| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
Jeremy.
|
|
|
|
| |
contacting trusted domains.
|
|
|
|
| |
Thanks to Laurent Pinchart for bugging me
|
|
|
|
|
|
| |
accounts which may be located in a different ou.
Karolin
|
|
|
|
|
| |
Failure to change password in ldap is mapped to NT_STATUS_UNSUCCESSFUL unconditionally.
Jeremy.
|
|
|
|
| |
Michael
|
|
|
|
|
|
| |
checks.
Michael
|
|
|
|
| |
Michael
|
|
|
|
|
|
|
|
|
| |
get_trust_pw() just now computes the md4 hash of the result of
get_trust_pw_clear() if that was successful. As a last resort,
in the non-trusted-domain-situation, get_trust_pw() now tries to
directly obtain the hashed version of the password out of secrets.tdb.
Michael
|
|
|
|
|
|
|
|
| |
into a new function secrets_fetch_trust_account_password_legacy() that
does only try to obtain the hashed version of the machine password directly
from secrets.tdb.
Michael
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Up to now each caller used its own logic.
This eliminates code paths where there was a special treatment
of the following situation: the domain given is not our workgroup
(i.e. our own domain) and we are not a DC (i.e. it is not a typical
trusted domain situation). In situation the given domain name was
previously used as the machine account name, resulting in an account
name of DOMAIN\\DOMAIN$, which does not seem very reasonable to me.
get_trust_pw would not have obtained a password in this situation
anyways.
I hope I have not missed an important point here!
Michael
|
|
|
|
| |
Michael
|
|
|
|
|
|
|
|
|
| |
secrets_store_trust_account_password() and trust_password_delete()
are the write access functions to the SECRETS/$MACHINE.ACC/domain keys
in secrets.tdb, the md4 hashed machine passwords. These are not used
any more: Current code always writes the clear text password.
Michael
|
|
|
|
|
|
|
|
|
| |
This is a first patch aimed at fixing bug #4801.
It is still incomplete in that winbindd does not walk
the the trusted domains to lookup unqualified names here.
Apart from that this fix should be pretty much complete.
Michael
|
| |
|
|
|
|
|
| |
"N" is not a valid format entry for ber_printf, should be "n"
Jeremy.
|
|
|
|
|
|
| |
only query transitive forest trusts.
Guenther
|
|
|
|
| |
failed expression in SMB_ASSERT.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
> Here's the problem I hit:
>
> getgrnam("foo") -> nscd -> NSS -> winbindd ->
> winbindd_passdb.c:nam_to_sid() -> lookup_global_sam_name() ->
> getgrnam("foo") -> nscd -> ....
>
> This is in the SAMBA_3_0 specifically but in theory could happen
> SAMBA_3_0_25 (or 26) for an unknown group.
>
> The attached patch passes down enough state for the
> name_to_sid() call to be able to determine the originating
> winbindd cmd that came into the parent. So we can avoid
> making more NSS calls if the original call came in trough NSS
> so we don't deadlock ? But you should still service
> lookupname() calls which are needed for example when
> doing the token access checks for a "valid groups" from
> smb.conf.
>
> I've got this in testing now. The problem has shown up with the
> DsProvider on OS X and with nscd on SOlaris and Linux.
|
|
|
|
|
| |
* strptime() failure check
* make legcacy sid/uid/gid calls static
|
|
|
|
| |
Unix name after discussion with Simo.
|
| |
|
|
|
|
| |
Nothing of major interest. Will fix a few problems with one way trusts.
|
|
|
|
|
|
|
|
| |
we have to take care to preserve the "special" values
for Windows of 0x80000000 and 0x7FFFFFFF when casting
between time_t and uint32. Add conversion functions
(and use them).
Jeremy.
|
|
|
|
|
| |
would flood at log level 2. We know when we're using the legacy
mapping code anyways since it will log an informative msg.
|
|
|
|
| |
replace all data_blob(NULL, 0) calls.
|
|
|
|
|
|
| |
return values of some alias-releated pdb functions from BOOL to NTSTATUS
Thanks :-)
|
| |
|
|
|
|
|
|
|
|
| |
r22412 | obnox | 2007-04-20 14:23:36 +0200 (Fr, 20 Apr 2007) | 5 lines
Add a "deletelocalgroup" subcommand to net sam.
Thanks to Karolin Seeger <ks@sernet.de>.
|
|
|
|
| |
sid_check_is_in_our_domain getting out of sync.
|
| |
|
|
|
|
| |
Jeremy.
|
| |
|
|
|
|
|
|
| |
messages.c. Refactor to use become_root() instead and
make it local to messages.c
Jeremy.
|
|
|
|
| |
domain to a uid.gid using the idmap_passdb backend.
|
|
|
|
|
|
| |
and fix all compiler warnings in the users
metze
|
|
|
|
|
|
|
|
| |
which matches what samba4 has.
also fix all the callers to prevent compiler warnings
metze
|
|
|
|
|
|
| |
to avoid creating the TDB_DATA struct from strings "by hand"
metze
|
|
|
|
|
|
| |
to avoid creating the TDB_DATA struct from strings "by hand"
metze
|
|
|
|
| |
metze
|
|
|
|
|
| |
command. Jerry, Simo, please check.
Jeremy.
|
|
|
|
|
|
|
|
|
| |
handle a
particular SID. Make sure that the passdb backend will accept the same set
range of local SIDs that the idmap system sends it.
Simo, Jerry - this is a 3_0_25 candidate. Can you please review?
|
| |
|
|
|
|
| |
Volker
|
|
|
|
|
|
|
|
|
| |
Not used
yet, the next step will be a secrets_fetch_machine_account() function that
also pulls the account name to be used in the appropriate places.
Volker
|
|
|
|
|
|
| |
transaction. Succeed all or store nothing.
Volker
|
| |
|
|
|
|
|
|
|
|
| |
winbind
who did not run the idle events to drop ldap connections.
Volker
|
| |
|
| |
|