2 Unix SMB/CIFS implementation.
4 Winbind daemon connection manager
6 Copyright (C) Tim Potter 2001
7 Copyright (C) Andrew Bartlett 2002
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 2 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program; if not, write to the Free Software
21 Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
25 We need to manage connections to domain controllers without having to
26 mess up the main winbindd code with other issues. The aim of the
27 connection manager is to:
29 - make connections to domain controllers and cache them
30 - re-establish connections when networks or servers go down
31 - centralise the policy on connection timeouts, domain controller
33 - manage re-entrancy for when winbindd becomes able to handle
34 multiple outstanding rpc requests
36 Why not have connection management as part of the rpc layer like tng?
37 Good question. This code may morph into libsmb/rpc_cache.c or something
38 like that but at the moment it's simply staying as part of winbind. I
39 think the TNG architecture of forcing every user of the rpc layer to use
40 the connection caching system is a bad idea. It should be an optional
41 method of using the routines.
43 The TNG design is quite good but I disagree with some aspects of the
51 - I'm pretty annoyed by all the make_nmb_name() stuff. It should be
52 moved down into another function.
54 - Take care when destroying cli_structs as they can be shared between
62 #define DBGC_CLASS DBGC_WINBIND
64 /* Global list of connections. Initially a DLIST but can become a hash
65 table or whatever later. */
67 struct winbindd_cm_conn {
68 struct winbindd_cm_conn *prev, *next;
72 size_t mutex_ref_count;
73 struct cli_state *cli;
77 static struct winbindd_cm_conn *cm_conns = NULL;
80 find the DC for a domain using methods appropriate for a ADS domain
82 static BOOL ads_dc_name(const char *domain, struct in_addr *dc_ip, fstring srv_name)
85 const char *realm = domain;
87 if (strcasecmp(realm, lp_workgroup()) == 0)
90 ads = ads_init(realm, domain, NULL);
94 /* we don't need to bind, just connect */
95 ads->auth.flags |= ADS_AUTH_NO_BIND;
97 DEBUG(4,("ads_dc_name: domain=%s\n", domain));
100 /* a full ads_connect() is actually overkill, as we don't srictly need
101 to do the SASL auth in order to get the info we need, but libads
102 doesn't offer a better way right now */
106 if (!ads->config.realm)
109 fstrcpy(srv_name, ads->config.ldap_server_name);
111 *dc_ip = ads->ldap_ip;
114 DEBUG(4,("ads_dc_name: using server='%s' IP=%s\n",
115 srv_name, inet_ntoa(*dc_ip)));
120 /**********************************************************************
121 wrapper around ads and rpc methods of finds DC's
122 **********************************************************************/
124 static BOOL cm_get_dc_name(const char *domain, fstring srv_name,
125 struct in_addr *ip_out)
127 struct in_addr dc_ip;
133 if (lp_security() == SEC_ADS)
134 ret = ads_dc_name(domain, &dc_ip, srv_name);
137 /* fall back on rpc methods if the ADS methods fail */
138 ret = rpc_dc_name(domain, srv_name, &dc_ip);
146 /* Choose between anonymous or authenticated connections. We need to use
147 an authenticated connection if DCs have the RestrictAnonymous registry
148 entry set > 0, or the "Additional restrictions for anonymous
149 connections" set in the win2k Local Security Policy.
151 Caller to free() result in domain, username, password
154 static void cm_get_ipc_userpass(char **username, char **domain, char **password)
156 *username = secrets_fetch(SECRETS_AUTH_USER, NULL);
157 *domain = secrets_fetch(SECRETS_AUTH_DOMAIN, NULL);
158 *password = secrets_fetch(SECRETS_AUTH_PASSWORD, NULL);
160 if (*username && **username) {
162 if (!*domain || !**domain)
163 *domain = smb_xstrdup(lp_workgroup());
165 if (!*password || !**password)
166 *password = smb_xstrdup("");
168 DEBUG(3, ("IPC$ connections done by user %s\\%s\n",
169 *domain, *username));
172 DEBUG(3, ("IPC$ connections done anonymously\n"));
173 *username = smb_xstrdup("");
174 *domain = smb_xstrdup("");
175 *password = smb_xstrdup("");
179 /* Open a connction to the remote server, cache failures for 30 seconds */
181 static NTSTATUS cm_open_connection(const char *domain, const int pipe_index,
182 struct winbindd_cm_conn *new_conn)
185 char *ipc_username, *ipc_domain, *ipc_password;
186 struct in_addr dc_ip;
192 fstrcpy(new_conn->domain, domain);
193 fstrcpy(new_conn->pipe_name, get_pipe_name_from_index(pipe_index));
195 /* connection failure cache has been moved inside of rpc_dc_name
196 so we can deal with half dead DC's --jerry */
198 if (!cm_get_dc_name(domain, new_conn->controller, &dc_ip)) {
199 result = NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND;
200 add_failed_connection_entry(domain, "", result);
204 /* Initialise SMB connection */
206 cm_get_ipc_userpass(&ipc_username, &ipc_domain, &ipc_password);
208 DEBUG(5, ("connecting to %s from %s with username [%s]\\[%s]\n",
209 new_conn->controller, global_myname(), ipc_domain, ipc_username));
211 for (i = 0; retry && (i < 3); i++) {
213 if (!(got_mutex = secrets_named_mutex(new_conn->controller, WINBIND_SERVER_MUTEX_WAIT_TIME))) {
214 DEBUG(0,("cm_open_connection: mutex grab failed for %s\n", new_conn->controller));
215 result = NT_STATUS_POSSIBLE_DEADLOCK;
219 result = cli_full_connection(&new_conn->cli, global_myname(), new_conn->controller,
220 &dc_ip, 0, "IPC$", "IPC", ipc_username, ipc_domain,
221 ipc_password, CLI_FULL_CONNECTION_ANNONYMOUS_FALLBACK, &retry);
223 secrets_named_mutex_release(new_conn->controller);
225 if (NT_STATUS_IS_OK(result))
229 SAFE_FREE(ipc_username);
230 SAFE_FREE(ipc_domain);
231 SAFE_FREE(ipc_password);
233 if (!NT_STATUS_IS_OK(result)) {
234 add_failed_connection_entry(domain, new_conn->controller, result);
238 if ( !cli_nt_session_open (new_conn->cli, pipe_index) ) {
239 result = NT_STATUS_PIPE_NOT_AVAILABLE;
241 * only cache a failure if we are not trying to open the
242 * **win2k** specific lsarpc UUID. This could be an NT PDC
243 * and therefore a failure is normal. This should probably
244 * be abstracted to a check for 2k specific pipes and wondering
245 * if the PDC is an NT4 box. but since there is only one 2k
246 * specific UUID right now, i'm not going to bother. --jerry
248 if ( !is_win2k_pipe(pipe_index) )
249 add_failed_connection_entry(domain, new_conn->controller, result);
250 cli_shutdown(new_conn->cli);
257 /* Return true if a connection is still alive */
259 static BOOL connection_ok(struct winbindd_cm_conn *conn)
262 smb_panic("Invalid parameter passed to connection_ok(): conn was NULL!\n");
267 DEBUG(3, ("Connection to %s for domain %s (pipe %s) has NULL conn->cli!\n",
268 conn->controller, conn->domain, conn->pipe_name));
272 if (!conn->cli->initialised) {
273 DEBUG(3, ("Connection to %s for domain %s (pipe %s) was never initialised!\n",
274 conn->controller, conn->domain, conn->pipe_name));
278 if (conn->cli->fd == -1) {
279 DEBUG(3, ("Connection to %s for domain %s (pipe %s) has died or was never started (fd == -1)\n",
280 conn->controller, conn->domain, conn->pipe_name));
287 /* Search the cache for a connection. If there is a broken one,
288 shut it down properly and return NULL. */
290 static void find_cm_connection(const char *domain, const char *pipe_name,
291 struct winbindd_cm_conn **conn_out)
293 struct winbindd_cm_conn *conn;
295 for (conn = cm_conns; conn; ) {
296 if (strequal(conn->domain, domain) &&
297 strequal(conn->pipe_name, pipe_name)) {
298 if (!connection_ok(conn)) {
299 /* Dead connection - remove it. */
300 struct winbindd_cm_conn *conn_temp = conn->next;
302 cli_shutdown(conn->cli);
303 DLIST_REMOVE(cm_conns, conn);
305 conn = conn_temp; /* Keep the loop moving */
317 /* Initialize a new connection up to the RPC BIND. */
319 static NTSTATUS new_cm_connection(const char *domain, const char *pipe_name,
320 struct winbindd_cm_conn **conn_out)
322 struct winbindd_cm_conn *conn;
325 if (!(conn = malloc(sizeof(*conn))))
326 return NT_STATUS_NO_MEMORY;
330 if (!NT_STATUS_IS_OK(result = cm_open_connection(domain, get_pipe_index(pipe_name), conn))) {
331 DEBUG(3, ("Could not open a connection to %s for %s (%s)\n",
332 domain, pipe_name, nt_errstr(result)));
336 DLIST_ADD(cm_conns, conn);
342 /* Get a connection to the remote DC and open the pipe. If there is already a connection, use that */
344 static NTSTATUS get_connection_from_cache(const char *domain, const char *pipe_name,
345 struct winbindd_cm_conn **conn_out)
347 find_cm_connection(domain, pipe_name, conn_out);
349 if (*conn_out != NULL)
352 return new_cm_connection(domain, pipe_name, conn_out);
355 /**********************************************************************************
356 **********************************************************************************/
358 BOOL cm_check_for_native_mode_win2k( const char *domain )
361 struct winbindd_cm_conn conn;
369 if ( !NT_STATUS_IS_OK(result = cm_open_connection(domain, PI_LSARPC_DS, &conn)) ) {
370 DEBUG(5, ("cm_check_for_native_mode_win2k: Could not open a connection to %s for PIPE_LSARPC (%s)\n",
371 domain, nt_errstr(result)));
376 if ( !NT_STATUS_IS_OK(cli_ds_getprimarydominfo( conn.cli,
377 conn.cli->mem_ctx, DsRolePrimaryDomainInfoBasic, &ctr)) ) {
383 if ( (ctr.basic->flags & DSROLE_PRIMARY_DS_RUNNING)
384 && !(ctr.basic->flags & DSROLE_PRIMARY_DS_MIXED_MODE) )
391 * I don't think we need to shutdown here ? JRA.
394 cli_shutdown( conn.cli );
402 /* Return a LSA policy handle on a domain */
404 NTSTATUS cm_get_lsa_handle(const char *domain, CLI_POLICY_HND **return_hnd)
406 struct winbindd_cm_conn *conn;
407 uint32 des_access = SEC_RIGHTS_MAXIMUM_ALLOWED;
409 static CLI_POLICY_HND hnd;
411 /* Look for existing connections */
413 if (!NT_STATUS_IS_OK(result = get_connection_from_cache(domain, PIPE_LSARPC, &conn)))
416 /* This *shitty* code needs scrapping ! JRA */
418 if (policy_handle_is_valid(&conn->pol)) {
426 result = cli_lsa_open_policy(conn->cli, conn->cli->mem_ctx, False,
427 des_access, &conn->pol);
429 if (!NT_STATUS_IS_OK(result)) {
430 /* Hit the cache code again. This cleans out the old connection and gets a new one */
431 if (conn->cli->fd == -1) { /* Try again, if the remote host disapeared */
432 if (!NT_STATUS_IS_OK(result = get_connection_from_cache(domain, PIPE_LSARPC, &conn)))
435 result = cli_lsa_open_policy(conn->cli, conn->cli->mem_ctx, False,
436 des_access, &conn->pol);
439 if (!NT_STATUS_IS_OK(result)) {
440 cli_shutdown(conn->cli);
441 DLIST_REMOVE(cm_conns, conn);
455 /* Return a SAM policy handle on a domain */
457 NTSTATUS cm_get_sam_handle(char *domain, CLI_POLICY_HND **return_hnd)
459 struct winbindd_cm_conn *conn;
460 uint32 des_access = SEC_RIGHTS_MAXIMUM_ALLOWED;
462 static CLI_POLICY_HND hnd;
464 /* Look for existing connections */
466 if (!NT_STATUS_IS_OK(result = get_connection_from_cache(domain, PIPE_SAMR, &conn)))
469 /* This *shitty* code needs scrapping ! JRA */
471 if (policy_handle_is_valid(&conn->pol)) {
480 result = cli_samr_connect(conn->cli, conn->cli->mem_ctx,
481 des_access, &conn->pol);
483 if (!NT_STATUS_IS_OK(result)) {
484 /* Hit the cache code again. This cleans out the old connection and gets a new one */
485 if (conn->cli->fd == -1) { /* Try again, if the remote host disapeared */
487 if (!NT_STATUS_IS_OK(result = get_connection_from_cache(domain, PIPE_SAMR, &conn)))
490 result = cli_samr_connect(conn->cli, conn->cli->mem_ctx,
491 des_access, &conn->pol);
494 if (!NT_STATUS_IS_OK(result)) {
496 cli_shutdown(conn->cli);
497 DLIST_REMOVE(cm_conns, conn);
512 /* Get a handle on a netlogon pipe. This is a bit of a hack to re-use the
513 netlogon pipe as no handle is returned. */
515 NTSTATUS cm_get_netlogon_cli(const char *domain,
516 const unsigned char *trust_passwd,
517 uint32 sec_channel_type,
519 struct cli_state **cli)
521 NTSTATUS result = NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND;
522 struct winbindd_cm_conn *conn;
527 return NT_STATUS_INVALID_PARAMETER;
529 /* Open an initial conection - keep the mutex. */
531 find_cm_connection(domain, PIPE_NETLOGON, &conn);
533 if ( fresh && (conn != NULL) ) {
534 cli_shutdown(conn->cli);
539 /* purge connection from cache */
540 find_cm_connection(domain, PIPE_NETLOGON, &conn);
542 DEBUG(0,("Could not purge connection\n"));
543 return NT_STATUS_UNSUCCESSFUL;
552 result = new_cm_connection(domain, PIPE_NETLOGON, &conn);
554 if (!NT_STATUS_IS_OK(result))
557 snprintf(lock_name, sizeof(lock_name), "NETLOGON\\%s", conn->controller);
559 if (!(got_mutex = secrets_named_mutex(lock_name, WINBIND_SERVER_MUTEX_WAIT_TIME))) {
560 DEBUG(0,("cm_get_netlogon_cli: mutex grab failed for %s\n", conn->controller));
563 result = cli_nt_establish_netlogon(conn->cli, sec_channel_type, trust_passwd);
566 secrets_named_mutex_release(lock_name);
568 if (!NT_STATUS_IS_OK(result)) {
569 cli_shutdown(conn->cli);
570 DLIST_REMOVE(cm_conns, conn);
580 /* Dump the current connection status */
582 static void dump_conn_list(void)
584 struct winbindd_cm_conn *con;
586 DEBUG(0, ("\tDomain Controller Pipe\n"));
588 for(con = cm_conns; con; con = con->next) {
591 /* Display pipe info */
593 if (asprintf(&msg, "\t%-15s %-15s %-16s", con->domain, con->controller, con->pipe_name) < 0) {
594 DEBUG(0, ("Error: not enough memory!\n"));
596 DEBUG(0, ("%s\n", msg));
602 void winbindd_cm_status(void)
604 /* List open connections */
606 DEBUG(0, ("winbindd connection manager status:\n"));
611 DEBUG(0, ("\tNo active connections\n"));
614 /* Close all cached connections */
616 void winbindd_cm_flush(void)
618 struct winbindd_cm_conn *conn, tmp;
620 /* Flush connection cache */
622 for (conn = cm_conns; conn; conn = conn->next) {
624 if (!connection_ok(conn))
627 DEBUG(10, ("Closing connection to %s on %s\n",
628 conn->pipe_name, conn->controller));
631 cli_shutdown(conn->cli);
633 tmp.next = conn->next;
635 DLIST_REMOVE(cm_conns, conn);
640 /* Flush failed connection cache */
642 flush_negative_conn_cache();