2 Unix SMB/Netbios implementation.
4 NT Domain Authentication SMB / MSRPC client
5 Copyright (C) Andrew Tridgell 1994-1997
6 Copyright (C) Luke Kenneth Casson Leighton 1996-1997
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
32 extern int DEBUGLEVEL;
36 extern struct cli_state *smb_cli;
39 extern pstring global_myname;
42 /****************************************************************************
43 experimental nt login.
44 ****************************************************************************/
45 void cmd_netlogon_login_test(struct client_info *info, int argc, char *argv[])
49 extern BOOL global_machine_password_needs_changing;
56 unsigned char trust_passwd[16];
59 /* machine account passwords */
71 fstrcpy(nt_user_name, smb_cli->user_name);
72 if (nt_user_name[0] == 0)
74 report(out_hnd,"ntlogin: must specify username with anonymous connection\n");
80 fstrcpy(nt_user_name, argv[0]);
88 nt_password = argv[0];
92 nt_password = getpass("Enter NT Login password:");
95 DEBUG(5,("do_nt_login_test: username %s\n", nt_user_name));
97 res = res ? trust_get_passwd(trust_passwd, smb_cli->domain, info->myhostname) : False;
100 /* check whether the user wants to change their machine password */
101 res = res ? trust_account_check(info->dest_ip, info->dest_host,
102 info->myhostname, smb_cli->domain,
103 info->mach_acct, new_mach_pwd) : False;
105 /* open NETLOGON session. negotiate credentials */
106 res = res ? cli_nt_session_open(smb_cli, PIPE_NETLOGON, &nt_pipe_fnum) : False;
108 res = res ? cli_nt_setup_creds(smb_cli, nt_pipe_fnum,
109 smb_cli->mach_acct, global_myname,
110 trust_passwd, SEC_CHAN_WKSTA) == 0x0 : False;
113 /* change the machine password? */
114 if (global_machine_password_needs_changing)
116 unsigned char new_trust_passwd[16];
117 generate_random_buffer(new_trust_passwd, 16, True);
118 res = res ? cli_nt_srv_pwset(smb_cli, nt_pipe_fnum, new_trust_passwd, SEC_CHAN_WKSTA) : False;
122 global_machine_password_needs_changing = !set_trust_account_password(new_trust_passwd);
125 memset(new_trust_passwd, 0, 16);
129 memset(trust_passwd, 0, 16);
132 res = res ? cli_nt_login_interactive(smb_cli, nt_pipe_fnum,
133 smb_cli->domain, nt_user_name,
134 getuid(), nt_password,
135 &info->dom.ctr, &info->dom.user_info3) : False;
137 /*** clear out the password ***/
138 memset(password, 0, sizeof(password));
140 /* ok! you're logged in! do anything you like, then... */
142 /* do an NT logout */
143 res = res ? cli_nt_logoff(smb_cli, nt_pipe_fnum, &info->dom.ctr) : False;
145 /* close the session */
146 cli_nt_session_close(smb_cli, nt_pipe_fnum);
148 report(out_hnd,"cmd_nt_login: login (%s) test succeeded: %s\n",
149 nt_user_name, BOOLSTR(res));
152 /****************************************************************************
153 experimental nt login.
154 ****************************************************************************/
155 void cmd_netlogon_domain_test(struct client_info *info, int argc, char *argv[])
161 unsigned char trust_passwd[16];
162 fstring inter_dom_acct;
166 report(out_hnd,"domtest: must specify domain name\n");
170 nt_trust_dom = argv[1];
172 DEBUG(5,("do_nt_login_test: domain %s\n", nt_trust_dom));
174 fstrcpy(inter_dom_acct, nt_trust_dom);
175 fstrcat(inter_dom_acct, "$");
177 res = res ? trust_get_passwd(trust_passwd, smb_cli->domain, nt_trust_dom) : False;
179 /* open NETLOGON session. negotiate credentials */
180 res = res ? cli_nt_session_open(smb_cli, PIPE_NETLOGON, &nt_pipe_fnum) : False;
182 res = res ? cli_nt_setup_creds(smb_cli, nt_pipe_fnum, inter_dom_acct,
183 global_myname, trust_passwd,
184 SEC_CHAN_DOMAIN) == 0x0 : False;
186 memset(trust_passwd, 0, 16);
188 /* close the session */
189 cli_nt_session_close(smb_cli, nt_pipe_fnum);
191 report(out_hnd,"cmd_nt_login: credentials (%s) test succeeded: %s\n",
192 nt_trust_dom, BOOLSTR(res));
195 /****************************************************************************
196 experimental SAM synchronisation.
197 ****************************************************************************/
198 void cmd_sam_sync(struct client_info *info, int argc, char *argv[])
200 SAM_DELTA_HDR hdr_deltas[MAX_SAM_DELTAS];
201 SAM_DELTA_CTR deltas[MAX_SAM_DELTAS];
203 uchar trust_passwd[16];
204 extern pstring global_myname;
206 if (!trust_get_passwd(trust_passwd, smb_cli->domain, global_myname))
208 report(out_hnd, "cmd_sam_sync: no trust account password\n");
212 if (do_sam_sync(smb_cli, trust_passwd,
213 smb_cli->mach_acct, global_myname,
214 hdr_deltas, deltas, &num))
216 display_sam_sync(out_hnd, ACTION_HEADER , hdr_deltas, deltas, num);
217 display_sam_sync(out_hnd, ACTION_ENUMERATE, hdr_deltas, deltas, num);
218 display_sam_sync(out_hnd, ACTION_FOOTER , hdr_deltas, deltas, num);