Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2011-09-10 | libcli/smb: s/FLAGS2_UNKNOWN_BIT4/FLAGS2_SMB_SECURITY_SIGNATURES_REQUIRED | Stefan Metzmacher | 1 | -1/+1 | |
metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Sat Sep 10 00:34:50 CEST 2011 on sn-devel-104 | |||||
2011-09-09 | Second part of fix for bug #8443 - Default user entry is set to minimal ↵ | Jeremy Allison | 1 | -8/+11 | |
permissions on incoming ACL change with no user specified. Be smarter about setting default permissions when a ACL_USER_OBJ isn't given. Use the principle of least surprises for the user. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Fri Sep 9 00:26:08 CEST 2011 on sn-devel-104 | |||||
2011-09-08 | First part of fix for bug #8443 - Default user entry is set to minimal ↵ | Jeremy Allison | 1 | -58/+2 | |
permissions on incoming ACL change with no user specified. create_default_mode() is not needed - it's taken care of by code inside ensure_canon_entry_valid(). | |||||
2011-09-08 | Revert "Part 4 of bugfix for bug #7509 - smb_acl_to_posix: ACL is invalid ↵ | Jeremy Allison | 1 | -11/+8 | |
for set (Invalid argument)" This belongs as part of the bugfix for bug #8443 - Default user entry is set to minimal permissions on incoming ACL change with no user specified. Not as part of #7509. This reverts commit 2a1453e2318af77a79180f3137f8a8d3f1240233. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Thu Sep 8 08:50:12 CEST 2011 on sn-devel-104 | |||||
2011-09-07 | s3:smb2_server: return OBJECT_NAME_INVALID if the path is terminated in ↵ | Stefan Metzmacher | 1 | -0/+8 | |
SMB2_FIND/QUERY_DIRECTORY metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Wed Sep 7 12:15:51 CEST 2011 on sn-devel-104 | |||||
2011-09-07 | s3:smb2_server: return OBJECT_NAME_INVALID if the path is terminated in ↵ | Stefan Metzmacher | 1 | -0/+8 | |
SMB2_CREATE metze | |||||
2011-09-07 | s3:smb2_server: return BAD_NETWORK_NAME if the path is terminated in SMB2_TCON | Stefan Metzmacher | 1 | -0/+8 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_write.c | Stefan Metzmacher | 1 | -12/+6 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_setinfo.c | Stefan Metzmacher | 1 | -13/+5 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_read.c | Stefan Metzmacher | 1 | -11/+5 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_notify.c | Stefan Metzmacher | 1 | -12/+4 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_lock.c | Stefan Metzmacher | 1 | -11/+5 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_keepalive.c | Stefan Metzmacher | 1 | -13/+4 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_ioctl.c | Stefan Metzmacher | 1 | -13/+5 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_getinfo.c | Stefan Metzmacher | 1 | -13/+5 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_flush.c | Stefan Metzmacher | 1 | -12/+4 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_find.c | Stefan Metzmacher | 1 | -13/+5 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_create.c | Stefan Metzmacher | 1 | -11/+4 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_close.c | Stefan Metzmacher | 1 | -12/+3 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_break.c | Stefan Metzmacher | 1 | -12/+4 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_tcon.c | Stefan Metzmacher | 1 | -24/+8 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_sesssetup.c | Stefan Metzmacher | 1 | -26/+9 | |
metze | |||||
2011-09-07 | s3:smb2_server: use smbd_smb2_request_verify_sizes() in smb2_negprot.c | Stefan Metzmacher | 1 | -10/+4 | |
metze | |||||
2011-09-07 | s3:smb2_server: add smbd_smb2_request_verify_sizes() | Stefan Metzmacher | 2 | -0/+45 | |
metze | |||||
2011-09-07 | Revert "Part 5 of bugfix for bug #7509 - smb_acl_to_posix: ACL is invalid ↵ | Jeremy Allison | 1 | -21/+4 | |
for set (Invalid argument)" This reverts commit 17f6e0272370f764d4a0053c8e74f20b0444c721. Using the existing default permissions for group access is incorrect when no such permissions are given in the incoming ACL. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Wed Sep 7 03:50:21 CEST 2011 on sn-devel-104 | |||||
2011-09-06 | s3:smb2_server: make use of SMB2_WRITEFLAG_WRITE_THROUGH | Stefan Metzmacher | 1 | -1/+1 | |
metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Tue Sep 6 16:59:50 CEST 2011 on sn-devel-104 | |||||
2011-09-05 | s3:smb2_server: add basic support for SMB 2.1 | Stefan Metzmacher | 3 | -4/+65 | |
This adds support for the 2 stage negprot, from SMB 1 to SMB 2.1. Support for this of for now and "max protocol = SMB2" still maps to "max protocol = SMB2_02" PROTOCOL_SMB2_02. In order to activate smb2.1, you need to use "max protocol = SMB2_10". metze Autobuild-User: Stefan Metzmacher <metze@samba.org> Autobuild-Date: Mon Sep 5 19:30:58 CEST 2011 on sn-devel-104 | |||||
2011-09-05 | s3:smb2_server: return NOT_SUPPORTED if we don't find a common dialect with ↵ | Stefan Metzmacher | 1 | -6/+8 | |
the client metze | |||||
2011-09-05 | s3:smb2_server: max_trans, max_read and max_write are limited to 64 kilobytes | Stefan Metzmacher | 1 | -3/+17 | |
Only if SMB2_CAP_LARGE_MTU is supported we should announce larger limits. metze | |||||
2011-09-05 | s3-smbd: Rename reload_printers() and add documentation. | Andreas Schneider | 3 | -8/+19 | |
Autobuild-User: Andreas Schneider <asn@cryptomilk.org> Autobuild-Date: Mon Sep 5 17:59:47 CEST 2011 on sn-devel-104 | |||||
2011-09-05 | s3: Fix smbcontrol smbd idmap kill S-1-5-21-... | Volker Lendecke | 1 | -6/+20 | |
The calls to sid_to_gid and sid_to_uid create id mapping entries themselves, which makes it pretty difficult to reliably delete id mapping entries everywhere just using a SID. Autobuild-User: Volker Lendecke <vlendec@samba.org> Autobuild-Date: Mon Sep 5 16:30:41 CEST 2011 on sn-devel-104 | |||||
2011-09-05 | s3: Reformat msg_idmap.c to match Samba coding | Volker Lendecke | 1 | -13/+19 | |
2011-09-05 | s3:smbd: make use of PROTOCOL_SMB2_02 | Stefan Metzmacher | 1 | -1/+1 | |
metze | |||||
2011-09-05 | libcli/smb: move smb2_signing.c to the toplevel | Stefan Metzmacher | 2 | -143/+0 | |
metze | |||||
2011-09-03 | Part 5 of bugfix for bug #7509 - smb_acl_to_posix: ACL is invalid for set ↵ | Jeremy Allison | 1 | -4/+21 | |
(Invalid argument) Be smarter about setting default permissions when a ACL_GROUP_OBJ isn't given. Use the principle of least surprises for the user. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Sat Sep 3 00:16:05 CEST 2011 on sn-devel-104 | |||||
2011-09-02 | Part 4 of bugfix for bug #7509 - smb_acl_to_posix: ACL is invalid for set ↵ | Jeremy Allison | 1 | -8/+11 | |
(Invalid argument) Be smarter about setting default permissions when a ACL_USER_OBJ isn't given. Use the principle of least surprises for the user. | |||||
2011-09-02 | Part 3 of bugfix for bug #7509 - smb_acl_to_posix: ACL is invalid for set ↵ | Jeremy Allison | 1 | -7/+6 | |
(Invalid argument) Don't call check_owning_objs() to convert ACL_USER->ACL_USER_OBJ and AC_GROUP->ACL_GROUP_OBJ for default (directory) ACLs, we do this separately inside ensure_canon_entry_valid(). | |||||
2011-09-02 | Part 2 of bugfix for bug #7509 - smb_acl_to_posix: ACL is invalid for set ↵ | Jeremy Allison | 1 | -0/+38 | |
(Invalid argument) Only map CREATOR_OWNER/CREATOR_GROUP to ACL_USER_OBJ/ACL_GROUP_OBJ in a default(directory) ACL set. | |||||
2011-09-02 | Part 1 of bugfix for bug #7509 - smb_acl_to_posix: ACL is invalid for set ↵ | Jeremy Allison | 1 | -72/+0 | |
(Invalid argument) Remove the code I added for bug "6878 - Cannot change ACL's inherit flag". It is incorrect and causes the POSIX ACL ACL_USER_OBJ duplication. | |||||
2011-08-31 | Fix bug 8429 - Compound SMB2 requests on an IPC connection can corrupt the ↵ | Jeremy Allison | 1 | -12/+17 | |
reply stream. Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Wed Aug 31 21:18:11 CEST 2011 on sn-devel-104 | |||||
2011-08-31 | Based on metze's fix for Bug 8407 - SMB2 server can return requests ↵ | Jeremy Allison | 2 | -2/+39 | |
out-of-order when processing a compound request. (cherry picked from commit 19db1c98c6ba3cb5e883e16e865c44900ce17444) | |||||
2011-08-31 | s3:smb2_server: keep compound_related on struct smbd_smb2_request | Stefan Metzmacher | 2 | -4/+4 | |
metze (cherry picked from commit cda93f04eb4e7e975b192a5fd33275ec638140ac) | |||||
2011-08-31 | s3: Fix bug 8334, do not fork the echo handler for smb2 | Volker Lendecke | 1 | -1/+2 | |
If a smb1 negprot negotiated smb2 we forked the echo responder. This will eventually lead to a panic from [2011/08/30 10:33:29.212578, 0, pid=3846917] smbd/smb2_server.c:243(smbd_smb2_request_create) Invalid SMB packet: first request: 0x0009 because from the echo responder we always read using the normal smb1 protocol handling routine. If that is a bit down the smb2 stream, we get a non-negprot packet and panic. BTW, the echo responder is not required for smb2 anyway, Microsoft confirmed that it probes the server liveness using TCP keepalives and not smb2 echo requests. Autobuild-User: Volker Lendecke <vlendec@samba.org> Autobuild-Date: Wed Aug 31 17:58:48 CEST 2011 on sn-devel-104 | |||||
2011-08-30 | s3:smb2 fix Bug 8428 - wrong reply to DHnC (durable handle reconnect) | Christian Ambach | 1 | -6/+6 | |
According to [MS-SMB2] 3.3.5.9.7 (http://msdn.microsoft.com/en-us/library/cc246784%28v=PROT.13%29.aspx), smbd must reply with NT_STATUS_OBJECT_NAME_NOT_FOUND as it does not support durable file-handles yet. I have seen w2k8r2 running xcopy /C ending up in an endless loop trying to get back the original file handle from smbd sending the same requests over and over. Metze, Jeremy, please check! Signed-off-by: Jeremy Allison <jra@samba.org> Autobuild-User: Jeremy Allison <jra@samba.org> Autobuild-Date: Tue Aug 30 22:20:36 CEST 2011 on sn-devel-104 | |||||
2011-08-29 | Fix bug 8412 - Microsoft Office 2007 (Microsoft Word) fails to save as on a ↵ | Jeremy Allison | 2 | -6/+46 | |
Samba share with SMB2. | |||||
2011-08-25 | s3:smbd: remove an unused variable in dptr_create() | Michael Adam | 1 | -1/+0 | |
2011-08-25 | s3: Pass smbd_server_connection to (unused) server_encryption_shutdown | Volker Lendecke | 2 | -2/+2 | |
2011-08-25 | s3: Pass smbd_server_connection to srv_encrypt_buffer | Volker Lendecke | 3 | -3/+5 | |
2011-08-25 | s3: Pass smbd_server_connection to srv_decrypt_buffer | Volker Lendecke | 3 | -4/+3 | |
2011-08-25 | s3: Pass smbd_server_connection to srv_free_enc_buffer | Volker Lendecke | 3 | -4/+4 | |