r23784: use the GPLv3 boilerplate as recommended by the FSF and the license text
[tprouty/samba.git] / source / utils / net_rpc_join.c
index 6bfeedc8a0c1ad9d02f719d1a893fa4d53fdcc40..558de8d8b489c3e136f78a2b3e65534ca7c4bbac 100644 (file)
@@ -6,7 +6,7 @@
 
    This program is free software; you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
-   the Free Software Foundation; either version 2 of the License, or
+   the Free Software Foundation; either version 3 of the License, or
    (at your option) any later version.
    
    This program is distributed in the hope that it will be useful,
    GNU General Public License for more details.
    
    You should have received a copy of the GNU General Public License
-   along with this program; if not, write to the Free Software
-   Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.  */
+   along with this program.  If not, see <http://www.gnu.org/licenses/>.  */
  
 #include "includes.h"
-#include "../utils/net.h"
+#include "utils/net.h"
 
 /* Macro for checking RPC error codes to make things more readable */
 
                 goto done; \
         }
 
-
 /**
  * confirm that a domain join is still valid
  *
  * @return A shell status integer (0 for success)
  *
  **/
-int net_rpc_join_ok(const char *domain)
+int net_rpc_join_ok(const char *domain, const char *server, struct in_addr *ip )
 {
-       struct cli_state *cli;
-       uchar stored_md4_trust_password[16];
-       int retval = 1;
-       uint32 channel;
-       NTSTATUS result;
+       uint32 neg_flags = NETLOGON_NEG_AUTH2_FLAGS|NETLOGON_NEG_SCHANNEL;
+       struct cli_state *cli = NULL;
+       struct rpc_pipe_client *pipe_hnd = NULL;
+       struct rpc_pipe_client *netlogon_pipe = NULL;
+       NTSTATUS ntret = NT_STATUS_UNSUCCESSFUL;
 
        /* Connect to remote machine */
-       if (!(cli = net_make_ipc_connection(NET_FLAGS_ANONYMOUS | NET_FLAGS_PDC))) {
-               return 1;
+       if (!(cli = net_make_ipc_connection_ex(domain, server, ip, (NET_FLAGS_ANONYMOUS|NET_FLAGS_PDC)))) {
+               return -1;
        }
 
-       if (!cli_nt_session_open(cli, PI_NETLOGON)) {
-               DEBUG(0,("Error connecting to NETLOGON pipe\n"));
-               goto done;
+       /* Setup the creds as though we're going to do schannel... */
+        netlogon_pipe = get_schannel_session_key(cli, domain, &neg_flags, &ntret);
+
+       /* We return NT_STATUS_INVALID_NETWORK_RESPONSE if the server is refusing
+          to negotiate schannel, but the creds were set up ok. That'll have to do. */
+
+        if (!netlogon_pipe) {
+               if (NT_STATUS_EQUAL(ntret, NT_STATUS_INVALID_NETWORK_RESPONSE)) {
+                       cli_shutdown(cli);
+                       return 0;
+               } else {
+                       DEBUG(0,("net_rpc_join_ok: failed to get schannel session "
+                                       "key from server %s for domain %s. Error was %s\n",
+                               cli->desthost, domain, nt_errstr(ntret) ));
+                       cli_shutdown(cli);
+                       return -1;
+               }
        }
 
-       if (!secrets_fetch_trust_account_password(domain,
-                                                 stored_md4_trust_password, 
-                                                 NULL, &channel)) {
-               DEBUG(0,("Could not retreive domain trust secret"));
-               goto done;
+       /* Only do the rest of the schannel test if the client is allowed to do this. */
+       if (!lp_client_schannel()) {
+               cli_shutdown(cli);
+               /* We're good... */
+               return 0;
        }
-       
-       /* ensure that schannel uses the right domain */
-       fstrcpy(cli->domain, domain);
-       if (! NT_STATUS_IS_OK(result = cli_nt_establish_netlogon(cli, channel, stored_md4_trust_password))) {
-               DEBUG(0,("Error in domain join verfication (fresh connection)\n"));
-               goto done;
+
+       pipe_hnd = cli_rpc_pipe_open_schannel_with_key(cli, PI_NETLOGON,
+                               PIPE_AUTH_LEVEL_PRIVACY,
+                               domain, netlogon_pipe->dc, &ntret);
+
+       if (!pipe_hnd) {
+               DEBUG(0,("net_rpc_join_ok: failed to open schannel session "
+                               "on netlogon pipe to server %s for domain %s. Error was %s\n",
+                       cli->desthost, domain, nt_errstr(ntret) ));
+               cli_shutdown(cli);
+               return -1;
        }
-       
-       retval = 0;             /* Success! */
-       
-done:
-       /* Close down pipe - this will clean up open policy handles */
-       if (cli->nt_pipe_fnum)
-               cli_nt_session_close(cli);
 
        cli_shutdown(cli);
-
-       return retval;
+       return 0;
 }
 
 /**
@@ -104,7 +113,9 @@ int net_rpc_join_newstyle(int argc, const char **argv)
        struct cli_state *cli;
        TALLOC_CTX *mem_ctx;
         uint32 acb_info = ACB_WSTRUST;
+       uint32 neg_flags = NETLOGON_NEG_AUTH2_FLAGS|(lp_client_schannel() ? NETLOGON_NEG_SCHANNEL : 0);
        uint32 sec_channel_type;
+       struct rpc_pipe_client *pipe_hnd = NULL;
 
        /* rpc variables */
 
@@ -118,14 +129,14 @@ int net_rpc_join_newstyle(int argc, const char **argv)
        uchar pwbuf[516];
        SAM_USERINFO_CTR ctr;
        SAM_USER_INFO_24 p24;
-       SAM_USER_INFO_10 p10;
+       SAM_USER_INFO_16 p16;
        uchar md4_trust_password[16];
 
        /* Misc */
 
        NTSTATUS result;
        int retval = 1;
-       char *domain;
+       char *domain = NULL;
        uint32 num_rids, *name_types, *user_rids;
        uint32 flags = 0x3e8;
        char *acct_name;
@@ -152,7 +163,7 @@ int net_rpc_join_newstyle(int argc, const char **argv)
 #endif
        }
 
-       /* Connect to remote machine */
+       /* Make authenticated connection to remote machine */
 
        if (!(cli = net_make_ipc_connection(NET_FLAGS_PDC))) 
                return 1;
@@ -164,72 +175,85 @@ int net_rpc_join_newstyle(int argc, const char **argv)
 
        /* Fetch domain sid */
 
-       if (!cli_nt_session_open(cli, PI_LSARPC)) {
-               DEBUG(0, ("Error connecting to LSA pipe\n"));
+       pipe_hnd = cli_rpc_pipe_open_noauth(cli, PI_LSARPC, &result);
+       if (!pipe_hnd) {
+               DEBUG(0, ("Error connecting to LSA pipe. Error was %s\n",
+                       nt_errstr(result) ));
                goto done;
        }
 
 
-       CHECK_RPC_ERR(cli_lsa_open_policy(cli, mem_ctx, True,
+       CHECK_RPC_ERR(rpccli_lsa_open_policy(pipe_hnd, mem_ctx, True,
                                          SEC_RIGHTS_MAXIMUM_ALLOWED,
                                          &lsa_pol),
                      "error opening lsa policy handle");
 
-       CHECK_RPC_ERR(cli_lsa_query_info_policy(cli, mem_ctx, &lsa_pol,
+       CHECK_RPC_ERR(rpccli_lsa_query_info_policy(pipe_hnd, mem_ctx, &lsa_pol,
                                                5, &domain, &domain_sid),
                      "error querying info policy");
 
-       cli_lsa_close(cli, mem_ctx, &lsa_pol);
+       rpccli_lsa_Close(pipe_hnd, mem_ctx, &lsa_pol);
+       cli_rpc_pipe_close(pipe_hnd); /* Done with this pipe */
 
-       cli_nt_session_close(cli); /* Done with this pipe */
+       /* Bail out if domain didn't get set. */
+       if (!domain) {
+               DEBUG(0, ("Could not get domain name.\n"));
+               goto done;
+       }
 
        /* Create domain user */
-       if (!cli_nt_session_open(cli, PI_SAMR)) {
-               DEBUG(0, ("Error connecting to SAM pipe\n"));
+       pipe_hnd = cli_rpc_pipe_open_noauth(cli, PI_SAMR, &result);
+       if (!pipe_hnd) {
+               DEBUG(0, ("Error connecting to SAM pipe. Error was %s\n",
+                       nt_errstr(result) ));
                goto done;
        }
 
-       CHECK_RPC_ERR(cli_samr_connect(cli, mem_ctx, 
+       CHECK_RPC_ERR(rpccli_samr_connect(pipe_hnd, mem_ctx, 
                                       SEC_RIGHTS_MAXIMUM_ALLOWED,
                                       &sam_pol),
                      "could not connect to SAM database");
 
        
-       CHECK_RPC_ERR(cli_samr_open_domain(cli, mem_ctx, &sam_pol,
+       CHECK_RPC_ERR(rpccli_samr_open_domain(pipe_hnd, mem_ctx, &sam_pol,
                                           SEC_RIGHTS_MAXIMUM_ALLOWED,
                                           domain_sid, &domain_pol),
                      "could not open domain");
 
        /* Create domain user */
-       acct_name = talloc_asprintf(mem_ctx, "%s$", global_myname()); 
+       if ((acct_name = talloc_asprintf(mem_ctx, "%s$", global_myname())) == NULL) {
+               result = NT_STATUS_NO_MEMORY;
+               goto done;
+       }
        strlower_m(acct_name);
        const_acct_name = acct_name;
 
-       result = cli_samr_create_dom_user(cli, mem_ctx, &domain_pol,
+       result = rpccli_samr_create_dom_user(pipe_hnd, mem_ctx, &domain_pol,
                                          acct_name, acb_info,
                                          0xe005000b, &user_pol, 
                                          &user_rid);
 
        if (!NT_STATUS_IS_OK(result) && 
            !NT_STATUS_EQUAL(result, NT_STATUS_USER_EXISTS)) {
-               d_printf("Create of workstation account failed\n");
+               d_fprintf(stderr, "Creation of workstation account failed\n");
 
                /* If NT_STATUS_ACCESS_DENIED then we have a valid
                   username/password combo but the user does not have
                   administrator access. */
 
                if (NT_STATUS_V(result) == NT_STATUS_V(NT_STATUS_ACCESS_DENIED))
-                       d_printf("User specified does not have administrator privileges\n");
+                       d_fprintf(stderr, "User specified does not have administrator privileges\n");
 
                goto done;
        }
 
        /* We *must* do this.... don't ask... */
 
-       if (NT_STATUS_IS_OK(result))
-               cli_samr_close(cli, mem_ctx, &user_pol);
+       if (NT_STATUS_IS_OK(result)) {
+               rpccli_samr_close(pipe_hnd, mem_ctx, &user_pol);
+       }
 
-       CHECK_RPC_ERR_DEBUG(cli_samr_lookup_names(cli, mem_ctx,
+       CHECK_RPC_ERR_DEBUG(rpccli_samr_lookup_names(pipe_hnd, mem_ctx,
                                                  &domain_pol, flags,
                                                  1, &const_acct_name, 
                                                  &num_rids,
@@ -247,7 +271,7 @@ int net_rpc_join_newstyle(int argc, const char **argv)
        /* Open handle on user */
 
        CHECK_RPC_ERR_DEBUG(
-               cli_samr_open_user(cli, mem_ctx, &domain_pol,
+               rpccli_samr_open_user(pipe_hnd, mem_ctx, &domain_pol,
                                   SEC_RIGHTS_MAXIMUM_ALLOWED,
                                   user_rid, &user_pol),
                ("could not re-open existing user %s: %s\n",
@@ -258,7 +282,7 @@ int net_rpc_join_newstyle(int argc, const char **argv)
        { 
                char *str;
                str = generate_random_str(DEFAULT_TRUST_ACCOUNT_PASSWORD_LENGTH);
-               clear_trust_password = strdup(str);
+               clear_trust_password = SMB_STRDUP(str);
                E_md4hash(clear_trust_password, md4_trust_password);
        }
 
@@ -274,7 +298,7 @@ int net_rpc_join_newstyle(int argc, const char **argv)
        ctr.switch_value = 24;
        ctr.info.id24 = &p24;
 
-       CHECK_RPC_ERR(cli_samr_set_userinfo(cli, mem_ctx, &user_pol, 24, 
+       CHECK_RPC_ERR(rpccli_samr_set_userinfo(pipe_hnd, mem_ctx, &user_pol, 24, 
                                            &cli->user_session_key, &ctr),
                      "error setting trust account password");
 
@@ -288,39 +312,45 @@ int net_rpc_join_newstyle(int argc, const char **argv)
           userinfo2 level 0x10 fails.  -tpot */
 
        ZERO_STRUCT(ctr);
-       ctr.switch_value = 0x10;
-       ctr.info.id10 = &p10;
+       ctr.switch_value = 16;
+       ctr.info.id16 = &p16;
 
-       init_sam_user_info10(&p10, acb_info);
+       init_sam_user_info16(&p16, acb_info);
 
        /* Ignoring the return value is necessary for joining a domain
           as a normal user with "Add workstation to domain" privilege. */
 
-       result = cli_samr_set_userinfo2(cli, mem_ctx, &user_pol, 0x10
+       result = rpccli_samr_set_userinfo2(pipe_hnd, mem_ctx, &user_pol, 16
                                        &cli->user_session_key, &ctr);
 
+       rpccli_samr_close(pipe_hnd, mem_ctx, &user_pol);
+       cli_rpc_pipe_close(pipe_hnd); /* Done with this pipe */
+
        /* Now check the whole process from top-to-bottom */
-       cli_samr_close(cli, mem_ctx, &user_pol);
-       cli_nt_session_close(cli); /* Done with this pipe */
 
-       if (!cli_nt_session_open(cli, PI_NETLOGON)) {
-               DEBUG(0,("Error connecting to NETLOGON pipe\n"));
+       pipe_hnd = cli_rpc_pipe_open_noauth(cli, PI_NETLOGON, &result);
+       if (!pipe_hnd) {
+               DEBUG(0,("Error connecting to NETLOGON pipe. Error was %s\n",
+                       nt_errstr(result) ));
                goto done;
        }
 
-       /* ensure that schannel uses the right domain */
-       fstrcpy(cli->domain, domain);
-
-       result = cli_nt_establish_netlogon(cli, sec_channel_type, 
-                                          md4_trust_password);
+       result = rpccli_netlogon_setup_creds(pipe_hnd,
+                                       cli->desthost, /* server name */
+                                       domain,        /* domain */
+                                       global_myname(), /* client name */
+                                       global_myname(), /* machine account name */
+                                        md4_trust_password,
+                                        sec_channel_type,
+                                        &neg_flags);
 
        if (!NT_STATUS_IS_OK(result)) {
-               DEBUG(0, ("Error domain join verification (reused connection): %s\n\n",
+               DEBUG(0, ("Error in domain join verification (credential setup failed): %s\n\n",
                          nt_errstr(result)));
 
                if ( NT_STATUS_EQUAL(result, NT_STATUS_ACCESS_DENIED) &&
                     (sec_channel_type == SEC_CHAN_BDC) ) {
-                       d_printf("Please make sure that no computer account\n"
+                       d_fprintf(stderr, "Please make sure that no computer account\n"
                                 "named like this machine (%s) exists in the domain\n",
                                 global_myname());
                }
@@ -328,6 +358,38 @@ int net_rpc_join_newstyle(int argc, const char **argv)
                goto done;
        }
 
+       /* We can only check the schannel connection if the client is allowed
+          to do this and the server supports it. If not, just assume success
+          (after all the rpccli_netlogon_setup_creds() succeeded, and we'll
+          do the same again (setup creds) in net_rpc_join_ok(). JRA. */
+
+       if (lp_client_schannel() && (neg_flags & NETLOGON_NEG_SCHANNEL)) {
+               struct rpc_pipe_client *netlogon_schannel_pipe = 
+                                               cli_rpc_pipe_open_schannel_with_key(cli,
+                                                       PI_NETLOGON,
+                                                       PIPE_AUTH_LEVEL_PRIVACY,
+                                                       domain,
+                                                       pipe_hnd->dc,
+                                                       &result);
+
+               if (!NT_STATUS_IS_OK(result)) {
+                       DEBUG(0, ("Error in domain join verification (schannel setup failed): %s\n\n",
+                                 nt_errstr(result)));
+
+                       if ( NT_STATUS_EQUAL(result, NT_STATUS_ACCESS_DENIED) &&
+                            (sec_channel_type == SEC_CHAN_BDC) ) {
+                               d_fprintf(stderr, "Please make sure that no computer account\n"
+                                        "named like this machine (%s) exists in the domain\n",
+                                        global_myname());
+                       }
+
+                       goto done;
+               }
+               cli_rpc_pipe_close(netlogon_schannel_pipe);
+       }
+
+       cli_rpc_pipe_close(pipe_hnd);
+
        /* Now store the secret in the secrets database */
 
        strupper_m(domain);
@@ -342,20 +404,18 @@ int net_rpc_join_newstyle(int argc, const char **argv)
        }
 
        /* double-check, connection from scratch */
-       retval = net_rpc_join_ok(domain);
+       retval = net_rpc_join_ok(domain, cli->desthost, &cli->dest_ip);
        
 done:
-       /* Close down pipe - this will clean up open policy handles */
-
-       if (cli->nt_pipe_fnum)
-               cli_nt_session_close(cli);
 
        /* Display success or failure */
 
-       if (retval != 0) {
-               fprintf(stderr,"Unable to join domain %s.\n",domain);
-       } else {
-               printf("Joined domain %s.\n",domain);
+       if (domain) {
+               if (retval != 0) {
+                       fprintf(stderr,"Unable to join domain %s.\n",domain);
+               } else {
+                       printf("Joined domain %s.\n",domain);
+               }
        }
        
        cli_shutdown(cli);
@@ -365,7 +425,6 @@ done:
        return retval;
 }
 
-
 /**
  * check that a join is OK
  *
@@ -377,7 +436,7 @@ int net_rpc_testjoin(int argc, const char **argv)
        char *domain = smb_xstrdup(opt_target_workgroup);
 
        /* Display success or failure */
-       if (net_rpc_join_ok(domain) != 0) {
+       if (net_rpc_join_ok(domain, NULL, NULL) != 0) {
                fprintf(stderr,"Join to domain '%s' is not valid\n",domain);
                free(domain);
                return -1;