summaryrefslogtreecommitdiff
path: root/source3/rpc_server
diff options
context:
space:
mode:
authorJeremy Allison <jra@samba.org>1998-06-05 20:46:05 +0000
committerJeremy Allison <jra@samba.org>1998-06-05 20:46:05 +0000
commit88d88f5d0d23c8c849739b9441872734c0431c99 (patch)
tree0caf673ca832fc86a6dd5bd162d2f3f61c408a5b /source3/rpc_server
parent28029c73b75538cd2903965664c6bcc3f22d7230 (diff)
downloadsamba-88d88f5d0d23c8c849739b9441872734c0431c99.tar.gz
samba-88d88f5d0d23c8c849739b9441872734c0431c99.tar.bz2
samba-88d88f5d0d23c8c849739b9441872734c0431c99.zip
loadparm.c: Did it ! Changed defaults for 'case preserve' and 'short case preserve'.
Also removed 'domain allow/deny' parameters. shmem_sysv.c: Added strerror code so I can see why sysV calls are failing. lib/rpc/server/srv_netlog.c: Removed code that used 'domain allow/deny' parameters - replaced with a comment so I will remember to fix this later. Jeremy. (This used to be commit 5f46c7c4b11a75f1ffbd806cde915b4bf28232db)
Diffstat (limited to 'source3/rpc_server')
-rw-r--r--source3/rpc_server/srv_netlog.c12
1 files changed, 11 insertions, 1 deletions
diff --git a/source3/rpc_server/srv_netlog.c b/source3/rpc_server/srv_netlog.c
index 821945b757..0679e876e2 100644
--- a/source3/rpc_server/srv_netlog.c
+++ b/source3/rpc_server/srv_netlog.c
@@ -229,7 +229,16 @@ static void net_reply_sam_logoff(NET_Q_SAM_LOGOFF *q_s, prs_struct *rdata,
static BOOL get_md4pw(char *md4pw, char *mach_name, char *mach_acct)
{
struct smb_passwd *smb_pass;
- extern int Client;
+
+#if 0
+ /*
+ * Currently this code is redundent as we already have a filter
+ * by hostname list. What this code really needs to do is to
+ * get a hosts allowed/hosts denied list from the SAM database
+ * on a per user basis, and make the access decision there.
+ * I will leave this code here for now as a reminder to implement
+ * this at a later date. JRA.
+ */
if (!allow_access(lp_domain_hostsdeny(), lp_domain_hostsallow(),
client_name(Client), client_addr(Client)))
@@ -237,6 +246,7 @@ static BOOL get_md4pw(char *md4pw, char *mach_name, char *mach_acct)
DEBUG(0,("get_md4pw: Workstation %s denied access to domain\n", mach_acct));
return False;
}
+#endif /* 0 */
become_root(True);
smb_pass = getsmbpwnam(mach_acct);