summaryrefslogtreecommitdiff
path: root/source4
Commit message (Collapse)AuthorAgeFilesLines
* s4-lib/tls: Try socket_send() multiple times to send partial packetsAndrew Bartlett2012-07-181-13/+26
| | | | | | | | | | | | | | | | This works around an artificial limitation in socket_wrapper that breaks some versions of GnuTLS when we return a short write. Instead, keep pushing until the OS will not take it. The correct solution will be to use tls_tstream, but the client code for this is not yet tested and needs the ldap client layer changed to use it. Andrew Bartlett Autobuild-User(master): Andrew Bartlett <abartlet@samba.org> Autobuild-Date(master): Wed Jul 18 11:23:55 CEST 2012 on sn-devel-104
* s4-librpc: Ensure we do not call call the decrpc timeout handler during ↵Andrew Bartlett2012-07-183-5/+39
| | | | | | | | | | | | gensec_update() This avoids a situation where we could destroy pointers on the stack due to a nested event loop. This is certainly not a final, generic solution, but it is a minimal change while we work to make gensec and gensec_gssapi async. Andrew Bartlett
* s4-dbcheck: Check for and correct incorrect instanceType valuesAndrew Bartlett2012-07-181-0/+45
|
* dsdb: Allocate new OID to allow updates of a read-only replicaAndrew Bartlett2012-07-185-5/+15
| | | | | | | Normally this would be a very bad idea, but the specific case of fixing the instanceType is the only case where this makes sense. Andrew Bartlett
* s4-dsdb: Allow dbcheck to correct an incorrect instanceTypeAndrew Bartlett2012-07-181-3/+5
|
* s4-dsdb: Ensure we never write read-only objects onto a read-write replicaAndrew Bartlett2012-07-181-1/+8
| | | | | | | | | | We should prevent this much further up the stack, but at least add a choke at this point for now. Additionally, this avoids administrator-forced replications causing considerable damange to the directory. Andrew Bartlett
* source4/torture: add talloc_stackframe()Rusty Russell2012-07-181-0/+3
| | | | | | | | | We need a stackframe to call lp_load(). Signed-off-by: Rusty Russell <rusty@rustcorp.com.au> Autobuild-User(master): Rusty Russell <rusty@rustcorp.com.au> Autobuild-Date(master): Wed Jul 18 09:31:07 CEST 2012 on sn-devel-104
* s4-auth: Make sure we use the correct credential state.Andreas Schneider2012-07-171-1/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | If we create a copy of the credential state we miss updates to the credentials. To establish a netlogon schannel connection we create client credentials and authenticate with them using dcerpc_netr_ServerAuthenticate2() For this we call netlogon_creds_client_authenticator() which increases the sequence number and steps the credentials. Lets assume the sequence number is 1002. After a successful authentication we get the server credentials and we send bind a auth request with the received creds. This sets up gensec and the gensec schannel module created a copy of the client creds and stores it in the schannel auth state. So the creds stored in gensec have the sequence number 1002. After that we continue and need the client credentials to call dcerpc_netr_LogonGetCapabilities() to verify the connection. So we need to increase the sequence number of the credentials to 1004 and step the credentials to the next state. The server always does the same and everything is just fine here. The connection is established and we want to do another netlogon call. So we get the creds from gensec and want to do a netlogon call e.g. dcerpc_netr_SamLogonWithFlags. We get the needed creds from gensec. The sequence number is 1002 and we talk to the server. The server is already ahead cause we are already at sequence number 1004 and the server expects it to be 1006. So the server gives us ACCESS_DENIED cause we use a copy in gensec. Signed-off-by: Günther Deschner <gd@samba.org>
* s4-librpc: Add capabilities check for AES encrypted connections.Andreas Schneider2012-07-171-1/+110
| | | | Signed-off-by: Günther Deschner <gd@samba.org>
* s4-torture: Improve samlogon test.Andreas Schneider2012-07-171-0/+8
|
* s4-torture: Add DCERPC_SCHANNEL_AES tests.Andreas Schneider2012-07-171-1/+5
| | | | Signed-off-by: Günther Deschner <gd@samba.org>
* s4:rpc_server/netlogon: add support for AES based netlogon schannelStefan Metzmacher2012-07-171-0/+4
| | | | | | metze Signed-off-by: Günther Deschner <gd@samba.org>
* s4:librpc/rpc: add DCERPC_SCHANNEL_AES supportStefan Metzmacher2012-07-171-2/+15
| | | | | | metze Signed-off-by: Günther Deschner <gd@samba.org>
* s4:rpc_server/netlogon: only return STRONG_KEYS if the client asked for itStefan Metzmacher2012-07-171-26/+31
| | | | | | metze Signed-off-by: Günther Deschner <gd@samba.org>
* s4:rpc_server/netlogon: implement netr_LogonGetCapabilitiesStefan Metzmacher2012-07-171-2/+20
| | | | | | | | This is also needed to support AES. metze Signed-off-by: Günther Deschner <gd@samba.org>
* s4:librpc/rpc/dcerpc_schannel: just append NETLOGON_NEG_RODC_PASSTHROUGH as rodcStefan Metzmacher2012-07-171-4/+5
| | | | | | | | The RODC stuff doesn't depend on the schannel algorithm. metze Signed-off-by: Günther Deschner <gd@samba.org>
* s4:librpc/rpc/dcerpc_schannel: rework downgrade logicStefan Metzmacher2012-07-171-5/+38
| | | | | | metze Signed-off-by: Günther Deschner <gd@samba.org>
* s4-param: Use a unique header nameAndrew Bartlett2012-07-151-3/+3
|
* s4-provision: Provide YP/NIS subtree to allow ADUC to see and set rfc2307 attrsGeza Gemes2012-07-133-2/+536
| | | | | | | | | | When provisioning with --use_rfc2307=yes populate the subtree: CN=ypServ30,CN=RpcServices,CN=System,${DOMAINDN} This makes it possible to manipulate the posix attributes via ADUC (commit message adjusted by abartlet) Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s4:registry:regdiff: use existing talloc context for the event contextMichael Adam2012-07-131-1/+1
| | | | | Autobuild-User(master): Michael Adam <obnox@samba.org> Autobuild-Date(master): Fri Jul 13 02:51:44 CEST 2012 on sn-devel-104
* s4:registry:regdiff: add TALLOC_CTX * argument to open_backend()Michael Adam2012-07-131-6/+7
|
* s4:registry: add a TALLOC_CTX argument to reg_open_remote()Michael Adam2012-07-134-5/+7
|
* s4-torture: add ntprinting ndr operations testsuite.Günther Deschner2012-07-063-1/+442
| | | | | | | Guenther Autobuild-User(master): Günther Deschner <gd@samba.org> Autobuild-Date(master): Fri Jul 6 20:55:26 CEST 2012 on sn-devel-104
* s4-selftest: do a dbcheck on our two vampire DCsAndrew Bartlett2012-07-061-1/+1
| | | | | | | | | | | However, due to using --domain-critical-only we have to knownfail the vampire DC here, as we do not fill in the backlinks on non-critical objects correctly. Andrew Bartlett Autobuild-User(master): Andrew Bartlett <abartlet@samba.org> Autobuild-Date(master): Fri Jul 6 16:54:10 CEST 2012 on sn-devel-104
* s4-dbcheck: Check for an object without a parentAndrew Bartlett2012-07-061-0/+44
| | | | | | | Such objects are then moved to the appropriate LostAndFound container, just as they would be if replicated. Andrew Bartlett
* s4-dsdb: Remove unused variables in py_dsdb_get_partitions_dnAndrew Bartlett2012-07-061-3/+0
|
* pydsdb: Add bindings for dsdb_wellknown_dn()Andrew Bartlett2012-07-062-0/+38
|
* s4-pydsdb: Add bindings for dsdb_find_nc_root()Andrew Bartlett2012-07-062-0/+26
|
* s4-pydsdb: Improve PyErr_LDB_{DN,}_OR_RAISE to use py_check_dcerpc_typeAndrew Bartlett2012-07-061-2/+9
| | | | | | This checks the type rather than just dereferencing the pointer. Andrew Bartlett
* auth: Common function for retrieving PAC_LOGIN_INFO from PACChristof Schmitt2012-07-062-45/+0
| | | | | | | | Several functions use the same logic as kerberos_pac_logon_info. Move kerberos_pac_logon_info to common code and reuse it to remove the code duplication. Signed-off-by: Andrew Bartlett <abartlet@samba.org>
* s4-lsarpc: DCERPC_FAULT_ACCESS_DENIED for tcpAndreas Schneider2012-07-061-0/+10
| | | | | Autobuild-User(master): Andreas Schneider <asn@cryptomilk.org> Autobuild-Date(master): Fri Jul 6 11:50:40 CEST 2012 on sn-devel-104
* s4-lsarpc: DCERPC_FAULT_ACCESS_DENIED for npAndreas Schneider2012-07-063-0/+45
|
* s4-lsarpc: Restrict LookupSids3 to crypto connections only.Andreas Schneider2012-07-061-0/+10
|
* s4-lsarpc: Restrict LookupNames4 to crypto connections only.Andreas Schneider2012-07-061-0/+10
|
* s4-lsarpc: Don't call lsa_OpenPolicy2 in lsa_LookupSids3.Andreas Schneider2012-07-061-46/+48
|
* s4-lsaprc: Don't call lsa_OpenPolicy2 in lsa_LookupNames4.Andreas Schneider2012-07-061-49/+53
|
* s4-selftest: Don't run lsarpc requiring a named pipe over tcpip.Andreas Schneider2012-07-061-1/+1
|
* s4-selftest: Don't plan lsa.secrets tests over tcpip.Andreas Schneider2012-07-061-4/+4
| | | | These will only work over a named pipe or ncalrpc.
* s4-libnet: Skip calling lsarpc functions over a wrong pipe.Andreas Schneider2012-07-061-0/+9
|
* s4-torture: Call lsarpc tests over the correct pipe.Andreas Schneider2012-07-061-0/+6
|
* s4-torture: Don't consider NONE_MAPPED an error in LookupSids3.Andreas Schneider2012-07-061-3/+19
|
* s4-torture: Don't consider NONE_MAPPED an error in LookupNames4.Andreas Schneider2012-07-061-3/+15
|
* s4-torture: Add a lsarpc test_GetUserName_fail function.Andreas Schneider2012-07-061-0/+59
|
* s4-torture: Add a lsarpc test_OpenPolicy2_fail function.Andreas Schneider2012-07-062-21/+74
|
* s4-torture: Add a lsarpc test_OpenPolicy_fail function.Andreas Schneider2012-07-061-17/+74
|
* s4-torture: Add a lsarpc test_LookupNames4_fail function.Andreas Schneider2012-07-061-23/+74
|
* s4-torture: Add a lsarpc test_LookupSids3_fail function.Andreas Schneider2012-07-061-15/+68
|
* s4-torture: Test LookupSids3/LookupNames4 over np and tcpip.Andreas Schneider2012-07-061-8/+26
|
* s4-torture: Make sure lsa_OpenPolicy2 fails over TCP/IP.Andreas Schneider2012-07-062-8/+16
|
* s4-torture: Make sure lsa_OpenPolicy fails over TCP/IP.Andreas Schneider2012-07-061-9/+20
|