summaryrefslogtreecommitdiff
path: root/source3/rpc_server/srv_netlog_nt.c
diff options
context:
space:
mode:
authorVolker Lendecke <vlendec@samba.org>2003-04-22 11:25:10 +0000
committerVolker Lendecke <vlendec@samba.org>2003-04-22 11:25:10 +0000
commit8301c8c0e4e3085a6e661dd5c04b20fc89db0bc3 (patch)
tree217745afeabd4f88923ea2158125327958fd4468 /source3/rpc_server/srv_netlog_nt.c
parent434f312434faa1cd3c8f15644abbef400ac7b8bc (diff)
downloadsamba-8301c8c0e4e3085a6e661dd5c04b20fc89db0bc3.tar.gz
samba-8301c8c0e4e3085a6e661dd5c04b20fc89db0bc3.tar.bz2
samba-8301c8c0e4e3085a6e661dd5c04b20fc89db0bc3.zip
Setting the credentials for the netsec netlogon pipe connect upon each
samlogon call certainly breaks the credential chain. Do it once during the bind response. Volker (This used to be commit d4262c37f13642e034d3e207bfbb563c17a8a176)
Diffstat (limited to 'source3/rpc_server/srv_netlog_nt.c')
-rw-r--r--source3/rpc_server/srv_netlog_nt.c8
1 files changed, 0 insertions, 8 deletions
diff --git a/source3/rpc_server/srv_netlog_nt.c b/source3/rpc_server/srv_netlog_nt.c
index 76c1d98dab..aa573b8154 100644
--- a/source3/rpc_server/srv_netlog_nt.c
+++ b/source3/rpc_server/srv_netlog_nt.c
@@ -548,14 +548,6 @@ NTSTATUS _net_sam_logon(pipes_struct *p, NET_Q_SAM_LOGON *q_u, NET_R_SAM_LOGON *
return NT_STATUS_ACCESS_DENIED;
}
- if (p->netsec_auth_validated) {
- /* The client opens a second RPC NETLOGON pipe without
- doing a auth2. The session key for the schannel is
- re-used from the auth2 the client did before. */
- extern struct dcinfo last_dcinfo;
- p->dc = last_dcinfo;
- }
-
/* checks and updates credentials. creates reply credentials */
if (!(p->dc.authenticated && deal_with_creds(p->dc.sess_key, &p->dc.clnt_cred, &q_u->sam_id.client.cred, &srv_cred)))
return NT_STATUS_INVALID_HANDLE;