mirror of
https://github.com/samba-team/samba.git
synced 2025-02-28 01:58:17 +03:00
CVE-2016-2118: docs-xml: add "allow dcerpc auth level connect" defaulting to "yes"
We sadly need to allow this for now by default. BUG: https://bugzilla.samba.org/show_bug.cgi?id=11616 Signed-off-by: Stefan Metzmacher <metze@samba.org> Reviewed-by: Günther Deschner <gd@samba.org>
This commit is contained in:
parent
9085300e90
commit
06b038c017
29
docs-xml/smbdotconf/security/allowdcerpcauthlevelconnect.xml
Normal file
29
docs-xml/smbdotconf/security/allowdcerpcauthlevelconnect.xml
Normal file
@ -0,0 +1,29 @@
|
||||
<samba:parameter name="allow dcerpc auth level connect"
|
||||
context="G"
|
||||
type="boolean"
|
||||
xmlns:samba="http://www.samba.org/samba/DTD/samba-doc">
|
||||
<description>
|
||||
<para>This option controls whether DCERPC services are allowed to
|
||||
be used with DCERPC_AUTH_LEVEL_CONNECT, which provides authentication,
|
||||
but no per message integrity nor privacy protection.</para>
|
||||
|
||||
<para>Some interfaces like samr, lsarpc and netlogon have a hard-coded default of
|
||||
<constant>no</constant> and epmapper, mgmt and rpcecho have a hard-coded default of
|
||||
<constant>yes</constant>.
|
||||
</para>
|
||||
|
||||
<para>The behavior can be overwritten per interface name (e.g. lsarpc, netlogon, samr, srvsvc,
|
||||
winreg, wkssvc ...) by using 'allow dcerpc auth level connect:interface = yes' as option.</para>
|
||||
|
||||
<para>This option yields precedence to the implementation specific restrictions.
|
||||
E.g. the drsuapi and backupkey protocols require DCERPC_AUTH_LEVEL_PRIVACY.
|
||||
The dnsserver protocol requires DCERPC_AUTH_LEVEL_INTEGRITY.
|
||||
</para>
|
||||
|
||||
<para>Note the default will very likely change to <constant>no</constant> for Samba 4.5.</para>
|
||||
</description>
|
||||
|
||||
<value type="default">yes</value>
|
||||
<value type="example">no</value>
|
||||
|
||||
</samba:parameter>
|
@ -2634,6 +2634,8 @@ struct loadparm_context *loadparm_init(TALLOC_CTX *mem_ctx)
|
||||
lpcfg_do_global_parameter(lp_ctx, "RawNTLMv2Auth", "False");
|
||||
lpcfg_do_global_parameter(lp_ctx, "client use spnego principal", "False");
|
||||
|
||||
lpcfg_do_global_parameter(lp_ctx, "allow dcerpc auth level connect", "True");
|
||||
|
||||
lpcfg_do_global_parameter(lp_ctx, "UnixExtensions", "True");
|
||||
|
||||
lpcfg_do_global_parameter(lp_ctx, "PreferredMaster", "Auto");
|
||||
|
@ -697,6 +697,8 @@ static void init_globals(struct loadparm_context *lp_ctx, bool reinit_globals)
|
||||
Globals.client_ntlmv2_auth = true; /* Client should always use use NTLMv2, as we can't tell that the server supports it, but most modern servers do */
|
||||
/* Note, that we will also use NTLM2 session security (which is different), if it is available */
|
||||
|
||||
Globals.allow_dcerpc_auth_level_connect = true; /* we need to allow this for now by default */
|
||||
|
||||
Globals.map_to_guest = 0; /* By Default, "Never" */
|
||||
Globals.oplock_break_wait_time = 0; /* By Default, 0 msecs. */
|
||||
Globals.enhanced_browsing = true;
|
||||
|
Loading…
x
Reference in New Issue
Block a user