summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2009-08-27s3:winbind: Some calls are not cacheableVolker Lendecke1-0/+19
2009-08-27s3:winbind: Factor out wcache_store_seqnum()Volker Lendecke2-19/+34
2009-08-27s3:winbind: Add a generic cache for NDR based parent-child requestsVolker Lendecke7-21/+157
2009-08-27s3:winbind: Factor out wcache_fetch_seqnumVolker Lendecke1-14/+39
2009-08-27s4-smbtorture: do not hard code BDC secure channel type into RPC-NETLOGON tests.Günther Deschner1-9/+12
Guenther
2009-08-27s4-smbtorture: add test_SetPassword_flags to RPC-NETLOGON-S3 testsuite.Günther Deschner1-0/+101
Guenther
2009-08-27s4:python Add helper to get at the domain SIDAndrew Bartlett2-0/+33
2009-08-26s3/smbd: open the share_info.tdb on startup instead of tconxSteven Danneman3-1/+11
This is a small performance optimization. Instead of opening the tdb on every smb connection in the forked child process, we now open it in the parent and share the fd. This also reduces the total fd usage in the system.
2009-08-26s3/debug: make SPENGO OID list appear under one debug headerSteven Danneman1-1/+4
2009-08-26s3/winbindd: Remove unnecessary check for NULL SIDSteven Danneman2-8/+7
There's a known bug in some Windows implementations of DsEnumerateDomainTrusts() where domain SIDs are not returned for transitively trusted domains within the same forest. Jerry originally worked around this in the winbindd parent by checking for S-0-0 and converting it to S-1-0 in 8b0fce0b. Guenter later moved these checks into the child process in commit 3bdfcbac making the initial patch unecessary. I've removed it and added a clarifying comment to the child process. If ever this SID is needed we could add an extra DsEnumerateDomainTrusts() call in trusted_domains() as suggested by the Microsoft KB.
2009-08-26s3-selftest: enable running RPC-NETLOGON-S3 against samba3.Günther Deschner1-1/+1
Guenther
2009-08-26s4-smbtorture: add RPC-NETLOGON-S3 to test samba3 netlogon server.Günther Deschner2-0/+19
Guenther
2009-08-26s3 onefs: Canonicalize the ACL in the correct ordertprouty1-4/+8
2009-08-26s3: Allow full_audit to play nice with smbd if it's using syslogtprouty2-1/+17
Explictly pass the facility from both smbd and full_audit to syslog. Really the only major change is to not call openlog() in full_audit if WITH_SYSLOG is defined, which implies that smbd is already using syslog. This allows full audit to piggy-back on the same ident as smbd, while still differentiating the logging via the facility.
2009-08-26s3 audit: Change create_file in full_audit to print whether a directory or ↵tprouty1-2/+28
file was requested full_audit will now print out whether the createfile was requested for a file or directory. The create disposition is also printed out.
2009-08-26s3:winbind: Fix Coverity ID 942: Resource LeakVolker Lendecke1-0/+2
2009-08-26s4:heimdal_build: lib/hcrypto/evp-aes-cts.o belongs to HEIMDAL_HCRYPTOStefan Metzmacher1-1/+1
metze
2009-08-26s3-netlogon: let get_md4pw() return a struct dom_sid.Günther Deschner1-7/+5
Guenther
2009-08-26schannel: add generated files.Günther Deschner3-0/+339
Guenther
2009-08-26schannel: move schannel.idl to main directory.Günther Deschner2-1/+1
Guenther
2009-08-26netlogon: make netr_NegotiateFlags a public bitmap.Günther Deschner3-3/+5
Guenther
2009-08-26Add a parameter to disable the automatic creation of krb5.conf filesVolker Lendecke4-1/+43
This is necessary because MIT 1.5 can't deal with certain types (Tree Root) of transitive AD trusts. The workaround is to add a [capaths] directive to /etc/krb5.conf, which we don't automatically put into the krb5.conf winbind creates. The alternative would have been something like a "krb5 conf include", but I think if someone has to mess with /etc/krb5.conf at this level, it should be easy to add the site-local KDCs as well. Next alternative is to correctly figure out the [capaths] parameter for all trusted domains, but for that I don't have the time right now. Sorry :-)
2009-08-26cifs.upcall: make using ip address conditional on new optionJeff Layton2-27/+50
Igor Mammedov pointed out that reverse resolving an IP address to get the hostname portion of a principal could open a possible attack vector. If an attacker were to gain control of DNS, then he could redirect the mount to a server of his choosing, and fix the reverse resolution to point to a hostname of his choosing (one where he has the key for the corresponding cifs/ or host/ principal). That said, we often trust DNS for other reasons and it can be useful to do so. Make the code that allows trusting DNS to be enabled by adding --trust-dns to the cifs.upcall invocation. Signed-off-by: Jeff Layton <jlayton@redhat.com>
2009-08-26cifs.upcall: switch to getopt_longJeff Layton1-1/+7
...to allow long option names. Signed-off-by: Jeff Layton <jlayton@redhat.com>
2009-08-26s4:provision Ensure that @OPTIONS is mirrored into each partitionAndrew Bartlett3-3/+7
The previous patches to the provision system cut down on the number of reconnects, and disabled the partition handling for part of the process. This means we lost the setting of @OPTIONS as a replicated attribute into the partitions. Andrew Bartlett
2009-08-26s4:ldb Add ldb_ldif_write_string() and python wrappersAndrew Bartlett4-1/+95
This allows us to turn a python LdbMessage back into a string. Andrew Bartlett
2009-08-26s4:ldb Add hooks to get/set the flags on a ldb_message_elementAndrew Bartlett2-5/+65
Also add tests to prove that we got this correct, and correct the existing tests which used the wrong constants. Andrew Bartlett
2009-08-26s4:schema Rework dsdb_write_prefixes_from_schema_to_ldb() to use tallocAndrew Bartlett1-14/+20
This changes dsdb_write_prefixes_from_schema_to_ldb() to use an internal talloc hirarchy, so we can safely give it a NULL context from the python. It also fixes manual construction of the ldb_message - we now use the right helper functions. Andrew Bartlett
2009-08-26s4:provison Add prefixes to ldb using same code a later modify will useAndrew Bartlett4-8/+38
This allows us to test out the code that will do the modify of the prefixMap, and to provide the bindings that may assist a future upgrade script. Andrew Bartlett
2009-08-26s4:provision Only create references to our server DN after the self joinAndrew Bartlett6-9/+39
This will ensure that the GUID can be filled in correctly, and assist us to validate DN targets in the future. Andrew Bartlett
2009-08-26s4:scheam quiet a 'const' warningAndrew Bartlett1-1/+1
2009-08-26s4:dsdb Rework dsdb_write_prefixes_to_ldb() to take a schemaAndrew Bartlett1-14/+13
The aim is to create a function that is more easily wrapped for python, so that we can write the updated prefixMap in an upgrade script. Andrew Bartlett
2009-08-26s4:dsdb Use helper function to add 'show deleted' controlAndrew Bartlett1-20/+10
This revises tridge's commit 61ca4c491e1c13eb7d97847f743b0f540f1117c4 to use ldb_request_add_control() instead of a manual construction. Andrew Bartlett
2009-08-26s3-netlogon: fix default case when _netr_LogonSamLogon is called from other ↵Günther Deschner1-1/+3
opcodes. Guenther
2009-08-26Revert "s3: Fix uninitialized const char *"Günther Deschner1-1/+0
Tim, I am reverting this as this eliminates "_netr_LogonSamLogonEx" from the debug messages completely. Followup fix to come immediately. This reverts commit add9b4afb14d3426d1f3bf5b8e7c86926f462578.
2009-08-26s3-netlogon: get rid of init_net_r_req_chal().Günther Deschner1-13/+1
Guenther
2009-08-26s3-netlogon: let get_md4pw() return a struct samr_Password.Günther Deschner2-8/+7
(in preparation of credential merge). Guenther
2009-08-26s3-netlogon: make _netr_ServerAuthenticate a callback to ↵Günther Deschner1-46/+16
_netr_ServerAuthenticate3. Guenther
2009-08-25Allow for name array strings that don't end in a slashZach Loafman1-12/+17
Fix set_namearray to allow for strings that don't end in a slash. Also remove unnecessary strdup()s. Signed-off-by: Tim Prouty <tprouty@samba.org>
2009-08-25Add some const to dsgetdcnameVolker Lendecke2-6/+6
2009-08-25Do an early TALLOC_FREEVolker Lendecke1-1/+2
2009-08-25netlogon: give netlogon w7/w2k8r2 AES negotiate flag proper name (see bug ↵Günther Deschner3-3/+3
#6099 for details). Guenther
2009-08-25fixed DRS rename of deleted objectsAndrew Tridgell1-1/+20
The objectclass module checks that the target parent exists, and refuses renames if it doesn't exist. For this to work for deleted objects we have to do the search in the objectclass module with the "show deleted" control enabled.
2009-08-25fixed a double free bug on error in net exportAndrew Tridgell1-1/+0
2009-08-25s4:python Fix the reprovision test by deleting 'deleted' objects too.Andrew Bartlett1-6/+9
We were failing because CN=Deleted Objects, which is marked as 'deleted' itself, could not be re-added in a reprovision. Andrew Bartlett
2009-08-25s4:dsdb Rework show_deleted module not to liniearise the LDAP filterAndrew Bartlett1-72/+37
Instead, use the fact that the ldb_parse_tree structure is public to construct the 'and not deleted' clause as a structure, and apply each filter tree to that template. Andrew Bartlett
2009-08-24Help debug for bug 6651 - smbd SIGSEGV when breaking oplocks.Jeremy Allison1-0/+4
Should help track if we get invoked with an invalid fd from the signal handler. Jeremy.
2009-08-24Second attempt at fix for bug 6529 - Offline files conflict with Vista and ↵Jeremy Allison19-133/+188
Office 2003. Confirmation from reporter that this fixes the issue in master on ext3/ext4. Back-ports to follow. Jeremy.
2009-08-24Allow systems with timestamp granularity of 1sec to work withJeremy Allison1-0/+15
this test. Jeremy.
2009-08-24Use existing time_t rounding function, don't invent my own.Jeremy Allison1-1/+1
Jeremy.