summaryrefslogtreecommitdiffstats
path: root/source/rpcclient
diff options
context:
space:
mode:
authorGünther Deschner <gd@samba.org>2008-04-02 02:29:48 +0200
committerGünther Deschner <gd@samba.org>2008-04-02 11:12:47 +0200
commit0970369ca0cb9ae465cff40e5c75739824daf1d0 (patch)
tree920de08a1bb76e9c7b89092db245133576828b09 /source/rpcclient
parent547eacf6058d2bc5b41b266b70f8f4747aca4eae (diff)
downloadsamba-0970369ca0cb9ae465cff40e5c75739824daf1d0.tar.gz
samba-0970369ca0cb9ae465cff40e5c75739824daf1d0.tar.xz
samba-0970369ca0cb9ae465cff40e5c75739824daf1d0.zip
Fix NETLOGON credential chain with Windows 2008 all over the place.
In order to avoid receiving NT_STATUS_DOWNGRADE_DETECTED from a w2k8 netr_ServerAuthenticate2 reply, we need to start with the AD netlogon negotiate flags everywhere (not only when running in security=ads). Only for NT4 we need to do a downgrade to the returned negotiate flags. Tested with w2k8, w2ksp4, w2k3r2 and nt4sp6. Guenther
Diffstat (limited to 'source/rpcclient')
-rw-r--r--source/rpcclient/rpcclient.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/source/rpcclient/rpcclient.c b/source/rpcclient/rpcclient.c
index 5e870581117..52dba2291be 100644
--- a/source/rpcclient/rpcclient.c
+++ b/source/rpcclient/rpcclient.c
@@ -607,7 +607,7 @@ static NTSTATUS do_cmd(struct cli_state *cli,
}
if (cmd_entry->pipe_idx == PI_NETLOGON) {
- uint32 neg_flags = NETLOGON_NEG_SELECT_AUTH2_FLAGS;
+ uint32_t neg_flags = NETLOGON_NEG_AUTH2_ADS_FLAGS;
uint32 sec_channel_type;
uchar trust_password[16];