCH_SERVICE;
1525                 goto done;
1526         }
1527
1528         if (r->out.domain_is_ad) {
1529                 err = smbconf_set_global_parameter(ctx, "security", "ads");
1530                 if (!SBC_ERROR_IS_OK(err)) {
1531                         werr = WERR_NO_SUCH_SERVICE;
1532                         goto done;
1533                 }
1534
1535                 err = smbconf_set_global_parameter(ctx, "realm",
1536                                                    r->out.dns_domain_name);
1537                 if (!SBC_ERROR_IS_OK(err)) {
1538                         werr = WERR_NO_SUCH_SERVICE;
1539                         goto done;
1540                 }
1541         }
1542
1543  done:
1544         smbconf_shutdown(ctx);
1545         return werr;
1546 }
1547
1548 /****************************************************************
1549 ****************************************************************/
1550
1551 static WERROR do_unjoin_modify_vals_config(struct libnet_UnjoinCtx *r)
1552 {
1553         WERROR werr = WERR_OK;
1554         sbcErr err;
1555         struct smbconf_ctx *ctx;
1556
1557         err = smbconf_init_reg(r, &ctx, NULL);
1558         if (!SBC_ERROR_IS_OK(err)) {
1559                 werr = WERR_NO_SUCH_SERVICE;
1560                 goto done;
1561         }
1562
1563         if (r->in.unjoin_flags & WKSSVC_JOIN_FLAGS_JOIN_TYPE) {
1564
1565                 err = smbconf_set_global_parameter(ctx, "security", "user");
1566                 if (!SBC_ERROR_IS_OK(err)) {
1567                         werr = WERR_NO_SUCH_SERVICE;
1568                         goto done;
1569                 }
1570
1571                 err = smbconf_delete_global_parameter(ctx, "workgroup");
1572                 if (!SBC_ERROR_IS_OK(err)) {
1573                         werr = WERR_NO_SUCH_SERVICE;
1574                         goto done;
1575                 }
1576
1577                 smbconf_delete_global_parameter(ctx, "realm");
1578         }
1579
1580  done:
1581         smbconf_shutdown(ctx);
1582         return werr;
1583 }
1584
1585 /****************************************************************
1586 ****************************************************************/
1587
1588 static WERROR do_JoinConfig(struct libnet_JoinCtx *r)
1589 {
1590         WERROR werr;
1591
1592         if (!W_ERROR_IS_OK(r->out.result)) {
1593                 return r->out.result;
1594         }
1595
1596         if (!r->in.modify_config) {
1597                 return WERR_OK;
1598         }
1599
1600         werr = do_join_modify_vals_config(r);
1601         if (!W_ERROR_IS_OK(werr)) {
1602                 return werr;
1603         }
1604
1605         lp_load_global(get_dyn_CONFIGFILE());
1606
1607         r->out.modified_config = true;
1608         r->out.result = werr;
1609
1610         return werr;
1611 }
1612
1613 /****************************************************************
1614 ****************************************************************/
1615
1616 static WERROR libnet_unjoin_config(struct libnet_UnjoinCtx *r)
1617 {
1618         WERROR werr;
1619
1620         if (!W_ERROR_IS_OK(r->out.result)) {
1621                 return r->out.result;
1622         }
1623
1624         if (!r->in.modify_config) {
1625                 return WERR_OK;
1626         }
1627
1628         werr = do_unjoin_modify_vals_config(r);
1629         if (!W_ERROR_IS_OK(werr)) {
1630                 return werr;
1631         }
1632
1633         lp_load_global(get_dyn_CONFIGFILE());
1634
1635         r->out.modified_config = true;
1636         r->out.result = werr;
1637
1638         return werr;
1639 }
1640
1641 /****************************************************************
1642 ****************************************************************/
1643
1644 static bool libnet_parse_domain_dc(TALLOC_CTX *mem_ctx,
1645                                    const char *domain_str,
1646                                    const char **domain_p,
1647                                    const char **dc_p)
1648 {
1649         char *domain = NULL;
1650         char *dc = NULL;
1651         const char *p = NULL;
1652
1653         if (!domain_str || !domain_p || !dc_p) {
1654                 return false;
1655         }
1656
1657         p = strchr_m(domain_str, '\\');
1658
1659         if (p != NULL) {
1660                 domain = talloc_strndup(mem_ctx, domain_str,
1661                                          PTR_DIFF(p, domain_str));
1662                 dc = talloc_strdup(mem_ctx, p+1);
1663                 if (!dc) {
1664                         return false;
1665                 }
1666         } else {
1667                 domain = talloc_strdup(mem_ctx, domain_str);
1668                 dc = NULL;
1669         }
1670         if (!domain) {
1671                 return false;
1672         }
1673
1674         *domain_p = domain;
1675
1676         if (!*dc_p && dc) {
1677                 *dc_p = dc;
1678         }
1679
1680         return true;
1681 }
1682
1683 /****************************************************************
1684 ****************************************************************/
1685
1686 static WERROR libnet_join_pre_processing(TALLOC_CTX *mem_ctx,
1687                                          struct libnet_JoinCtx *r)
1688 {
1689         if (!r->in.domain_name) {
1690                 libnet_join_set_error_string(mem_ctx, r,
1691                         "No domain name defined");
1692                 return WERR_INVALID_PARAM;
1693         }
1694
1695         if (!libnet_parse_domain_dc(mem_ctx, r->in.domain_name,
1696                                     &r->in.domain_name,
1697                                     &r->in.dc_name)) {
1698                 libnet_join_set_error_string(mem_ctx, r,
1699                         "Failed to parse domain name");
1700                 return WERR_INVALID_PARAM;
1701         }
1702
1703         if (IS_DC) {
1704                 return WERR_SETUP_DOMAIN_CONTROLLER;
1705         }
1706
1707         if (!secrets_init()) {
1708                 libnet_join_set_error_string(mem_ctx, r,
1709                         "Unable to open secrets database");
1710                 return WERR_CAN_NOT_COMPLETE;
1711         }
1712
1713         return WERR_OK;
1714 }
1715
1716 /****************************************************************
1717 ****************************************************************/
1718
1719 static void libnet_join_add_dom_rids_to_builtins(struct dom_sid *domain_sid)
1720 {
1721         NTSTATUS status;
1722
1723         /* Try adding dom admins to builtin\admins. Only log failures. */
1724         status = create_builtin_administrators(domain_sid);
1725         if (NT_STATUS_EQUAL(status, NT_STATUS_PROTOCOL_UNREACHABLE)) {
1726                 DEBUG(10,("Unable to auto-add domain administrators to "
1727                           "BUILTIN\\Administrators during join because "
1728                           "winbindd must be running.\n"));
1729         } else if (!NT_STATUS_IS_OK(status)) {
1730                 DEBUG(5, ("Failed to auto-add domain administrators to "
1731                           "BUILTIN\\Administrators during join: %s\n",
1732                           nt_errstr(status)));
1733         }
1734
1735         /* Try adding dom users to builtin\users. Only log failures. */
1736         status = create_builtin_users(domain_sid);
1737         if (NT_STATUS_EQUAL(status, NT_STATUS_PROTOCOL_UNREACHABLE)) {
1738                 DEBUG(10,("Unable to auto-add domain users to BUILTIN\\users "
1739                           "during join because winbindd must be running.\n"));
1740         } else if (!NT_STATUS_IS_OK(status)) {
1741                 DEBUG(5, ("Failed to auto-add domain administrators to "
1742                           "BUILTIN\\Administrators during join: %s\n",
1743                           nt_errstr(status)));
1744         }
1745 }
1746
1747 /****************************************************************
1748 ****************************************************************/
1749
1750 static WERROR libnet_join_post_processing(TALLOC_CTX *mem_ctx,
1751                                           struct libnet_JoinCtx *r)
1752 {
1753         WERROR werr;
1754
1755         if (!W_ERROR_IS_OK(r->out.result)) {
1756                 return r->out.result;
1757         }
1758
1759         werr = do_JoinConfig(r);
1760         if (!W_ERROR_IS_OK(werr)) {
1761                 return werr;
1762         }
1763
1764         if (!(r->in.join_flags & WKSSVC_JOIN_FLAGS_JOIN_TYPE)) {
1765                 return WERR_OK;
1766         }
1767
1768         saf_join_store(r->out.netbios_domain_name, r->in.dc_name);
1769         if (r->out.dns_domain_name) {
1770                 saf_join_store(r->out.dns_domain_name, r->in.dc_name);
1771         }
1772
1773 #ifdef HAVE_ADS
1774         if (r->out.domain_is_ad &&
1775             !(r->in.join_flags & WKSSVC_JOIN_FLAGS_JOIN_UNSECURE)) {
1776                 ADS_STATUS ads_status;
1777
1778                 ads_status  = libnet_join_post_processing_ads(mem_ctx, r);
1779                 if (!ADS_ERR_OK(ads_status)) {
1780                         return WERR_GENERAL_FAILURE;
1781                 }
1782         }
1783 #endif /* HAVE_ADS */
1784
1785         libnet_join_add_dom_rids_to_builtins(r->out.domain_sid);
1786
1787         return WERR_OK;
1788 }
1789
1790 /****************************************************************
1791 ****************************************************************/
1792
1793 static int libnet_destroy_JoinCtx(struct libnet_JoinCtx *r)
1794 {
1795         if (r->in.ads) {
1796                 ads_destroy(&r->in.ads);
1797         }
1798
1799         return 0;
1800 }
1801
1802 /****************************************************************
1803 ****************************************************************/
1804
1805 static int libnet_destroy_UnjoinCtx(struct libnet_UnjoinCtx *r)
1806 {
1807         if (r->in.ads) {
1808                 ads_destroy(&r->in.ads);
1809         }
1810
1811         return 0;
1812 }
1813
1814 /****************************************************************
1815 ****************************************************************/
1816
1817 WERROR libnet_init_JoinCtx(TALLOC_CTX *mem_ctx,
1818                            struct libnet_JoinCtx **r)
1819 {
1820         struct libnet_JoinCtx *ctx;
1821
1822         ctx = talloc_zero(mem_ctx, struct libnet_JoinCtx);
1823         if (!ctx) {
1824                 return WERR_NOMEM;
1825         }
1826
1827         talloc_set_destructor(ctx, libnet_destroy_JoinCtx);
1828
1829         ctx->in.machine_name = talloc_strdup(mem_ctx, lp_netbios_name());
1830         W_ERROR_HAVE_NO_MEMORY(ctx->in.machine_name);
1831
1832         ctx->in.secure_channel_type = SEC_CHAN_WKSTA;
1833
1834         *r = ctx;
1835
1836         return WERR_OK;
1837 }
1838
1839 /****************************************************************
1840 ****************************************************************/
1841
1842 WERROR libnet_init_UnjoinCtx(TALLOC_CTX *mem_ctx,
1843                              struct libnet_UnjoinCtx **r)
1844 {
1845         struct libnet_UnjoinCtx *ctx;
1846
1847         ctx = talloc_zero(mem_ctx, struct libnet_UnjoinCtx);
1848         if (!ctx) {
1849                 return WERR_NOMEM;
1850         }
1851
1852         talloc_set_destructor(ctx, libnet_destroy_UnjoinCtx);
1853
1854         ctx->in.machine_name = talloc_strdup(mem_ctx, lp_netbios_name());
1855         W_ERROR_HAVE_NO_MEMORY(ctx->in.machine_name);
1856
1857         *r = ctx;
1858
1859         return WERR_OK;
1860 }
1861
1862 /****************************************************************
1863 ****************************************************************/
1864
1865 static WERROR libnet_join_check_config(TALLOC_CTX *mem_ctx,
1866                                        struct libnet_JoinCtx *r)
1867 {
1868         bool valid_security = false;
1869         bool valid_workgroup = false;
1870         bool valid_realm = false;
1871
1872         /* check if configuration is already set correctly */
1873
1874         valid_workgroup = strequal(lp_workgroup(), r->out.netbios_domain_name);
1875
1876         switch (r->out.domain_is_ad) {
1877                 case false:
1878                         valid_security = (lp_security() == SEC_DOMAIN);
1879                         if (valid_workgroup && valid_security) {
1880                                 /* nothing to be done */
1881                                 return WERR_OK;
1882                         }
1883                         break;
1884                 case true:
1885                         valid_realm = strequal(lp_realm(), r->out.dns_domain_name);
1886                         switch (lp_security()) {
1887                         case SEC_DOMAIN:
1888                         case SEC_ADS:
1889                                 valid_security = true;
1890                         }
1891
1892                         if (valid_workgroup && valid_realm && valid_security) {
1893                                 /* nothing to be done */
1894                                 return WERR_OK;
1895                         }
1896                         break;
1897         }
1898
1899         /* check if we are supposed to manipulate configuration */
1900
1901         if (!r->in.modify_config) {
1902
1903                 char *wrong_conf = talloc_strdup(mem_ctx, "");
1904
1905                 if (!valid_workgroup) {
1906                         wrong_conf = talloc_asprintf_append(wrong_conf,
1907                                 "\"workgroup\" set to '%s', should be '%s'",
1908                                 lp_workgroup(), r->out.netbios_domain_name);
1909                         W_ERROR_HAVE_NO_MEMORY(wrong_conf);
1910                 }
1911
1912                 if (!valid_realm) {
1913                         wrong_conf = talloc_asprintf_append(wrong_conf,
1914                                 "\"realm\" set to '%s', should be '%s'",
1915                                 lp_realm(), r->out.dns_domain_name);
1916                         W_ERROR_HAVE_NO_MEMORY(wrong_conf);
1917                 }
1918
1919                 if (!valid_security) {
1920                         const char *sec = NULL;
1921                         switch (lp_security()) {
1922                         case SEC_USER:  sec = "user"; break;
1923                         case SEC_DOMAIN: sec = "domain"; break;
1924                         case SEC_ADS: sec = "ads"; break;
1925                         }
1926                         wrong_conf = talloc_asprintf_append(wrong_conf,
1927                                 "\"security\" set to '%s', should be %s",
1928                                 sec, r->out.domain_is_ad ?
1929                                 "either 'domain' or 'ads'" : "'domain'");
1930                         W_ERROR_HAVE_NO_MEMORY(wrong_conf);
1931                 }
1932
1933                 libnet_join_set_error_string(mem_ctx, r,
1934                         "Invalid configuration (%s) and configuration modification "
1935                         "was not requested", wrong_conf);
1936                 return WERR_CAN_NOT_COMPLETE;
1937         }
1938
1939         /* check if we are able to manipulate configuration */
1940
1941         if (!lp_config_backend_is_registry()) {
1942                 libnet_join_set_error_string(mem_ctx, r,
1943                         "Configuration manipulation requested but not "
1944                         "supported by backend");
1945                 return WERR_NOT_SUPPORTED;
1946         }
1947
1948         return WERR_OK;
1949 }
1950
1951 /****************************************************************
1952 ****************************************************************/
1953
1954 static WERROR libnet_DomainJoin(TALLOC_CTX *mem_ctx,
1955                                 struct libnet_JoinCtx *r)
1956 {
1957         NTSTATUS status;
1958         WERROR werr;
1959         struct cli_state *cli = NULL;
1960 #ifdef HAVE_ADS
1961         ADS_STATUS ads_status;
1962 #endif /* HAVE_ADS */
1963
1964         if (!r->in.dc_name) {
1965                 struct netr_DsRGetDCNameInfo *info;
1966                 const char *dc;
1967                 status = dsgetdcname(mem_ctx,
1968                                      r->in.msg_ctx,
1969                                      r->in.domain_name,
1970                                      NULL,
1971                                      NULL,
1972                                      DS_FORCE_REDISCOVERY |
1973                                      DS_DIRECTORY_SERVICE_REQUIRED |
1974                                      DS_WRITABLE_REQUIRED |
1975                                      DS_RETURN_DNS_NAME,
1976                                      &info);
1977                 if (!NT_STATUS_IS_OK(status)) {
1978                         libnet_join_set_error_string(mem_ctx, r,
1979                                 "failed to find DC for domain %s",
1980                                 r->in.domain_name,
1981                                 get_friendly_nt_error_msg(status));
1982                         return WERR_DCNOTFOUND;
1983                 }
1984
1985                 dc = strip_hostname(info->dc_unc);
1986                 r->in.dc_name = talloc_strdup(mem_ctx, dc);
1987                 W_ERROR_HAVE_NO_MEMORY(r->in.dc_name);
1988         }
1989
1990         status = libnet_join_lookup_dc_rpc(mem_ctx, r, &cli);
1991         if (!NT_STATUS_IS_OK(status)) {
1992                 libnet_join_set_error_string(mem_ctx, r,
1993                         "failed to lookup DC info for domain '%s' over rpc: %s",
1994                         r->in.domain_name, get_friendly_nt_error_msg(status));
1995                 return ntstatus_to_werror(status);
1996         }
1997
1998         werr = libnet_join_check_config(mem_ctx, r);
1999         if (!W_ERROR_IS_OK(werr)) {
2000                 goto done;
2001         }
2002
2003 #ifdef HAVE_ADS
2004
2005         create_local_private_krb5_conf_for_domain(
2006                 r->out.dns_domain_name, r->out.netbios_domain_name,
2007                 NULL, smbXcli_conn_remote_sockaddr(cli->conn),
2008                 smbXcli_conn_remote_name(cli->conn));
2009
2010         if (r->out.domain_is_ad && r->in.account_ou &&
2011             !(r->in.join_flags & WKSSVC_JOIN_FLAGS_JOIN_UNSECURE)) {
2012
2013                 ads_status = libnet_join_connect_ads(mem_ctx, r);
2014                 if (!ADS_ERR_OK(ads_status)) {
2015                         return WERR_DEFAULT_JOIN_REQUIRED;
2016                 }
2017
2018                 ads_status = libnet_join_precreate_machine_acct(mem_ctx, r);
2019                 if (!ADS_ERR_OK(ads_status)) {
2020                         libnet_join_set_error_string(mem_ctx, r,
2021                                 "failed to precreate account in ou %s: %s",
2022                                 r->in.account_ou,
2023                                 ads_errstr(ads_status));
2024                         return WERR_DEFAULT_JOIN_REQUIRED;
2025                 }
2026
2027                 r->in.join_flags &= ~WKSSVC_JOIN_FLAGS_ACCOUNT_CREATE;
2028         }
2029 #endif /* HAVE_ADS */
2030
2031         if ((r->in.join_flags & WKSSVC_JOIN_FLAGS_JOIN_UNSECURE) &&
2032             (r->in.join_flags & WKSSVC_JOIN_FLAGS_MACHINE_PWD_PASSED)) {
2033                 status = libnet_join_joindomain_rpc_unsecure(mem_ctx, r, cli);
2034         } else {
2035                 status = libnet_join_joindomain_rpc(mem_ctx, r, cli);
2036         }
2037         if (!NT_STATUS_IS_OK(status)) {
2038                 libnet_join_set_error_string(mem_ctx, r,
2039                         "failed to join domain '%s' over rpc: %s",
2040                         r->in.domain_name, get_friendly_nt_error_msg(status));
2041                 if (NT_STATUS_EQUAL(status, NT_STATUS_USER_EXISTS)) {
2042                         return WERR_SETUP_ALREADY_JOINED;
2043                 }
2044                 werr = ntstatus_to_werror(status);
2045                 goto done;
2046         }
2047
2048         if (!libnet_join_joindomain_store_secrets(mem_ctx, r)) {
2049                 werr = WERR_SETUP_NOT_JOINED;
2050                 goto done;
2051         }
2052
2053         werr = WERR_OK;
2054
2055  done:
2056         if (cli) {
2057                 cli_shutdown(cli);
2058         }
2059
2060         return werr;
2061 }
2062
2063 /****************************************************************
2064 ****************************************************************/
2065
2066 static WERROR libnet_join_rollback(TALLOC_CTX *mem_ctx,
2067                                    struct libnet_JoinCtx *r)
2068 {
2069         WERROR werr;
2070         struct libnet_UnjoinCtx *u = NULL;
2071
2072         werr = libnet_init_UnjoinCtx(mem_ctx, &u);
2073         if (!W_ERROR_IS_OK(werr)) {
2074                 return werr;
2075         }
2076
2077         u->in.debug             = r->in.debug;
2078         u->in.dc_name           = r->in.dc_name;
2079         u->in.domain_name       = r->in.domain_name;
2080         u->in.admin_account     = r->in.admin_account;
2081         u->in.admin_password    = r->in.admin_password;
2082         u->in.modify_config     = r->in.modify_config;
2083         u->in.unjoin_flags      = WKSSVC_JOIN_FLAGS_JOIN_TYPE |
2084                                   WKSSVC_JOIN_FLAGS_ACCOUNT_DELETE;
2085
2086         werr = libnet_Unjoin(mem_ctx, u);
2087         TALLOC_FREE(u);
2088
2089         return werr;
2090 }
2091
2092 /****************************************************************
2093 ****************************************************************/
2094
2095 WERROR libnet_Join(TALLOC_CTX *mem_ctx,
2096                    struct libnet_JoinCtx *r)
2097 {
2098         WERROR werr;
2099
2100         if (r->in.debug) {
2101                 LIBNET_JOIN_IN_DUMP_CTX(mem_ctx, r);
2102         }
2103
2104         ZERO_STRUCT(r->out);
2105
2106         werr = libnet_join_pre_processing(mem_ctx, r);
2107         if (!W_ERROR_IS_OK(werr)) {
2108                 goto done;
2109         }
2110
2111         if (r->in.join_flags & WKSSVC_JOIN_FLAGS_JOIN_TYPE) {
2112                 werr = libnet_DomainJoin(mem_ctx, r);
2113                 if (!W_ERROR_IS_OK(werr)) {
2114                         goto done;
2115                 }
2116         }
2117
2118         werr = libnet_join_post_processing(mem_ctx, r);
2119         if (!W_ERROR_IS_OK(werr)) {
2120                 goto done;
2121         }
2122
2123         if (r->in.join_flags & WKSSVC_JOIN_FLAGS_JOIN_TYPE) {
2124                 werr = libnet_join_post_verify(mem_ctx, r);
2125                 if (!W_ERROR_IS_OK(werr)) {
2126                         libnet_join_rollback(mem_ctx, r);
2127                 }
2128         }
2129
2130  done:
2131         r->out.result = werr;
2132
2133         if (r->in.debug) {
2134                 LIBNET_JOIN_OUT_DUMP_CTX(mem_ctx, r);
2135         }
2136         return werr;
2137 }
2138
2139 /****************************************************************
2140 ****************************************************************/
2141
2142 static WERROR libnet_DomainUnjoin(TALLOC_CTX *mem_ctx,
2143                                   struct libnet_UnjoinCtx *r)
2144 {
2145         NTSTATUS status;
2146
2147         if (!r->in.domain_sid) {
2148                 struct dom_sid sid;
2149                 if (!secrets_fetch_domain_sid(lp_workgroup(), &sid)) {
2150                         libnet_unjoin_set_error_string(mem_ctx, r,
2151                                 "Unable to fetch domain sid: are we joined?");
2152                         return WERR_SETUP_NOT_JOINED;
2153                 }
2154                 r->in.domain_sid = dom_sid_dup(mem_ctx, &sid);
2155                 W_ERROR_HAVE_NO_MEMORY(r->in.domain_sid);
2156         }
2157
2158         if (!(r->in.unjoin_flags & WKSSVC_JOIN_FLAGS_ACCOUNT_DELETE) && 
2159             !r->in.delete_machine_account) {
2160                 libnet_join_unjoindomain_remove_secrets(mem_ctx, r);
2161                 return WERR_OK;
2162         }
2163
2164         if (!r->in.dc_name) {
2165                 struct netr_DsRGetDCNameInfo *info;
2166                 const char *dc;
2167                 status = dsgetdcname(mem_ctx,
2168                                      r->in.msg_ctx,
2169                                      r->in.domain_name,
2170                                      NULL,
2171                                      NULL,
2172                                      DS_DIRECTORY_SERVICE_REQUIRED |
2173                                      DS_WRITABLE_REQUIRED |
2174                                      DS_RETURN_DNS_NAME,
2175                                      &info);
2176                 if (!NT_STATUS_IS_OK(status)) {
2177                         libnet_unjoin_set_error_string(mem_ctx, r,
2178                                 "failed to find DC for domain %s",
2179                                 r->in.domain_name,
2180                                 get_friendly_nt_error_msg(status));
2181                         return WERR_DCNOTFOUND;
2182                 }
2183
2184                 dc = strip_hostname(info->dc_unc);
2185                 r->in.dc_name = talloc_strdup(mem_ctx, dc);
2186                 W_ERROR_HAVE_NO_MEMORY(r->in.dc_name);
2187         }
2188
2189 #ifdef HAVE_ADS
2190         /* for net ads leave, try to delete the account.  If it works, 
2191            no sense in disabling.  If it fails, we can still try to 
2192            disable it. jmcd */
2193
2194         if (r->in.delete_machine_account) {
2195                 ADS_STATUS ads_status;
2196                 ads_status = libnet_unjoin_connect_ads(mem_ctx, r);
2197                 if (ADS_ERR_OK(ads_status)) {
2198                         /* dirty hack */
2199                         r->out.dns_domain_name = 
2200                                 talloc_strdup(mem_ctx,
2201                                               r->in.ads->server.realm);
2202                         ads_status = 
2203                                 libnet_unjoin_remove_machine_acct(mem_ctx, r);
2204                 }
2205                 if (!ADS_ERR_OK(ads_status)) {
2206                         libnet_unjoin_set_error_string(mem_ctx, r,
2207                                 "failed to remove machine account from AD: %s",
2208                                 ads_errstr(ads_status));
2209                 } else {
2210                         r->out.deleted_machine_account = true;
2211                         W_ERROR_HAVE_NO_MEMORY(r->out.dns_domain_name);
2212                         libnet_join_unjoindomain_remove_secrets(mem_ctx, r);
2213                         return WERR_OK;
2214                 }
2215         }
2216 #endif /* HAVE_ADS */
2217
2218         /* The WKSSVC_JOIN_FLAGS_ACCOUNT_DELETE flag really means 
2219            "disable".  */
2220         if (r->in.unjoin_flags & WKSSVC_JOIN_FLAGS_ACCOUNT_DELETE) {
2221                 status = libnet_join_unjoindomain_rpc(mem_ctx, r);
2222                 if (!NT_STATUS_IS_OK(status)) {
2223                         libnet_unjoin_set_error_string(mem_ctx, r,
2224                                 "failed to disable machine account via rpc: %s",
2225                                 get_friendly_nt_error_msg(status));
2226                         if (NT_STATUS_EQUAL(status, NT_STATUS_NO_SUCH_USER)) {
2227                                 return WERR_SETUP_NOT_JOINED;
2228                         }
2229                         return ntstatus_to_werror(status);
2230                 }
2231
2232                 r->out.disabled_machine_account = true;
2233         }
2234
2235         /* If disable succeeded or was not requested at all, we 
2236            should be getting rid of our end of things */
2237
2238         libnet_join_unjoindomain_remove_secrets(mem_ctx, r);
2239
2240         return WERR_OK;
2241 }
2242
2243 /****************************************************************
2244 ****************************************************************/
2245
2246 static WERROR libnet_unjoin_pre_processing(TALLOC_CTX *mem_ctx,
2247                                            struct libnet_UnjoinCtx *r)
2248 {
2249         if (!r->in.domain_name) {
2250                 libnet_unjoin_set_error_string(mem_ctx, r,
2251                         "No domain name defined");
2252                 return WERR_INVALID_PARAM;
2253         }
2254
2255         if (!libnet_parse_domain_dc(mem_ctx, r->in.domain_name,
2256                                     &r->in.domain_name,
2257                                     &r->in.dc_name)) {
2258                 libnet_unjoin_set_error_string(mem_ctx, r,
2259                         "Failed to parse domain name");
2260                 return WERR_INVALID_PARAM;
2261         }
2262
2263         if (IS_DC) {
2264                 return WERR_SETUP_DOMAIN_CONTROLLER;
2265         }
2266
2267         if (!secrets_init()) {
2268                 libnet_unjoin_set_error_string(mem_ctx, r,
2269                         "Unable to open secrets database");
2270                 return WERR_CAN_NOT_COMPLETE;
2271         }
2272
2273         return WERR_OK;
2274 }
2275
2276 /****************************************************************
2277 ****************************************************************/
2278
2279 static WERROR libnet_unjoin_post_processing(TALLOC_CTX *mem_ctx,
2280                                             struct libnet_UnjoinCtx *r)
2281 {
2282         saf_delete(r->out.netbios_domain_name);
2283         saf_delete(r->out.dns_domain_name);
2284
2285         return libnet_unjoin_config(r);
2286 }
2287
2288 /****************************************************************
2289 ****************************************************************/
2290
2291 WERROR libnet_Unjoin(TALLOC_CTX *mem_ctx,
2292                      struct libnet_UnjoinCtx *r)
2293 {
2294         WERROR werr;
2295
2296         if (r->in.debug) {
2297                 LIBNET_UNJOIN_IN_DUMP_CTX(mem_ctx, r);
2298         }
2299
2300         werr = libnet_unjoin_pre_processing(mem_ctx, r);
2301         if (!W_ERROR_IS_OK(werr)) {
2302                 goto done;
2303         }
2304
2305         if (r->in.unjoin_flags & WKSSVC_JOIN_FLAGS_JOIN_TYPE) {
2306                 werr = libnet_DomainUnjoin(mem_ctx, r);
2307                 if (!W_ERROR_IS_OK(werr)) {
2308                         libnet_unjoin_config(r);
2309                         goto done;
2310                 }
2311         }
2312
2313         werr = libnet_unjoin_post_processing(mem_ctx, r);
2314         if (!W_ERROR_IS_OK(werr)) {
2315                 goto done;
2316         }
2317
2318  done:
2319         r->out.result = werr;
2320
2321         if (r->in.debug) {
2322                 LIBNET_UNJOIN_OUT_DUMP_CTX(mem_ctx, r);
2323         }
2324
2325         return werr;
2326 }