summaryrefslogtreecommitdiff
path: root/WHATSNEW.txt
blob: a7b553b0815e447e639a23c3d468e46f49db7f53 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
1964
1965
1966
1967
1968
1969
1970
1971
1972
1973
1974
1975
1976
1977
1978
1979
1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
2026
2027
2028
2029
2030
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
2041
2042
2043
2044
2045
2046
2047
2048
2049
2050
2051
2052
2053
2054
2055
2056
2057
2058
2059
2060
2061
2062
2063
2064
2065
2066
2067
2068
2069
2070
2071
2072
2073
2074
2075
2076
2077
2078
2079
2080
2081
2082
2083
2084
2085
2086
2087
2088
2089
2090
2091
2092
2093
2094
2095
2096
2097
2098
2099
2100
2101
2102
2103
2104
2105
2106
2107
2108
2109
2110
2111
2112
2113
2114
2115
2116
2117
2118
2119
2120
2121
2122
2123
2124
2125
2126
2127
2128
2129
2130
2131
2132
2133
2134
2135
2136
2137
2138
2139
2140
2141
2142
2143
2144
2145
2146
2147
2148
2149
2150
2151
2152
2153
2154
2155
2156
2157
2158
2159
2160
2161
2162
2163
2164
2165
2166
2167
2168
2169
2170
2171
2172
2173
2174
2175
2176
2177
2178
2179
2180
2181
2182
2183
2184
2185
2186
2187
2188
2189
2190
2191
2192
2193
2194
2195
2196
2197
2198
2199
2200
2201
2202
2203
2204
2205
2206
2207
2208
2209
2210
2211
2212
2213
2214
2215
2216
2217
2218
2219
2220
2221
2222
2223
2224
2225
2226
2227
2228
2229
2230
2231
2232
2233
2234
2235
2236
2237
2238
2239
2240
2241
2242
2243
2244
2245
2246
2247
2248
2249
2250
2251
2252
2253
2254
2255
2256
2257
2258
2259
2260
2261
2262
2263
2264
2265
2266
2267
2268
2269
2270
2271
2272
2273
2274
2275
2276
2277
2278
2279
2280
2281
2282
2283
2284
2285
2286
2287
2288
2289
2290
2291
2292
2293
2294
2295
2296
2297
2298
2299
2300
2301
2302
2303
2304
2305
2306
2307
2308
2309
2310
2311
2312
2313
2314
2315
2316
2317
2318
2319
2320
2321
2322
2323
2324
2325
2326
2327
2328
2329
2330
2331
2332
2333
2334
2335
2336
2337
2338
2339
2340
2341
2342
2343
2344
2345
2346
2347
2348
2349
2350
2351
2352
2353
2354
2355
2356
2357
2358
2359
2360
2361
                   ==============================
                   Release Notes for Samba 4.2.12
                           April , 2016
                   ==============================


This is the latest stable release of Samba 4.2.


Changes since 4.2.11:
---------------------

o  Jeremy Allison <jra@samba.org>
   * BUG 10489: s3: smbd: posix_acls: Fix check for setting u:g:o entry on a
     filesystem with no ACL support.
   * BUG 11703: s3: smbd: Fix timestamp rounding inside SMB2 create.
   * BUG 11742: lib: tevent: Fix memory leak when old signal action restored.
   * BUG 11771: lib: tevent: Fix memory leak when old signal action restored.


o  Christian Ambach <ambi@samba.org>
   * BUG 6482: s3:utils/smbget: Fix recursive download.


o  Andrew Bartlett <abartlet@samba.org>
   * BUG 11780: smbd: Only check dev/inode in open_directory, not the full
     stat().
   * BUG 11789: build: Mark explicit dependencies on pytalloc-util.


o  Ralph Boehme <slow@samba.org>
   * BUG 11714: lib/tsocket: Work around sockets not supporting FIONREAD.


o  Günther Deschner <gd@samba.org>
   * BUG 11789: libsmb/pysmb: add pytalloc-util dependency to fix the build.


o  Berend De Schouwer <berend.de.schouwer@gmail.com>
   * BUG 11643: docs: Add example for domain logins to smbspool man page.


o  Nathan Huff <nhuff@acm.org>
   * BUG 11771: Fix ETIME handling for Solaris event ports.


o  Volker Lendecke <vl@samba.org>
   * BUG 11732: param: Fix str_list_v3 to accept ";" again.
   * BUG 11816: nwrap: Fix the build on Solaris.
   * BUG 11827: Fix memleak.


o  Justin Maggard <jmaggard10@gmail.com>
   * BUG 11773: s3:smbd: Add negprot remote arch detection for OSX.


o  Stefan Metzmacher <metze@samba.org>
   * BUG 11742: tevent: version 0.9.28. Fix memory leak when old signal action
     restored.
   * BUG 11789: s3:wscript: pylibsmb depends on pycredentials.


o  Jose A. Rivera <jarrpa@samba.org>
   * BUG 11727: s3:smbd:open: Skip redundant call to file_set_dosmode when
     creating a new file.


o  Andreas Schneider <asn@samba.org>
   * BUG 11690: docs: Add smbspool_krb5_wrapper manpage.


o  Jorge Schrauwen <sjorge@blackdot.be>
   * BUG 11816: configure: Don't check for inotify on illumos.


o  Martin Schwenke <martin@meltin.net>
   * BUG 11719: ctdb-scripts: Drop use of "smbcontrol winbindd ip-dropped ...".


o  Uri Simchoni <uri@samba.org>
   * BUG 11852: libads: Record session expiry for spnego sasl binds.


o  Hemanth Thummala <hemanth.thummala@nutanix.com>
   * BUG 11708: loadparm: Fix memory leak issue.
   * BUG 11740: Real memory leak(buildup) issue in loadparm.


o  Jelmer Vernooij <jelmer@jelmer.uk>
   * BUG 11771: tevent: Only set public headers field when installing as a
     public library.


#######################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored.  All bug reports should
be filed under the "Samba 4.1 and newer" product in the project's Bugzilla
database (https://bugzilla.samba.org/).


======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================


Release notes for older releases follow:
----------------------------------------


                   ==============================
                   Release Notes for Samba 4.2.11
                           April 12, 2016
                   ==============================

This is a security release containing one additional
regression fix for the security release 4.2.10.

This fixes a regression that prevents things like 'net ads join'
from working against a Windows 2003 domain.

Changes since 4.2.10:
=====================

o  Stefan Metzmacher <metze@samba.org>
   * Bug 11804 - prerequisite backports for the security release on
     April 12th, 2016


----------------------------------------------------------------------


                   ==============================
                   Release Notes for Samba 4.2.10
                           April 12, 2016
                   ==============================


This is a security release in order to address the following CVEs:

o  CVE-2015-5370 (Multiple errors in DCE-RPC code)

o  CVE-2016-2110 (Man in the middle attacks possible with NTLMSSP)

o  CVE-2016-2111 (NETLOGON Spoofing Vulnerability)

o  CVE-2016-2112 (LDAP client and server don't enforce integrity)

o  CVE-2016-2113 (Missing TLS certificate validation)

o  CVE-2016-2114 ("server signing = mandatory" not enforced)

o  CVE-2016-2115 (SMB IPC traffic is not integrity protected)

o  CVE-2016-2118 (SAMR and LSA man in the middle attacks possible)

The number of changes are rather huge for a security release,
compared to typical security releases.

Given the number of problems and the fact that they are all related
to man in the middle attacks we decided to fix them all at once
instead of splitting them.

In order to prevent the man in the middle attacks it was required
to change the (default) behavior for some protocols. Please see the
"New smb.conf options" and "Behavior changes" sections below.

=======
Details
=======

o  CVE-2015-5370

   Versions of Samba from 3.6.0 to 4.4.0 inclusive are vulnerable to
   denial of service attacks (crashes and high cpu consumption)
   in the DCE-RPC client and server implementations. In addition,
   errors in validation of the DCE-RPC packets can lead to a downgrade
   of a secure connection to an insecure one.

   While we think it is unlikely, there's a nonzero chance for
   a remote code execution attack against the client components,
   which are used by smbd, winbindd and tools like net, rpcclient and
   others. This may gain root access to the attacker.

   The above applies all possible server roles Samba can operate in.

   Note that versions before 3.6.0 had completely different marshalling
   functions for the generic DCE-RPC layer. It's quite possible that
   that code has similar problems!

   The downgrade of a secure connection to an insecure one may
   allow an attacker to take control of Active Directory object
   handles created on a connection created from an Administrator
   account and re-use them on the now non-privileged connection,
   compromising the security of the Samba AD-DC.

o  CVE-2016-2110:

   There are several man in the middle attacks possible with
   NTLMSSP authentication.

   E.g. NTLMSSP_NEGOTIATE_SIGN and NTLMSSP_NEGOTIATE_SEAL
   can be cleared by a man in the middle.

   This was by protocol design in earlier Windows versions.

   Windows Server 2003 RTM and Vista RTM introduced a way
   to protect against the trivial downgrade.

   See MsvAvFlags and flag 0x00000002 in
   https://msdn.microsoft.com/en-us/library/cc236646.aspx

   This new feature also implies support for a mechlistMIC
   when used within SPNEGO, which may prevent downgrades
   from other SPNEGO mechs, e.g. Kerberos, if sign or
   seal is finally negotiated.

   The Samba implementation doesn't enforce the existence of
   required flags, which were requested by the application layer,
   e.g. LDAP or SMB1 encryption (via the unix extensions).
   As a result a man in the middle can take over the connection.
   It is also possible to misguide client and/or
   server to send unencrypted traffic even if encryption
   was explicitly requested.

   LDAP (with NTLMSSP authentication) is used as a client
   by various admin tools of the Samba project,
   e.g. "net", "samba-tool", "ldbsearch", "ldbedit", ...

   As an active directory member server LDAP is also used
   by the winbindd service when connecting to domain controllers.

   Samba also offers an LDAP server when running as
   active directory domain controller.

   The NTLMSSP authentication used by the SMB1 encryption
   is protected by smb signing, see CVE-2015-5296.

o  CVE-2016-2111:

   It's basically the same as CVE-2015-0005 for Windows:

     The NETLOGON service in Microsoft Windows Server 2003 SP2,
     Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 Gold
     and R2, when a Domain Controller is configured, allows remote
     attackers to spoof the computer name of a secure channel's
     endpoint, and obtain sensitive session information, by running a
     crafted application and leveraging the ability to sniff network
     traffic, aka "NETLOGON Spoofing Vulnerability".

   The vulnerability in Samba is worse as it doesn't require
   credentials of a computer account in the domain.

   This only applies to Samba running as classic primary domain controller,
   classic backup domain controller or active directory domain controller.

   The security patches introduce a new option called "raw NTLMv2 auth"
   ("yes" or "no") for the [global] section in smb.conf.
   Samba (the smbd process) will reject client using raw NTLMv2
   without using NTLMSSP.

   Note that this option also applies to Samba running as
   standalone server and member server.

   You should also consider using "lanman auth = no" (which is already the default)
   and "ntlm auth = no". Have a look at the smb.conf manpage for further details,
   as they might impact compatibility with older clients. These also
   apply for all server roles.

o  CVE-2016-2112:

   Samba uses various LDAP client libraries, a builtin one and/or the system
   ldap libraries (typically openldap).

   As active directory domain controller Samba also provides an LDAP server.

   Samba takes care of doing SASL (GSS-SPNEGO) authentication with Kerberos or NTLMSSP
   for LDAP connections, including possible integrity (sign) and privacy (seal)
   protection.

   Samba has support for an option called "client ldap sasl wrapping" since version
   3.2.0. Its default value has changed from "plain" to "sign" with version 4.2.0.

   Tools using the builtin LDAP client library do not obey the
   "client ldap sasl wrapping" option. This applies to tools like:
   "samba-tool", "ldbsearch", "ldbedit" and more. Some of them have command line
   options like "--sign" and "--encrypt". With the security update they will
   also obey the "client ldap sasl wrapping" option as default.

   In all cases, even if explicitly request via "client ldap sasl wrapping",
   "--sign" or "--encrypt", the protection can be downgraded by a man in the
   middle.

   The LDAP server doesn't have an option to enforce strong authentication
   yet. The security patches will introduce a new option called
   "ldap server require strong auth", possible values are "no",
   "allow_sasl_over_tls" and "yes".

   As the default behavior was as "no" before, you may
   have to explicitly change this option until all clients have
   been adjusted to handle LDAP_STRONG_AUTH_REQUIRED errors.
   Windows clients and Samba member servers already use
   integrity protection.

o  CVE-2016-2113:

   Samba has support for TLS/SSL for some protocols:
   ldap and http, but currently certificates are not
   validated at all. While we have a "tls cafile" option,
   the configured certificate is not used to validate
   the server certificate.

   This applies to ldaps:// connections triggered by tools like:
   "ldbsearch", "ldbedit" and more. Note that it only applies
   to the ldb tools when they are built as part of Samba or with Samba
   extensions installed, which means the Samba builtin LDAP client library is
   used.

   It also applies to dcerpc client connections using ncacn_http (with https://),
   which are only used by the openchange project. Support for ncacn_http
   was introduced in version 4.2.0.

   The security patches will introduce a new option called
   "tls verify peer". Possible values are "no_check", "ca_only",
   "ca_and_name_if_available", "ca_and_name" and "as_strict_as_possible".

   If you use the self-signed certificates which are auto-generated
   by Samba, you won't have a crl file and need to explicitly
   set "tls verify peer = ca_and_name".

o  CVE-2016-2114

   Due to a regression introduced in Samba 4.0.0,
   an explicit "server signing = mandatory" in the [global] section
   of the smb.conf was not enforced for clients using the SMB1 protocol.

   As a result it does not enforce smb signing and allows man in the middle attacks.

   This problem applies to all possible server roles:
   standalone server, member server, classic primary domain controller,
   classic backup domain controller and active directory domain controller.

   In addition, when Samba is configured with "server role = active directory domain controller"
   the effective default for the "server signing" option should be "mandatory".

   During the early development of Samba 4 we had a new experimental
   file server located under source4/smb_server. But before
   the final 4.0.0 release we switched back to the file server
   under source3/smbd.

   But the logic for the correct default of "server signing" was not
   ported correctly ported.

   Note that the default for server roles other than active directory domain
   controller, is "off" because of performance reasons.

o  CVE-2016-2115:

   Samba has an option called "client signing", this is turned off by default
   for performance reasons on file transfers.

   This option is also used when using DCERPC with ncacn_np.

   In order to get integrity protection for ipc related communication
   by default the "client ipc signing" option is introduced.
   The effective default for this new option is "mandatory".

   In order to be compatible with more SMB server implementations,
   the following additional options are introduced:
   "client ipc min protocol" ("NT1" by default) and
   "client ipc max protocol" (the highest support SMB2/3 dialect by default).
   These options overwrite the "client min protocol" and "client max protocol"
   options, because the default for "client max protocol" is still "NT1".
   The reason for this is the fact that all SMB2/3 support SMB signing,
   while there are still SMB1 implementations which don't offer SMB signing
   by default (this includes Samba versions before 4.0.0).

   Note that winbindd (in versions 4.2.0 and higher) enforces SMB signing
   against active directory domain controllers despite of the
   "client signing" and "client ipc signing" options.

o  CVE-2016-2118 (a.k.a. BADLOCK):

   The Security Account Manager Remote Protocol [MS-SAMR] and the
   Local Security Authority (Domain Policy) Remote Protocol [MS-LSAD]
   are both vulnerable to man in the middle attacks. Both are application level
   protocols based on the generic DCE 1.1 Remote Procedure Call (DCERPC) protocol.

   These protocols are typically available on all Windows installations
   as well as every Samba server. They are used to maintain
   the Security Account Manager Database. This applies to all
   roles, e.g. standalone, domain member, domain controller.

   Any authenticated DCERPC connection a client initiates against a server
   can be used by a man in the middle to impersonate the authenticated user
   against the SAMR or LSAD service on the server.

   The client chosen application protocol, auth type (e.g. Kerberos or NTLMSSP)
   and auth level (NONE, CONNECT, PKT_INTEGRITY, PKT_PRIVACY) do not matter
   in this case. A man in the middle can change auth level to CONNECT
   (which means authentication without message protection) and take over
   the connection.

   As a result, a man in the middle is able to get read/write access to the
   Security Account Manager Database, which reveals all passwords
   and any other potential sensitive information.

   Samba running as an active directory domain controller is additionally
   missing checks to enforce PKT_PRIVACY for the
   Directory Replication Service Remote Protocol [MS-DRSR] (drsuapi)
   and the BackupKey Remote Protocol [MS-BKRP] (backupkey).
   The Domain Name Service Server Management Protocol [MS-DNSP] (dnsserver)
   is not enforcing at least PKT_INTEGRITY.

====================
New smb.conf options
====================

  allow dcerpc auth level connect (G)

    This option controls whether DCERPC services are allowed to be used with
    DCERPC_AUTH_LEVEL_CONNECT, which provides authentication, but no per
    message integrity nor privacy protection.

    Some interfaces like samr, lsarpc and netlogon have a hard-coded default
    of no and epmapper, mgmt and rpcecho have a hard-coded default of yes.

    The behavior can be overwritten per interface name (e.g. lsarpc,
    netlogon, samr, srvsvc, winreg, wkssvc ...) by using
    'allow dcerpc auth level connect:interface = yes' as option.

    This option yields precedence to the implementation specific restrictions.
    E.g. the drsuapi and backupkey protocols require DCERPC_AUTH_LEVEL_PRIVACY.
    The dnsserver protocol requires DCERPC_AUTH_LEVEL_INTEGRITY.

    Default: allow dcerpc auth level connect = no

    Example: allow dcerpc auth level connect = yes

  client ipc signing (G)

    This controls whether the client is allowed or required to use
    SMB signing for IPC$ connections as DCERPC transport. Possible
    values are auto, mandatory and disabled.

    When set to mandatory or default, SMB signing is required.

    When set to auto, SMB signing is offered, but not enforced and
    if set to disabled, SMB signing is not offered either.

    Connections from winbindd to Active Directory Domain Controllers
    always enforce signing.

    Default: client ipc signing = default

  client ipc max protocol (G)

    The value of the parameter (a string) is the highest protocol level that will
    be supported for IPC$ connections as DCERPC transport.

    Normally this option should not be set as the automatic negotiation phase
    in the SMB protocol takes care of choosing the appropriate protocol.

    The value default refers to the latest supported protocol, currently SMB3_11.

    See client max protocol for a full list of available protocols.
    The values CORE, COREPLUS, LANMAN1, LANMAN2 are silently upgraded to NT1.

    Default: client ipc max protocol = default

    Example: client ipc max protocol = SMB2_10

  client ipc min protocol (G)

    This setting controls the minimum protocol version that the will be
    attempted to use for IPC$ connections as DCERPC transport.

    Normally this option should not be set as the automatic negotiation phase
    in the SMB protocol takes care of choosing the appropriate protocol.

    The value default refers to the higher value of NT1 and the
    effective value of "client min protocol".

    See client max protocol for a full list of available protocols.
    The values CORE, COREPLUS, LANMAN1, LANMAN2 are silently upgraded to NT1.

    Default: client ipc min protocol = default

    Example: client ipc min protocol = SMB3_11

  ldap server require strong auth (G)

    The ldap server require strong auth defines whether the
    ldap server requires ldap traffic to be signed or
    signed and encrypted (sealed). Possible values are no,
    allow_sasl_over_tls and yes.

    A value of no allows simple and sasl binds over all transports.

    A value of allow_sasl_over_tls allows simple and sasl binds (without sign or seal)
    over TLS encrypted connections. Unencrypted connections only
    allow sasl binds with sign or seal.

    A value of yes allows only simple binds over TLS encrypted connections.
    Unencrypted connections only allow sasl binds with sign or seal.

    Default: ldap server require strong auth = yes

  raw NTLMv2 auth (G)

    This parameter determines whether or not smbd(8) will allow SMB1 clients
    without extended security (without SPNEGO) to use NTLMv2 authentication.

    If this option, lanman auth and ntlm auth are all disabled, then only
    clients with SPNEGO support will be permitted. That means NTLMv2 is only
    supported within NTLMSSP.

    Default: raw NTLMv2 auth = no

  tls verify peer (G)

    This controls if and how strict the client will verify the peer's
    certificate and name. Possible values are (in increasing order): no_check,
    ca_only, ca_and_name_if_available, ca_and_name and as_strict_as_possible.

    When set to no_check the certificate is not verified at all,
    which allows trivial man in the middle attacks.

    When set to ca_only the certificate is verified to be signed from a ca
    specified in the "tls ca file" option. Setting "tls ca file" to a valid file
    is required. The certificate lifetime is also verified. If the "tls crl file"
    option is configured, the certificate is also verified against
    the ca crl.

    When set to ca_and_name_if_available all checks from ca_only are performed.
    In addition, the peer hostname is verified against the certificate's
    name, if it is provided by the application layer and not given as
    an ip address string.

    When set to ca_and_name all checks from ca_and_name_if_available are performed.
    In addition the peer hostname needs to be provided and even an ip
    address is checked against the certificate's name.

    When set to as_strict_as_possible all checks from ca_and_name are performed.
    In addition the "tls crl file" needs to be configured. Future versions
    of Samba may implement additional checks.

    Default: tls verify peer = as_strict_as_possible

  tls priority (G) (backported from Samba 4.3 to Samba 4.2)

    This option can be set to a string describing the TLS protocols to be
    supported in the parts of Samba that use GnuTLS, specifically the AD DC.

    The default turns off SSLv3, as this protocol is no longer considered
    secure after CVE-2014-3566 (otherwise known as POODLE) impacted SSLv3 use
    in HTTPS applications.

    The valid options are described in the GNUTLS Priority-Strings
    documentation at http://gnutls.org/manual/html_node/Priority-Strings.html

    Default: tls priority = NORMAL:-VERS-SSL3.0

================
Behavior changes
================

o  The default auth level for authenticated binds has changed from
   DCERPC_AUTH_LEVEL_CONNECT to DCERPC_AUTH_LEVEL_INTEGRITY.
   That means ncacn_ip_tcp:server is now implicitly the same
   as ncacn_ip_tcp:server[sign] and offers a similar protection
   as ncacn_np:server, which relies on smb signing.

o  The following constraints are applied to SMB1 connections:

   - "client lanman auth = yes" is now consistently
     required for authenticated connections using the
     SMB1 LANMAN2 dialect.
   - "client ntlmv2 auth = yes" and "client use spnego = yes"
     (both the default values), require extended security (SPNEGO)
     support from the server. That means NTLMv2 is only used within
     NTLMSSP.

o  Tools like "samba-tool", "ldbsearch", "ldbedit" and more obey the
   default of "client ldap sasl wrapping = sign". Even with
   "client ldap sasl wrapping = plain" they will automatically upgrade
   to "sign" when getting LDAP_STRONG_AUTH_REQUIRED from the LDAP
   server.

Changes since 4.2.9:
====================

o  Jeremy Allison <jra@samba.org>
   * Bug 11344 - CVE-2015-5370: Multiple errors in DCE-RPC code.

   * Bug 11804 - prerequisite backports for the security release on
     April 12th, 2016.

o  Christian Ambach <ambi@samba.org>
   * Bug 11804 - prerequisite backports for the security release on
     April 12th, 2016.

o  Andrew Bartlett <abartlet@samba.org>
   * Bug 11804 - prerequisite backports for the security release on
     April 12th, 2016.

o  Ralph Boehme <slow@samba.org>
   * Bug 11644 - CVE-2016-2112: The LDAP client and server don't enforce
     integrity protection.

o  Günther Deschner <gd@samba.org>
   * Bug 11749 - CVE-2016-2111: NETLOGON Spoofing Vulnerability.

   * Bug 11804 - prerequisite backports for the security release on
     April 12th, 2016.

o  Björn Jacke <bj@sernet.de>
   * Bug 11804 - prerequisite backports for the security release on
     April 12th, 2016.

o  Volker Lendecke <vl@samba.org>
   * Bug 11804 - prerequisite backports for the security release on
     April 12th, 2016.

o  Kamen Mazdrashki <kamenim@samba.org>
   * Bug 11804 - prerequisite backports for the security release on
     April 12th, 2016.

o  Stefan Metzmacher <metze@samba.org>
   * Bug 11344 - CVE-2015-5370: Multiple errors in DCE-RPC code.

   * Bug 11616 - CVE-2016-2118: SAMR and LSA man in the middle attacks possible.

   * Bug 11644 - CVE-2016-2112: The LDAP client and server doesn't enforce
     integrity protection.

   * Bug 11687 - CVE-2016-2114: "server signing = mandatory" not enforced.

   * Bug 11688 - CVE-2016-2110: Man in the middle attacks possible with NTLMSSP.

   * Bug 11749 - CVE-2016-2111: NETLOGON Spoofing Vulnerability.

   * Bug 11752 - CVE-2016-2113: Missing TLS certificate validation allows man in
     the middle attacks.

   * Bug 11756 - CVE-2016-2115: SMB client connections for IPC traffic are not
     integrity protected.

   * Bug 11804 - prerequisite backports for the security release on
     April 12th, 2016.

o  Richard Sharpe <rsharpe@samba.org>
   * Bug 11804 - prerequisite backports for the security release on
     April 12th, 2016.

o  Andreas Schneider <asn@samba.org>
   * Bug 11804 - prerequisite backports for the security release on
     April 12th, 2016.

o  Jelmer Vernooij <jelmer@samba.org>
   * Bug 11804 - prerequisite backports for the security release on
     April 12th, 2016.


#######################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored.  All bug reports should
be filed under the "Samba 4.1 and newer" product in the project's Bugzilla
database (https://bugzilla.samba.org/).


======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================

                   =============================
                   Release Notes for Samba 4.2.9
                           March 8, 2016
                   =============================


This is a security release in order to address the following CVEs:

o  CVE-2015-7560 (Incorrect ACL get/set allowed on symlink path)
o  CVE-2016-0771 (Out-of-bounds read in internal DNS server)

=======
Details
=======

o  CVE-2015-7560:
   All versions of Samba from 3.2.0 to 4.4.0rc3 inclusive are vulnerable to
   a malicious client overwriting the ownership of ACLs using symlinks.

   An authenticated malicious client can use SMB1 UNIX extensions to
   create a symlink to a file or directory, and then use non-UNIX SMB1
   calls to overwrite the contents of the ACL on the file or directory
   linked to.

o  CVE-2016-0771:
   All versions of Samba from 4.0.0 to 4.4.0rc3 inclusive, when deployed as
   an AD DC and choose to run the internal DNS server, are vulnerable to an
   out-of-bounds read issue during DNS TXT record handling caused by users
   with permission to modify DNS records.

   A malicious client can upload a specially constructed DNS TXT record,
   resulting in a remote denial-of-service attack. As long as the affected
   TXT record remains undisturbed in the Samba database, a targeted DNS
   query may continue to trigger this exploit.

   While unlikely, the out-of-bounds read may bypass safety checks and
   allow leakage of memory from the server in the form of a DNS TXT reply.

   By default only authenticated accounts can upload DNS records,
   as "allow dns updates = secure only" is the default.
   Any other value would allow anonymous clients to trigger this
   bug, which is a much higher risk.


Changes since 4.2.8:
--------------------

o  Jeremy Allison <jra@samba.org>
   * BUG 11648: CVE-2015-7560: Getting and setting Windows ACLs on symlinks can
     change permissions on link target.

o  Garming Sam <garming@catalyst.net.nz>
   * BUGs 11128, 11686: CVE-2016-0771: Read of uninitialized memory DNS TXT
     handling.

o  Stefan Metzmacher <metze@samba.org>
   * BUGs 11128, 11686: CVE-2016-0771: Read of uninitialized memory DNS TXT
     handling.


#######################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored.  All bug reports should
be filed under the "Samba 4.1 and newer" product in the project's Bugzilla
database (https://bugzilla.samba.org/).


======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================


----------------------------------------------------------------------


                   =============================
                   Release Notes for Samba 4.2.8
                          February 2, 2016
                   =============================


This is the latest stable release of Samba 4.2.


Changes since 4.2.7:
--------------------

o  Michael Adam <obnox@samba.org>
   * BUG 11647: s3:smbd: Fix a corner case of the symlink verification.


o  Jeremy Allison <jra@samba.org>
   * BUG 11624: s3: libsmb: Correctly initialize the list head when keeping a
     list of primary followed by DFS connections.
   * BUG 11625: Reduce the memory footprint of empty string options.


o  Christian Ambach <ambi@samba.org>
   * BUG 11400: s3:smbd/oplock: Obey kernel oplock setting when releasing
     oplocks.


o  Ralph Boehme <slow@samba.org>
   * BUG 11065: vfs_fruit: Fix renaming directories with open files.
   * BUG 11347: Fix MacOS finder error 36 when copying folder to Samba.
   * BUG 11466: Fix copying files with vfs_fruit when using vfs_streams_xattr
     without stream prefix and type suffix.
   * BUG 11645: smbd: make "hide dot files" option work with "store dos
     attributes = yes".
   * BUG 11684: s3:smbd: Ignore initial allocation size for directory creation.


o  Günther Deschner <gd@samba.org>
   * BUG 11639: lib/async_req: Do not install async_connect_send_test.


o  Karolin Seeger <kseeger@samba.org>
   * BUG 11641: docs: Fix typos in man vfs_gpfs.


o  Uri Simchoni <uri@samba.org>
   * BUG 11682: smbcacls: Fix uninitialized variable.


#######################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored.  All bug reports should
be filed under the "Samba 4.1 and newer" product in the project's Bugzilla
database (https://bugzilla.samba.org/).


======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================


----------------------------------------------------------------------


                   =============================
                   Release Notes for Samba 4.2.7
                         December 16, 2015
                   =============================


This is a security release in order to address the following CVEs:

o  CVE-2015-3223 (Denial of service in Samba Active Directory
		  server)
o  CVE-2015-5252 (Insufficient symlink verification in smbd)
o  CVE-2015-5299 (Missing access control check in shadow copy
		  code)
o  CVE-2015-5296 (Samba client requesting encryption vulnerable
		  to downgrade attack)
o  CVE-2015-8467 (Denial of service attack against Windows
		  Active Directory server)
o  CVE-2015-5330 (Remote memory read in Samba LDAP server)

Please note that if building against a system libldb, the required
version has been bumped to ldb-1.1.24.  This is needed to ensure
we build against a system ldb library that contains the fixes
for CVE-2015-5330 and CVE-2015-3223.

=======
Details
=======

o  CVE-2015-3223:
   All versions of Samba from 4.0.0 to 4.3.2 inclusive (resp. all
   ldb versions up to 1.1.23 inclusive) are vulnerable to
   a denial of service attack in the samba daemon LDAP server.

   A malicious client can send packets that cause the LDAP server in the
   samba daemon process to become unresponsive, preventing the server
   from servicing any other requests.

   This flaw is not exploitable beyond causing the code to loop expending
   CPU resources.

o  CVE-2015-5252:
   All versions of Samba from 3.0.0 to 4.3.2 inclusive are vulnerable to
   a bug in symlink verification, which under certain circumstances could
   allow client access to files outside the exported share path.

   If a Samba share is configured with a path that shares a common path
   prefix with another directory on the file system, the smbd daemon may
   allow the client to follow a symlink pointing to a file or directory
   in that other directory, even if the share parameter "wide links" is
   set to "no" (the default).

o  CVE-2015-5299:
   All versions of Samba from 3.2.0 to 4.3.2 inclusive are vulnerable to
   a missing access control check in the vfs_shadow_copy2 module. When
   looking for the shadow copy directory under the share path the current
   accessing user should have DIRECTORY_LIST access rights in order to
   view the current snapshots.

   This was not being checked in the affected versions of Samba.

o  CVE-2015-5296:
   Versions of Samba from 3.2.0 to 4.3.2 inclusive do not ensure that
   signing is negotiated when creating an encrypted client connection to
   a server.

   Without this a man-in-the-middle attack could downgrade the connection
   and connect using the supplied credentials as an unsigned, unencrypted
   connection.

o  CVE-2015-8467:
   Samba, operating as an AD DC, is sometimes operated in a domain with a
   mix of Samba and Windows Active Directory Domain Controllers.

   All versions of Samba from 4.0.0 to 4.3.2 inclusive, when deployed as
   an AD DC in the same domain with Windows DCs, could be used to
   override the protection against the MS15-096 / CVE-2015-2535 security
   issue in Windows.

   Prior to MS16-096 it was possible to bypass the quota of machine
   accounts a non-administrative user could create.  Pure Samba domains
   are not impacted, as Samba does not implement the
   SeMachineAccountPrivilege functionality to allow non-administrator
   users to create new computer objects.

o  CVE-2015-5330:
   All versions of Samba from 4.0.0 to 4.3.2 inclusive (resp. all
   ldb versions up to 1.1.23 inclusive) are vulnerable to
   a remote memory read attack in the samba daemon LDAP server.

   A malicious client can send packets that cause the LDAP server in the
   samba daemon process to return heap memory beyond the length of the
   requested value.

   This memory may contain data that the client should not be allowed to
   see, allowing compromise of the server.

   The memory may either be returned to the client in an error string, or
   stored in the database by a suitabily privileged user.  If untrusted
   users can create objects in your database, please confirm that all DN
   and name attributes are reasonable.


Changes since 4.2.6:
--------------------

o  Andrew Bartlett <abartlet@samba.org>
   * BUG 11552: CVE-2015-8467: samdb: Match MS15-096 behaviour for
     userAccountControl.

o  Jeremy Allison <jra@samba.org>
   * BUG 11325: CVE-2015-3223: Fix LDAP \00 search expression attack DoS.
   * BUG 11395: CVE-2015-5252: Fix insufficient symlink verification (file
     access outside the share).
   * BUG 11529: CVE-2015-5299: s3-shadow-copy2: Fix missing access check on
     snapdir.

o  Douglas Bagnall <douglas.bagnall@catalyst.net.nz>
   * BUG 11599: CVE-2015-5330: Fix remote read memory exploit in LDB.

o  Stefan Metzmacher <metze@samba.org>
   * BUG 11536: CVE-2015-5296: Add man in the middle protection when forcing
     smb encryption on the client side.


#######################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored.  All bug reports should
be filed under the "Samba 4.1 and newer" product in the project's Bugzilla
database (https://bugzilla.samba.org/).


======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================


----------------------------------------------------------------------


                   =============================
                   Release Notes for Samba 4.2.6
                         December 08, 2015
                   =============================


This is the latest stable release of Samba 4.2.


Changes since 4.2.5:
--------------------

o   Michael Adam <obnox@samba.org>
    * BUG 11365: ctdb: Strip trailing spaces from nodes file.
    * BUG 11577: ctdb: Open the RO tracking db with perms 0600 instead of 0000.
    * BUG 11619: doc: Fix a typo in the smb.conf manpage.


o   Jeremy Allison <jra@samba.org>
    * BUG 11452: s3-smbd: Fix old DOS client doing wildcard delete - gives a
      attribute type of zero.
    * BUG 11565: auth: gensec: Fix a memory leak.
    * BUG 11566: lib: util: Make non-critical message a warning.
    * BUG 11589: s3: smbd: If EA's are turned off on a share don't allow an SMB2
      create containing them.
    * BUG 11615: s3: smbd: have_file_open_below() fails to enumerate open files
      below an open directory handle.


o   Ralph Boehme <slow@samba.org>
    * BUG 11564: async_req: Fix non-blocking connect().


o   Volker Lendecke <vl@samba.org>
    * BUG 11243: vfs_gpfs: Re-enable share modes.
    * BUG 11570: smbd: Send SMB2 oplock breaks unencrypted.


o   YvanM <yvan.masson@openmailbox.org>
    * BUG 11584: manpage: Correct small typo error.


o   Marc Muehlfeld <mmuehlfeld@samba.org>
    * BUG 9912: Changing log level of two entries to from 1 to 3.


o   Andreas Schneider <asn@samba.org>
    * BUG 11346: wafsamba: Also build libraries with RELRO protection.
    * BUG 11563: nss_wins: Do not run into use after free issues when we access
      memory allocated on the globals and the global being reinitialized.


o   Karolin Seeger <kseeger@samba.org>
    * BUG 11619: docs: Fix some typos in the idmap config section of man 5
      smb.conf.


o   Noel Power <noel.power@suse.com>
    * BUG 11569: Fix winbindd crashes with samlogon for trusted domain user.
    * BUG 11597: Backport some valgrind fixes from upstream master.


#######################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored.  All bug reports should
be filed under the Samba 4.2 product in the project's Bugzilla
database (https://bugzilla.samba.org/).


======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================


----------------------------------------------------------------------


                   =============================
                   Release Notes for Samba 4.2.5
                         October 27, 2015
                   =============================


This is the latest stable release of Samba 4.2.


Changes since 4.2.4:
--------------------

o   Jeremy Allison <jra@samba.org>
    * BUG 10252: s3: smbd: Fix our access-based enumeration on "hide unreadable"
      to match Windows.
    * BUG 10634: smbd: Fix file name buflen and padding in notify repsonse.
    * BUG 11486: s3: smbd: Fix mkdir race condition.
    * BUG 11522: s3: smbd: Fix opening/creating :stream files on the root share
      directory.
    * BUG 11535: s3: smbd: Fix NULL pointer bug introduced by previous 'raw'
      stream fix (bug #11522).
    * BUG 11555: s3: lsa: lookup_name() logic for unqualified (no DOMAIN\
      component) names is incorrect.


o   Ralph Boehme <slow@samba.org>
    * BUG 11535: s3: smbd: Fix a crash in unix_convert().
    * BUG 11543: vfs_fruit: Return value of ad_pack in vfs_fruit.c.
    * BUG 11549: Fix bug in smbstatus where the lease info is not printed.
    * BUG 11550: s3:smbstatus: Add stream name to share_entry_forall().
    * BUG 11555: s3:lib: validate domain name in lookup_wellknown_name().


o   Günther Deschner <gd@samba.org>
    * BUG 11038: kerberos: Make sure we only use prompter type when available.


o   Björn Jacke <bj@sernet.de>
    * BUG 10365: nss_winbind: Fix hang on Solaris on big groups.
    * BUG 11355: build: Use as-needed linker flag also on OpenBSD.


o   Volker Lendecke <vl@samba.org>
    * BUG 11038: winbind: Fix 100% loop.
    * BUG 11381: Fix a deadlock in tdb.


o   Stefan Metzmacher <metze@samba.org>
    * BUG 11316: s3:ctdbd_conn: Make sure we destroy tevent_fd before closing
      the socket.
    * BUG 11327: dcerpc.idl: accept invalid dcerpc_bind_nak pdus.


o   Har Gagan Sahai <SHarGagan@novell.com>
    * BUG 11509: s3: dfs: Fix a crash when the dfs targets are disabled.


o   Andreas Schneider <asn@samba.org>
    * BUG 11502: pam_winbind: Fix a segfault if initialization fails.


o   Uri Simchoni <uri@samba.org>
    * BUG 11528: net: Fix a crash with 'net ads keytab create'.
    * BUG 11547: vfs_commit: Set the fd on open before calling SMB_VFS_FSTAT.


#######################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored.  All bug reports should
be filed under the Samba 4.2 product in the project's Bugzilla
database (https://bugzilla.samba.org/).


======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================


----------------------------------------------------------------------


                   =============================
                   Release Notes for Samba 4.2.4
                         September 8, 2015
                   =============================


This is the latest stable release of Samba 4.2.


Changes since 4.2.3:
--------------------

o   Michael Adam <obnox@samba.org>
    * BUG 11372: smbd: Fix SMB3 functionality of "smb encrypt".


o   Jeremy Allison <jra@samba.org>
    * BUG 11359: lib: replace: Add strsep function (missing on Solaris).


o   Ralph Boehme <slow@samba.org>
    * BUG 11278: Fix stream names with colon with "fruit:encoding = native".
    * BUG 11317: vfs:fruit: Implement copyfile style copy_chunk.
    * BUG 11426: s3-net: Use talloc array in share allowedusers.
    * BUG 11467: vfs_fruit: Handling of empty resource fork.


o   Alexander Bokovoy <ab@samba.org>
    * BUG 11265: auth/credentials: If credentials have principal set, they are
      not anonymous anymore.


o   Günther Deschner <gd@samba.org>
    * BUG 11373: s3-smbd: Reset protocol in smbXsrv_connection_init_tables
      failure paths.


o   Amitay Isaacs <amitay@gmail.com>
    * BUG 11398: ctdb-daemon: Return correct sequence number for
      CONTROL_GET_DB_SEQNUM.
    * BUG 11431: ctdb-daemon: Improve error handling for running event scripts.


o   Volker Lendecke <vl@samba.org>
    * BUG 11316: lib: Fix rundown of open_socket_out().
    * BUG 11488: Avoid quoting problems in user's DNs.


o   Justin Maggard <jmaggard@netgear.com>
    * BUG 11320: s3-passdb: Respect LOOKUP_NAME_GROUP flag in sid lookup.


o   Roel van Meer <roel@1afa.com>
    * BUG 11427: s3-util: Compare the maximum allowed length of a NetBIOS name.


o   Stefan Metzmacher <metze@samba.org>
    * BUG 11316: s3:lib: Fix some corner cases of open_socket_out_cleanup().
    * BUG 11454: Backport dcesrv_netr_DsRGetDCNameEx2 fixes.


o   Anubhav Rakshit <anubhav.rakshit@gmail.com>
    * BUG 11361: s3:libsmb: Fix a bug in conversion of ea list to ea array.


o   Arvid Requate <requate@univention.de>
    * BUG 11291: s4:rpc_server/netlogon: Fix for NetApp.


o   Andreas Schneider <asn@samba.org>
    * BUG 9862: s3-auth: Fix "map to guest = Bad uid".
    * BUG 11403: s3-smbd: Leave sys_disk_free() if dfree command is used.
    * BUG 11404: s3-auth: Fix a possible null pointer dereference.


o   Martin Schwenke <martin@meltin.net>
    * BUG 11399: ctdb-scripts: Support monitoring of interestingly named VLANs
      on bonds.
    * BUG 11432: ctdb-daemon: Check if updates are in flight when releasing all
      IPs.
    * BUG 11435: ctdb-build: Fix building of PCP PMDA module.


o   Wei Zhong <wweyeww@gmail.com>
    * BUG 10823: s3: winbindd: Fix TALLOC_FREE of uninitialized groups variable.


#######################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored.  All bug reports should
be filed under the Samba 4.2 product in the project's Bugzilla
database (https://bugzilla.samba.org/).


======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================


----------------------------------------------------------------------


                   =============================
                   Release Notes for Samba 4.2.3
                           July 14, 2015
                   =============================


This is the latest stable release of Samba 4.2.


Changes since 4.2.2:
--------------------

o   Michael Adam <obnox@samba.org>
    * BUG 11366: docs: Overhaul the description of "smb encrypt" to include SMB3
      encryption.


o   Jeremy Allison <jra@samba.org>
    * BUG 11068: s3: lib: util: Ensure we read a hex number as %x, not %u.
    * BUG 11295: Excessive cli_resolve_path() usage can slow down transmission.
    * BUG 11328: winbindd: winbindd_raw_kerberos_login - ensure logon_info
      exists in PAC.
    * BUG 11339: s3: smbd: Use separate flag to track
      become_root()/unbecome_root() state.
    * BUG 11342: s3: smbd: Codenomicon crash in do_smb_load_module().


o   Christian Ambach <ambi@samba.org>
    * BUG 11170: s3:param/loadparm: Fix 'testparm --show-all-parameters'.


o   Andrew Bartlett <abartlet@samba.org>
    * BUG 10991: winbindd: Sync secrets.ldb into secrets.tdb on startup.


o   Ralph Boehme <slow@samba.org>
    * BUG 11277: s3:smb2: Add padding to last command in compound requests.
    * BUG 11305: vfs_fruit: Add option "veto_appledouble".
    * BUG 11323: smbd/trans2: Add a useful diagnostic for files with bad
      encoding.
    * BUG 11363: vfs_fruit: Check offset and length for AFP_AfpInfo read
      requests.
    * BUG 11371: ncacn_http: Fix GNUism.


o   Günther Deschner <gd@samba.org>
    * BUG 11245: s3-rpc_server: Fix rpc_create_tcpip_sockets() processing of
      interfaces.


o   Alexander Drozdov <al.drozdov@gmail.com>
    * BUG 11331: tdb: version 1.3.5: ABI change: tdb_chainlock_read_nonblock()
      has been added.


o   Evangelos Foutras <evangelos@foutrelis.com>
    * BUG 8780: s4:lib/tls: Fix build with gnutls 3.4.


o   David Holder <david.holder@erion.co.uk>
    * BUG 11281: Add IPv6 support to ADS client side LDAP connects.
    * BUG 11282: Add IPv6 support for determining FQDN during ADS join.
    * BUG 11283: s3: IPv6 enabled DNS connections for ADS client.


o   Steve Howells <steve.howells@moscowfirst.com>
    * BUG 10924: s4.2/fsmo.py: Fixed fsmo transfer exception.


o   Amitay Isaacs <amitay@gmail.com>
    * BUG 11293: Fix invalid write in ctdb_lock_context_destructor.


o   Volker Lendecke <vl@samba.org>
    * BUG 11218: smbd: Fix a use-after-free.
    * BUG 11312: tstream: Make socketpair nonblocking.
    * BUG 11330: tevent: Fix CID 1035381 Unchecked return value.
    * BUG 11331: tdb: Fix CID 1034842 and 1034841 Resource leaks.


o   Stefan Metzmacher <metze@samba.org>
    * BUG 11061: Logon via MS Remote Desktop hangs.
    * BUG 11141: tevent: Add a note to tevent_add_fd().
    * BUG 11293: Fix invalid write in ctdb_lock_context_destructor.
    * BUG 11316: tevent_fd needs to be destroyed before closing the fd.
    * BUG 11319: Build fails on Solaris 11 with "‘PTHREAD_MUTEX_ROBUST’
      undeclared".
    * BUG 11326: Robust mutex support broken in 1.3.5.
    * BUG 11329: s3:smb2_setinfo: Fix memory leak in the defer_rename case.
    * BUG 11330: Backport tevent-0.9.25.
    * BUG 11331: Backport tdb-1.3.6.
    * BUG 11367: s3:auth_domain: Fix talloc problem in
      connect_to_domain_password_server().


o   Marc Muehlfeld <mmuehlfeld@samba.org>
    * BUG 11315: Group creation: Add msSFU30Name only when --nis-domain was
      given.

o   Matthieu Patou <mat@matws.net>
    * BUG 11356: pidl: Make the compilation of PIDL producing the same results
      if the content hasn't change.


o   Noel Power <noel.power@suse.com>
    * BUG 11328: Kerberos auth info3 should contain resource group ids available
      from pac_logon.


o   Gordon Ross <gordon.w.ross@gmail.com>
    * BUG 11330: lib: tevent: Fix compile error in Solaris ports backend.


o   Christof Schmitt <cs@samba.org>
    * BUG 11313: idmap_rfc2307: Fix wbinfo '--gid-to-sid' query.
    * BUG 11324: Change sharesec output back to previous format.


o   Uri Simchoni <urisimchoni@gmail.com>
    * BUG 11358: winbindd: Disconnect child process if request is cancelled at
      main process.


o   Petr Viktorin <pviktori@redhat.com>
    * BUG 11330: Backport tevent-0.9.25.


o   Youzhong Yang <yyang@mathworks.com>
    * BUG 11217: s3-unix_msg: Remove socket file after closing socket fd.


#######################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored.  All bug reports should
be filed under the Samba 4.2 product in the project's Bugzilla
database (https://bugzilla.samba.org/).


======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================


----------------------------------------------------------------------


                   =============================
                   Release Notes for Samba 4.2.2
                           May 27, 2015
                   =============================


This is the latest stable release of Samba 4.2.


Changes since 4.2.1:
--------------------

o   Michael Adam <obnox@samba.org>
    * BUG 11182: s3:smbXsrv: refactor duplicate code into
      smbXsrv_session_clear_and_logoff().
    * BUG 11260: gencache: don't fail gencache_stabilize if there were records
      to delete.


o   Jeremy Allison <jra@samba.org>
    * BUG 11186: s3: libsmbclient: After getting attribute server, ensure main
      srv pointer is still valid.
    * BUG 11236: s4: rpc: Refactor dcesrv_alter() function into setup and send
      steps.
    * BUG 11240: s3: smbd: Incorrect file size returned in the response of
      "FILE_SUPERSEDE Create".
    * BUG 11249: Mangled names do not work with acl_xattr.
    * BUG 11254: nmbd rewrites browse.dat when not required.


o   Ralph Boehme <slow@samba.org>
    * BUG 11213: vfs_fruit: add option "nfs_aces" that controls the NFS ACEs
      stuff.
    * BUG 11224: s3:smbd: Add missing tevent_req_nterror.
    * BUG 11243: vfs: kernel_flock and named streams.
    * BUG 11244: vfs_gpfs: Error code path doesn't call END_PROFILE.


o   Alexander Bokovoy <ab@samba.org>
    * BUG 11284: s4: libcli/finddcs_cldap: continue processing CLDAP until all
      addresses are used.


o   David Disseldorp <ddiss@samba.org>
    * BUG 11201: ctdb: check for talloc_asprintf() failure.:w
    * BUG 11210: spoolss: purge the printer name cache on name change.


o   Amitay Isaacs <amitay@gmail.com>
    * BUG 11204: CTDB statd-callout does not scale.


o   Björn Jacke <bj@sernet.de>
    * BUG 11221: vfs_fruit: also map characters below 0x20.


o   Rajesh Joseph <rjoseph@redhat.com>
    * BUG 11201: ctdb: Coverity fix for CID 1291643.


o   Julien Kerihuel <j.kerihuel@openchange.org>
    * BUG 11225: Multiplexed RPC connections are not handled by DCERPC server.
    * BUG 11226: Fix terminate connection behavior for asynchronous endpoint
      with PUSH notification flavors.


o   Led <ledest@gmail.com>
    * BUG 11007: ctdb-scripts: Fix bashism in ctdbd_wrapper script.


o   Volker Lendecke <vl@samba.org>
    * BUG 11201: ctdb: Fix CIDs 1125615, 1125634, 1125613, 1288201 and 1125553.
    * BUG 11257: SMB2 should cancel pending NOTIFY calls with DELETE_PENDING if
      the directory is deleted.


o   Stefan Metzmacher <metze@samba.org>
    * BUG 11141: s3:winbindd: make sure we remove pending io requests before
      closing client sockets.
    * BUG 11182: Fix panic triggered by smbd_smb2_request_notify_done() ->
      smbXsrv_session_find_channel() in smbd.


o   Christof Schmitt <cs@samba.org>
    * BUG 11237: 'sharesec' output no longer matches input format.


o   Andreas Schneider <asn@samba.org>
    * BUG 11200: waf: Fix systemd detection.


o   Martin Schwenke <martin@meltin.net>
    * BUG 11202: CTDB: Fix portability issues.
    * BUG 11203: CTDB: Fix some IPv6-related issues.
    * BUG 11204: CTDB statd-callout does not scale.


o   Richard Sharpe <rsharpe@nutanix.com>
    * BUG 11234: 'net ads dns gethostbyname' crashes with an error in TALLOC_FREE
      if you enter invalid values.


o   Uri Simchoni <urisimchoni@gmail.com>
    * BUG 11267: libads: record service ticket endtime for sealed ldap
      connections.


o   Lukas Slebodnik <lslebodn@redhat.com>
    * BUG 11033: lib/util: Include DEBUG macro in internal header files before
      samba_util.h.


#######################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored.  All bug reports should
be filed under the Samba 4.2 product in the project's Bugzilla
database (https://bugzilla.samba.org/).


======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================


----------------------------------------------------------------------


                   =============================
                   Release Notes for Samba 4.2.1
                           April 15, 2015
                   =============================


This is the latest stable release of Samba 4.2.


Changes since 4.2.0:
--------------------

o   Michael Adam <obnox@samba.org>
    * BUG 8905: s3:winbind:grent: Don't stop group enumeration when a group has
      no gid.
    * BUG 10476: build:wafadmin: Fix use of spaces instead of tabs.
    * BUG 11143: s3-winbind: Fix cached user group lookup of trusted domains.


o   Jeremy Allison <jra@samba.org>
    * BUG 10016: s3: lib: ntlmssp: If NTLMSSP_NEGOTIATE_TARGET_INFO isn't set,
      cope with servers that don't send the 2 unused fields.
    * BUG 10888: s3: client: "client use spnego principal = yes" code checks
      wrong name.
    * BUG 11079: s3: lib: libsmbclient: If reusing a server struct, check every
      cli->timout miliseconds if it's still valid before use.
    * BUG 11173: s3: libcli: smb1: Ensure we correctly finish a tevent req if
      the writev fails in the SMB1 case.
    * BUG 11175: Fix lots of winbindd zombie processes on Solaris platform.
    * BUG 11177: s3: libsmbclient: Add missing talloc stackframe.


o   Andrew Bartlett <abartlet@samba.org>
    * BUG 11135: backupkey: Explicitly link to gnutls and gcrypt.
    * BUG 11174: backupkey: Use ndr_pull_struct_blob_all().


o   Ralph Boehme <slow@samba.org>
    * BUG 11125: vfs_fruit: Enhance handling of malformed AppleDouble files.


o   Samuel Cabrero <samuelcabrero@kernevil.me>
    * BUG 9791: Initialize dwFlags field of DNS_RPC_NODE structure.


o   David Disseldorp <ddiss@samba.org>
    * BUG 11169: docs/idmap_rid: Remove deprecated base_rid from example.


o   Volker Lendecke <vl@samba.org>
    * BUG 10476: waf: Fix the build on openbsd.


o   Stefan Metzmacher <metze@samba.org>
    * BUG 11144: talloc: Version 2.1.2.
    * BUG 11164: s4:auth/gensec_gssapi: Let gensec_gssapi_update() return
      NT_STATUS_LOGON_FAILURE for unknown errors.


o   Matthew Newton <matthew-git@newtoncomputing.co.uk>
    * BUG 11149: Update libwbclient version to 0.12.


o   Andreas Schneider <asn@samba.org>
    * BUG 11018: spoolss: Retrieve published printer GUID if not in registry.
    * BUG 11135: replace: Remove superfluous check for gcrypt header.
    * BUG 11180: s4-process_model: Do not close random fds while forking.
    * BUG 11185: s3-passdb: Fix 'force user' with winbind default domain.


o   Christof Schmitt <cs@samba.org>
    * BUG 11153: brlock: Use 0 instead of empty initializer list.


o   Thomas Schulz <schulz@adi.com>
    * BUG 11092: lib: texpect: Fix the build on Solaris.
    * BUG 11140: libcli/auth: Match Declaration of
      netlogon_creds_cli_context_tmp with implementation.


o   Jelmer Vernooij <jelmer@samba.org>
    * BUG 11137: Backport subunit changes.


#######################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored.  All bug reports should
be filed under the Samba 4.2 product in the project's Bugzilla
database (https://bugzilla.samba.org/).


======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================


----------------------------------------------------------------------


                   =============================
                   Release Notes for Samba 4.2.0
                           March 04, 2015
                   =============================


This is is the first stable release of Samba 4.2.

Samba 4.2 will be the next version of the Samba suite.


Samba User Survey 2015
======================

https://www.surveygizmo.com/s3/2020369/Samba-User-Survey-2015

Please take our survey. It will help us improve Samba by understanding
your knowledge and needs. The survey runs until end of March 2015 and
won't ask for any personal info. The full results will be shared with
the Samba Team, and statistical summaries will be shared with the
Samba community after the SambaXP conference (http://sambaxp.org).


IMPORTANT NOTE ABOUT THE SUPPORT END OF SAMBA 3
=================================================

With the final release of Samba 4.2, the last series of Samba 3 has
been discontinued! People still running 3.6.x or earlier,should
consider moving to a more recent and maintained version (4.0 - 4.2).
One of the common misconceptions is that Samba 4.x automatically
means "Active Directory only": This is wrong!

Acting as an Active Directory Domain Controller is just one of the
enhancements included in Samba 4.0 and later. Version 4.0 was just the
next release after the 3.6 series and contains all the features of the
previous ones - including the NT4-style (classic) domain support. This
means you can update a Samba 3.x NT4-style PDC to 4.x, just as you've
updated in the past (e.g. from 3.4.x to 3.5.x). You don't have to move
your NT4-style domain to an Active Directory!

And of course the possibility remains unchanged, to setup a new NT4-style
PDC with Samba 4.x, like done in the past (e.g. with openLDAP backend).
Active Directory support in Samba 4 is additional and does not replace
any of these features. We do understand the difficulty presented by
existing LDAP structures and for that reason there isn't a plan to
decommission the classic PDC support. It remains tested by the continuous
integration system.

The code that supports the classic Domain Controller is also the same
code that supports the internal 'Domain' of standalone servers and
Domain Member Servers. This means that we still use this code, even
when not acting as an AD Domain Controller. It is also the basis for
some of the features of FreeIPA and so it gets development attention
from that direction as well.


UPGRADING
=========

Read the "Winbindd/Netlogon improvements" section (below) carefully!


NEW FEATURES
============

Transparent File Compression
============================

Samba 4.2.0 adds support for the manipulation of file and folder
compression flags on the Btrfs filesystem.
With the Btrfs Samba VFS module enabled, SMB2+ compression flags can
be set remotely from the Windows Explorer File->Properties->Advanced
dialog. Files flagged for compression are transparently compressed
and uncompressed when accessed or modified.

Previous File Versions with Snapper
===================================

The newly added Snapper VFS module exposes snapshots managed by
Snapper for use by Samba. This provides the ability for remote
clients to access shadow-copies via Windows Explorer using the
"previous versions" dialog.

Winbindd/Netlogon improvements
==============================

The whole concept of maintaining the netlogon secure channel
to (other) domain controllers was rewritten in order to maintain
global state in a netlogon_creds_cli.tdb. This is the proper fix
for a large number of bugs:

  https://bugzilla.samba.org/show_bug.cgi?id=6563
  https://bugzilla.samba.org/show_bug.cgi?id=7944
  https://bugzilla.samba.org/show_bug.cgi?id=7945
  https://bugzilla.samba.org/show_bug.cgi?id=7568
  https://bugzilla.samba.org/show_bug.cgi?id=8599

In addition a strong session key is now required by default,
which means that communication to older servers or clients
might be rejected by default.

For the client side we have the following new options:
"require strong key" (yes by default), "reject md5 servers" (no by default).
E.g. for Samba 3.0.37 you need "require strong key = no" and
for NT4 DCs you need "require strong key = no" and "client NTLMv2 auth = no",

On the server side (as domain controller) we have the following new options:
"allow nt4 crypto" (no by default), "reject md5 client" (no by default).
E.g. in order to allow Samba < 3.0.27 or NT4 members to work
you need "allow nt4 crypto = yes"

winbindd does not list group memberships for display purposes
(e.g. getent group <domain\<group>) anymore by default.
The new default is "winbind expand groups = 0" now,
the reason for this is the same as for "winbind enum users = no"
and "winbind enum groups = no". Providing this information is not always
reliably possible, e.g. if there are trusted domains.

Please consult the smb.conf manpage for more details on these new options.

Winbindd use on the Samba AD DC
===============================

Winbindd is now used on the Samba AD DC by default, replacing the
partial rewrite used for winbind operations in Samba 4.0 and 4.1.

This allows more code to be shared, more options to be honoured, and
paves the way for support for trusted domains in the AD DC.

If required the old internal winbind can be activated by setting
'server services = +winbind -winbindd'.  Upgrading users with a server
services parameter specified should ensure they change 'winbind' to
'winbindd' to obtain the new functionality.

The 'samba' binary still manages the starting of this service, there
is no need to start the winbindd binary manually.

Winbind now requires secured connections
========================================

To improve protection against rogue domain controllers we now require
that when we connect to an AD DC in our forest, that the connection be
signed using SMB Signing.  Set 'client signing = off' in the smb.conf
to disable.

Also and DCE/RPC pipes must be sealed, set 'require strong key =
false' and 'winbind sealed pipes = false' to disable.

Finally, the default for 'client ldap sasl wrapping' has been set to
'sign', to ensure the integrity of LDAP connections.  Set 'client ldap
sasl wrapping = plain' to disable.

Larger IO sizes for SMB2/3 by default
=====================================

The default values for "smb2 max read", "smb2 max write" and "smb2 max trans"
have been changed to 8388608 (8MiB) in order to match the default of
Windows 2012R2.

SMB2 leases
===========

The SMB2 protocol allows clients to aggressively cache files
locally above and beyond the caching allowed by SMB1 and SMB2 oplocks.

Called SMB2 leases, this can greatly reduce traffic on an SMB2
connection. Samba 4.2 now implements SMB2 leases.

It can be turned on by setting the parameter "smb2 leases = yes"
in the [global] section of your smb.conf. This parameter is set
to off by default until the SMB2 leasing code is declared fully stable.

Improved DCERPC man in the middle detection
===========================================

The DCERPC header signing has been implemented
in addition to the dcerpc_sec_verification_trailer
protection.

Overhauled "net idmap" command
==============================

The command line interface of the "net idmap" command has been
made systematic, and subcommands for reading and writing the autorid idmap
database have been added. Note that the writing commands should be
used with great care. See the net(8) manual page for details.

tdb improvements
================

The tdb library, our core mechanism to store Samba-specific data on disk and
share it between processes, has been improved to support process shared robust
mutexes on Linux. These mutexes are available on Linux and Solaris and
significantly reduce the overhead involved with tdb. To enable mutexes for
tdb, set

dbwrap_tdb_mutexes:* = yes

in the [global] section of your smb.conf.

Tdb file space management has also been made more efficient. This
will lead to smaller and less fragmented databases.

Messaging improvements
======================

Our internal messaging subsystem, used for example for things like oplock
break messages between smbds or setting a process debug level dynamically, has
been rewritten to use unix domain datagram messages.

Clustering support
==================

Samba's file server clustering component CTDB is now integrated in the
Samba tree.  This avoids the confusion of compatibility of Samba and CTDB
versions as existed previously.

To build the Samba file server with cluster support, use the configure
command line option --with-cluster-support.  This will build clustered
file server against the in-tree CTDB and will also build CTDB.
Building clustered samba with previous versions of CTDB is no longer
supported.

Samba Registry Editor
=====================

The utitlity to browse the samba registry has been overhauled by our Google
Summer of Code student Chris Davis. Now samba-regedit has a
Midnight-Commander-like theme and UI experience. You can browse keys and edit
the diffent value types. For a data value type a hexeditor has been
implemented.

Bad Password Lockout in the AD DC
=================================

Samba's AD DC now implements bad password lockout (on a per-DC basis).

That is, incorrect password attempts are tracked, and accounts locked
out if too many bad passwords are submitted.  There is also a grace
period of 60 minutes on the previous password when used for NTLM
authentication (matching Windows 2003 SP1: https://support2.microsoft.com/kb/906305).

The relevant settings can be seen using 'samba-tool domain
passwordsettings show' (the new settings being highlighted):

Password informations for domain 'DC=samba,DC=example,DC=com'

Password complexity: on
Store plaintext passwords: off
Password history length: 24
Minimum password length: 7
Minimum password age (days): 1
Maximum password age (days): 42
* Account lockout duration (mins): 30     *
* Account lockout threshold (attempts): 0 *
* Reset account lockout after (mins): 30  *

These values can be set using 'samba-tool domain passwordsettings set'.

Correct defaults in the smb.conf manpages
=========================================

The default values for smb.conf parameters are now correctly specified
in the smb.conf manpage, even when they refer to build-time specified
paths.  Provided Samba is built on a system with the right tools
(xsltproc in particular) required to generate our man pages, then
these will be built with the exact same embedded paths as used by the
configuration parser at runtime.  Additionally, the default values
read from the smb.conf manpage are checked by our test suite to match
the values seen in testparm and used by the running binaries.

Consistent behaviour between samba-tool testparm and testparm
=============================================================

With the exception of the registry backend, which remains only
available in the file server, the behaviour of the smb.conf parser and
the tools 'samba-tool testparm' and 'testparm' is now consistent,
particularly with regard to default values.  Except with regard to
registry shares, it is no longer needed to use one tool on the AD
DC, and another on the file server.

VFS WORM module
===============

A VFS module for basic WORM (Write once read many) support has been
added. It allows an additional layer on top of a Samba share, that provides
a basic set of WORM functionality on the client side, to control the
writeability of files and folders.

As the module is simply an additional layer, share access and permissions
work like expected - only WORM functionality is added on top. Removing the
module from the share configuration, removes this layer again. The
filesystem ACLs are not affected in any way from the module and treated
as usual.

The module does not provide complete WORM functions, like some archiving
products do! It is not audit-proof, because the WORM function is only
available on the client side, when accessing a share through SMB! If
the same folder is shared by other services like NFS, the access only
depends on the underlying filesystem ACLs. Equally if you access the
content directly on the server.

For additional information, see
https://wiki.samba.org/index.php/VFS/vfs_worm

vfs_fruit, a VFS module for OS X clients
========================================

A new VFS module that provides enhanced compatibility with Apple SMB
clients and interoperability with a Netatalk 3 AFP fileserver.

The module features enhanced performance with reliable named streams
support, interoperability with special characters commonly used by OS
X client (eg '*', '/'), integrated file locking and Mac metadata
access with Netatalk 3 and enhanced performance by implementing
Apple's SMB2 extension codenamed "AAPL".

The modules behaviour is fully configurable, please refer to the
manpage vfs_fruit for further details.

smbclient archival improvements
===============================

Archive creation and extraction support in smbclient has been rewritten
to use libarchive. This fixes a number of outstanding bugs in Samba's
previous custom tar implementation and also adds support for the
extraction of zipped archives.
smbclient archive support can be enabled or disabled at build time with
corresponding --with[out]-libarchive configure parameters.


######################################################################
Changes
#######

smb.conf changes
----------------

   Parameter Name			Description	Default
   --------------			-----------	-------

   allow nt4 crypto                     New             no
   neutralize nt4 emulation             New             no
   reject md5 client                    New             no
   reject md5 servers                   New             no
   require strong key                   New             yes
   smb2 max read                        Changed default 8388608
   smb2 max write                       Changed default 8388608
   smb2 max trans                       Changed default 8388608
   winbind expand groups                Changed default 0


CHANGES SINCE 4.2.0rc5
======================

o   Michael Adam <obnox@samba.org>
    * BUG 11117: doc:man:vfs_glusterfs: improve the configuration section.


o   Jeremy Allison <jra@samba.org>
    * BUG 11118: tevent: Ignore unexpected signal events in the same way the
      epoll backend does.


o   Andrew Bartlett <abartlet@samba.org>
    * BUG 11100: debug: Set close-on-exec for the main log file FD.
    * BUG 11097: Fix Win8.1 Credentials Manager issue after KB2992611 on Samba
      domain.


o   Ira Cooper <ira@samba.org>
    * BUG 1115: smbd: Stop using vfs_Chdir after SMB_VFS_DISCONNECT.


o   Günther Deschner <gd@samba.org>
    * BUG 11088: vfs: Add a brief vfs_ceph manpage.


o   David Disseldorp <ddiss@samba.org>
    * BUG 11118: tevent: version 0.9.24.


o   Amitay Isaacs <amitay@gmail.com>
    * BUG 11124: ctdb-io: Do not use sys_write to write to client sockets.


o   Volker Lendecke <vl@samba.org>
    * BUG 11119: snprintf: Try to support %j.


o   Garming Sam <garming@catalyst.net.nz>
    * BUG 11097: Fix Win8.1 Credentials Manager issue after KB2992611 on Samba
      domain.


o   Andreas Schneider <asn@samba.org>
    * BUG 11127: doc-xml: Add 'sharesec' reference to 'access based share
      enum'.


CHANGES SINCE 4.2.0rc4
======================

o   Michael Adam <obnox@samba.org>
    * BUG 11032: Enable mutexes in gencache_notrans.tdb.
    * BUG 11058: cli_connect_nb_send: Don't segfault on host == NULL.


o   Jeremy Allison <jra@samba.org>
    * BUG 10849: s3: lib, s3: modules: Fix compilation on Solaris.
    * BUG 11044: Fix authentication using Kerberos (not AD).
    * BUG 11077: CVE-2015-0240: s3: netlogon: Ensure we don't call talloc_free
      on an uninitialized pointer.
    * BUG 11094: s3: smbclient: Allinfo leaves the file handle open.
    * BUG 11102: s3: smbd: leases - losen paranoia check. Stat opens can grant
      leases.
    * BUG 11104: s3: smbd: SMB2 close. If a file has delete on close, store the
      return info before deleting.


o   Ira Cooper <ira@samba.org>
    * BUG 11069: vfs_glusterfs: Add comments to the pipe(2) code.


o   Günther Deschner <gd@samba.org>
    * BUG 11070: s3-vfs: Fix developer build of vfs_ceph module.


o   David Disseldorp <ddiss@samba.org>
    * BUG 10808: printing/cups: Pack requested-attributes with IPP_TAG_KEYWORD.
    * BUG 11055: vfs_snapper: Correctly handles multi-byte DBus strings.
    * BUG 11059: libsmb: Provide authinfo domain for encrypted session
      referrals.


o   Poornima G <pgurusid@redhat.com>
    * BUG 11069: vfs_glusterfs: Implement AIO support.


o   Volker Lendecke <vl@samba.org>
    * BUG 11032: Enable mutexes in gencache_notrans.tdb.


o   Stefan Metzmacher <metze@samba.org>
    * BUG 9299: nsswitch: Fix soname of linux nss_*.so.2 modules.
    * BUG 9702: s3:smb2_server: protect against integer wrap with "smb2 max
      credits = 65535".
    * BUG 9810: Make validate_ldb of String(Generalized-Time) accept
      millisecond format ".000Z".
    * BUG 10112: Use -R linker flag on Solaris, not -rpath.


o   Marc Muehlfeld <mmuehlfeld@samba.org>
    * BUG 10909: samba-tool: Create NIS enabled users and unixHomeDirectory
      attribute.


o   Garming Sam <garming@catalyst.net.nz>
    * BUG 11022: Make Sharepoint search show user documents.


o   Christof Schmitt <cs@samba.org>
    * BUG 11032: Enable mutexes in gencache_notrans.tdb.


o   Andreas Schneider <asn@samba.org>
    * BUG 11058: utils: Fix 'net time' segfault.
    * BUG 11066: s3-pam_smbpass: Fix memory leak in pam_sm_authenticate().
    * BUG 11077: CVE-2015-0240: s3-netlogon: Make sure we do not deference a
      NULL pointer.


o   Raghavendra Talur <raghavendra.talur@gmail.com>
    * BUG 11069: vfs/glusterfs: Change xattr key to match gluster key.


CHANGES SINCE 4.2.0rc3
======================

o   Andrew Bartlett <abartlet@samba.org>
    * BUG 10993: CVE-2014-8143: dsdb-samldb: Check for extended access
      rights before we allow changes to userAccountControl.


o   Günther Deschner <gd@samba.org>
    * BUG 10240: vfs: Add glusterfs manpage.


o   David Disseldorp <ddiss@samba.org>
    * BUG 10984: Fix spoolss IDL response marshalling when returning error
      without clearing info.


o   Amitay Isaacs <amitay@gmail.com>
    * BUG 11000: ctdb-daemon: Use correct tdb flags when enabling robust mutex
      support.


o   Volker Lendecke <vl@samba.org>
    * BUG 11032: tdb_wrap: Make mutexes easier to use.
    * BUG 11039: vfs_fruit: Fix base_fsp name conversion.
    * BUG 11040: vfs_fruit: mmap under FreeBSD needs PROT_READ.
    * BUG 11051: net: Fix sam addgroupmem.


o   Stefan Metzmacher <metze@samba.org>
    * BUG 10940: s3:passdb: fix logic in pdb_set_pw_history().
    * BUG 11004: tdb: version 1.3.4.


o   Christof Schmitt <cs@samba.org>
    * BUG 11034: winbind: Retry after SESSION_EXPIRED error in ping-dc.


o   Andreas Schneider <asn@samba.org>
    * BUG 11008: s3-util: Fix authentication with long hostnames.
    * BUG 11026: nss_wrapper: check for nss.h.
    * BUG 11033: lib/util: Avoid collision which alread defined consumer DEBUG
      macro.
    * BUG 11037: s3-libads: Fix a possible segfault in kerberos_fetch_pac().


CHANGES SINCE 4.2.0rc2
======================

o   Michael Adam <obnox@samba.org>
    * BUG 10892: Integrate CTDB into top-level Samba build.


o   Jeremy Allison <jra@samba.org>
    * BUG 10851: lib: uid_wrapper: Fix setgroups and syscall detection on a
      system without native uid_wrapper library.
    * BUG 10896: s3-nmbd: Fix netbios name truncation.
    * BUG 10904: Fix smbclient loops doing a directory listing against Mac OS X 10
      server with a non-wildcard path.
    * BUG 10911: Add support for SMB2 leases.
    * BUG 10920: s3: nmbd: Ensure NetBIOS names are only 15 characters stored.
    * BUG 10966: libcli: SMB2: Pure SMB2-only negprot fix to make us behave as a
      Windows client does.
    * BUG 10982: s3: smbd: Fix *allocate* calls to follow POSIX error return
      convention.


o   Christian Ambach <ambi@samba.org>
    * BUG 9629: Make 'profiles' work again.


o   Björn Baumbach <bb@sernet.de>
    * BUG 11014: ctdb-build: Fix build without xsltproc.


o   Ralph Boehme <slow@samba.org>
    * BUG 10834: Don't build vfs_snapper on FreeBSD.
    * BUG 10971: vfs_streams_xattr: Check stream type.
    * BUG 10983: vfs_fruit: Add support for AAPL.
    * BUG 11005: vfs_streams_xattr: Add missing call to SMB_VFS_NEXT_CONNECT.


o   Günther Deschner <gd@samba.org>
    * BUG 9056: pam_winbind: fix warn_pwd_expire implementation.
    * BUG 10942: Cleanup add_string_to_array and usage.


o   David Disseldorp <ddiss@samba.org>
    * BUG 10898: spoolss: Fix handling of bad EnumJobs levels.
    * BUG 10905: Fix print job enumeration.


o   Amitay Isaacs <amitay@gmail.com>
    * BUG 10620: s4-dns: Add support for BIND 9.10.
    * BUG 10892: Integrate CTDB into top-level Samba build.
    * BUG 10996: Fix IPv6 support in CTDB.
    * BUG 11014: packaging: Include CTDB man pages in the tarball.


o   Björn Jacke <bj@sernet.de>
    * BUG 10835: nss_winbind: Add getgroupmembership for FreeBSD.


o   Guenter Kukkukk <linux@kukkukk.com>
    * BUG 10952: Fix 'samba-tool dns serverinfo <server>' for IPv6.


o   Volker Lendecke <vl@samba.org>
    * BUG 10932: pdb_tdb: Fix a TALLOC/SAFE_FREE mixup.
    * BUG 10942: dbwrap_ctdb: Pass on mutex flags to tdb_open.


o   Justin Maggard <jmaggard10@gmail.com>
    * BUG 10852: winbind3: Fix pwent variable substitution.


o   Kamen Mazdrashki <kamenim@samba.org>
    * BUG 10975: ldb: version 1.1.18


o   Stefan Metzmacher <metze@samba.org>
    * BUG 10781: tdb: version 1.3.3
    * BUG 10911: Add support for SMB2 leases.
    * BUG 10921: s3:smbd: Fix file corruption using "write cache size != 0".
    * BUG 10949: Fix RootDSE search with extended dn control.
    * BUG 10958: libcli/smb: only force signing of smb2 session setups when
      binding a new session.
    * BUG 10975: ldb: version 1.1.18
    * BUG 11016: pdb_get_trusteddom_pw() fails with non valid UTF16 random
      passwords.


o   Marc Muehlfeld <mmuehlfeld@samba.org>
    * BUG 10895: samba-tool group add: Add option '--nis-domain' and '--gid'.


o   Noel Power <noel.power@suse.com>
    * BUG 10918: btrfs: Don't leak opened directory handle.


o   Matt Rogers <mrogers@redhat.com>
    * BUG 10933: s3-keytab: fix keytab array NULL termination.


o   Garming Sam <garming@catalyst.net.nz>
    * BUG 10355: pdb: Fix build issues with shared modules.
    * BUG 10720: idmap: Return the correct id type to *id_to_sid methods.
    * BUG 10864: Fix testparm to show hidden share defaults.


o   Andreas Schneider <asn@samba.org>
    * BUG 10279: Make 'smbclient' use cached creds.
    * BUG 10960: s3-smbclient: Return success if we listed the shares.
    * BUG 10961: s3-smbstatus: Fix exit code of profile output.
    * BUG 10965: socket_wrapper: Add missing prototype check for eventfd.


o   Martin Schwenke <martin@meltin.net>
    * BUG 10892: Integrate CTDB into top-level Samba build.
    * BUG 10996: Fix IPv6 support in CTDB.


CHANGES SINCE 4.2.0rc1
======================

o   Jeremy Allison <jra@samba.org>
    * BUG 10848: s3: smb2cli: query info return length check was reversed.


o   Björn Baumbach <bb@sernet.de>
    * BUG 10862: build: Do not install 'texpect' binary anymore.


o   Chris Davis <cd.rattan@gmail.com>
    * BUG 10859: Improve samba-regedit.


o   Jakub Hrozek <jakub.hrozek@gmail.com>
    * BUG 10861: Fix build of socket_wrapper on systems without SO_PROTOCOL.


o   Volker Lendecke <vl@samba.org>
    * BUG 10860: registry: Don't leave dangling transactions.


o   Stefan Metzmacher <metze@samba.org>
    * BUG 10866: libcli/smb: Fix smb2cli_validate_negotiate_info with
      min=PROTOCOL_NT1 max=PROTOCOL_SMB2_02.


o   Christof Schmitt <cs@samba.org>
    * BUG 10837: idmap_rfc2307: Fix a crash after connection problem to DC.


#######################################
Reporting bugs & Development Discussion
#######################################

Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.

If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored.  All bug reports should
be filed under the Samba 4.2 product in the project's Bugzilla
database (https://bugzilla.samba.org/).


======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================