summaryrefslogtreecommitdiff
path: root/source3/libsmb
AgeCommit message (Collapse)AuthorFilesLines
2010-10-24s3: Convert cli_qfilename to cli_qfileinfoVolker Lendecke1-35/+13
2010-10-24s3: Add async cli_qfileinfoVolker Lendecke1-0/+133
2010-10-24s3: Rename cli_fileinfo() to cli_fileinfo_basic()Volker Lendecke3-15/+15
2010-10-18s3:libsmb: add pipe related NT_STATUS_RPC_* codesStefan Metzmacher1-0/+6
metze
2010-10-12libcli/security Provide a common, top level libcli/security/security.hAndrew Bartlett5-2/+5
This will reduce the noise from merges of the rest of the libcli/security code, without this commit changing what code is actually used. This includes (along with other security headers) dom_sid.h and security_token.h Andrew Bartlett Autobuild-User: Andrew Bartlett <abartlet@samba.org> Autobuild-Date: Tue Oct 12 05:54:10 UTC 2010 on sn-devel-104
2010-10-03s3: Remove talloc_autofree_context() from unexpected.cVolker Lendecke1-2/+1
Same argument as in 997a64f6fb11e19d78c: If tdb_close() was needed at exit time, we'd have more severe problems by now.
2010-10-01samba: share select wrappers.Günther Deschner1-0/+1
Guenther
2010-09-28s3: Remove talloc_autofree_context() from receive_unexpected()Volker Lendecke1-2/+2
This is freed in this routine a few lines down
2010-09-27Change to using TDB_INCOMPATIBLE_HASH (the jenkins hash) on allJeremy Allison3-4/+4
TDB_CLEAR_IF_FIRST tdb's. For tdb's like gencache where we open without CLEAR_IF_FIRST and then with CLEAR_IF_FIRST if corrupt this is still safe to use as if opening an existing tdb the new hash will be ignored - it's only used on creating a new tdb not opening an old one. Jeremy.
2010-09-26Fix bug #7698 - Assert causes smbd to panic on invalid NetBIOS session request.Jeremy Allison2-33/+68
Found by the CodeNomicon test suites at the SNIA plugfest. http://www.codenomicon.com/ If an invalid NetBIOS session request is received the code in name_len() in libsmb/nmblib.c can hit an assert. Re-write name_len() and name_extract() to use "buf/len" pairs and always limit reads. Jeremy.
2010-09-26s3: Remove two talloc_autofree_context() callsVolker Lendecke1-2/+2
Both allocated blobs are freed in their routines
2010-09-23Fix bug 7694 - Crash bug with invalid SPNEGO token.Jeremy Allison1-1/+2
Found by the CodeNomicon test suites at the SNIA plugfest. http://www.codenomicon.com/ If an invalid SPNEGO packet contains no OIDs we crash in the SMB1/SMB2 server as we indirect the first returned value OIDs[0], which is returned as NULL. Jeremy.
2010-09-23s3-dcerpc: add spnego server helpersSimo Sorce1-4/+75
squashed: add michlistMIC signature checks Signed-off-by: Günther Deschner <gd@samba.org>
2010-09-23s3-dsgetdcname: always pass in messaging context.Günther Deschner1-26/+2
Volker, please check. Guenther
2010-09-20s3-util_sid: use shared dom_sid_compare_auth and dom_sid_equal_X functions.Günther Deschner1-3/+4
Guenther
2010-09-20s3-build: only include async headers where needed.Günther Deschner11-1/+12
Guenther
2010-09-17s3: fix order of arguments in nsec_time_diff callBjörn Jacke1-2/+2
2010-09-17Fix array size of a memmber of struct cli_ulogoff_stateSumit Bose1-1/+1
The too small array makes UID-REGRESSION-FIX fail on 32bit architectures. Signed-off-by: Günther Deschner <gd@samba.org>
2010-09-16s3: use nsec_time_diff instead of TspecDiffBjörn Jacke1-2/+2
2010-09-15Fix all sid_parse returns to be checked. Tidy up some checks and errorJeremy Allison1-1/+3
messages. Jeremy.
2010-09-11s3-krb5 Fix Kerberos on FreeBSD with Samba4 DCsAndrew Bartlett1-3/+1
The idea of this patch is: Don't support a mix of different kerberos features. Either we should prepare a GSSAPI (8003) checksum and mark the request as such, or we should use the old behaviour (a normal kerberos checksum of 0 data). Sending the GSSAPI checksum data, but without marking it as GSSAPI broke Samba4, and seems well outside the expected behaviour, even if Windows accepts it. Andrew Bartlett
2010-09-10s3-errormap: map ERRSRV/ERRbaduid to NT_STATUS_USER_SESSION_DELETEDStefan Metzmacher1-0/+2
metze
2010-09-10s3-dsgetdcname: cleanup receive_getdc_response a little.Günther Deschner1-14/+18
Guenther
2010-09-09Fox missing SMB_MALLOC return checks noticed by "Andreas Moroder ↵Jeremy Allison1-0/+5
<andreas.moroder@gmx.net>". Jeremy.
2010-09-08s3: Remove a superfluous ;Volker Lendecke1-1/+1
2010-09-01s3: Print the IP of the server that stopped respondingVolker Lendecke1-1/+5
2010-08-31s3: use monotonic clock for time deltas in namequery functionsBjörn Jacke1-12/+12
2010-08-30s3-kerberos: try to fix the build w/o kerberos support.Günther Deschner1-1/+7
Guenther
2010-08-26s3-build: only include krb5 environment variables where required.Günther Deschner1-0/+1
Guenther
2010-08-26s3-build: only include "fake_file.h" where needed.Günther Deschner1-0/+1
Guenther
2010-08-21s3: Fix bug 7635Volker Lendecke1-2/+4
2010-08-19s3-libsmbclient Convert dos error codes to NTstatus in async libsmbclient.Jim McDonough2-8/+2
DOS error codes were being lost with the conversion to async libsmbclient. If we're passing around NTSTATUS internally, let's just convert it when we get it. DOS ACCESS_DENIED on nautilus was not prompting for other credentials, because it was not being mapped.
2010-08-19s3-cli: fix uninitialized variable.Günther Deschner1-1/+1
Volker, please check. Guenther
2010-08-19s3-libsmb: fix some uninitialized variables.Günther Deschner1-2/+2
Volker, please check. Guenther
2010-08-18s3: async cli_listVolker Lendecke2-396/+667
2010-08-18s3: Add cli_flushVolker Lendecke1-0/+83
2010-08-18s3-build: only include smb_signing.h where needed.Günther Deschner3-0/+3
Guenther
2010-08-15s3: Remove some unused codeVolker Lendecke1-31/+0
2010-08-14s3: Fix an uninitialized variableVolker Lendecke1-0/+3
2010-08-13s3-krb5 Only build ADS support if arcfour-hmac-md5 is availableAndrew Bartlett1-2/+0
Modern Kerberos implementations have either defines or enums for these key types, which makes doing #ifdef difficult. This shows up in files such as libnet_samsync_keytab.c, the bulk of which is not compiled on current Fedora 12, for example. The downside is that this makes Samba unconditionally depend on the arcfour-hmac-md5 encryption type at build time. We will no longer support libraries that only support the DES based encryption types. However, the single-DES types that are supported in common with AD are already painfully weak - so much so that they are disabled by default in modern Kerberos libraries. If not found, ADS support will not be compiled in. This means that our 'net ads join' will no longer set the ACB_USE_DES_KEY_ONLY flag, and we will always try to use arcfour-hmac-md5. A future improvement would be to remove the use of the DES encryption types totally, but this would require that any ACB_USE_DES_KEY_ONLY flag be removed from existing joins. Andrew Bartlett Signed-off-by: Simo Sorce <idra@samba.org>
2010-08-10libcli/auth Make the source3/ implementation of the NTLMSSP server commonAndrew Bartlett1-527/+0
This means that the core logic (but not the initialisation) of the NTLMSSP server is in common, but uses different authentication backends. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Split the NTLMSSP server into before and after authenticationAndrew Bartlett1-62/+148
This allows for a future where the auth subsystem is async, and the session key generation needs to happen in a callback. This code is originally reworked into this style by metze for the source4/ implementation. The other change here is to introduce an 'out_mem_ctx', which makes the API match that used in source4. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Always call ntlmssp_sign_init()Andrew Bartlett1-3/+1
There is no code path that sets nt_status before this point, without a return. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Don't use talloc_tos() for NTLMSSP blobs for nowAndrew Bartlett1-2/+2
This code will, I hope, soon be merged in common, and the Samba4 use case does not currently support talloc_tos() properly. Use another context for now. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Don't permit LM_KEY in combination with NTLMv2Andrew Bartlett1-1/+4
This is another 'belts and braces' check to avoid the use of the weak 'LM_KEY' encryption when the client has chosen NTLMv2. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Don't reply with the LM_KEY negotiation flag when not availableAndrew Bartlett1-0/+15
This ensures the client isn't confused and we don't enter this weaker authentication scheme when we don't really, really need to. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Don't use the lm key if the user didn't supply one.Andrew Bartlett1-3/+3
This may help to avoid a number of possible MITM attacks where LM_KEY is spoofed into the session. If the login wasn't with lanman (and so the user chose to disclose their lanman response), don't disclose back anything based on their lanman password. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Add extra DEBUG() message for auth system failuresAndrew Bartlett1-0/+2
Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Redirect lp_lanman_auth() via 'allow_lm_key'Andrew Bartlett1-2/+4
This will allow this to be handled via common code in the future Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10libcli/auth Move some source3/ NTLMSSP functions to the common code.Andrew Bartlett1-87/+0
libcli/auth Use true and false rather than True and False in common code Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>