Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2009-05-09 | Fix the mangle1 test | Volker Lendecke | 1 | -1/+1 | |
2009-05-09 | Do not call SMB_VFS_GET_REAL_FILENAME if the name is mangled | Volker Lendecke | 1 | -6/+11 | |
The GPFS get_real_file name does not know about mangled names. Tim, if onefs does not either, you need this bugfix :-) In case onefs does 8.3 names, we need to pass the mangled flag down to SMB_VFS_GET_REAL_FILENAME to give GPFS a chance say ENOTSUPP and do the fallback. | |||||
2009-05-09 | s3:libsmb: fix layering of cli_ntrename_internal and its callers | Stefan Metzmacher | 1 | -29/+35 | |
It's easier to have cli_ntrename_internal as a semetric async tevent_req function. cli_ntrename() and cli_nt_hardlink() should be callers on top of cli_ntrename_internal(). metze | |||||
2009-05-08 | s3: Fix chained sesssetupAndX/tconn messages | Tim Prouty | 1 | -0/+7 | |
A sesssetupAndX chained with a tconn will not correctly set the TID in the response header. I'm seeing an XP client send this chained sesssetup/tconn when samba has security = share. Samba's current behavior is to return a TID of 0 in the smb header rather than the actual TID. This patch also updates the UID in the header as well. | |||||
2009-05-09 | s3-samr: Fix SetUserInfo level 16 and 21 w.r.t. ACB_AUTOLOCK acct_flag. | Günther Deschner | 1 | -0/+10 | |
It is not allowed to *set* this flag remotely if it has been not set already. Found by torture test. Guenther | |||||
2009-05-09 | s3-samr: Fix SetUserInfo level 7 when there has been no name change. | Günther Deschner | 1 | -0/+6 | |
Found by torture test. Guenther | |||||
2009-05-08 | s3-selftest: enable running RPC-SAMR-USERS against Samba3. | Günther Deschner | 1 | -1/+1 | |
Guenther | |||||
2009-05-08 | s3-samr: more accurateness in _samr_SetDomainInfo(). | Günther Deschner | 1 | -3/+3 | |
Guenther | |||||
2009-05-08 | Fix bug #6330 - DFS doesn't work on AIX. Jeremy. | Jeremy Allison | 2 | -0/+14 | |
2009-05-08 | Expand the comment explaining why user_in_group_sid is | Jeremy Allison | 1 | -1/+6 | |
not reliable for winbindd users from foreign domains. Jeremy. | |||||
2009-05-08 | s3:smbd: fix posix acls when setting an ACL without explicit ACE for the ↵ | Stefan Metzmacher | 1 | -3/+18 | |
owner (bug#2346) The problem of bug #2346 remains for users exported by winbindd, because create_token_from_username() just fakes the token when the user is not in the local sam domain. This causes user_in_group_sid() to give totally wrong results. In uid_entry_in_group() we need to check if we already have the full unix token in the current_user struct. If so we should use the current_user unix token, instead of doing a very complex user_in_group_sid() which doesn't give reliable results anyway. metze | |||||
2009-05-08 | s3:smbd: fix the fix for mapped IPv4 address handling in release_ip(). | Michael Adam | 1 | -2/+2 | |
It was too late... Thanks Metze for noticing. Michael | |||||
2009-05-08 | s3-selftest: run RPC-LSA-GETUSER against Samba 3. | Günther Deschner | 1 | -1/+2 | |
Guenther | |||||
2009-05-08 | s3-samr: implement more info levels in _samr_QueryDomainInfo(). | Günther Deschner | 1 | -0/+82 | |
Gets us closer to pass RPC-SAMR. Guenther | |||||
2009-05-08 | s3-samr: Fix potential memory leak in _samr_ChangePasswordUser(). | Günther Deschner | 1 | -1/+2 | |
Guenther | |||||
2009-05-08 | s3: make release_ip() call (ctdb) cope with IPv4 mapped addresses | Michael Adam | 1 | -1/+8 | |
Michael | |||||
2009-05-08 | s3-selftest: finally enable RPC-SAMR-PASSWORDS which samba3 now passes. | Günther Deschner | 1 | -1/+1 | |
Guenther | |||||
2009-05-08 | s3-selftest: need to enable lanman auth in order make RPC-SAMR-PASSWORDS pass. | Günther Deschner | 2 | -0/+5 | |
Guenther | |||||
2009-05-08 | s3-samr: Do not leak information whether a user exist or not in pwd change ↵ | Günther Deschner | 1 | -0/+11 | |
calls. Found by torture test. Guenther | |||||
2009-05-08 | s3-samr: implement _samr_ChangePasswordUser(). | Günther Deschner | 1 | -10/+106 | |
This is vastly copied from samba4 samr server. Guenther | |||||
2009-05-08 | s3-samr: implement _samr_OemChangePasswordUser2(). | Günther Deschner | 1 | -10/+48 | |
Guenther | |||||
2009-05-08 | s3-samr: disable check for ACB_DISABLED in check_oem_password(). | Günther Deschner | 1 | -1/+4 | |
It is a bad idea to just tell everyone that an account is disabled without really having checked the password first. Found by torture test. Guenther | |||||
2009-05-08 | s3-samr: rework check_oem_password() to take a struct samu, not to return one. | Günther Deschner | 1 | -39/+27 | |
Guenther | |||||
2009-05-08 | s3-samr: Let _samr_TestPrivateFunctionsUser() return not supported. | Günther Deschner | 1 | -1/+0 | |
This is to get us closer to pass RPC-SAMR-USERS. Guenther | |||||
2009-05-08 | s3-samr: Do not return users in _samr_QueryDisplayInfo() for builtin domain. | Günther Deschner | 1 | -0/+5 | |
Found by torture test. Guenther | |||||
2009-05-08 | s3-samr: let set_user_info_16 and 20 follow the same pattern as all other ↵ | Günther Deschner | 3 | -29/+40 | |
levels. Guenther | |||||
2009-05-08 | s3-samr: support some more info levels in samr_SetUserInfo calls. | Günther Deschner | 3 | -0/+468 | |
Guenther | |||||
2009-05-08 | s3-samr: support some more info levels in samr_QueryUser calls. | Günther Deschner | 1 | -0/+266 | |
Guenther | |||||
2009-05-08 | s3/ldap: also handle DirX return codes | Björn Jacke | 1 | -0/+2 | |
2009-05-08 | s3:configure: "test" only takes one "=" | Björn Jacke | 1 | -1/+1 | |
2009-05-07 | Fix some type-punned warnings | Volker Lendecke | 3 | -7/+13 | |
2009-05-07 | Remove a misleading comment | Volker Lendecke | 1 | -2/+0 | |
2009-05-07 | Fix some nonempty blank lines | Volker Lendecke | 1 | -11/+10 | |
2009-05-07 | Convert lib/wb_reqtrans.c to unix calling conventions | Volker Lendecke | 3 | -97/+113 | |
2009-05-07 | Adapt wb_reqtrans to "recent" coding conventions | Volker Lendecke | 1 | -44/+28 | |
2009-05-07 | s3-auth: use full 16byte session key in make_user_info_netlogon_interactive(). | Günther Deschner | 2 | -3/+2 | |
Patch from Jeremy. With this patch, I was able to join Windows 7 RC to a Samba3 DC, and login into a Samba 3 Domain. There are still two registry settings required: HKLM\System\CCS\Services\LanmanWorkstation\Parameters DWORD DomainCompatibilityMode = 1 DWORD DNSNameResolutionRequired = 0 Do *not* modify the other netlogon registry parameters that were passed around, they weaken security. Guenther (cherry picked from commit b5097d54cb74ca0ea328f9e029562f65f4a01134) | |||||
2009-05-07 | Async API needs all parameters to be kept around until sent, | Jeremy Allison | 1 | -55/+15 | |
ensure they're attached to the state structure. Thanks to Metze for pointing this out. Jeremy. | |||||
2009-05-07 | Fix a typo | Volker Lendecke | 1 | -1/+1 | |
2009-05-07 | Add simple test chaining up sesssetup and tcon | Volker Lendecke | 1 | -0/+53 | |
2009-05-07 | Make cli_tcon_andx chainable | Volker Lendecke | 2 | -15/+48 | |
2009-05-07 | Make cli_session_setup_guest chainable | Volker Lendecke | 2 | -9/+35 | |
2009-05-07 | s3-samr: Fix _samr_Connect5(). In error case it still needs to return empty ↵ | Günther Deschner | 1 | -1/+2 | |
info1. Guenther | |||||
2009-05-07 | s3-rpcclient: rework enumdrivers call a bit to allow queries like win7 does. | Günther Deschner | 1 | -69/+97 | |
Guenther | |||||
2009-05-07 | s3-credentials: protect netlogon_creds_server_step() against NULL creds. | Günther Deschner | 1 | -0/+4 | |
Found by SCHANNEL torture tests. Guenther | |||||
2009-05-07 | s3-selftest: run RPC-SCHANNEL, RPC-SCHANNEL2 and RPC-BENCH-SCHANNEL1 against ↵ | Günther Deschner | 1 | -0/+1 | |
Samba3. Guenther | |||||
2009-05-07 | Fix bug 6336: "net groupmap set" segfaults | Volker Lendecke | 1 | -2/+4 | |
2009-05-06 | Make cli_setatr async. | Jeremy Allison | 7 | -8/+145 | |
Jeremy. | |||||
2009-05-06 | After getting confirmation from Guenther, add 3 changes we'll | Jeremy Allison | 1 | -13/+23 | |
ultimately need to fix bug #6099 Samba returns incurrate capabilities list. 1). Add a comment to point out that r->in.negotiate_flags is an aliased pointer to r->out.negotiate_flags. 2). Ensure we return NETLOGON_NEG_STRONG_KEYS in our flags return if the client requested it. 3). Clean up the error exits so we always return the same way. Signed off by Guenther. Jeremy. | |||||
2009-05-06 | Make cli_setattrE async. | Jeremy Allison | 4 | -31/+112 | |
Jeremy. | |||||
2009-05-06 | s3-netlogon: Fix NETLOGON credential chain. Fixes Bug #6099 (Windows 7 ↵ | Günther Deschner | 1 | -2/+6 | |
joining Samba3) and probably many, many more. Jeremy, with 9a5d5cc1db0ee60486f932e34cd7961b90c70a56 you alter the in negotiate flags (which are a pointer to the out negotiate flags assigned in the generated netlogon server code). So, while you wanted to just set the *out* negflags, you did in fact reset the *in* negflags, effectively eliminating the NETLOGON_NEG_STRONG_KEYS bit (formerly known as NETLOGON_NEG_128BIT) which then caused creds_server_init() to generate 64bit creds instead of 128bit, causing the whole chain to break. *Please* check. Guenther |