|
|
/*++
Copyright (c) 1987-1991 Microsoft Corporation
Module Name:
ssi.h
Abstract:
Definition of Netlogon service APIs and structures used for SAM database replication.
This file is shared by the Netlogon service and the XACT server.
Author:
Cliff Van Dyke (cliffv) 27-Jun-1991
Environment:
User mode only. Contains NT-specific code. Requires ANSI C extensions: slash-slash comments, long external names.
Revision History:
27-Jun-1991 (cliffv) Ported from LanMan 2.1.
04-Apr-1992 (madana) Added support for LSA replication.
--*/
#ifndef _NET_SSI_H_
#define _NET_SSI_H_
//**************************************************************
//
// Data structure template - AUTHENTICATION
//
// ***************************************************************//
typedef struct _NETLOGON_VALIDATION_UAS_INFO { #ifdef MIDL_PASS
[string] wchar_t * usrlog1_eff_name; #else // MIDL_PASS
LPWSTR usrlog1_eff_name; #endif // MIDL_PASS
DWORD usrlog1_priv; DWORD usrlog1_auth_flags; DWORD usrlog1_num_logons; DWORD usrlog1_bad_pw_count; DWORD usrlog1_last_logon; DWORD usrlog1_last_logoff; DWORD usrlog1_logoff_time; DWORD usrlog1_kickoff_time; DWORD usrlog1_password_age; DWORD usrlog1_pw_can_change; DWORD usrlog1_pw_must_change; #ifdef MIDL_PASS
[string] wchar_t * usrlog1_computer; [string] wchar_t * usrlog1_domain; [string] wchar_t * usrlog1_script_path; #else // MIDL_PASS
LPWSTR usrlog1_computer; LPWSTR usrlog1_domain; LPWSTR usrlog1_script_path; #endif // MIDL_PASS
DWORD usrlog1_reserved1; } NETLOGON_VALIDATION_UAS_INFO, *PNETLOGON_VALIDATION_UAS_INFO ;
typedef struct _NETLOGON_LOGOFF_UAS_INFO { DWORD Duration; USHORT LogonCount; } NETLOGON_LOGOFF_UAS_INFORMATION, *PNETLOGON_LOGOFF_UAS_INFO;
// ***************************************************************
//
// Function prototypes - AUTHENTICATION
//
// ***************************************************************
NTSTATUS I_NetServerReqChallenge( IN LPWSTR PrimaryName OPTIONAL, IN LPWSTR ComputerName, IN PNETLOGON_CREDENTIAL ClientChallenge, OUT PNETLOGON_CREDENTIAL ServerChallenge );
NTSTATUS I_NetServerAuthenticate( IN LPWSTR PrimaryName OPTIONAL, IN LPWSTR AccountName, IN NETLOGON_SECURE_CHANNEL_TYPE AccountType, IN LPWSTR ComputerName, IN PNETLOGON_CREDENTIAL ClientCredential, OUT PNETLOGON_CREDENTIAL ServerCredential );
NTSTATUS I_NetServerAuthenticate2( IN LPWSTR PrimaryName OPTIONAL, IN LPWSTR AccountName, IN NETLOGON_SECURE_CHANNEL_TYPE AccountType, IN LPWSTR ComputerName, IN PNETLOGON_CREDENTIAL ClientCredential, OUT PNETLOGON_CREDENTIAL ServerCredential, IN OUT PULONG NegotiatedFlags );
NTSTATUS I_NetServerAuthenticate3( IN LPWSTR PrimaryName OPTIONAL, IN LPWSTR AccountName, IN NETLOGON_SECURE_CHANNEL_TYPE AccountType, IN LPWSTR ComputerName, IN PNETLOGON_CREDENTIAL ClientCredential, OUT PNETLOGON_CREDENTIAL ServerCredential, IN OUT PULONG NegotiatedFlags, OUT PULONG AccountRid );
//
// Values of I_NetServerAuthenticate2 NegotiatedFlags
//
#define NETLOGON_SUPPORTS_ACCOUNT_LOCKOUT 0x00000001
#define NETLOGON_SUPPORTS_PERSISTENT_BDC 0x00000002
#define NETLOGON_SUPPORTS_RC4_ENCRYPTION 0x00000004
#define NETLOGON_SUPPORTS_PROMOTION_COUNT 0x00000008
#define NETLOGON_SUPPORTS_BDC_CHANGELOG 0x00000010
#define NETLOGON_SUPPORTS_FULL_SYNC_RESTART 0x00000020
#define NETLOGON_SUPPORTS_MULTIPLE_SIDS 0x00000040
#define NETLOGON_SUPPORTS_REDO 0x00000080
//
// For NT 3.51, the mask was 0xFF.
//
#define NETLOGON_SUPPORTS_NT351_MASK 0x000000FF
#define NETLOGON_SUPPORTS_REFUSE_CHANGE_PWD 0x00000100
//
// For NT 4.0, the mask was 0x1FF.
// For NT 4 SP 4, the machine might have NETLOGON_SUPPORTS_AUTH_RPC or'd in
//
#define NETLOGON_SUPPORTS_NT4_MASK 0x400001FF
#define NETLOGON_SUPPORTS_PDC_PASSWORD 0x00000200
#define NETLOGON_SUPPORTS_GENERIC_PASSTHRU 0x00000400
#define NETLOGON_SUPPORTS_CONCURRENT_RPC 0x00000800
#define NETLOGON_SUPPORTS_AVOID_SAM_REPL 0x00001000
#define NETLOGON_SUPPORTS_AVOID_LSA_REPL 0x00002000
#define NETLOGON_SUPPORTS_STRONG_KEY 0x00004000 // Added after NT 5 Beta 2
#define NETLOGON_SUPPORTS_TRANSITIVE 0x00008000 // Added after NT 5 Beta 2
#define NETLOGON_SUPPORTS_DNS_DOMAIN_TRUST 0x00010000
#define NETLOGON_SUPPORTS_PASSWORD_SET_2 0x00020000
#define NETLOGON_SUPPORTS_GET_DOMAIN_INFO 0x00040000
#define NETLOGON_SUPPORTS_LSA_AUTH_RPC 0x20000000 // Added after NT 5 Beta 2
#define NETLOGON_SUPPORTS_AUTH_RPC 0x40000000
//
// For Windows 2000, the mask was 0x6007FFFF
#define NETLOGON_SUPPORTS_WIN2000_MASK 0x6007FFFF
//
// Masks added after Windows 2000
//
#define NETLOGON_SUPPORTS_CROSS_FOREST 0x00080000 // Added for Whistler
#define NETLOGON_SUPPORTS_NT4EMULATOR_NEUTRALIZER 0x00100000 // Added for Whistler
//
// Mask of bits always supported by current build (regardless of options)
//
#define NETLOGON_SUPPORTS_MASK ( \
NETLOGON_SUPPORTS_ACCOUNT_LOCKOUT | \ NETLOGON_SUPPORTS_PERSISTENT_BDC | \ NETLOGON_SUPPORTS_RC4_ENCRYPTION | \ NETLOGON_SUPPORTS_PROMOTION_COUNT | \ NETLOGON_SUPPORTS_BDC_CHANGELOG | \ NETLOGON_SUPPORTS_FULL_SYNC_RESTART | \ NETLOGON_SUPPORTS_MULTIPLE_SIDS | \ NETLOGON_SUPPORTS_REDO | \ NETLOGON_SUPPORTS_REFUSE_CHANGE_PWD | \ NETLOGON_SUPPORTS_PDC_PASSWORD | \ NETLOGON_SUPPORTS_GENERIC_PASSTHRU | \ NETLOGON_SUPPORTS_CONCURRENT_RPC | \ NETLOGON_SUPPORTS_TRANSITIVE | \ NETLOGON_SUPPORTS_DNS_DOMAIN_TRUST | \ NETLOGON_SUPPORTS_PASSWORD_SET_2 | \ NETLOGON_SUPPORTS_GET_DOMAIN_INFO | \ NETLOGON_SUPPORTS_CROSS_FOREST )
NTSTATUS I_NetServerPasswordSet( IN LPWSTR PrimaryName OPTIONAL, IN LPWSTR AccountName, IN NETLOGON_SECURE_CHANNEL_TYPE AccountType, IN LPWSTR ComputerName, IN PNETLOGON_AUTHENTICATOR Authenticator, OUT PNETLOGON_AUTHENTICATOR ReturnAuthenticator, IN PENCRYPTED_LM_OWF_PASSWORD UasNewPassword );
//
// Values of QueryLevel
#define NETLOGON_QUERY_DOMAIN_INFO 1
#define NETLOGON_QUERY_LSA_POLICY_INFO 2
NTSTATUS I_NetLogonGetDomainInfo( IN LPWSTR ServerName, IN LPWSTR ComputerName, IN PNETLOGON_AUTHENTICATOR Authenticator, OUT PNETLOGON_AUTHENTICATOR ReturnAuthenticator, IN DWORD QueryLevel, IN LPBYTE InBuffer, OUT LPBYTE *OutBuffer );
NET_API_STATUS NET_API_FUNCTION I_NetLogonUasLogon ( IN LPWSTR UserName, IN LPWSTR Workstation, OUT PNETLOGON_VALIDATION_UAS_INFO *ValidationInformation );
NET_API_STATUS I_NetLogonUasLogoff ( IN LPWSTR UserName, IN LPWSTR Workstation, OUT PNETLOGON_LOGOFF_UAS_INFO LogoffInformation );
// **************************************************************
//
// Special values and constants - AUTHENTICATION
//
// **************************************************************
// **************************************************************
//
// Data structure template - UAS/SAM REPLICATION
//
// **************************************************************
typedef struct _UAS_INFO_0 { CHAR ComputerName[LM20_CNLEN+1]; ULONG TimeCreated; ULONG SerialNumber; } UAS_INFO_0, *PUAS_INFO_0 ;
// **************************************************************
//
// Function prototypes - UAS/SAM REPLICATION
//
// **************************************************************
NET_API_STATUS NET_API_FUNCTION I_NetAccountDeltas ( IN LPWSTR primaryname, IN LPWSTR computername, IN PNETLOGON_AUTHENTICATOR authenticator, OUT PNETLOGON_AUTHENTICATOR ret_auth, IN PUAS_INFO_0 record_id, IN DWORD count, IN DWORD level, OUT LPBYTE buffer, IN DWORD buffer_len, OUT PULONG entries_read, OUT PULONG total_entries, OUT PUAS_INFO_0 next_record_id );
NET_API_STATUS NET_API_FUNCTION I_NetAccountSync ( IN LPWSTR primaryname, IN LPWSTR computername, IN PNETLOGON_AUTHENTICATOR authenticator, OUT PNETLOGON_AUTHENTICATOR ret_auth, IN DWORD reference, IN DWORD level, OUT LPBYTE buffer, IN DWORD buffer_len, OUT PULONG entries_read, OUT PULONG total_entries, OUT PULONG next_reference, OUT PUAS_INFO_0 last_record_id );
typedef enum _NETLOGON_DELTA_TYPE { AddOrChangeDomain = 1, AddOrChangeGroup, DeleteGroup, RenameGroup, AddOrChangeUser, DeleteUser, RenameUser, ChangeGroupMembership, AddOrChangeAlias, DeleteAlias, RenameAlias, ChangeAliasMembership, AddOrChangeLsaPolicy, AddOrChangeLsaTDomain, DeleteLsaTDomain, AddOrChangeLsaAccount, DeleteLsaAccount, AddOrChangeLsaSecret, DeleteLsaSecret, // The following deltas require NETLOGON_SUPPORTS_BDC_CHANGELOG to be
// negotiated.
DeleteGroupByName, DeleteUserByName, SerialNumberSkip, DummyChangeLogEntry } NETLOGON_DELTA_TYPE;
//
// Group and User account used for SSI.
//
#define SSI_ACCOUNT_NAME_POSTFIX L"$"
#define SSI_ACCOUNT_NAME_POSTFIX_CHAR L'$'
#define SSI_ACCOUNT_NAME_POSTFIX_LENGTH 1
#define SSI_ACCOUNT_NAME_LENGTH (CNLEN + SSI_ACCOUNT_NAME_POSTFIX_LENGTH)
#define SSI_SERVER_GROUP_W L"SERVERS"
//
// Structure to pass an encrypted password over the wire. The Length is the
// length of the password, which should be placed at the end of the buffer.
//
#define NL_MAX_PASSWORD_LENGTH 256
typedef struct _NL_TRUST_PASSWORD { WCHAR Buffer[NL_MAX_PASSWORD_LENGTH]; ULONG Length; } NL_TRUST_PASSWORD, *PNL_TRUST_PASSWORD;
//
// Structure to be prefixed before the password in the Buffer of NL_TRUST_PASSWORD
// structure passed over the wire. It will be used to distinguish between diferent
// versions of information passed in the buffer. Begining with RC1 NT5, the presence
// of the structure in the buffer and the equality of PasswordVersionPresent to
// PASSWORD_VERSION_PRESENT indicates that the password version number is present
// and is stored in PasswordVersionNumber; the value of ReservedField is set to 0.
// RC0 NT5 clients will generate random numbers in place of NL_PASSWORD_VERSION; it
// is highly unlikely that they will generate PASSWORD_VERSION_PRESENT sequence of
// bits in place where the PasswordVersionPresent would be present. This (very week)
// uncertainty will exist only between RC0 NT5 and RC1 NT5 machines. A server running
// RC1 NT5 will check the PasswordVersionPresent field only for RC0 NT5 and higher
// clients. The ReservedField will be used in future versions to indicate the version
// of the information stored in the buffer.
//
#define PASSWORD_VERSION_NUMBER_PRESENT 0x02231968
typedef struct _NL_PASSWORD_VERSION { DWORD ReservedField; DWORD PasswordVersionNumber; DWORD PasswordVersionPresent; } NL_PASSWORD_VERSION, *PNL_PASSWORD_VERSION;
NTSTATUS I_NetServerPasswordSet2( IN LPWSTR PrimaryName OPTIONAL, IN LPWSTR AccountName, IN NETLOGON_SECURE_CHANNEL_TYPE AccountType, IN LPWSTR ComputerName, IN PNETLOGON_AUTHENTICATOR Authenticator, OUT PNETLOGON_AUTHENTICATOR ReturnAuthenticator, IN PNL_TRUST_PASSWORD NewPassword );
NTSTATUS I_NetServerPasswordGet( IN LPWSTR PrimaryName, IN LPWSTR AccountName, IN NETLOGON_SECURE_CHANNEL_TYPE AccountType, IN LPWSTR ComputerName, IN PNETLOGON_AUTHENTICATOR Authenticator, OUT PNETLOGON_AUTHENTICATOR ReturnAuthenticator, OUT PENCRYPTED_NT_OWF_PASSWORD EncryptedNtOwfPassword );
NTSTATUS I_NetServerTrustPasswordsGet( IN LPWSTR TrustedDcName, IN LPWSTR AccountName, IN NETLOGON_SECURE_CHANNEL_TYPE AccountType, IN LPWSTR ComputerName, IN PNETLOGON_AUTHENTICATOR Authenticator, OUT PNETLOGON_AUTHENTICATOR ReturnAuthenticator, OUT PENCRYPTED_NT_OWF_PASSWORD EncryptedNewOwfPassword, OUT PENCRYPTED_NT_OWF_PASSWORD EncryptedOldOwfPassword );
NTSTATUS I_NetLogonSendToSam( IN LPWSTR PrimaryName, IN LPWSTR ComputerName, IN PNETLOGON_AUTHENTICATOR Authenticator, OUT PNETLOGON_AUTHENTICATOR ReturnAuthenticator, IN LPBYTE Buffer, IN ULONG BufferSize );
//
// Only define this API if the caller has #included the pre-requisite ntlsa.h
#ifdef _NTLSA_
NTSTATUS I_NetGetForestTrustInformation ( IN LPWSTR ServerName OPTIONAL, IN LPWSTR ComputerName, IN PNETLOGON_AUTHENTICATOR Authenticator, OUT PNETLOGON_AUTHENTICATOR ReturnAuthenticator, IN DWORD Flags, OUT PLSA_FOREST_TRUST_INFORMATION *ForestTrustInfo );
#endif // _NTLSA_
#endif // _NET_SSI_H_
|