2 Unix SMB/CIFS implementation.
4 Winbind daemon for ntdom nss module
6 Copyright (C) Tim Potter 2000
7 Copyright (C) Jim McDonough <jmcd@us.ibm.com> 2003
9 This library is free software; you can redistribute it and/or
10 modify it under the terms of the GNU Lesser General Public
11 License as published by the Free Software Foundation; either
12 version 3 of the License, or (at your option) any later version.
14 This library is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 Library General Public License for more details.
19 You should have received a copy of the GNU Lesser General Public License
20 along with this program. If not, see <http://www.gnu.org/licenses/>.
26 #include "nsswitch/winbind_struct_protocol.h"
27 #include "nsswitch/libwbclient/wbclient.h"
28 #include "librpc/gen_ndr/dcerpc.h"
29 #include "librpc/gen_ndr/winbind.h"
31 #include "../lib/util/tevent_ntstatus.h"
37 #ifdef HAVE_SYS_MMAN_H
42 #define DBGC_CLASS DBGC_WINBIND
44 #define WB_REPLACE_CHAR '_'
46 struct winbind_internal_pipes
;
49 struct winbindd_cli_state
{
50 struct winbindd_cli_state
*prev
, *next
; /* Linked list pointers */
51 int sock
; /* Open socket from client */
52 pid_t pid
; /* pid of client */
53 char client_name
[32]; /* The process name of the client */
54 time_t last_access
; /* Time of last access (read or write) */
55 bool privileged
; /* Is the client 'privileged' */
57 TALLOC_CTX
*mem_ctx
; /* memory per request */
59 NTSTATUS (*recv_fn
)(struct tevent_req
*req
,
60 struct winbindd_response
*presp
);
61 struct winbindd_request
*request
; /* Request from client */
62 struct tevent_queue
*out_queue
;
63 struct winbindd_response
*response
; /* Response to client */
64 struct tevent_req
*io_req
; /* wb_req_read_* or wb_resp_write_* */
66 struct getpwent_state
*pwent_state
; /* State for getpwent() */
67 struct getgrent_state
*grent_state
; /* State for getgrent() */
70 struct getpwent_state
{
71 struct winbindd_domain
*domain
;
73 struct wbint_RidArray rids
;
76 struct getgrent_state
{
77 struct winbindd_domain
*domain
;
80 struct wbint_Principal
*groups
;
83 /* Our connection to the DC */
85 struct winbindd_cm_conn
{
86 struct cli_state
*cli
;
88 enum dcerpc_AuthLevel auth_level
;
90 struct rpc_pipe_client
*samr_pipe
;
91 struct policy_handle sam_connect_handle
, sam_domain_handle
;
93 struct rpc_pipe_client
*lsa_pipe
;
94 struct rpc_pipe_client
*lsa_pipe_tcp
;
95 struct policy_handle lsa_policy
;
97 struct rpc_pipe_client
*netlogon_pipe
;
98 struct netlogon_creds_cli_context
*netlogon_creds_ctx
;
99 bool netlogon_force_reauth
;
104 struct winbindd_domain
;
106 struct winbindd_child
{
108 struct winbindd_domain
*domain
;
112 struct tevent_fd
*monitor_fde
; /* Watch for dead children/sockets */
113 struct tevent_queue
*queue
;
114 struct dcerpc_binding_handle
*binding_handle
;
116 struct tevent_timer
*lockout_policy_event
;
117 struct tevent_timer
*machine_password_change_event
;
120 /* Structures to hold per domain information */
122 struct winbindd_domain
{
123 char *name
; /* Domain name (NetBIOS) */
124 char *alt_name
; /* alt Domain name, if any (FQDN for ADS) */
125 char *forest_name
; /* Name of the AD forest we're in */
126 struct dom_sid sid
; /* SID for this domain */
127 enum netr_SchannelType secure_channel_type
;
128 uint32_t domain_flags
; /* Domain flags from netlogon.h */
129 uint32_t domain_type
; /* Domain type from netlogon.h */
130 uint32_t domain_trust_attribs
; /* Trust attribs from netlogon.h */
131 struct winbindd_domain
*routing_domain
;
132 bool initialized
; /* Did we already ask for the domain mode? */
133 bool active_directory
; /* is this a win2k active directory ? */
134 bool primary
; /* is this our primary domain ? */
135 bool internal
; /* BUILTIN and member SAM */
136 bool rodc
; /* Are we an RODC for this AD domain? (do some operations locally) */
137 bool online
; /* is this domain available ? */
138 time_t startup_time
; /* When we set "startup" true. monotonic clock */
139 bool startup
; /* are we in the first 30 seconds after startup_time ? */
141 bool can_do_ncacn_ip_tcp
;
144 * Lookup methods for this domain (LDAP or RPC). The backend
145 * methods are used by the cache layer.
147 struct winbindd_methods
*backend
;
150 struct winbind_internal_pipes
*samr_pipes
;
151 struct ads_struct
*ads_conn
;
157 const char *ping_dcname
;
158 struct sockaddr_storage dcaddr
;
160 /* Sequence number stuff */
162 time_t last_seq_check
;
163 uint32_t sequence_number
;
164 NTSTATUS last_status
;
166 /* The smb connection */
168 struct winbindd_cm_conn conn
;
170 /* The child pid we're talking to */
172 struct winbindd_child
*children
;
174 struct tevent_queue
*queue
;
175 struct dcerpc_binding_handle
*binding_handle
;
177 struct tevent_req
*check_online_event
;
179 /* Linked list info */
181 struct winbindd_domain
*prev
, *next
;
184 struct wb_parent_idmap_config_dom
{
191 struct wb_parent_idmap_config
{
192 struct tevent_queue
*queue
;
195 struct wb_parent_idmap_config_dom
*doms
;
198 struct wb_acct_info
{
199 const char *acct_name
; /* account name */
200 const char *acct_desc
; /* account name */
201 uint32_t rid
; /* domain-relative RID */
204 /* per-domain methods. This is how LDAP vs RPC is selected
206 struct winbindd_methods
{
207 /* does this backend provide a consistent view of the data? (ie. is the primary group
211 /* get a list of users, returning a wbint_userinfo for each one */
212 NTSTATUS (*query_user_list
)(struct winbindd_domain
*domain
,
216 /* get a list of domain groups */
217 NTSTATUS (*enum_dom_groups
)(struct winbindd_domain
*domain
,
219 uint32_t *num_entries
,
220 struct wb_acct_info
**info
);
222 /* get a list of domain local groups */
223 NTSTATUS (*enum_local_groups
)(struct winbindd_domain
*domain
,
225 uint32_t *num_entries
,
226 struct wb_acct_info
**info
);
228 /* convert one user or group name to a sid */
229 NTSTATUS (*name_to_sid
)(struct winbindd_domain
*domain
,
231 const char *domain_name
,
234 const char **pdom_name
,
236 enum lsa_SidType
*type
);
238 /* convert a sid to a user or group name */
239 NTSTATUS (*sid_to_name
)(struct winbindd_domain
*domain
,
241 const struct dom_sid
*sid
,
244 enum lsa_SidType
*type
);
246 NTSTATUS (*rids_to_names
)(struct winbindd_domain
*domain
,
248 const struct dom_sid
*domain_sid
,
253 enum lsa_SidType
**types
);
255 /* lookup all groups that a user is a member of. The backend
256 can also choose to lookup by username or rid for this
258 NTSTATUS (*lookup_usergroups
)(struct winbindd_domain
*domain
,
260 const struct dom_sid
*user_sid
,
261 uint32_t *num_groups
, struct dom_sid
**user_gids
);
263 /* Lookup all aliases that the sids delivered are member of. This is
264 * to implement 'domain local groups' correctly */
265 NTSTATUS (*lookup_useraliases
)(struct winbindd_domain
*domain
,
268 const struct dom_sid
*sids
,
269 uint32_t *num_aliases
,
270 uint32_t **alias_rids
);
272 /* find all members of the group with the specified group_rid */
273 NTSTATUS (*lookup_groupmem
)(struct winbindd_domain
*domain
,
275 const struct dom_sid
*group_sid
,
276 enum lsa_SidType type
,
278 struct dom_sid
**sid_mem
, char ***names
,
279 uint32_t **name_types
);
281 /* find all members of the alias with the specified alias_sid */
282 NTSTATUS (*lookup_aliasmem
)(struct winbindd_domain
*domain
,
284 const struct dom_sid
*alias_sid
,
285 enum lsa_SidType type
,
287 struct dom_sid
**sid_mem
);
289 /* return the lockout policy */
290 NTSTATUS (*lockout_policy
)(struct winbindd_domain
*domain
,
292 struct samr_DomInfo12
*lockout_policy
);
294 /* return the lockout policy */
295 NTSTATUS (*password_policy
)(struct winbindd_domain
*domain
,
297 struct samr_DomInfo1
*password_policy
);
299 /* enumerate trusted domains */
300 NTSTATUS (*trusted_domains
)(struct winbindd_domain
*domain
,
302 struct netr_DomainTrustList
*trusts
);
305 /* Filled out by IDMAP backends */
306 struct winbindd_idmap_methods
{
307 /* Called when backend is first loaded */
310 bool (*get_sid_from_uid
)(uid_t uid
, struct dom_sid
*sid
);
311 bool (*get_sid_from_gid
)(gid_t gid
, struct dom_sid
*sid
);
313 bool (*get_uid_from_sid
)(struct dom_sid
*sid
, uid_t
*uid
);
314 bool (*get_gid_from_sid
)(struct dom_sid
*sid
, gid_t
*gid
);
316 /* Called when backend is unloaded */
318 /* Called to dump backend status */
319 void (*status
)(void);
322 /* Data structures for dealing with the trusted domain cache */
324 struct winbindd_tdc_domain
{
325 const char *domain_name
;
326 const char *dns_name
;
328 uint32_t trust_flags
;
329 uint32_t trust_attribs
;
333 struct WINBINDD_MEMORY_CREDS
{
334 struct WINBINDD_MEMORY_CREDS
*next
, *prev
;
335 const char *username
; /* lookup key. */
339 uint8_t *nt_hash
; /* Base pointer for the following 2 */
344 struct WINBINDD_CCACHE_ENTRY
{
345 struct WINBINDD_CCACHE_ENTRY
*next
, *prev
;
346 const char *principal_name
;
349 const char *username
;
351 const char *canon_principal
;
352 const char *canon_realm
;
353 struct WINBINDD_MEMORY_CREDS
*cred_ptr
;
359 struct tevent_timer
*event
;
362 #include "winbindd/winbindd_proto.h"
364 #define WINBINDD_ESTABLISH_LOOP 30
365 #define WINBINDD_RESCAN_FREQ lp_winbind_cache_time()
366 #define WINBINDD_PAM_AUTH_KRB5_RENEW_TIME 2592000 /* one month */
367 #define DOM_SEQUENCE_NONE ((uint32_t)-1)
369 #endif /* _WINBINDD_H */