📄 rpc_netlogon.h
字号:
/* Unix SMB/CIFS implementation. SMB parameters and setup Copyright (C) Andrew Tridgell 1992-1997 Copyright (C) Luke Kenneth Casson Leighton 1996-1997 Copyright (C) Paul Ashton 1997 Copyright (C) Jean François Micouleau 2002 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.*/#ifndef _RPC_NETLOGON_H /* _RPC_NETLOGON_H */#define _RPC_NETLOGON_H /* NETLOGON pipe */#define NET_SAMLOGON 0x02#define NET_SAMLOGOFF 0x03#define NET_REQCHAL 0x04#define NET_AUTH 0x05#define NET_SRVPWSET 0x06#define NET_SAM_DELTAS 0x07#define NET_LOGON_CTRL 0x0c#define NET_GETDCNAME 0x0d#define NET_AUTH2 0x0f#define NET_LOGON_CTRL2 0x0e#define NET_SAM_SYNC 0x10#define NET_TRUST_DOM_LIST 0x13#define NET_DSR_GETDCNAME 0x14#define NET_AUTH3 0x1a#define NET_DSR_GETSITENAME 0x1c/* Secure Channel types. used in NetrServerAuthenticate negotiation */#define SEC_CHAN_WKSTA 2#define SEC_CHAN_DOMAIN 4#define SEC_CHAN_BDC 6/* Returned delta types */#define SAM_DELTA_DOMAIN_INFO 0x01#define SAM_DELTA_GROUP_INFO 0x02#define SAM_DELTA_RENAME_GROUP 0x04#define SAM_DELTA_ACCOUNT_INFO 0x05#define SAM_DELTA_RENAME_USER 0x07#define SAM_DELTA_GROUP_MEM 0x08#define SAM_DELTA_ALIAS_INFO 0x09#define SAM_DELTA_RENAME_ALIAS 0x0b#define SAM_DELTA_ALIAS_MEM 0x0c#define SAM_DELTA_POLICY_INFO 0x0d#define SAM_DELTA_TRUST_DOMS 0x0e#define SAM_DELTA_PRIVS_INFO 0x10 /* DT_DELTA_ACCOUNTS */#define SAM_DELTA_SECRET_INFO 0x12#define SAM_DELTA_DELETE_GROUP 0x14#define SAM_DELTA_DELETE_USER 0x15#define SAM_DELTA_MODIFIED_COUNT 0x16/* SAM database types */#define SAM_DATABASE_DOMAIN 0x00 /* Domain users and groups */#define SAM_DATABASE_BUILTIN 0x01 /* BUILTIN users and groups */#define SAM_DATABASE_PRIVS 0x02 /* Privileges *//* flags use when sending a NETLOGON_CONTROL request */#define NETLOGON_CONTROL_SYNC 0x2#define NETLOGON_CONTROL_REDISCOVER 0x5#define NETLOGON_CONTROL_TC_QUERY 0x6#define NETLOGON_CONTROL_TRANSPORT_NOTIFY 0x7#define NETLOGON_CONTROL_SET_DBFLAG 0xfffe/* Some flag values reverse engineered from NLTEST.EXE *//* used in the NETLOGON_CONTROL[2] reply */#define NL_CTRL_IN_SYNC 0x0000#define NL_CTRL_REPL_NEEDED 0x0001#define NL_CTRL_REPL_IN_PROGRESS 0x0002#define NL_CTRL_FULL_SYNC 0x0004#define LOGON_EXTRA_SIDS 0x0020#define LOGON_RESOURCE_GROUPS 0x0200 #define SE_GROUP_MANDATORY 0x00000001#define SE_GROUP_ENABLED_BY_DEFAULT 0x00000002#define SE_GROUP_ENABLED 0x00000004#define SE_GROUP_OWNER 0x00000008#define SE_GROUP_USE_FOR_DENY_ONLY 0x00000010#define SE_GROUP_LOGON_ID 0xC0000000#define SE_GROUP_RESOURCE 0x20000000/* Flags for controlling the behaviour of a particular logon */#define MSV1_0_ALLOW_SERVER_TRUST_ACCOUNT ( 0x020 )#define MSV1_0_ALLOW_WORKSTATION_TRUST_ACCOUNT ( 0x800 )#if 0/* I think this is correct - it's what gets parsed on the wire. JRA. *//* NET_USER_INFO_2 */typedef struct net_user_info_2 { uint32 ptr_user_info; NTTIME logon_time; /* logon time */ NTTIME logoff_time; /* logoff time */ NTTIME kickoff_time; /* kickoff time */ NTTIME pass_last_set_time; /* password last set time */ NTTIME pass_can_change_time; /* password can change time */ NTTIME pass_must_change_time; /* password must change time */ UNIHDR hdr_user_name; /* username unicode string header */ UNIHDR hdr_full_name; /* user's full name unicode string header */ UNIHDR hdr_logon_script; /* logon script unicode string header */ UNIHDR hdr_profile_path; /* profile path unicode string header */ UNIHDR hdr_home_dir; /* home directory unicode string header */ UNIHDR hdr_dir_drive; /* home directory drive unicode string header */ uint16 logon_count; /* logon count */ uint16 bad_pw_count; /* bad password count */ uint32 user_id; /* User ID */ uint32 group_id; /* Group ID */ uint32 num_groups; /* num groups */ uint32 buffer_groups; /* undocumented buffer pointer to groups. */ uint32 user_flgs; /* user flags */ uint8 user_sess_key[16]; /* unused user session key */ UNIHDR hdr_logon_srv; /* logon server unicode string header */ UNIHDR hdr_logon_dom; /* logon domain unicode string header */ uint32 buffer_dom_id; /* undocumented logon domain id pointer */ uint8 padding[40]; /* unused padding bytes. expansion room */ UNISTR2 uni_user_name; /* username unicode string */ UNISTR2 uni_full_name; /* user's full name unicode string */ UNISTR2 uni_logon_script; /* logon script unicode string */ UNISTR2 uni_profile_path; /* profile path unicode string */ UNISTR2 uni_home_dir; /* home directory unicode string */ UNISTR2 uni_dir_drive; /* home directory drive unicode string */ uint32 num_groups2; /* num groups */ DOM_GID *gids; /* group info */ UNISTR2 uni_logon_srv; /* logon server unicode string */ UNISTR2 uni_logon_dom; /* logon domain unicode string */ DOM_SID2 dom_sid; /* domain SID */ uint32 num_other_groups; /* other groups */ DOM_GID *other_gids; /* group info */ DOM_SID2 *other_sids; /* undocumented - domain SIDs */} NET_USER_INFO_2;#endif/* NET_USER_INFO_3 */typedef struct net_user_info_3 { uint32 ptr_user_info; NTTIME logon_time; /* logon time */ NTTIME logoff_time; /* logoff time */ NTTIME kickoff_time; /* kickoff time */ NTTIME pass_last_set_time; /* password last set time */ NTTIME pass_can_change_time; /* password can change time */ NTTIME pass_must_change_time; /* password must change time */ UNIHDR hdr_user_name; /* username unicode string header */ UNIHDR hdr_full_name; /* user's full name unicode string header */ UNIHDR hdr_logon_script; /* logon script unicode string header */ UNIHDR hdr_profile_path; /* profile path unicode string header */ UNIHDR hdr_home_dir; /* home directory unicode string header */ UNIHDR hdr_dir_drive; /* home directory drive unicode string header */ uint16 logon_count; /* logon count */ uint16 bad_pw_count; /* bad password count */ uint32 user_rid; /* User RID */ uint32 group_rid; /* Group RID */ uint32 num_groups; /* num groups */ uint32 buffer_groups; /* undocumented buffer pointer to groups. */ uint32 user_flgs; /* user flags */ uint8 user_sess_key[16]; /* user session key */ UNIHDR hdr_logon_srv; /* logon server unicode string header */ UNIHDR hdr_logon_dom; /* logon domain unicode string header */ uint32 buffer_dom_id; /* undocumented logon domain id pointer */ uint8 lm_sess_key[8]; /* lm session key */ uint32 acct_flags; /* account flags */ uint32 unknown[7]; /* unknown */ uint32 num_other_sids; /* number of foreign/trusted domain sids */ uint32 buffer_other_sids; /* The next three uint32 are not really part of user_info_3 but here * for parsing convenience. They are only valid in Kerberos PAC * parsing - Guenther */ uint32 ptr_res_group_dom_sid; uint32 res_group_count; uint32 ptr_res_groups; UNISTR2 uni_user_name; /* username unicode string */ UNISTR2 uni_full_name; /* user's full name unicode string */ UNISTR2 uni_logon_script; /* logon script unicode string */ UNISTR2 uni_profile_path; /* profile path unicode string */ UNISTR2 uni_home_dir; /* home directory unicode string */ UNISTR2 uni_dir_drive; /* home directory drive unicode string */ uint32 num_groups2; /* num groups */ DOM_GID *gids; /* group info */ UNISTR2 uni_logon_srv; /* logon server unicode string */ UNISTR2 uni_logon_dom; /* logon domain unicode string */ DOM_SID2 dom_sid; /* domain SID */ DOM_SID2 *other_sids; /* foreign/trusted domain SIDs */ uint32 *other_sids_attrib;} NET_USER_INFO_3;/* NETLOGON_INFO_1 - pdc status info, i presume */typedef struct netlogon_1_info { uint32 flags; /* 0x0 - undocumented */ uint32 pdc_status; /* 0x0 - undocumented */} NETLOGON_INFO_1;/* NETLOGON_INFO_2 - pdc status info, plus trusted domain info */typedef struct netlogon_2_info { uint32 flags; /* 0x0 - undocumented */ uint32 pdc_status; /* 0x0 - undocumented */ uint32 ptr_trusted_dc_name; /* pointer to trusted domain controller name */ uint32 tc_status; UNISTR2 uni_trusted_dc_name; /* unicode string - trusted dc name */} NETLOGON_INFO_2;/* NETLOGON_INFO_3 - logon status info, i presume */typedef struct netlogon_3_info { uint32 flags; /* 0x0 - undocumented */ uint32 logon_attempts; /* number of logon attempts */ uint32 reserved_1; /* 0x0 - undocumented */ uint32 reserved_2; /* 0x0 - undocumented */ uint32 reserved_3; /* 0x0 - undocumented */ uint32 reserved_4; /* 0x0 - undocumented */ uint32 reserved_5; /* 0x0 - undocumented */} NETLOGON_INFO_3;/******************************************************** Logon Control Query This is generated by a nltest /bdc_query:DOMAIN query_level 0x1, function_code 0x1 ********************************************************//* NET_Q_LOGON_CTRL - LSA Netr Logon Control */typedef struct net_q_logon_ctrl_info { uint32 ptr; UNISTR2 uni_server_name; uint32 function_code; uint32 query_level;} NET_Q_LOGON_CTRL;/* NET_R_LOGON_CTRL - LSA Netr Logon Control */typedef struct net_r_logon_ctrl_info { uint32 switch_value; uint32 ptr; union { NETLOGON_INFO_1 info1; } logon; NTSTATUS status;} NET_R_LOGON_CTRL;typedef struct ctrl_data_info_5 { uint32 function_code; uint32 ptr_domain; UNISTR2 domain;} CTRL_DATA_INFO_5;typedef struct ctrl_data_info_6 { uint32 function_code; uint32 ptr_domain; UNISTR2 domain;} CTRL_DATA_INFO_6;/******************************************************** Logon Control2 Query query_level 0x1 - pdc status query_level 0x3 - number of logon attempts. ********************************************************//* NET_Q_LOGON_CTRL2 - LSA Netr Logon Control 2 */typedef struct net_q_logon_ctrl2_info { uint32 ptr; /* undocumented buffer pointer */ UNISTR2 uni_server_name; /* server name, starting with two '\'s */ uint32 function_code; uint32 query_level; union { CTRL_DATA_INFO_5 info5; CTRL_DATA_INFO_6 info6; } info;} NET_Q_LOGON_CTRL2;/******************************************************* Logon Control Response switch_value is same as query_level in request *******************************************************//* NET_R_LOGON_CTRL2 - response to LSA Logon Control2 */typedef struct net_r_logon_ctrl2_info { uint32 switch_value; /* 0x1, 0x3 */ uint32 ptr; union { NETLOGON_INFO_1 info1; NETLOGON_INFO_2 info2; NETLOGON_INFO_3 info3; } logon; NTSTATUS status; /* return code */} NET_R_LOGON_CTRL2;/* NET_Q_GETDCNAME - Ask a DC for a trusted DC name */typedef struct net_q_getdcname { uint32 ptr_logon_server; UNISTR2 uni_logon_server; uint32 ptr_domainname; UNISTR2 uni_domainname;} NET_Q_GETDCNAME;/* NET_R_GETDCNAME - Ask a DC for a trusted DC name */typedef struct net_r_getdcname { uint32 ptr_dcname; UNISTR2 uni_dcname; NTSTATUS status;} NET_R_GETDCNAME;/* NET_Q_TRUST_DOM_LIST - LSA Query Trusted Domains */typedef struct net_q_trust_dom_info { uint32 ptr; /* undocumented buffer pointer */ UNISTR2 uni_server_name; /* server name, starting with two '\'s */} NET_Q_TRUST_DOM_LIST;#define MAX_TRUST_DOMS 1/* NET_R_TRUST_DOM_LIST - response to LSA Trusted Domains */typedef struct net_r_trust_dom_info { UNISTR2 uni_trust_dom_name[MAX_TRUST_DOMS]; NTSTATUS status; /* return code */} NET_R_TRUST_DOM_LIST;/* NEG_FLAGS */typedef struct neg_flags_info { uint32 neg_flags; /* negotiated flags */} NEG_FLAGS;/* NET_Q_REQ_CHAL */typedef struct net_q_req_chal_info { uint32 undoc_buffer; /* undocumented buffer pointer */ UNISTR2 uni_logon_srv; /* logon server unicode string */ UNISTR2 uni_logon_clnt; /* logon client unicode string */ DOM_CHAL clnt_chal; /* client challenge */} NET_Q_REQ_CHAL;/* NET_R_REQ_CHAL */typedef struct net_r_req_chal_info { DOM_CHAL srv_chal; /* server challenge */ NTSTATUS status; /* return code */} NET_R_REQ_CHAL;/* NET_Q_AUTH */typedef struct net_q_auth_info { DOM_LOG_INFO clnt_id; /* client identification info */ DOM_CHAL clnt_chal; /* client-calculated credentials */} NET_Q_AUTH;/* NET_R_AUTH */typedef struct net_r_auth_info { DOM_CHAL srv_chal; /* server-calculated credentials */ NTSTATUS status; /* return code */} NET_R_AUTH;/* NET_Q_AUTH_2 */typedef struct net_q_auth2_info { DOM_LOG_INFO clnt_id; /* client identification info */ DOM_CHAL clnt_chal; /* client-calculated credentials */ NEG_FLAGS clnt_flgs; /* usually 0x0000 01ff */} NET_Q_AUTH_2;/* NET_R_AUTH_2 */typedef struct net_r_auth2_info { DOM_CHAL srv_chal; /* server-calculated credentials */ NEG_FLAGS srv_flgs; /* usually 0x0000 01ff */ NTSTATUS status; /* return code */} NET_R_AUTH_2;/* NET_Q_AUTH_3 */typedef struct net_q_auth3_info { DOM_LOG_INFO clnt_id; /* client identification info */ DOM_CHAL clnt_chal; /* client-calculated credentials */ NEG_FLAGS clnt_flgs; /* usually 0x6007 ffff */} NET_Q_AUTH_3;/* NET_R_AUTH_3 */typedef struct net_r_auth3_info { DOM_CHAL srv_chal; /* server-calculated credentials */ NEG_FLAGS srv_flgs; /* usually 0x6007 ffff */ uint32 unknown; /* 0x0000045b */ NTSTATUS status; /* return code */} NET_R_AUTH_3;/* NET_Q_SRV_PWSET */typedef struct net_q_srv_pwset_info { DOM_CLNT_INFO clnt_id; /* client identification/authentication info */ uint8 pwd[16]; /* new password - undocumented. */} NET_Q_SRV_PWSET; /* NET_R_SRV_PWSET */typedef struct net_r_srv_pwset_info { DOM_CRED srv_cred; /* server-calculated credentials */ NTSTATUS status; /* return code */} NET_R_SRV_PWSET;/* NET_ID_INFO_2 */typedef struct net_network_info_2 { uint32 ptr_id_info2; /* pointer to id_info_2 */ UNIHDR hdr_domain_name; /* domain name unicode header */ uint32 param_ctrl; /* param control (0x2) */ DOM_LOGON_ID logon_id; /* logon ID */ UNIHDR hdr_user_name; /* user name unicode header */ UNIHDR hdr_wksta_name; /* workstation name unicode header */ uint8 lm_chal[8]; /* lan manager 8 byte challenge */ STRHDR hdr_nt_chal_resp; /* nt challenge response */ STRHDR hdr_lm_chal_resp; /* lm challenge response */ UNISTR2 uni_domain_name; /* domain name unicode string */ UNISTR2 uni_user_name; /* user name unicode string */ UNISTR2 uni_wksta_name; /* workgroup name unicode string */ STRING2 nt_chal_resp; /* nt challenge response */ STRING2 lm_chal_resp; /* lm challenge response */} NET_ID_INFO_2;/* NET_ID_INFO_1 */typedef struct id_info_1 { uint32 ptr_id_info1; /* pointer to id_info_1 */ UNIHDR hdr_domain_name; /* domain name unicode header */ uint32 param_ctrl; /* param control */ DOM_LOGON_ID logon_id; /* logon ID */ UNIHDR hdr_user_name; /* user name unicode header */ UNIHDR hdr_wksta_name; /* workstation name unicode header */ OWF_INFO lm_owf; /* LM OWF Password */ OWF_INFO nt_owf; /* NT OWF Password */ UNISTR2 uni_domain_name; /* domain name unicode string */ UNISTR2 uni_user_name; /* user name unicode string */ UNISTR2 uni_wksta_name; /* workgroup name unicode string */} NET_ID_INFO_1;#define INTERACTIVE_LOGON_TYPE 1#define NET_LOGON_TYPE 2
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -