r9391: Convert all the code to use struct ldb_dn to ohandle ldap like distinguished...
[ambi/samba-autobuild/.git] / source4 / nbt_server / dgram / netlogon.c
1 /* 
2    Unix SMB/CIFS implementation.
3
4    NBT datagram netlogon server
5
6    Copyright (C) Andrew Tridgell        2005
7    
8    This program is free software; you can redistribute it and/or modify
9    it under the terms of the GNU General Public License as published by
10    the Free Software Foundation; either version 2 of the License, or
11    (at your option) any later version.
12    
13    This program is distributed in the hope that it will be useful,
14    but WITHOUT ANY WARRANTY; without even the implied warranty of
15    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
16    GNU General Public License for more details.
17    
18    You should have received a copy of the GNU General Public License
19    along with this program; if not, write to the Free Software
20    Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
21 */
22
23 #include "includes.h"
24 #include "dlinklist.h"
25 #include "nbt_server/nbt_server.h"
26 #include "smbd/service_task.h"
27 #include "lib/socket/socket.h"
28 #include "lib/ldb/include/ldb.h"
29
30 /*
31   reply to a GETDC request
32  */
33 static void nbtd_netlogon_getdc(struct dgram_mailslot_handler *dgmslot, 
34                                 struct nbt_dgram_packet *packet, 
35                                 const char *src_address, int src_port,
36                                 struct nbt_netlogon_packet *netlogon)
37 {
38         struct nbt_name *name = &packet->data.msg.dest_name;
39         struct nbt_netlogon_packet reply;
40         struct nbt_netlogon_response_from_pdc *pdc;
41         const char *ref_attrs[] = {"nETBIOSName", NULL};
42         struct ldb_message **ref_res;
43         struct ldb_context *samctx;
44         int ret;
45
46         /* only answer getdc requests on the PDC or LOGON names */
47         if (name->type != NBT_NAME_PDC && name->type != NBT_NAME_LOGON) {
48                 return;
49         }
50
51         samctx = samdb_connect(packet);
52         if (samctx == NULL) {
53                 DEBUG(2,("Unable to open sam in getdc reply\n"));
54                 return;
55         }
56
57         ret = gendb_search(samctx, samctx, NULL, &ref_res, ref_attrs,
58                            "(&(&(nETBIOSName=%s)(objectclass=crossRef))(ncName=*))", 
59                            name->name);
60         
61         if (ret != 1) {
62                 DEBUG(2,("Unable to find domain reference '%s' in sam\n", name->name));
63                 return;
64         }
65
66         /* setup a GETDC reply */
67         ZERO_STRUCT(reply);
68         reply.command = NETLOGON_RESPONSE_FROM_PDC;
69         pdc = &reply.req.response;
70
71         pdc->pdc_name         = lp_netbios_name();
72         pdc->unicode_pdc_name = pdc->pdc_name;
73         pdc->domain_name      = samdb_result_string(ref_res[0], "nETBIOSName", name->name);;
74         pdc->nt_version       = 1;
75         pdc->lmnt_token       = 0xFFFF;
76         pdc->lm20_token       = 0xFFFF;
77
78
79         packet->data.msg.dest_name.type = 0;
80
81         dgram_mailslot_netlogon_reply(dgmslot->dgmsock, 
82                                       packet, 
83                                       netlogon->req.pdc.mailslot_name,
84                                       &reply);
85 }
86
87
88 /*
89   reply to a ADS style GETDC request
90  */
91 static void nbtd_netlogon_getdc2(struct dgram_mailslot_handler *dgmslot, 
92                                  struct nbt_dgram_packet *packet, 
93                                  const char *src_address, int src_port,
94                                  struct nbt_netlogon_packet *netlogon)
95 {
96         struct nbt_name *name = &packet->data.msg.dest_name;
97         struct nbt_netlogon_packet reply;
98         struct nbt_netlogon_response_from_pdc2 *pdc;
99         struct ldb_context *samctx;
100         const char *ref_attrs[] = {"nETBIOSName", "ncName", NULL};
101         const char *dom_attrs[] = {"dnsDomain", "objectGUID", NULL};
102         struct ldb_message **ref_res, **dom_res;
103         int ret;
104         const char **services = lp_server_services();
105
106         /* only answer getdc requests on the PDC or LOGON names */
107         if (name->type != NBT_NAME_PDC && name->type != NBT_NAME_LOGON) {
108                 return;
109         }
110
111         samctx = samdb_connect(packet);
112         if (samctx == NULL) {
113                 DEBUG(2,("Unable to open sam in getdc reply\n"));
114                 return;
115         }
116
117         ret = gendb_search(samctx, samctx, NULL, &ref_res, ref_attrs,
118                                   "(&(&(nETBIOSName=%s)(objectclass=crossRef))(ncName=*))", 
119                                   name->name);
120         
121         if (ret != 1) {
122                 DEBUG(2,("Unable to find domain reference '%s' in sam\n", name->name));
123                 return;
124         }
125
126         /* try and find the domain */
127         ret = gendb_search_dn(samctx, samctx, 
128                               samdb_result_dn(samctx, ref_res[0], "ncName", NULL), 
129                               &dom_res, dom_attrs);
130         if (ret != 1) {
131                 DEBUG(2,("Unable to find domain from reference '%s' in sam\n",
132                          ldb_dn_linearize(samctx, ref_res[0]->dn)));
133                 return;
134         }
135
136         /* setup a GETDC reply */
137         ZERO_STRUCT(reply);
138         if (netlogon->req.pdc2.user_name[0]) {
139                 reply.command = NETLOGON_RESPONSE_FROM_PDC_USER;
140         } else {
141                 reply.command = NETLOGON_RESPONSE_FROM_PDC2;
142         }
143         pdc = &reply.req.response2;
144
145         /* TODO: accurately depict which services we are running */
146         pdc->server_type      = 
147                 NBT_SERVER_PDC | NBT_SERVER_GC | 
148                 NBT_SERVER_DS | NBT_SERVER_TIMESERV |
149                 NBT_SERVER_CLOSEST | NBT_SERVER_WRITABLE | 
150                 NBT_SERVER_GOOD_TIMESERV;
151
152         /* hmm, probably a better way to do this */
153         if (str_list_check(services, "ldap")) {
154                 pdc->server_type |= NBT_SERVER_LDAP;
155         }
156
157         if (str_list_check(services, "kdc")) {
158                 pdc->server_type |= NBT_SERVER_KDC;
159         }
160
161         pdc->domain_uuid      = samdb_result_guid(dom_res[0], "objectGUID");
162         pdc->forest           = samdb_result_string(dom_res[0], "dnsDomain", lp_realm());
163         pdc->dns_domain       = samdb_result_string(dom_res[0], "dnsDomain", lp_realm());
164
165         /* TODO: get our full DNS name from somewhere else */
166         pdc->pdc_dns_name     = talloc_asprintf(packet, "%s.%s", 
167                                                 strlower_talloc(packet, lp_netbios_name()), 
168                                                 pdc->dns_domain);
169         pdc->domain           = samdb_result_string(dom_res[0], "nETBIOSName", name->name);;
170         pdc->pdc_name         = lp_netbios_name();
171         pdc->user_name        = netlogon->req.pdc2.user_name;
172         /* TODO: we need to make sure these are in our DNS zone */
173         pdc->site_name        = "Default-First-Site-Name";
174         pdc->site_name2       = "Default-First-Site-Name";
175         pdc->unknown          = 0x10; /* what is this? */
176         pdc->unknown2         = 2; /* and this ... */
177         pdc->pdc_ip           = socket_get_my_addr(dgmslot->dgmsock->sock, packet);
178         pdc->nt_version       = 13;
179         pdc->lmnt_token       = 0xFFFF;
180         pdc->lm20_token       = 0xFFFF;
181
182         packet->data.msg.dest_name.type = 0;
183
184         dgram_mailslot_netlogon_reply(dgmslot->dgmsock, 
185                                       packet, 
186                                       netlogon->req.pdc2.mailslot_name,
187                                       &reply);
188 }
189
190
191 /*
192   handle incoming netlogon mailslot requests
193 */
194 void nbtd_mailslot_netlogon_handler(struct dgram_mailslot_handler *dgmslot, 
195                                     struct nbt_dgram_packet *packet, 
196                                     const char *src_address, int src_port)
197 {
198         NTSTATUS status = NT_STATUS_NO_MEMORY;
199         struct nbtd_interface *iface = 
200                 talloc_get_type(dgmslot->private, struct nbtd_interface);
201         struct nbt_netlogon_packet *netlogon = 
202                 talloc(dgmslot, struct nbt_netlogon_packet);
203         struct nbtd_iface_name *iname;
204         struct nbt_name *name = &packet->data.msg.dest_name;
205
206         if (netlogon == NULL) goto failed;
207
208         /*
209           see if the we are listening on the destination netbios name
210         */
211         iname = nbtd_find_iname(iface, name, 0);
212         if (iname == NULL) {
213                 status = NT_STATUS_BAD_NETWORK_NAME;
214                 goto failed;
215         }
216
217         DEBUG(2,("netlogon request to %s from %s:%d\n", 
218                  nbt_name_string(netlogon, name), src_address, src_port));
219         status = dgram_mailslot_netlogon_parse(dgmslot, netlogon, packet, netlogon);
220         if (!NT_STATUS_IS_OK(status)) goto failed;
221
222         switch (netlogon->command) {
223         case NETLOGON_QUERY_FOR_PDC:
224                 nbtd_netlogon_getdc(dgmslot, packet, src_address, src_port, netlogon);
225                 break;
226         case NETLOGON_QUERY_FOR_PDC2:
227                 nbtd_netlogon_getdc2(dgmslot, packet, src_address, src_port, netlogon);
228                 break;
229         default:
230                 DEBUG(2,("unknown netlogon op %d from %s:%d\n", 
231                          netlogon->command, src_address, src_port));
232                 NDR_PRINT_DEBUG(nbt_netlogon_packet, netlogon);
233                 break;
234         }
235
236         talloc_free(netlogon);
237         return;
238
239 failed:
240         DEBUG(2,("nbtd netlogon handler failed from %s:%d - %s\n",
241                  src_address, src_port, nt_errstr(status)));
242         talloc_free(netlogon);
243 }