/* Unix SMB/CIFS implementation. async implementation of commands submitted over IRPC Copyright (C) Volker Lendecke 2009 Copyright (C) Guenther Deschner 2009 Copyright (C) Andrew Bartlett 2014 Copyright (C) Andrew Tridgell 2009 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see . */ #include "includes.h" #include "winbindd.h" #include "librpc/gen_ndr/ndr_winbind_c.h" #include "source4/lib/messaging/irpc.h" #include "librpc/gen_ndr/ndr_winbind.h" struct wb_irpc_forward_state { struct irpc_message *msg; struct winbind_DsrUpdateReadOnlyServerDnsRecords *req; const char *opname; struct dcesrv_call_state *dce_call; }; /* called when the forwarded rpc request is finished */ static void wb_irpc_forward_callback(struct tevent_req *subreq) { struct wb_irpc_forward_state *st = tevent_req_callback_data(subreq, struct wb_irpc_forward_state); const char *opname = st->opname; NTSTATUS status; status = dcerpc_binding_handle_call_recv(subreq); TALLOC_FREE(subreq); if (!NT_STATUS_IS_OK(status)) { DEBUG(0,("RPC callback failed for %s - %s\n", opname, nt_errstr(status))); irpc_send_reply(st->msg, status); return; } irpc_send_reply(st->msg, status); } /** * Forward a RPC call using IRPC to another task */ static NTSTATUS wb_irpc_forward_rpc_call(struct irpc_message *msg, TALLOC_CTX *mem_ctx, struct tevent_context *ev, void *r, uint32_t callid, const char *opname, struct winbindd_domain *domain, uint32_t timeout) { struct wb_irpc_forward_state *st; struct dcerpc_binding_handle *binding_handle; struct tevent_req *subreq; st = talloc(mem_ctx, struct wb_irpc_forward_state); if (st == NULL) { return NT_STATUS_NO_MEMORY; } st->msg = msg; st->opname = opname; binding_handle = dom_child_handle(domain); if (binding_handle == NULL) { DEBUG(0,("%s: Failed to forward request to winbind handler for %s\n", opname, domain->name)); return NT_STATUS_UNSUCCESSFUL; } /* reset timeout for the handle */ dcerpc_binding_handle_set_timeout(binding_handle, timeout); /* forward the call */ subreq = dcerpc_binding_handle_call_send(st, ev, binding_handle, NULL, &ndr_table_winbind, callid, msg, r); if (subreq == NULL) { DEBUG(0,("%s: Failed to forward request to winbind handler for %s\n", opname, domain->name)); return NT_STATUS_UNSUCCESSFUL; } /* mark the request as replied async */ msg->defer_reply = true; /* setup the callback */ tevent_req_set_callback(subreq, wb_irpc_forward_callback, st); return NT_STATUS_OK; } static NTSTATUS wb_irpc_DsrUpdateReadOnlyServerDnsRecords(struct irpc_message *msg, struct winbind_DsrUpdateReadOnlyServerDnsRecords *req) { struct winbindd_domain *domain = find_our_domain(); if (domain == NULL) { return NT_STATUS_NO_SUCH_DOMAIN; } DEBUG(5, ("wb_irpc_DsrUpdateReadOnlyServerDnsRecords called\n")); return wb_irpc_forward_rpc_call(msg, msg, server_event_context(), req, NDR_WINBIND_DSRUPDATEREADONLYSERVERDNSRECORDS, "winbind_DsrUpdateReadOnlyServerDnsRecords", domain, IRPC_CALL_TIMEOUT); } static NTSTATUS wb_irpc_SamLogon(struct irpc_message *msg, struct winbind_SamLogon *req) { struct winbindd_domain *domain; struct netr_IdentityInfo *identity_info; const char *target_domain_name = NULL; const char *account_name = NULL; switch (req->in.logon_level) { case NetlogonInteractiveInformation: case NetlogonServiceInformation: case NetlogonInteractiveTransitiveInformation: case NetlogonServiceTransitiveInformation: if (req->in.logon.password == NULL) { return NT_STATUS_REQUEST_NOT_ACCEPTED; } identity_info = &req->in.logon.password->identity_info; break; case NetlogonNetworkInformation: case NetlogonNetworkTransitiveInformation: if (req->in.logon.network == NULL) { return NT_STATUS_REQUEST_NOT_ACCEPTED; } identity_info = &req->in.logon.network->identity_info; break; case NetlogonGenericInformation: if (req->in.logon.generic == NULL) { return NT_STATUS_REQUEST_NOT_ACCEPTED; } identity_info = &req->in.logon.generic->identity_info; break; default: return NT_STATUS_REQUEST_NOT_ACCEPTED; } target_domain_name = identity_info->domain_name.string; if (target_domain_name == NULL) { target_domain_name = ""; } account_name = identity_info->account_name.string; if (account_name == NULL) { account_name = ""; } if (IS_DC && target_domain_name[0] == '\0') { const char *p = NULL; p = strchr_m(account_name, '@'); if (p != NULL) { target_domain_name = p + 1; } } if (IS_DC && target_domain_name[0] == '\0') { DBG_ERR("target_domain[%s] account[%s]\n", target_domain_name, account_name); return NT_STATUS_REQUEST_NOT_ACCEPTED; } domain = find_auth_domain(0, target_domain_name); if (domain == NULL) { DBG_INFO("target_domain[%s] for account[%s] not known\n", target_domain_name, account_name); req->out.result = NT_STATUS_NO_SUCH_USER; req->out.authoritative = 0; return NT_STATUS_OK; } DEBUG(5, ("wb_irpc_SamLogon called\n")); return wb_irpc_forward_rpc_call(msg, msg, server_event_context(), req, NDR_WINBIND_SAMLOGON, "winbind_SamLogon", domain, IRPC_CALL_TIMEOUT); } static NTSTATUS wb_irpc_LogonControl(struct irpc_message *msg, struct winbind_LogonControl *req) { TALLOC_CTX *frame = talloc_stackframe(); char *domain_name = NULL; struct winbindd_domain *domain = NULL; DEBUG(5, ("wb_irpc_LogonControl called\n")); switch (req->in.function_code) { case NETLOGON_CONTROL_REDISCOVER: case NETLOGON_CONTROL_TC_QUERY: case NETLOGON_CONTROL_CHANGE_PASSWORD: case NETLOGON_CONTROL_TC_VERIFY: if (req->in.data->domain == NULL) { TALLOC_FREE(frame); return NT_STATUS_INVALID_PARAMETER; } domain_name = talloc_strdup(frame, req->in.data->domain); if (domain_name == NULL) { req->out.result = WERR_NOT_ENOUGH_MEMORY; TALLOC_FREE(frame); return NT_STATUS_OK; } break; default: TALLOC_FREE(frame); return NT_STATUS_NOT_IMPLEMENTED; } if (req->in.function_code == NETLOGON_CONTROL_REDISCOVER) { char *p = NULL; /* * NETLOGON_CONTROL_REDISCOVER * get's an optional \dcname appended to the domain name */ p = strchr_m(domain_name, '\\'); if (p != NULL) { *p = '\0'; } } domain = find_domain_from_name_noinit(domain_name); if (domain == NULL) { req->out.result = WERR_NO_SUCH_DOMAIN; TALLOC_FREE(frame); return NT_STATUS_OK; } TALLOC_FREE(frame); return wb_irpc_forward_rpc_call(msg, msg, server_event_context(), req, NDR_WINBIND_LOGONCONTROL, "winbind_LogonControl", domain, 45 /* timeout */); } static NTSTATUS wb_irpc_GetForestTrustInformation(struct irpc_message *msg, struct winbind_GetForestTrustInformation *req) { struct winbindd_domain *domain = NULL; if (req->in.trusted_domain_name == NULL) { req->out.result = WERR_NO_SUCH_DOMAIN; return NT_STATUS_OK; } domain = find_domain_from_name_noinit(req->in.trusted_domain_name); if (domain == NULL) { req->out.result = WERR_NO_SUCH_DOMAIN; return NT_STATUS_OK; } /* * checking for domain->internal and domain->primary * makes sure we only do some work when running as DC. */ if (domain->internal) { req->out.result = WERR_NO_SUCH_DOMAIN; return NT_STATUS_OK; } if (domain->primary) { req->out.result = WERR_NO_SUCH_DOMAIN; return NT_STATUS_OK; } DEBUG(5, ("wb_irpc_GetForestTrustInformation called\n")); return wb_irpc_forward_rpc_call(msg, msg, server_event_context(), req, NDR_WINBIND_GETFORESTTRUSTINFORMATION, "winbind_GetForestTrustInformation", domain, 45 /* timeout */); } static NTSTATUS wb_irpc_SendToSam(struct irpc_message *msg, struct winbind_SendToSam *req) { /* TODO make sure that it is RWDC */ struct winbindd_domain *domain = find_our_domain(); if (domain == NULL) { return NT_STATUS_NO_SUCH_DOMAIN; } DEBUG(5, ("wb_irpc_SendToSam called\n")); return wb_irpc_forward_rpc_call(msg, msg, server_event_context(), req, NDR_WINBIND_SENDTOSAM, "winbind_SendToSam", domain, IRPC_CALL_TIMEOUT); } NTSTATUS wb_irpc_register(void) { NTSTATUS status; status = IRPC_REGISTER(winbind_imessaging_context(), winbind, WINBIND_DSRUPDATEREADONLYSERVERDNSRECORDS, wb_irpc_DsrUpdateReadOnlyServerDnsRecords, NULL); if (!NT_STATUS_IS_OK(status)) { return status; } status = IRPC_REGISTER(winbind_imessaging_context(), winbind, WINBIND_SAMLOGON, wb_irpc_SamLogon, NULL); if (!NT_STATUS_IS_OK(status)) { return status; } status = IRPC_REGISTER(winbind_imessaging_context(), winbind, WINBIND_LOGONCONTROL, wb_irpc_LogonControl, NULL); if (!NT_STATUS_IS_OK(status)) { return status; } status = IRPC_REGISTER(winbind_imessaging_context(), winbind, WINBIND_GETFORESTTRUSTINFORMATION, wb_irpc_GetForestTrustInformation, NULL); if (!NT_STATUS_IS_OK(status)) { return status; } status = IRPC_REGISTER(winbind_imessaging_context(), winbind, WINBIND_SENDTOSAM, wb_irpc_SendToSam, NULL); if (!NT_STATUS_IS_OK(status)) { return status; } return NT_STATUS_OK; }