diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 17:20:00 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-19 17:20:00 +0000 |
commit | 8daa83a594a2e98f39d764422bfbdbc62c9efd44 (patch) | |
tree | 4099e8021376c7d8c05bdf8503093d80e9c7bad0 /libds/common | |
parent | Initial commit. (diff) | |
download | samba-8daa83a594a2e98f39d764422bfbdbc62c9efd44.tar.xz samba-8daa83a594a2e98f39d764422bfbdbc62c9efd44.zip |
Adding upstream version 2:4.20.0+dfsg.upstream/2%4.20.0+dfsg
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'libds/common')
-rw-r--r-- | libds/common/flag_mapping.c | 266 | ||||
-rw-r--r-- | libds/common/flag_mapping.h | 36 | ||||
-rw-r--r-- | libds/common/flags.h | 309 | ||||
-rw-r--r-- | libds/common/roles.h | 82 | ||||
-rw-r--r-- | libds/common/wscript_build | 7 |
5 files changed, 700 insertions, 0 deletions
diff --git a/libds/common/flag_mapping.c b/libds/common/flag_mapping.c new file mode 100644 index 0000000..fb64014 --- /dev/null +++ b/libds/common/flag_mapping.c @@ -0,0 +1,266 @@ +/* + Unix SMB/CIFS implementation. + helper mapping functions for the UF and ACB flags + + Copyright (C) Stefan (metze) Metzmacher 2002 + Copyright (C) Andrew Tridgell 2004 + Copyright (C) Matthias Dieter Wallnöfer 2010 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +#include "replace.h" +#include "lib/util/data_blob.h" +#include "lib/util/time.h" +#include "lib/util/debug.h" +#include "librpc/gen_ndr/samr.h" +#include "../libds/common/flags.h" +#include "flag_mapping.h" + +/* +translated the ACB_CTRL Flags to UserFlags (userAccountControl) +*/ +/* mapping between ADS userAccountControl and SAMR acct_flags */ +static const struct { + uint32_t uf; + uint32_t acb; +} acct_flags_map[] = { + { UF_ACCOUNTDISABLE, ACB_DISABLED }, + { UF_HOMEDIR_REQUIRED, ACB_HOMDIRREQ }, + { UF_PASSWD_NOTREQD, ACB_PWNOTREQ }, + { UF_TEMP_DUPLICATE_ACCOUNT, ACB_TEMPDUP }, + { UF_NORMAL_ACCOUNT, ACB_NORMAL }, + { UF_MNS_LOGON_ACCOUNT, ACB_MNS }, + { UF_INTERDOMAIN_TRUST_ACCOUNT, ACB_DOMTRUST }, + { UF_WORKSTATION_TRUST_ACCOUNT, ACB_WSTRUST }, + { UF_SERVER_TRUST_ACCOUNT, ACB_SVRTRUST }, + { UF_DONT_EXPIRE_PASSWD, ACB_PWNOEXP }, + { UF_LOCKOUT, ACB_AUTOLOCK }, + { UF_ENCRYPTED_TEXT_PASSWORD_ALLOWED, ACB_ENC_TXT_PWD_ALLOWED }, + { UF_SMARTCARD_REQUIRED, ACB_SMARTCARD_REQUIRED }, + { UF_TRUSTED_FOR_DELEGATION, ACB_TRUSTED_FOR_DELEGATION }, + { UF_NOT_DELEGATED, ACB_NOT_DELEGATED }, + { UF_USE_DES_KEY_ONLY, ACB_USE_DES_KEY_ONLY}, + { UF_DONT_REQUIRE_PREAUTH, ACB_DONT_REQUIRE_PREAUTH }, + { UF_PASSWORD_EXPIRED, ACB_PW_EXPIRED }, + { UF_NO_AUTH_DATA_REQUIRED, ACB_NO_AUTH_DATA_REQD }, + { UF_TRUSTED_TO_AUTHENTICATE_FOR_DELEGATION, ACB_TRUSTED_TO_AUTHENTICATE_FOR_DELEGATION }, + { UF_PARTIAL_SECRETS_ACCOUNT, ACB_PARTIAL_SECRETS_ACCOUNT }, + { UF_USE_AES_KEYS, ACB_USE_AES_KEYS } +}; + +uint32_t ds_acb2uf(uint32_t acb) +{ + unsigned int i; + uint32_t ret = 0; + for (i=0;i<ARRAY_SIZE(acct_flags_map);i++) { + if (acct_flags_map[i].acb & acb) { + ret |= acct_flags_map[i].uf; + } + } + return ret; +} + +/* +translated the UserFlags (userAccountControl) to ACB_CTRL Flags +*/ +uint32_t ds_uf2acb(uint32_t uf) +{ + unsigned int i; + uint32_t ret = 0; + for (i=0;i<ARRAY_SIZE(acct_flags_map);i++) { + if (acct_flags_map[i].uf & uf) { + ret |= acct_flags_map[i].acb; + } + } + return ret; +} + +/* +get the accountType from the UserFlags +*/ +uint32_t ds_uf2atype(uint32_t uf) +{ + uint32_t atype = 0x00000000; + + if (uf & UF_NORMAL_ACCOUNT) atype = ATYPE_NORMAL_ACCOUNT; + else if (uf & UF_TEMP_DUPLICATE_ACCOUNT) atype = ATYPE_NORMAL_ACCOUNT; + else if (uf & UF_SERVER_TRUST_ACCOUNT) atype = ATYPE_WORKSTATION_TRUST; + else if (uf & UF_WORKSTATION_TRUST_ACCOUNT) atype = ATYPE_WORKSTATION_TRUST; + else if (uf & UF_INTERDOMAIN_TRUST_ACCOUNT) atype = ATYPE_INTERDOMAIN_TRUST; + + return atype; +} + +/* +get the accountType from the groupType +*/ +uint32_t ds_gtype2atype(uint32_t gtype) +{ + uint32_t atype = 0x00000000; + + switch(gtype) { + case GTYPE_SECURITY_BUILTIN_LOCAL_GROUP: + atype = ATYPE_SECURITY_LOCAL_GROUP; + break; + case GTYPE_SECURITY_GLOBAL_GROUP: + atype = ATYPE_SECURITY_GLOBAL_GROUP; + break; + case GTYPE_SECURITY_DOMAIN_LOCAL_GROUP: + atype = ATYPE_SECURITY_LOCAL_GROUP; + break; + case GTYPE_SECURITY_UNIVERSAL_GROUP: + atype = ATYPE_SECURITY_UNIVERSAL_GROUP; + break; + + case GTYPE_DISTRIBUTION_GLOBAL_GROUP: + atype = ATYPE_DISTRIBUTION_GLOBAL_GROUP; + break; + case GTYPE_DISTRIBUTION_DOMAIN_LOCAL_GROUP: + atype = ATYPE_DISTRIBUTION_LOCAL_GROUP; + break; + case GTYPE_DISTRIBUTION_UNIVERSAL_GROUP: + atype = ATYPE_DISTRIBUTION_UNIVERSAL_GROUP; + break; + } + + return atype; +} + +/* turn a sAMAccountType into a SID_NAME_USE */ +enum lsa_SidType ds_atype_map(uint32_t atype) +{ + switch (atype & 0xF0000000) { + case ATYPE_GLOBAL_GROUP: + return SID_NAME_DOM_GRP; + case ATYPE_SECURITY_LOCAL_GROUP: + return SID_NAME_ALIAS; + case ATYPE_ACCOUNT: + return SID_NAME_USER; + default: + DEBUG(1,("hmm, need to map account type 0x%x\n", atype)); + } + return SID_NAME_UNKNOWN; +} + +/* get the default primary group RID for a given userAccountControl + * (information according to MS-SAMR 3.1.1.8.1) */ +uint32_t ds_uf2prim_group_rid(uint32_t uf) +{ + uint32_t prim_group_rid = DOMAIN_RID_USERS; + + if ((uf & UF_PARTIAL_SECRETS_ACCOUNT) + && (uf & UF_WORKSTATION_TRUST_ACCOUNT)) prim_group_rid = DOMAIN_RID_READONLY_DCS; + else if (uf & UF_SERVER_TRUST_ACCOUNT) prim_group_rid = DOMAIN_RID_DCS; + else if (uf & UF_WORKSTATION_TRUST_ACCOUNT) prim_group_rid = DOMAIN_RID_DOMAIN_MEMBERS; + + return prim_group_rid; +} + +const char *dsdb_user_account_control_flag_bit_to_string(uint32_t uf) +{ + switch (uf) { + case UF_SCRIPT: + return "UF_SCRIPT"; + break; + case UF_ACCOUNTDISABLE: + return "UF_ACCOUNTDISABLE"; + break; + case UF_00000004: + return "UF_00000004"; + break; + case UF_HOMEDIR_REQUIRED: + return "UF_HOMEDIR_REQUIRED"; + break; + case UF_LOCKOUT: + return "UF_LOCKOUT"; + break; + case UF_PASSWD_NOTREQD: + return "UF_PASSWD_NOTREQD"; + break; + case UF_PASSWD_CANT_CHANGE: + return "UF_PASSWD_CANT_CHANGE"; + break; + case UF_ENCRYPTED_TEXT_PASSWORD_ALLOWED: + return "UF_ENCRYPTED_TEXT_PASSWORD_ALLOWED"; + break; + + case UF_TEMP_DUPLICATE_ACCOUNT: + return "UF_TEMP_DUPLICATE_ACCOUNT"; + break; + case UF_NORMAL_ACCOUNT: + return "UF_NORMAL_ACCOUNT"; + break; + case UF_00000400: + return "UF_00000400"; + break; + case UF_INTERDOMAIN_TRUST_ACCOUNT: + return "UF_INTERDOMAIN_TRUST_ACCOUNT"; + break; + + case UF_WORKSTATION_TRUST_ACCOUNT: + return "UF_WORKSTATION_TRUST_ACCOUNT"; + break; + case UF_SERVER_TRUST_ACCOUNT: + return "UF_SERVER_TRUST_ACCOUNT"; + break; + case UF_00004000: + return "UF_00004000"; + break; + case UF_00008000: + return "UF_00008000"; + break; + + case UF_DONT_EXPIRE_PASSWD: + return "UF_DONT_EXPIRE_PASSWD"; + break; + case UF_MNS_LOGON_ACCOUNT: + return "UF_MNS_LOGON_ACCOUNT"; + break; + case UF_SMARTCARD_REQUIRED: + return "UF_SMARTCARD_REQUIRED"; + break; + case UF_TRUSTED_FOR_DELEGATION: + return "UF_TRUSTED_FOR_DELEGATION"; + break; + + case UF_NOT_DELEGATED: + return "UF_NOT_DELEGATED"; + break; + case UF_USE_DES_KEY_ONLY: + return "UF_USE_DES_KEY_ONLY"; + break; + case UF_DONT_REQUIRE_PREAUTH: + return "UF_DONT_REQUIRE_PREAUTH"; + break; + case UF_PASSWORD_EXPIRED: + return "UF_PASSWORD_EXPIRED"; + break; + case UF_TRUSTED_TO_AUTHENTICATE_FOR_DELEGATION: + return "UF_TRUSTED_TO_AUTHENTICATE_FOR_DELEGATION"; + break; + case UF_NO_AUTH_DATA_REQUIRED: + return "UF_NO_AUTH_DATA_REQUIRED"; + break; + case UF_PARTIAL_SECRETS_ACCOUNT: + return "UF_PARTIAL_SECRETS_ACCOUNT"; + break; + case UF_USE_AES_KEYS: + return "UF_USE_AES_KEYS"; + break; + default: + break; + } + return NULL; +} diff --git a/libds/common/flag_mapping.h b/libds/common/flag_mapping.h new file mode 100644 index 0000000..f08d559 --- /dev/null +++ b/libds/common/flag_mapping.h @@ -0,0 +1,36 @@ +/* + Unix SMB/CIFS implementation. + helper mapping functions for the UF and ACB flags + + Copyright (C) Stefan (metze) Metzmacher 2002 + Copyright (C) Andrew Tridgell 2004 + Copyright (C) Matthias Dieter Wallnöfer 2010 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +#ifndef __LIBDS_COMMON_FLAG_MAPPING_H__ +#define __LIBDS_COMMON_FLAG_MAPPING_H__ + +/* The following definitions come from flag_mapping.c */ + +uint32_t ds_acb2uf(uint32_t acb); +uint32_t ds_uf2acb(uint32_t uf); +uint32_t ds_uf2atype(uint32_t uf); +uint32_t ds_gtype2atype(uint32_t gtype); +enum lsa_SidType ds_atype_map(uint32_t atype); +uint32_t ds_uf2prim_group_rid(uint32_t uf); +const char *dsdb_user_account_control_flag_bit_to_string(uint32_t uf); + +#endif /* __LIBDS_COMMON_FLAG_MAPPING_H__ */ diff --git a/libds/common/flags.h b/libds/common/flags.h new file mode 100644 index 0000000..e8e5d62 --- /dev/null +++ b/libds/common/flags.h @@ -0,0 +1,309 @@ +/* + Unix SMB/CIFS implementation. + User/Group specific flags + + Copyright (C) Andrew Tridgell 2001-2003 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +/* Please keep this list in sync with the flag_mapping.c and pydsdb.c */ + +/* User flags for "userAccountControl" */ +#define UF_SCRIPT 0x00000001 /* NT or Lan Manager Login script must be executed */ +#define UF_ACCOUNTDISABLE 0x00000002 +#define UF_00000004 0x00000004 +#define UF_HOMEDIR_REQUIRED 0x00000008 + +#define UF_LOCKOUT 0x00000010 +#define UF_PASSWD_NOTREQD 0x00000020 +#define UF_PASSWD_CANT_CHANGE 0x00000040 +#define UF_ENCRYPTED_TEXT_PASSWORD_ALLOWED 0x00000080 + +#define UF_TEMP_DUPLICATE_ACCOUNT 0x00000100 /* Local user account in usrmgr */ +#define UF_NORMAL_ACCOUNT 0x00000200 +#define UF_00000400 0x00000400 +#define UF_INTERDOMAIN_TRUST_ACCOUNT 0x00000800 + +#define UF_WORKSTATION_TRUST_ACCOUNT 0x00001000 +#define UF_SERVER_TRUST_ACCOUNT 0x00002000 +#define UF_00004000 0x00004000 +#define UF_00008000 0x00008000 + +#define UF_DONT_EXPIRE_PASSWD 0x00010000 +#define UF_MNS_LOGON_ACCOUNT 0x00020000 +#define UF_SMARTCARD_REQUIRED 0x00040000 +#define UF_TRUSTED_FOR_DELEGATION 0x00080000 + +#define UF_NOT_DELEGATED 0x00100000 +#define UF_USE_DES_KEY_ONLY 0x00200000 +#define UF_DONT_REQUIRE_PREAUTH 0x00400000 +#define UF_PASSWORD_EXPIRED 0x00800000 +#define UF_TRUSTED_TO_AUTHENTICATE_FOR_DELEGATION 0x01000000 +#define UF_NO_AUTH_DATA_REQUIRED 0x02000000 +#define UF_PARTIAL_SECRETS_ACCOUNT 0x04000000 +#define UF_USE_AES_KEYS 0x08000000 + +/* Please keep this list in sync with the flag_mapping.c and pydsdb.c */ + + +#define UF_TRUST_ACCOUNT_MASK (\ + UF_INTERDOMAIN_TRUST_ACCOUNT |\ + UF_WORKSTATION_TRUST_ACCOUNT |\ + UF_SERVER_TRUST_ACCOUNT \ + ) + +#define UF_ACCOUNT_TYPE_MASK (\ + UF_TEMP_DUPLICATE_ACCOUNT |\ + UF_NORMAL_ACCOUNT |\ + UF_INTERDOMAIN_TRUST_ACCOUNT |\ + UF_WORKSTATION_TRUST_ACCOUNT |\ + UF_SERVER_TRUST_ACCOUNT \ + ) + +/* + * MS-SAMR 2.2.1.13 UF_FLAG Codes states that some bits are ignored by + * clients and servers. Other flags (like UF_LOCKOUT have special + * behaviours, but are not set in the traditional sense). + * + * See the samldb module for the use of this define. + */ + +#define UF_SETTABLE_BITS (\ + UF_ACCOUNTDISABLE |\ + UF_HOMEDIR_REQUIRED |\ + UF_PASSWD_NOTREQD |\ + UF_ACCOUNT_TYPE_MASK | \ + UF_DONT_EXPIRE_PASSWD | \ + UF_MNS_LOGON_ACCOUNT |\ + UF_ENCRYPTED_TEXT_PASSWORD_ALLOWED |\ + UF_SMARTCARD_REQUIRED |\ + UF_TRUSTED_FOR_DELEGATION |\ + UF_NOT_DELEGATED |\ + UF_USE_DES_KEY_ONLY |\ + UF_DONT_REQUIRE_PREAUTH |\ + UF_TRUSTED_TO_AUTHENTICATE_FOR_DELEGATION |\ + UF_NO_AUTH_DATA_REQUIRED |\ + UF_PARTIAL_SECRETS_ACCOUNT |\ + UF_USE_AES_KEYS \ + ) + +/* Group flags for "groupType" */ +#define GROUP_TYPE_BUILTIN_LOCAL_GROUP 0x00000001 +#define GROUP_TYPE_ACCOUNT_GROUP 0x00000002 +#define GROUP_TYPE_RESOURCE_GROUP 0x00000004 +#define GROUP_TYPE_UNIVERSAL_GROUP 0x00000008 +#define GROUP_TYPE_APP_BASIC_GROUP 0x00000010 +#define GROUP_TYPE_APP_QUERY_GROUP 0x00000020 +#define GROUP_TYPE_SECURITY_ENABLED 0x80000000 + +#define GTYPE_SECURITY_BUILTIN_LOCAL_GROUP ( \ + /* 0x80000005 -2147483643 */ \ + GROUP_TYPE_BUILTIN_LOCAL_GROUP| \ + GROUP_TYPE_RESOURCE_GROUP| \ + GROUP_TYPE_SECURITY_ENABLED \ + ) +#define GTYPE_SECURITY_DOMAIN_LOCAL_GROUP ( \ + /* 0x80000004 -2147483644 */ \ + GROUP_TYPE_RESOURCE_GROUP| \ + GROUP_TYPE_SECURITY_ENABLED \ + ) +#define GTYPE_SECURITY_GLOBAL_GROUP ( \ + /* 0x80000002 -2147483646 */ \ + GROUP_TYPE_ACCOUNT_GROUP| \ + GROUP_TYPE_SECURITY_ENABLED \ + ) +#define GTYPE_SECURITY_UNIVERSAL_GROUP ( \ + /* 0x80000008 -2147483640 */ \ + GROUP_TYPE_UNIVERSAL_GROUP| \ + GROUP_TYPE_SECURITY_ENABLED \ + ) +#define GTYPE_DISTRIBUTION_GLOBAL_GROUP 0x00000002 /* 2 */ +#define GTYPE_DISTRIBUTION_DOMAIN_LOCAL_GROUP 0x00000004 /* 4 */ +#define GTYPE_DISTRIBUTION_UNIVERSAL_GROUP 0x00000008 /* 8 */ + +/* Account flags for "sAMAccountType" */ +#define ATYPE_NORMAL_ACCOUNT 0x30000000 /* 805306368 */ +#define ATYPE_WORKSTATION_TRUST 0x30000001 /* 805306369 */ +#define ATYPE_INTERDOMAIN_TRUST 0x30000002 /* 805306370 */ +#define ATYPE_SECURITY_GLOBAL_GROUP 0x10000000 /* 268435456 */ +#define ATYPE_SECURITY_LOCAL_GROUP 0x20000000 /* 536870912 */ +#define ATYPE_SECURITY_UNIVERSAL_GROUP ATYPE_SECURITY_GLOBAL_GROUP +#define ATYPE_DISTRIBUTION_GLOBAL_GROUP 0x10000001 /* 268435457 */ +#define ATYPE_DISTRIBUTION_LOCAL_GROUP 0x20000001 /* 536870913 */ +#define ATYPE_DISTRIBUTION_UNIVERSAL_GROUP ATYPE_DISTRIBUTION_GLOBAL_GROUP + +#define ATYPE_ACCOUNT ATYPE_NORMAL_ACCOUNT /* 0x30000000 805306368 */ +#define ATYPE_GLOBAL_GROUP ATYPE_SECURITY_GLOBAL_GROUP /* 0x10000000 268435456 */ +#define ATYPE_LOCAL_GROUP ATYPE_SECURITY_LOCAL_GROUP /* 0x20000000 536870912 */ + +/* "instanceType" */ +#define INSTANCE_TYPE_IS_NC_HEAD 0x00000001 +#define INSTANCE_TYPE_UNINSTANT 0x00000002 +#define INSTANCE_TYPE_WRITE 0x00000004 +#define INSTANCE_TYPE_NC_ABOVE 0x00000008 +#define INSTANCE_TYPE_NC_COMING 0x00000010 +#define INSTANCE_TYPE_NC_GOING 0x00000020 + +/* "systemFlags" */ +#define SYSTEM_FLAG_CR_NTDS_NC 0x00000001 +#define SYSTEM_FLAG_CR_NTDS_DOMAIN 0x00000002 +#define SYSTEM_FLAG_CR_NTDS_NOT_GC_REPLICATED 0x00000004 +#define SYSTEM_FLAG_SCHEMA_BASE_OBJECT 0x00000010 +#define SYSTEM_FLAG_ATTR_IS_RDN 0x00000020 +#define SYSTEM_FLAG_DISALLOW_MOVE_ON_DELETE 0x02000000 +#define SYSTEM_FLAG_DOMAIN_DISALLOW_MOVE 0x04000000 +#define SYSTEM_FLAG_DOMAIN_DISALLOW_RENAME 0x08000000 +#define SYSTEM_FLAG_CONFIG_ALLOW_LIMITED_MOVE 0x10000000 +#define SYSTEM_FLAG_CONFIG_ALLOW_MOVE 0x20000000 +#define SYSTEM_FLAG_CONFIG_ALLOW_RENAME 0x40000000 +#define SYSTEM_FLAG_DISALLOW_DELETE 0x80000000 + +/* schemaFlags_Ex */ +#define SCHEMA_FLAG_ATTR_IS_CRITICAL 0x0000001 + +/* "searchFlags" */ +#define SEARCH_FLAG_ATTINDEX 0x0000001 +#define SEARCH_FLAG_PDNTATTINDEX 0x0000002 +#define SEARCH_FLAG_ANR 0x0000004 +#define SEARCH_FLAG_PRESERVEONDELETE 0x0000008 +#define SEARCH_FLAG_COPY 0x0000010 +#define SEARCH_FLAG_TUPLEINDEX 0x0000020 +#define SEARCH_FLAG_SUBTREEATTRINDEX 0x0000040 +#define SEARCH_FLAG_CONFIDENTIAL 0x0000080 +#define SEARCH_FLAG_NEVERVALUEAUDIT 0x0000100 +#define SEARCH_FLAG_RODC_ATTRIBUTE 0x0000200 + +/* "domainFunctionality", "forestFunctionality" and "domainControllerFunctionality" in the rootDSE */ +#define DS_DOMAIN_FUNCTION_2000 0 +#define DS_DOMAIN_FUNCTION_2003_MIXED 1 /* Not a valid/meaningful + * domainControllerFunctionality + * Level */ +#define DS_DOMAIN_FUNCTION_2003 2 +#define DS_DOMAIN_FUNCTION_2008 3 +#define DS_DOMAIN_FUNCTION_2008_R2 4 +#define DS_DOMAIN_FUNCTION_2012 5 +#define DS_DOMAIN_FUNCTION_2012_R2 6 +#define DS_DOMAIN_FUNCTION_2016 7 + +/* sa->systemFlags on attributes */ +#define DS_FLAG_ATTR_NOT_REPLICATED 0x00000001 +#define DS_FLAG_ATTR_REQ_PARTIAL_SET_MEMBER 0x00000002 +#define DS_FLAG_ATTR_IS_CONSTRUCTED 0x00000004 + +/* 7.1.1.2.2.1.1 nTDSSiteSettings Object options */ +#define DS_NTDSSETTINGS_OPT_IS_AUTO_TOPOLOGY_DISABLED 0x00000001 +#define DS_NTDSSETTINGS_OPT_IS_TOPL_CLEANUP_DISABLED 0x00000002 +#define DS_NTDSSETTINGS_OPT_IS_TOPL_MIN_HOPS_DISABLED 0x00000004 +#define DS_NTDSSETTINGS_OPT_IS_TOPL_DETECT_STALE_DISABLED 0x00000008 +#define DS_NTDSSETTINGS_OPT_IS_INTER_SITE_AUTO_TOPOLOGY_DISABLED 0x00000010 +#define DS_NTDSSETTINGS_OPT_IS_GROUP_CACHING_ENABLED 0x00000020 +#define DS_NTDSSETTINGS_OPT_FORCE_KCC_WHISTLER_BEHAVIOR 0x00000040 +#define DS_NTDSSETTINGS_OPT_IS_RAND_BH_SELECTION_DISABLED 0x00000100 +#define DS_NTDSSETTINGS_OPT_IS_SCHEDULE_HASHING_ENABLED 0x00000200 +#define DS_NTDSSETTINGS_OPT_IS_REDUNDANT_SERVER_TOPOLOGY_ENABLED 0x00000400 + +/* 7.1.1.2.2.1.2.1.1 nTDSDSA Object options flags */ +#define DS_NTDSDSA_OPT_IS_GC 0x00000001 +#define DS_NTDSDSA_OPT_DISABLE_INBOUND_REPL 0x00000002 +#define DS_NTDSDSA_OPT_DISABLE_OUTBOUND_REPL 0x00000004 +#define DS_NTDSDSA_OPT_DISABLE_NTDSCONN_XLATE 0x00000008 +#define DS_NTDSDSA_OPT_DISABLE_SPN_REGISTRATION 0x00000010 + +/* wellknown GUID strings for AD objects. See MS-ADTS 7.1.1.4 */ +#define DS_GUID_COMPUTERS_CONTAINER "AA312825768811D1ADED00C04FD8D5CD" +#define DS_GUID_DELETED_OBJECTS_CONTAINER "18E2EA80684F11D2B9AA00C04F79F805" +#define DS_GUID_DOMAIN_CONTROLLERS_CONTAINER "A361B2FFFFD211D1AA4B00C04FD7D83A" +#define DS_GUID_FOREIGNSECURITYPRINCIPALS_CONTAINER "22B70C67D56E4EFB91E9300FCA3DC1AA" +#define DS_GUID_INFRASTRUCTURE_CONTAINER "2FBAC1870ADE11D297C400C04FD8D5CD" +#define DS_GUID_LOSTANDFOUND_CONTAINER "AB8153B7768811D1ADED00C04FD8D5CD" +#define DS_GUID_MICROSOFT_PROGRAM_DATA_CONTAINER "F4BE92A4C777485E878E9421D53087DB" +#define DS_GUID_NTDS_QUOTAS_CONTAINER "6227F0AF1FC2410D8E3BB10615BB5B0F" +#define DS_GUID_PROGRAM_DATA_CONTAINER "09460C08AE1E4A4EA0F64AEE7DAA1E5A" +#define DS_GUID_SYSTEMS_CONTAINER "AB1D30F3768811D1ADED00C04FD8D5CD" +#define DS_GUID_USERS_CONTAINER "A9D1CA15768811D1ADED00C04FD8D5CD" +#define DS_GUID_MANAGED_SERVICE_ACCOUNTS_CONTAINER "1EB93889E40C45DF9F0C64D23BBB6237" + +/* wellknown GUIDs for optional directory features */ +#define DS_GUID_FEATURE_RECYCLE_BIN "766ddcd8-acd0-445e-f3b9-a7f9b6744f2a" + +/* GUIDs for AD schema attributes and classes */ +#define DS_GUID_SCHEMA_ATTR_DEPARTMENT "bf96794f-0de6-11d0-a285-00aa003049e2" +#define DS_GUID_SCHEMA_ATTR_DNS_HOST_NAME "72e39547-7b18-11d1-adef-00c04fd8d5cd" +#define DS_GUID_SCHEMA_ATTR_INSTANCE_TYPE "bf96798c-0de6-11d0-a285-00aa003049e2" +#define DS_GUID_SCHEMA_ATTR_MS_SFU_30 "16c5d1d3-35c2-4061-a870-a5cefda804f0" +#define DS_GUID_SCHEMA_ATTR_NT_SECURITY_DESCRIPTOR "bf9679e3-0de6-11d0-a285-00aa003049e2" +#define DS_GUID_SCHEMA_ATTR_PRIMARY_GROUP_ID "bf967a00-0de6-11d0-a285-00aa003049e2" +#define DS_GUID_SCHEMA_ATTR_SERVICE_PRINCIPAL_NAME "f3a64788-5306-11d1-a9c5-0000f80367c1" +#define DS_GUID_SCHEMA_ATTR_USER_ACCOUNT_CONTROL "bf967a68-0de6-11d0-a285-00aa003049e2" +#define DS_GUID_SCHEMA_ATTR_USER_PASSWORD "bf967a6e-0de6-11d0-a285-00aa003049e2" +#define DS_GUID_SCHEMA_CLASS_COMPUTER "bf967a86-0de6-11d0-a285-00aa003049e2" +#define DS_GUID_SCHEMA_CLASS_MANAGED_SERVICE_ACCOUNT "ce206244-5827-4a86-ba1c-1c0c386c1b64" +#define DS_GUID_SCHEMA_CLASS_USER "bf967aba-0de6-11d0-a285-00aa003049e2" + +/* dsHeuristics character indexes see MS-ADTS 7.1.1.2.4.1.2 */ + +#define DS_HR_SUPFIRSTLASTANR 0x00000001 +#define DS_HR_SUPLASTFIRSTANR 0x00000002 +#define DS_HR_DOLISTOBJECT 0x00000003 +#define DS_HR_DONICKRES 0x00000004 +#define DS_HR_LDAP_USEPERMMOD 0x00000005 +#define DS_HR_HIDEDSID 0x00000006 +#define DS_HR_BLOCK_ANONYMOUS_OPS 0x00000007 +#define DS_HR_ALLOW_ANON_NSPI 0x00000008 +#define DS_HR_USER_PASSWORD_SUPPORT 0x00000009 +#define DS_HR_TENTH_CHAR 0x0000000A +#define DS_HR_SPECIFY_GUID_ON_ADD 0x0000000B +#define DS_HR_NO_STANDARD_SD 0x0000000C +#define DS_HR_ALLOW_NONSECURE_PWD_OPS 0x0000000D +#define DS_HR_NO_PROPAGATE_ON_NOCHANGE 0x0000000E +#define DS_HR_COMPUTE_ANR_STATS 0x0000000F +#define DS_HR_ADMINSDEXMASK 0x00000010 +#define DS_HR_KVNOEMUW2K 0x00000011 + +#define DS_HR_TWENTIETH_CHAR 0x00000014 +#define DS_HR_ATTR_AUTHZ_ON_LDAP_ADD 0x0000001C +#define DS_HR_BLOCK_OWNER_IMPLICIT_RIGHTS 0x0000001D +#define DS_HR_THIRTIETH_CHAR 0x0000001E +#define DS_HR_FOURTIETH_CHAR 0x00000028 +#define DS_HR_FIFTIETH_CHAR 0x00000032 +#define DS_HR_SIXTIETH_CHAR 0x0000003C +#define DS_HR_SEVENTIETH_CHAR 0x00000046 +#define DS_HR_EIGHTIETH_CHAR 0x00000050 +#define DS_HR_NINETIETH_CHAR 0x0000005A + +/* mS-DS-ReplicatesNCReason */ +#define NTDSCONN_KCC_GC_TOPOLOGY 0x00000001 +#define NTDSCONN_KCC_RING_TOPOLOGY 0x00000002 +#define NTDSCONN_KCC_MINIMIZE_HOPS_TOPOLOGY 0x00000004 +#define NTDSCONN_KCC_STALE_SERVERS_TOPOLOGY 0x00000008 +#define NTDSCONN_KCC_OSCILLATING_CONNECTION_TOPOLOGY 0x00000010 +#define NTDSCONN_KCC_INTERSITE_GC_TOPOLOGY 0x00000020 +#define NTDSCONN_KCC_INTERSITE_TOPOLOGY 0x00000040 +#define NTDSCONN_KCC_SERVER_FAILOVER_TOPOLOGY 0x00000080 +#define NTDSCONN_KCC_SITE_FAILOVER_TOPOLOGY 0x00000100 +#define NTDSCONN_KCC_REDUNDANT_SERVER_TOPOLOGY 0x00000200 + +#define NTDSCONN_OPT_IS_GENERATED 0x00000001 +#define NTDSCONN_OPT_TWOWAY_SYNC 0x00000002 +#define NTDSCONN_OPT_OVERRIDE_NOTIFY_DEFAULT 0x00000004 +#define NTDSCONN_OPT_USE_NOTIFY 0x00000008 +#define NTDSCONN_OPT_DISABLE_INTERSITE_COMPRESSION 0x00000010 +#define NTDSCONN_OPT_USER_OWNED_SCHEDULE 0x00000020 +#define NTDSCONN_OPT_RODC_TOPOLOGY 0x00000040 + +/* 7.1.1.2.2.3.3 Site Link Object options flags */ +#define NTDSSITELINK_OPT_USE_NOTIFY 0x00000001 +#define NTDSSITELINK_OPT_TWOWAY_SYNC 0x00000002 +#define NTDSSITELINK_OPT_DISABLE_COMPRESSION 0x00000004 diff --git a/libds/common/roles.h b/libds/common/roles.h new file mode 100644 index 0000000..03ba191 --- /dev/null +++ b/libds/common/roles.h @@ -0,0 +1,82 @@ +/* + Unix SMB/CIFS implementation. + + domain roles + + Copyright (C) Andrew Tridgell 2011 + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation; either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. +*/ + +#ifndef _LIBDS_ROLES_H_ +#define _LIBDS_ROLES_H_ + +/* server roles. If you add new roles, please keep ensure that the + * existing role values match samr_Role from samr.idl + */ +enum server_role { + ROLE_STANDALONE = 0, + ROLE_DOMAIN_MEMBER = 1, + ROLE_DOMAIN_BDC = 2, + ROLE_DOMAIN_PDC = 3, + + /* not in samr.idl */ + ROLE_ACTIVE_DIRECTORY_DC = 4, + ROLE_IPA_DC = 5, + + /* To determine the role automatically, this is not a valid role */ + ROLE_AUTO = 100 +}; + +/* security levels for 'security =' option + + -------------- + / \ + / REST \ + / IN \ + / PEACE \ + / \ + | SEC_SHARE | + | security=share | + | | + | | + | 5 March | + | | + | 2012 | + *| * * * | * + _________)/\\_//(\/(/\)/\//\/\///|_)_______ + + -------------- + / \ + / REST \ + / IN \ + / PEACE \ + / \ + | SEC_SERVER | + | security=server | + | | + | | + | 12 May | + | | + | 2012 | + *| * * * | * + _________)/\\_//(\/(/\)/\//\/\///|_)_______ + +*/ +enum security_types {SEC_AUTO = 0, + SEC_USER = 2, + SEC_DOMAIN = 4, + SEC_ADS = 5}; + +#endif /* _LIBDS_ROLES_H_ */ diff --git a/libds/common/wscript_build b/libds/common/wscript_build new file mode 100644 index 0000000..3da3be2 --- /dev/null +++ b/libds/common/wscript_build @@ -0,0 +1,7 @@ + +bld.SAMBA_LIBRARY('flag_mapping', + public_deps='talloc replace', + source='flag_mapping.c', + private_library=True, + private_headers='roles.h', + deps='samba-util') |