smbd_join.c revision 1fdeec650620e8498c06f832ea4bd2292f7e9632
/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* or http://www.opensolaris.org/os/licensing.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright (c) 2007, 2010, Oracle and/or its affiliates. All rights reserved.
*/
#include <syslog.h>
#include <synch.h>
#include <pthread.h>
#include <unistd.h>
#include <string.h>
#include <strings.h>
#include <sys/errno.h>
#include <smbsrv/libsmb.h>
#include <smbsrv/libsmbns.h>
#include <smbsrv/libmlsvc.h>
#include <smbsrv/smbinfo.h>
#include "smbd.h"
#define SMBD_DC_MONITOR_ATTEMPTS 3
#define SMBD_DC_MONITOR_RETRY_INTERVAL 3 /* seconds */
#define SMBD_DC_MONITOR_INTERVAL 60 /* seconds */
extern smbd_t smbd;
static void *smbd_dc_monitor(void *);
static void smbd_dc_update(void);
static boolean_t smbd_set_netlogon_cred(void);
static int smbd_get_kpasswd_srv(char *, size_t);
static uint32_t smbd_join_workgroup(smb_joininfo_t *);
static uint32_t smbd_join_domain(smb_joininfo_t *);
/*
* Launch the DC discovery and monitor thread.
*/
int
smbd_dc_monitor_init(void)
{
pthread_attr_t attr;
int rc;
smb_ads_init();
if (smbd.s_secmode != SMB_SECMODE_DOMAIN)
return (0);
(void) pthread_attr_init(&attr);
(void) pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
rc = pthread_create(&smbd.s_dc_monitor_tid, &attr, smbd_dc_monitor,
NULL);
(void) pthread_attr_destroy(&attr);
return (rc);
}
/*ARGSUSED*/
static void *
smbd_dc_monitor(void *arg)
{
boolean_t ds_not_responding = B_FALSE;
int i;
smbd_dc_update();
smbd_online_wait("smbd_dc_monitor");
while (smbd_online()) {
(void) sleep(SMBD_DC_MONITOR_INTERVAL);
for (i = 0; i < SMBD_DC_MONITOR_ATTEMPTS; ++i) {
if (dssetup_check_service() == 0) {
ds_not_responding = B_FALSE;
break;
}
ds_not_responding = B_TRUE;
(void) sleep(SMBD_DC_MONITOR_RETRY_INTERVAL);
}
if (ds_not_responding) {
smb_log(smbd.s_loghd, LOG_NOTICE,
"smbd_dc_monitor: domain service not responding");
smb_ads_refresh();
smbd_dc_update();
}
}
smbd.s_dc_monitor_tid = 0;
return (NULL);
}
/*
* Locate a domain controller in the current resource domain and Update
* the Netlogon credential chain.
*
* The domain configuration will be updated upon successful DC discovery.
*/
static void
smbd_dc_update(void)
{
char domain[MAXHOSTNAMELEN];
smb_domainex_t info;
smb_domain_t *primary;
if (smb_getfqdomainname(domain, MAXHOSTNAMELEN) != 0) {
(void) smb_getdomainname(domain, MAXHOSTNAMELEN);
(void) smb_strupr(domain);
}
if (!smb_locate_dc(domain, "", &info)) {
smb_log(smbd.s_loghd, LOG_NOTICE,
"smbd_dc_update: %s: locate failed", domain);
} else {
primary = &info.d_primary;
smb_config_setdomaininfo(primary->di_nbname,
primary->di_fqname,
primary->di_sid,
primary->di_u.di_dns.ddi_forest,
primary->di_u.di_dns.ddi_guid);
smb_log(smbd.s_loghd, LOG_NOTICE,
"smbd_dc_update: %s: located %s", domain, info.d_dc);
}
if (smbd_set_netlogon_cred()) {
/*
* Restart required because the domain changed
* or the credential chain setup failed.
*/
smb_log(smbd.s_loghd, LOG_NOTICE,
"smbd_dc_update: %s: smb/server restart required");
if (smb_smf_restart_service() != 0)
smb_log(smbd.s_loghd, LOG_ERR,
"restart failed: run 'svcs -xv smb/server'"
" for more information");
}
}
/*
* smbd_join
*
* Joins the specified domain/workgroup.
*
* If the security mode or domain name is being changed,
* the caller must restart the service.
*/
uint32_t
smbd_join(smb_joininfo_t *info)
{
uint32_t status;
dssetup_clear_domain_info();
if (info->mode == SMB_SECMODE_WORKGRP)
status = smbd_join_workgroup(info);
else
status = smbd_join_domain(info);
return (status);
}
/*
* smbd_set_netlogon_cred
*
* If the system is joined to an AD domain via kclient, SMB daemon will need
* to establish the NETLOGON credential chain.
*
* Since the kclient has updated the machine password stored in SMF
* repository, the cached ipc_info must be updated accordingly by calling
* smb_ipc_commit.
*
* Due to potential replication delays in a multiple DC environment, the
* NETLOGON rpc request must be sent to the DC, to which the KPASSWD request
* is sent. If the DC discovered by the SMB daemon is different than the
* kpasswd server, the current connection with the DC will be torn down
* and a DC discovery process will be triggered to locate the kpasswd
* server.
*
* If joining a new domain, the domain_name property must be set after a
* successful credential chain setup.
*/
static boolean_t
smbd_set_netlogon_cred(void)
{
char kpasswd_srv[MAXHOSTNAMELEN];
char kpasswd_domain[MAXHOSTNAMELEN];
char sam_acct[SMB_SAMACCT_MAXLEN];
char ipc_usr[SMB_USERNAME_MAXLEN];
char *dom;
boolean_t new_domain = B_FALSE;
smb_domainex_t dxi;
smb_domain_t *di;
if (smb_match_netlogon_seqnum())
return (B_FALSE);
(void) smb_config_getstr(SMB_CI_KPASSWD_SRV, kpasswd_srv,
sizeof (kpasswd_srv));
if (*kpasswd_srv == '\0')
return (B_FALSE);
/*
* If the domain join initiated by smbadm join CLI is in
* progress, don't do anything.
*/
(void) smb_getsamaccount(sam_acct, sizeof (sam_acct));
smb_ipc_get_user(ipc_usr, SMB_USERNAME_MAXLEN);
if (smb_strcasecmp(ipc_usr, sam_acct, 0))
return (B_FALSE);
di = &dxi.d_primary;
if (!smb_domain_getinfo(&dxi))
(void) smb_getfqdomainname(di->di_fqname, MAXHOSTNAMELEN);
(void) smb_config_getstr(SMB_CI_KPASSWD_DOMAIN, kpasswd_domain,
sizeof (kpasswd_domain));
if (*kpasswd_domain != '\0' &&
smb_strcasecmp(kpasswd_domain, di->di_fqname, 0)) {
dom = kpasswd_domain;
new_domain = B_TRUE;
} else {
dom = di->di_fqname;
}
/*
* DC discovery will be triggered if the domain info is not
* currently cached or the SMB daemon has previously discovered a DC
* that is different than the kpasswd server.
*/
if (new_domain || smb_strcasecmp(dxi.d_dc, kpasswd_srv, 0) != 0) {
if (*dxi.d_dc != '\0')
mlsvc_disconnect(dxi.d_dc);
if (!smb_locate_dc(dom, kpasswd_srv, &dxi)) {
if (!smb_locate_dc(di->di_fqname, "", &dxi)) {
smb_ipc_commit();
return (B_FALSE);
}
}
}
smb_ipc_commit();
if (mlsvc_netlogon(dxi.d_dc, di->di_nbname)) {
syslog(LOG_NOTICE,
"failed to establish NETLOGON credential chain");
return (B_TRUE);
} else {
if (new_domain) {
smb_config_setdomaininfo(di->di_nbname, di->di_fqname,
di->di_sid,
di->di_u.di_dns.ddi_forest,
di->di_u.di_dns.ddi_guid);
(void) smb_config_setstr(SMB_CI_KPASSWD_DOMAIN, "");
}
}
return (new_domain);
}
/*
* Retrieve the kpasswd server from krb5.conf.
*
* Initialization of the locate dc thread.
* Returns 0 on success, an error number if thread creation fails.
*/
static int
smbd_get_kpasswd_srv(char *srv, size_t len)
{
FILE *fp;
static char buf[512];
char *p;
*srv = '\0';
p = getenv("KRB5_CONFIG");
if (p == NULL || *p == '\0')
p = "/etc/krb5/krb5.conf";
if ((fp = fopen(p, "r")) == NULL)
return (-1);
while (fgets(buf, sizeof (buf), fp)) {
/* Weed out any comment text */
(void) trim_whitespace(buf);
if (*buf == '#')
continue;
if ((p = strstr(buf, "kpasswd_server")) != NULL) {
if ((p = strchr(p, '=')) != NULL) {
(void) trim_whitespace(++p);
(void) strlcpy(srv, p, len);
}
break;
}
}
(void) fclose(fp);
return ((*srv == '\0') ? -1 : 0);
}
static uint32_t
smbd_join_workgroup(smb_joininfo_t *info)
{
char nb_domain[SMB_PI_MAX_DOMAIN];
(void) smb_config_getstr(SMB_CI_DOMAIN_NAME, nb_domain,
sizeof (nb_domain));
smbd_set_secmode(SMB_SECMODE_WORKGRP);
smb_config_setdomaininfo(info->domain_name, "", "", "", "");
if (strcasecmp(nb_domain, info->domain_name))
smb_browser_reconfig();
return (NT_STATUS_SUCCESS);
}
static uint32_t
smbd_join_domain(smb_joininfo_t *info)
{
uint32_t status;
unsigned char passwd_hash[SMBAUTH_HASH_SZ];
char dc[MAXHOSTNAMELEN];
smb_domainex_t dxi;
smb_domain_t *di;
/*
* Ensure that any previous membership of this domain has
* been cleared from the environment before we start. This
* will ensure that we don't attempt a NETLOGON_SAMLOGON
* when attempting to find the PDC.
*/
(void) smb_config_setbool(SMB_CI_DOMAIN_MEMB, B_FALSE);
if (smb_auth_ntlm_hash(info->domain_passwd, passwd_hash)
!= SMBAUTH_SUCCESS) {
syslog(LOG_ERR, "smbd: could not compute ntlm hash for '%s'",
info->domain_username);
return (NT_STATUS_INTERNAL_ERROR);
}
smb_ipc_set(info->domain_username, passwd_hash);
(void) smbd_get_kpasswd_srv(dc, sizeof (dc));
/* info->domain_name could either be NetBIOS domain name or FQDN */
if (smb_locate_dc(info->domain_name, dc, &dxi)) {
status = mlsvc_join(&dxi, info->domain_username,
info->domain_passwd);
if (status == NT_STATUS_SUCCESS) {
di = &dxi.d_primary;
smbd_set_secmode(SMB_SECMODE_DOMAIN);
smb_config_setdomaininfo(di->di_nbname, di->di_fqname,
di->di_sid,
di->di_u.di_dns.ddi_forest,
di->di_u.di_dns.ddi_guid);
smb_ipc_commit();
return (status);
}
smb_ipc_rollback();
syslog(LOG_ERR, "smbd: failed joining %s (%s)",
info->domain_name, xlate_nt_status(status));
return (status);
}
smb_ipc_rollback();
syslog(LOG_ERR, "smbd: failed locating domain controller for %s",
info->domain_name);
return (NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND);
}