From 848ed55e22d30bcc072b197574bf1e1cc6c05c84 Mon Sep 17 00:00:00 2001 From: Luke Leighton Date: Thu, 2 Dec 1999 20:16:34 +0000 Subject: new get_any_dc_name() function allows lookups of trusted domains from lp_trusted_domains() parameter, so trusted domain logins should work, right, if you put user = TRUSTED_DOMAIN\NTuser in "domain name map", right? right - as _long_ as you're not using NTLMv2, because the damn NT username gets mapped to the damn unix name too early, and NTLMv2 challenge-responses are based on the client's user name, client's domain name, client's host name etc damn etc. so it becomes necessary to stop using char* username because this allows for massive amounts of confusion as to which username is being referred to. the underlying unix username on the local unix system that is associated with the smbd process that represents the NT username? or the NT username itself? (This used to be commit dd3ccdd7d996c107766cdad3c403e8b8947b9e65) --- source3/rpc_client/cli_use.c | 5 +++++ 1 file changed, 5 insertions(+) (limited to 'source3/rpc_client/cli_use.c') diff --git a/source3/rpc_client/cli_use.c b/source3/rpc_client/cli_use.c index 5ae722d6ad..17458ffacd 100644 --- a/source3/rpc_client/cli_use.c +++ b/source3/rpc_client/cli_use.c @@ -114,6 +114,11 @@ static struct cli_use *cli_find(const char* srv_name, { int i; const char *sv_name = srv_name; + struct user_credentials null_usr; + + copy_user_creds(&null_usr, usr_creds); + usr_creds = &null_usr; + if (strnequal("\\\\", sv_name, 2)) { sv_name = &sv_name[2]; -- cgit