#include "includes.h"
#define WINS_LIST "wins.tdb"
#define WINS_VERSION 1
static void update_wins_owner(struct name_record *namerec, struct in_addr wins_ip)
{
if (namerec==NULL)
return;
namerec->data.wins_ip=wins_ip;
}
static void update_wins_flag(struct name_record *namerec, int flags)
{
if (namerec==NULL)
return;
namerec->data.wins_flags=0x0;
if (namerec->data.nb_flags & NB_GROUP) {
if (namerec->name.name_type==0x1C)
namerec->data.wins_flags|=WINS_SGROUP;
else
if (namerec->data.num_ips>1)
namerec->data.wins_flags|=WINS_SGROUP;
else
namerec->data.wins_flags|=WINS_NGROUP;
} else {
if (namerec->data.num_ips>1)
namerec->data.wins_flags|=WINS_MHOMED;
else
namerec->data.wins_flags|=WINS_UNIQUE;
}
namerec->data.wins_flags|=namerec->data.nb_flags&NB_NODETYPEMASK;
if (namerec->data.death_time == PERMANENT_TTL)
namerec->data.wins_flags|=WINS_STATIC;
namerec->data.wins_flags|=flags;
DEBUG(8,("update_wins_flag: nbflags: 0x%x, ttl: 0x%d, flags: 0x%x, winsflags: 0x%x\n",
namerec->data.nb_flags, (int)namerec->data.death_time, flags, namerec->data.wins_flags));
}
static void get_global_id_and_update(SMB_BIG_UINT *current_id, BOOL update)
{
static SMB_BIG_UINT general_id = 1;
DEBUG(5,("get_global_id_and_update: updating version ID: %d\n", (int)general_id));
*current_id = general_id;
if (update)
general_id++;
}
static void wins_hook(const char *operation, struct name_record *namerec, int ttl)
{
pstring command;
char *cmd = lp_wins_hook();
char *p;
int i;
if (!cmd || !*cmd) return;
for (p=namerec->name.name; *p; p++) {
if (!(isalnum((int)*p) || strchr_m("._-",*p))) {
DEBUG(3,("not calling wins hook for invalid name %s\n", nmb_namestr(&namerec->name)));
return;
}
}
p = command;
p += slprintf(p, sizeof(command)-1, "%s %s %s %02x %d",
cmd,
operation,
namerec->name.name,
namerec->name.name_type,
ttl);
for (i=0;i<namerec->data.num_ips;i++) {
p += slprintf(p, sizeof(command) - (p-command) -1, " %s", inet_ntoa(namerec->data.ip[i]));
}
DEBUG(3,("calling wins hook for %s\n", nmb_namestr(&namerec->name)));
smbrun(command, NULL);
}
BOOL packet_is_for_wins_server(struct packet_struct *packet)
{
struct nmb_packet *nmb = &packet->packet.nmb;
if((wins_server_subnet == NULL) || (nmb->header.nm_flags.bcast == True))
{
DEBUG(10, ("packet_is_for_wins_server: failing WINS test #1.\n"));
return False;
}
if (nmb->question.question_type != QUESTION_TYPE_NB_QUERY)
return False;
switch(nmb->header.opcode)
{
case NMB_WACK_OPCODE:
DEBUG(10, ("packet_is_for_wins_server: failing WINS test #2 (WACK).\n"));
return False;
case NMB_NAME_REG_OPCODE:
case NMB_NAME_MULTIHOMED_REG_OPCODE:
case NMB_NAME_REFRESH_OPCODE_8:
case NMB_NAME_REFRESH_OPCODE_9:
if(nmb->header.response)
{
DEBUG(10, ("packet_is_for_wins_server: failing WINS test #3 (response = 1).\n"));
return False;
}
break;
case NMB_NAME_RELEASE_OPCODE:
if(nmb->header.response)
{
DEBUG(10, ("packet_is_for_wins_server: failing WINS test #4 (response = 1).\n"));
return False;
}
break;
case NMB_NAME_QUERY_OPCODE:
if(!nmb->header.response && !nmb->header.nm_flags.recursion_desired)
{
DEBUG(10, ("packet_is_for_wins_server: failing WINS test #5 (response = 1).\n"));
return False;
}
break;
}
return True;
}
static int get_ttl_from_packet(struct nmb_packet *nmb)
{
int ttl = nmb->additional->ttl;
if(ttl < lp_min_wins_ttl() )
ttl = lp_min_wins_ttl();
if(ttl > lp_max_wins_ttl() )
ttl = lp_max_wins_ttl();
return ttl;
}
BOOL initialise_wins(void)
{
time_t time_now = time(NULL);
TDB_CONTEXT *tdb;
TDB_DATA kbuf, dbuf, newkey;
struct name_record *namerec = NULL;
struct in_addr our_fake_ip = *interpret_addr2("0.0.0.0");
DEBUG(2,("initialise_wins: started\n"));
if(!lp_we_are_a_wins_server())
return True;
add_samba_names_to_subnet(wins_server_subnet);
tdb = tdb_open_log(lock_path(WINS_LIST), 0, TDB_DEFAULT, O_RDONLY, 0600);
if (!tdb) {
DEBUG(2,("initialise_wins: Can't open wins database file %s. Error was %s\n", WINS_LIST, strerror(errno) ));
return True;
}
if (tdb_fetch_int32(tdb, INFO_VERSION) != WINS_VERSION) {
DEBUG(0,("Discarding invalid wins.dat file\n"));
tdb_close(tdb);
return True;
}
for (kbuf = tdb_firstkey(tdb);
kbuf.dptr;
newkey = tdb_nextkey(tdb, kbuf), safe_free(kbuf.dptr), kbuf=newkey) {
fstring name_type;
pstring name, ip_str;
char *p;
int type = 0;
int nb_flags;
int ttl;
unsigned int num_ips;
int high, low;
struct in_addr wins_ip;
struct in_addr *ip_list;
int wins_flags;
int len,i;
if (strncmp(kbuf.dptr, ENTRY_PREFIX, strlen(ENTRY_PREFIX)) != 0)
continue;
dbuf = tdb_fetch(tdb, kbuf);
if (!dbuf.dptr)
continue;
fstrcpy(name_type, kbuf.dptr+strlen(ENTRY_PREFIX));
pstrcpy(name, name_type);
if((p = strchr(name,'#')) != NULL) {
*p = 0;
sscanf(p+1,"%x",&type);
}
len = tdb_unpack(dbuf.dptr, dbuf.dsize, "dddfddd",
&nb_flags, &high, &low,
ip_str, &ttl, &num_ips, &wins_flags);
wins_ip=*interpret_addr2(ip_str);
if (!ip_equal(wins_ip, our_fake_ip)) {
SAFE_FREE(dbuf.dptr);
continue;
}
if ((wins_flags&WINS_STATE_MASK) != WINS_ACTIVE) {
SAFE_FREE(dbuf.dptr);
continue;
}
if((ip_list = (struct in_addr *)malloc( num_ips * sizeof(struct in_addr))) == NULL) {
SAFE_FREE(dbuf.dptr);
DEBUG(0,("initialise_wins: Malloc fail !\n"));
return False;
}
for (i = 0; i < num_ips; i++) {
len += tdb_unpack(dbuf.dptr+len, dbuf.dsize-len, "f", ip_str);
ip_list[i] = *interpret_addr2(ip_str);
}
if ((ttl - 60) > time_now || ttl == PERMANENT_TTL) {
if(ttl != PERMANENT_TTL)
ttl -= time_now;
DEBUG( 4, ("initialise_wins: add name: %s#%02x ttl = %d first IP %s flags = %2x\n",
name, type, ttl, inet_ntoa(ip_list[0]), nb_flags));
namerec=add_name_to_subnet( wins_server_subnet, name, type, nb_flags,
ttl, REGISTER_NAME, num_ips, ip_list);
if (namerec!=NULL) {
update_wins_owner(namerec, wins_ip);
update_wins_flag(namerec, wins_flags);
get_global_id_and_update(&namerec->data.id, True);
}
} else {
DEBUG(4, ("initialise_wins: not adding name (ttl problem) %s#%02x ttl = %d first IP %s flags = %2x\n",
name, type, ttl, inet_ntoa(ip_list[0]), nb_flags));
}
SAFE_FREE(dbuf.dptr);
SAFE_FREE(ip_list);
}
tdb_close(tdb);
DEBUG(2,("initialise_wins: done\n"));
return True;
}
static void send_wins_wack_response(int ttl, struct packet_struct *p)
{
struct nmb_packet *nmb = &p->packet.nmb;
unsigned char rdata[2];
rdata[0] = rdata[1] = 0;
rdata[0] = (nmb->header.opcode & 0xF) << 3;
if (nmb->header.nm_flags.authoritative &&
nmb->header.response) rdata[0] |= 0x4;
if (nmb->header.nm_flags.trunc) rdata[0] |= 0x2;
if (nmb->header.nm_flags.recursion_desired) rdata[0] |= 0x1;
if (nmb->header.nm_flags.recursion_available &&
nmb->header.response) rdata[1] |= 0x80;
if (nmb->header.nm_flags.bcast) rdata[1] |= 0x10;
reply_netbios_packet(p,
0,
NMB_WAIT_ACK,
NMB_WACK_OPCODE,
ttl,
(char *)rdata,
2);
}
static void send_wins_name_registration_response(int rcode, int ttl, struct packet_struct *p)
{
struct nmb_packet *nmb = &p->packet.nmb;
char rdata[6];
memcpy(&rdata[0], &nmb->additional->rdata[0], 6);
reply_netbios_packet(p,
rcode,
WINS_REG,
NMB_NAME_REG_OPCODE,
ttl,
rdata,
6);
}
void wins_process_name_refresh_request(struct subnet_record *subrec,
struct packet_struct *p)
{
struct nmb_packet *nmb = &p->packet.nmb;
struct nmb_name *question = &nmb->question.question_name;
BOOL bcast = nmb->header.nm_flags.bcast;
uint16 nb_flags = get_nb_flags(nmb->additional->rdata);
BOOL group = (nb_flags & NB_GROUP) ? True : False;
struct name_record *namerec = NULL;
int ttl = get_ttl_from_packet(nmb);
struct in_addr from_ip;
struct in_addr our_fake_ip = *interpret_addr2("0.0.0.0");
putip((char *)&from_ip,&nmb->additional->rdata[2]);
if(bcast)
{
DEBUG(0,("wins_process_name_refresh_request: broadcast name refresh request \
received for name %s from IP %s on subnet %s. Error - should not be sent to WINS server\n",
nmb_namestr(question), inet_ntoa(from_ip), subrec->subnet_name));
return;
}
DEBUG(3,("wins_process_name_refresh_request: Name refresh for name %s \
IP %s\n", nmb_namestr(question), inet_ntoa(from_ip) ));
namerec = find_name_on_subnet(subrec, question, FIND_ANY_NAME);
if(namerec == NULL)
{
DEBUG(3,("wins_process_name_refresh_request: Name refresh for name %s and \
the name does not exist. Treating as registration.\n", nmb_namestr(question) ));
wins_process_name_registration_request(subrec,p);
return;
}
if (namerec != NULL && !WINS_STATE_ACTIVE(namerec))
{
DEBUG(5,("wins_process_name_refresh_request: Name (%s) in WINS was \
not active - removing it.\n", nmb_namestr(question) ));
remove_name_from_namelist( subrec, namerec );
namerec = NULL;
wins_process_name_registration_request(subrec,p);
return;
}
if((namerec != NULL) && ((group && !NAME_GROUP(namerec)) || (!group && NAME_GROUP(namerec))) )
{
DEBUG(3,("wins_process_name_refresh_request: Name %s group bit = %s \
does not match group bit in WINS for this name.\n", nmb_namestr(question), group ? "True" : "False" ));
send_wins_name_registration_response(RFS_ERR, 0, p);
return;
}
if((!group || (group && (question->name_type == 0x1c))) && find_ip_in_name_record(namerec, from_ip ))
{
update_name_ttl(namerec, ttl);
if (!ip_equal(namerec->data.wins_ip, our_fake_ip)) {
update_wins_owner(namerec, our_fake_ip);
get_global_id_and_update(&namerec->data.id, True);
}
send_wins_name_registration_response(0, ttl, p);
wins_hook("refresh", namerec, ttl);
return;
}
else if(group)
{
update_name_ttl(namerec, ttl);
send_wins_name_registration_response(0, ttl, p);
return;
}
else if(!group && (question->name_type == 0x1d))
{
send_wins_name_registration_response(0, ttl, p);
return;
}
else
{
DEBUG(3,("wins_process_name_refresh_request: Name refresh for name %s with IP %s and \
is IP is not known to the name.\n", nmb_namestr(question), inet_ntoa(from_ip) ));
send_wins_name_registration_response(RFS_ERR, 0, p);
return;
}
}
static void wins_register_query_success(struct subnet_record *subrec,
struct userdata_struct *userdata,
struct nmb_name *question_name,
struct in_addr ip,
struct res_rec *answers)
{
struct packet_struct *orig_reg_packet;
memcpy((char *)&orig_reg_packet, userdata->data, sizeof(struct packet_struct *));
DEBUG(3,("wins_register_query_success: Original client at IP %s still wants the \
name %s. Rejecting registration request.\n", inet_ntoa(ip), nmb_namestr(question_name) ));
send_wins_name_registration_response(RFS_ERR, 0, orig_reg_packet);
orig_reg_packet->locked = False;
free_packet(orig_reg_packet);
}
static void wins_register_query_fail(struct subnet_record *subrec,
struct response_record *rrec,
struct nmb_name *question_name,
int rcode)
{
struct userdata_struct *userdata = rrec->userdata;
struct packet_struct *orig_reg_packet;
struct name_record *namerec = NULL;
memcpy((char *)&orig_reg_packet, userdata->data, sizeof(struct packet_struct *));
namerec = find_name_on_subnet(subrec, question_name, FIND_ANY_NAME);
if( (namerec != NULL)
&& (namerec->data.source == REGISTER_NAME)
&& ip_equal(rrec->packet->ip, *namerec->data.ip) )
{
remove_name_from_namelist( subrec, namerec);
namerec = NULL;
}
if(namerec == NULL)
wins_process_name_registration_request(subrec, orig_reg_packet);
else
DEBUG(2,("wins_register_query_fail: The state of the WINS database changed between \
querying for name %s in order to replace it and this reply.\n", nmb_namestr(question_name) ));
orig_reg_packet->locked = False;
free_packet(orig_reg_packet);
}
void wins_process_name_registration_request(struct subnet_record *subrec,
struct packet_struct *p)
{
struct nmb_packet *nmb = &p->packet.nmb;
struct nmb_name *question = &nmb->question.question_name;
BOOL bcast = nmb->header.nm_flags.bcast;
uint16 nb_flags = get_nb_flags(nmb->additional->rdata);
int ttl = get_ttl_from_packet(nmb);
struct name_record *namerec = NULL;
struct in_addr from_ip;
BOOL registering_group_name = (nb_flags & NB_GROUP) ? True : False;
struct in_addr our_fake_ip = *interpret_addr2("0.0.0.0");
putip((char *)&from_ip,&nmb->additional->rdata[2]);
if(bcast)
{
DEBUG(0,("wins_process_name_registration_request: broadcast name registration request \
received for name %s from IP %s on subnet %s. Error - should not be sent to WINS server\n",
nmb_namestr(question), inet_ntoa(from_ip), subrec->subnet_name));
return;
}
DEBUG(3,("wins_process_name_registration_request: %s name registration for name %s \
IP %s\n", registering_group_name ? "Group" : "Unique", nmb_namestr(question), inet_ntoa(from_ip) ));
namerec = find_name_on_subnet(subrec, question, FIND_ANY_NAME);
if ( (namerec != NULL) && !WINS_STATE_ACTIVE(namerec))
{
DEBUG(5,("wins_process_name_registration_request: Name (%s) in WINS was \
not active - removing it.\n", nmb_namestr(question) ));
remove_name_from_namelist( subrec, namerec );
namerec = NULL;
}
if( (namerec != NULL)
&& ( (namerec->data.source == DNS_NAME)
|| (namerec->data.source == DNSFAIL_NAME) ) )
{
DEBUG(5,("wins_process_name_registration_request: Name (%s) in WINS was \
a dns lookup - removing it.\n", nmb_namestr(question) ));
remove_name_from_namelist( subrec, namerec );
namerec = NULL;
}
if((namerec != NULL) && (namerec->data.source != REGISTER_NAME))
{
DEBUG( 3, ( "wins_process_name_registration_request: Attempt \
to register name %s. Name already exists in WINS with source type %d.\n",
nmb_namestr(question), namerec->data.source ));
send_wins_name_registration_response(RFS_ERR, 0, p);
return;
}
if(registering_group_name && (question->name_type != 0x1c))
from_ip = *interpret_addr2("255.255.255.255");
if(!registering_group_name && (question->name_type == 0x1d))
{
DEBUG(3,("wins_process_name_registration_request: Ignoring request \
to register name %s from IP %s.\n", nmb_namestr(question), inet_ntoa(p->ip) ));
send_wins_name_registration_response(0, ttl, p);
return;
}
if((namerec != NULL) && NAME_GROUP(namerec))
{
if(registering_group_name)
{
DEBUG(3,("wins_process_name_registration_request: Adding IP %s to group name %s.\n",
inet_ntoa(from_ip), nmb_namestr(question) ));
if(!find_ip_in_name_record(namerec, from_ip)) {
add_ip_to_name_record(namerec, from_ip);
get_global_id_and_update(&namerec->data.id, True);
update_wins_owner(namerec, our_fake_ip);
}
update_name_ttl(namerec, ttl);
send_wins_name_registration_response(0, ttl, p);
return;
}
else
{
DEBUG(3,("wins_process_name_registration_request: Attempt to register name %s. Name \
already exists in WINS as a GROUP name.\n", nmb_namestr(question) ));
send_wins_name_registration_response(RFS_ERR, 0, p);
return;
}
}
if((namerec != NULL) && (is_myname(namerec->name.name)) )
{
if(!ismyip(from_ip))
{
DEBUG(3,("wins_process_name_registration_request: Attempt to register name %s. Name \
is one of our (WINS server) names. Denying registration.\n", nmb_namestr(question) ));
send_wins_name_registration_response(RFS_ERR, 0, p);
return;
}
else
{
update_name_ttl(namerec, ttl);
send_wins_name_registration_response(0, ttl, p);
wins_hook("refresh", namerec, ttl);
return;
}
}
if( !registering_group_name
&& (namerec != NULL)
&& (namerec->data.num_ips == 1)
&& ip_equal( namerec->data.ip[0], from_ip )
&& ip_equal(namerec->data.wins_ip, our_fake_ip) )
{
update_name_ttl( namerec, ttl );
send_wins_name_registration_response( 0, ttl, p );
wins_hook("refresh", namerec, ttl);
return;
}
if( namerec != NULL )
{
long *ud[(sizeof(struct userdata_struct) + sizeof(struct packet_struct *))/sizeof(long *) + 1];
struct userdata_struct *userdata = (struct userdata_struct *)ud;
send_wins_wack_response(60, p);
p->locked = True;
userdata = (struct userdata_struct *)ud;
userdata->copy_fn = NULL;
userdata->free_fn = NULL;
userdata->userdata_len = sizeof(struct packet_struct *);
memcpy(userdata->data, (char *)&p, sizeof(struct packet_struct *) );
query_name_from_wins_server( *namerec->data.ip,
question->name,
question->name_type,
wins_register_query_success,
wins_register_query_fail,
userdata );
return;
}
(void)add_name_to_subnet( subrec, question->name, question->name_type,
nb_flags, ttl, REGISTER_NAME, 1, &from_ip);
if ((namerec = find_name_on_subnet(subrec, question, FIND_ANY_NAME))) {
get_global_id_and_update(&namerec->data.id, True);
update_wins_owner(namerec, our_fake_ip);
update_wins_flag(namerec, WINS_ACTIVE);
wins_hook("add", namerec, ttl);
}
send_wins_name_registration_response(0, ttl, p);
}
static void wins_multihomed_register_query_success(struct subnet_record *subrec,
struct userdata_struct *userdata,
struct nmb_name *question_name,
struct in_addr ip,
struct res_rec *answers)
{
struct packet_struct *orig_reg_packet;
struct nmb_packet *nmb;
struct name_record *namerec = NULL;
struct in_addr from_ip;
int ttl;
struct in_addr our_fake_ip = *interpret_addr2("0.0.0.0");
memcpy((char *)&orig_reg_packet, userdata->data, sizeof(struct packet_struct *));
nmb = &orig_reg_packet->packet.nmb;
putip((char *)&from_ip,&nmb->additional->rdata[2]);
ttl = get_ttl_from_packet(nmb);
namerec = find_name_on_subnet(subrec, question_name, FIND_ANY_NAME);
if( (namerec == NULL) || (namerec->data.source != REGISTER_NAME) || !WINS_STATE_ACTIVE(namerec) )
{
DEBUG(3,("wins_multihomed_register_query_success: name %s is not in the correct state to add \
a subsequent IP address.\n", nmb_namestr(question_name) ));
send_wins_name_registration_response(RFS_ERR, 0, orig_reg_packet);
orig_reg_packet->locked = False;
free_packet(orig_reg_packet);
return;
}
if(!find_ip_in_name_record(namerec, from_ip))
add_ip_to_name_record(namerec, from_ip);
get_global_id_and_update(&namerec->data.id, True);
update_wins_owner(namerec, our_fake_ip);
update_wins_flag(namerec, WINS_ACTIVE);
update_name_ttl(namerec, ttl);
send_wins_name_registration_response(0, ttl, orig_reg_packet);
wins_hook("add", namerec, ttl);
orig_reg_packet->locked = False;
free_packet(orig_reg_packet);
}
static void wins_multihomed_register_query_fail(struct subnet_record *subrec,
struct response_record *rrec,
struct nmb_name *question_name,
int rcode)
{
struct userdata_struct *userdata = rrec->userdata;
struct packet_struct *orig_reg_packet;
memcpy((char *)&orig_reg_packet, userdata->data, sizeof(struct packet_struct *));
DEBUG(3,("wins_multihomed_register_query_fail: Registering machine at IP %s failed to answer \
query successfully for name %s.\n", inet_ntoa(orig_reg_packet->ip), nmb_namestr(question_name) ));
send_wins_name_registration_response(RFS_ERR, 0, orig_reg_packet);
orig_reg_packet->locked = False;
free_packet(orig_reg_packet);
return;
}
void wins_process_multihomed_name_registration_request( struct subnet_record *subrec,
struct packet_struct *p)
{
struct nmb_packet *nmb = &p->packet.nmb;
struct nmb_name *question = &nmb->question.question_name;
BOOL bcast = nmb->header.nm_flags.bcast;
uint16 nb_flags = get_nb_flags(nmb->additional->rdata);
int ttl = get_ttl_from_packet(nmb);
struct name_record *namerec = NULL;
struct in_addr from_ip;
BOOL group = (nb_flags & NB_GROUP) ? True : False;
struct in_addr our_fake_ip = *interpret_addr2("0.0.0.0");
putip((char *)&from_ip,&nmb->additional->rdata[2]);
if(bcast)
{
DEBUG(0,("wins_process_multihomed_name_registration_request: broadcast name registration request \
received for name %s from IP %s on subnet %s. Error - should not be sent to WINS server\n",
nmb_namestr(question), inet_ntoa(from_ip), subrec->subnet_name));
return;
}
if(group)
{
DEBUG(0,("wins_process_multihomed_name_registration_request: group name registration request \
received for name %s from IP %s on subnet %s. Errror - group names should not be multihomed.\n",
nmb_namestr(question), inet_ntoa(from_ip), subrec->subnet_name));
return;
}
DEBUG(3,("wins_process_multihomed_name_registration_request: name registration for name %s \
IP %s\n", nmb_namestr(question), inet_ntoa(from_ip) ));
if(question->name_type == 0x1d)
{
DEBUG(3,("wins_process_multihomed_name_registration_request: Ignoring request \
to register name %s from IP %s.", nmb_namestr(question), inet_ntoa(p->ip) ));
send_wins_name_registration_response(0, ttl, p);
return;
}
namerec = find_name_on_subnet(subrec, question, FIND_ANY_NAME);
if ((namerec != NULL) && !WINS_STATE_ACTIVE(namerec)) {
DEBUG(5,("wins_process_multihomed_name_registration_request: Name (%s) in WINS was not active - removing it.\n", nmb_namestr(question)));
remove_name_from_namelist(subrec, namerec);
namerec = NULL;
}
if( (namerec != NULL)
&& ( (namerec->data.source == DNS_NAME)
|| (namerec->data.source == DNSFAIL_NAME) ) )
{
DEBUG(5,("wins_process_multihomed_name_registration_request: Name (%s) in WINS was a dns lookup \
- removing it.\n", nmb_namestr(question) ));
remove_name_from_namelist( subrec, namerec);
namerec = NULL;
}
if( (namerec != NULL) && (namerec->data.source != REGISTER_NAME) )
{
DEBUG( 3, ( "wins_process_multihomed_name_registration_request: Attempt \
to register name %s. Name already exists in WINS with source type %d.\n",
nmb_namestr(question), namerec->data.source ));
send_wins_name_registration_response(RFS_ERR, 0, p);
return;
}
if((namerec != NULL) && NAME_GROUP(namerec) && WINS_STATE_ACTIVE(namerec))
{
DEBUG(3,("wins_process_multihomed_name_registration_request: Attempt to register name %s. Name \
already exists in WINS as a GROUP name.\n", nmb_namestr(question) ));
send_wins_name_registration_response(RFS_ERR, 0, p);
return;
}
if((namerec != NULL) && (is_myname(namerec->name.name)) )
{
if(!ismyip(from_ip))
{
DEBUG(3,("wins_process_multihomed_name_registration_request: Attempt to register name %s. Name \
is one of our (WINS server) names. Denying registration.\n", nmb_namestr(question) ));
send_wins_name_registration_response(RFS_ERR, 0, p);
return;
}
else
{
if(!find_ip_in_name_record(namerec, from_ip)) {
get_global_id_and_update(&namerec->data.id, True);
update_wins_owner(namerec, our_fake_ip);
update_wins_flag(namerec, WINS_ACTIVE);
add_ip_to_name_record(namerec, from_ip);
wins_hook("add", namerec, ttl);
} else {
wins_hook("refresh", namerec, ttl);
}
update_name_ttl(namerec, ttl);
send_wins_name_registration_response(0, ttl, p);
return;
}
}
if((namerec != NULL) && find_ip_in_name_record(namerec, from_ip) && WINS_STATE_ACTIVE(namerec))
{
update_name_ttl(namerec, ttl);
if (!ip_equal(namerec->data.wins_ip, our_fake_ip)) {
get_global_id_and_update(&namerec->data.id, True);
update_wins_owner(namerec, our_fake_ip);
update_wins_flag(namerec, WINS_ACTIVE);
}
send_wins_name_registration_response(0, ttl, p);
wins_hook("refresh", namerec, ttl);
return;
}
if(namerec != NULL)
{
long *ud[(sizeof(struct userdata_struct) + sizeof(struct packet_struct *))/sizeof(long *) + 1];
struct userdata_struct *userdata = (struct userdata_struct *)ud;
send_wins_wack_response(60, p);
p->locked = True;
userdata = (struct userdata_struct *)ud;
userdata->copy_fn = NULL;
userdata->free_fn = NULL;
userdata->userdata_len = sizeof(struct packet_struct *);
memcpy(userdata->data, (char *)&p, sizeof(struct packet_struct *) );
query_name_from_wins_server( namerec->data.ip[0],
question->name,
question->name_type,
wins_multihomed_register_query_success,
wins_multihomed_register_query_fail,
userdata );
return;
}
(void)add_name_to_subnet( subrec, question->name, question->name_type,
nb_flags, ttl, REGISTER_NAME, 1, &from_ip);
if ((namerec = find_name_on_subnet(subrec, question, FIND_ANY_NAME))) {
get_global_id_and_update(&namerec->data.id, True);
update_wins_owner(namerec, our_fake_ip);
update_wins_flag(namerec, WINS_ACTIVE);
wins_hook("add", namerec, ttl);
}
send_wins_name_registration_response(0, ttl, p);
}
static void process_wins_dmb_query_request(struct subnet_record *subrec,
struct packet_struct *p)
{
struct name_record *namerec = NULL;
char *prdata;
int num_ips;
num_ips = 0;
for( namerec = (struct name_record *)ubi_trFirst( subrec->namelist );
namerec;
namerec = (struct name_record *)ubi_trNext( namerec ) )
{
if(WINS_STATE_ACTIVE(namerec) && namerec->name.name_type == 0x1b )
num_ips += namerec->data.num_ips;
}
if(num_ips == 0)
{
send_wins_name_query_response(NAM_ERR, p, NULL);
return;
}
if((prdata = (char *)malloc( num_ips * 6 )) == NULL)
{
DEBUG(0,("process_wins_dmb_query_request: Malloc fail !.\n"));
return;
}
num_ips = 0;
for( namerec = (struct name_record *)ubi_trFirst( subrec->namelist );
namerec;
namerec = (struct name_record *)ubi_trNext( namerec ) )
{
if(WINS_STATE_ACTIVE(namerec) && namerec->name.name_type == 0x1b)
{
int i;
for(i = 0; i < namerec->data.num_ips; i++)
{
set_nb_flags(&prdata[num_ips * 6],namerec->data.nb_flags);
putip((char *)&prdata[(num_ips * 6) + 2], &namerec->data.ip[i]);
num_ips++;
}
}
}
reply_netbios_packet(p,
0,
WINS_QUERY,
NMB_NAME_QUERY_OPCODE,
lp_min_wins_ttl(),
prdata,
num_ips*6);
SAFE_FREE(prdata);
}
void send_wins_name_query_response(int rcode, struct packet_struct *p,
struct name_record *namerec)
{
char rdata[6];
char *prdata = rdata;
int reply_data_len = 0;
int ttl = 0;
int i;
memset(rdata,'\0',6);
if(rcode == 0)
{
ttl = (namerec->data.death_time != PERMANENT_TTL) ?
namerec->data.death_time - p->timestamp : lp_max_wins_ttl();
if( namerec->data.num_ips == 1 )
prdata = rdata;
else
{
if((prdata = (char *)malloc( namerec->data.num_ips * 6 )) == NULL)
{
DEBUG(0,("send_wins_name_query_response: malloc fail !\n"));
return;
}
}
for(i = 0; i < namerec->data.num_ips; i++)
{
set_nb_flags(&prdata[i*6],namerec->data.nb_flags);
putip((char *)&prdata[2+(i*6)], &namerec->data.ip[i]);
}
sort_query_replies(prdata, i, p->ip);
reply_data_len = namerec->data.num_ips * 6;
}
reply_netbios_packet(p,
rcode,
WINS_QUERY,
NMB_NAME_QUERY_OPCODE,
ttl,
prdata,
reply_data_len);
if(prdata != rdata)
SAFE_FREE(prdata);
}
void wins_process_name_query_request(struct subnet_record *subrec,
struct packet_struct *p)
{
struct nmb_packet *nmb = &p->packet.nmb;
struct nmb_name *question = &nmb->question.question_name;
struct name_record *namerec = NULL;
DEBUG(3,("wins_process_name_query: name query for name %s from IP %s\n",
nmb_namestr(question), inet_ntoa(p->ip) ));
if(strequal( question->name, "*") && (question->name_type == 0x1b))
{
process_wins_dmb_query_request( subrec, p);
return;
}
namerec = find_name_on_subnet(subrec, question, FIND_ANY_NAME);
if(namerec != NULL)
{
if (!WINS_STATE_ACTIVE(namerec))
{
DEBUG(3,("wins_process_name_query: name query for name %s - name expired. Returning fail.\n",
nmb_namestr(question) ));
send_wins_name_query_response(NAM_ERR, p, namerec);
return;
}
if( namerec->data.source == DNSFAIL_NAME )
{
DEBUG(3,("wins_process_name_query: name query for name %s returning DNS fail.\n",
nmb_namestr(question) ));
send_wins_name_query_response(NAM_ERR, p, namerec);
return;
}
if( (namerec->data.death_time != PERMANENT_TTL)
&& (namerec->data.death_time < p->timestamp) )
{
DEBUG(3,("wins_process_name_query: name query for name %s - name expired. Returning fail.\n",
nmb_namestr(question) ));
send_wins_name_query_response(NAM_ERR, p, namerec);
return;
}
DEBUG(3,("wins_process_name_query: name query for name %s returning first IP %s.\n",
nmb_namestr(question), inet_ntoa(namerec->data.ip[0]) ));
send_wins_name_query_response(0, p, namerec);
return;
}
if(lp_dns_proxy() &&
((question->name_type == 0x20) || question->name_type == 0))
{
DEBUG(3,("wins_process_name_query: name query for name %s not found - doing dns lookup.\n",
nmb_namestr(question) ));
queue_dns_query(p, question, &namerec);
return;
}
send_wins_name_query_response(NAM_ERR, p, NULL);
}
static void send_wins_name_release_response(int rcode, struct packet_struct *p)
{
struct nmb_packet *nmb = &p->packet.nmb;
char rdata[6];
memcpy(&rdata[0], &nmb->additional->rdata[0], 6);
reply_netbios_packet(p,
rcode,
NMB_REL,
NMB_NAME_RELEASE_OPCODE,
0,
rdata,
6);
}
void wins_process_name_release_request(struct subnet_record *subrec,
struct packet_struct *p)
{
struct nmb_packet *nmb = &p->packet.nmb;
struct nmb_name *question = &nmb->question.question_name;
BOOL bcast = nmb->header.nm_flags.bcast;
uint16 nb_flags = get_nb_flags(nmb->additional->rdata);
struct name_record *namerec = NULL;
struct in_addr from_ip;
BOOL releasing_group_name = (nb_flags & NB_GROUP) ? True : False;;
putip((char *)&from_ip,&nmb->additional->rdata[2]);
if(bcast)
{
DEBUG(0,("wins_process_name_release_request: broadcast name registration request \
received for name %s from IP %s on subnet %s. Error - should not be sent to WINS server\n",
nmb_namestr(question), inet_ntoa(from_ip), subrec->subnet_name));
return;
}
DEBUG(3,("wins_process_name_release_request: %s name release for name %s \
IP %s\n", releasing_group_name ? "Group" : "Unique", nmb_namestr(question), inet_ntoa(from_ip) ));
if(!releasing_group_name && (question->name_type == 0x1d))
{
DEBUG(3,("wins_process_name_release_request: Ignoring request \
to release name %s from IP %s.", nmb_namestr(question), inet_ntoa(p->ip) ));
send_wins_name_release_response(0, p);
return;
}
namerec = find_name_on_subnet(subrec, question, FIND_ANY_NAME);
if( (namerec == NULL)
|| ((namerec != NULL) && (namerec->data.source != REGISTER_NAME)) )
{
send_wins_name_release_response(NAM_ERR, p);
return;
}
if(releasing_group_name && (question->name_type != 0x1c))
{
send_wins_name_release_response(0, p);
return;
}
if(!find_ip_in_name_record(namerec, from_ip))
{
DEBUG(3,("wins_process_name_release_request: Refusing request to \
release name %s as IP %s is not one of the known IP's for this name.\n",
nmb_namestr(question), inet_ntoa(from_ip) ));
send_wins_name_release_response(NAM_ERR, p);
return;
}
if (!WINS_STATE_ACTIVE(namerec)) {
DEBUG(3,("wins_process_name_release_request: Refusing request to \
release name %s as this record is not anymore active.\n",
nmb_namestr(question) ));
send_wins_name_release_response(NAM_ERR, p);
return;
}
if(releasing_group_name &&
(question->name_type == 0x1c) &&
(namerec->data.num_ips > 1)) {
remove_ip_from_name_record(namerec, from_ip);
DEBUG(3,("wins_process_name_release_request: Remove IP %s from NAME: %s\n",
inet_ntoa(from_ip),nmb_namestr(question)));
send_wins_name_release_response(0, p);
return;
}
send_wins_name_release_response(0, p);
namerec->data.wins_flags |= WINS_RELEASED;
update_name_ttl(namerec, EXTINCTION_INTERVAL);
wins_hook("delete", namerec, 0);
}
void initiate_wins_processing(time_t t)
{
static time_t lasttime = 0;
struct name_record *namerec;
struct name_record *next_namerec;
struct in_addr our_fake_ip = *interpret_addr2("0.0.0.0");
if (!lasttime)
lasttime = t;
if (t - lasttime < 20)
return;
lasttime = t;
if(!lp_we_are_a_wins_server())
return;
for( namerec = (struct name_record *)ubi_trFirst( wins_server_subnet->namelist );
namerec;
namerec = next_namerec ) {
next_namerec = (struct name_record *)ubi_trNext( namerec );
if( (namerec->data.death_time != PERMANENT_TTL)
&& (namerec->data.death_time < t) ) {
if( namerec->data.source == SELF_NAME ) {
DEBUG( 3, ( "expire_names_on_subnet: Subnet %s not expiring SELF name %s\n",
wins_server_subnet->subnet_name, nmb_namestr(&namerec->name) ) );
namerec->data.death_time += 300;
namerec->subnet->namelist_changed = True;
continue;
}
if (ip_equal(namerec->data.wins_ip, our_fake_ip)) {
switch (namerec->data.wins_flags | WINS_STATE_MASK) {
case WINS_ACTIVE:
namerec->data.wins_flags&=~WINS_STATE_MASK;
namerec->data.wins_flags|=WINS_RELEASED;
namerec->data.death_time = t + EXTINCTION_INTERVAL;
DEBUG(3,("initiate_wins_processing: expiring %s\n", nmb_namestr(&namerec->name)));
break;
case WINS_RELEASED:
namerec->data.wins_flags&=~WINS_STATE_MASK;
namerec->data.wins_flags|=WINS_TOMBSTONED;
namerec->data.death_time = t + EXTINCTION_TIMEOUT;
get_global_id_and_update(&namerec->data.id, True);
DEBUG(3,("initiate_wins_processing: tombstoning %s\n", nmb_namestr(&namerec->name)));
break;
case WINS_TOMBSTONED:
DEBUG(3,("initiate_wins_processing: deleting %s\n", nmb_namestr(&namerec->name)));
remove_name_from_namelist( wins_server_subnet, namerec );
break;
}
} else {
switch (namerec->data.wins_flags | WINS_STATE_MASK) {
case WINS_ACTIVE:
namerec->data.wins_flags&=~WINS_STATE_MASK;
namerec->data.wins_flags|=WINS_TOMBSTONED;
namerec->data.death_time = t + EXTINCTION_TIMEOUT;
DEBUG(3,("initiate_wins_processing: tombstoning %s\n", nmb_namestr(&namerec->name)));
case WINS_TOMBSTONED:
DEBUG(3,("initiate_wins_processing: deleting %s\n", nmb_namestr(&namerec->name)));
remove_name_from_namelist( wins_server_subnet, namerec );
break;
case WINS_RELEASED:
DEBUG(0,("initiate_wins_processing: %s is in released state and\
we are not the wins owner !\n", nmb_namestr(&namerec->name)));
break;
}
}
}
}
if(wins_server_subnet->namelist_changed)
wins_write_database(True);
wins_server_subnet->namelist_changed = False;
}
void wins_write_database(BOOL background)
{
struct name_record *namerec;
pstring fname, fnamenew;
TDB_CONTEXT *tdb;
TDB_DATA kbuf, dbuf;
pstring key, buf;
int len;
int num_record=0;
SMB_BIG_UINT id;
if(!lp_we_are_a_wins_server())
return;
if (background) {
CatchChild();
if (sys_fork()) {
return;
}
}
slprintf(fname,sizeof(fname)-1,"%s/%s", lp_lockdir(), WINS_LIST);
all_string_sub(fname,"//", "/", 0);
slprintf(fnamenew,sizeof(fnamenew)-1,"%s.%u", fname, (unsigned int)sys_getpid());
tdb = tdb_open_log(fnamenew, 0, TDB_DEFAULT, O_RDWR|O_CREAT|O_TRUNC, 0644);
if (!tdb) {
DEBUG(0,("wins_write_database: Can't open %s. Error was %s\n", fnamenew, strerror(errno)));
if (background)
_exit(0);
return;
}
DEBUG(3,("wins_write_database: Dump of WINS name list.\n"));
tdb_store_int32(tdb, INFO_VERSION, WINS_VERSION);
for (namerec = (struct name_record *)ubi_trFirst( wins_server_subnet->namelist );
namerec;
namerec = (struct name_record *)ubi_trNext( namerec ) ) {
int i;
struct tm *tm;
DEBUGADD(3,("%-19s ", nmb_namestr(&namerec->name) ));
if( namerec->data.death_time != PERMANENT_TTL ) {
char *ts, *nl;
tm = LocalTime(&namerec->data.death_time);
ts = asctime(tm);
nl = strrchr_m( ts, '\n' );
if( NULL != nl )
*nl = '\0';
DEBUGADD(3,("TTL = %s ", ts ));
} else
DEBUGADD(3,("TTL = PERMANENT "));
for (i = 0; i < namerec->data.num_ips; i++)
DEBUGADD(0,("%15s ", inet_ntoa(namerec->data.ip[i]) ));
DEBUGADD(3,("0x%2x 0x%2x %15s\n", namerec->data.nb_flags, namerec->data.wins_flags, inet_ntoa(namerec->data.wins_ip)));
if( namerec->data.source == REGISTER_NAME ) {
slprintf(key, sizeof(key), "%s%s#%02x", ENTRY_PREFIX, namerec->name.name, namerec->name.name_type);
len = tdb_pack(buf, sizeof(buf), "dddfddd",
(int)namerec->data.nb_flags,
(int)(namerec->data.id>>32),
(int)(namerec->data.id&0xffffffff),
inet_ntoa(namerec->data.wins_ip),
(int)namerec->data.death_time,
namerec->data.num_ips,
namerec->data.wins_flags);
for (i = 0; i < namerec->data.num_ips; i++)
len += tdb_pack(buf+len, sizeof(buf)-len, "f", inet_ntoa(namerec->data.ip[i]));
kbuf.dsize = strlen(key)+1;
kbuf.dptr = key;
dbuf.dsize = len;
dbuf.dptr = buf;
if (tdb_store(tdb, kbuf, dbuf, TDB_INSERT) != 0) return;
num_record++;
}
}
tdb_store_int32(tdb, INFO_COUNT, num_record);
get_global_id_and_update(&id, False);
tdb_store_int32(tdb, INFO_ID_HIGH, id>>32);
tdb_store_int32(tdb, INFO_ID_LOW, id&0xffffffff);
tdb_close(tdb);
chmod(fnamenew,0644);
unlink(fname);
rename(fnamenew,fname);
if (background)
_exit(0);
}
void nmbd_wins_new_entry(int msg_type, pid_t src, void *buf, size_t len)
{
WINS_RECORD *record;
struct name_record *namerec = NULL;
struct name_record *new_namerec = NULL;
struct nmb_name question;
BOOL overwrite=False;
struct in_addr our_fake_ip = *interpret_addr2("0.0.0.0");
int i;
if (buf==NULL)
return;
record=(WINS_RECORD *)buf;
ZERO_STRUCT(question);
memcpy(question.name, record->name, 16);
question.name_type=record->type;
namerec = find_name_on_subnet(wins_server_subnet, &question, FIND_ANY_NAME);
if (namerec == NULL) {
DEBUG(3,("nmbd_wins_new_entry: adding new replicated record: %s<%02x> for wins server: %s\n",
record->name, record->type, inet_ntoa(record->wins_ip)));
new_namerec=add_name_to_subnet( wins_server_subnet, record->name, record->type, record->nb_flags,
EXTINCTION_INTERVAL, REGISTER_NAME, record->num_ips, record->ip);
if (new_namerec!=NULL) {
update_wins_owner(new_namerec, record->wins_ip);
update_wins_flag(new_namerec, record->wins_flags);
new_namerec->data.id=record->id;
wins_server_subnet->namelist_changed = True;
}
}
if (namerec != NULL) {
if (namerec->data.wins_flags&WINS_UNIQUE && record->wins_flags&WINS_UNIQUE) {
if (!ip_equal(namerec->data.wins_ip, our_fake_ip)) {
if (namerec->data.wins_flags&WINS_ACTIVE && record->wins_flags&WINS_TOMBSTONED) {
if (ip_equal(namerec->data.wins_ip, record->wins_ip))
overwrite=True;
} else
overwrite=True;
} else {
if (ip_equal(namerec->data.ip[0], record->ip[0])) {
if (namerec->data.wins_flags&WINS_ACTIVE && record->wins_flags&WINS_TOMBSTONED)
get_global_id_and_update(&namerec->data.id, True);
else
overwrite=True;
} else {
if (namerec->data.wins_flags&WINS_ACTIVE) {
if (record->wins_flags&WINS_TOMBSTONED)
get_global_id_and_update(&namerec->data.id, True);
if (record->wins_flags&WINS_ACTIVE)
;
} else
overwrite=True;
}
}
}
if (record->wins_flags&WINS_NGROUP || record->wins_flags&WINS_SGROUP) {
if (namerec->data.wins_flags&WINS_UNIQUE)
;
overwrite=True;
}
if (record->wins_flags&WINS_SGROUP && namerec->data.wins_flags&WINS_SGROUP) {
if (namerec->data.wins_flags&WINS_ACTIVE) {
for (i=0; i<record->num_ips; i++)
if(!find_ip_in_name_record(namerec, record->ip[i]))
add_ip_to_name_record(namerec, record->ip[i]);
}
else
overwrite=True;
}
if (record->wins_flags&WINS_MHOMED) {
if (! (namerec->data.wins_flags&WINS_ACTIVE)) {
if ( !(namerec->data.wins_flags&WINS_RELEASED) && !(namerec->data.wins_flags&WINS_NGROUP))
overwrite=True;
}
else {
if (ip_equal(record->wins_ip, namerec->data.wins_ip))
overwrite=True;
if (ip_equal(namerec->data.wins_ip, our_fake_ip))
if (namerec->data.wins_flags&WINS_UNIQUE)
get_global_id_and_update(&namerec->data.id, True);
}
if (record->wins_flags&WINS_ACTIVE && namerec->data.wins_flags&WINS_ACTIVE)
if (namerec->data.wins_flags&WINS_UNIQUE ||
namerec->data.wins_flags&WINS_MHOMED)
if (ip_equal(record->wins_ip, namerec->data.wins_ip))
overwrite=True;
}
if (overwrite == False)
DEBUG(3, ("nmbd_wins_new_entry: conflict in adding record: %s<%02x> from wins server: %s\n",
record->name, record->type, inet_ntoa(record->wins_ip)));
else {
DEBUG(3, ("nmbd_wins_new_entry: replacing record: %s<%02x> from wins server: %s\n",
record->name, record->type, inet_ntoa(record->wins_ip)));
remove_name_from_namelist( wins_server_subnet, namerec );
new_namerec=add_name_to_subnet( wins_server_subnet, record->name, record->type, record->nb_flags,
EXTINCTION_INTERVAL, REGISTER_NAME, record->num_ips, record->ip);
if (new_namerec!=NULL) {
update_wins_owner(new_namerec, record->wins_ip);
update_wins_flag(new_namerec, record->wins_flags);
new_namerec->data.id=record->id;
wins_server_subnet->namelist_changed = True;
}
wins_server_subnet->namelist_changed = True;
}
}
}