Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

767 lines
23 KiB

//+----------------------------------------------------------------------------
//
// Windows 2000 Active Directory Service domain trust verification WMI provider
//
// Microsoft Windows
// Copyright (C) Microsoft Corporation, 1992 - 2000
//
// File: trust.cpp
//
// Contents: Trust class implementation
//
// Classes: CTrustInfo
//
// History: 27-Mar-00 EricB created
//
//-----------------------------------------------------------------------------
#include <stdafx.h>
PCWSTR CSTR_PROP_TRUSTED_DOMAIN = L"TrustedDomain"; // String
PCWSTR CSTR_PROP_FLAT_NAME = L"FlatName"; // String
PCWSTR CSTR_PROP_SID = L"SID"; // String
PCWSTR CSTR_PROP_TRUST_DIRECTION = L"TrustDirection"; // uint32
PCWSTR CSTR_PROP_TRUST_TYPE = L"TrustType"; // uint32
PCWSTR CSTR_PROP_TRUST_ATTRIBUTES = L"TrustAttributes"; // uint32
PCWSTR CSTR_PROP_TRUST_STATUS = L"TrustStatus"; // uint32
PCWSTR CSTR_PROP_TRUST_STATUS_STRING = L"TrustStatusString"; // String
PCWSTR CSTR_PROP_TRUST_IS_OK = L"TrustIsOk"; // Boolean
PCWSTR CSTR_PROP_TRUSTED_DC_NAME = L"TrustedDCName"; // String
// Define NETLOGON_CONTROL_TC_VERIFY if not found so this will build for W2K.
// This constant is in the Whistler version of lmaccess.h
#if !defined(NETLOGON_CONTROL_TC_VERIFY)
# define NETLOGON_CONTROL_TC_VERIFY (10)
#endif
//+----------------------------------------------------------------------------
//
// Class: CTrustInfo
//
//-----------------------------------------------------------------------------
CTrustInfo::CTrustInfo() : m_ulTrustDirection(0),
m_ulTrustType(0),
m_ulTrustAttributes(0),
m_trustStatus(ERROR_SUCCESS),
m_VerifyStatus(VerifyStatusNone),
m_fPwVerifySupported(TRUE)
{
m_liLastVerified.QuadPart = 0;
}
//+----------------------------------------------------------------------------
//
// Method: CTrustInfo::Verify
//
// Synopsis: Verify the status of the trust
//
// Returns: FALSE if the trust was not outbound.
//
//-----------------------------------------------------------------------------
BOOL
CTrustInfo::Verify(TrustCheckLevel CheckLevel)
{
TRACE(L"CTrustInfo::Verify, verify level %d\n", CheckLevel);
NET_API_STATUS netStatus = NERR_Success;
NETLOGON_INFO_2 * pNetlogonInfo2 = NULL;
VerifyStatus Status = VerifyStatusNone;
PCWSTR pwzTrustedDomain = GetTrustedDomain();
CString strDCName, strResetTarget = GetTrustedDomain();
if (DONT_VERIFY == CheckLevel)
{
TRACE(L"\tCheck-Level set to not verify trust.\n");
SetTrustStatus(NERR_Success, VerifyStatusTrustNotChecked);
return TRUE;
}
TRACE(L"\tVerifying trust with %s\n", GetTrustedDomain());
if (TRUST_TYPE_MIT == GetTrustType())
{
// don't verify non-Windows trusts.
//
TRACE(L"\tNot a windows trust, returning.\n");
SetTrustStatus(NERR_Success, VerifyStatusNotWindowsTrust);
SetLastVerifiedTime();
return TRUE;
}
if (!IsTrustOutbound())
{
// don't verify inbound-only trusts.
//
TRACE(L"\tInbound-only trust, returning.\n");
SetTrustStatus(NERR_Success, VerifyStatusNotOutboundTrust);
SetLastVerifiedTime();
return FALSE;
}
//
// NETLOGON_CONTROL_TC_QUERY - get the status (locally) and the name of trusted DC
// Note that the secure channel is set up only on demand, so it is not an error if
// it is not set up. The SC_QUERY will return ERROR_NO_LOGON_SERVERS if this is the
// case.
//
netStatus = I_NetLogonControl2(NULL,
NETLOGON_CONTROL_TC_QUERY,
2,
(LPBYTE)&pwzTrustedDomain,
(LPBYTE *)&pNetlogonInfo2);
if (NERR_Success == netStatus)
{
ASSERT(pNetlogonInfo2);
netStatus = pNetlogonInfo2->netlog2_tc_connection_status;
if (netStatus == NERR_Success)
{
SetTrustedDCName(pNetlogonInfo2->netlog2_trusted_dc_name);
strDCName = pNetlogonInfo2->netlog2_trusted_dc_name;
#if !defined(NT4_BUILD)
//
// Compose the domain\dc string for the reset command so it will not change
// DCs as a result of the reset. This only works with NT5 or later NetLogon.
//
strResetTarget += L"\\";
strResetTarget += pNetlogonInfo2->netlog2_trusted_dc_name + 2; // skip the UNC double slashes
#endif
}
else
{
if (ERROR_NO_LOGON_SERVERS == netStatus)
{
// This is the error returned when the SC has not yet been set up.
// It is also returned if no DCs are reachable. DsGetDcName is called with the
// force flag to discover if any DCs are reachable on the net.
//
PDOMAIN_CONTROLLER_INFO pDCInfo = NULL;
DWORD dwRet = NO_ERROR;
#if !defined(NT4_BUILD)
dwRet = DsGetDcName(NULL, pwzTrustedDomain, NULL, NULL, DS_FORCE_REDISCOVERY, &pDCInfo);
#endif
if (NO_ERROR == dwRet)
{
// A DC is reachable, so it is safe to assume that the SC has not yet been
// set up. Treat this as success.
//
netStatus = NERR_Success;
TRACE(L"SC_QUERY has returned ERROR_NO_LOGON_SERVERS, SC not yet set up.\n");
#if !defined(NT4_BUILD)
SetTrustedDCName(pDCInfo->DomainControllerName);
NetApiBufferFree(pDCInfo);
#endif
}
else
{
// If there are no DCs, there is nothing to be done except return the error.
//
TRACE(L"DsGetDcName /FORCE has returned %d, DC not found.\n", dwRet);
// Save the error code and fixed by method
SetTrustStatus(dwRet, VerifyStatusBroken);
SetLastVerifiedTime();
return TRUE;
}
}
else
{
TRACE(L"SC_QUERY has returned %d.\n", netStatus);
}
}
NetApiBufferFree(pNetlogonInfo2);
}
else
{
TRACE(L"I_NetLogonControl2 has returned %d.\n", netStatus);
}
//
// Do a trust PW verification if the other domain supports it.
//
if (PW_VERIFY == CheckLevel)
{
if (m_fPwVerifySupported)
{
netStatus = I_NetLogonControl2(NULL,
NETLOGON_CONTROL_TC_VERIFY,
2,
(LPBYTE)&pwzTrustedDomain,
(LPBYTE *)&pNetlogonInfo2);
if (NERR_Success == netStatus)
{
ASSERT(pNetlogonInfo2);
netStatus = pNetlogonInfo2->netlog2_tc_connection_status;
NetApiBufferFree(pNetlogonInfo2);
}
if (NERR_Success == netStatus)
{
TRACE(L"PW Verify successful on %s\n", pwzTrustedDomain);
Status = VerifyStatusTrustOK;
}
else
{
if (ERROR_INVALID_LEVEL == netStatus ||
ERROR_NOT_SUPPORTED == netStatus ||
RPC_S_PROCNUM_OUT_OF_RANGE == netStatus ||
RPC_NT_PROCNUM_OUT_OF_RANGE == netStatus)
{
TRACE(L"NETLOGON_CONTROL_TC_VERIFY is not supported on %s\n", pwzTrustedDomain);
m_fPwVerifySupported = FALSE;
Status = VerifyStatusPwCheckNotSupported;
netStatus = NERR_Success; // call it success since we don't know the true state
}
else
{
TRACE(L"NETLOGON_CONTROL_TC_VERIFY returned 0x%08x on %s\n", netStatus, pwzTrustedDomain);
Status = VerifyStatusBroken;
}
}
}
else
{
Status = VerifyStatusPwCheckNotSupported;
}
}
//
// Try an SC Reset against the DC returned by the SC query
//
if (SC_RESET == CheckLevel)
{
PCWSTR pwzResetTarget = strResetTarget;
netStatus = I_NetLogonControl2(NULL,
NETLOGON_CONTROL_REDISCOVER,
2,
(LPBYTE)&pwzResetTarget,
(LPBYTE *)&pNetlogonInfo2);
if (NERR_Success == netStatus)
{
ASSERT(pNetlogonInfo2);
netStatus = pNetlogonInfo2->netlog2_tc_connection_status;
NetApiBufferFree(pNetlogonInfo2);
}
if (NERR_Success == netStatus)
{
TRACE(L"SC_RESET successfull on %s\n", pwzResetTarget);
Status = VerifyStatusRediscover;
}
else
{
TRACE(L"SC_RESET returned 0x%08x on %s\n", netStatus, pwzResetTarget);
}
}
#ifdef NT4_BUILD
//
// Force trust pw replication from PDC to BDCs; only works on pre-W2K.
//
if (netStatus != NERR_Success)
{
// perform only once, ignore the result
ForceReplication();
}
#endif
//
// If still in an error state, do an SC reset against any DC
//
if (netStatus != NERR_Success)
{
netStatus = ForceRediscover(NULL, &strDCName);
if (NERR_Success == netStatus)
{
Status = VerifyStatusRediscover;
SetTrustedDCName(const_cast<PWSTR>((PCWSTR)strDCName));
}
}
//
// Walk through the DCs trying to establish an SC: TRCHK_RETARGET_ON_ERROR
//
if (NERR_Success != netStatus)
{
vector<LPWSTR> dcList;
LPBYTE pbuf = NULL;
TRACE(L"Attempting to retarget...\n");
//
// Enumerate all DCs in the trusted domain
// Attempt reconnecting to another DC.
//
// The returned value is not recorded.
// (if not enumerated, skip this step)
//
if( NERR_Success == GetDCList(strDCName,
dcList,
&pbuf))
{
//
// Try to connect to every DC until success
//
for (vector<LPWSTR>::iterator ppszDCName = dcList.begin();
NERR_Success != netStatus && ppszDCName != dcList.end();
ppszDCName++)
{
netStatus = ForceRediscover(*ppszDCName, &strDCName);
}
}
if (NERR_Success == netStatus)
{
SetTrustedDCName(const_cast<PWSTR>((PCWSTR)strDCName));
Status = VerifyStatusRetarget;
}
//
// Clean up the DC list
//
if (pbuf)
{
VERIFY( NERR_Success == NetApiBufferFree(pbuf));
}
}
// Save the error code and Status
SetTrustStatus(netStatus, Status);
SetLastVerifiedTime();
return TRUE;
}
//+----------------------------------------------------------------------------
//
// Method: CTrustInfo::SetLastVerifiedTime
//
// Synopsis: Record the time of verification.
//
//-----------------------------------------------------------------------------
void
CTrustInfo::SetLastVerifiedTime(void)
{
SYSTEMTIME st;
GetSystemTime(&st);
SystemTimeToFileTime(&st, (LPFILETIME)&m_liLastVerified);
}
//+----------------------------------------------------------------------------
//
// Method: CTrustInfo::IsVerificationStale
//
// Synopsis: Checks to see if the last verification time is older than the
// passed in criteria.
//
// Returns: TRUE if older.
//
// Notes: If the trust hasn't been verified (m_liLastVerified == 0),
// then the verification is defined to be stale.
//
//-----------------------------------------------------------------------------
BOOL
CTrustInfo::IsVerificationStale(LARGE_INTEGER liMaxAge)
{
TRACE(L"CTrustInfo::IsVerificationStale(0x%08x), MaxAge = %d\n",
this, liMaxAge.QuadPart / TRUSTMON_FILETIMES_PER_MINUTE);
BOOL fStale = FALSE;
LARGE_INTEGER liCurrentTime;
SYSTEMTIME st;
GetSystemTime(&st);
SystemTimeToFileTime(&st, (LPFILETIME)&liCurrentTime);
//TRACE(L"\tlast: %I64d, cur: %I64d, max: %I64d\n", m_liLastVerified, liCurrentTime, liMaxAge);
fStale = (m_liLastVerified.QuadPart + liMaxAge.QuadPart) < liCurrentTime.QuadPart;
return fStale;
}
//+----------------------------------------------------------------------------
//
// Method: CTrustInfo::GetDCList
//
// Synopsis: Enumerate all DCs in a domain and return a list in random order.
//
//-----------------------------------------------------------------------------
NET_API_STATUS
CTrustInfo::GetDCList(PCWSTR pszKnownServer, // OPTIONAL The server name to be placed in the end of the list
vector<LPWSTR> & dcList, // Vector of PCWSTRs, pointing to the DC names inside pbufptr
LPBYTE * pbufptr ) // This buffer must be freed with NetApiBufferFree when done.
{
TRACE(L"CTrustInfo::GetDCList\n");
ASSERT( pbufptr );
ASSERT( !(*pbufptr) );
NET_API_STATUS netStatus = NERR_Success;
DWORD dwEntriesRead = 0;
DWORD dwTotalEntries = 0;
DWORD dwResumeHandle = 0;
DWORD dwIndKnownServer = MAXDWORD;
DWORD dwInd = 0;
do
{
// Init
dcList.clear();
//
// Enumerate all the servers belonging to the specified domain
//
netStatus = NetServerEnum( NULL,
100, // SERVER_INFO_100
pbufptr,
MAX_PREFERRED_LENGTH,
& dwEntriesRead,
& dwTotalEntries,
SV_TYPE_DOMAIN_CTRL | SV_TYPE_DOMAIN_BAKCTRL,
GetTrustedDomain(),
& dwResumeHandle );
TRACE(L"NetServerEnum returned 0x%08x! (%d entries)\n", netStatus, dwEntriesRead);
if( netStatus == ERROR_MORE_DATA )
{
// should never happen (no enum handle)
ASSERT( FALSE );
// process whatever NetServerEnum returned.
netStatus = NERR_Success;
}
if( netStatus != NERR_Success ||
!dwEntriesRead ||
!(*pbufptr) )
{
TRACE(L"Failure, exiting...\n");
dcList.clear();
if( *pbufptr )
{
VERIFY( NERR_Success == NetApiBufferFree( *pbufptr ) );
*pbufptr = NULL;
}
break;
}
// To simplify buffer access...
PSERVER_INFO_100 pServerInfo100 = PSERVER_INFO_100( *pbufptr );
// Reserve enough space for all the entries
dcList.reserve( dwEntriesRead );
//
// Create a list of Servers
//
for( dwInd = 0; dwInd < dwEntriesRead; dwInd++ )
{
if( pszKnownServer &&
!_wcsicmp( pszKnownServer, pServerInfo100[dwInd].sv100_name ) )
{
dwIndKnownServer = dwInd; // postpone until the end
}
else
{
dcList.push_back( pServerInfo100[dwInd].sv100_name );
}
}
ASSERT( dwEntriesRead );
//
// Known server should go to the end of the list
//
if( MAXDWORD != dwIndKnownServer )
{
TRACE(L"Server %s placed @ the end\n", pszKnownServer);
dcList.push_back( pServerInfo100[dwIndKnownServer].sv100_name );
// Shuffling should not include the last entry
dwEntriesRead--;
}
//
// Initialize randomizer
//
srand( (unsigned) time( NULL ) );
//
// Shuffle by replacing each entry with another random entry
//
for( dwInd = 0; dwInd < (int) dwEntriesRead; dwInd++ )
{
DWORD dwRandPos = DWORD( rand() % dwEntriesRead );
if( dwRandPos == dwInd )
continue;
// Swap!
LPWSTR pstrTemp = dcList[ dwRandPos ];
dcList[ dwRandPos ] = dcList[ dwInd ];
dcList[ dwInd ] = pstrTemp;
}
} while( FALSE );
return netStatus;
}
//+----------------------------------------------------------------------------
//
// Method: CTrustInfo::ForceRediscover
//
// Synopsis:
//
//-----------------------------------------------------------------------------
NET_API_STATUS
CTrustInfo::ForceRediscover(PCWSTR pstrDCName, CString * pstrDCNameRet)
{
TRACE(L"CTrustInfo::ForceRediscover\n");
NET_API_STATUS netStatus = NERR_Success;
NETLOGON_INFO_2 * pNetlogonInfo2 = NULL;
CString strTemp;
PCWSTR pstrDomainName = GetTrustedDomain();
if( pstrDCName )
{
//
// Form domain\dc request
//
strTemp = pstrDomainName;
strTemp += L"\\";
strTemp += pstrDCName;
// Retarget pstrDomainName to the new string
pstrDomainName = strTemp;
}
//
// Attempt to re-establish trust
//
netStatus = I_NetLogonControl2( NULL,
NETLOGON_CONTROL_REDISCOVER,
2,
( LPBYTE ) &pstrDomainName,
( LPBYTE *) &pNetlogonInfo2 );
TRACE(L"I_NetLogonControl2:NETLOGON_CONTROL_REDISCOVER to %s returned 0x%08x\n",
pstrDomainName, netStatus);
//
// Clean-up
//
if( pNetlogonInfo2 )
{
*pstrDCNameRet = pNetlogonInfo2->netlog2_trusted_dc_name;
TRACE(L"netlog2_flags=0x%08x, netlog2_pdc_connection_status=0x%08x\n",
pNetlogonInfo2->netlog2_flags,
pNetlogonInfo2->netlog2_pdc_connection_status);
TRACE(L"netlog2_trusted_dc_name=%s, netlog2_tc_connection_status=0x%08x\n",
pNetlogonInfo2->netlog2_trusted_dc_name,
pNetlogonInfo2->netlog2_tc_connection_status);
NetApiBufferFree( pNetlogonInfo2 );
}
return netStatus;
}
//+----------------------------------------------------------------------------
//
// Method: CTrustInfo::SetTrustStatus
//
// Synopsis: Set the status string based on the netStatus value if an error
// else based on the VerifyStatus.
//
//-----------------------------------------------------------------------------
void
CTrustInfo::SetTrustStatus(ULONG netStatus, VerifyStatus Status)
{
WCHAR wzBuf[512];
m_trustStatus = netStatus;
m_VerifyStatus = Status;
if (NERR_Success == netStatus)
{
int nStrID;
switch (Status)
{
case VerifyStatusNone:
//
// This is the default value for the Status parameter.
//
case VerifyStatusTrustOK:
nStrID = IDS_TRUST_STATUS_OK;
break;
case VerifyStatusNotWindowsTrust:
nStrID = IDS_MIT_TRUST_STATUS;
break;
case VerifyStatusNotOutboundTrust:
nStrID = IDS_STATUS_INBOUND_ONLY;
break;
case VerifyStatusTrustNotChecked:
nStrID = IDS_STATUS_NOT_CHECKED;
break;
case VerifyStatusPwCheckNotSupported:
nStrID = IDS_PW_VERIFY_NOT_SUPPORTED;
break;
case VerifyStatusRetarget:
nStrID = IDS_FIXED_BY_RETARGET;
break;
case VerifyStatusRediscover:
nStrID = IDS_STATUS_REDISCOVER;
break;
case VerifyStatusBroken:
ASSERT(FALSE); // shouldn't get here, fall through.
default:
nStrID = IDS_STATUS_UNKNOWN;
}
LoadString(_Module.GetModuleInstance(), nStrID, wzBuf, 512);
m_strTrustStatus = wzBuf;
}
else
{
PWSTR pwzMsg;
if (FormatMessage(FORMAT_MESSAGE_ALLOCATE_BUFFER |
FORMAT_MESSAGE_FROM_SYSTEM |
FORMAT_MESSAGE_IGNORE_INSERTS,
NULL,
netStatus,
MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
(PWSTR)&pwzMsg,
0,
NULL))
{
PWSTR pwzSuffix = wcsstr(pwzMsg, L"\r\n");
if (pwzSuffix)
{
*pwzSuffix = L'\0';
}
m_strTrustStatus = pwzMsg;
LocalFree(pwzMsg);
}
else
{
LoadString(_Module.GetModuleInstance(), IDS_TRUST_STATUS_FAILED, wzBuf, 512);
m_strTrustStatus = wzBuf;
}
}
}
//+----------------------------------------------------------------------------
//
// Method: CTrustInfo::SetTrustDirectionFromFlags
//
//-----------------------------------------------------------------------------
void
CTrustInfo::SetTrustDirectionFromFlags(ULONG ulFlags)
{
m_ulTrustDirection = 0;
if (DS_DOMAIN_DIRECT_OUTBOUND & ulFlags)
{
m_ulTrustDirection = TRUST_DIRECTION_OUTBOUND;
}
if (DS_DOMAIN_DIRECT_INBOUND & ulFlags)
{
m_ulTrustDirection |= TRUST_DIRECTION_INBOUND;
}
}
//+----------------------------------------------------------------------------
//
// Method: CTrustInfo::SetSid
//
//-----------------------------------------------------------------------------
BOOL
CTrustInfo::SetSid(PSID pSid)
{
if (!pSid)
{
return TRUE;
}
#if !defined(NT4_BUILD)
PWSTR buffer;
BOOL fRet = ConvertSidToStringSid(pSid, &buffer);
if (fRet)
{
m_strSid = buffer;
LocalFree(buffer);
}
return fRet;
#else
// TODO: Code for NT4 ??
#pragma message("need ConvertSidToStringSid for NT4");
#endif
}
#ifdef NT4_BUILD
//+----------------------------------------------------------------------------
//
// Function: ForceReplication
//
// Synopsis: Force local Domain Replication -- works only for NT4 domains
//
//-----------------------------------------------------------------------------
NET_API_STATUS ForceReplication(void)
{
TRACE(L"ForceReplication\n");
NET_API_STATUS netStatus = NERR_Success;
LPBYTE pbInputDataPtr = NULL;
PNETLOGON_INFO_1 pNetlogonInfo1 = NULL;
netStatus = I_NetLogonControl2( NULL,
NETLOGON_CONTROL_REPLICATE,
1,
(LPBYTE ) &pbInputDataPtr,
(LPBYTE *) &pNetlogonInfo1 );
TRACE(L"I_NetLogonControl2:NETLOGON_CONTROL_REPLICATE returned 0x%08x\n", netStatus);
if( pNetlogonInfo1 )
{
TRACE(L"netlog1_flags=0x%08x, netlog1_pdc_connection_status=0x%08x\n",
pNetlogonInfo1->netlog1_flags,
pNetlogonInfo1->netlog1_pdc_connection_status);
NetApiBufferFree( pNetlogonInfo1 );
}
return netStatus;
}
#endif //NT4_BUILD