1
0
mirror of https://github.com/samba-team/samba.git synced 2025-12-17 04:23:50 +03:00
Commit Graph

269 Commits

Author SHA1 Message Date
Volker Lendecke
b94838aff1 r3705: Nobody has commented, so I'll take this as an ack...
abartlet, I'd like to ask you to take a severe look at this!

We have solved the problem to find the global groups a user is in twice: Once
in auth_util.c and another time for the corresponding samr call. The attached
patch unifies these and sends them through the passdb backend (new function
pdb_enum_group_memberships). Thus it gives pdb_ldap.c the chance to further
optimize the corresponding call if the samba and posix accounts are unified by
issuing a specialized ldap query.

The parameter to activate this ldapsam behaviour is

ldapsam:trusted = yes

Volker
2007-10-10 10:53:15 -05:00
Volker Lendecke
2508d4ed1e r3566: Completely replace the queryuseraliases call. The previous implementation does
not exactly match what you would expect.

XP workstations during login actually do this, so we should better become a
bit more correct. The LDAP query issued is not really fully optimal, but it is
a lot faster and more correct than what was there before. The change in
passdb.h makes it possible that queryuseraliases is done with a single ldap
query.

Volker
2007-10-10 10:53:09 -05:00
Jeremy Allison
2815b31e01 r2481: Patch from Igor Belyi <sambauser@katehok.ac93.org>. Ensure pdb
user is deleted first before deleting UNIX user (LDAP backend
needs this ordering).
Jeremy.
2007-10-10 10:52:45 -05:00
Jeremy Allison
b910e53002 r2369: Fix from Richard Renard <rrenard@idealx.com> to fix usermgr and trust relationships.
Jeremy.
2007-10-10 10:52:41 -05:00
Simo Sorce
f836be323a r2331: check password script code and example from trunk 2007-10-10 10:52:39 -05:00
Volker Lendecke
de0eaf7be7 r2093: Fix for Bug 1416. This must have been a cut&paste error from add_gid....
Thanks to Jonas Olsson for the bug report & fix.

Volker
2007-10-10 10:52:31 -05:00
Jeremy Allison
d5fb5ba9df r805: Fix to stop smbd hanging on missing group member from "Jianliang Lu" <j.lu@tiesse.com>.
Jeremy.
2007-10-10 10:51:46 -05:00
Volker Lendecke
b4429d9743 r229: Don't list domain groups from BUILTIN.
Volker
2007-10-10 10:51:15 -05:00
Gerald Carter
911a28361b r196: merging struct uuid from trunk 2007-10-10 10:51:13 -05:00
Volker Lendecke
6e18bed170 r145: pdb_create_alias now returns NTSTATUS. More of this to follow.
Volker
2007-10-10 10:51:11 -05:00
Gerald Carter
b393469d95 r116: volker's patch for local group and group nesting 2007-10-10 10:51:10 -05:00
Volker Lendecke
f0d99f318c There's a specific error message NT_STATUS_ALIAS_EXISTS. -
Jim McDonough
832674c099 more usrmgr fixes: display lockout timers in minutes, not seconds, for samr 2e -
Volker Lendecke
540f625036 net_rpc.c: Don't complain if [add|del]mem was successful.
srv_samr_nt.c: Correctly report that a user is not member of an alias.

Volker
-
Jim McDonough
98833a82fa Do the query part of the previous fix...reset time and duration are set in minutes, not seconds. Works from usrmgr. -
Jim McDonough
700049d9ef reset time and duration are set in minutes, not seconds. Works from usrmgr. -
Volker Lendecke
7a947ecdf5 Be able to set alias info for builtin as well.
Volker
-
Volker Lendecke
2863b21d8a In samr_lookup_names Windows does not return WKN_GRP(5) but ALIAS(4) when
you search in BUILTIN. Match that.

Volker
-
Volker Lendecke
04639e8862 Cosmetic fix: Use sid_is_in_our_domain instead of doing it per hand.
Volker
-
Gerald Carter
b60f6ec30d remerge andrew's cracklib patch from HEAD and fix a compile warnings -
Andrew Bartlett
2a2b1f0c87 This adds client-side support for the unicode/SAMR password change scheme.
As well as avoiding DOS charset issues, this scheme returns useful error
codes, that we can map back via the pam interface.

This patch also cleans up the interfaces used for password buffers, to
avoid duplication of code.

Andrew Bartlett
-
Gerald Carter
2fd2c07df4 Bug 381: check builtin (not local) group SID. Patch from Jianliang Lu <j.lu@tiesse.com> -
Gerald Carter
6202e0fa72 revert the cracklib changes until post 3.0.2 -
Andrew Bartlett
bc770edb78 First stab at cracklib support (password quality checking) in Samba 3.0
This adds a configure test, that tries to find out if we have a working
cracklib installation, and tries to pick up the debian hints on where
the dictionary might be found.  Default is per my Fedora Core 1 system -
I'm not sure how much it changes.

Andrew Bartlett
-
Gerald Carter
ebabf72a78 fix some warnings from the Sun compiler -
Andrew Bartlett
faddf5d8f9 Match Win2k, and return NT_STATUS_INVALID_PARAMETER
if this parameter is not an account type

Andrew Bartlett
-
Andrew Bartlett
f9e59f8bc0 JHT came up with a nasty (broken) torture case in preparing examples for
his book.

This prompted me to look at the code that reads the unix group list.  This
code did a lot of name -> uid -> name -> sid translations, which caused
problems.  Instead, we now do just name->sid

I also cleaned up some interfaces, and client tools.

Andrew Bartlett
-
Gerald Carter
19a8dd523a make sure we delete the group mapping before calling the delete group script; patch from Jianliang Lu <j.lu@tiesse.com> -
Gerald Carter
9359a6ea80 more group lookup access fixes on the neverending bug 281 -
Gerald Carter
da12bbdb0d * fix RemoveSidForeignDomain() ; bug 252
* don't fall back to unmapped UNIX group for
  get_local_group_from_sid()
* remove an extra become/unbecome_root() pair
  from group enumeration
-
Andrew Bartlett
601120f335 Match Win2k and return 'invalid parameter' for creating of a new account with
account flags of 0.

Andrew Bartlett
-
Gerald Carter
68283407e0 more access fixes for group enumeration in LDAP; bug 281 -
Andrew Bartlett
240b0d178e Add server-side support for variable-length session keys (as used by
DES based krb5 logins).

Andrew Bartlett
-
Andrew Bartlett
f3bbc87b0d Changes all over the shop, but all towards:
- NTLM2 support in the server
 - KEY_EXCH support in the server
 - variable length session keys.

In detail:

 - NTLM2 is an extension of NTLMv1, that is compatible with existing
domain controllers (unlike NTLMv2, which requires a DC upgrade).

 * This is known as 'NTLMv2 session security' *

(This is not yet implemented on the RPC pipes however, so there may
well still be issues for PDC setups, particuarly around password
changes.  We do not fully understand the sign/seal implications of
NTLM2 on RPC pipes.)

This requires modifications to our authentication subsystem, as we
must handle the 'challege' input into the challenge-response algorithm
being changed.  This also needs to be turned off for
'security=server', which does not support this.

- KEY_EXCH is another 'security' mechanism, whereby the session key
actually used by the server is sent by the client, rather than being
the shared-secret directly or indirectly.

- As both these methods change the session key, the auth subsystem
needed to be changed, to 'override' session keys provided by the
backend.

- There has also been a major overhaul of the NTLMSSP subsystem, to merge the 'client' and 'server' functions, so they both operate on a single structure.  This should help the SPNEGO implementation.

- The 'names blob' in NTLMSSP is always in unicode - never in ascii.
Don't make an ascii version ever.

- The other big change is to allow variable length session keys.  We
have always assumed that session keys are 16 bytes long - and padded
to this length if shorter.  However, Kerberos session keys are 8 bytes
long, when the krb5 login uses DES.

 * This fix allows SMB signging on machines not yet running MIT KRB5 1.3.1. *

- Add better DEBUG() messages to ntlm_auth, warning administrators of
misconfigurations that prevent access to the privileged pipe.  This
should help reduce some of the 'it just doesn't work' issues.

- Fix data_blob_talloc() to behave the same way data_blob() does when
passed a NULL data pointer.  (just allocate)


REMEMBER to make clean after this commit - I have changed plenty of data structures...
-
Gerald Carter
a7685a0697 * make sure we only enumerate group mapping entries
(not /etc/group) even when doing local aliases

* remove "hide local users" parameter; we have this
  behavior built into 3.0
-
Gerald Carter
9b8bf6a950 * only install swat html files once
* revert the change that prevent the guest
  account from being added to a passdb backend
  since it broke the build farm.
* apply patch from Alex Deiter to fix the
  "smbldap_open: cannot access when not root
  error" messages when looking up group
  information (bug 281)
-
Jeremy Allison
e591854eda Handle munged dial string. Patch from Aur?lien Degr?mont <adegremont@idealx.com>with memory leak fixes by me.
Jeremy.
-
Jeremy Allison
f82c273a42 Fix for #480. Change the interface for init_unistr2 to not take a length
but a flags field. We were assuming that 2*strlen(mb_string) == length of ucs2-le string.
This is not the case. Count it after conversion.
Jeremy.
-
Jeremy Allison
28b315a750 Ensure that dup_sec_desc copies the 'type' field correctly. This caused
me to expose a type arguement to make_sec_desc(). We weren't copying
the SE_DESC_DACL_AUTO_INHERITED flag which could cause errors on
auto inherited checks.
Jeremy.
-
Jeremy Allison
fdc5dda44f Patch from Gregory Hinton Nietsky <gregory@networksentry.co.za>,
ensure the desired access is read from the incoming RPC request.
Jeremy.
-
Gerald Carter
f4ca4aae8a renaming some functions for consistency -
Gerald Carter
dd2cf4897e Fix bug #252. Implement missing SAMR_REMOVE_USER_FOREIGN_DOMAIN
call.
-
Herb Lewis
a6a39c61e8 get rid of some sompiler warnings on IRIX -
Gerald Carter
36fc199e5f fix bug #286.
Fixed by storing the access requested on the anonymous samr connect.
Restricted this to enum_domain|open_domain.

Added become/unbecome_root() around pdb_enum_group_mapping()
enum domain groups samr call.
-
Jim McDonough
a2bd8f0bfa Update my copyrights according to my agreement with IBM -
Jim McDonough
15d2bc4785 Fix copyright statements for various pieces of Anthony Liguori's work. -
Jeremy Allison
1734d43eb5 Wrap calls to change_oem_password() in become_root()/unbecome_root() pairs
to allow UNIX password change scripts to work correctly. This is safe as
the old password has been checked as correct before invoking this.
Jeremy.
-
Tim Potter
59dae1da66 More printf portability fixes. Got caught out by some gcc'isms last
time.  )-:
-
Tim Potter
ba4d334b82 More printf fixes - size_t is long on some architectures. -
Tim Potter
6616485dba Another round of uid/gid/pid format string changes I missed the
first time.
-