| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
| |
This is to don't break the provision process at the moment. We need to find
a better solution.
|
|
|
|
|
|
|
|
| |
passwords work
This performs checks on direct password changes over LDB/LDAP. Indirect
password changes over the RPCs are already tested by some torture suite (SAMR
passwords). So no need to do this again here.
|
|
|
|
| |
Make use of the new "change old password checked" control.
|
|
|
|
|
|
|
|
| |
Adapt the two functions for the restructured "password_hash" module. This
means that basically all checks are now performed in the mentioned module.
An exception consists in the SAMR password change calls since they need very
precise NTSTATUS return codes on wrong constraints ("samr_password.c") file
|
|
|
|
|
|
| |
Based on the Patch from Matthias Dieter Wallnöfer <mwallnoefer@yahoo.de>.
metze
|
|
|
|
|
|
|
|
| |
- Implement the password restrictions as specified in "samdb_set_password"
(complexity, minimum password length, minimum password age...).
- We support only (administrative) password reset operations at the moment
- Support password (administrative) reset and change operations (consider
MS-ADTS 3.1.1.3.1.5)
|
|
|
|
|
| |
Windows Server performs the constraint checks in a different way than we do.
All testing has been done using "passwords.py".
|
|
|
|
|
|
|
|
| |
- Enhance comments
- Get some more attributes from the domain and user object (needed later)
- Check for right objectclass on change/set operations (instances of
"user" and/or "inetOrgPerson") - otherwise forward the request
- (Cosmetic) cleanup in asynchronous results regarding return values
|
|
|
|
|
|
|
| |
- Add a new control for getting status informations (domain informations,
password change status) directly from the module
- Add a new control for allowing direct hash changes
- Introduce an addtional control "change_old password checked" for the password
|
|
|
|
|
|
| |
allocated
metze
|
|
|
|
|
|
|
|
|
|
|
| |
- Added support for replicating hosts versus hosts in different domains
- Added switches for the following modes:
= two - ignores additional attributes that cannot be the same
in two different provisions (domains)
= quiet - display nothing, only return code
= verbose - display all dn objects through compare fase
= default - display only objects with differences
- Added more placeholders for nETBIOSDomainName and ServerName
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
This is needed since we have not only reset operations on password fields
(attributes marked with REPLACE flag) but also change operations which can be
performed by users itself. They have one attribute with the old value marked
with the REMOVE flag and one with the new one marked with the ADD flag.
This function helps to retrieve them (argument "new" is used for the new
password on both reset and change).
|
| |
|
|
|
|
| |
metze
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
| |
I've added a [server connection needed] when commands won't work on the local
SamDB.
|
|
|
|
| |
We don't handle the id mapping stuff manually anymore.
|
|
|
|
| |
The id mapping should now be handled automatically by the s4 daemon.
|
|
|
|
| |
To make it behave similar to "net newuser".
|
|
|
|
|
|
|
| |
We may as well fall back rather than return NULL (which callers don't
do useful things with).
Andrew Bartlett
|
|
|
|
| |
metze
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
This means that the existing kvno will no longer be valid, all
unix-based domain members may need to be rejoined, and
upgradeprovision run to update the local kvno in
secrets.ldb/secrets.keytab.
This is required to match the algorithm used by Windows DCs, which we
may be replicating with. We also need to find a way to generate a
reasonable kvno with the OpenLDAP backend.
Andrew Bartlett
|
|
|
|
| |
Guenther
|
|
|
|
|
| |
I use this all the time, so I thought I'd put it in the tree for
others
|
|
|
|
| |
remove IP from a previous vampire_ad.sh run
|
| |
|
|
|
|
|
| |
this is meant to be used by the s3 build, to allow jelmers work on
smbtorture4 in s3 to avoid re-running configure unless its needed
|
|
|
|
| |
HPUX 11.0 has a ldap library that doesn't have ldap_initialize
|
|
|
|
| |
Guenther
|
|
|
|
|
| |
(this is a gratuituous commit to trigger the build farm to rebuild
ldb on all systems)
|
|
|
|
| |
Signed-off-by: Günther Deschner <gd@samba.org>
|
|
|
|
| |
Signed-off-by: Günther Deschner <gd@samba.org>
|
| |
|
|
|
|
|
|
| |
Check on modify if we are RODC and return referral.
On the ldap backend side now we pass context and ldb_modify_default_callback
to propagate the referral error to the client.
|
| |
|
|
|
|
| |
And add some linespaces to look better.
|
|
|
|
|
|
|
| |
This tests pauses a printer over RAP, prints a file, enumerates the job, deletes
the job and resumes the print queue.
Guenther
|
|
|
|
| |
Guenther
|
|
|
|
| |
Guenther
|
|
|
|
| |
Guenther
|
|
|
|
| |
Guenther
|
|
|
|
| |
This takes advantage of the new waf target syntax
|
|
|
|
|
|
|
|
|
|
|
| |
This allows for the following types of commands:
waf smbd/samba
waf smbd/server.c
waf ../lib/util/util_file.c
waf ../lib/util/util_file_*.o
this will be used as part of an updated minimal_includes.pl script
|
|
|
|
| |
Guenther
|
|
|
|
|
|
|
| |
Although w2k3 happily ignores it, the spec (and s3) enforce the addition of
that.
Guenther
|