2 Samba Unix/Linux SMB client library
3 net ads cldap functions
4 Copyright (C) 2001 Andrew Tridgell (tridge@samba.org)
5 Copyright (C) 2003 Jim McDonough (jmcd@us.ibm.com)
6 Copyright (C) 2008 Guenther Deschner (gd@samba.org)
7 Copyright (C) 2009 Stefan Metzmacher (metze@samba.org)
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
24 #include "../libcli/cldap/cldap.h"
25 #include "../librpc/gen_ndr/ndr_netlogon.h"
26 #include "../lib/tsocket/tsocket.h"
27 #include "../lib/util/tevent_ntstatus.h"
28 #include "libads/cldap.h"
30 struct cldap_multi_netlogon_state
{
31 struct tevent_context
*ev
;
32 const struct tsocket_address
* const *servers
;
39 struct cldap_socket
**cldap
;
40 struct tevent_req
**subreqs
;
43 int num_good_received
;
44 struct cldap_netlogon
*ios
;
45 struct netlogon_samlogon_response
**responses
;
48 static void cldap_multi_netlogon_done(struct tevent_req
*subreq
);
49 static void cldap_multi_netlogon_next(struct tevent_req
*subreq
);
51 /****************************************************************
52 ****************************************************************/
54 #define RETURN_ON_FALSE(x) if (!(x)) return false;
56 bool check_cldap_reply_required_flags(uint32_t ret_flags
,
63 if (req_flags
& DS_PDC_REQUIRED
)
64 RETURN_ON_FALSE(ret_flags
& NBT_SERVER_PDC
);
66 if (req_flags
& DS_GC_SERVER_REQUIRED
)
67 RETURN_ON_FALSE(ret_flags
& NBT_SERVER_GC
);
69 if (req_flags
& DS_ONLY_LDAP_NEEDED
)
70 RETURN_ON_FALSE(ret_flags
& NBT_SERVER_LDAP
);
72 if ((req_flags
& DS_DIRECTORY_SERVICE_REQUIRED
) ||
73 (req_flags
& DS_DIRECTORY_SERVICE_PREFERRED
))
74 RETURN_ON_FALSE(ret_flags
& NBT_SERVER_DS
);
76 if (req_flags
& DS_KDC_REQUIRED
)
77 RETURN_ON_FALSE(ret_flags
& NBT_SERVER_KDC
);
79 if (req_flags
& DS_TIMESERV_REQUIRED
)
80 RETURN_ON_FALSE(ret_flags
& NBT_SERVER_TIMESERV
);
82 if (req_flags
& DS_WEB_SERVICE_REQUIRED
)
83 RETURN_ON_FALSE(ret_flags
& NBT_SERVER_ADS_WEB_SERVICE
);
85 if (req_flags
& DS_WRITABLE_REQUIRED
)
86 RETURN_ON_FALSE(ret_flags
& NBT_SERVER_WRITABLE
);
88 if (req_flags
& DS_DIRECTORY_SERVICE_6_REQUIRED
)
89 RETURN_ON_FALSE(ret_flags
& (NBT_SERVER_SELECT_SECRET_DOMAIN_6
90 |NBT_SERVER_FULL_SECRET_DOMAIN_6
));
92 if (req_flags
& DS_DIRECTORY_SERVICE_8_REQUIRED
)
93 RETURN_ON_FALSE(ret_flags
& NBT_SERVER_DS_8
);
95 if (req_flags
& DS_DIRECTORY_SERVICE_9_REQUIRED
)
96 RETURN_ON_FALSE(ret_flags
& NBT_SERVER_DS_9
);
98 if (req_flags
& DS_DIRECTORY_SERVICE_10_REQUIRED
)
99 RETURN_ON_FALSE(ret_flags
& NBT_SERVER_DS_10
);
105 * Do a parallel cldap ping to the servers. The first "min_servers"
106 * are fired directly, the remaining ones in 100msec intervals. If
107 * "min_servers" responses came in successfully, we immediately reply,
108 * not waiting for the remaining ones.
111 struct tevent_req
*cldap_multi_netlogon_send(
112 TALLOC_CTX
*mem_ctx
, struct tevent_context
*ev
,
113 const struct tsocket_address
* const *servers
, int num_servers
,
114 const char *domain
, const char *hostname
, unsigned ntversion
,
117 struct tevent_req
*req
, *subreq
;
118 struct cldap_multi_netlogon_state
*state
;
121 req
= tevent_req_create(mem_ctx
, &state
,
122 struct cldap_multi_netlogon_state
);
127 state
->servers
= servers
;
128 state
->num_servers
= num_servers
;
129 state
->domain
= domain
;
130 state
->hostname
= hostname
;
131 state
->ntversion
= ntversion
;
132 state
->min_servers
= min_servers
;
134 if (min_servers
> num_servers
) {
135 tevent_req_nterror(req
, NT_STATUS_INVALID_PARAMETER
);
136 return tevent_req_post(req
, ev
);
139 state
->subreqs
= talloc_zero_array(state
,
142 if (tevent_req_nomem(state
->subreqs
, req
)) {
143 return tevent_req_post(req
, ev
);
146 state
->cldap
= talloc_zero_array(state
,
147 struct cldap_socket
*,
149 if (tevent_req_nomem(state
->cldap
, req
)) {
150 return tevent_req_post(req
, ev
);
153 state
->responses
= talloc_zero_array(state
,
154 struct netlogon_samlogon_response
*,
156 if (tevent_req_nomem(state
->responses
, req
)) {
157 return tevent_req_post(req
, ev
);
160 state
->ios
= talloc_array(state
->responses
,
161 struct cldap_netlogon
,
163 if (tevent_req_nomem(state
->ios
, req
)) {
164 return tevent_req_post(req
, ev
);
167 for (i
=0; i
<num_servers
; i
++) {
170 status
= cldap_socket_init(state
->cldap
,
171 NULL
, /* local_addr */
174 if (!NT_STATUS_IS_OK(status
)) {
176 * Don't error out all sends just
177 * because one cldap_socket_init() failed.
178 * Log it here, and the cldap_netlogon_send()
179 * will catch it (with in.dest_address == NULL)
180 * and correctly error out in
181 * cldap_multi_netlogon_done(). This still allows
182 * the other requests to be concurrently sent.
184 DBG_NOTICE("cldap_socket_init failed for %s "
186 tsocket_address_string(state
->servers
[i
],
191 state
->ios
[i
] = (struct cldap_netlogon
){
192 .in
.realm
= domain
, .in
.version
= ntversion
};
195 for (i
=0; i
<min_servers
; i
++) {
196 state
->subreqs
[i
] = cldap_netlogon_send(state
->subreqs
,
200 if (tevent_req_nomem(state
->subreqs
[i
], req
)) {
201 return tevent_req_post(req
, ev
);
203 tevent_req_set_callback(
204 state
->subreqs
[i
], cldap_multi_netlogon_done
, req
);
206 state
->num_sent
= min_servers
;
208 if (state
->num_sent
< state
->num_servers
) {
210 * After 100 milliseconds fire the next one
212 subreq
= tevent_wakeup_send(state
, state
->ev
,
213 timeval_current_ofs(0, 100000));
214 if (tevent_req_nomem(subreq
, req
)) {
215 return tevent_req_post(req
, ev
);
217 tevent_req_set_callback(subreq
, cldap_multi_netlogon_next
,
224 static void cldap_multi_netlogon_done(struct tevent_req
*subreq
)
226 struct tevent_req
*req
= tevent_req_callback_data(
227 subreq
, struct tevent_req
);
228 struct cldap_multi_netlogon_state
*state
= tevent_req_data(
229 req
, struct cldap_multi_netlogon_state
);
231 struct netlogon_samlogon_response
*response
= NULL
;
234 for (i
=0; i
<state
->num_sent
; i
++) {
235 if (state
->subreqs
[i
] == subreq
) {
239 if (i
== state
->num_sent
) {
241 * Got a response we did not fire...
243 tevent_req_nterror(req
, NT_STATUS_INTERNAL_ERROR
);
246 state
->subreqs
[i
] = NULL
;
248 response
= talloc_zero(state
, struct netlogon_samlogon_response
);
249 if (tevent_req_nomem(response
, req
)) {
253 status
= cldap_netlogon_recv(subreq
, response
,
256 state
->num_received
+= 1;
258 if (NT_STATUS_IS_OK(status
)) {
259 *response
= state
->ios
[i
].out
.netlogon
;
260 state
->responses
[i
] = talloc_move(state
->responses
,
262 state
->num_good_received
+= 1;
265 if ((state
->num_received
== state
->num_servers
) ||
266 (state
->num_good_received
>= state
->min_servers
)) {
267 tevent_req_done(req
);
272 static void cldap_multi_netlogon_next(struct tevent_req
*subreq
)
274 struct tevent_req
*req
= tevent_req_callback_data(
275 subreq
, struct tevent_req
);
276 struct cldap_multi_netlogon_state
*state
= tevent_req_data(
277 req
, struct cldap_multi_netlogon_state
);
280 ret
= tevent_wakeup_recv(subreq
);
283 tevent_req_nterror(req
, NT_STATUS_INTERNAL_ERROR
);
287 subreq
= cldap_netlogon_send(state
->subreqs
,
289 state
->cldap
[state
->num_sent
],
290 &state
->ios
[state
->num_sent
]);
291 if (tevent_req_nomem(subreq
, req
)) {
294 tevent_req_set_callback(subreq
, cldap_multi_netlogon_done
, req
);
295 state
->subreqs
[state
->num_sent
] = subreq
;
296 state
->num_sent
+= 1;
298 if (state
->num_sent
< state
->num_servers
) {
300 * After 100 milliseconds fire the next one
302 subreq
= tevent_wakeup_send(state
, state
->ev
,
303 timeval_current_ofs(0, 100000));
304 if (tevent_req_nomem(subreq
, req
)) {
307 tevent_req_set_callback(subreq
, cldap_multi_netlogon_next
,
312 NTSTATUS
cldap_multi_netlogon_recv(
313 struct tevent_req
*req
, TALLOC_CTX
*mem_ctx
,
314 struct netlogon_samlogon_response
***responses
)
316 struct cldap_multi_netlogon_state
*state
= tevent_req_data(
317 req
, struct cldap_multi_netlogon_state
);
320 if (tevent_req_is_nterror(req
, &status
) &&
321 !NT_STATUS_EQUAL(status
, NT_STATUS_IO_TIMEOUT
)) {
325 * If we timeout, give back what we have so far
327 *responses
= talloc_move(mem_ctx
, &state
->responses
);
331 NTSTATUS
cldap_multi_netlogon(
333 const struct tsocket_address
* const *servers
,
335 const char *domain
, const char *hostname
, unsigned ntversion
,
336 int min_servers
, struct timeval timeout
,
337 struct netlogon_samlogon_response
***responses
)
339 struct tevent_context
*ev
;
340 struct tevent_req
*req
;
341 NTSTATUS status
= NT_STATUS_NO_MEMORY
;
343 ev
= samba_tevent_context_init(talloc_tos());
347 req
= cldap_multi_netlogon_send(
348 ev
, ev
, servers
, num_servers
, domain
, hostname
, ntversion
,
353 if (!tevent_req_set_endtime(req
, ev
, timeout
)) {
356 if (!tevent_req_poll_ntstatus(req
, ev
, &status
)) {
359 status
= cldap_multi_netlogon_recv(req
, mem_ctx
, responses
);
365 /*******************************************************************
366 do a cldap netlogon query. Always 389/udp
367 *******************************************************************/
369 bool ads_cldap_netlogon(TALLOC_CTX
*mem_ctx
,
370 struct sockaddr_storage
*ss
,
373 struct netlogon_samlogon_response
**_reply
)
376 char addrstr
[INET6_ADDRSTRLEN
];
377 const char *dest_str
;
378 struct tsocket_address
*dest_addr
;
379 const struct tsocket_address
* const *dest_addrs
;
380 struct netlogon_samlogon_response
**responses
= NULL
;
383 dest_str
= print_sockaddr(addrstr
, sizeof(addrstr
), ss
);
385 ret
= tsocket_address_inet_from_strings(mem_ctx
, "ip",
389 status
= map_nt_error_from_unix(errno
);
390 DEBUG(2,("Failed to create cldap tsocket_address for %s - %s\n",
391 dest_str
, nt_errstr(status
)));
395 dest_addrs
= (const struct tsocket_address
* const *)&dest_addr
;
397 status
= cldap_multi_netlogon(talloc_tos(),
401 timeval_current_ofs(MAX(3,lp_ldap_timeout()/2), 0),
403 if (!NT_STATUS_IS_OK(status
)) {
404 DBG_NOTICE("cldap_multi_netlogon failed: %s\n",
408 if (responses
== NULL
|| responses
[0] == NULL
) {
409 DBG_NOTICE("did not get a reply\n");
410 TALLOC_FREE(responses
);
413 *_reply
= talloc_move(mem_ctx
, &responses
[0]);
418 /*******************************************************************
419 do a cldap netlogon query. Always 389/udp
420 *******************************************************************/
422 bool ads_cldap_netlogon_5(TALLOC_CTX
*mem_ctx
,
423 struct sockaddr_storage
*ss
,
425 struct NETLOGON_SAM_LOGON_RESPONSE_EX
*reply5
)
427 uint32_t nt_version
= NETLOGON_NT_VERSION_5
| NETLOGON_NT_VERSION_5EX
;
428 struct netlogon_samlogon_response
*reply
= NULL
;
431 ret
= ads_cldap_netlogon(mem_ctx
, ss
, realm
, nt_version
, &reply
);
436 if (reply
->ntver
!= NETLOGON_NT_VERSION_5EX
) {
437 DEBUG(0,("ads_cldap_netlogon_5: nt_version mismatch: 0x%08x\n",
442 *reply5
= reply
->data
.nt5_ex
;