summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2010-03-16s4:torture/rpc/wkssvc.c: make use of dcerpc_binding_handle stubsStefan Metzmacher1-32/+63
metze
2010-03-16s4:torture/rpc/srvsvc.c: make use of dcerpc_binding_handle stubsStefan Metzmacher1-23/+42
metze
2010-03-16s4:torture/rpc/dsgetinfo.c: make use of dcerpc_binding_handle stubsStefan Metzmacher1-3/+6
metze
2010-03-16s4:torture/rpc/dssync.c: make use of dcerpc_binding_handle stubsStefan Metzmacher1-6/+8
metze
2010-03-16s4:torture/rpc/drsuapi*: make use of dcerpc_binding_handle stubsStefan Metzmacher2-24/+25
metze
2010-03-16s4:torture/rpc/unixinfo.c: make use of dcerpc_binding_handle stubsStefan Metzmacher1-5/+10
metze
2010-03-16s4-smbtorture: remove NotifyChangeKeyValue s3 skip in RPC-WINREG:Günther Deschner1-4/+0
Guenther
2010-03-16s3-winreg: change notify call has no meaning when called remotely.Günther Deschner1-4/+0
Just return not supported to make smbtorture happy. Guenther
2010-03-16s3-registry: make sure root has full registry access (in particular for make ↵Günther Deschner1-0/+6
test). Guenther
2010-03-16s4-smbtorture: make it a bit easier to track failures in RPC-SPOOLSS-PRINTER.Günther Deschner1-5/+15
Guenther
2010-03-16s4:torture-ndr add lsarSetForestTrustInformation ndr testSimo Sorce1-0/+51
Signed-off-by: Günther Deschner <gd@samba.org>
2010-03-16s4-lsa: fix dcesrv_lsa_lsaRSetForestTrustInformation server stub.Günther Deschner1-3/+3
Guenther Signed-off-by: Günther Deschner <gd@samba.org>
2010-03-16s3-lsa: fix _lsa_lsaRSetForestTrustInformation server stub.Günther Deschner1-1/+1
Guenther Signed-off-by: Günther Deschner <gd@samba.org>
2010-03-16s3: re-run make samba3-idl.Günther Deschner7-47/+579
Guenther Signed-off-by: Günther Deschner <gd@samba.org>
2010-03-16s4:idl add lsaRSetForestTrustInformationSimo Sorce1-2/+50
Signed-off-by: Günther Deschner <gd@samba.org>
2010-03-16Revert "Revert "s4-smbtorture: skip extended SetValue test against Samba ↵Stefan Metzmacher1-9/+5
(both dont survive)."" This reverts commit 508c218eb2f4bf8c45dc9d481576c87ed4fecbd3. This lets make test fail. Matthias: please make sure make test still passes when you change things like this...(maybe add something to knownfail or so) metze
2010-03-16s4:torture/rpc/dsgetinfo.c: fix name resolving for ldap_urlStefan Metzmacher1-1/+6
metze
2010-03-16Update copyrightJim McDonough1-1/+1
2010-03-16security.idl - push generated code diffMatthias Dieter Wallnöfer2-1/+14
2010-03-16s4:resolve_oids LDB module - not really a change but a nicer method to call ↵Matthias Dieter Wallnöfer1-1/+2
"talloc_reference"
2010-03-16Don't exit(0) on errorJim McDonough1-3/+3
2010-03-16s3: vfs_smb_traffic_analyzer.c: add VFS functions for file open and closeHolger Hetterich2-2/+65
2010-03-16smb_traffic_analyzer.c: optimize marshalling function and documentHolger Hetterich2-34/+54
Collect all data that is needed, and use only one talloc_asprintf operation to create the string of common data. This simplifies the code a bit and is most probably faster than the old method. Also, #define SMBTA_COMMON_DATA_COUNT as a complete string, speeding things up because we know the value at compile time.
2010-03-16vfs_smb_traffic_analyzer.c: added functionHolger Hetterich1-63/+58
static char *smb_traffic_analyzer_anonymize This takes a lot of code out of the main functions, and makes it a bit simpler. Do the anonymization in a function. Since we already anonymized the username we don't need to do this a second time in the v2 marshalling function.
2010-03-16Simplify the code a bit by creating the functions:Holger Hetterich1-84/+123
smb_traffic_analyzer_encrypt - doing the encryption of a data block, smb_traffic_analyzer_create_header - create the protocol header, smb_traffic_analyzer_write_data - actually write the data to the socket.
2010-03-16Update the manpage of vfs_smb_traffic_analyzer and add smbta-util.Holger Hetterich2-8/+237
2010-03-16Add the number of common data blocks to the protocol.Holger Hetterich2-10/+33
Always send the number of common data blocks first. This way, we can make the protocol backwards compatible. A receiver running with an older subprotocol can just ignore if a newer sender sends more common data. Add a few remarks to the marshalling function. Add two #define lines defining the protocol subrelease number and the number of common data blocks to the header file.
2010-03-16Put all the protocol stuff into a separate header file.Holger Hetterich2-114/+152
All the structures and the vfs function identifier list is required by the receiver. It's therefore very handy to have this in an extra header file.
2010-03-16Add smbta-util to manage the encryption key.Holger Hetterich3-4/+225
This program allows the administrator to enable or disable AES encryption when using vfs_smb_traffic_analyzer. It also generates new keys, stores them to a file, so that the file can be reused on another client or server.
2010-03-16Implement AES encryption of the data block.Holger Hetterich1-13/+33
First try. This runs on 16 bytes long AES block size, and enlarges the data block with 16 bytes, to make sure all bytes are in. The added bytes are filled with '.'. It then creates a header featuring the new length to be send, and finally sends the data block, then returns. This code is untested, as creating the receiver will be my next step. To simplify traffic_analyzer's code, this code should run as a function. It's on the do-to-list.
2010-03-16Implement anonymization for protocol v2.Holger Hetterich1-14/+53
Since we need to care for the SID too, do the anonymization in the marshalling function and anonymize both the username and the SID. Remove the 'A' status flag from the header definition. A listener could see from the unencrypted header if the module is anonymizing or not, which is certainly not wanted.
2010-03-16Make all remarks compatible to the linux kernel coding styleguide.Holger Hetterich1-27/+33
2010-03-16Added an exact description of the V2 protocol.Holger Hetterich1-0/+62
I don't think it should have it's place the man page, because this is developer information.
2010-03-16Move the creation of the header.Holger Hetterich1-11/+37
Since the header block of the protocol contains the number of bytes to come, we always send the header itself unmodified. If we compress or crypt the data we are about to send, the length of the data to send may change. Therefore, we no longer create the header in smb_traffic_analyzer_create_string, but shortly before we send the data. For both cases, encryption and normal, we create our own header, and send it before the actual data. In case of protocol v1, we don't need to create an extra header. Just send the data, and return from the function. Change a debug message to say that the header for crypted data has been created. Add a status flags consisting of 6 bytes to the header. Their function will be descriped in one of the next patches, which is descriping the header in a longer comment. When anonymization and/or encryption is used, set the flags accordingly.
2010-03-16Fetch the SID of the user we are running as and send with the commonHolger Hetterich1-2/+5
data.
2010-03-16Additionally send the vfs function id with the protocol.Holger Hetterich1-7/+11
2010-03-16According to the linux kernel coding styleguide, it's better toHolger Hetterich1-46/+46
align the switch and it's case statements in the same column. This saves us one indentation level.
2010-03-16Don't use typedefs on the VFS function data structures asHolger Hetterich1-27/+27
typedefs are evil according to the linux kernel coding styleguide.
2010-03-16Add read,pread,write,pwrite support to the V2 protocol.Holger Hetterich1-3/+14
2010-03-16Enable AES encryption of the data if a key was found in secrets.tdb.Holger Hetterich1-3/+22
2010-03-16Add rmdir, chdir, and rename as supported VFS functionsHolger Hetterich1-9/+87
2010-03-16The format of data we are sending over the network will be flexible when ↵Holger Hetterich1-4/+74
sending over the network in protocol v2. To be able to do this, we create a new va-list function that is creating the buffer to send. Also it makes it easier for the receiver to parse the data; it sends an initial header containing the full length of the buffer to be send. For the individual strings, it sends sub headers containing the length of the upcoming substring to be send. With the header-data-header-data [..] structure we don't need to quote the sub strings finally enabling having all possible character sets in filenames etc.. In the sending function, implement mkdir to actually send it's data for testing.
2010-03-16Create structs carrying the data of individual VFS functions, and hand those ↵Holger Hetterich1-33/+47
over to the send function, which then casts the void pointer to the struct required by looking at the id. This allows us to return different result data depending on the VFS function that is running. Make the protocol v1 sender compatible to this. Adapt the existing VFS functions to use the new data structures. Make use of the new functionality and extend the mkdir VFS logger function to return the creation mode additionally.
2010-03-16Introduce smb_traffic_analyzer protocol v2.Holger Hetterich1-7/+62
From Holger: Make smb_traffic_analyzer differ the protocol versions to enable the development of version 2 of the protocol. To do this, a new parameter "protocol_version" has been introduced, which can be set to "V1", "V2", or nothing. If protocol_version is not set, V1 will be chosen automatically. Created an enum for identifying VFS functions in the upcoming protocol v2. Converted the existing VFS functions to use the identifier, and set the read/write bool used in protocol v1 accordingly, also ignore any other VFS functions except read/write/pread/pwrite in v1. Added a first new VFS function for mkdir, which I use for testing and implementing both the sender and receiver for v2.
2010-03-16s4:idl change level to type in lsa_ForestTrustRecord.Simo Sorce4-12/+12
2010-03-16s4-smbtorture: avoid printf calls in RPC-WINREG test.Günther Deschner1-41/+33
Guenther
2010-03-16Added a net acl ds command for modification of ACLs on directory objectsNadezhda Ivanova7-3/+260
At present the command supports only addition of control access rigts, done so DRS access checks can be tested. It will be expanded to deal with most ways to modify and view a DS ACL. Shifted commands a bit. What used to be net acl is now "net acl nt" as apposed to this, which is "net acl ds" ./bin/net acl ds set --help Usage: set --objectdn=objectdn --car=control right --action=[deny|allow] --trusteedn=trustee-dn Options: -h, --help show this help message and exit --host=HOST LDB URL for database or target server --car=CAR The access control right to allow or deny --action=ACTION Deny or allow access --objectdn=OBJECTDN DN of the object whose SD to modify --trusteedn=TRUSTEEDN DN of the entity that gets access Samba Common Options: -s FILE, --configfile=FILE Configuration file Credentials Options: --simple-bind-dn=DN DN to use for a simple bind --password=PASSWORD Password -U USERNAME, --username=USERNAME Username -W WORKGROUP, --workgroup=WORKGROUP Workgroup -N, --no-pass Don't ask for a password -k KERBEROS, --kerberos=KERBEROS Use Kerberos
2010-03-16s3-spoolss: be very strict on OpenPrinter{Ex} failures for bad names.Günther Deschner1-8/+4
Guenther
2010-03-16s4:dsdb - fix up warningsMatthias Dieter Wallnöfer2-4/+8
2010-03-16s4:registry - use a macro for reverse byte orderMatthias Dieter Wallnöfer2-10/+4