Age | Commit message (Collapse) | Author | Files | Lines |
|
Jeremy.
(This used to be commit 27078d1292e8588956ae78e4cddb1bcebbe84478)
|
|
for bug #4780. Cause user mounts to inherit uid= and gid= from the
calling user when called as non-root, except when overridden on the
commandline.
Jeremy.
(This used to be commit 7fad5f38ea86ef76dc8e0853926b3248230616be)
|
|
v3-2-test
(This used to be commit c9496e97cf91c5f29f19c123377f03f44d1a32f6)
|
|
Do so now....
Jeremy.
(This used to be commit 6b1246c29a0241c8e4bb98d659d847d010826b36)
|
|
Michael
(This used to be commit da23684261f40c06dea30ab2df0c878ebb0d0d81)
|
|
(This used to be commit b8e582c9941d2466a403e476c52026f4b4201062)
|
|
(This used to be commit 45636efa39cbcc2ecf7af4dfd1ac6a90f197ba01)
|
|
(This used to be commit fbc510f1717fe82338262c18c252d18987c55b5c)
|
|
(Prepare fix for Bug #4801.)
Michael
(This used to be commit 537b12647e25adcb7da3581f18d2e9feca1caf0c)
|
|
Even if the session setup was anonymous, try and collect
trust creds with get_trust_creds() and use these before
falling back to schannel.
This is the first attempt to fix interdomain trusts.
(get password policy and stuff)
Michael
(This used to be commit e180bbd45452435e981192028a0ad90078c04236)
|
|
Michael
(This used to be commit 481f18b20d6d5ee12c62120a3559bb16cc98e465)
|
|
Do not attempt to do a session setup when in a trusted domain
situation (this gives STATUS_NOLOGON_TRUSTED_DOMAIN_ACCOUNT).
Use get_trust_pw_clear to get machine trust account.
Only call this when the results is really used.
Use the proper domain and account name for session setup.
Michael
(This used to be commit 18c66a364e0ddc4960769871ca190944f7fe5c44)
|
|
Refactor the actual retrieval of the session key through the
established netlogon pipe out of get_schannel_session_key()
and get_schannel_session_key_auth_ntlmssp() into a new
function get_schannel_session_key_common().
(To avoid code duplication.)
Michael
(This used to be commit e77c4022cfbb868e608edcb06b676658b0e201ad)
|
|
Michael
(This used to be commit b2e12365b56f24586a7dfcb845f4de51f0b0e7d5)
|
|
Michael
(This used to be commit 0cde7ac9cb39a0026a38ccf66dbecefc12931074)
|
|
get_trust_pw() just now computes the md4 hash of the result of
get_trust_pw_clear() if that was successful. As a last resort,
in the non-trusted-domain-situation, get_trust_pw() now tries to
directly obtain the hashed version of the password out of secrets.tdb.
Michael
(This used to be commit 4562342eb84e6fdcec15d8b7ae83aa146aabe2b7)
|
|
into a new function secrets_fetch_trust_account_password_legacy() that
does only try to obtain the hashed version of the machine password directly
from secrets.tdb.
Michael
(This used to be commit 91da12b751b3168dc40049f3e90c10d840393efc)
|
|
Up to now each caller used its own logic.
This eliminates code paths where there was a special treatment
of the following situation: the domain given is not our workgroup
(i.e. our own domain) and we are not a DC (i.e. it is not a typical
trusted domain situation). In situation the given domain name was
previously used as the machine account name, resulting in an account
name of DOMAIN\\DOMAIN$, which does not seem very reasonable to me.
get_trust_pw would not have obtained a password in this situation
anyways.
I hope I have not missed an important point here!
Michael
(This used to be commit 6ced4a7f88798dc449a667d63bc29bf6c569291f)
|
|
by retrieving trust password only, when it will be used.
Michael
(This used to be commit cdc60d8ae8c0ef804206b20b451e9557f97d4439)
|
|
Michael
(This used to be commit 164bfb25d7b5cfeffeb4d81958b7629a11ca5d5e)
|
|
secrets_store_trust_account_password() and trust_password_delete()
are the write access functions to the SECRETS/$MACHINE.ACC/domain keys
in secrets.tdb, the md4 hashed machine passwords. These are not used
any more: Current code always writes the clear text password.
Michael
(This used to be commit 4788fe392427901f6b1c505e3a743136ac8a91ca)
|
|
This is a first patch aimed at fixing bug #4801.
It is still incomplete in that winbindd does not walk
the the trusted domains to lookup unqualified names here.
Apart from that this fix should be pretty much complete.
Michael
(This used to be commit dd320c0924ce393a89b1cab020fd5cffc5b80380)
|
|
(This used to be commit c8468a1bb49535f0467e1a83b4c8bc5c8dce834e)
|
|
Patch from Rishi Srivatsavai <rishisv@gmail.com>, with some
adaptations.
(This used to be commit 2dfe9525b9e6e7dcbac191c1fb6288e166d171e5)
|
|
Jeremy.
(This used to be commit b215fb1ad0d5bb3fa7084c2773845ce1dffb2173)
|
|
all strncpy/strcat calls to them.
Convert all sprintf calls to snprintf. Safety first !
Jeremy.
(This used to be commit eff2b368e891d523de38b43ced95798b74ae101e)
|
|
Jeremy.
(This used to be commit 4f503ea8912eb787209c8df364bfdb161dbb212c)
|
|
Hopefully this should fix the buildfarm.
Jeremy.
(This used to be commit 087489b7f2a8cd5868b54dbed3f3eed5d0709ba7)
|
|
Jeremy.
(This used to be commit a50c2d159c754c6ff88649ed859f2b3f9c24f6a1)
|
|
smbpasswd -L for non-root on the buildfarm only.
Jeremy.
(This used to be commit 1bb5ce824f800d967e2a92e946dd6ce7c4580b93)
|
|
Jeremy.
(This used to be commit 0723760ba47a465d2ff5a22a680f1b5196eca7d8)
|
|
Guenther
(This used to be commit 507247dcbf0ef02825a6c5c5f313813714df2d99)
|
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi Jason,
Jason Haar wrote:
> Patched 3.0.28, compiled, installed and here's the log file.
>
> Hope it helps. BTW I don't think it matters, but this is on 32bit
> CentOS4.5 systems.
yes, it helps. Thanks for that.
Very interesting, there are two auth data structures where the first one
is a PAC and the second something unknown (yet).
Can you please try the attached fix ? It should make it work again.
Guenther
- --
Günther Deschner GPG-ID: 8EE11688
Red Hat gdeschner@redhat.com
Samba Team gd@samba.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org
iD8DBQFHX9ZESOk3aI7hFogRAivSAJ9bMcD+PcsIzjYYLtAUoLNfVVEl1QCfV/Qd
MPsZW4G31VOVu64SPjgnJiI=
=Co+H
-----END PGP SIGNATURE-----
(This used to be commit c9adc07ca2a3bb1e0ea98e3b4f68e1a87e5c0196)
|
|
New size calculation logic in tdb_trusted_dom_pass_pack()
and tdb_sid_pack() used accumulated sizes as successive offsets
to buffer pointer.
Michael
(This used to be commit 9c24713b402978e74dc8691be5cab71d8666eb41)
|
|
Jeremy, this small "&" sign has given me a headache... :-)
Michael
(This used to be commit 7590b12a994cc3c5f299ce7f3299c76adad1c599)
|
|
for a server. We should have been doing this for a while,
but it's more critical with IPv6.
Original patch fixed up by James.
Jeremy.
(This used to be commit 5c7f7629a97ef0929e00e52f1fae4386c984000b)
|
|
The tdb is validated before it gets initialized. Since then sighandlers changed
a restart isn't needed anymore.
(This used to be commit aabe9b33fcaed8af98b1ed6b736253e196d87d48)
|
|
Also the design of this function was really bad,
instead do the dump into a file, the client should get
back the list of mappings.
metze
(This used to be commit ce7fe8acf41e90553431c7cda6823700701835c7)
|
|
WINBINDD_DUAL_UID2NAME
WINBINDD_DUAL_NAME2UID
WINBINDD_DUAL_GID2NAME
WINBINDD_DUAL_NAME2GID
metze
(This used to be commit fd4499ee438e4947990200db529363d51bd2c956)
|
|
Guenther
(This used to be commit d30b945e99390761e405492e40c90e84da4fe482)
|
|
Guenther
(This used to be commit 3f426f394f3b1454c52d92331c14f41dd1474516)
|
|
Guenther
(This used to be commit bd5308e5f63e4f692761557d0ecdee7226b66a15)
|
|
Guenther
(This used to be commit 88e9da2f14b41a62bdb478f9ffc2de66643bbf14)
|
|
Jeremy.
(This used to be commit 0a3be0aad7220eb97fe39460e20f36c8ae9ce474)
|
|
Republic <Jiri.Sasek@Sun.COM>
- slightly modified - Jiri please check ! to allow Solaris to get passwords > 8 chars.
Jeremy.
(This used to be commit 657bf8c3479d6192f269e3daef1517e77a9fa9cb)
|
|
metze
(This used to be commit a52237e3a10aa4ac15cd9e7b859a54c46bfa9cdf)
|
|
(This used to be commit 841f4ccbfb5f79ac4f447342e9dd6ef73cacbc65)
|
|
(This used to be commit deaacf971e0fbffd0e5fe24f225ebf645a77e133)
|
|
(This used to be commit ae422fce01cd7520d6dd72e08719a5cd003cb640)
|
|
(This used to be commit 0e96549b56e288c596ed8772197f97ffa5ade300)
|