summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorGerald Carter <jerry@samba.org>2003-08-22 14:24:38 +0000
committerGerald Carter <jerry@samba.org>2003-08-22 14:24:38 +0000
commitac5665f2046d9cf079e6eeddd6dc92b720ddc69f (patch)
treefe6111ef28532eff38caf07542d08c31e0299676
parent0c42b6deea6933c41fd74d670c25aca833f8d1a2 (diff)
downloadsamba-ac5665f2046d9cf079e6eeddd6dc92b720ddc69f.tar.gz
samba-ac5665f2046d9cf079e6eeddd6dc92b720ddc69f.tar.bz2
samba-ac5665f2046d9cf079e6eeddd6dc92b720ddc69f.zip
revert abartet's change that removed the check for CAP_EXTENDED_SECURITY when decidiing whether or not use ntlmv2 in client connections
(This used to be commit 6e82c9fdf9c1db6feec319b4550b07cbfad4defb)
-rw-r--r--source3/libsmb/cliconnect.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/source3/libsmb/cliconnect.c b/source3/libsmb/cliconnect.c
index bb0712d989..63db6b1aea 100644
--- a/source3/libsmb/cliconnect.c
+++ b/source3/libsmb/cliconnect.c
@@ -274,7 +274,7 @@ static BOOL cli_session_setup_nt1(struct cli_state *cli, const char *user,
/* if client ntlmv2 auth is set, then don't use it on a
connection without extended security. This isn't a very
good check, but it is a start */
- if (lp_client_ntlmv2_auth()) {
+ if ((cli->capabilities & CAP_EXTENDED_SECURITY) && lp_client_ntlmv2_auth()) {
DATA_BLOB server_chal;
DATA_BLOB names_blob;
server_chal = data_blob(cli->secblob.data, MIN(cli->secblob.length, 8));
@@ -357,7 +357,7 @@ static BOOL cli_session_setup_nt1(struct cli_state *cli, const char *user,
goto end;
}
- show_msg(cli->inbuf);
+ /* show_msg(cli->inbuf); */
if (cli_is_error(cli)) {
ret = False;