summaryrefslogtreecommitdiffstats
path: root/source4
Commit message (Collapse)AuthorAgeFilesLines
...
* s4:ntvfs Don't treat the user SID and primary group SID special for idmapAndrew Bartlett2010-08-181-12/+4
| | | | | | | This simply askes IDMAP about all the user SIDs, rather than the user and group sid, followed by all but the first two sids from the token. Andrew Bartlett
* s4:security Bring in #defines for the user and primary group token locationAndrew Bartlett2010-08-181-0/+3
| | | | | | | | This will allow us to stop duplicating the user and primary group SID in the struct security_token, and therefore make it more like the NT_USER_TOKEN in Samba3. Andrew Bartlett
* s4:netlogon RPC server - "ServerPasswordSet" operations - introduce also ↵Matthias Dieter Wallnöfer2010-08-171-2/+43
| | | | here the new password change syntax
* s4:kdc/kpasswdd.c - let the user change his own password with his own rightsMatthias Dieter Wallnöfer2010-08-171-3/+44
| | | | | | | | Now it's finally possible that the user can change his password with a DSDB connection using his credentials. NOTICE: I had to extract the old password from the SAMDB since I was unable to find it somewhere else (authinfo for example).
* s4:samr RPC server - samr_password.c - make real user password changes workMatthias Dieter Wallnöfer2010-08-171-50/+74
| | | | | Now it's finally possible that the user can change his password with a DSDB connection using his credentials.
* s4:kdc/rpc server - adapt the "samdb_set_password" calls which perform ↵Matthias Dieter Wallnöfer2010-08-172-4/+4
| | | | password sets
* s4:samdb_set_password/samdb_set_password_sid - make more arguments "const"Matthias Dieter Wallnöfer2010-08-171-5/+5
|
* s4:samdb_set_password/samdb_set_password_sid - make the adaptions to support ↵Matthias Dieter Wallnöfer2010-08-171-13/+27
| | | | | | the password change control And introduce parameters to pass the old password hashes.
* s4:password_hash LDB module - perform the adaptions to understand the new ↵Matthias Dieter Wallnöfer2010-08-171-8/+26
| | | | password change control
* s4:acl LDB module - support password changes over the ↵Matthias Dieter Wallnöfer2010-08-171-1/+15
| | | | | | | DSDB_CONTROL_PASSWORD_CHANGE_OID control This control is used from the SAMR and "kpasswd" password changes. It is strictly private and means "this is a password change and not a password set".
* s4:DSDB - DSDB_CONTROL_PASSWORD_CHANGE_OID - add a structure as value to the ↵Matthias Dieter Wallnöfer2010-08-171-0/+5
| | | | | | control This contains the NT and/or LM hash of the password specified by the user.
* s4:DSDB - rename the "DSDB_CONTROL_PASSWORD_CHANGE_OLD_PW_CHECKED_OID"Matthias Dieter Wallnöfer2010-08-174-11/+10
| | | | | Rename it to "DSDB_CONTROL_PASSWORD_CHANGE_OID". This control will afterwards contain a record with the specified old password as NT and/or LM hash.
* s4:selftest: recreate $SELFTEST_PREFIX/s4client with each make test runStefan Metzmacher2010-08-171-3/+3
| | | | | | Otherwise just fill the disks of the build-farm hosts. metze
* s4:selftest: run ldapi tests in 'dc:local' environmentStefan Metzmacher2010-08-171-1/+1
| | | | metze
* s4-tests: Added tests for acl checks on search requestsNadezhda Ivanova2010-08-171-0/+218
|
* s4-ldb: ensure element flags are zero in ldb search returnAndrew Tridgell2010-08-171-0/+2
| | | | the distinguishedName element was getting an uninitialised flags value
* s4-ldbwrap: ensure session_info in ldb opaque remains validAndrew Tridgell2010-08-171-0/+15
| | | | | | | A DRS DsBind handle can be re-used in a later connection. This implies reuse of the session_info for the connection. If the first connection is shutdown then the session_info in the sam context on the 2nd connection must remain valid.
* s4-rpcserver: log unknown RPC calls at debug level 3Andrew Tridgell2010-08-171-0/+6
| | | | | This was added as we are occasionally getting an encrypted unknown netlogon call, and I'm having trouble looking at it in wireshark
* s4-netlogon: added SEC_CHAN_RODCAndrew Tridgell2010-08-171-0/+5
| | | | This seems to be equivalent to SEC_CHAN_BDC, but for RODCs
* s4-net: use an encrypted ldap session when setting passwordsAndrew Tridgell2010-08-171-0/+3
| | | | | | | this allows for "net setpassword -H ldap://server -Uusername%password USERNAME" to set a password remotely on a windows DC Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-dsdb: check the type of session_info from the opaqueAndrew Tridgell2010-08-171-2/+2
| | | | | | | we saw a crash with a bad pointer here, and this may help track it down Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-drs: allow getncchanges from RODC with WRIT_REP setAndrew Tridgell2010-08-171-2/+2
| | | | | | | | w2k8r2 is setting this bit as a RODC. Instead of refusing the replication, we now remove the bit from req8, which means other places in the code that check this bit can stay the same Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-drs: added domain_sid to DRS security checksAndrew Tridgell2010-08-176-10/+14
| | | | | | | we need the domain_sid to determine if the account is a RODC for our domain Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-drs: fixed check for SECURITY_RO_DOMAIN_CONTROLLERAndrew Tridgell2010-08-171-6/+6
| | | | | | check more than the user_sid, and also check for the right rid value Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-dsdb: added support for UF_PARTIAL_SECRETS_ACCOUNTAndrew Tridgell2010-08-171-2/+9
| | | | | | | when this is in user_account_control the account is a RODC, and we need to set the primaryGroupID to be DOMAIN_RID_READONLY_DCS Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-dsdb: cope with cracknames of form dnsdomain\accountAndrew Tridgell2010-08-171-2/+8
| | | | | | this is used by w2k8r2 when doing a RODC dcpromo Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-dsdb: set LDB_FLAG_INTERNAL_DISABLE_VALIDATION for msDS-SecondaryKrbTgtNumberAndrew Tridgell2010-08-171-1/+8
| | | | | | | | | msDS-SecondaryKrbTgtNumber is setup with a value that is outside the range allowed by the schema (the schema has rangeLower==rangeUpper==65536). We need to mark this element as being internally generated to avoid the range checks Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-ldb: added LDB_FLAG_INTERNAL_DISABLE_VALIDATIONAndrew Tridgell2010-08-172-7/+15
| | | | | | | | When this flag is set on an element in an add/modify request then the normal validate_ldb() call that checks the element against schema constraints is disabled Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-ldb: added LDB_FLAG_INTERNAL_MASKAndrew Tridgell2010-08-172-0/+31
| | | | | | | This ensures that internal bits for the element flags in add/modify requests are not set via the ldb API Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-ldb: use LDB_FLAG_MOD_TYPE() to extract element type from messagesAndrew Tridgell2010-08-178-23/+28
| | | | | | | | | | | | The flags field of message elements is part of a set of flags. We had LDB_FLAG_MOD_MASK for extracting the type, but it was only rarely being used (only 1 call used it correctly). This adds LDB_FLAG_MOD_MASK() to make it more obvious what is going on. This will allow us to use some of the other flags bits for internal markers on elements Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-dsdb: support LDB_CONTROL_RODC_DCPROMO_OID for nTDSDSA addAndrew Tridgell2010-08-171-1/+24
| | | | | | this control disables the system only check for nTDSDSA add operations Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-dsdb: fixed test for LDB_CONTROL_RODC_DCPROMO_OIDAndrew Tridgell2010-08-171-1/+1
| | | | the ldb_msg_add_fmt() call returns LDB_SUCCESS on success
* s4-ldapserver: support controls on ldap add and renameAndrew Tridgell2010-08-171-10/+12
| | | | | | we need to pass the controls down to the add and rename ldb operations Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-dsdb: added support for LDB_CONTROL_RODC_DCPROMO_OIDAndrew Tridgell2010-08-173-0/+76
| | | | | | | | | | | | this control adds a unique msDS-SecondaryKrbTgtNumber attribute to a user object. There is some 'interesting' interaction with the rangeLower and rangeUpper attributes and this add. We don't implementat rangeLower/rangeUpper yet, but when we do we'll need an override for this control (or be careful about module ordering). Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s4-ldap: use common functions for ldap flag controls encode/decodeAndrew Tridgell2010-08-171-163/+11
| | | | | | | many controls are simple present/not-present flags, and don't need their own parsers Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* build fixBrad Hards2010-08-171-1/+5
|
* s4-ldb: test the 'displayName=a,b' bugAndrew Tridgell2010-08-171-0/+6
| | | | Pair-Programmed-With: Andrew Bartlett <abartlet@samba.org>
* s3-provision: cope with the policy directory already existingAndrew Tridgell2010-08-171-3/+8
| | | | Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s4-ldb: fixed the ldb 'displayName=a,b' indexing bugAndrew Tridgell2010-08-171-2/+4
| | | | | | | | | the problem was the inconsistency between the key form of DNs between the itdb used for indexing and the on disk form Thanks to Matthieu Patou for finding this bug! Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s4-ldb: add some comments explaining the ltdb_index_idxptr() functionAndrew Tridgell2010-08-171-0/+8
| | | | | | this function copes with alignment sensitive CPUs Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s4:samdb_set_password_sid - fix commentMatthias Dieter Wallnöfer2010-08-161-1/+2
| | | | Add more possible result NTSTATUS codes
* s3-auth: Remove docs about obsolete 'update encrypted' option.Andreas Schneider2010-08-161-1/+0
|
* Revert "s4:RPC-SPOOLSS-NOTIFY: skip test_RFFPCNEx() for now, as the test is ↵Günther Deschner2010-08-161-9/+0
| | | | | | broken" This reverts commit 8ca8250443319e0f19f05aab2014118fd03eaa8a.
* s4:samdb_set_password - fix formattingMatthias Dieter Wallnöfer2010-08-151-1/+2
| | | | (Sorry, I've overseen this)
* s4:passwords.py - proof the most important extended error codesMatthias Dieter Wallnöfer2010-08-151-8/+17
|
* s4:samdb_set_password - implement the extended LDAP error code detectionMatthias Dieter Wallnöfer2010-08-151-9/+17
|
* s4:password_hash LDB module - introduce the extended LDAP error codes on the ↵Matthias Dieter Wallnöfer2010-08-151-43/+72
| | | | important failure cases
* s4:password_hash LDB module - support this new password set syntaxMatthias Dieter Wallnöfer2010-08-151-2/+10
|
* s4:passwords.py - another special password testMatthias Dieter Wallnöfer2010-08-151-3/+23
| | | | This looks like a password change but it's rather a password set operation.
* s4:password_hash LDB module - allow to compare against both NT and LM hashes ↵Matthias Dieter Wallnöfer2010-08-151-10/+1
| | | | | | on password change operations This is to match the SAMR password change behaviour.