diff options
author | Jeremy Allison <jra@samba.org> | 1998-11-10 20:51:25 +0000 |
---|---|---|
committer | Jeremy Allison <jra@samba.org> | 1998-11-10 20:51:25 +0000 |
commit | 375e53826c59c33d52009307f757b71a1fe3d589 (patch) | |
tree | ce9a53fa7e12ef495eb9d3f455e46416a8f22b27 /source3/include/smb.h | |
parent | 84934fbfac7644191e09124dd4961c6c08de3b9f (diff) | |
download | samba-375e53826c59c33d52009307f757b71a1fe3d589.tar.gz samba-375e53826c59c33d52009307f757b71a1fe3d589.tar.bz2 samba-375e53826c59c33d52009307f757b71a1fe3d589.zip |
include/local.h:
include/smb.h:
param/loadparm.c: Made GUEST_SESSSETUP run time selectable. Horror of horrors :-).
printing/printing.c: Added J.F.'s latest fix.
rpc_parse/parse_misc.c:
parse_reg.c:
rpcclient/cmd_reg.c:
rpcclient/display.c: SGI compiler signed/unsigned issues.
smbd/reply.c: Made GUEST_SESSSETUP run time selectable. Horror of horrors :-).
utils/testparm.c: Added extra test.
Jeremy.
(This used to be commit 9668a5ef50be2e6b575f9989e87ee2ff8da5ac1d)
Diffstat (limited to 'source3/include/smb.h')
-rw-r--r-- | source3/include/smb.h | 25 |
1 files changed, 25 insertions, 0 deletions
diff --git a/source3/include/smb.h b/source3/include/smb.h index a8b0c745b2..db7b251d65 100644 --- a/source3/include/smb.h +++ b/source3/include/smb.h @@ -1684,6 +1684,31 @@ struct nmb_name { #define NEW_PW_FORMAT_SPACE_PADDED_LEN 14 +/* + Do you want session setups at user level security with a invalid + password to be rejected or allowed in as guest? WinNT rejects them + but it can be a pain as it means "net view" needs to use a password + + You have 3 choices in the setting of map_to_guest: + + "NEVER_MAP_TO_GUEST" means session setups with an invalid password + are rejected. This is the default. + + "MAP_TO_GUEST_ON_BAD_USER" means session setups with an invalid password + are rejected, unless the username does not exist, in which case it + is treated as a guest login + + "MAP_TO_GUEST_ON_BAD_PASSWORD" means session setups with an invalid password + are treated as a guest login + + Note that map_to_guest only has an effect in user or server + level security. +*/ + +#define NEVER_MAP_TO_GUEST 0 +#define MAP_TO_GUEST_ON_BAD_USER 1 +#define MAP_TO_GUEST_ON_BAD_PASSWORD 2 + #endif /* _SMB_H */ /* _SMB_H */ |