summaryrefslogtreecommitdiff
path: root/source3
AgeCommit message (Collapse)AuthorFilesLines
2010-08-13Eliminate any chance of a class of "uninitialized auto variable" errors.Jeremy Allison1-26/+24
Jeremy.
2010-08-13s3-selftest: move make test to selftest.Günther Deschner1-6/+6
The old "make test" can be still called as "make oldtest". Guenther
2010-08-13s3-selftest: fix testparm tests as non-root.Günther Deschner2-2/+5
Thanks to Andreas for pointing this out. Guenther
2010-08-13s3-smbd: Publish nt printers.Andreas Schneider2-5/+15
Reloading of the printers requires rpc services up and running! The first call in reload_services will be skipped. Signed-off-by: Simo Sorce <idra@samba.org>
2010-08-13s3-smbd: Move rpc services init to smbd parent.Andreas Schneider2-42/+46
The move to the parent makes it possible to use an internal rpc pipe really early and as we migrated serveral parts of samba to rpc function this is required. This should speed up the fork of a smbd a bit cause the rpc services are already running. We still have several problems here which aren't solved. We don't have a dependency tree here. For example we have to make sure that the registry is initialized before we can use the winreg pipe. The spoolss server requires winreg, so we have to start winreg before we can start the spoolss server. I'm sure there are more dependencies. Signed-off-by: Simo Sorce <idra@samba.org>
2010-08-13s3-smbd: Regroup some init functions.Andreas Schneider1-12/+12
Signed-off-by: Simo Sorce <idra@samba.org>
2010-08-13s3-smbd: Fixed indent.Andreas Schneider1-2/+3
Signed-off-by: Simo Sorce <idra@samba.org>
2010-08-13s3-loadparm: Added some comments to lp_load_ex calls.Andreas Schneider1-9/+10
Signed-off-by: Simo Sorce <idra@samba.org>
2010-08-13s3-smbd: Cleanup the order of the init functions.Andreas Schneider1-5/+6
Signed-off-by: Simo Sorce <idra@samba.org>
2010-08-13s3-smbd: Make sure the event context is initialized.Andreas Schneider1-0/+3
Signed-off-by: Simo Sorce <idra@samba.org>
2010-08-13s3-build: remove pointless RPC_PARSE_OBJ2.Günther Deschner1-6/+4
Guenther
2010-08-13s3-waf: remove pointless RPC_PARSE_SRC2.Günther Deschner1-4/+2
Guenther
2010-08-13s3: Replace some cli_errstr calls by nt_errstrVolker Lendecke1-23/+44
2010-08-13s3-libnet: also remove libnet/libnet_samsync_keytab.c.orig.Günther Deschner1-305/+0
Guys, what are you doing here ? ;-) Guenther
2010-08-13s3-libnet: remove source3/libnet/libnet_join.c.orig, added by a previous commit.Günther Deschner1-2187/+0
Guenther
2010-08-13s3-dcerpc: fix build warning seen with -O3.Günther Deschner1-3/+3
"warning: assuming signed overflow does not occur when assuming that (X + c) < X is always false" Guenther
2010-08-13s3-krb5 Only build ADS support if arcfour-hmac-md5 is availableAndrew Bartlett10-21/+2520
Modern Kerberos implementations have either defines or enums for these key types, which makes doing #ifdef difficult. This shows up in files such as libnet_samsync_keytab.c, the bulk of which is not compiled on current Fedora 12, for example. The downside is that this makes Samba unconditionally depend on the arcfour-hmac-md5 encryption type at build time. We will no longer support libraries that only support the DES based encryption types. However, the single-DES types that are supported in common with AD are already painfully weak - so much so that they are disabled by default in modern Kerberos libraries. If not found, ADS support will not be compiled in. This means that our 'net ads join' will no longer set the ACB_USE_DES_KEY_ONLY flag, and we will always try to use arcfour-hmac-md5. A future improvement would be to remove the use of the DES encryption types totally, but this would require that any ACB_USE_DES_KEY_ONLY flag be removed from existing joins. Andrew Bartlett Signed-off-by: Simo Sorce <idra@samba.org>
2010-08-13s3:libnet Add other required headers for libnet_samsync_keytab.cAndrew Bartlett1-0/+3
Due to missing defines in modern kerberos libraries, this code was not compiled and so this wasn't noticed. Andrew Bartlett Signed-off-by: Simo Sorce <idra@samba.org>
2010-08-13tdb: add TDB_DEPS variable filled with required librariesBjörn Jacke2-1/+3
This is required for Solaris, which needs to link in librt to make use of fdatasync().
2010-08-13s3-build: pointless to link in libads and dcutils into smbcacls.Günther Deschner1-1/+1
Guenther
2010-08-13s3-build: separate out libads_printer.Günther Deschner1-3/+5
Guenther
2010-08-13s3-waf: separate out libads_printer.Günther Deschner1-2/+4
Guenther
2010-08-13s3-selftest: add testparm tests to selftest.Günther Deschner1-0/+1
Guenther
2010-08-12Fix bug #7617 - smbd coredump due to uninitialized variables in the ↵Jeremy Allison1-2/+2
performance counter code. In the file rpc_server.c, function _winreg_QueryValue() uint8_t *outbuf Should be : uint8_t *outbuf = NULL; As it is later freed by if (free_buf) SAFE_FREE(outbuf); in some cases, this frees the unintialized outbuf, which causes a coredump.
2010-08-12s3-libnet: fix bug #6364: Pull realm from supplied username on libnet joinJim McDonough1-0/+7
2010-08-12s3-waf: fix the build.Günther Deschner1-0/+21
Guenther
2010-08-12s3: fall back to cups-config for underlinked libsBjörn Jacke1-4/+10
some OpenBSD systems have underlinked cups libraries. If linking against cups alone fails, try to link against all the cups-config --libs cruft, which we usually don't want. (bugzila #7244)
2010-08-12Revert "s3: Use cups-config --libs"Björn Jacke1-1/+1
This reverts commit 911db761148. This was introduced in 18f1f5b56b140 intentionally.
2010-08-12s3:Makefile: link in dcerpc client stubsStefan Metzmacher1-0/+20
metze
2010-08-12s3:winbindd: add wbint dcerpc_binding_handle backendStefan Metzmacher1-0/+262
metze
2010-08-12s3:rpc_server: add rpc_pipe_open_internal dcerpc_binding_handle backendStefan Metzmacher1-0/+272
metze
2010-08-12s3:rpc_client: add dcerpc_binding_handle backendStefan Metzmacher4-0/+376
metze
2010-08-12s3: Reduce the load on the echo handlerVolker Lendecke1-0/+2
If the parent is fast enough, the echo handler should not step in. When the socket becomes readable, the echo handler goes to sleep for a second. If within that second, the parent has picked up the SMB request from the net, the echo handler will just go back to select().
2010-08-12s3: Slightly simplify the logic in smbd_server_echo_handlerVolker Lendecke1-1/+4
2010-08-12s3: Slightly simplify the logic in smbd_server_connection_handlerVolker Lendecke1-1/+4
2010-08-12s3: ?true:false is a *bit* pointless :-)Volker Lendecke1-1/+1
2010-08-11s3-waf: fix the waf build with more recent MIT krb5 libs.Günther Deschner2-1/+4
(such as MIT krb5 1.7.1 on fedora 13). This whole area needs more work and love later, for now it builds at least. Kai, please check. Guenther
2010-08-10libcli/auth Make the source3/ implementation of the NTLMSSP server commonAndrew Bartlett1-527/+0
This means that the core logic (but not the initialisation) of the NTLMSSP server is in common, but uses different authentication backends. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Split the NTLMSSP server into before and after authenticationAndrew Bartlett1-62/+148
This allows for a future where the auth subsystem is async, and the session key generation needs to happen in a callback. This code is originally reworked into this style by metze for the source4/ implementation. The other change here is to introduce an 'out_mem_ctx', which makes the API match that used in source4. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Always call ntlmssp_sign_init()Andrew Bartlett1-3/+1
There is no code path that sets nt_status before this point, without a return. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Don't use talloc_tos() for NTLMSSP blobs for nowAndrew Bartlett1-2/+2
This code will, I hope, soon be merged in common, and the Samba4 use case does not currently support talloc_tos() properly. Use another context for now. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Don't permit LM_KEY in combination with NTLMv2Andrew Bartlett1-1/+4
This is another 'belts and braces' check to avoid the use of the weak 'LM_KEY' encryption when the client has chosen NTLMv2. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Don't reply with the LM_KEY negotiation flag when not availableAndrew Bartlett1-0/+15
This ensures the client isn't confused and we don't enter this weaker authentication scheme when we don't really, really need to. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Don't use the lm key if the user didn't supply one.Andrew Bartlett1-3/+3
This may help to avoid a number of possible MITM attacks where LM_KEY is spoofed into the session. If the login wasn't with lanman (and so the user chose to disclose their lanman response), don't disclose back anything based on their lanman password. Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Add extra DEBUG() message for auth system failuresAndrew Bartlett1-0/+2
Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3:ntlmssp Redirect lp_lanman_auth() via 'allow_lm_key'Andrew Bartlett1-2/+4
This will allow this to be handled via common code in the future Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-10s3: fix the waf build.Günther Deschner1-1/+2
Guenther
2010-08-10libcli/auth Move some source3/ NTLMSSP functions to the common code.Andrew Bartlett2-88/+2
libcli/auth Use true and false rather than True and False in common code Andrew Bartlett Signed-off-by: Günther Deschner <gd@samba.org>
2010-08-09Fix bug #7608 - Win7 SMB2 authentication causes smbd panicJeremy Allison1-2/+4
We need to call setup_ntlmssp_server_info() if status==NT_STATUS_OK, or if status is anything except NT_STATUS_MORE_PROCESSING_REQUIRED, as this can trigger map to guest. Jeremy.
2010-08-09s3-winbind: Fix Bug #7568: Make sure cm_connect_lsa_tcp does not reset the ↵Günther Deschner1-7/+13
secure channel. This is an important fix as the following could and is happening: * winbind authenticates a user via schannel secured netlogon samlogonex call, current secure channel cred state is stored in winbind state, winbind sucessfully decrypts session key from the info3 * winbind sets up a new schannel ncacn_ip_tcp lsa pipe (and thereby resets the secure channel on the dc) * subsequent samlogonex calls use the new secure channel creds on the dc to encrypt info3 session key, while winbind tries to use old schannel creds for decryption Guenther