diff options
author | Günther Deschner <gd@samba.org> | 2008-04-02 02:29:48 +0200 |
---|---|---|
committer | Günther Deschner <gd@samba.org> | 2008-04-02 11:12:47 +0200 |
commit | 0970369ca0cb9ae465cff40e5c75739824daf1d0 (patch) | |
tree | 920de08a1bb76e9c7b89092db245133576828b09 /source/rpcclient | |
parent | 547eacf6058d2bc5b41b266b70f8f4747aca4eae (diff) | |
download | samba-0970369ca0cb9ae465cff40e5c75739824daf1d0.tar.gz samba-0970369ca0cb9ae465cff40e5c75739824daf1d0.tar.xz samba-0970369ca0cb9ae465cff40e5c75739824daf1d0.zip |
Fix NETLOGON credential chain with Windows 2008 all over the place.
In order to avoid receiving NT_STATUS_DOWNGRADE_DETECTED from a w2k8
netr_ServerAuthenticate2 reply, we need to start with the AD netlogon negotiate
flags everywhere (not only when running in security=ads). Only for NT4 we need
to do a downgrade to the returned negotiate flags.
Tested with w2k8, w2ksp4, w2k3r2 and nt4sp6.
Guenther
Diffstat (limited to 'source/rpcclient')
-rw-r--r-- | source/rpcclient/rpcclient.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/source/rpcclient/rpcclient.c b/source/rpcclient/rpcclient.c index 5e870581117..52dba2291be 100644 --- a/source/rpcclient/rpcclient.c +++ b/source/rpcclient/rpcclient.c @@ -607,7 +607,7 @@ static NTSTATUS do_cmd(struct cli_state *cli, } if (cmd_entry->pipe_idx == PI_NETLOGON) { - uint32 neg_flags = NETLOGON_NEG_SELECT_AUTH2_FLAGS; + uint32_t neg_flags = NETLOGON_NEG_AUTH2_ADS_FLAGS; uint32 sec_channel_type; uchar trust_password[16]; |