| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
| |
and libc segfaults if printf is passed NULL for a "%s" arg
(eg. Solaris).
(cherry picked from commit d3220d9d58477f2a6ef7a78c3cf05cb232b57aff)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
SMB signing works the same regardless of the used auth mech.
We need to start with the temp signing ("BSRSPYL ")
and the session setup response with NT_STATUS_OK
is the first signed packet.
Now we set the krb5 session key if we got the NT_STATUS_OK
from the server and then recheck the packet.
All this is needed to make the fallback from krb5 to
ntlmssp possible. This commit also resets the cli->vuid
value to 0, if the krb5 auth didn't succeed. Otherwise
the server handles NTLMSSP packets as krb5 packets.
The restructuring of the SMB signing code is needed to
make sure the krb5 code only starts the signing engine
on success. Otherwise the NTLMSSP fallback could not initialize
the signing engine (again).
metze
(cherry picked from commit 7d9fd64f38aa5821b38c1223cf87979fc87bfb71)
(cherry picked from commit 8e29070ccd0b5103af2e6da75644169f46700313)
(cherry picked from commit 38b297f99ec166e5c40ba33774222b37b45b4fec)
(a little bit modified to compile in v3-0)
(cherry picked from commit db109da6b10a091593435e3f8b0d9adb57d3c972)
|
|
|
|
|
|
|
|
|
|
|
|
| |
saf_join_store() should be called after a successful
domain join, the affinity to the dc used at join time
has a larger ttl, to avoid problems with delayed replication.
metze
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Signed-off-by: Günther Deschner <gd@samba.org>
(cherry picked from commit 80e74a27c55c01221091e3eec930c2ac4433c22c)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
the requested site
It could happen that all dcs in a site are unavailable
(some sites have only one dc) and then we need to fallback
to get all dcs.
metze
Signed-off-by: Stefan Metzmacher <metze@samba.org>
Signed-off-by: Günther Deschner <gd@samba.org>
(cherry picked from commit c127367b1dd622eeceb1f47de0a047c297dda222)
|
|
|
|
|
|
| |
SATOH Fumiyasu <fumiyas@osstech.co.jp>.
Jeremy.
(cherry picked from commit 5e73ddba11cbf9ea2d6ca63be098720ff0d5a0d1)
|
|
|
|
|
|
|
|
| |
In order to successfully update a machine account password we need to use
Netlogon ServerPasswordSet2 when NETLOGON_NEG_PASSWORD_SET2 has been negotiated.
Guenther
(cherry picked from commit 84fbac51ffc5f4a8a4f7b1baf5e9b1af174505f5)
|
|\
| |
| |
| | |
v3-0-test
|
| |
| |
| |
| |
| | |
Jerry promised to check :-). Vl also please review.
Jeremy.
|
| |
| |
| |
| |
| |
| | |
buffers for large read/write - make sure we take account of the large
read/write SMB headers as well as the buffer space.
Jeremy.
|
|/
|
|
| |
Jeremy.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
-- Summary --
Specifically crafted SMB responses can result
in a heap overflow in the Samba client code.
Because the server process, smbd, can itself
act as a client during operations such as
printer notification and domain authentication,
this issue affects both Samba client and server
installations.
Ensure that we specify the buffer size used to store incoming SMB
packets. This bug was originally introduced in Samba 2.2.4. Patch from
Jeremy Allison.
|
|
|
|
| |
Jeremy.
|
|\ |
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
cli_session_setup_spnego() was not taking into consideration the situation
where we're connecting to a trusted domain, specifically one (like W2K8)
which doesn't return a SPN in the NegTokenInit.
This caused two problems:
1) When guessing the SPN using kerberos_get_default_realm_from_ccache() we
were always using our default realm, not the realm of the domain we're
connecting to.
2) When falling back on NTLMSSP for authentication we were passing the name
of the domain we're connecting to for use in our credentials when we should be
passing our own workgroup name.
The fix for both was to split the single "domain" parameter into
"user_domain" and "dest_realm" parameters. We use the "user_domain"
parameter to pass into the NTLM call, and we used "dest_realm" to create an SPN
if none was returned in the NegTokenInit2 packet. If no "dest_realm" is
provided we assume we're connecting to our own domain and use the credentials
cache to build the SPN.
Since we have a reasonable guess at the SPN, I removed the check that defaults
us directly to NTLM when negHint is empty.
|
|/
|
|
|
|
| |
Thanks to SATOH Fumiyasu!
This fixes bug 4974
|
|
|
|
| |
Jeremy.
|
|
|
|
|
|
|
|
|
|
|
| |
This is a different fix than Jeremy put into 3-0-test with 040db1ce85 and other
branches with different hashes. Jeremy, I think your fix led to bug 5436, so I
reverted your fix. This fixes the original problem I found with the transs
requests for large rpc queries in a different way. Please check!
Thanks,
Volker
|
|
|
|
| |
This reverts commit 040db1ce851909704d093538ba063863fa11f73e.
|
|
|
|
| |
Karolin
|
|
|
|
|
|
|
|
|
| |
the space taken by the unicode password to be one byte too
long (as we're on an odd byte boundary here). Reduce the
count by 1 to cope with this. Fixes smbclient against NetApp
servers which can't cope. Fix from
bryan.kolodziej@allenlund.com in bug #3840.
Jeremy.
|
|
|
|
|
|
|
|
|
|
|
| |
In order to avoid receiving NT_STATUS_DOWNGRADE_DETECTED from a w2k8
netr_ServerAuthenticate2 reply, we need to start with the AD netlogon negotiate
flags everywhere (not only when running in security=ads). Only for NT4 we need
to do a downgrade to the returned negotiate flags.
Tested with w2k8, w2ksp4, w2k3r2 and nt4sp6.
Guenther
|
|
|
|
| |
Jeremy.
|
|
|
|
|
| |
Guenther
(cherry picked from commit 970daaa0a620d8e47475909cd7b5e54869602530)
|
|
|
|
|
|
| |
OS/2 servers. OS/2 returns eclass == ERRDOS && ecode == ERRnofiles
for a zero entry directory listing.
Jeremy.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Author: Volker Lendecke <vl@samba.org>
Date: Mon Feb 11 18:36:06 2008 +0100
Add a missing return
If I'm not completely blind, we should return here. Not doing it here seems not
to be a major flaw, as far as I can see we're only missing the error code. This
might account for some of the very unhelpful NT_STATUS_UNSUCCESSFUL error
messages people see during joins.
All with stake in Samba client, please check!
|
|
|
|
|
|
|
| |
This is hand-merged from a couple of commits from 3-2-test, cherry-picking was
hardly possible without importing all the ldap sign/seal work from metze.
Guenther
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Author: Jeremy Allison <jra@samba.org>
Date: Wed Jan 23 15:23:16 2008 -0800
Don't leak memory in error path.
Jeremy.
Author: Jeremy Allison <jra@samba.org>
Date: Wed Jan 23 15:00:40 2008 -0800
Use strchr_m in seaching for '.' in the hostname to make sure we're mb safe.
Jeremy.
Author: Andreas Schneider <anschneider@suse.de>
Date: Thu Jan 17 11:35:40 2008 +0100
Fix Windows 2008 (Longhorn) join.
During 'net ads join' the cli->desthost is a hostname (e.g.
rupert.galaxy.site). Check if we have a hostname and use only the
first part, the machine name, of the string.
Author: Andreas Schneider <anschneider@suse.de>
Date: Thu Jan 17 10:11:11 2008 +0100
Windows 2008 (Longhorn) auth2 flag fixes.
Interop fixes for AD specific flags. Original patch from Todd Stetcher.
|
|
|
|
|
|
|
|
| |
This makes our NTLMv2 hash generation compatible to the Davenport example
and fixes a bug when ntlm_auth is called with a non-upper-case --domain
parameter and client ntlmv2 auth = yes
Jerry, please consider for 3.0.28a
|
|
|
|
| |
-> Fix more uninitialized variable warnings
|
| |
|
|
|
|
| |
This leads to uninitialized variable warnings if nmbd is run under valgrind.
|
|
|
|
|
|
| |
to cause us to behave like Vista when looking for remote
machine principal. Modified by me.
Jeremy.
|
|
|
|
| |
Jeremy.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi Jason,
Jason Haar wrote:
> Patched 3.0.28, compiled, installed and here's the log file.
>
> Hope it helps. BTW I don't think it matters, but this is on 32bit
> CentOS4.5 systems.
yes, it helps. Thanks for that.
Very interesting, there are two auth data structures where the first one
is a PAC and the second something unknown (yet).
Can you please try the attached fix ? It should make it work again.
Guenther
- --
Günther Deschner GPG-ID: 8EE11688
Red Hat gdeschner@redhat.com
Samba Team gd@samba.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org
iD8DBQFHX9ZESOk3aI7hFogRAivSAJ9bMcD+PcsIzjYYLtAUoLNfVVEl1QCfV/Qd
MPsZW4G31VOVu64SPjgnJiI=
=Co+H
-----END PGP SIGNATURE-----
|
|\
| |
| |
| | |
Resolved conflicts in source/VERSION.
|
| |
| |
| |
| |
| | |
This one fixes cli_send_mailslot() which could be called from the
nmbd server code.
|
|/
|
|
| |
Jeremy
|
|
|
|
|
|
| |
Ensure that is zero termination is requested that it is
applied if there's space.
Jeremy.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
== Subject: Stack buffer overflow in nmbd's logon
== request processing.
==
== CVE ID#: CVE-2007-4572
==
== Versions: Samba 3.0.0 - 3.0.26a (inclusive)
...
Samba developers have discovered what is believed to be
a non-exploitable buffer over in nmbd during the processing
of GETDC logon server requests. This code is only used
when the Samba server is configured as a Primary or Backup
Domain Controller.
|
| |
|
|
|
|
|
|
| |
checkin will pull this up to srvstr_get_path. At that point we can get more
independent of the inbuf, the base_ptr in pull_string will only be used
to satisfy UCS2 alignment constraints.
|
|
|
|
|
|
|
| |
When renaming a file across 2 filesystem a samba server returns
NT_STATUS_NOT_SAME_DEVICE but thius is not translated to EXDEV,
and the generic EINVAL is returned instead.
This should fix it, Jeremy or Derrel please check if this is ok.
|
| |
|
|
|
|
| |
Guenther
|
|
|
|
| |
Guenther
|
|
|
|
| |
Guenther
|
|
|
|
| |
Guenther
|
|
|
|
|
|
|
|
| |
w2k3 as soon
as a one DFS_VOLUME_FLAVOR_AD_BLOB dfsroot exists).
Guenther
|
|
|
|
|
|
| |
Thanks Volker for the pointer hint :)
Guenther
|
|
|
|
| |
Guenther
|