Age | Commit message (Collapse) | Author | Files | Lines | |
---|---|---|---|---|---|
2010-05-19 | s4/metadata: fix whitespaces | Kamen Mazdrashki | 1 | -71/+71 | |
2010-05-18 | s3: Fix some more iconv convenience usages. | Jelmer Vernooij | 1 | -1/+1 | |
2010-05-18 | Remove more usages of iconv_convenience in files which were apparently not ↵ | Jelmer Vernooij | 1 | -3/+1 | |
recompiled by waf. | |||||
2010-05-18 | s3: Remove use of iconv_convenience. | Jelmer Vernooij | 2 | -4/+1 | |
2010-05-18 | Finish removal of iconv_convenience in public API's. | Jelmer Vernooij | 16 | -91/+47 | |
2010-05-17 | s4-rodc: Cache am_rodc flag | Anatoliy Atanasov | 2 | -0/+51 | |
2010-05-14 | s4:repl_meta_data LDB module - fix counter types | Matthias Dieter Wallnöfer | 1 | -1/+1 | |
2010-05-14 | s4:dsdb_cache LDB module - fix a typo | Matthias Dieter Wallnöfer | 1 | -1/+1 | |
2010-05-14 | s4:samldb LDB module - remove unused variables | Matthias Dieter Wallnöfer | 1 | -2/+0 | |
2010-05-13 | s4: Do not display by default the message Failed to send DsReplicaSync is ↵ | Matthieu Patou | 1 | -1/+6 | |
other host is just unreachable Signed-off-by: Stefan Metzmacher <metze@samba.org> | |||||
2010-05-13 | s4:dsdb: fix samdb_result_logon_hours() and don't hardcode units_per_week | Stefan Metzmacher | 1 | -4/+11 | |
metze | |||||
2010-05-11 | s4:dsdb: cached results of samdb_rodc() | Stefan Metzmacher | 1 | -1/+29 | |
metze | |||||
2010-05-11 | Revert "s4-rodc: Fix provision warnings by creating ntds objectGUID in ↵ | Anatoliy Atanasov | 1 | -23/+0 | |
provision" This reverts commit c3cbb846d0bfbaa11fd255bada7fa5fe502d4d96. The fix is not correct, we should cache a bool to answer amIRODC | |||||
2010-05-11 | Revert "s4:password_hash LDB module - don't break the provision" | Stefan Metzmacher | 1 | -3/+0 | |
This reverts commit 6276343ce1b7dd7d217e5a419c09f209f5f87379. This is not needed anymore. metze | |||||
2010-05-11 | Revert "s4:password hash LDB module - check that password hashes are != NULL ↵ | Stefan Metzmacher | 1 | -10/+6 | |
before copying them" This reverts commit fa87027592f71179c22f132e375038217bc9d36a. This check is done one level above now. metze | |||||
2010-05-11 | s4:dsdb/password_hash: only try to handle a hash in the unicodePwd field if ↵ | Stefan Metzmacher | 1 | -2/+2 | |
it's given Sorry, I removed this logic while cleaning up indentation levels... metze | |||||
2010-05-10 | s4:password_hash LDB module - we might not have a cleartext password at all | Matthias Dieter Wallnöfer | 1 | -26/+29 | |
When we don't have the cleartext of the new password then don't check it using "samdb_check_password". | |||||
2010-05-10 | s4:password_hash LDB module - quiet a warning | Matthias Dieter Wallnöfer | 1 | -1/+1 | |
2010-05-10 | s4:password hash LDB module - check that password hashes are != NULL before ↵ | Matthias Dieter Wallnöfer | 1 | -6/+10 | |
copying them | |||||
2010-05-10 | s4:password_hash LDB module - don't break the provision | Matthias Dieter Wallnöfer | 1 | -0/+3 | |
This is to don't break the provision process at the moment. We need to find a better solution. | |||||
2010-05-10 | s4:samdb_set_password - adapt it for the user password change handling | Matthias Dieter Wallnöfer | 1 | -0/+12 | |
Make use of the new "change old password checked" control. | |||||
2010-05-10 | s4:samdb_set_password/samdb_set_password_sid - Rework | Matthias Dieter Wallnöfer | 1 | -256/+134 | |
Adapt the two functions for the restructured "password_hash" module. This means that basically all checks are now performed in the mentioned module. An exception consists in the SAMR password change calls since they need very precise NTSTATUS return codes on wrong constraints ("samr_password.c") file | |||||
2010-05-10 | s4:password_hash - Implement password restrictions | Stefan Metzmacher | 1 | -0/+195 | |
Based on the Patch from Matthias Dieter Wallnöfer <mwallnoefer@yahoo.de>. metze | |||||
2010-05-10 | s4:password_hash - Rework to handle password changes | Matthias Dieter Wallnöfer | 1 | -138/+450 | |
- Implement the password restrictions as specified in "samdb_set_password" (complexity, minimum password length, minimum password age...). - We support only (administrative) password reset operations at the moment - Support password (administrative) reset and change operations (consider MS-ADTS 3.1.1.3.1.5) | |||||
2010-05-10 | s4:password_hash - Rework unique value checks | Matthias Dieter Wallnöfer | 1 | -49/+71 | |
Windows Server performs the constraint checks in a different way than we do. All testing has been done using "passwords.py". | |||||
2010-05-10 | s4:password_hash - Various (mostly cosmetic) prework | Matthias Dieter Wallnöfer | 1 | -176/+240 | |
- Enhance comments - Get some more attributes from the domain and user object (needed later) - Check for right objectclass on change/set operations (instances of "user" and/or "inetOrgPerson") - otherwise forward the request - (Cosmetic) cleanup in asynchronous results regarding return values | |||||
2010-05-10 | s4:dsdb: add new controls | Matthias Dieter Wallnöfer | 1 | -0/+21 | |
- Add a new control for getting status informations (domain informations, password change status) directly from the module - Add a new control for allowing direct hash changes - Introduce an addtional control "change_old password checked" for the password | |||||
2010-05-10 | s4-rodc: Fix provision warnings by creating ntds objectGUID in provision | Anatoliy Atanasov | 1 | -0/+23 | |
2010-05-10 | s4:acl ldb module - fix typos | Matthias Dieter Wallnöfer | 1 | -3/+3 | |
2010-05-10 | s4:dsdb/util.c - Add a new function for retrieving password change attributes | Matthias Dieter Wallnöfer | 1 | -0/+41 | |
This is needed since we have not only reset operations on password fields (attributes marked with REPLACE flag) but also change operations which can be performed by users itself. They have one attribute with the old value marked with the REMOVE flag and one with the new one marked with the ADD flag. This function helps to retrieve them (argument "new" is used for the new password on both reset and change). | |||||
2010-05-09 | s4:samldb LDB module - make "samldb_member_check" synchronous again | Matthias Dieter Wallnöfer | 1 | -64/+33 | |
2010-05-09 | s4:samldb LDB module - make "samldb_prim_group_users_check" synchronous again | Matthias Dieter Wallnöfer | 1 | -235/+24 | |
2010-05-09 | s4:samldb LDB module - update the copyright notice | Matthias Dieter Wallnöfer | 1 | -1/+1 | |
2010-05-09 | s4:dsdb Provide an intelegent fallback if not CN=Subnets is found | Andrew Bartlett | 1 | -3/+7 | |
We may as well fall back rather than return NULL (which callers don't do useful things with). Andrew Bartlett | |||||
2010-05-09 | dsdb/password_hash: remove usage of msDs-KeyVersionNumber | Stefan Metzmacher | 1 | -37/+1 | |
metze | |||||
2010-05-09 | s4:dsdb Use replPropertyMetaData as the basis for msDS-KeyVersionNumber | Andrew Bartlett | 1 | -10/+76 | |
This means that the existing kvno will no longer be valid, all unix-based domain members may need to be rejoined, and upgradeprovision run to update the local kvno in secrets.ldb/secrets.keytab. This is required to match the algorithm used by Windows DCs, which we may be replicating with. We also need to find a way to generate a reasonable kvno with the OpenLDAP backend. Andrew Bartlett | |||||
2010-05-04 | s4/rodc: Support read-only database | Anatoliy Atanasov | 5 | -13/+76 | |
Check on modify if we are RODC and return referral. On the ldap backend side now we pass context and ldb_modify_default_callback to propagate the referral error to the client. | |||||
2010-05-04 | s4/rodc: Fix the callbacks up the stack to handle referrals on modify requests | Anatoliy Atanasov | 6 | -0/+48 | |
2010-05-03 | s4/rodc: Implement msDS-isRODC constructed attr | Anatoliy Atanasov | 2 | -7/+167 | |
2010-05-03 | Replaced DS_FLAG_ATTR_IS_CRITICAL with SCHEMA_FLAG_ATTR_IS_CRITICAL. | Nadezhda Ivanova | 1 | -1/+1 | |
2010-05-03 | Added a function to check if an attribute can belong to a filtered replica. | Nadezhda Ivanova | 3 | -2/+113 | |
2010-05-01 | s4:dsdb Fix use of memory after free in repl_meta_data | Andrew Bartlett | 1 | -7/+9 | |
The upgraded link values are were allocated on tmp_ctx, and need to be kept until they are written to the DB. If we don't give the correct context, they will be gone after the talloc_free(tmp_ctx). Found by Matthieu Patou <mat+Informatique.Samba@matws.net> Andrew Bartlett | |||||
2010-04-29 | s4/rodc: RODC FAS initial implementation | Anatoliy Atanasov | 3 | -12/+41 | |
2010-04-29 | s4/dsdb: schemaInfo revision may be 0 | Kamen Mazdrashki | 1 | -5/+1 | |
In case schemaInfo value is still not set, WinAD supplies schemaInfo blob with revision = 0 and GUID_ZERO | |||||
2010-04-29 | s4/dsdb: remove unused dsdb_schema_info_create() function | Kamen Mazdrashki | 1 | -35/+0 | |
2010-04-29 | s4/dsdb: Update Schema cache with updated schemaInfo value | Kamen Mazdrashki | 1 | -4/+9 | |
Error checking is simplified and my leave leeks. I did it this way to make code more readable, and if we get error in those lines, it will be WERR_NOMEM in which case we are in a much deeper troubles than delayed freeing of few bytes. | |||||
2010-04-29 | s4/samldb: Create initial schemaInfo value if it doesn't exists yet | Kamen Mazdrashki | 1 | -7/+30 | |
2010-04-29 | s4/dsdb: Use default schemaInfo value when no such value is given | Kamen Mazdrashki | 3 | -16/+25 | |
Having no value for schemaInfo is totally OK as it turns out. In such cases, we should use a default value with all fields set to 0. | |||||
2010-04-29 | Revert "s4/dsdb: Set schemaInfo attribute value during provisioning" | Kamen Mazdrashki | 1 | -49/+0 | |
This reverts commit 8149094eddebd9a0e8b7c123c2ed54d00164bb26. Windows implementation does not set schemaInfo attribute value until first Schema update request. This way, newly provisioned forest returns no schemaInfo value. I think it won't be bad for us to have this value preset, but I want to mimic Win AD behavior as close as possible. | |||||
2010-04-28 | s4/dsdb: dsdb_validate_invocation_id() should validate by objectGUID | Kamen Mazdrashki | 1 | -18/+18 | |
This function is used in DRSUpdateRefs() implementation where we get DSA's objectGUID rather than invocationId |