__  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

www-data@216.73.216.101: ~ $
#! /usr/bin/python3
# vim: expandtab
#
# update our DNS names using TSIG-GSS
#
# Copyright (C) Andrew Tridgell 2010
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.


import os
import fcntl
import sys
import tempfile
import subprocess

# ensure we get messages out immediately, so they get in the samba logs,
# and don't get swallowed by a timeout
os.environ['PYTHONUNBUFFERED'] = '1'

# forcing GMT avoids a problem in some timezones with kerberos. Both MIT
# heimdal can get mutual authentication errors due to the 24 second difference
# between UTC and GMT when using some zone files (eg. the PDT zone from
# the US)
os.environ["TZ"] = "GMT"

# Find right directory when running from source tree


import samba
import optparse
from samba import getopt as options
from ldb import SCOPE_BASE
from samba import dsdb
from samba.auth import system_session
from samba.samdb import SamDB
from samba.dcerpc import netlogon, winbind
from samba.netcmd.dns import cmd_dns
from samba import gensec
from samba.kcc import kcc_utils
from samba.common import get_string
import ldb

from samba.dnsresolver import DNSResolver
import dns.resolver
import dns.exception

default_ttl = 900
am_rodc = False
error_count = 0

parser = optparse.OptionParser("samba_dnsupdate [options]")
sambaopts = options.SambaOptions(parser)
parser.add_option_group(sambaopts)
parser.add_option_group(options.VersionOptions(parser))
parser.add_option("--verbose", action="store_true")
parser.add_option("--use-samba-tool", action="store_true", help="Use samba-tool to make updates over RPC, rather than over DNS")
parser.add_option("--use-nsupdate", action="store_true", help="Use nsupdate command to make updates over DNS (default, if kinit successful)")
parser.add_option("--all-names", action="store_true")
parser.add_option("--all-interfaces", action="store_true")
parser.add_option("--current-ip", action="append", help="IP address to update DNS to match (helpful if behind NAT, valid multiple times, defaults to values from interfaces=)")
parser.add_option("--rpc-server-ip", type="string", help="IP address of server to use with samba-tool (defaults to first --current-ip)")
parser.add_option("--use-file", type="string", help="Use a file, rather than real DNS calls")
parser.add_option("--update-list", type="string", help="Add DNS names from the given file")
parser.add_option("--update-cache", type="string", help="Cache database of already registered records")
parser.add_option("--fail-immediately", action='store_true', help="Exit on first failure")
parser.add_option("--no-credentials", dest='nocreds', action='store_true', help="don't try and get credentials")
parser.add_option("--no-substitutions", dest='nosubs', action='store_true', help="don't try and expands variables in file specified by --update-list")

creds = None
ccachename = None

opts, args = parser.parse_args()

if len(args) != 0:
    parser.print_usage()
    sys.exit(1)

lp = sambaopts.get_loadparm()

domain = lp.get("realm")
host = lp.get("netbios name")
all_interfaces = opts.all_interfaces

IPs = opts.current_ip or samba.interface_ips(lp, bool(all_interfaces)) or []

nsupdate_cmd = lp.get('nsupdate command')
dns_zone_scavenging = lp.get("dns zone scavenging")

if len(IPs) == 0:
    print("No IP interfaces - skipping DNS updates\n")
    parser.print_usage()
    sys.exit(0)

rpc_server_ip = opts.rpc_server_ip or IPs[0]

IP6s = [ip for ip in IPs if ':' in ip]
IP4s = [ip for ip in IPs if ':' not in ip]

smb_conf = sambaopts.get_loadparm_path()

if opts.verbose:
    print("IPs: %s" % IPs)

def get_possible_rw_dns_server(creds, domain):
    """Get a list of possible read-write DNS servers, starting with
       the SOA.  The SOA is the correct answer, but old Samba domains
       (4.6 and prior) do not maintain this value, so add NS servers
       as well"""

    ans_soa = check_one_dns_name(domain, 'SOA')
    # Actually there is only one
    hosts_soa = [str(a.mname).rstrip('.') for a in ans_soa]

    # This is not strictly legit, but old Samba domains may have an
    # unmaintained SOA record, so go for any NS that we can get a
    # ticket to.
    ans_ns = check_one_dns_name(domain, 'NS')
    # Actually there is only one
    hosts_ns = [str(a.target).rstrip('.') for a in ans_ns]

    return hosts_soa + hosts_ns

def get_krb5_rw_dns_server(creds, domain):
    """Get a list of read-write DNS servers that we can obtain a ticket
       for, starting with the SOA.  The SOA is the correct answer, but
       old Samba domains (4.6 and prior) do not maintain this value,
       so continue with the NS servers as well until we get one that
       the KDC will issue a ticket to.
    """

    rw_dns_servers = get_possible_rw_dns_server(creds, domain)
    # Actually there is only one
    for i, target_hostname in enumerate(rw_dns_servers):
        settings = {}
        settings["lp_ctx"] = lp
        settings["target_hostname"] = target_hostname

        gensec_client = gensec.Security.start_client(settings)
        gensec_client.set_credentials(creds)
        gensec_client.set_target_service("DNS")
        gensec_client.set_target_hostname(target_hostname)
        gensec_client.want_feature(gensec.FEATURE_SEAL)
        gensec_client.start_mech_by_sasl_name("GSSAPI")
        server_to_client = b""
        try:
            (client_finished, client_to_server) = gensec_client.update(server_to_client)
            if opts.verbose:
                print("Successfully obtained Kerberos ticket to DNS/%s as %s" \
                    % (target_hostname, creds.get_username()))
            return target_hostname
        except RuntimeError:
            # Only raise an exception if they all failed
            if i == len(rw_dns_servers) - 1:
                raise

def get_credentials(lp):
    """# get credentials if we haven't got them already."""
    from samba import credentials
    global ccachename
    creds = credentials.Credentials()
    creds.guess(lp)
    creds.set_machine_account(lp)
    creds.set_krb_forwardable(credentials.NO_KRB_FORWARDABLE)
    (tmp_fd, ccachename) = tempfile.mkstemp()
    try:
        if opts.use_file is not None:
            return

        creds.get_named_ccache(lp, ccachename)

        # Now confirm we can get a ticket to the DNS server
        get_krb5_rw_dns_server(creds, sub_vars['DNSDOMAIN'] + '.')
        return creds

    except RuntimeError as e:
        os.unlink(ccachename)
        raise e


class dnsobj(object):
    """an object to hold a parsed DNS line"""

    def __init__(self, string_form):
        list = string_form.split()
        if len(list) < 3:
            raise Exception("Invalid DNS entry %r" % string_form)
        self.dest = None
        self.port = None
        self.ip = None
        self.existing_port = None
        self.existing_weight = None
        self.existing_cname_target = None
        self.rpc = False
        self.zone = None
        if list[0] == "RPC":
            self.rpc = True
            self.zone = list[1]
            list = list[2:]
        self.type = list[0]
        self.name = list[1]
        self.nameservers = []
        if self.type == 'SRV':
            if len(list) < 4:
                raise Exception("Invalid DNS entry %r" % string_form)
            self.dest = list[2]
            self.port = list[3]
        elif self.type in ['A', 'AAAA']:
            self.ip   = list[2] # usually $IP, which gets replaced
        elif self.type == 'CNAME':
            self.dest = list[2]
        elif self.type == 'NS':
            self.dest = list[2]
        else:
            raise Exception("Received unexpected DNS reply of type %s: %s" % (self.type, string_form))

    def __str__(self):
        if self.type == "A":
            return "%s %s %s" % (self.type, self.name, self.ip)
        if self.type == "AAAA":
            return "%s %s %s" % (self.type, self.name, self.ip)
        if self.type == "SRV":
            return "%s %s %s %s" % (self.type, self.name, self.dest, self.port)
        if self.type == "CNAME":
            return "%s %s %s" % (self.type, self.name, self.dest)
        if self.type == "NS":
            return "%s %s %s" % (self.type, self.name, self.dest)


def parse_dns_line(line, sub_vars):
    """parse a DNS line from."""
    if line.startswith("SRV _ldap._tcp.pdc._msdcs.") and not samdb.am_pdc():
        # We keep this as compat to the dns_update_list of 4.0/4.1
        if opts.verbose:
            print("Skipping PDC entry (%s) as we are not a PDC" % line)
        return None
    subline = samba.substitute_var(line, sub_vars)
    if subline == '' or subline[0] == "#":
        return None
    return dnsobj(subline)


def hostname_match(h1, h2):
    """see if two hostnames match."""
    h1 = str(h1)
    h2 = str(h2)
    return h1.lower().rstrip('.') == h2.lower().rstrip('.')

def get_resolver(d=None):
    resolv_conf = os.getenv('RESOLV_CONF', default='/etc/resolv.conf')
    resolver = DNSResolver(filename=resolv_conf, configure=True)

    if d is not None and d.nameservers != []:
        resolver.nameservers = d.nameservers

    return resolver

def check_one_dns_name(name, name_type, d=None):
    resolver = get_resolver(d)
    if d and not d.nameservers:
        d.nameservers = resolver.nameservers
    # dns.resolver.Answer
    return resolver.resolve(name, name_type)

def check_dns_name(d):
    """check that a DNS entry exists."""
    normalised_name = d.name.rstrip('.') + '.'
    if opts.verbose:
        print("Looking for DNS entry %s as %s" % (d, normalised_name))

    if opts.use_file is not None:
        try:
            dns_file = open(opts.use_file, "r")
        except IOError:
            return False

        for line in dns_file:
            line = line.strip()
            if line == '' or line[0] == "#":
                continue
            if line.lower() == str(d).lower():
                return True
        return False

    try:
        ans = check_one_dns_name(normalised_name, d.type, d)
    except dns.exception.Timeout:
        raise Exception("Timeout while waiting to contact a working DNS server while looking for %s as %s" % (d, normalised_name))
    except dns.resolver.NoNameservers:
        raise Exception("Unable to contact a working DNS server while looking for %s as %s" % (d, normalised_name))
    except dns.resolver.NXDOMAIN:
        if opts.verbose:
            print("The DNS entry %s, queried as %s does not exist" % (d, normalised_name))
        return False
    except dns.resolver.NoAnswer:
        if opts.verbose:
            print("The DNS entry %s, queried as %s does not hold this record type" % (d, normalised_name))
        return False
    except dns.exception.DNSException:
        raise Exception("Failure while trying to resolve %s as %s" % (d, normalised_name))
    if d.type in ['A', 'AAAA']:
        # we need to be sure that our IP is there
        for rdata in ans:
            if str(rdata) == str(d.ip):
                return True
    elif d.type == 'CNAME':
        for i in range(len(ans)):
            if hostname_match(ans[i].target, d.dest):
                return True
            else:
                d.existing_cname_target = str(ans[i].target)
    elif d.type == 'NS':
        for i in range(len(ans)):
            if hostname_match(ans[i].target, d.dest):
                return True
    elif d.type == 'SRV':
        for rdata in ans:
            if opts.verbose:
                print("Checking %s against %s" % (rdata, d))
            if hostname_match(rdata.target, d.dest):
                if str(rdata.port) == str(d.port):
                    return True
                else:
                    d.existing_port     = str(rdata.port)
                    d.existing_weight = str(rdata.weight)

    if opts.verbose:
        print("Lookup of %s succeeded, but we failed to find a matching DNS entry for %s" % (normalised_name, d))

    return False


def get_subst_vars(samdb):
    """get the list of substitution vars."""
    global lp, am_rodc
    vars = {}

    vars['DNSDOMAIN'] = samdb.domain_dns_name()
    vars['DNSFOREST'] = samdb.forest_dns_name()
    vars['HOSTNAME']  = samdb.host_dns_name()
    vars['NTDSGUID']  = samdb.get_ntds_GUID()
    vars['SITE']      = samdb.server_site_name()
    res = samdb.search(base=samdb.get_default_basedn(), scope=SCOPE_BASE, attrs=["objectGUID"])
    guid = samdb.schema_format_value("objectGUID", res[0]['objectGUID'][0])
    vars['DOMAINGUID'] = get_string(guid)

    vars['IF_DC'] = ""
    vars['IF_RWDC'] = "# "
    vars['IF_RODC'] = "# "
    vars['IF_PDC'] = "# "
    vars['IF_GC'] = "# "
    vars['IF_RWGC'] = "# "
    vars['IF_ROGC'] = "# "
    vars['IF_DNS_DOMAIN'] = "# "
    vars['IF_RWDNS_DOMAIN'] = "# "
    vars['IF_RODNS_DOMAIN'] = "# "
    vars['IF_DNS_FOREST'] = "# "
    vars['IF_RWDNS_FOREST'] = "# "
    vars['IF_R0DNS_FOREST'] = "# "

    am_rodc = samdb.am_rodc()
    if am_rodc:
        vars['IF_RODC'] = ""
    else:
        vars['IF_RWDC'] = ""

    if samdb.am_pdc():
        vars['IF_PDC'] = ""

    # check if we "are DNS server"
    res = samdb.search(base=samdb.get_config_basedn(),
                   expression='(objectguid=%s)' % vars['NTDSGUID'],
                   attrs=["options", "msDS-hasMasterNCs"])

    if len(res) == 1:
        if "options" in res[0]:
            options = int(res[0]["options"][0])
            if (options & dsdb.DS_NTDSDSA_OPT_IS_GC) != 0:
                vars['IF_GC'] = ""
                if am_rodc:
                    vars['IF_ROGC'] = ""
                else:
                    vars['IF_RWGC'] = ""

        basedn = str(samdb.get_default_basedn())
        forestdn = str(samdb.get_root_basedn())

        if "msDS-hasMasterNCs" in res[0]:
            for e in res[0]["msDS-hasMasterNCs"]:
                if str(e) == "DC=DomainDnsZones,%s" % basedn:
                    vars['IF_DNS_DOMAIN'] = ""
                    if am_rodc:
                        vars['IF_RODNS_DOMAIN'] = ""
                    else:
                        vars['IF_RWDNS_DOMAIN'] = ""
                if str(e) == "DC=ForestDnsZones,%s" % forestdn:
                    vars['IF_DNS_FOREST'] = ""
                    if am_rodc:
                        vars['IF_RODNS_FOREST'] = ""
                    else:
                        vars['IF_RWDNS_FOREST'] = ""

    return vars


def call_nsupdate(d, op="add"):
    """call nsupdate for an entry."""
    global ccachename, nsupdate_cmd, krb5conf

    assert(op in ["add", "delete"])

    if opts.use_file is not None:
        if opts.verbose:
            print("Use File instead of nsupdate for %s (%s)" % (d, op))

        try:
            rfile = open(opts.use_file, 'r+')
        except IOError:
            # Perhaps create it
            open(opts.use_file, 'w+')
            # Open it for reading again, in case someone else got to it first
            rfile = open(opts.use_file, 'r+')
        fcntl.lockf(rfile, fcntl.LOCK_EX)
        (file_dir, file_name) = os.path.split(opts.use_file)
        (tmp_fd, tmpfile) = tempfile.mkstemp(dir=file_dir, prefix=file_name, suffix="XXXXXX")
        wfile = os.fdopen(tmp_fd, 'a')
        rfile.seek(0)
        for line in rfile:
            if op == "delete":
                l = parse_dns_line(line, {})
                if str(l).lower() == str(d).lower():
                    continue
            wfile.write(line)
        if op == "add":
            wfile.write(str(d)+"\n")
        os.rename(tmpfile, opts.use_file)
        fcntl.lockf(rfile, fcntl.LOCK_UN)
        return

    if opts.verbose:
        print("Calling nsupdate for %s (%s)" % (d, op))

    normalised_name = d.name.rstrip('.') + '.'

    (tmp_fd, tmpfile) = tempfile.mkstemp()
    f = os.fdopen(tmp_fd, 'w')

    resolver = get_resolver(d)

    # Local the zone for this name
    zone = dns.resolver.zone_for_name(normalised_name,
                                      resolver=resolver)

    # Now find the SOA, or if we can't get a ticket to the SOA,
    # any server with an NS record we can get a ticket for.
    #
    # Thanks to the Kerberos Credentials cache this is not
    # expensive inside the loop
    server = get_krb5_rw_dns_server(creds, zone)
    f.write('server %s\n' % server)

    if d.type == "A":
        f.write("update %s %s %u A %s\n" % (op, normalised_name, default_ttl, d.ip))
    if d.type == "AAAA":
        f.write("update %s %s %u AAAA %s\n" % (op, normalised_name, default_ttl, d.ip))
    if d.type == "SRV":
        if op == "add" and d.existing_port is not None:
            f.write("update delete %s SRV 0 %s %s %s\n" % (normalised_name, d.existing_weight,
                                                           d.existing_port, d.dest))
        f.write("update %s %s %u SRV 0 100 %s %s\n" % (op, normalised_name, default_ttl, d.port, d.dest))
    if d.type == "CNAME":
        f.write("update %s %s %u CNAME %s\n" % (op, normalised_name, default_ttl, d.dest))
    if d.type == "NS":
        f.write("update %s %s %u NS %s\n" % (op, normalised_name, default_ttl, d.dest))
    if opts.verbose:
        f.write("show\n")
    f.write("send\n")
    f.close()

    # Set a bigger MTU size to work around a bug in nsupdate's doio_send()
    os.environ["SOCKET_WRAPPER_MTU"] = "2000"

    global error_count
    if ccachename:
        os.environ["KRB5CCNAME"] = ccachename
    try:
        cmd = nsupdate_cmd[:]
        cmd.append(tmpfile)
        env = os.environ
        if krb5conf:
            env["KRB5_CONFIG"] = krb5conf
        if ccachename:
            env["KRB5CCNAME"] = ccachename
        ret = subprocess.call(cmd, shell=False, env=env)
        if ret != 0:
            if opts.fail_immediately:
                if opts.verbose:
                    print("Failed update with %s" % tmpfile)
                sys.exit(1)
            error_count = error_count + 1
            if opts.verbose:
                print("Failed nsupdate: %d" % ret)
    except Exception as estr:
        if opts.fail_immediately:
            sys.exit(1)
        error_count = error_count + 1
        if opts.verbose:
            print("Failed nsupdate: %s : %s" % (str(d), estr))
    os.unlink(tmpfile)

    # Let socket_wrapper set the default MTU size
    os.environ["SOCKET_WRAPPER_MTU"] = "0"


def call_samba_tool(d, op="add", zone=None):
    """call samba-tool dns to update an entry."""

    assert(op in ["add", "delete"])

    if (sub_vars['DNSFOREST'] != sub_vars['DNSDOMAIN']) and \
       sub_vars['DNSFOREST'].endswith('.' + sub_vars['DNSDOMAIN']):
        print("Refusing to use samba-tool when forest %s is under domain %s" \
            % (sub_vars['DNSFOREST'], sub_vars['DNSDOMAIN']))

    if opts.verbose:
        print("Calling samba-tool dns for %s (%s)" % (d, op))

    normalised_name = d.name.rstrip('.') + '.'
    if zone is None:
        if normalised_name == (sub_vars['DNSDOMAIN'] + '.'):
            short_name = '@'
            zone = sub_vars['DNSDOMAIN']
        elif normalised_name == (sub_vars['DNSFOREST'] + '.'):
            short_name = '@'
            zone = sub_vars['DNSFOREST']
        elif normalised_name == ('_msdcs.' + sub_vars['DNSFOREST'] + '.'):
            short_name = '@'
            zone = '_msdcs.' + sub_vars['DNSFOREST']
        else:
            if not normalised_name.endswith('.' + sub_vars['DNSDOMAIN'] + '.'):
                print("Not Calling samba-tool dns for %s (%s), %s not in %s" % (d, op, normalised_name, sub_vars['DNSDOMAIN'] + '.'))
                return False
            elif normalised_name.endswith('._msdcs.' + sub_vars['DNSFOREST'] + '.'):
                zone = '_msdcs.' + sub_vars['DNSFOREST']
            else:
                zone = sub_vars['DNSDOMAIN']
            len_zone = len(zone)+2
            short_name = normalised_name[:-len_zone]
    else:
        len_zone = len(zone)+2
        short_name = normalised_name[:-len_zone]

    if d.type == "A":
        args = [rpc_server_ip, zone, short_name, "A", d.ip]
    if d.type == "AAAA":
        args = [rpc_server_ip, zone, short_name, "AAAA", d.ip]
    if d.type == "SRV":
        if op == "add" and d.existing_port is not None:
            print("Not handling modify of existing SRV %s using samba-tool" % d)
            return False
        args = [rpc_server_ip, zone, short_name, "SRV",
                "%s %s %s %s" % (d.dest, d.port, "0", "100")]
    if d.type == "CNAME":
        if d.existing_cname_target is None:
            args = [rpc_server_ip, zone, short_name, "CNAME", d.dest]
        else:
            op = "update"
            args = [rpc_server_ip, zone, short_name, "CNAME",
                    d.existing_cname_target.rstrip('.'), d.dest]

    if d.type == "NS":
        args = [rpc_server_ip, zone, short_name, "NS", d.dest]

    if smb_conf and args:
        args += ["--configfile=" + smb_conf]

    global error_count
    try:
        cmd = cmd_dns()
        if opts.verbose:
            print(f'Calling samba-tool dns {op} --use-kerberos off -P {args}')
        ret = cmd._run("dns", op, "--use-kerberos", "off", "-P", *args)
        if ret == -1:
            if opts.fail_immediately:
                sys.exit(1)
            error_count = error_count + 1
            if opts.verbose:
                print("Failed 'samba-tool dns' based update of %s" % (str(d)))
    except Exception as estr:
        if opts.fail_immediately:
            sys.exit(1)
        error_count = error_count + 1
        if opts.verbose:
            print("Failed 'samba-tool dns' based update: %s : %s" % (str(d), estr))
        raise

irpc_wb = None
def cached_irpc_wb(lp):
    global irpc_wb
    if irpc_wb is not None:
        return irpc_wb
    irpc_wb = winbind.winbind("irpc:winbind_server", lp)
    return irpc_wb

def rodc_dns_update(d, t, op):
    '''a single DNS update via the RODC netlogon call'''
    global sub_vars

    assert(op in ["add", "delete"])

    if opts.verbose:
        print("Calling netlogon RODC update for %s" % d)

    typemap = {
        netlogon.NlDnsLdapAtSite       : netlogon.NlDnsInfoTypeNone,
        netlogon.NlDnsGcAtSite         : netlogon.NlDnsDomainNameAlias,
        netlogon.NlDnsDsaCname         : netlogon.NlDnsDomainNameAlias,
        netlogon.NlDnsKdcAtSite        : netlogon.NlDnsInfoTypeNone,
        netlogon.NlDnsDcAtSite         : netlogon.NlDnsInfoTypeNone,
        netlogon.NlDnsRfc1510KdcAtSite : netlogon.NlDnsInfoTypeNone,
        netlogon.NlDnsGenericGcAtSite  : netlogon.NlDnsDomainNameAlias
        }

    w = cached_irpc_wb(lp)
    dns_names = netlogon.NL_DNS_NAME_INFO_ARRAY()
    dns_names.count = 1
    name = netlogon.NL_DNS_NAME_INFO()
    name.type = t
    name.dns_domain_info_type = typemap[t]
    name.priority = 0
    name.weight   = 0
    if d.port is not None:
        name.port = int(d.port)
    if op == "add":
        name.dns_register = True
    else:
        name.dns_register = False
    dns_names.names = [ name ]
    site_name = sub_vars['SITE']

    global error_count

    try:
        ret_names = w.DsrUpdateReadOnlyServerDnsRecords(site_name, default_ttl, dns_names)
        if ret_names.names[0].status != 0:
            print("Failed to set DNS entry: %s (status %u)" % (d, ret_names.names[0].status))
            error_count = error_count + 1
    except RuntimeError as reason:
        print("Error setting DNS entry of type %u: %s: %s" % (t, d, reason))
        error_count = error_count + 1

    if opts.verbose:
        print("Called netlogon RODC update for %s" % d)

    if error_count != 0 and opts.fail_immediately:
        sys.exit(1)


def call_rodc_update(d, op="add"):
    '''RODCs need to use the netlogon API for nsupdate'''
    global lp, sub_vars

    assert(op in ["add", "delete"])

    # we expect failure for 3268 if we aren't a GC
    if d.port is not None and int(d.port) == 3268:
        return

    # map the DNS request to a netlogon update type
    map = {
        netlogon.NlDnsLdapAtSite       : '_ldap._tcp.${SITE}._sites.${DNSDOMAIN}',
        netlogon.NlDnsGcAtSite         : '_ldap._tcp.${SITE}._sites.gc._msdcs.${DNSDOMAIN}',
        netlogon.NlDnsDsaCname         : '${NTDSGUID}._msdcs.${DNSFOREST}',
        netlogon.NlDnsKdcAtSite        : '_kerberos._tcp.${SITE}._sites.dc._msdcs.${DNSDOMAIN}',
        netlogon.NlDnsDcAtSite         : '_ldap._tcp.${SITE}._sites.dc._msdcs.${DNSDOMAIN}',
        netlogon.NlDnsRfc1510KdcAtSite : '_kerberos._tcp.${SITE}._sites.${DNSDOMAIN}',
        netlogon.NlDnsGenericGcAtSite  : '_gc._tcp.${SITE}._sites.${DNSFOREST}'
        }

    for t in map:
        subname = samba.substitute_var(map[t], sub_vars)
        if subname.lower() == d.name.lower():
            # found a match - do the update
            rodc_dns_update(d, t, op)
            return
    if opts.verbose:
        print("Unable to map to netlogon DNS update: %s" % d)


# get the list of DNS entries we should have
dns_update_list = opts.update_list or lp.private_path('dns_update_list')

dns_update_cache = opts.update_cache or lp.private_path('dns_update_cache')

krb5conf = None
# only change the krb5.conf if we are not in selftest
if 'SOCKET_WRAPPER_DIR' not in os.environ:
    # use our private krb5.conf to avoid problems with the wrong domain
    # bind9 nsupdate wants the default domain set
    krb5conf = lp.private_path('krb5.conf')
    os.environ['KRB5_CONFIG'] = krb5conf

try:
    file = open(dns_update_list, "r")
except OSError as e:
    if opts.update_cache:
        print("The specified update list does not exist")
    else:
        print("The server update list was not found, "
              "and --update-list was not provided.")
    print(e)
    print()
    parser.print_usage()
    sys.exit(1)

if opts.nosubs:
    sub_vars = {}
else:
    samdb = SamDB(url=lp.samdb_url(), session_info=system_session(), lp=lp)

    # get the substitution dictionary
    sub_vars = get_subst_vars(samdb)

# build up a list of update commands to pass to nsupdate
update_list = []
dns_list = []
cache_list = []
delete_list = []

dup_set = set()
cache_set = set()

rebuild_cache = False
try:
    cfile = open(dns_update_cache, 'r+')
except IOError:
    # Perhaps create it
    open(dns_update_cache, 'w+')
    # Open it for reading again, in case someone else got to it first
    cfile = open(dns_update_cache, 'r+')
fcntl.lockf(cfile, fcntl.LOCK_EX)
for line in cfile:
    line = line.strip()
    if line == '' or line[0] == "#":
        continue
    c = parse_dns_line(line, {})
    if c is None:
        continue
    if str(c) not in cache_set:
        cache_list.append(c)
        cache_set.add(str(c))

site_specific_rec = []

# read each line, and check that the DNS name exists
for line in file:
    line = line.strip()

    if '${SITE}' in line:
        site_specific_rec.append(line)

    if line == '' or line[0] == "#":
        continue
    d = parse_dns_line(line, sub_vars)
    if d is None:
        continue
    if d.type == 'A' and len(IP4s) == 0:
        continue
    if d.type == 'AAAA' and len(IP6s) == 0:
        continue
    if str(d) not in dup_set:
        dns_list.append(d)
        dup_set.add(str(d))

# Perform automatic site coverage by default
auto_coverage = True

if not am_rodc and auto_coverage:
    site_names = kcc_utils.uncovered_sites_to_cover(samdb,
                                                    samdb.server_site_name())

    # Duplicate all site specific records for the uncovered site
    for site in site_names:
        to_add = [samba.substitute_var(line, {'SITE': site})
                  for line in site_specific_rec]

        for site_line in to_add:
            d = parse_dns_line(site_line,
                               sub_vars=sub_vars)
            if d is not None and str(d) not in dup_set:
                dns_list.append(d)
                dup_set.add(str(d))

# now expand the entries, if any are A record with ip set to $IP
# then replace with multiple entries, one for each interface IP
for d in dns_list:
    if d.ip != "$IP":
        continue
    if d.type == 'A':
        d.ip = IP4s[0]
        for i in range(len(IP4s)-1):
            d2 = dnsobj(str(d))
            d2.ip = IP4s[i+1]
            dns_list.append(d2)
    if d.type == 'AAAA':
        d.ip = IP6s[0]
        for i in range(len(IP6s)-1):
            d2 = dnsobj(str(d))
            d2.ip = IP6s[i+1]
            dns_list.append(d2)

# now check if the entries already exist on the DNS server
for d in dns_list:
    found = False
    for c in cache_list:
        if str(c).lower() == str(d).lower():
            found = True
            break
    if not found:
        rebuild_cache = True
        if opts.verbose:
            print("need cache add: %s" % d)
    if dns_zone_scavenging:
        update_list.append(d)
        if opts.verbose:
            print("scavenging requires update: %s" % d)
    elif opts.all_names:
        update_list.append(d)
        if opts.verbose:
            print("force update: %s" % d)
    elif not check_dns_name(d):
        update_list.append(d)
        if opts.verbose:
            print("need update: %s" % d)

for c in cache_list:
    found = False
    for d in dns_list:
        if str(c).lower() == str(d).lower():
            found = True
            break
    if found:
        continue
    rebuild_cache = True
    if opts.verbose:
        print("need cache remove: %s" % c)
    if not opts.all_names and not check_dns_name(c):
        continue
    delete_list.append(c)
    if opts.verbose:
        print("need delete: %s" % c)

if len(delete_list) == 0 and len(update_list) == 0 and not rebuild_cache:
    if opts.verbose:
        print("No DNS updates needed")
    sys.exit(0)
else:
    if opts.verbose:
        print("%d DNS updates and %d DNS deletes needed" % (len(update_list), len(delete_list)))

use_samba_tool = opts.use_samba_tool
use_nsupdate = opts.use_nsupdate
# get our krb5 creds
if (delete_list or update_list) and not opts.nocreds:
    try:
        creds = get_credentials(lp)
    except RuntimeError as e:
        ccachename = None

        if sub_vars['IF_RWDNS_DOMAIN'] == "# ":
            raise

        if use_nsupdate:
            raise

        print("Failed to get Kerberos credentials, falling back to samba-tool: %s" % e)
        use_samba_tool = True


# ask nsupdate to delete entries as needed
for d in delete_list:
    if d.rpc or (not use_nsupdate and use_samba_tool):
        if opts.verbose:
            print("delete (samba-tool): %s" % d)
        call_samba_tool(d, op="delete", zone=d.zone)

    elif am_rodc:
        if d.name.lower() == domain.lower():
            if opts.verbose:
                print("skip delete (rodc): %s" % d)
            continue
        if not d.type in [ 'A', 'AAAA' ]:
            if opts.verbose:
                print("delete (rodc): %s" % d)
            call_rodc_update(d, op="delete")
        else:
            if opts.verbose:
                print("delete (nsupdate): %s" % d)
            call_nsupdate(d, op="delete")
    else:
        if opts.verbose:
            print("delete (nsupdate): %s" % d)
        call_nsupdate(d, op="delete")

# ask nsupdate to add entries as needed
for d in update_list:
    if d.rpc or (not use_nsupdate and use_samba_tool):
        if opts.verbose:
            print("update (samba-tool): %s" % d)
        call_samba_tool(d, zone=d.zone)

    elif am_rodc:
        if d.name.lower() == domain.lower():
            if opts.verbose:
                print("skip (rodc): %s" % d)
            continue
        if not d.type in [ 'A', 'AAAA' ]:
            if opts.verbose:
                print("update (rodc): %s" % d)
            call_rodc_update(d)
        else:
            if opts.verbose:
                print("update (nsupdate): %s" % d)
            call_nsupdate(d)
    else:
        if opts.verbose:
            print("update(nsupdate): %s" % d)
        call_nsupdate(d)

if rebuild_cache:
    print("Rebuilding cache at %s" % dns_update_cache)
    (file_dir, file_name) = os.path.split(dns_update_cache)
    (tmp_fd, tmpfile) = tempfile.mkstemp(dir=file_dir, prefix=file_name, suffix="XXXXXX")
    wfile = os.fdopen(tmp_fd, 'a')
    for d in dns_list:
        if opts.verbose:
            print("Adding %s to %s" % (str(d), file_name))
        wfile.write(str(d)+"\n")
    wfile.flush()
    os.rename(tmpfile, dns_update_cache)
fcntl.lockf(cfile, fcntl.LOCK_UN)

# delete the ccache if we created it
if ccachename is not None:
    os.unlink(ccachename)

if error_count != 0:
    print("Failed update of %u entries" % error_count)
sys.exit(error_count)

Filemanager

Name Type Size Permission Actions
ModemManager File 2.07 MB 0755
NetworkManager File 3.26 MB 0755
a2disconf File 15.86 KB 0755
a2dismod File 15.86 KB 0755
a2dissite File 15.86 KB 0755
a2enconf File 15.86 KB 0755
a2enmod File 15.86 KB 0755
a2ensite File 15.86 KB 0755
a2query File 9.6 KB 0755
aa-remove-unknown File 3.13 KB 0755
aa-status File 66.23 KB 0755
aa-teardown File 137 B 0755
accessdb File 66.3 KB 0755
add-shell File 1.03 KB 0755
addgnupghome File 3 KB 0755
addgroup File 47.25 KB 0755
adduser File 47.25 KB 0755
agetty File 131.33 KB 0755
alsa-info File 28.01 KB 0755
alsabat-test File 4.04 KB 0755
alsactl File 131.37 KB 0755
apache2 File 784.21 KB 0755
apache2ctl File 7.19 KB 0755
apachectl File 7.19 KB 0755
apparmor_parser File 1.4 MB 0755
apparmor_status File 66.23 KB 0755
applygnupgdefaults File 2.17 KB 0755
arp File 69.8 KB 0755
arpd File 144.3 KB 0755
arptables File 262.95 KB 0755
arptables-nft File 262.95 KB 0755
arptables-nft-restore File 262.95 KB 0755
arptables-nft-save File 262.95 KB 0755
arptables-restore File 262.95 KB 0755
arptables-save File 262.95 KB 0755
aspell-autobuildhash File 13.36 KB 0755
avahi-daemon File 194.27 KB 0755
badblocks File 66.1 KB 0755
blkdeactivate File 15.96 KB 0755
blkdiscard File 66.16 KB 0755
blkid File 194.2 KB 0755
blkmapd File 66.2 KB 0755
blkzone File 130.16 KB 0755
blockdev File 130.16 KB 0755
bluetoothd File 1.46 MB 0755
bridge File 208.34 KB 0755
capsh File 68.81 KB 0755
cfdisk File 130.5 KB 0755
cgdisk File 258.26 KB 0755
chat File 26.09 KB 0755
chcpu File 66.16 KB 0755
check_forensic File 952 B 0755
chgpasswd File 70.02 KB 0755
chmem File 130.16 KB 0755
chpasswd File 70.07 KB 0755
chroot File 66.95 KB 0755
cifs.idmap File 66.16 KB 0755
cifs.upcall File 66.34 KB 0755
cpgr File 72.05 KB 0755
cppw File 72.05 KB 0755
cracklib-check File 65.93 KB 0755
cracklib-format File 231 B 0755
cracklib-packer File 65.93 KB 0755
cracklib-unpacker File 65.93 KB 0755
create-cracklib-dict File 990 B 0755
cron File 66.38 KB 0755
ctrlaltdel File 66.16 KB 0755
cups-browsed File 258.67 KB 0755
cupsaccept File 66.09 KB 0755
cupsctl File 66.16 KB 0755
cupsd File 450.64 KB 0755
cupsdisable File 66.09 KB 0755
cupsenable File 66.09 KB 0755
cupsfilter File 66.36 KB 0755
cupsreject File 66.09 KB 0755
dbconfig-generate-include File 12.36 KB 0755
dbconfig-load-include File 5.57 KB 0755
dcb File 144.41 KB 0755
ddns-confgen File 66.08 KB 0755
debugfs File 265.6 KB 0755
delgroup File 16.33 KB 0755
deluser File 16.33 KB 0755
depmod File 194.28 KB 0755
devlink File 272.72 KB 0755
dhclient File 2.59 MB 0755
dhclient-script File 14.21 KB 0755
dmidecode File 130.77 KB 0755
dmsetup File 198.68 KB 0755
dmstats File 198.68 KB 0755
dnsmasq File 457.04 KB 0755
dosfsck File 78.16 KB 0755
dosfslabel File 50.16 KB 0755
dphys-swapfile File 8.35 KB 0755
dpkg-preconfigure File 3.83 KB 0755
dpkg-reconfigure File 4.38 KB 0755
dump.exfat File 66.21 KB 0755
dumpe2fs File 66.09 KB 0755
e2freefrag File 66.09 KB 0755
e2fsck File 340.03 KB 0755
e2image File 66.28 KB 0755
e2label File 130.33 KB 0755
e2mmpstatus File 66.09 KB 0755
e2scrub File 7.12 KB 0755
e2scrub_all File 5.27 KB 0755
e2undo File 66.09 KB 0755
e4crypt File 66.16 KB 0755
e4defrag File 66.09 KB 0755
ebtables File 262.95 KB 0755
ebtables-nft File 262.95 KB 0755
ebtables-nft-restore File 262.95 KB 0755
ebtables-nft-save File 262.95 KB 0755
ebtables-restore File 262.95 KB 0755
ebtables-save File 262.95 KB 0755
ebtables-translate File 262.95 KB 0755
escapesrc File 66.17 KB 0755
ethtool File 644.28 KB 0755
eventlogadm File 514.16 KB 0755
exfat2img File 66.21 KB 0755
exfatlabel File 66.24 KB 0755
faillock File 66.09 KB 0755
fake-hwclock File 2.06 KB 0755
fatlabel File 50.16 KB 0755
fdisk File 194.19 KB 0755
filefrag File 66.11 KB 0755
findfs File 66.16 KB 0755
fixparts File 66.26 KB 0755
flashrom File 834.44 KB 0755
fsck File 66.2 KB 0755
fsck.cramfs File 66.22 KB 0755
fsck.exfat File 66.93 KB 0755
fsck.ext2 File 340.03 KB 0755
fsck.ext3 File 340.03 KB 0755
fsck.ext4 File 340.03 KB 0755
fsck.fat File 78.16 KB 0755
fsck.minix File 194.19 KB 0755
fsck.msdos File 78.16 KB 0755
fsck.vfat File 78.16 KB 0755
fsfreeze File 66.16 KB 0755
fstab-decode File 66.09 KB 0755
fstrim File 130.16 KB 0755
gdisk File 258.26 KB 0755
genccode File 66.52 KB 0755
gencmn File 66.52 KB 0755
genl File 144.3 KB 0755
gennorm2 File 66.67 KB 0755
gensprep File 66.59 KB 0755
getcap File 66.09 KB 0755
getpcaps File 66.09 KB 0755
getty File 131.33 KB 0755
gnome-menus-blacklist File 2.23 KB 0755
gpart File 66.98 KB 0755
gparted File 7.15 KB 0755
groupadd File 138.61 KB 0755
groupdel File 138.44 KB 0755
groupmems File 70.04 KB 0755
groupmod File 138.58 KB 0755
grpck File 70.01 KB 0755
grpconv File 69.87 KB 0755
grpunconv File 69.87 KB 0755
halt File 1.32 MB 0755
httxt2dbm File 66.09 KB 0755
hwclock File 130.23 KB 0755
i2c-stub-from-dump File 5.45 KB 0755
i2cdetect File 66.56 KB 0755
i2cdump File 66.61 KB 0755
i2cget File 66.59 KB 0755
i2cset File 66.61 KB 0755
i2ctransfer File 66.54 KB 0755
iconvconfig File 66.53 KB 0755
icupkg File 66.88 KB 0755
ifconfig File 133.66 KB 0755
iftop File 130.54 KB 0755
iio-sensor-proxy File 66.84 KB 0755
init File 130.34 KB 0755
insmod File 194.28 KB 0755
install-sgmlcatalog File 4.44 KB 0755
installkernel File 2.6 KB 0755
invoke-rc.d File 16.13 KB 0755
ip File 729.26 KB 0755
ip6tables File 262.95 KB 0755
ip6tables-apply File 6.87 KB 0755
ip6tables-legacy File 132.77 KB 0755
ip6tables-legacy-restore File 132.77 KB 0755
ip6tables-legacy-save File 132.77 KB 0755
ip6tables-nft File 262.95 KB 0755
ip6tables-nft-restore File 262.95 KB 0755
ip6tables-nft-save File 262.95 KB 0755
ip6tables-restore File 262.95 KB 0755
ip6tables-restore-translate File 262.95 KB 0755
ip6tables-save File 262.95 KB 0755
ip6tables-translate File 262.95 KB 0755
ipmaddr File 66.45 KB 0755
ipp-usb File 5 MB 0755
ippevepcl File 66.09 KB 0755
ippeveprinter File 194.16 KB 0755
ippeveps File 66.09 KB 0755
iptables File 262.95 KB 0755
iptables-apply File 6.87 KB 0755
iptables-legacy File 132.77 KB 0755
iptables-legacy-restore File 132.77 KB 0755
iptables-legacy-save File 132.77 KB 0755
iptables-nft File 262.95 KB 0755
iptables-nft-restore File 262.95 KB 0755
iptables-nft-save File 262.95 KB 0755
iptables-restore File 262.95 KB 0755
iptables-restore-translate File 262.95 KB 0755
iptables-save File 262.95 KB 0755
iptables-translate File 262.95 KB 0755
iptunnel File 66.44 KB 0755
isosize File 66.16 KB 0755
ispell-autobuildhash File 15.52 KB 0755
iw File 334.91 KB 0755
iwconfig File 66.45 KB 0755
iwevent File 66.45 KB 0755
iwgetid File 66.27 KB 0755
iwlist File 66.57 KB 0755
iwpriv File 66.33 KB 0755
iwspy File 66.22 KB 0755
kbdrate File 66.62 KB 0755
key.dns_resolver File 66.17 KB 0755
killall5 File 66.21 KB 0755
ldattach File 66.16 KB 0755
ldconfig File 842.86 KB 0755
lightdm File 322.01 KB 0755
lightdm-gtk-greeter File 142.11 KB 0755
locale-gen File 1.38 KB 0755
logrotate File 130.02 KB 0755
logsave File 65.94 KB 0755
losetup File 130.26 KB 0755
lpadmin File 66.09 KB 0755
lpinfo File 66.09 KB 0755
lpmove File 66.09 KB 0755
lsmod File 194.28 KB 0755
make-ssl-cert File 6.65 KB 0755
mariadbd File 25.06 MB 0755
mii-tool File 66.91 KB 0755
mkdosfs File 58.67 KB 0755
mke2fs File 194.38 KB 0755
mkfs File 66.16 KB 0755
mkfs.bfs File 66.16 KB 0755
mkfs.cramfs File 66.09 KB 0755
mkfs.exfat File 66.16 KB 0755
mkfs.ext2 File 194.38 KB 0755
mkfs.ext3 File 194.38 KB 0755
mkfs.ext4 File 194.38 KB 0755
mkfs.fat File 58.67 KB 0755
mkfs.minix File 130.17 KB 0755
mkfs.msdos File 58.67 KB 0755
mkfs.ntfs File 130.2 KB 0755
mkfs.vfat File 58.67 KB 0755
mkhomedir_helper File 74.11 KB 0755
mkinitramfs File 12.6 KB 0755
mklost+found File 66.09 KB 0755
mkntfs File 130.2 KB 0755
mkswap File 130.16 KB 0755
modinfo File 194.28 KB 0755
modprobe File 194.28 KB 0755
mount.cifs File 66.84 KB 4755
mount.fuse File 66.15 KB 0755
mount.fuse.sshfs File 132.55 KB 0755
mount.fuse3 File 66.15 KB 0755
mount.lowntfs-3g File 130.77 KB 0755
mount.nfs File 130.76 KB 4755
mount.nfs4 File 130.76 KB 4755
mount.ntfs File 194.8 KB 4755
mount.ntfs-3g File 194.8 KB 4755
mount.smb3 File 66.84 KB 4755
mount.sshfs File 132.55 KB 0755
mountstats File 42.28 KB 0755
mysqld File 25.06 MB 0755
named File 589.91 KB 0755
nameif File 66.54 KB 0755
newusers File 138.49 KB 0755
nfnl_osf File 66.09 KB 0755
nfsconf File 66.53 KB 0755
nfsidmap File 66.19 KB 0755
nfsiostat File 24.41 KB 0755
nfsstat File 69.02 KB 0755
nft File 66.01 KB 0755
nmbd File 258.11 KB 0755
nologin File 66.08 KB 0755
ntfsclone File 66.2 KB 0755
ntfscp File 66.19 KB 0755
ntfslabel File 66.19 KB 0755
ntfsresize File 130.2 KB 0755
ntfsundelete File 66.19 KB 0755
ntpd File 588.32 KB 0755
ntpkeygen File 3.66 KB 0755
ntpleapfetch File 13.36 KB 0755
ntptime File 66.19 KB 0755
ntpwait File 4.59 KB 0755
pam-auth-update File 20.79 KB 0755
pam_getenv File 2.82 KB 0755
pam_namespace_helper File 467 B 0755
pam_timestamp_check File 66.09 KB 0755
paperconfig File 4.07 KB 0755
parted File 130.35 KB 0755
partprobe File 66.16 KB 0755
phpdismod File 7.11 KB 0755
phpenmod File 7.11 KB 0755
phpquery File 6.24 KB 0755
pi-greeter File 67.8 KB 0755
pivot_root File 66.16 KB 0755
pkla-admin-identities File 66.16 KB 0755
pkla-check-authorization File 66.16 KB 0755
plipconfig File 66.36 KB 0755
plymouth-set-default-theme File 6.06 KB 0755
plymouthd File 132 KB 0755
poweroff File 1.32 MB 0755
pppd File 397.7 KB 4754
pppdump File 18.16 KB 0755
pppoe-discovery File 22.08 KB 0755
pppstats File 14.08 KB 0755
pwck File 69.98 KB 0755
pwconv File 69.86 KB 0755
pwhistory_helper File 66.09 KB 0755
pwunconv File 69.85 KB 0755
rarp File 68.8 KB 0755
readprofile File 66.2 KB 0755
realm File 194.54 KB 0755
reboot File 1.32 MB 0755
remove-default-ispell File 2.86 KB 0755
remove-default-wordlist File 2.86 KB 0755
remove-shell File 1.08 KB 0755
request-key File 66.1 KB 0755
resize2fs File 66.09 KB 0755
rfkill File 66.01 KB 0755
rmmod File 194.28 KB 0755
rmt File 66.86 KB 0755
rmt-tar File 66.86 KB 0755
rndc File 66.09 KB 0755
rndc-confgen File 66.09 KB 0755
route File 68.95 KB 0755
rpc.gssd File 130.43 KB 0755
rpc.idmapd File 74.36 KB 0755
rpc.statd File 134.8 KB 0755
rpc.svcgssd File 66.34 KB 0755
rpcbind File 66.32 KB 0755
rpcctl File 9.42 KB 0755
rpcdebug File 66.16 KB 0755
rpcinfo File 66.45 KB 0755
rtacct File 80.18 KB 0755
rtcwake File 66.16 KB 0755
rtkitctl File 66.16 KB 0755
rtmon File 144.27 KB 0755
runlevel File 1.32 MB 0755
runuser File 130.19 KB 0755
samba File 66.11 KB 0755
samba-gpupdate File 5.78 KB 0755
samba_dnsupdate File 32.24 KB 0755
samba_downgrade_db File 4.07 KB 0755
samba_kcc File 11.9 KB 0755
samba_spnupdate File 7.88 KB 0755
samba_upgradedns File 21.66 KB 0755
saned File 66.53 KB 0755
select-default-ispell File 3.23 KB 0755
select-default-wordlist File 3.21 KB 0755
service File 8.89 KB 0755
setcap File 66.09 KB 0755
setvesablank File 66.39 KB 0755
sfdisk File 194.16 KB 0755
sgdisk File 194.26 KB 0755
shadowconfig File 2.22 KB 0755
showmount File 66.35 KB 0755
shutdown File 1.32 MB 0755
slattach File 68.9 KB 0755
sm-notify File 134.34 KB 0755
smbd File 66.16 KB 0755
split-logfile File 2.36 KB 0755
sshd File 1.25 MB 0755
start-statd File 1023 B 0755
start-stop-daemon File 67.27 KB 0755
sudo_logsrvd File 260.41 KB 0755
sudo_sendlog File 195.48 KB 0755
sulogin File 66.16 KB 0755
swaplabel File 66.16 KB 0755
swapoff File 66.16 KB 0755
swapon File 66.16 KB 0755
switch_root File 66.2 KB 0755
sysctl File 66.2 KB 0755
tarcat File 936 B 0755
tc File 601.16 KB 0755
telinit File 1.32 MB 0755
th-cmd File 66.52 KB 0755
thd File 73.35 KB 0755
tipc File 208.58 KB 0755
tor File 3.36 MB 0755
tor-instance-create File 2.58 KB 0755
tsig-keygen File 66.08 KB 0755
tune.exfat File 66.37 KB 0755
tune2fs File 130.33 KB 0755
ufw File 4.84 KB 0755
umount.nfs File 130.76 KB 4755
umount.nfs4 File 130.76 KB 4755
umount.udisks2 File 66.08 KB 0755
unix_chkpwd File 66.09 KB 2755
unix_update File 66.09 KB 0755
update-ca-certificates File 5.29 KB 0755
update-catalog File 9.17 KB 0755
update-cracklib File 1.15 KB 0755
update-default-aspell File 1 KB 0755
update-default-ispell File 9.68 KB 0755
update-default-wordlist File 7.5 KB 0755
update-dictcommon-aspell File 1 KB 0755
update-dictcommon-hunspell File 782 B 0755
update-fonts-alias File 5.71 KB 0755
update-fonts-dir File 3.98 KB 0755
update-fonts-scale File 6.1 KB 0755
update-gsfontmap File 470 B 0755
update-icon-caches File 596 B 0755
update-inetd File 5.83 KB 0755
update-initramfs File 8.15 KB 0755
update-locale File 2.99 KB 0755
update-mime File 9.39 KB 0755
update-passwd File 66.33 KB 0755
update-pciids File 1.71 KB 0755
update-rc.d File 17.33 KB 0755
update-shells File 3.89 KB 0755
update-xmlcatalog File 16.88 KB 0755
usb_modeswitch File 55.42 KB 0755
usb_modeswitch_dispatcher File 29.93 KB 0755
useradd File 203.4 KB 0755
userdel File 138.53 KB 0755
usermod File 139.23 KB 0755
v4l2-dbg File 75.23 KB 0755
validlocale File 1.73 KB 0755
vcstime File 66.27 KB 0755
vdpa File 144.45 KB 0755
vigr File 72.27 KB 0755
vipw File 72.27 KB 0755
visudo File 268.27 KB 0755
vsftpd File 196.16 KB 0755
wayvnc-control.py File 2.3 KB 0755
wayvnc-generate-keys.sh File 1.02 KB 0755
wayvnc-run.sh File 524 B 0755
wipefs File 66.16 KB 0755
wpa_action File 1.69 KB 0755
wpa_cli File 196.38 KB 0755
wpa_supplicant File 3.13 MB 0755
xtables-legacy-multi File 132.77 KB 0755
xtables-monitor File 262.95 KB 0755
xtables-nft-multi File 262.95 KB 0755
zic File 66.48 KB 0755
zramctl File 130.26 KB 0755
Filemanager