This project is mirrored from https://gitlab.com/samba-team/samba.git.
Pull mirroring updated .
- 06 Oct, 2020 1 commit
-
-
Isaac Boukris authored
-
- 02 Oct, 2020 2 commits
-
-
Isaac Boukris authored
-
Isaac Boukris authored
-
- 23 Sep, 2020 3 commits
-
-
Isaac Boukris authored
-
Isaac Boukris authored
-
Isaac Boukris authored
-
- 21 Sep, 2020 4 commits
-
-
Isaac Boukris authored
-
Isaac Boukris authored
and remove fork_child_dc_connect()!
-
Isaac Boukris authored
-
RN: Fix fcntl waf configure check BUG: https://bugzilla.samba.org/show_bug.cgi?id=14503 Signed-off-by:
Ralph Boehme <slow@samba.org> Reviewed-by:
Volker Lendecke <vl@samba.org> Autobuild-User(master): Volker Lendecke <vl@samba.org> Autobuild-Date(master): Mon Sep 21 07:26:54 UTC 2020 on sn-devel-184
-
- 18 Sep, 2020 22 commits
-
-
Ensure that client challenges with the first 5 bytes identical are rejected. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Signed-off-by:
Gary Lockyer <gary@catalyst.net.nz> Reviewed-by:
Stefan Metzmacher <metze@samba.org> Autobuild-User(master): Stefan Metzmacher <metze@samba.org> Autobuild-Date(master): Fri Sep 18 14:13:17 UTC 2020 on sn-devel-184
-
Ensure that an empty machine account password can't be set by netr_ServerPasswordSet2 BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Signed-off-by:
Gary Lockyer <gary@catalyst.net.nz> Reviewed-by:
Stefan Metzmacher <metze@samba.org>
-
Stefan Metzmacher authored
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Pair-Programmed-With: Stefan Metzmacher <metze@samba.org> Signed-off-by:
Günther Deschner <gd@samba.org> Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
CVE-2020-1472(ZeroLogon): s3:rpc_server/netlogon: support "server require schannel:WORKSTATION$ = no" This allows to add expections for individual workstations, when using "server schannel = yes". "server schannel = auto" is very insecure and will be removed soon. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Pair-Programmed-With: Stefan Metzmacher <metze@samba.org> Signed-off-by:
Günther Deschner <gd@samba.org> Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
We should debug more details about the failing request. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Pair-Programmed-With: Stefan Metzmacher <metze@samba.org> Signed-off-by:
Günther Deschner <gd@samba.org> Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
Stefan Metzmacher authored
This should give admins wawrnings until they have a secure configuration. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Ralph Boehme <slow@samba.org> Reviewed-by:
Günther Deschner <gd@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
Stefan Metzmacher authored
CVE-2020-1472(ZeroLogon): s4:rpc_server/netlogon: support "server require schannel:WORKSTATION$ = no" This allows to add expections for individual workstations, when using "server schannel = yes". "server schannel = auto" is very insecure and will be removed soon. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
Stefan Metzmacher authored
We should debug more details about the failing request. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
CVE-2020-1472(ZeroLogon): s3:rpc_server/netlogon: protect netr_ServerPasswordSet2 against unencrypted passwords BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Pair-Programmed-With: Stefan Metzmacher <metze@samba.org> Signed-off-by:
Jeremy Allison <jra@samba.org> Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
CVE-2020-1472(ZeroLogon): s3:rpc_server/netlogon: Fix mem leak onto p->mem_ctx in error path of _netr_ServerPasswordSet2(). BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Signed-off-by:
Jeremy Allison <jra@samba.org> Reviewed-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
Stefan Metzmacher authored
CVE-2020-1472(ZeroLogon): s4:rpc_server/netlogon: protect netr_ServerPasswordSet2 against unencrypted passwords BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
Stefan Metzmacher authored
CVE-2020-1472(ZeroLogon): libcli/auth: reject weak client challenges in netlogon_creds_server_init() This implements the note from MS-NRPC 3.1.4.1 Session-Key Negotiation: 7. If none of the first 5 bytes of the client challenge is unique, the server MUST fail session-key negotiation without further processing of the following steps. It lets ./zerologon_tester.py from https://github.com/SecuraBV/CVE-2020-1472.git report: "Attack failed. Target is probably patched." BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
Stefan Metzmacher authored
CVE-2020-1472(ZeroLogon): libcli/auth: add netlogon_creds_is_random_challenge() to avoid weak values This is the check Windows is using, so we won't generate challenges, which are rejected by Windows DCs (and future Samba DCs). BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
Stefan Metzmacher authored
This is not strictly needed, but makes things more clear. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
Stefan Metzmacher authored
This is not strictly needed, but makes things more clear. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
Stefan Metzmacher authored
CVE-2020-1472(ZeroLogon): libcli/auth: make use of netlogon_creds_random_challenge() in netlogon_creds_cli.c This will avoid getting rejected by the server if we generate a weak challenge. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
Stefan Metzmacher authored
This will avoid getting flakey tests once our server starts to reject weak challenges. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
Stefan Metzmacher authored
It's good to have just a single isolated function that will generate random challenges, in future we can add some logic in order to avoid weak values, which are likely to be rejected by a server. BUG: https://bugzilla.samba.org/show_bug.cgi?id=14497 Signed-off-by:
Stefan Metzmacher <metze@samba.org> Reviewed-by:
Gary Lockyer <gary@catalyst.net.nz>
-
Without printShareName attribute in LDAP, Windows doesn't list the pinters at all. BUG: https://bugzilla.samba.org/show_bug.cgi?id=9771 Signed-off-by:
Bjoern Jacke <bjacke@samba.org> Reviewed-by:
Jeremy Allison <jra@samba.org> Autobuild-User(master): Jeremy Allison <jra@samba.org> Autobuild-Date(master): Fri Sep 18 01:58:22 UTC 2020 on sn-devel-184
-
BUG: https://bugzilla.samba.org/show_bug.cgi?id=9771 Signed-off-by:
Bjoern Jacke <bjacke@samba.org> Reviewed-by:
Jeremy Allison <jra@samba.org>
-
Signed-off-by:
Bjoern Jacke <bjacke@samba.org> Reviewed-by:
Jeremy Allison <jra@samba.org>
-
- 17 Sep, 2020 1 commit
-
-
Otherwise the test fails because the client is authenticated using spnego and gse_krb5, not triggering the weak crypto restrictions. Signed-off-by:
Samuel Cabrero <scabrero@samba.org> Reviewed-by:
David Disseldorp <ddiss@samba.org> Autobuild-User(master): David Disseldorp <ddiss@samba.org> Autobuild-Date(master): Thu Sep 17 00:05:51 UTC 2020 on sn-devel-184
-
- 16 Sep, 2020 2 commits
-
-
Set a pid file directory to avoid the following testparm error: ERROR: pid directory /usr/local/samba/var/run does not exist Signed-off-by:
Samuel Cabrero <scabrero@samba.org> Reviewed-by:
David Disseldorp <ddiss@samba.org>
-
Signed-off-by:
Samuel Cabrero <scabrero@samba.org> Reviewed-by:
David Disseldorp <ddiss@samba.org>
-
- 15 Sep, 2020 5 commits
-
-
Jeremy Allison authored
All callers already correctly initialize them. Signed-off-by:
Jeremy Allison <jra@samba.org> Reviewed-by:
Noel Power <noel.power@suse.com> Autobuild-User(master): Noel Power <npower@samba.org> Autobuild-Date(master): Tue Sep 15 11:33:35 UTC 2020 on sn-devel-184
-
Jeremy Allison authored
--------------- / \ / REST \ / IN \ / PEACE \ / \ | | | struct ip_service | | | | | | 9 August | | In the year of the | | pandemic | | 2020 | *| * * * | * _________)/\\_//(\/(/\)/\//\/\////|_)_______ Signed-off-by:
Jeremy Allison <jra@samba.org> Reviewed-by:
Noel Power <noel.power@suse.com>
-
Jeremy Allison authored
It's now the only function. Signed-off-by:
Jeremy Allison <jra@samba.org> Reviewed-by:
Noel Power <noel.power@suse.com>
-
Jeremy Allison authored
Signed-off-by:
Jeremy Allison <jra@samba.org> Reviewed-by:
Noel Power <noel.power@suse.com>
-
Jeremy Allison authored
Signed-off-by:
Jeremy Allison <jra@samba.org> Reviewed-by:
Noel Power <noel.power@suse.com>
-