| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
|
| |
was correct.
Jeremy.
|
| |
|
| |
|
|
|
|
|
|
|
| |
back-port
of the 3.2 sessionsetup code to enable vl's merge to go easier.
Jeremy.
|
|
|
|
| |
Jeremy.
|
| |
|
|
|
|
| |
Jeremy.
|
|
|
|
|
| |
to DOS error ERRDOS, ERRfilexists on open calls.
Jeremy.
|
| |
|
| |
|
|
|
|
| |
Jeremy.
|
|
|
|
| |
Use local variable of smb_flag2 instead of using the macro every time.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
23726:
Explicitly pass down the FLAGS2 field to srvstr_pull_buf. The next
checkin will pull this up to srvstr_get_path. At that point we can get more
independent of the inbuf, the base_ptr in pull_string will only be used
to satisfy UCS2 alignment constraints.
23731:
Explicitly pass down FLAGS2 to srvstr_get_path.
Next step is to remove the bug that in the trans2 code we use the inbuf
as the base pointer to decide whether we need ucs2 alignment where we
need to use the beginning of the params buffer
23731:
Forgot one reference to inbuf
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
when verifying a ticket from winbindd_pam.c.
I've found during multiple, fast, automated SSH logins (such
as from a cron script) that the replay cache in MIT's krb5
lib will occasionally fail the krb5_rd_req() as a replay attack.
There seems to be a small window during which the MIT krb5
libs could reproduce identical time stamps for ctime and cusec
in the authenticator since Unix systems only give back
milli-seconds rather than the micro-seconds needed by the
authenticator. Checked against MIT 1.5.1. Have not
researched how Heimdal does it.
My thinking is that if someone can spoof the KDC and TDS
services we are pretty hopeless anyways.
|
|
|
|
| |
session_traverse.
|
|
|
|
| |
tomorrow.
|
|
|
|
| |
replace all data_blob(NULL, 0) calls.
|
|
|
|
| |
server_id' instead of a 'uint32 pid'
|
|
|
|
| |
absence of native OS and Lanman strings in the session setup request)
|
|
|
|
|
| |
in sasl bind. Wonder why coverity didn't find these ?
Jeremy.
|
|
|
|
|
|
|
|
|
|
|
| |
to return a NT_STATUS_TIME_DIFFERENCE_AT_DC error to
a client when there's clock skew. Will help people
debug this. Prepare us for being able to return the
correct sessionsetupX "NT_STATUS_MORE_PROCESSING_REQUIRED"
error with associated krb5 clock skew error to allow
clients to re-sync time with us when we're eventually
able to be a KDC.
Jeremy.
|
|
|
|
| |
Jeremy.
|
|
|
|
| |
Jeremy
|
|
|
|
|
|
| |
Not strictly necessary, as data_blob() panics if it can't allocate. But I'd
see this as a design flaw in data_blob() and it made me look in that routine.
Jeremy.
|
|
|
|
|
|
|
| |
fragmented into "max xmit" size security blob
chunks. Bug #4400. Needs limits adding, and also
a client-side version.
Jeremy.
|
|
|
|
|
|
|
|
| |
Vista sends the NTLMv2 blob by default in the tconX
packet. Make sure we save off the workgroup the user
was logged into on the client in the sessionsetupX
and re-use it for the NTLMv2 calc.
Jeremy.
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
Re-checking it in.
Fix bug #4095 - username composed into domain\user
twice in spnego path.
Jeremy.
|
|
|
|
| |
Jeremy.
|
|
|
|
|
|
|
|
| |
twice in spnego path. Jerry please check.
Jeremy.
line, and those below, will be ignored--
M source/smbd/sesssetup.c
|
| |
|
| |
|
| |
|
|
|
|
|
| |
data blob is added if the logon call failed.
Jeremy.
|
|
|
|
| |
Jeremy.
|
|
|
|
|
| |
Fix Coverity bug #26. Guard against NULL ref.
Jeremy.
|
|
|
|
|
|
| |
warning as it seems to get confused with assignment
and comparison. Clarify the code anyway.
Jeremy.
|
|
|
|
|
|
| |
already do what we need.
Guenther
|
|
|
|
|
|
|
| |
fail and we would still return success in the SMBsesssetup reply :-(
* Make sure to create the local token for the server_fino struct
in reply_spnego_kerberos() so that register_vuid() does not fail.
(how did this ever work?)
|
|
|
|
|
|
|
|
| |
client to disconnect after negprot"
We missed one case of ignoring "BSRSPYL ".
Merge for 3.0.21c.
Jeremy.
|
|
|
|
| |
Sync with trunk as off r13315
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
session
setup comes in with the vc (virtual connection) field set to zero. This is
done by Windows, probably you can tweak that by some registry key.
This boolean option controls whether an incoming session setup
should kill other connections coming from the same IP. This matches
the default Windows 2003 behaviour.
Setting this parameter to yes becomes necessary when you have a flaky
network and windows decides to reconnect while the old connection
still has files with share modes open. These files become inaccessible
over the new connection.
The client sends a zero VC on the new connection, and Windows 2003
kills all other connections coming from the same IP. This way the
locked files are accessible again.
Please be aware that enabling this option will kill connections behind
a masquerading router.
Volker
|
|
|
|
|
|
| |
more precise inline comment why PAC verification may fail.
Guenther
|
|
|
|
|
|
|
| |
Also remove the mem_ctx from the netsamlogon_cache_store() API.
Guenther, what should we be doing with the other fields in
the PAC_LOGON_INFO?
|
|
|
|
|
|
|
|
|
|
|
| |
* remove redundant call to sub_set_smb_name() in session setup code.
* Fix lockup when running 'wbinfo -t' on a Samba PDC. Cause
was new authenticated session setup from winbindd which
resulted in a mangled username (machine_) that was not found
in the local files and so was queiued up to nss_winbindd.
Deadlock....
So now make sure to keep the trailing '$' for machine account
names when calling sub_set_smb_name().
|
|
|
|
| |
Guenther
|
|
|
|
| |
Guenther
|