| 1 | /* | 
|---|
| 2 | Unix SMB/CIFS implementation. | 
|---|
| 3 | client connect/disconnect routines | 
|---|
| 4 | Copyright (C) Andrew Tridgell                  1994-1998 | 
|---|
| 5 | Copyright (C) Gerald (Jerry) Carter            2004 | 
|---|
| 6 | Copyright (C) Jeremy Allison                   2007 | 
|---|
| 7 |  | 
|---|
| 8 | This program is free software; you can redistribute it and/or modify | 
|---|
| 9 | it under the terms of the GNU General Public License as published by | 
|---|
| 10 | the Free Software Foundation; either version 2 of the License, or | 
|---|
| 11 | (at your option) any later version. | 
|---|
| 12 |  | 
|---|
| 13 | This program is distributed in the hope that it will be useful, | 
|---|
| 14 | but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|---|
| 15 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
|---|
| 16 | GNU General Public License for more details. | 
|---|
| 17 |  | 
|---|
| 18 | You should have received a copy of the GNU General Public License | 
|---|
| 19 | along with this program; if not, write to the Free Software | 
|---|
| 20 | Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. | 
|---|
| 21 | */ | 
|---|
| 22 |  | 
|---|
| 23 | #include "includes.h" | 
|---|
| 24 |  | 
|---|
| 25 | /******************************************************************** | 
|---|
| 26 | Important point. | 
|---|
| 27 |  | 
|---|
| 28 | DFS paths are *always* of the form \server\share\<pathname> (the \ characters | 
|---|
| 29 | are not C escaped here). | 
|---|
| 30 |  | 
|---|
| 31 | - but if we're using POSIX paths then <pathname> may contain | 
|---|
| 32 | '/' separators, not '\\' separators. So cope with '\\' or '/' | 
|---|
| 33 | as a separator when looking at the pathname part.... JRA. | 
|---|
| 34 | ********************************************************************/ | 
|---|
| 35 |  | 
|---|
| 36 | struct client_connection { | 
|---|
| 37 | struct client_connection *prev, *next; | 
|---|
| 38 | struct cli_state *cli; | 
|---|
| 39 | pstring mount; | 
|---|
| 40 | }; | 
|---|
| 41 |  | 
|---|
| 42 | /* global state....globals reek! */ | 
|---|
| 43 |  | 
|---|
| 44 | static pstring username; | 
|---|
| 45 | static pstring password; | 
|---|
| 46 | static BOOL use_kerberos; | 
|---|
| 47 | static BOOL got_pass; | 
|---|
| 48 | static int signing_state; | 
|---|
| 49 | int max_protocol = PROTOCOL_NT1; | 
|---|
| 50 |  | 
|---|
| 51 | static int port; | 
|---|
| 52 | static int name_type = 0x20; | 
|---|
| 53 | static BOOL have_ip; | 
|---|
| 54 | static struct in_addr dest_ip; | 
|---|
| 55 |  | 
|---|
| 56 | static struct client_connection *connections; | 
|---|
| 57 |  | 
|---|
| 58 | /******************************************************************** | 
|---|
| 59 | Return a connection to a server. | 
|---|
| 60 | ********************************************************************/ | 
|---|
| 61 |  | 
|---|
| 62 | static struct cli_state *do_connect( const char *server, const char *share, | 
|---|
| 63 | BOOL show_sessetup ) | 
|---|
| 64 | { | 
|---|
| 65 | struct cli_state *c = NULL; | 
|---|
| 66 | struct nmb_name called, calling; | 
|---|
| 67 | const char *server_n; | 
|---|
| 68 | struct in_addr ip; | 
|---|
| 69 | pstring servicename; | 
|---|
| 70 | char *sharename; | 
|---|
| 71 | fstring newserver, newshare; | 
|---|
| 72 | NTSTATUS status; | 
|---|
| 73 |  | 
|---|
| 74 | /* make a copy so we don't modify the global string 'service' */ | 
|---|
| 75 | pstrcpy(servicename, share); | 
|---|
| 76 | sharename = servicename; | 
|---|
| 77 | if (*sharename == '\\') { | 
|---|
| 78 | server = sharename+2; | 
|---|
| 79 | sharename = strchr_m(server,'\\'); | 
|---|
| 80 | if (!sharename) return NULL; | 
|---|
| 81 | *sharename = 0; | 
|---|
| 82 | sharename++; | 
|---|
| 83 | } | 
|---|
| 84 |  | 
|---|
| 85 | server_n = server; | 
|---|
| 86 |  | 
|---|
| 87 | zero_ip(&ip); | 
|---|
| 88 |  | 
|---|
| 89 | make_nmb_name(&calling, global_myname(), 0x0); | 
|---|
| 90 | make_nmb_name(&called , server, name_type); | 
|---|
| 91 |  | 
|---|
| 92 | again: | 
|---|
| 93 | zero_ip(&ip); | 
|---|
| 94 | if (have_ip) | 
|---|
| 95 | ip = dest_ip; | 
|---|
| 96 |  | 
|---|
| 97 | /* have to open a new connection */ | 
|---|
| 98 | if (!(c=cli_initialise()) || (cli_set_port(c, port) != port)) { | 
|---|
| 99 | d_printf("Connection to %s failed\n", server_n); | 
|---|
| 100 | return NULL; | 
|---|
| 101 | } | 
|---|
| 102 | status = cli_connect(c, server_n, &ip); | 
|---|
| 103 | if (!NT_STATUS_IS_OK(status)) { | 
|---|
| 104 | d_printf("Connection to %s failed (Error %s)\n", server_n, nt_errstr(status)); | 
|---|
| 105 | return NULL; | 
|---|
| 106 | } | 
|---|
| 107 |  | 
|---|
| 108 | c->protocol = max_protocol; | 
|---|
| 109 | c->use_kerberos = use_kerberos; | 
|---|
| 110 | cli_setup_signing_state(c, signing_state); | 
|---|
| 111 |  | 
|---|
| 112 |  | 
|---|
| 113 | if (!cli_session_request(c, &calling, &called)) { | 
|---|
| 114 | char *p; | 
|---|
| 115 | d_printf("session request to %s failed (%s)\n", | 
|---|
| 116 | called.name, cli_errstr(c)); | 
|---|
| 117 | cli_shutdown(c); | 
|---|
| 118 | c = NULL; | 
|---|
| 119 | if ((p=strchr_m(called.name, '.'))) { | 
|---|
| 120 | *p = 0; | 
|---|
| 121 | goto again; | 
|---|
| 122 | } | 
|---|
| 123 | if (strcmp(called.name, "*SMBSERVER")) { | 
|---|
| 124 | make_nmb_name(&called , "*SMBSERVER", 0x20); | 
|---|
| 125 | goto again; | 
|---|
| 126 | } | 
|---|
| 127 | return NULL; | 
|---|
| 128 | } | 
|---|
| 129 |  | 
|---|
| 130 | DEBUG(4,(" session request ok\n")); | 
|---|
| 131 |  | 
|---|
| 132 | if (!cli_negprot(c)) { | 
|---|
| 133 | d_printf("protocol negotiation failed\n"); | 
|---|
| 134 | cli_shutdown(c); | 
|---|
| 135 | return NULL; | 
|---|
| 136 | } | 
|---|
| 137 |  | 
|---|
| 138 | if (!got_pass) { | 
|---|
| 139 | char *pass = getpass("Password: "); | 
|---|
| 140 | if (pass) { | 
|---|
| 141 | pstrcpy(password, pass); | 
|---|
| 142 | got_pass = 1; | 
|---|
| 143 | } | 
|---|
| 144 | } | 
|---|
| 145 |  | 
|---|
| 146 | if (!NT_STATUS_IS_OK(cli_session_setup(c, username, | 
|---|
| 147 | password, strlen(password), | 
|---|
| 148 | password, strlen(password), | 
|---|
| 149 | lp_workgroup()))) { | 
|---|
| 150 | /* if a password was not supplied then try again with a null username */ | 
|---|
| 151 | if (password[0] || !username[0] || use_kerberos || | 
|---|
| 152 | !NT_STATUS_IS_OK(cli_session_setup(c, "", "", 0, "", 0, | 
|---|
| 153 | lp_workgroup()))) { | 
|---|
| 154 | d_printf("session setup failed: %s\n", cli_errstr(c)); | 
|---|
| 155 | if (NT_STATUS_V(cli_nt_error(c)) == | 
|---|
| 156 | NT_STATUS_V(NT_STATUS_MORE_PROCESSING_REQUIRED)) | 
|---|
| 157 | d_printf("did you forget to run kinit?\n"); | 
|---|
| 158 | cli_shutdown(c); | 
|---|
| 159 | return NULL; | 
|---|
| 160 | } | 
|---|
| 161 | d_printf("Anonymous login successful\n"); | 
|---|
| 162 | } | 
|---|
| 163 |  | 
|---|
| 164 | if ( show_sessetup ) { | 
|---|
| 165 | if (*c->server_domain) { | 
|---|
| 166 | DEBUG(0,("Domain=[%s] OS=[%s] Server=[%s]\n", | 
|---|
| 167 | c->server_domain,c->server_os,c->server_type)); | 
|---|
| 168 | } else if (*c->server_os || *c->server_type){ | 
|---|
| 169 | DEBUG(0,("OS=[%s] Server=[%s]\n", | 
|---|
| 170 | c->server_os,c->server_type)); | 
|---|
| 171 | } | 
|---|
| 172 | } | 
|---|
| 173 | DEBUG(4,(" session setup ok\n")); | 
|---|
| 174 |  | 
|---|
| 175 | /* here's the fun part....to support 'msdfs proxy' shares | 
|---|
| 176 | (on Samba or windows) we have to issues a TRANS_GET_DFS_REFERRAL | 
|---|
| 177 | here before trying to connect to the original share. | 
|---|
| 178 | check_dfs_proxy() will fail if it is a normal share. */ | 
|---|
| 179 |  | 
|---|
| 180 | if ( (c->capabilities & CAP_DFS) && cli_check_msdfs_proxy( c, sharename, newserver, newshare ) ) { | 
|---|
| 181 | cli_shutdown(c); | 
|---|
| 182 | return do_connect( newserver, newshare, False ); | 
|---|
| 183 | } | 
|---|
| 184 |  | 
|---|
| 185 | /* must be a normal share */ | 
|---|
| 186 |  | 
|---|
| 187 | if (!cli_send_tconX(c, sharename, "?????", password, strlen(password)+1)) { | 
|---|
| 188 | d_printf("tree connect failed: %s\n", cli_errstr(c)); | 
|---|
| 189 | cli_shutdown(c); | 
|---|
| 190 | return NULL; | 
|---|
| 191 | } | 
|---|
| 192 |  | 
|---|
| 193 | DEBUG(4,(" tconx ok\n")); | 
|---|
| 194 |  | 
|---|
| 195 | return c; | 
|---|
| 196 | } | 
|---|
| 197 |  | 
|---|
| 198 | /**************************************************************************** | 
|---|
| 199 | ****************************************************************************/ | 
|---|
| 200 |  | 
|---|
| 201 | static void cli_cm_set_mntpoint( struct cli_state *c, const char *mnt ) | 
|---|
| 202 | { | 
|---|
| 203 | struct client_connection *p; | 
|---|
| 204 | int i; | 
|---|
| 205 |  | 
|---|
| 206 | for ( p=connections,i=0; p; p=p->next,i++ ) { | 
|---|
| 207 | if ( strequal(p->cli->desthost, c->desthost) && strequal(p->cli->share, c->share) ) | 
|---|
| 208 | break; | 
|---|
| 209 | } | 
|---|
| 210 |  | 
|---|
| 211 | if ( p ) { | 
|---|
| 212 | pstrcpy( p->mount, mnt ); | 
|---|
| 213 | clean_name(p->mount); | 
|---|
| 214 | } | 
|---|
| 215 | } | 
|---|
| 216 |  | 
|---|
| 217 | /**************************************************************************** | 
|---|
| 218 | ****************************************************************************/ | 
|---|
| 219 |  | 
|---|
| 220 | const char *cli_cm_get_mntpoint( struct cli_state *c ) | 
|---|
| 221 | { | 
|---|
| 222 | struct client_connection *p; | 
|---|
| 223 | int i; | 
|---|
| 224 |  | 
|---|
| 225 | for ( p=connections,i=0; p; p=p->next,i++ ) { | 
|---|
| 226 | if ( strequal(p->cli->desthost, c->desthost) && strequal(p->cli->share, c->share) ) | 
|---|
| 227 | break; | 
|---|
| 228 | } | 
|---|
| 229 |  | 
|---|
| 230 | if ( p ) | 
|---|
| 231 | return p->mount; | 
|---|
| 232 |  | 
|---|
| 233 | return NULL; | 
|---|
| 234 | } | 
|---|
| 235 |  | 
|---|
| 236 | /******************************************************************** | 
|---|
| 237 | Add a new connection to the list | 
|---|
| 238 | ********************************************************************/ | 
|---|
| 239 |  | 
|---|
| 240 | static struct cli_state *cli_cm_connect( const char *server, | 
|---|
| 241 | const char *share, | 
|---|
| 242 | BOOL show_hdr) | 
|---|
| 243 | { | 
|---|
| 244 | struct client_connection *node; | 
|---|
| 245 |  | 
|---|
| 246 | node = SMB_XMALLOC_P( struct client_connection ); | 
|---|
| 247 |  | 
|---|
| 248 | node->cli = do_connect( server, share, show_hdr ); | 
|---|
| 249 |  | 
|---|
| 250 | if ( !node->cli ) { | 
|---|
| 251 | SAFE_FREE( node ); | 
|---|
| 252 | return NULL; | 
|---|
| 253 | } | 
|---|
| 254 |  | 
|---|
| 255 | DLIST_ADD( connections, node ); | 
|---|
| 256 |  | 
|---|
| 257 | cli_cm_set_mntpoint( node->cli, "" ); | 
|---|
| 258 |  | 
|---|
| 259 | return node->cli; | 
|---|
| 260 |  | 
|---|
| 261 | } | 
|---|
| 262 |  | 
|---|
| 263 | /******************************************************************** | 
|---|
| 264 | Return a connection to a server. | 
|---|
| 265 | ********************************************************************/ | 
|---|
| 266 |  | 
|---|
| 267 | static struct cli_state *cli_cm_find( const char *server, const char *share ) | 
|---|
| 268 | { | 
|---|
| 269 | struct client_connection *p; | 
|---|
| 270 |  | 
|---|
| 271 | for ( p=connections; p; p=p->next ) { | 
|---|
| 272 | if ( strequal(server, p->cli->desthost) && strequal(share,p->cli->share) ) | 
|---|
| 273 | return p->cli; | 
|---|
| 274 | } | 
|---|
| 275 |  | 
|---|
| 276 | return NULL; | 
|---|
| 277 | } | 
|---|
| 278 |  | 
|---|
| 279 | /**************************************************************************** | 
|---|
| 280 | open a client connection to a \\server\share.  Set's the current *cli | 
|---|
| 281 | global variable as a side-effect (but only if the connection is successful). | 
|---|
| 282 | ****************************************************************************/ | 
|---|
| 283 |  | 
|---|
| 284 | struct cli_state *cli_cm_open(const char *server, | 
|---|
| 285 | const char *share, | 
|---|
| 286 | BOOL show_hdr) | 
|---|
| 287 | { | 
|---|
| 288 | struct cli_state *c; | 
|---|
| 289 |  | 
|---|
| 290 | /* try to reuse an existing connection */ | 
|---|
| 291 |  | 
|---|
| 292 | c = cli_cm_find( server, share ); | 
|---|
| 293 |  | 
|---|
| 294 | if ( !c ) { | 
|---|
| 295 | c = cli_cm_connect(server, share, show_hdr); | 
|---|
| 296 | } | 
|---|
| 297 |  | 
|---|
| 298 | return c; | 
|---|
| 299 | } | 
|---|
| 300 |  | 
|---|
| 301 | /**************************************************************************** | 
|---|
| 302 | ****************************************************************************/ | 
|---|
| 303 |  | 
|---|
| 304 | void cli_cm_shutdown( void ) | 
|---|
| 305 | { | 
|---|
| 306 |  | 
|---|
| 307 | struct client_connection *p, *x; | 
|---|
| 308 |  | 
|---|
| 309 | for ( p=connections; p; ) { | 
|---|
| 310 | cli_shutdown( p->cli ); | 
|---|
| 311 | x = p; | 
|---|
| 312 | p = p->next; | 
|---|
| 313 |  | 
|---|
| 314 | SAFE_FREE( x ); | 
|---|
| 315 | } | 
|---|
| 316 |  | 
|---|
| 317 | connections = NULL; | 
|---|
| 318 | return; | 
|---|
| 319 | } | 
|---|
| 320 |  | 
|---|
| 321 | /**************************************************************************** | 
|---|
| 322 | ****************************************************************************/ | 
|---|
| 323 |  | 
|---|
| 324 | void cli_cm_display(void) | 
|---|
| 325 | { | 
|---|
| 326 | struct client_connection *p; | 
|---|
| 327 | int i; | 
|---|
| 328 |  | 
|---|
| 329 | for ( p=connections,i=0; p; p=p->next,i++ ) { | 
|---|
| 330 | d_printf("%d:\tserver=%s, share=%s\n", | 
|---|
| 331 | i, p->cli->desthost, p->cli->share ); | 
|---|
| 332 | } | 
|---|
| 333 | } | 
|---|
| 334 |  | 
|---|
| 335 | /**************************************************************************** | 
|---|
| 336 | ****************************************************************************/ | 
|---|
| 337 |  | 
|---|
| 338 | void cli_cm_set_credentials( struct user_auth_info *user ) | 
|---|
| 339 | { | 
|---|
| 340 | pstrcpy( username, user->username ); | 
|---|
| 341 |  | 
|---|
| 342 | if ( user->got_pass ) { | 
|---|
| 343 | pstrcpy( password, user->password ); | 
|---|
| 344 | got_pass = True; | 
|---|
| 345 | } | 
|---|
| 346 |  | 
|---|
| 347 | use_kerberos = user->use_kerberos; | 
|---|
| 348 | signing_state = user->signing_state; | 
|---|
| 349 | } | 
|---|
| 350 |  | 
|---|
| 351 | /**************************************************************************** | 
|---|
| 352 | ****************************************************************************/ | 
|---|
| 353 |  | 
|---|
| 354 | void cli_cm_set_port( int port_number ) | 
|---|
| 355 | { | 
|---|
| 356 | port = port_number; | 
|---|
| 357 | } | 
|---|
| 358 |  | 
|---|
| 359 | /**************************************************************************** | 
|---|
| 360 | ****************************************************************************/ | 
|---|
| 361 |  | 
|---|
| 362 | void cli_cm_set_dest_name_type( int type ) | 
|---|
| 363 | { | 
|---|
| 364 | name_type = type; | 
|---|
| 365 | } | 
|---|
| 366 |  | 
|---|
| 367 | /**************************************************************************** | 
|---|
| 368 | ****************************************************************************/ | 
|---|
| 369 |  | 
|---|
| 370 | void cli_cm_set_dest_ip(struct in_addr ip ) | 
|---|
| 371 | { | 
|---|
| 372 | dest_ip = ip; | 
|---|
| 373 | have_ip = True; | 
|---|
| 374 | } | 
|---|
| 375 |  | 
|---|
| 376 | /********************************************************************** | 
|---|
| 377 | split a dfs path into the server, share name, and extrapath components | 
|---|
| 378 | **********************************************************************/ | 
|---|
| 379 |  | 
|---|
| 380 | static void split_dfs_path( const char *nodepath, fstring server, fstring share, pstring extrapath ) | 
|---|
| 381 | { | 
|---|
| 382 | char *p, *q; | 
|---|
| 383 | pstring path; | 
|---|
| 384 |  | 
|---|
| 385 | pstrcpy( path, nodepath ); | 
|---|
| 386 |  | 
|---|
| 387 | if ( path[0] != '\\' ) { | 
|---|
| 388 | return; | 
|---|
| 389 | } | 
|---|
| 390 |  | 
|---|
| 391 | p = strchr_m( path + 1, '\\' ); | 
|---|
| 392 | if ( !p ) { | 
|---|
| 393 | return; | 
|---|
| 394 | } | 
|---|
| 395 |  | 
|---|
| 396 | *p = '\0'; | 
|---|
| 397 | p++; | 
|---|
| 398 |  | 
|---|
| 399 | /* Look for any extra/deep path */ | 
|---|
| 400 | q = strchr_m(p, '\\'); | 
|---|
| 401 | if (q != NULL) { | 
|---|
| 402 | *q = '\0'; | 
|---|
| 403 | q++; | 
|---|
| 404 | pstrcpy( extrapath, q ); | 
|---|
| 405 | } else { | 
|---|
| 406 | pstrcpy( extrapath, '\0' ); | 
|---|
| 407 | } | 
|---|
| 408 |  | 
|---|
| 409 | fstrcpy( share, p ); | 
|---|
| 410 | fstrcpy( server, &path[1] ); | 
|---|
| 411 | } | 
|---|
| 412 |  | 
|---|
| 413 | /**************************************************************************** | 
|---|
| 414 | Return the original path truncated at the directory component before | 
|---|
| 415 | the first wildcard character. Trust the caller to provide a NULL | 
|---|
| 416 | terminated string | 
|---|
| 417 | ****************************************************************************/ | 
|---|
| 418 |  | 
|---|
| 419 | static void clean_path(const char *path, pstring path_out) | 
|---|
| 420 | { | 
|---|
| 421 | size_t len; | 
|---|
| 422 | char *p1, *p2, *p; | 
|---|
| 423 |  | 
|---|
| 424 | /* No absolute paths. */ | 
|---|
| 425 | while (IS_DIRECTORY_SEP(*path)) { | 
|---|
| 426 | path++; | 
|---|
| 427 | } | 
|---|
| 428 |  | 
|---|
| 429 | pstrcpy(path_out, path); | 
|---|
| 430 |  | 
|---|
| 431 | p1 = strchr_m(path_out, '*'); | 
|---|
| 432 | p2 = strchr_m(path_out, '?'); | 
|---|
| 433 |  | 
|---|
| 434 | if (p1 || p2) { | 
|---|
| 435 | if (p1 && p2) { | 
|---|
| 436 | p = MIN(p1,p2); | 
|---|
| 437 | } else if (!p1) { | 
|---|
| 438 | p = p2; | 
|---|
| 439 | } else { | 
|---|
| 440 | p = p1; | 
|---|
| 441 | } | 
|---|
| 442 | *p = '\0'; | 
|---|
| 443 |  | 
|---|
| 444 | /* Now go back to the start of this component. */ | 
|---|
| 445 | p1 = strrchr_m(path_out, '/'); | 
|---|
| 446 | p2 = strrchr_m(path_out, '\\'); | 
|---|
| 447 | p = MAX(p1,p2); | 
|---|
| 448 | if (p) { | 
|---|
| 449 | *p = '\0'; | 
|---|
| 450 | } | 
|---|
| 451 | } | 
|---|
| 452 |  | 
|---|
| 453 | /* Strip any trailing separator */ | 
|---|
| 454 |  | 
|---|
| 455 | len = strlen(path_out); | 
|---|
| 456 | if ( (len > 0) && IS_DIRECTORY_SEP(path_out[len-1])) { | 
|---|
| 457 | path_out[len-1] = '\0'; | 
|---|
| 458 | } | 
|---|
| 459 | } | 
|---|
| 460 |  | 
|---|
| 461 | /**************************************************************************** | 
|---|
| 462 | ****************************************************************************/ | 
|---|
| 463 |  | 
|---|
| 464 | static void cli_dfs_make_full_path( struct cli_state *cli, | 
|---|
| 465 | const char *dir, | 
|---|
| 466 | pstring path_out) | 
|---|
| 467 | { | 
|---|
| 468 | /* Ensure the extrapath doesn't start with a separator. */ | 
|---|
| 469 | while (IS_DIRECTORY_SEP(*dir)) { | 
|---|
| 470 | dir++; | 
|---|
| 471 | } | 
|---|
| 472 |  | 
|---|
| 473 | pstr_sprintf( path_out, "\\%s\\%s\\%s", cli->desthost, cli->share, dir); | 
|---|
| 474 | } | 
|---|
| 475 |  | 
|---|
| 476 | /******************************************************************** | 
|---|
| 477 | check for dfs referral | 
|---|
| 478 | ********************************************************************/ | 
|---|
| 479 |  | 
|---|
| 480 | static BOOL cli_dfs_check_error( struct cli_state *cli, NTSTATUS status ) | 
|---|
| 481 | { | 
|---|
| 482 | uint32 flgs2 = SVAL(cli->inbuf,smb_flg2); | 
|---|
| 483 |  | 
|---|
| 484 | /* only deal with DS when we negotiated NT_STATUS codes and UNICODE */ | 
|---|
| 485 |  | 
|---|
| 486 | if ( !( (flgs2&FLAGS2_32_BIT_ERROR_CODES) && (flgs2&FLAGS2_UNICODE_STRINGS) ) ) | 
|---|
| 487 | return False; | 
|---|
| 488 |  | 
|---|
| 489 | if ( NT_STATUS_EQUAL( status, NT_STATUS(IVAL(cli->inbuf,smb_rcls)) ) ) | 
|---|
| 490 | return True; | 
|---|
| 491 |  | 
|---|
| 492 | return False; | 
|---|
| 493 | } | 
|---|
| 494 |  | 
|---|
| 495 | /******************************************************************** | 
|---|
| 496 | get the dfs referral link | 
|---|
| 497 | ********************************************************************/ | 
|---|
| 498 |  | 
|---|
| 499 | BOOL cli_dfs_get_referral( struct cli_state *cli, | 
|---|
| 500 | const char *path, | 
|---|
| 501 | CLIENT_DFS_REFERRAL**refs, | 
|---|
| 502 | size_t *num_refs, | 
|---|
| 503 | uint16 *consumed) | 
|---|
| 504 | { | 
|---|
| 505 | unsigned int data_len = 0; | 
|---|
| 506 | unsigned int param_len = 0; | 
|---|
| 507 | uint16 setup = TRANSACT2_GET_DFS_REFERRAL; | 
|---|
| 508 | char param[sizeof(pstring)+2]; | 
|---|
| 509 | pstring data; | 
|---|
| 510 | char *rparam=NULL, *rdata=NULL; | 
|---|
| 511 | char *p; | 
|---|
| 512 | size_t pathlen = 2*(strlen(path)+1); | 
|---|
| 513 | uint16 num_referrals; | 
|---|
| 514 | CLIENT_DFS_REFERRAL *referrals = NULL; | 
|---|
| 515 |  | 
|---|
| 516 | memset(param, 0, sizeof(param)); | 
|---|
| 517 | SSVAL(param, 0, 0x03);  /* max referral level */ | 
|---|
| 518 | p = ¶m[2]; | 
|---|
| 519 |  | 
|---|
| 520 | p += clistr_push(cli, p, path, MIN(pathlen, sizeof(param)-2), STR_TERMINATE); | 
|---|
| 521 | param_len = PTR_DIFF(p, param); | 
|---|
| 522 |  | 
|---|
| 523 | if (!cli_send_trans(cli, SMBtrans2, | 
|---|
| 524 | NULL,                        /* name */ | 
|---|
| 525 | -1, 0,                          /* fid, flags */ | 
|---|
| 526 | &setup, 1, 0,                   /* setup, length, max */ | 
|---|
| 527 | param, param_len, 2,            /* param, length, max */ | 
|---|
| 528 | (char *)&data,  data_len, cli->max_xmit /* data, length, max */ | 
|---|
| 529 | )) { | 
|---|
| 530 | return False; | 
|---|
| 531 | } | 
|---|
| 532 |  | 
|---|
| 533 | if (!cli_receive_trans(cli, SMBtrans2, | 
|---|
| 534 | &rparam, ¶m_len, | 
|---|
| 535 | &rdata, &data_len)) { | 
|---|
| 536 | return False; | 
|---|
| 537 | } | 
|---|
| 538 |  | 
|---|
| 539 | *consumed     = SVAL( rdata, 0 ); | 
|---|
| 540 | num_referrals = SVAL( rdata, 2 ); | 
|---|
| 541 |  | 
|---|
| 542 | if ( num_referrals != 0 ) { | 
|---|
| 543 | uint16 ref_version; | 
|---|
| 544 | uint16 ref_size; | 
|---|
| 545 | int i; | 
|---|
| 546 | uint16 node_offset; | 
|---|
| 547 |  | 
|---|
| 548 | referrals = SMB_XMALLOC_ARRAY( CLIENT_DFS_REFERRAL, num_referrals ); | 
|---|
| 549 |  | 
|---|
| 550 | /* start at the referrals array */ | 
|---|
| 551 |  | 
|---|
| 552 | p = rdata+8; | 
|---|
| 553 | for ( i=0; i<num_referrals; i++ ) { | 
|---|
| 554 | ref_version = SVAL( p, 0 ); | 
|---|
| 555 | ref_size    = SVAL( p, 2 ); | 
|---|
| 556 | node_offset = SVAL( p, 16 ); | 
|---|
| 557 |  | 
|---|
| 558 | if ( ref_version != 3 ) { | 
|---|
| 559 | p += ref_size; | 
|---|
| 560 | continue; | 
|---|
| 561 | } | 
|---|
| 562 |  | 
|---|
| 563 | referrals[i].proximity = SVAL( p, 8 ); | 
|---|
| 564 | referrals[i].ttl       = SVAL( p, 10 ); | 
|---|
| 565 |  | 
|---|
| 566 | clistr_pull( cli, referrals[i].dfspath, p+node_offset, | 
|---|
| 567 | sizeof(referrals[i].dfspath), -1, STR_TERMINATE|STR_UNICODE ); | 
|---|
| 568 |  | 
|---|
| 569 | p += ref_size; | 
|---|
| 570 | } | 
|---|
| 571 | } | 
|---|
| 572 |  | 
|---|
| 573 | *num_refs = num_referrals; | 
|---|
| 574 | *refs = referrals; | 
|---|
| 575 |  | 
|---|
| 576 | SAFE_FREE(rdata); | 
|---|
| 577 | SAFE_FREE(rparam); | 
|---|
| 578 |  | 
|---|
| 579 | return True; | 
|---|
| 580 | } | 
|---|
| 581 |  | 
|---|
| 582 |  | 
|---|
| 583 | /******************************************************************** | 
|---|
| 584 | ********************************************************************/ | 
|---|
| 585 |  | 
|---|
| 586 | BOOL cli_resolve_path( const char *mountpt, | 
|---|
| 587 | struct cli_state *rootcli, | 
|---|
| 588 | const char *path, | 
|---|
| 589 | struct cli_state **targetcli, | 
|---|
| 590 | pstring targetpath) | 
|---|
| 591 | { | 
|---|
| 592 | CLIENT_DFS_REFERRAL *refs = NULL; | 
|---|
| 593 | size_t num_refs; | 
|---|
| 594 | uint16 consumed; | 
|---|
| 595 | struct cli_state *cli_ipc; | 
|---|
| 596 | pstring dfs_path, cleanpath, extrapath; | 
|---|
| 597 | int pathlen; | 
|---|
| 598 | fstring server, share; | 
|---|
| 599 | struct cli_state *newcli; | 
|---|
| 600 | pstring newpath; | 
|---|
| 601 | pstring newmount; | 
|---|
| 602 | char *ppath, *temppath = NULL; | 
|---|
| 603 |  | 
|---|
| 604 | SMB_STRUCT_STAT sbuf; | 
|---|
| 605 | uint32 attributes; | 
|---|
| 606 |  | 
|---|
| 607 | if ( !rootcli || !path || !targetcli ) { | 
|---|
| 608 | return False; | 
|---|
| 609 | } | 
|---|
| 610 |  | 
|---|
| 611 | /* Don't do anything if this is not a DFS root. */ | 
|---|
| 612 |  | 
|---|
| 613 | if ( !rootcli->dfsroot) { | 
|---|
| 614 | *targetcli = rootcli; | 
|---|
| 615 | pstrcpy( targetpath, path ); | 
|---|
| 616 | return True; | 
|---|
| 617 | } | 
|---|
| 618 |  | 
|---|
| 619 | *targetcli = NULL; | 
|---|
| 620 |  | 
|---|
| 621 | /* Send a trans2_query_path_info to check for a referral. */ | 
|---|
| 622 |  | 
|---|
| 623 | clean_path(path, cleanpath); | 
|---|
| 624 | cli_dfs_make_full_path(rootcli, cleanpath, dfs_path ); | 
|---|
| 625 |  | 
|---|
| 626 | if (cli_qpathinfo_basic( rootcli, dfs_path, &sbuf, &attributes ) ) { | 
|---|
| 627 | /* This is an ordinary path, just return it. */ | 
|---|
| 628 | *targetcli = rootcli; | 
|---|
| 629 | pstrcpy( targetpath, path ); | 
|---|
| 630 | goto done; | 
|---|
| 631 | } | 
|---|
| 632 |  | 
|---|
| 633 | /* Special case where client asked for a path that does not exist */ | 
|---|
| 634 |  | 
|---|
| 635 | if ( cli_dfs_check_error(rootcli, NT_STATUS_OBJECT_NAME_NOT_FOUND) ) { | 
|---|
| 636 | *targetcli = rootcli; | 
|---|
| 637 | pstrcpy( targetpath, path ); | 
|---|
| 638 | goto done; | 
|---|
| 639 | } | 
|---|
| 640 |  | 
|---|
| 641 | /* We got an error, check for DFS referral. */ | 
|---|
| 642 |  | 
|---|
| 643 | if ( !cli_dfs_check_error(rootcli, NT_STATUS_PATH_NOT_COVERED))  { | 
|---|
| 644 | return False; | 
|---|
| 645 | } | 
|---|
| 646 |  | 
|---|
| 647 | /* Check for the referral. */ | 
|---|
| 648 |  | 
|---|
| 649 | if ( !(cli_ipc = cli_cm_open( rootcli->desthost, "IPC$", False )) ) { | 
|---|
| 650 | return False; | 
|---|
| 651 | } | 
|---|
| 652 |  | 
|---|
| 653 | if ( !cli_dfs_get_referral(cli_ipc, dfs_path, &refs, &num_refs, &consumed) | 
|---|
| 654 | || !num_refs ) { | 
|---|
| 655 | return False; | 
|---|
| 656 | } | 
|---|
| 657 |  | 
|---|
| 658 | /* Just store the first referral for now. */ | 
|---|
| 659 |  | 
|---|
| 660 | split_dfs_path( refs[0].dfspath, server, share, extrapath ); | 
|---|
| 661 | SAFE_FREE(refs); | 
|---|
| 662 |  | 
|---|
| 663 | /* Make sure to recreate the original string including any wildcards. */ | 
|---|
| 664 |  | 
|---|
| 665 | cli_dfs_make_full_path( rootcli, path, dfs_path); | 
|---|
| 666 | pathlen = strlen( dfs_path )*2; | 
|---|
| 667 | consumed = MIN(pathlen, consumed ); | 
|---|
| 668 | pstrcpy( targetpath, &dfs_path[consumed/2] ); | 
|---|
| 669 | dfs_path[consumed/2] = '\0'; | 
|---|
| 670 |  | 
|---|
| 671 | /* | 
|---|
| 672 | * targetpath is now the unconsumed part of the path. | 
|---|
| 673 | * dfs_path is now the consumed part of the path (in \server\share\path format). | 
|---|
| 674 | */ | 
|---|
| 675 |  | 
|---|
| 676 | /* Open the connection to the target server & share */ | 
|---|
| 677 |  | 
|---|
| 678 | if ( (*targetcli = cli_cm_open(server, share, False)) == NULL ) { | 
|---|
| 679 | d_printf("Unable to follow dfs referral [\\%s\\%s]\n", | 
|---|
| 680 | server, share ); | 
|---|
| 681 | return False; | 
|---|
| 682 | } | 
|---|
| 683 |  | 
|---|
| 684 | if (strlen(extrapath) > 0) { | 
|---|
| 685 | string_append(&temppath, extrapath); | 
|---|
| 686 | string_append(&temppath, targetpath); | 
|---|
| 687 | pstrcpy( targetpath, temppath ); | 
|---|
| 688 | } | 
|---|
| 689 |  | 
|---|
| 690 | /* parse out the consumed mount path */ | 
|---|
| 691 | /* trim off the \server\share\ */ | 
|---|
| 692 |  | 
|---|
| 693 | ppath = dfs_path; | 
|---|
| 694 |  | 
|---|
| 695 | if (*ppath != '\\') { | 
|---|
| 696 | d_printf("cli_resolve_path: dfs_path (%s) not in correct format.\n", | 
|---|
| 697 | dfs_path ); | 
|---|
| 698 | return False; | 
|---|
| 699 | } | 
|---|
| 700 |  | 
|---|
| 701 | ppath++; /* Now pointing at start of server name. */ | 
|---|
| 702 |  | 
|---|
| 703 | if ((ppath = strchr_m( dfs_path, '\\' )) == NULL) { | 
|---|
| 704 | return False; | 
|---|
| 705 | } | 
|---|
| 706 |  | 
|---|
| 707 | ppath++; /* Now pointing at start of share name. */ | 
|---|
| 708 |  | 
|---|
| 709 | if ((ppath = strchr_m( ppath+1, '\\' )) == NULL) { | 
|---|
| 710 | return False; | 
|---|
| 711 | } | 
|---|
| 712 |  | 
|---|
| 713 | ppath++; /* Now pointing at path component. */ | 
|---|
| 714 |  | 
|---|
| 715 | pstr_sprintf( newmount, "%s\\%s", mountpt, ppath ); | 
|---|
| 716 |  | 
|---|
| 717 | cli_cm_set_mntpoint( *targetcli, newmount ); | 
|---|
| 718 |  | 
|---|
| 719 | /* Check for another dfs referral, note that we are not | 
|---|
| 720 | checking for loops here. */ | 
|---|
| 721 |  | 
|---|
| 722 | if ( !strequal( targetpath, "\\" ) &&  !strequal( targetpath, "/")) { | 
|---|
| 723 | if ( cli_resolve_path( newmount, *targetcli, targetpath, &newcli, newpath ) ) { | 
|---|
| 724 | /* | 
|---|
| 725 | * When cli_resolve_path returns true here it's always | 
|---|
| 726 | * returning the complete path in newpath, so we're done | 
|---|
| 727 | * here. | 
|---|
| 728 | */ | 
|---|
| 729 | *targetcli = newcli; | 
|---|
| 730 | pstrcpy( targetpath, newpath ); | 
|---|
| 731 | return True; | 
|---|
| 732 | } | 
|---|
| 733 | } | 
|---|
| 734 |  | 
|---|
| 735 | done: | 
|---|
| 736 |  | 
|---|
| 737 | /* If returning True ensure we return a dfs root full path. */ | 
|---|
| 738 | if ( (*targetcli)->dfsroot ) { | 
|---|
| 739 | pstrcpy(dfs_path, targetpath ); | 
|---|
| 740 | cli_dfs_make_full_path( *targetcli, dfs_path, targetpath); | 
|---|
| 741 | } | 
|---|
| 742 |  | 
|---|
| 743 | return True; | 
|---|
| 744 | } | 
|---|
| 745 |  | 
|---|
| 746 | /******************************************************************** | 
|---|
| 747 | ********************************************************************/ | 
|---|
| 748 |  | 
|---|
| 749 | BOOL cli_check_msdfs_proxy( struct cli_state *cli, const char *sharename, | 
|---|
| 750 | fstring newserver, fstring newshare ) | 
|---|
| 751 | { | 
|---|
| 752 | CLIENT_DFS_REFERRAL *refs = NULL; | 
|---|
| 753 | size_t num_refs; | 
|---|
| 754 | uint16 consumed; | 
|---|
| 755 | pstring fullpath; | 
|---|
| 756 | BOOL res; | 
|---|
| 757 | uint16 cnum; | 
|---|
| 758 | pstring newextrapath; | 
|---|
| 759 |  | 
|---|
| 760 | if ( !cli || !sharename ) | 
|---|
| 761 | return False; | 
|---|
| 762 |  | 
|---|
| 763 | cnum = cli->cnum; | 
|---|
| 764 |  | 
|---|
| 765 | /* special case.  never check for a referral on the IPC$ share */ | 
|---|
| 766 |  | 
|---|
| 767 | if ( strequal( sharename, "IPC$" ) ) { | 
|---|
| 768 | return False; | 
|---|
| 769 | } | 
|---|
| 770 |  | 
|---|
| 771 | /* send a trans2_query_path_info to check for a referral */ | 
|---|
| 772 |  | 
|---|
| 773 | pstr_sprintf( fullpath, "\\%s\\%s", cli->desthost, sharename ); | 
|---|
| 774 |  | 
|---|
| 775 | /* check for the referral */ | 
|---|
| 776 |  | 
|---|
| 777 | if (!cli_send_tconX(cli, "IPC$", "IPC", NULL, 0)) { | 
|---|
| 778 | return False; | 
|---|
| 779 | } | 
|---|
| 780 |  | 
|---|
| 781 | res = cli_dfs_get_referral(cli, fullpath, &refs, &num_refs, &consumed); | 
|---|
| 782 |  | 
|---|
| 783 | if (!cli_tdis(cli)) { | 
|---|
| 784 | SAFE_FREE( refs ); | 
|---|
| 785 | return False; | 
|---|
| 786 | } | 
|---|
| 787 |  | 
|---|
| 788 | cli->cnum = cnum; | 
|---|
| 789 |  | 
|---|
| 790 | if (!res || !num_refs ) { | 
|---|
| 791 | SAFE_FREE( refs ); | 
|---|
| 792 | return False; | 
|---|
| 793 | } | 
|---|
| 794 |  | 
|---|
| 795 | split_dfs_path( refs[0].dfspath, newserver, newshare, newextrapath ); | 
|---|
| 796 |  | 
|---|
| 797 | /* check that this is not a self-referral */ | 
|---|
| 798 |  | 
|---|
| 799 | if ( strequal( cli->desthost, newserver ) && strequal( sharename, newshare ) ) { | 
|---|
| 800 | SAFE_FREE( refs ); | 
|---|
| 801 | return False; | 
|---|
| 802 | } | 
|---|
| 803 |  | 
|---|
| 804 | SAFE_FREE( refs ); | 
|---|
| 805 |  | 
|---|
| 806 | return True; | 
|---|
| 807 | } | 
|---|