1
0
mirror of https://github.com/samba-team/samba.git synced 2024-12-28 07:21:54 +03:00
Commit Graph

56008 Commits

Author SHA1 Message Date
Günther Deschner
87f61a144b s3-rpc_client: add cli_rpc_pipe_open_noauth_transport.
Guenther
2009-09-11 09:59:03 +02:00
Andrew Tridgell
f009fa15a1 s4-provision: use DNS name, not domain name
The SPNs end in the DNS domain name
2009-09-11 17:14:01 +10:00
Andrew Tridgell
8c58cef875 s4-drs: actually call the new drsuapi_add_SPNs() code
An early return here didn't do any good :-)
2009-09-11 17:13:28 +10:00
Andrew Tridgell
88e2fbaf95 s4-drs: add the magic DRS SPNs on AddEntry
When a DsAddEntry is used to create a nTDSDSA object we need to also
create the SPNs for the NTDS GUID in the servers machine account.
2009-09-11 15:15:39 +10:00
Andrew Tridgell
d26c42f5bf s4/provision: add the nTDSDSA GUID based DNS entries and SPNs
The DNS entries and SPNs are needed for samba<->samba DRS
replication. This patch adds them for a standalone DC configure. A
separate patch will add them for the vampire configure
2009-09-11 14:07:22 +10:00
Andrew Tridgell
fdb8758e69 s4/drs: parentGUID needs to be specififcally asked for
Right now parentGUID is a normal attribute in s4, but it should be
generated, which means we need to ask for it in a search if we want to
use it.
2009-09-11 14:07:19 +10:00
Andrew Tridgell
294e7cd566 s4/libcli: when we get a DNS lookup failure show the name
When tracking down complex connection problems its useful knowing what
name lookups failed.
2009-09-11 14:07:18 +10:00
Kamen Mazdrashki
bb6fda8a9a s4/tort: RPC-DRSUAPI test case refactored to match torture architecture 2009-09-11 11:53:18 +10:00
Kamen Mazdrashki
b24203fcb8 s4/tort: code clean up using torture_drsuapi_assert_call() macro
After this change, when a test fails, it gives
reasonable failure message.
2009-09-11 11:53:18 +10:00
Kamen Mazdrashki
5088caa69e s4/tort: assert macro for drsuapi dcerpc call
The macro actually wraps common code pattern used in
almost every test for DRSUAPI interface
2009-09-11 11:53:17 +10:00
Kamen Mazdrashki
a03e0c478d s4/tort: Propagate torture_context and use torture_comment
NOTE: Not every place where printf is used is replaced by
torture_comment. Future work shall "missed" printfs also.
2009-09-11 11:53:17 +10:00
Günther Deschner
c4f6fb0b2d s3-schannel: remove last schannel hand-marshalling function.
Guenther
2009-09-11 03:00:43 +02:00
Günther Deschner
d258fb4d0d s3-schannel: use NL_AUTH_SIGNATURE for schannel sign & seal (client & server).
Guenther
2009-09-11 03:00:35 +02:00
Günther Deschner
cac5e64c00 s3-errors: add NT_STATUS_RPC_NT_PROCNUM_OUT_OF_RANGE.
Guenther
2009-09-11 02:58:34 +02:00
Günther Deschner
a155f3f9a9 s3-schannel: remove unused code.
Guenther
2009-09-11 02:57:35 +02:00
Günther Deschner
9ab5d9be8d s3-schannel: use NL_AUTH_MESSAGE for schannel bind reply.
Guenther
2009-09-11 02:57:27 +02:00
Günther Deschner
721b76cfba schannel: more work on reponse NL_AUTH_MESSAGES.
Guenther
2009-09-11 02:57:19 +02:00
Günther Deschner
38ab500b78 s3-nterr: add NT_STATUS_RPC_NT_PROTOCOL_ERROR to nt_errstr().
Guenther
2009-09-11 02:57:07 +02:00
Günther Deschner
3c70480f3b s3-util: add get/set_cmdline_auth_info_domain to user_auth_info struct.
Guenther
2009-09-11 00:36:59 +02:00
Günther Deschner
8bd730f5ad s3-rpcclient: add lookupnames4 command.
Guenther
2009-09-11 00:26:24 +02:00
Günther Deschner
c17789fa1c s3-rpcclient: add ncacn transport handling for rpcclient.
Guenther
2009-09-11 00:26:24 +02:00
Günther Deschner
393a1f594d s3-rpc_client: add enum dcerpc_transport_t to rpc_cli_transport struct.
Guenther
2009-09-11 00:26:24 +02:00
Andrew Bartlett
bda7061334 s4:setup Updated Display Specifiers from Microsoft (with #s)
This fixes the issue with the original files that they didn't have a
leading # in front of the comments, which caused our parsing scripts
much pain.  The files are now exactly as delivered.

Andrew Bartlett
2009-09-11 07:29:57 +10:00
Matthieu Patou
344fb71cb8 s4: Pass WINBINDD_SOCKET_DIR var in order to overide the location of the Winbind socket 2009-09-11 07:29:57 +10:00
Andrew Kroeger
45b7b713a3 s4:ldb_map: Don't free ares too early.
As found when running "make test" with the MALLOC_CHECK_ and MALLOC_PERTURB_
environment variables set.
2009-09-11 07:29:56 +10:00
Kamen Mazdrashki
0c8eee9711 s4/tort: CRACKNAMES tests to use private structure for testing.
DsCrackNamesPrivate structure basically inherits DsPrivate
structure while adding few test-specific members.
2009-09-11 07:29:56 +10:00
Kamen Mazdrashki
bebeb4ff70 s4/tort: Make common setup/teardown drsuapi test funcs really common 2009-09-11 07:29:56 +10:00
Kamen Mazdrashki
ebfc13b452 s4/tort: CrackNames test update to work against W2K3.
DRSUAPI_DS_NAME_FORMAT_UKNOWN added to 'known-to-fail'
responses as this actually means to ask AD to resolve
a name from FQDN format to Unknown format.
2009-09-11 07:29:55 +10:00
Matthias Dieter Wallnöfer
41596d2c43 util_strlist: Add some more "const"s - small correction 2009-09-10 22:07:47 +02:00
Matthias Dieter Wallnöfer
7669bc3c89 util_strlist: Add some more "const"s 2009-09-10 07:27:15 +02:00
Marc Aurele La France
7c00227f00 Fix bug 6707 - 3.4.1 segfault in parsing configs.
Fixes an occasional segfault caused by an out-of-bounds reference in config file parsing.
2009-09-10 09:52:11 -07:00
Andrew Kroeger
5fb6530295 s4:srvsvc: Fix logic on error checking. 2009-09-10 01:09:57 +02:00
Andrew Kroeger
e3a2a22451 s4:pwsettings: Added blackbox tests.
The added tests include basic validation that the script runs and accepts all
custom arguments.  The tests also verify changes to the password complexity,
minimum password length, and minimum password length settings.
2009-09-10 01:09:56 +02:00
Andrew Kroeger
67a8a8c9e6 testprogs:subunit.sh: Add function for expected failures.
The testit_expect_failure() function is like the testit() function, with
reversed error detection logic.  This reversal only affects the pass/fail logic
and logging - the original return code from the command is still returned to the
calling script.
2009-09-10 01:09:56 +02:00
Andrew Kroeger
ebdb9da78e s4:pwsettings: Show default values in help messages. 2009-09-10 01:09:55 +02:00
Andrew Kroeger
3cbcaa139c s4:pwsettings: Add 'default' option for password complexity. 2009-09-10 01:09:55 +02:00
Andrew Kroeger
4b68cfe15d s4:pwsettings: Added validation.
Validate that each field is within its allowed range.  Also validate that the
maximum password age is greater than the minimum password length (if the maximum
password age is set).

I could not find these values documented anywhere in the WSPP docs.  I used the
values shown in the W2K8 GPMC, as it appears that the GPMC actuaally performs
the validation of values.
2009-09-10 01:09:54 +02:00
Andrew Kroeger
0206b1d6f9 s4:pwsettings: Don't assume a value for pwdProperties.
If we cannot retrieve the value, do not assume a particular value.  The fact
that we could not retrieve the value indicates a larger problem that we don't
want to make worse bypossibly clearing bit fields in the pwdProperties
attribute.
2009-09-10 01:09:54 +02:00
Andrew Kroeger
5f6ebc3483 s4:pwsettings: Run all updates as a single modify() operation.
This ensures that all changes are made, or none are made.  It also makes it
possible to do validation as we go and abort in case of an error, while always
leaving things in a consistent state.
2009-09-10 01:09:53 +02:00
Andrew Kroeger
e71383eed7 s4:pwsettings: Added --quiet option.
Also changed all non-error status output to use the message() function, which
respects the --quiet option.
2009-09-10 01:09:52 +02:00
Matthias Dieter Wallnöfer
02c30fee21 s4:netlogon - Put the "supported encryption types" more back in the "LogonGetDomainInfo" call
They're needed only at the end.
2009-09-10 00:59:50 +02:00
Matthias Dieter Wallnöfer
aae07390e2 Revert "s4: Let the "setpassword" script finally use the "samdb_set_password" routine"
This reverts commit fdd62e9699.

abartlet and I agreed that this isn't the right way to enforce the password
policies. Sooner or later we've to control them anyway on the directory level.
2009-09-10 00:48:19 +02:00
Andrew Tridgell
27beb7fc7e s4/torture: fixed lots of crash bugs in the DRS tests 2009-09-10 22:59:15 +10:00
Andrew Bartlett
f85e77c43f s4:provision Only delete SASL mappings with Fedora DS, not OpenLDAP
We need to be more careful to do the cleanup functions for the right
backend.  In future, these perhaps should be provided by the
ProvisionBackend class.

Andrew Bartlett
2009-09-10 19:47:51 +10:00
Andrew Tridgell
3e7a3bc9bd s4/drs: enable attribute encryption
This means we now get passwords vampired correctly for s4<->s4
replication.
2009-09-10 17:46:30 +10:00
Andrew Tridgell
9460427c24 s4: kludge_acl needs to be above repl_meta_data
We have to bypass kludge_acl in replication as otherwise we aren't
allowed access to the password entries
2009-09-10 17:45:25 +10:00
Andrew Tridgell
25b68701c1 s4/repl: give a useful error message if we can't decode an object 2009-09-10 17:42:36 +10:00
Andrew Tridgell
2ff4764f8f libcli: added a drsuapi attribute encryption function 2009-09-10 17:42:13 +10:00
Andrew Bartlett
5283ad11bd libcli:drsuapi Add function to encrypt data for transport over DRSUAPI
This is for the server side of the GetNCChanges call.

Andrew Bartlett
2009-09-10 15:50:32 +10:00
Andrew Tridgell
a08d17342d s4/drs: changed the UpdateRefs server to use the dn instead of the GUID
Our vampire code sends a zero GUID in the updaterefs calls. Windows
seems to ignore the GUID and use the DN in the naming context instead,
so I have changed our UpdateRefs server implementation to do the same.

With this change we can now vampire from s4<->s4 successfully! Now to
see if all the attributes came across correctly.
2009-09-10 14:28:24 +10:00