summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
* source3: move lib/substitute.c functions out of proto.hRalph Boehme2021-11-1139-33/+100
* auth:creds: Guess the username first via getpwuid(my_id)Andreas Schneider2021-11-101-0/+13
* auth:creds: Remove trailing spacesAndreas Schneider2021-11-101-56/+56
* s3:winbindd: fix "allow trusted domains = no" regressionStefan Metzmacher2021-11-101-1/+1
* CVE-2021-3738 s4:rpc_server/samr: make use of dcesrv_samdb_connect_as_*() helperStefan Metzmacher2021-11-092-43/+7
* CVE-2021-3738 s4:rpc_server/netlogon: make use of dcesrv_samdb_connect_as_*()...Stefan Metzmacher2021-11-091-118/+18
* CVE-2021-3738 s4:rpc_server/lsa: make use of dcesrv_samdb_connect_as_user() h...Stefan Metzmacher2021-11-091-6/+1
* CVE-2021-3738 s4:rpc_server/dnsserver: make use of dcesrv_samdb_connect_as_us...Stefan Metzmacher2021-11-091-9/+2
* CVE-2021-3738 s4:rpc_server/drsuapi: make use of assoc_group aware dcesrv_sam...Stefan Metzmacher2021-11-092-37/+19
* CVE-2021-3738 s4:rpc_server/common: provide assoc_group aware dcesrv_samdb_co...Stefan Metzmacher2021-11-091-16/+105
* CVE-2021-3738 auth_util: avoid talloc_tos() in copy_session_info()Stefan Metzmacher2021-11-091-3/+6
* CVE-2021-3738 s4:torture/drsuapi: DsBindAssocGroup* testsStefan Metzmacher2021-11-092-0/+173
* CVE-2021-3738 s4:torture/drsuapi: maintain priv->admin_credentialsStefan Metzmacher2021-11-092-0/+4
* CVE-2021-3738 s4:torture/drsuapi: maintain priv->dc_credentialsStefan Metzmacher2021-11-092-2/+2
* CVE-2021-3738 s4:torture/drsuapi: don't pass DsPrivate to test_DsBind()Stefan Metzmacher2021-11-093-11/+16
* CVE-2016-2124: s3:libsmb: don't fallback to non spnego authentication if we r...Stefan Metzmacher2021-11-091-0/+9
* CVE-2016-2124: s4:libcli/sesssetup: don't fallback to non spnego authenticati...Stefan Metzmacher2021-11-091-0/+14
* CVE-2021-23192: dcesrv_core: only the first fragment specifies the auth_contextsStefan Metzmacher2021-11-096-46/+109
* CVE-2021-23192: python/tests/dcerpc: add tests to check how security contexts...Stefan Metzmacher2021-11-092-0/+1293
* CVE-2021-23192: python/tests/dcerpc: fix do_single_request(send_req=False)Stefan Metzmacher2021-11-091-17/+20
* CVE-2021-23192: python/tests/dcerpc: let generate_request_auth() use g_auth_l...Stefan Metzmacher2021-11-091-3/+3
* CVE-2021-23192: python/tests/dcerpc: change assertNotEquals() into assertNotE...Stefan Metzmacher2021-11-092-151/+151
* CVE-2021-23192: dcesrv_core: add dcesrv_fault_disconnect0() that skips DCERPC...Stefan Metzmacher2021-11-091-31/+16
* CVE-2021-23192: dcesrv_core: add better debugging to dcesrv_fault_disconnect()Stefan Metzmacher2021-11-091-5/+24
* CVE-2020-25722 selftest: Ensure check for duplicate servicePrincipalNames is ...Joseph Sutton2021-11-092-15/+12
* CVE-2020-25722 selftest: Add test for duplicate servicePrincipalNames on an a...Joseph Sutton2021-11-092-0/+23
* CVE-2020-25722 pytests: Give computer accounts unique (and valid) sAMAccountN...Stefan Metzmacher2021-11-091-6/+12
* CVE-2020-25719 selftest: Always expect a PAC in TGS replies with HeimdalAndrew Bartlett2021-11-091-1/+1
* Revert "CVE-2020-25719 heimdal:kdc: Require authdata to be present"Andrew Bartlett2021-11-091-1/+1
* CVE-2020-25718 heimdal:kdc: Add comment about tests for tickets of users not ...Joseph Sutton2021-11-091-1/+3
* CVE-2020-25719 tests/krb5: Add tests for using a ticket with a renamed accountJoseph Sutton2021-11-096-33/+129
* CVE-2020-25718 tests/krb5: Only fetch RODC account credentials when necessaryJoseph Sutton2021-11-091-3/+6
* CVE-2020-25719 heimdal:kdc: Require PAC to be presentJoseph Sutton2021-11-092-5/+4
* CVE-2020-25722 kdc: Do not honour a request for a 3-part SPN (ending in our d...Andrew Bartlett2021-11-093-12/+23
* CVE-2020-25719 heimdal:kdc: Verify PAC in TGT provided for user-to-user authe...Joseph Sutton2021-11-092-16/+28
* CVE-2020-25719 heimdal:kdc: Check name in request against name in user-to-use...Joseph Sutton2021-11-092-4/+55
* CVE-2020-25719 heimdal:kdc: Use sname from request rather than user-to-user T...Joseph Sutton2021-11-092-78/+55
* CVE-2020-25719 heimdal:kdc: Move fetching krbtgt entry to before enctype sele...Joseph Sutton2021-11-091-35/+35
* CVE-2020-25719 heimdal:kdc: Check return codeJoseph Sutton2021-11-091-1/+4
* CVE-2020-25719 s4:kdc: Add KDC support for PAC_REQUESTER_SID PAC bufferJoseph Sutton2021-11-095-75/+185
* CVE-2020-25722 Ensure the structural objectclass cannot be changedAndrew Bartlett2021-11-095-34/+37
* CVE-2020-25721 auth: Fill in the new HAS_SAM_NAME_AND_SID valuesAndrew Bartlett2021-11-094-16/+8
* CVE-2020-25719 kdc: Avoid races and multiple DB lookups in s4u2self checkAndrew Bartlett2021-11-095-78/+52
* CVE-2020-25718 kdc: Return ERR_POLICY if RODC krbtgt account is invalidJoseph Sutton2021-11-094-12/+8
* CVE-2020-25718 kdc: Confirm the RODC was allowed to issue a particular ticketAndrew Bartlett2021-11-099-54/+187
* CVE-2020-25718 dsdb: Bring sid_helper.c into common code as rodc_helper.cAndrew Bartlett2021-11-095-12/+2
* CVE-2020-25718 s4-rpc_server: Add in debug messages into RODC processingAndrew Bartlett2021-11-091-1/+17
* CVE-2020-25718 s4-rpc_server: Explain why we use DSDB_SEARCH_SHOW_EXTENDED_DN...Andrew Bartlett2021-11-092-2/+10
* CVE-2020-25718 s4-rpc_server: Remove unused attributes in RODC checkAndrew Bartlett2021-11-092-4/+1
* CVE-2020-25718 s4-rpc_server: Provide wrapper samdb_confirm_rodc_allowed_to_r...Andrew Bartlett2021-11-093-48/+51